tags-->
The Chernicoff Group logo
Security & Security Litigation Support Services, online since 1994


Security consulting, security training, security links you should visit, expert consulting services for attorneys, security training information, links to related content sites, and abstracts from the Journal of Security Administration are some of the data found on these pages.

Use the page link menu box to your right to review site content pages.

You are invited to submit brief articles with security related content for publication. All submitted work is credited to the author and a link back to the writer's site or e-mail is provided.

This site is designed for a setting of 1024x768

Joseph L.Chernicoff curriculum vitae


Use the selection box for Chernicoff Curriculum Vitae and listed pages of some content related sites
A few featured articles:
Litigation and the role of the security director
A definition of Security
Using Security/Safety Window Film for your home and business
Two articles of interest[1-01-06] Protecting America with Specialty Gases and [March 30,2007] the Specialty Gas Guide ; written by Bob Jefferys.
December 12, 2006: An important article by Mort Zuckerman
To contact jcsl2s.com via e-mail, click here

 I believe it was Cicero who stated this about common sense - too much common and not enough sense - at least that idea. Regardless, visit for new Common Sense blog pages, with space for your comments...
 July 12, 2007: Fire safety is a part of the security picture, especially when it involves a multi-dwelling building. A system has been designed in Israel for evacuation from those premises, so if you haven't yet seen this demo, enjoy...
 July 15, 2007: About 28 years or so ago, I made a brief video demonstrating how easy it can be to hide more than one back-upgun. The security officer demonstrating the capability was about 5'5'', and pulled out a half-dozen firearms from under his uniform, all of which were not noticeable. Anyhow, I recently saw another video clip which demonstrates this, so take a look at this clip - it could be enlightening for you.

Need an expert for your tavern security case? Call 702-655-3010,

Born on: March 10, 1994

San Bernadino, an Important Security Lesson



Joe Chernicoff CST
12-29-15
joecst@jcsl2s.com
http://jcsl2s.com


Maybe, just maybe, we all either learned or were reminded of an important security fact...Observe and Report is the essential precept of all security operations. Look, I know, and as I have expressed over many years, security is an 'eight letter dirty word', something we all want but do not want to enable through our own actions. Today, that feeling is somewhat justified by various groups and ideologies due to belief by some in 'political correctness', which as we all are aware, provided the time for the Islamist attack in San Bernadino.

Security - personal, business, community, state - has been a necessity for all human development throughout the entire history of mankind. In relatively modern times, we have seen castles with moats, merchants in the late 16th century hire linkmen to protect them as they traversed the alleyways of London, to Oscar Newman's 1973 Guide on Improving Residential Security written under contract to HUD (Housing and Urban Development). Out of this work came the significant value of the nosy neighbor and the community watch program as important tools in crime prevention, if used properly. The main word, of course, is "used".

Sure, everyone knows, or is thought to know, what security is, but from the woman who leaves her open handbag in a shopping cart while perusing merchandise on a store shelf to the government's neglect to make sure there are no broken windows in its domestic and foreign policy security considerations, negligence, non-awareness, and "don't give a damn" attitude seems to permeate this nation's security mentality. That thinking provided a career for me as a security litigation expert for many years, but we would all be better off if more attention was paid to preempting criminal and terrorist incidents rather than reacting to those events with flower arrangements, days of mourning, and "tough pronouncements".

To follow my commentaries visit Joe's Place

 

Security Tips:


 

October 28, 2010: Family Security or a Fancy TV
Acording to published figures, nationwide a burglary occurs every 15 seconds. There are a couple of ways to avoid becoming the next victim

  • Be lucky
  • Harden your property

    For folks living in the Las Vegas area, there is no misunderstanding how difficult it is to get lucky once-in- a-while, and to depend upon luck to keep you safe, they know that isn't the way to go.

    So for the price of a fancy TV, or less, homeowners can harden their house windows - a favorite place for burglars/robbers to enter, probably to steal that TV, along with everything else - and rest peacefully whether at home or away.

    That's right, for a cost of , say, $1500 - $2000, a Las Vegas homeowner can create a strong security barrier for his or her home's windows, without changing the appearance of the property.

    For more information, drop me a note for full information. You'll be glad you did.

    September 24, 2010: A (somewhat) Authentic Looking Scam
    When you live in Las Vegas (NV), you know there's always a possibility of making big dollars, although on the reverse side the probability is very low. So when I received a very authentic check in my mail this day, along with a letter of explanation that the $4910.00 was to help cover costs related to collecting the $150,000.00 won in a department store giveaway, my first reaction was to verify the company whose check I received, as well as the bank through which the check was drawn.

    Of course, the fact that the letter contained with the check provided instructions to call an agent for instructions re: receiving the cash award, deliverable by UPS or FedEx, also required a $3610.00 "tax fee", payable via Western Union, and that the letter was sent from Canada, with nothing on the envelope other than my address, was enough to mark the deal as a scam.

    But upon verification of the company issuing the payment, and the paying bank were both legitimate companies, opened the possibility that the check could be collected upon, without sending the "tax fee". So I called the company, located in the state of New York, and recived some interesting information.

    Yes, this was a scam, and had been going on for about three months. When I asked what would happen if the check were deposited, and if the company had taken any losses on the checks, I was informed by the person I spoke with that she didn't know about the first point, and as far as she knew, no losses occurred. Which doesn't tell me much.

    So this is another good example of how identity theft can be used to rip people off from their money. If someone cashes the check, but says to heck with sending a Western Union payment, he or she will more than likely be out around $25 for a uncollectible depost charge. So the victim loses no matter what he or she does, if common sense isn't used, especially in these tough economic times.

    I also was led to understand that the FBI and other law enforcement agencies have been notified about this "new Canadian style Nigeria" scam. As the old saying goes, 'Caveat Emptor'.

    August 29, 2010: Foremsic Videography you can produce

    August 3, 2010: The June/July issue of Security Technology Executive magazinehas a good article by Marleah Blades, concerning concealed carry weapons on college campuses. There is a significant value in allowing concealed firearms on campuses, in light of past on-campus attacks, so, in general, the idea is good.

    My only suggestion is that in the states where that carry is permitted, psychological testing, such as the MMPI, be administered to carry applicants; if the state is a permit-free state, then that testing should still be required for everyone who will be carrying as a student or college staff member.

    My experience with the MMPI is that more than 99% of carry applicants are not prevented from carrying. So that number, hopefully, would be true for the college/university campuses. In these times, however, the security value of testing has benefits to both the institution (liability issues), and safety (weeding out the few who display hidden anti-social or quick-to-anger tendencies).

    April 16, 2010: For an excellent source of news on art crime, visit the Museum Security Network

    June 20, 2009: We're living in some strange times, at least for for this country. Actually, conditions - economic and political - may be reminiscent of the 1930s. All of which means that as individuals, as homeowners, or as business people, it is of extreme importance that we understand the importance of securing what we have. It is much too easy to be sloppy about security. My thirty-five years working within the industry has not shown me much of an increase in the willingness of people to expend the small effort necessary for self protection (of home, business, and person). It still appears that security is an eight letter dirty word, one about which too many people do not want to be reminded.

