Listening & Recording Devices: Are You Being Bugged?

Listening & Recording Devices: Are You Being Bugged?

Copyright Samaritan Protective Services, Woodbridge, Virginia

Have you had a private conversation with a confidant only to have details emerge later?  Discussed a new technology or product your firm is developing, then learn a competitor is releasing a very similar or identical item?  Does nothing seem to stay within the confines of four walls and your activities are always known?  As surprising as it may sound, you may be bugged!

History Of Bugs:

Despite being considered a high-tech form of espionage (which they can be), technical surveillance has been occurring for some time.  One of the earliest known listening devices to receive a patent in the U.S. was the Dictograph.  This device placed a microphone in one location and a remote listening post equipped with a phonograph for recording.  The Dictograph dates to 1906.

Adversarial nations have been conducting technical surveillance for decades.  It was a staple intelligence collection tactic during the Cold War and continues to remain a viable option today.  Corporate espionage is a very real and dangerous problem for many sectors, especially Critical Infrastructure.  The loss of proprietary information, trade secrets, research and development can lead to significant security and economic damage.

Means of Deployment:

There are three main categories of illicit device deployment:

  • Plug & Play: Quickly and easily plug into a power source after positioning and leave. Designed to transmit information over a specific frequency, such as to a cell phone.
  • Leave & Retrieve: Contains onboard limited power supply, such as with a digital recorder and is designed to be left in a designated area to be surveilled, then retrieved at a later date for data collection.
  • Hardwired: The most complex and difficult to detect, as these devices are typically embedded within appliances