    Even television ads from security providers make it appear that security is as simple to accomplish as throwing a switch. These days, the term "broken window" is being thrown around as though it is a new idea - but it is kind of like reinventing the wheel. If everyone would pay attention to the broken window theory, maybe we'd all be better off.

    October 28, 2008: Major change have been taking place in the Unuted States over the past decade. Aside from who may win the upcoming presidential election, and how our legislature will be governed, social changes have been a major impact on how we conduct our lives, and those changes may - probably will - make our attitude toward security even more important than it has been to date.

    Basic security concepts, I believe, never change, and never have changed. The 1988 Volume 11, Number 2 of the Journal of Security Administration opens with an article written by Marcus Feison, Social Science Research Institute, University of Southern California, the opening paragraphs of which deserve repeating at this time.

    "Security is not just a matter of locks, bolts, and badges. Indeed, it is a fundamental feature of human adaptation to environment. It can be analyzed in terms of human ecology. Security respond to changes in society's means of gaining a living and protecting it. Changes in North American urban ecology has greatly favored crime and impaired security. Some ecological changes, the development of facilities, may help to restore some measure of security in metropolitan areas.

    The word "security " derives from the Latin words meaning "care for yourself". This definition illustrates why security is a basic ecological function...(A)ny family seeking to survive must not only gather its food supplies, but also protect from...predators. This fundamental principle helps you to think about security in a broader context than locks, bolts, and badges."


     
    ******************

    News from Museum Security Network (MSN)SN: Thu May 20, 2:54 am ET
    [Guess who forgot to return his book to the library?] NEW YORK (Reuters Life!) – A library book borrowed by the first U.S. president, George Washington, has been returned to a New York City's oldest library, 221 years late. Washington checked out the book from the New York Society Library at a time when the library shared a building with the federal government in lower Manhattan.

    The library said in a statement that its borrowing records, or charging ledger, showed Washington took out "The Law of Nations" by Emer de Vattel on October 5, 1789. The book was not returned, nor any overdue book fine paid -- with the overdue fee now calculated at about $300,000 (208,877 pounds). The missing book came to light when the New York Society Library was restoring its 1789-1792 charging ledger, which features the borrowing history of Washington, John Adams, John Jay, Aaron Burr, Alexander Hamilton, George Clinton, and others.

    The library conducted an inventory of books mentioned in the ledger and confirmed the book checked out by Washington was still missing. But the missing book was kept secret for years until it became public recently in an article in The New York Daily News, the library said in a statement. "A few days after learning of the situation, staff at Washington's home in Virginia, Mount Vernon, offered to replace Vattel's "Law of Nations" with another copy of the same edition," the library said in a statement.

    To mark the occasion the library hosted a ceremony on May 19 at which the errant volume was presented. (Writing by Belinda Goldsmith, Editing by Miral Fahmy)

    The following link is from a MSN email of August 1, 2010, and is about an important new/old theft problem.. Read the report here.

     

    Citizen's arrest is a powerful tool, especially when properly used. But like everything else that's good, citizen's arrest can be abused. I was conducting a deci-annual review of some security and firearm training files, and came across a news account from the Philadelphia Inquire from, I believe, around the early 80s. Read this example of how not to make a citizen's arrest


    November 16, 2010: Airport security complaints rise and TSA says they are doing their best. But see the Israeli airports security process.

    October 7, 2007: "Deja Vu- All Over Again"

    When conducting the semi-annual or annual review of all security procedures - a minimal task that has to be done in a serious manner, take a look at your training programs and procedure. You might want to read my current opinion printed in the "Opinion" column below.

    April 23, 2007: Needed Enhancement of Firearm Purchase Data

    As someone with pretty solid street creds re: firearms, I am obviously strongly opposed to gun control laws; however, I do believe that sometimes things have to change with the times, and current firearm purchase information is included amongst those "things".

    Other than criminal background checks which may be cause for a FFL license holder to reject a sale, mental health history should be included in the database. That information would help preempt both ant-social acts by those angry enough to shoot others as a means of expressing their anger, and would help curtail suicides by firearms (this is an issue which has been discussed for many years).

    Of course, those enhancements to the background checks would not affect sales through strawmen, nor purchases from illegal sources, but it would help to eliminate many potential buyers whose uses of firearms and peripherals, such as magazines, etc., result in unlawful and deadly scenarios. In addition, in today's world, it may also behoove those databases to include the names of individuals strongly suspected of ties with terrorist organizations to be included.

    April 12, 2007: Is our Security Becoming Sloppier - Or Are We Just Taking the Easy Way Out?

    Is there an ethical issue concerning reporting to store security about someone whom you believe you have direct knowledge that the person may be, or actually, is engaged in retail theft (shoplifting).

    There are a couple of factors involved in a situation such as this:

  • Shoplifting is unlawful, hence it is a crime. As a citizen, and a store customer, to what extent do you have a duty to report such activity?
  • Is there an ethical basis for you to report that activity? Does it depend upon whether the incident is that of a person in a super market walking around the store, grazing from the shelves/ Or is it someone stuffing merchandise under a coat? Is there a difference between the two? And, would your involvement be appreciated by store loss prevention, or would it be of no real concern to the LP people if the action were only the grazing incident?
  • How much of a risk to yourself would such an action on your part place you? If store security stops that individual based upon your report, and then walks away without taking any action against that person, where does that put you - do you have any kind of personal liability for issuing "false information"?

    Today's cell phones - those with cameras, can certainly turn the tide in your favor, regardless of what the store security people decide to do. Look, we are unfortunately living in a time of seeming laissez affaire when it comes to the problem of retail theft. Most of those crimes are committed by employees. Major store are now not requiring signatures on charges under $50, and some do not even look at your identification.

    Has the problem become so annoying that it is more cost efficient to allow small dollar theft rather than spend the time requiring signatures? About a year or so ago I reported to a store security person that it was very easy for me to take a couple of bags of salt for a water softener from the store without anyone stopping me, since the merchandise was placed in an area outside of the main store building. Security thanked me for the info, but as of today, that practice still exists, and I wonder how many dollars are lost because of that setup. And that's not the main point - it is a breakdown in the total comprehensive security program. Relaxing security in one area will eventually lead to relaxation in other security areas.

    And this is symptomatic of not only retail businesses, but of the country as a whole. Everyone seems to be talking about security, but it's the little things which are not done - and that's the problem.

    April 9, 2007 - Exposing the United Nation's Weakness

    I don't know if it's just my age, but it is becoming more and more difficult to put up with all of the nonsense going on around this world. It's bad enough in this country, not only on the national scene, but also in many statewide scenarios. And the UN sure doesn't help out this situation. Another example of the UN's ineffectiveness - at least to my Western state of mind - is shown in this 4-minute video. And make sure you read the item below...

    March 27, 2007 - It's Time We Take the Bull by the Horns

    Today, the Western World - and, in particular, the United States of America, faces a serious threat to our world. Islamic Jihad is becoming a more and more accepted way of political life among too many people of this planet. Many accept this threat as a means to being "politically correct". Others accept this growth because they believe it will solve their problems(!?). Still, others, European countries, take the attitude that there is nothing they can do about the rise of this destructive force, a fact which is deeply disturbing since it has only been seventy-four years since the rise of Hitler and his Nazi party, a catastrophe no less severe than what we now face.

    It is commonly heard that not all Muslims agree with Islamic Jihad - but if that is true, where is the outrage which should come from those people. Is there only a handful with the guts to cry out in rage against what is occurring? Silence means acceptance, and this is the kind of acceptance which will eventually be our greatest security problem.

    Those of our citizenry who do not have a first-hand knowledge of the history of WWII, and its precursor events, must spend some time learning what took place, so that they can understand the threat under which this country exists.

    Political correctness has its place in some scenarios, but definitely not with this problem. If you are unaware of what is going on, or if politics and/or world affairs is "just too depressing or boring", I suggest that you watch this presentation - it is scary, but reality - and presents a major security threat to all of us who believe in the American way of life!

    Blog Flux Directory

     
    Listen to the audio podcasts - and some videocasts - at "The Eight Dirty Letter Word"
    If you are not reading or listening to xml (RSS feeds) broadcasts at this time, perhaps this is something you should begin to do. Just use your search engine to find "news readers" or "aggregators", and are free. Doing this will bring you all new content without your having to search for the items.

    >> Firefox and Internet Explorer users (7+): Link directly to the RSS feeds - use this link and add to your bookmarks or to your news reader

    Subscribe to these podcasts by adding http://jcsl2s.com/podcasts/cgrsecuritycast.xml to your feeds.

    Tune into Joe Chernicoff podcasts at on the PodHoster site - click on the "find a podcast", then "Security" link or type "Security" in the search bar.
    You can also find the local directory here

    March 14, 2007 One of these days, people are going to really pay attention to the fact that saving money on premises door locks is not the way to go...Here's what can happen when you try to buy cheap security (door locks). Click Here for an Important Video! and update on bumping and other lock by-passing


    An Example of How Crime Benefits Terrorists [excerpted from the February 4, 2010 issue of Art Newspaper]:
    LONDON. The German secret service has testimony that relates to 9/11 hijacker Mohamed Atta’s attempted sale in Germany of looted Afghan artefacts, according to Giuseppe Proietti, secretary general of Italy’s ministry of culture. Proietti has made repeated references to this testimony in public speeches delivered since 2005. His remarks have not been widely reported but are mentioned in the autumn issue of the Journal of Art Crime. According to Proietti, in 1999 Atta contacted an archaeologist at the German university of Göttingen with an offer to sell Afghan artefacts. An unidentified archaeologist, who declined the offer, told the German secret service that Atta had said he needed the money to pay for flying lessons in the US. Atta moved to Germany from his native Cairo in 1992 to study at the Hamburg University of Technology. It was there that he became increasingly radicalised, eventually forming the so-called Hamburg Cell of terrorists who organ­ised the 2001 attacks on the US. Atta spent several months in Afghanistan in late 1999 when he met Osama bin Laden and other Al-Qaeda leaders and trained to be a terrorist; it is possible that he also made arrangements to sell looted antiquities in Germany. In 2000 he started learning to fly in Florida. Atta was the hijacker in control of American Airlines Flight 11, the first plane to strike the World Trade Center. The market for Afghan antiquities is so strong that the government has issued a list of the most significant missing museum pieces for border police.

    April 3, 2007: Security - Art or Science?
    The oft-asked question about security - is it an art or a science - has been going on for quite a while. My opinion is on the side of those who say it is an art - with some science supporting it. Here is why I say that: If it were a science, most, if not all, of security would be predictable. And even though in many cases the security practitioner can be pretty intuitive about what will probably happen, something always occurs which surprises the expert. That is why security practitioners always have to be ready for the unexpected. Those who don't have the ability to imagine what could happen, may be "too shocked" to react effectively. So the art is having the ability to understand what is "normal" for your facility, and then consider what could be reasonably be expected outside of the normal.

    The More Times Change, The More They Stay the Same
    During my 40+ years as an NRA instructor and 30+ years as an NRA training Counselor, I had the opportunity to conduct a number of adult evening school classes on basic firearm training.

    Most of the attendees in those 12 hour courses were women, and most were interested in the training for self defense reasons. Although there were a good number of women who were hesitant at first, just about all became proficient with the handgun, and at least one of the women went on to become a well respected PPC competitor.

    With that in mind, I'd like to refer you to a recent column written by Jane Ann Morrison, a long time respected political and things about Nevada columnist for the Las Vegas Review-Journal. Now, Nevada is a pro-gun state, but that doesn't mean people are not hesitant about learning to shoot. Read With a little knowledge of guns come less fear, more respect, from March 3, 2007. You will find it interesting, and, perhaps, valuable.


    From Slashdot .xml feed, May 30, 2007 "According to the recent Face Recognition Grand Challenge, The match up of face-recognition algorithms showed that machine recognition of human individuals has improved tenfold since 2002 and a hundredfold since 1995. 'Among other advantages, 3-D facial recognition identifies individuals by exploiting distinctive features of a human face's surface--for instance, the curves of the eye sockets, nose, and chin, which are where tissue and bone are most apparent and which don't change over time. Furthermore, Phillips says, "changes in illumination have adversely affected face-recognition performance from still images. But the shape of a face isn't affected by changes in illumination." Hence, 3-D face recognition might even be used in near-dark conditions.'"
    Avoid the Mule Trap

    Madrid, November 17, 2006 - PandaLabs has detected mass email messages that offer jobs at a supposed NGO committed to helping underprivileged children. However, it is actually a stratagem to find "mules", that is, people to launder stolen money.

    These emails have subjects like the following: 'Best Job No Experience Needed'. Whereas the message body text offers a well-paid job, working only a few hours a day for the alleged NGO.

    The lack of scruples of these fraudsters is even more apparent in the website which the link in the messages accesses. This website, which passes itself off as the site of charitable benefactors of childhood and uses images of children, tries to win over the confidence of potential "mules" to convince them to take the job offered.

    If users contact the fraudsters through the form in the website for this purpose, the fraudsters will reply to give them more details about the job. This involves receiving money, which is generally wired to bank accounts that the fraudsters can access by stealing confidential details using techniques like phishing.

    The "mule" must then send this money, minus a commission, to a certain addresses specified by the fraudsters.

    According to Luis Corrons, director of PandaLabs: "These fraudsters are not only looking for someone to launder the money, but also for a scapegoat, who the authorities will go after when the owner of the bank account they have cleaned out realizes what has happened. In this case, the minimum that the bank can demand is that the runner pay back all the stolen money, that is apart from other legal action that can be taken, which could even mean a prison sentence".

    Panda Software recommends all users to delete any messages of this type that reach their inboxes. What's more, they advise users not to provide any personal details that could be used for criminal activities.

    "If users have provided any data such as their name, bank account number etc., we advise them to immediately inform the authorities in order to avoid problems. Bear in mind that with a simple personal identification number, these criminals can, for example, open bank accounts to carry out illegal activities, stealing the identity of the person who has provided these details," explains Luis Corrons.


    "No Ifs or Buts, They're All a Pain in the Butt!
    November 5, 2006: Electioneering and spam mail - what's the difference? Not much! Look, if you're going to be influenced by Laura Bush's phone call, or one from Bill Clinton, then you get what you deserve,and that's pretty much not good. The same goes for those of you who respond to the onslaught of e-mail covering lottery winnings, real estate deals, mortgages, stock deals (the new "Nigerian scam" - and watch out for the pleadings from the UK), and other wire fraud scenarios. Hey, if you're dumb enough to fall for those promos, then don't cry when things don't exactly work out the way you expected. Apparently, everyone selling something is totally convinced we have a nation full of morons - after all, almost nobody reads, education is in the pits, so the sheep are easy to lead. Use your middle finger to hit the "delete" button, and drop the phone's receiver back into its holder. USE YOUR COMMON SENSE - FREE LUNCHES REALLY DON'T EXIST - EVERYBODY WANTS SOMETHING FROM YOU!


    "Rely on Thyself"
    Sometimes we just have to keep repeating the obvious. When others do the same, it makes you wonder why people have to be constantly reminded to do what's the best for them. In the current issue of Information Week magazine" [July 10, 2006], in the Community Feedback section, James Earl writes: "Until your organization's ready to implement security and make it real - day in and day out - then enforce its use, it's your fault when you get screwed! Get it? It's you. It's the guy in the next cubicle. It's your boss for not keeping a lid on it. You're the hole in security. Fix it. Get the attention of the uppity bastards. Write some memos. Attach some news clippings. It does happen here. You wanted a career in IT. So now what? The ball's in your court."

    What Earl says about IT applies to all security concerns. As I've written time and time again, security is a 24/7 task. Laziness (that's what negligent security is) is no excuse.

    1-31-06

    One of the problems with advances in security related technology is that too many people put all their faith in those advances, and get lazy about their personal security responsibilities. Which shouldn't be too surprising, since personal laziness about one's life and liberty has been all too common for many decades.

    Both passive and active security provided by businesses, institutions, and are designed for the benefit of those specific organizations which have them in place; security for clients and visitors is a secondary benefit.

    Want to be safe and secure - at least as much as possible? Be aware - practice good personal security. As the old saying goes, "it takes two to tango", and it takes two to have good security.


    Read this story from the Jewish World Review (jewishworldreview.com).
    "Before a retailer even considers using equipment and technology, they (sic) must utilize their people, the work force, as the primary shoplifting deterrent. Each environment must have its own "culture of protection" "
    William E. Fenton, Shoplifting Prevention and Detection Strategies, Protection News, Spring, 2004


    Tenants, protect yourself from Crime
  • Born on: March 10, 1994

    In My Opinion - June, 2010

    In My Opinion expresses an occasional editorial opinion on various security related subjects. Your responses are certainly welcome. Just e-mail your comment and I'll be sure to let everyone know what you think, and you are invited to submit for publication your thoughts on security topics.


    June 3, 2010: In years past, I had to opine about Brinks TV ads. Although the company has changed its name to Broadview Secuirty, their advertising messages haven't improved. In fact, those messages may be worse. Why? Because they give the appearance that all homeowners need is one of their security alarm systems, and their lives will be saved from violent attack, regardless of how easy it is for the bad guy to break in. What unadulterated nonsense. I guess, however, that if they showed a home with good perimeter security, the impact of Broadview's alarm responder system would be greatly lessened. Yeah, like hearing an alarm is going to stop someone from abducting or killing you. In my opinion, Broadview's ads constitute a disservice to their target audience.

    December 16, 2008: You know, I do not find it unbelievable anymore that the world is made up of fools and rogues. As Mark Twain wrote, "Let us be thankful for fools. But for them the rest of us could not succeed."

    So I would have to imagine that those words are the credo of the legions of scam and bunko artists inhabiting the world of Internet.

    If it weren't so damned dangerous, it would be quite funny. After all, IRS definitely sends e-mail to unnamed individuals informing them to write back so as to receive their tax refunds. And people are very soft-hearted, especially during the Christmas season, so why shouldn't it be expected that they will gladly give mucho dollars to somebody's (supposed) widow? And on and on ad infinitum.

    It was bad enough in the '80s when all we had to be concerned about was the Nigeria scam letters being received via our fax machines, but today, it's a torrent of messages geared to depart one and all from their money. I wonder how many business people, feeling very depressed economically, might succumb to one or more of these (sometimes) very appealing and official appearing notices (Ponzi schemes are alive and well!)?

    It's once again exercise time, folks. Time to exercise that finger which pushes the delete button. E-mail offers of these types do not hold the one winning combination. It's tough enough to win down here in Las Vegas, where the games are legitimate. Playing against a crooked wheel is a game only for fools (losers) and rogues (winners).


    November 19, 2008: I've mentioned this rant before, but I have to do so at least one more time. The Brinks ad currently seen on television really bugs me. Rather than inform people how to be secure, all it hows is reactive security; the responder comes up to the house after the attack, armed with a clipboard?!. Nowhere does the ad show preemptive security - strong perimeter security working in conjunction with the alarm company's notification system. No way what Brinks is selling is going to prevent a break-in to the home, particularly if the company is outsourcing responders (information you don't know by watching the ad).

    The advertisement could have a good public service value if it showed reality. In this case it demonstrates fantasy.


    November 12, 2008: The September issue of Security Director News has a story about California proprietary security guards being slow to get licensed. A proposed licensing process, according to the story, would include a training component, which currently doesn't exist for proprietary guards.

    It's hard for me to figure this problem out. Thirty years ago, Pennsylvania enacted a very good training program which covered contract and proprietary security, as well as private investigators. If companies and committees can't figure out what to do, they should take a look at the Pennsylvania Act 235, which covers both armed and unarmed security personnel. Thee isn't any viable excuse not to have a training program.



    October, 2008: The following story appeared in the October 23, 2008 issue of Art Newspaper:

    "Muslim woman questioned for wearing veil in Venetian Museum

    VENICE. When a Muslim woman was stopped by a security guard in a Venetian museum because of her veil at the end of August, it sparked a national debate into dress restrictions that has still not been resolved.

    The controversy began when a woman entered the Ca’Rezz­onico museum wearing a niqab, a veil that leaves only the eyes visible. Having bought a ticket, she was browsing with her family when a gallery guard asked her to accompany him to his manager on the grounds that her veil was not permitted. Although she was ultimately allowed to proceed, she left the museum.

    A storm of media coverage followed, partly fuelled by false reports that the guard had been fired and that Italian state museums were planning special rooms in which women would have to unveil themselves for identification.

    On the grounds of protecting public security and striking a blow for the rights of women, politicians from Italy’s governing Liberty Party—a right-wing coalition—defended the guard’s actions. “It’s a question of security and dignity,” declared Gian­franco Galan, the president of the Veneto region which has a population of 125,000 Muslims. A Veneto region spokes­man compared the state of women who wear the niqab to that of Roman slaves.

    Legally, the issue remains confused. Designed as a counter-terrorist measure, a 1975 law in Italy states that it is forbidden to cover your face in public.

    Gianni Curti, the president of Verona 83, the contractor who employed the Ca’Rezzonico guard and look after security in other Venetian museums, stands by his employee. “He acted according to the law and I would expect others to do likewise faced with the same situation,” he says.

    But his employers at Venice City Council disagree. Venice’s cultural assessor Luana Zanella claims the law is equivocal: “You can cover yourself if you have a justifiable motive. ” She believes that the guard made an error in not speaking to his boss before accosting the woman and called on museum staff to use their common sense. “You should be able to recognise when someone isn’t a delinquent or a terrorist risk.”

    The city museums of Venice welcome about 20,000 Muslim visitors a year. There is no data on how many of them wear face-covering veils."

    It's not only a question of terrorism, but also one of theft. The comment in the story that a security guard should be able to recognize whether or not a person is a "delinquent or terrorist" is one of the more naive remarks I have read in recent days. If the guard had those powers, he could become extremely wealthy picking out those with criminal intent! It is this kind of thinking which makes physical security the difficult task it is, and shouldn't be.


    October, 2007: In a recent issue of the e-mail available "Security Beat" from pbinews.com, A notice appeared that the "Security Industry Association (SIA) has announced the launch of a new training initiative to meet the security industry's need for timely and relevant training".

    In the event you are not familiar with the SIA: "The Security Industry Association (SIA) is a nonprofit international trade association representing electronic and physical security product manufacturers, specifiers, and service providers. SIA promotes growth and professionalism within the security industry by providing education, research, technical standards and representation and defense of its members’ interests. SIA is the sole sponsor of the International Security Conference and Exhibitions (ISC EXPOs)."

    So it's "deja vu all over again". It seems that we in the security industry (a blanket term encompassing all related disciplines), always have to come up with a mission which will raise the level of knowledge and professionalism of our industry, as further stated by the SIA.

    Now, as one who has had over 30 years experience in the security training sector, I imagine I should be somewhat annoyed that associations would have to time and time again develop plans and programs to raise the knowledge and professionalism of the industry. Unfortunately, this is an ongoing problem, the progenitor of which is the attitude "full profit ahead, quality be damned".


    Without knowledge, there's no professionalism, so the mission statement here is an oxymoron. The security industry has one task - the denial and /or detrrance of criminal activity. Nothing more nor nothing less. Once all sectors of the industry, and users of security services, understand that that is their task, then an understanding of the importance and value of the industry, there will not be a continuing need to call for programs reminding security organizations that they have to be knowledgeable and professional - that fact will be a given. Metro, the Las Vegas (NV) police department, has officially installed and begun operating video surveillance in downtown Las Vegas, where a criminal deterrence and surveillance device is much needed. Of course, there's a bit of the usual worries about privacy invasion, but these days, such passive security devices have their place.

    After all, surveillance cameras are found in almost every commercial place in which we do business - from retail stores to casino/hotels. And the criminal element has been growing more sophisticated, as well as more risk-taking - every year.

    Like New York City, Las Vegas is a place where criminals from other parts of the country believe they can "hide-out", a sorely misunderstood belief. Las Vegas is a good town to come to if you want to get caught, and now, with the new surveillance cameras in place, the bad actors looking for action on the streets of downtown Las Vegas, have another reason to forego their activity and leave town.




    However, there's still the issue of privacy invasion. Of course, a public street does not grant privacy, so if you want to pick your nose in public, you may be seen doing that - no problem, as long as the video doesn't end up on "YouTube", because that's where interference with your privacy comes into play (providing you are not a celebrity).

    What does this mean to everyone? It means that you still have to take those steps to protect yourself. If street anti-crime surveillance oversteps its purpose(s), then Mr. and Mrs. Citizen have to take those steps to make sure that such unintended and unauthorized use of the system no longer continues. The ACLU will still have work re: law enforcement abuse, but at least the streets should now have an enhanced barrier against criminal activity.


    Access Control and Security Systems, on May 15, 2003, has an article on the possible problems of a "smoke cloaking" security system. "The International Association of Fire Chiefs, Fairfax, Va., is concerned about a new burglar alarm system that deploys dense smoke to incapacitate an intruder. The systems are sold on the premise of protecting a property by having a blinding smoke screen quickly fill an area when a burglar alarm is activated. In turn, the blinding smoke may likely activate a smoke/fire alarm; this would precipitate a fire department response."

    Now I do not know if now, in 2010, the system is available, but for here is a brief video from a demo I received in June, 2003 from Arias Tech Ltd, on the "SmokeCloak" system, provides and effective demonstration of how the smoke system works: Smoke Cloaking

    Notwithstanding some of the objections shown in the Access Control article, there are probably some good locations for the use of security devices such as this one. If you think your facility may have a need for an active security device of this type, it may behoove you to fully examine those systems.


    February, 2007 - I was pleased to read in today's newspaper that there is a growing resistance to the "real deal" driver's license plan. One of the main concerns, other than the havoc which will be caused at the local motor vehicle department offices, is the important issue of privacy: mainly the ability to sell the data which would be included on the license to spam operators, etc.

    Ok, just how paranoid does this country have to become to be secure? Listen, if we need this new driver's license, which appears to be a national identity card, then where do we stand as a free democratic republic? Freedom means the freedom to take risks, and as a citizen of a free democratic republic, we have the duty to ourselves and our fellow citizens to practice security awareness.

    If there is a need to live in a risk free society, one in which our elected government has to examine everything we do, and who we are, then we are on the edge of living in a totalitarian state, run by a dictator. Then, of course, there's no need to worry about anything, since our lives would be under the total control of those who would claim to know what's best for us.

    As if that would keep us terrorist free! Too many people in this country are willing to give up their constitutional rights in the name of security. We already have a large population living under those conditions. They are called "prisoners" or "inmates". And don't tell me that their lives are safe an secure!.


    Some previous opinions: 1, 2, 3, 4, 5, 6,7, 8 10 1106

    Have a good day!
    Joe Chernicoff




    From the June 7, 2006 blog

    The Battle Ahead

    The United States has been the predominant world power since WWII. That reign is under attack from a number of different quarters, Not that the USA has always been the generally most popular place on earth, but we have always been able to maintain our position as the world leader.

    Now, most probably because of globalization, an effect of the Internet, many countries are stepping forward to become the dominant world power, or, if not the dominant power, a power to chip away at the United States.

    Unfortunately, as far as the public may be concerned, this country is not doing much about maintaining its position. Too much time is spent on meaningless subjects - gay marriage, abortion, and similar kinds of perceived problems. Unfortunately, the most important item on our leadership's agenda is getting re-elected, and that is not always in the best interests of the United States.

    Iraq has been an example of getting involved in a project without planning how to control it. Listening to various media reports, reading newspapers and commentaries, can't help but make a thinking individual understand that we really do not have a plan to maintain world power. This is a perception which is of no use to us. May, 2005 - Your Castle is Your Home, but be Reasonable!

    "From Law.com newswire
    NRA Uses New Florida Gun Law as National Model
    Daily Business Review

    A Florida law has become the NRA's model for legislation in other states, according to the executive director of the NRA's Florida legislative affiliate. The new law, which expands on pre-existing rights to shoot residential intruders, recognizes that everyone has "the right to stand his or her ground and meet force with force, including deadly force" if they believe it's necessary to avoid death or serious injury. Those who kill or wound will have immunity from criminal prosecution and civil liability."


    People Always Find Something to Steal

    March, 2007: Metal thefts are a mushrooming epidemic, costing farmers, irrigation districts and utilities millions of dollars and jeopardizing crop production. It’s a quick crime for fast cash as thieves steal high value metals - copper, aluminum, brass, and bronze -- from irrigation pumps and wells, portable generators at construction sites, utility sub-stations, air conditioners, traffic signals and a universe of others...More...

    This deserves your attention!
    Want to Stop "Smash and Grab" Crimes, and Intrusion Through Windows?
    If you do, follow this link, especially if you're located in Southern Nevada.



    Islam, in its current Wahabi form, is a major thorn in the side of the United States. Islam is able to take advantage of problems in many countries where the people are oppressed by their leadership. And it takes us too long to do something about controlling world-wide situations. Not that we should be the policemen of the world - it just has to work out that way in this age of immediate information.

    The USA also has to make sure that education becomes integral to our citizenry. When we have a growing population of people who do not read, and especially who do not take the time to read newspapers, how will our future leaders be able to understand fact from fiction? Without a background of education which encourages learning, rather than believing American Idol is the most important thing in the world, we are, indeed, on a slippery slope.

    It's time to stop being "fat and happy". It is time to understand what we face in this ever shrinking world in which we live. Otherwise, sometime within the next 25 years, we're all liable to wake up into a country that is no longer ours - and the causative agent will not be only illegal immigration.

    I wonder what Wendell Wilkie would say...?


    May 19, 2004: Read what Darrell Scott, father of Columbine victim Rachel Scott, recently told the House Judiciary Committee's sub-committee


    Restaurant Loss - A Ongoing Security Problem
    ,recommended reading by Paul Leveque, In Sight Commander Systems, Inc, Santa Ana, CA, Posiwatch.com

    Losses due to employee mistakes, misallocation, and outright theft has always been an unspoken topic, mostly due to the difficulty in detection. The last few years have seen a number of tools and methods designed to deter losses from employees in restaurants. These attempts have met with mediocre results for a number of reasons. [more...]


    Good Reading for Enjoyment

    Bill Pronzini's "Nameless Detective" books - great reading. And books by Marcia Muller are well worth the time spent reading. A some recommendations: Bill's "Spook" , "Mourners", and his latest Nameless Detective novel 'Schemers'; as well as Marcia's "Cyanide Wells". Bill is a 2008 Mystery Writers of America Grand Master. Search the web - you'll find more information about both of these excellent writers.

    March 19, 2009: Scientists create protective windows: German scientists say they have created windows and doors that can detect suspicious movements before a crime is committed and, if necessary, sound an alarm. For more on this story, Click Here


    Worth Quoting - from the Journal of Security Administration

    "There are an increasing number of financial institution executives that have become targets of criminals or political extremists. Particularly in high-risk foreign areas, some executives have suddenly found themselves the victims of robberies, kidnappings, and extortions when criminal or political extremists discovered their true identity and ransom value. Even at home, however, it is what a criminal, a mentally deranged person, a political fanatic or a self-styled revolutionary believes the executive is worth - not what he or she is really worth - that determines the vulnerability." -

    [from "A Case Study of Executive Security: A Guide for Planning and Implementing a Private Security Program", Clyde L. Cronkhite, DPA, Western Illinois University, Journal of Security Administration, Volume 26, Number 1. For membership and other information on the JSA, contact the Journal at P.O.Box 164509, Miami FL 33116-4509, or visit or paper abstracts]



    Mission Statement: To provide comprehensive scientific, technological and legal information, which will promote justice based on sound science and technology.


    October, 26, 2010: A slide show covering workplace violence security was produced a while back by IAHS ( International Association of Hospital Security), and it's a very worthwhile presentation to see, if you have not yet had the chance to do so. You can download the movie of this slide show for inclusion into your workplace violence training programs. and you don't have to be in only hospital security to find this presentation valuable. So click on this link


    May 24, 2005: Workplace violence increasing, report says


     For Your Information

    Keep up with some of the latest and archived news received on a weekly basis

    As seen in the May 10, 2005 "Security Beat", a Primedia Property - subscribe to Government Security.

    A majority of senior executives responsible for human resources and security -- 82 percent -- report the number of workplace violence incidents have increased in the last two years.

    A survey of 602 senior executives sponsored by Risk Control Strategies reveals increased outsourcing, down sizing, wage garnishments/salary reductions, perceived insufficient raises/bonuses and overall softening of the economy are contributing to the burgeoning backlash of workplace violence.

    "Economic conditions are often the motivating factor for employees to retaliate against senior management," says Paul Viollis, Ph.D., president of Risk Control Strategies. "As the economic downturn continues, outsourcing increases and wage garnishments skyrocket as a result of the new bankruptcy bill; things are only going to get worse for HR managers and security directors."

    Fifty-eight percent of companies report disgruntled employees have threatened to assault or kill senior managers in person or through e-mail in the last 12 months. Additionally, employees are intentionally downloading computer viruses, sexually harassing co-workers and sabotaging the company through malicious product tampering.

    "Leveling verbal threats is one of the first signs that violence is imminent," says Doug Kane, executive vice president of Risk Control Strategies. Although 80 percent of respondents believe workplace violence is a bigger problem today than it was two years ago, only 15 percent of companies have increased their spending to combat workplace violence, according to the study. More current information will be found browsing your search engine under "disgruntled employees".



    Strengthening Information Loss Prevention

    [The following is excerpted from an article by a long time friend and associate of ours, Norman Bottom, Ph. D., titled "The Human Face of Information Loss", and written for the June 2000 issue of Security Management Magazine, published by ASIS)

    "In a recent survey by the FBI and the Computer Security Institute of San Francisco, 70 percent of information systems professionals reported that their companies had experienced major crimes resulting in direct or indirect losses of hundreds of millions of dollars. This figure may be low, as many companies avoid discussing security breaches. Companies remain in denial about a key window for these crimes: the behavior of their own line employees and executives."

    Dr. Bottom writes that there are several specific areas in which employees can be trained to improve information security. These areas of waste,accident,error,crime, and unethical practices should be the focus of security training. Bottom has coined the acronym WAECUP, and has made it the basis of his training programs. As he states in his article, "Companies must realize that computer crimes and theft of proprietary information cannot be prevented by technological means alone. By providing annual training for all employees, line employees and executives alike, security managers can ensure that the company's employees will not be the weak link in the information security grid."

    Sadly, I heard from Norman's wife, Mari, of his death on Wednesday, August 5, 2009, a result of his year and a half battle with Pick's disease, a form of frontotemporal dementia, similar in respects to Alzheimer's. I first met Norman when I had to be in Central Pennsylvania around the end of 1980 or the beginning of 1981, I had come across information about his work in security, and the formation of the Academy of Security Eductaors and Trainers (ASET), from which the Certified Security Trainer credentials are earned, and, since he, at that time was teaching security administration in the Indiana University (PA) graduate school, I stopped in to meet him and talk with him about security and the new organization.

    I found Norman to be a highly intelligent and knowledgeable guy, and, after hearing from him about the organization a short time after meeting with him, I was happy to become one of the first members of that currently important security education group.

    Although I didn't see Norman and Mari very often, we did get together from time to time, both socially and professionally. Norman was a speaker at parking seminars I developed (the National Symposiums on Parking Security), and I was also an Associate Editor of his Journal of Security Administration.

    Norman was always an important asset to the security industry. His WACEUP theory of loss control became a standard within the industry. Although he was a college professor, he was also an innovator and entreprenaur, a sometimes rare combination. Those were interesting days in the industry, with many innovations in practice, education, and training created, and Norman was, without question, a big part of those times.



    ATM Crimes - An Ongoing Problem and a Way To Beat Them and see link to new article from 4-08-05 below

    Jan Lewis wrote in TRIAL, the magazine of the ATLA: "In the last 20 years, automated teller machines (ATMs) have become an important part of banking. Over 16 million transactions take place each day. Several times a day, however, ATM customers get more than cash—they become the victims of violent crimes such as robbery, assault, and murder. The easy access to cash that makes ATMs successful makes them—and their patrons—easy targets for thieves." Banks have attempted to reduce these criminal incidents, such as placing ATMs in secure locations and using cameras to monitor ATM activity. Unfortunately, too many ATM locations are still stand-alone sites, or attached to banks but exposed to passerbys, thereby creating an opportunity window for the thief. At the same time, car-jackings often include forced ATM withdrawal robberies, and the victims of these crimes can, if attempting to protect their money, can and will become victims of deadly assaults. The ATM machine may be considered a convenience device to a bank's customer, but it is a money making device for the bank. At a user cost of up to $2.50 per transaction, and with the reduction in manpower needs, ATMs are a valuable asset to the banking industry. But like any business, banks have to keep their customer happy, safe, and secure, particularly when it is known that in many cases, the ATM increases victimization risk for the user.

    And this from Joe Zingher, Zi-cubed Safety Pin: A new standard for customer security at Automatic Teller Machines was reached on March 24th, 1998. On that date, the US Patent Office issued patent # 5,731,575, and ATM users were offered the highest possible level of personal security at ATMs. Zi Cubed Inc., is now marketing this breakthrough in security to the banking and ATM industries. Instead of entering your regular PIN during a robbery, the card holder uses the SafetyPIN system. Using the "SafetyPIN System" instructs the computer to notify the police that a robbery is in progress, where the robbery is occurring, and who is being robbed. For a complete explanation, browse our website. Once you see how the SafetyPIN system works, you'll realize why every ATM in the world should have this protection. If you are a bank or ATM company representative, you will be very interested in our Marketing page. If you are in the legal arts, you will want to visit our Legal Implications page.

    Zingher has informed us that Public Act 93-0273 was passed into law on July 22nd 2005. It directs the Illinois Office of Banks and Real Estate to set up the regulations for the adoption of a reverse emergency PIN system.

    Are some states guilty of "talking the talk" but not "walking the walk"? Read this.

    Read these articles: 4-08-05 - Illinois Criminal Justice Information Authority: Can anything be done about robberies at the nation's 400,000 ATMs?; 5-01-05: this story made the Knight Ridder news wire

    Private Investigators from Down Under story found here at bottom of page

    > Still Relevant? -Findings from the 1999 Bureau of Justice Statistics National Survey

    21% of U.S. residents had a contact with police
    52% of contacts were in traffic stops
    19% of contacts were to report a crime
    Under 1% of contacts involved police use of force
    10% of white drivers were stopped
    12% of black drivers were stopped
    9% of Hispanic drivers were stopped
    84% of drivers considered stop legitimate


    Our 'Nothing Could be Plainer' quote: "Since the initiation of the FAA's FAR 107 security mandates of the late 1980s, security has become a public relations magnet. But has it become a priority? Just recently, Congress has passed a law mandating better airport security and it has become a political darling of the Clinton/Gore team. And yet with the millions of dollars spent in improving bomb detection and other security procedures the past decade, a government security audit earlier this year demonstrated there is plenty of room for improvement." (Steve Lasky, ST&D Magazine, September,2000)


    This site is a recipient of the

    award seal
    Click Here for information


    Ability is of little account without opportunity. (Napoleon Bonaparte)
    Beware Identity Theft - from the law firm of PARKER & WAICHMAN

    Learn How To Evaluate Your Projects on a Budget.
    "Guide to Frugal Evaluation for Criminal Justice" (186 pp.)

    (NCJ 187350) de-mystifies evaluation methods; guides local officials who want to conduct their own evaluations; and describes ways to design the evaluation, measure results, collect data, and interpret findings that produce useful recommendations at a relatively low cost. The document also offers advice on forming different types of evaluation partnerships. The appendix contains additional resources, including an annotated bibliography, comments on other evaluation guides, and brief descriptions of Web-based resources for evaluation. A glossary of key terms and concepts follows the appendix. Access full text at Security Forum


    CRIME AND PUNISHMENT

    Policewoman Matilda McCutcheon
    Is adept in the use of a truncheon,
    And she wields it with will
    Adroitness and skill
    If her husband is late for his luncheon.

    But though with a truncheon forbidding
    Matilda is very forgiving,
    For everything's hers
    Money, jewels and furs,
    For her husband robs banks for a living.

    John Pickersgill
    A Scam's Deadly Result (2-21-03)
    A notorious e-mail scam has resulted in the murder of a Nigerian diplomat in the Czech Republic.

    Fifty-year-old Michael Lekara Wayid, Nigeria's consul in the Czech Republic, was shot dead by an unidentified 72-year-old Czech at the Nigerian Embassy in Prague on Wednesday. For the rest of the story, see Wired News; if this doesn't work, contact this site via e-mail and request a text copy of the story.

    For the record, the "Nigerian Scam" has been written about in these pages, and is a never ending attempt - in all its forms - to rip-off those whose greed far exceeds their common sense. The scam has been around for about two decades, and arrests were made in New York City quite a few years ago of Nigerians involved in this crime, but, as Barnum said, "there's a sucker born every minute".



    A thought on Mandating Homeland Security 2002
    "The bottom line , for me at least, is that homeland defense should maintain a focused mandate for providing interopearable communications solutions for the public safety sector, expanding data sharing capabilities of law enforcement and counter-intelligence agencies, and most important, protecting the freedom of Americans by ignoring the cries for Orwellian sanctions and dangerous privacy intrusions" - Steve Lasky, Security Technology and Design, 12/02

    May 18, 2010: The International Spy Museum, developed byThe Malrite Company - an interesting site to vist.
  • At the turn of the century, multicultural communities are a growing phenomenon globally and in Police and Society cover many cities throughout the United States. The world has witnessed increasing transnational migration of large groups of people due to a variety of factors worldwide. This movement has resulted in changes in the ethnic and cultural makeup of communities that are the destinations and sources of the migration... for more on this paper, which should be of some interest to security practitioners, visit Journal of Police & Society, An Interdisciplinary Israeli Journal of Law Enforcement & Criminology

  • Corporate Spies, Snooping, by Hook or by Crook, an informative article Sarah D. Scalet fromCSOonline.com


    In the United States, private security officers have outnumbered police officers for many years, and, except in a few instances, their pay has nowhere approached that of the public police. This fact has again been brought up in the February 2002 issue of Wired magazine, in an article headlined "In LA, security guards provide more protection than police officers - and make less". According to the article, private security guards outnumber police officers about 3-1. The story goes on to point out that LA has five times as many security guards as Las Vegas, four times that of Dallas, and twice as many as Atlanta. "The appeal of these private forces is simple", states the article, "They protect whoever pays them. And they're cheaper to keep around - they get about half what LA cops make on the average".

    The annual mean salary for security guards (1997) was $17,460, and Private Detectives and Investigators, $32,520, while parking enforcement officers were at $31,430 and police patrol officers and special police agents were at $52,910.


    FYI:
  • The National Center for Missing & Exploited Children
    Internet Search for Missing Children
  • The Axis of Evil (humor)
  • New Personal Armored Cars


  • Working With the Expert in Security Related Matters
    A Chernicoff Group article

    Finding the right expert is like finding the right lawyer - you need someone you believe will work conscientiously on your behalf, and therefore will help adjust the odds in your favor. This holds true for whatever kind of case in which an expert is brought on board, but in work like security liability and negligence, the truism is even more important.

    A number of security expert-scholars have written that security is an art, not a science. But it is an art based upon an amalgam of theory, philosophy, practice, electicism, science, education, and intuition, at the minimum.

    Understanding Security
    Security is the protection of assets. Whether it is keeping your home sidewalks free of ice or preventing theft of company secrets, the ultimate goal of security is keeping your assets out of someone else's pocket. Therefore, security is a business management function. But it is a management task using skills, techniques, and procedures borrowed from a large number of disciplines. The security process uses police science, business management concepts, human resource skills, various psychology precepts, and a wide variety of "selected-as-needed" resources.

    The Security Expert's Role
    The security expert is an important part of the litigation team. The security expert is a consultant, a teacher, a researcher. Liebniz, the father of differential calculus, said "There are two kinds of Truth, those of reasoning and those of fact. The Truths of reasoning are necessary and their opposite is impossible; the Truths of fact are contingent, and their opposite is possible." The security expert's task is to render an opinion based upon reasoning. The attorney-client is therefore expected to provide all data possible as requested by his expert (and the same is expected of the expert), so that the well-reasoned opinion, based upon fact, presents "truths - the opposite of which is impossible".


    Lawyers Video Redux

    Every once in a while, I come across a scenario which prompts me to replay this funny British video, so enjoy...


    Another "Dumb Criminal" Entry

    May - 2006: Night Photography

    Michael Kelly, Crime Scene Technician, Miramar Police Department, has an article on Night Photography in the March-April issue of "Evidence Technology Magazaine" which should be of interest to both public and private incident scene investigators. With thanks to Kristi Mayo, the magazines Editor, you can read what Kelly has to say here, or, if you have a problem opening the .pdf file, read this text file"




    The Subtleties of Security
    For many years I have compared analyzing security related incidents to photography - just as there are 256 shades of gray, there is a multiplicity of tones and shading in every incident. That is why no two cases, which on the surface appear same, are identical. There are fairly general attitudes towards the practice of security found in most industries, and, because most of those attitudes are generally below "acceptable standards", there is enough work for everybody. The problem is, without a clean-slate examination of each incident, without detailed attention to the apparent security problem at hand, the expert may turn out to be not too "expert". In most cases, it is the task of the expert to find the well known hook. I t is the rare individual who knows everything (does he or she really exist?), and the security expert may often have to go outside of security to find the key which not only unlocks the door to essential information, but which also locks up the client's case.

    The Lawyer-Expert Working Relationship
    The security expert is a member of the litigation team. Ideally, the security expert should be on board prior to filing suit, or when working with the defense, soon after the complaint is received. The security expert as litigation consultant can be of enormous help, based upon experience, in evaluating complaints, interrogatories, preparing for depositions, and all the pertinent discovery processes. The working relationship between the security expert/litigation consultant and attorney is an enjoyable professional relationship, one from which each party gains in knowledge and experience. Remember that the security litigation consultant and you, the attorney, have a business relationship. Make sure that all commitments are kept and bills are paid when due, a sure way to keep your consultant happy.
    >Sorry - we no longer have back copies of the Journal of Security Administration. To review back copy articles, visit the JSA Papers

    Visit our Cowboy Western Art gallery and Rodeo Photo pages for great paintings and photos for your office and home.


    I get a number of requests for good restaurant in downtown Las Vegas and off the Strip. When you come into Las Vegas, you have to have a meal at the Triple George Grill, located at 210 N. 3rd Street in Downtown LV. From personal experience, I can tell you that the food, service, and interest in the restaurant's guests is superlative...real "old time Las Vegas" 



    Maxine Says...


    I am a: Glock Model 22 in 40 cal
    Firearms Training
    What kind of handgun are YOU?
    It will look this on your website/profile:

    Here's how you go after local terrorists - more...


    Outsource Your Security Training!
    When you outsource your security training, you receive a number of benefits. Click here for the facts!

    Security Training Video DVD

  • To help better understand the security task, a short DVD training movie on Basic Security is available for security directors, and any person with security responsibility. Excerpts from a parking security seminar are also available on DVD. For information on receiving either DVD, Click Here

  • Forensic Videography and Photography Click here for an article on the topic

    When you plan on visiting Las Vegas, check first with
    hotelscheap.org



    Official PayPal Seal


    © 2005,2009 - Joseph L. Chernicoff/The Chernicoff Group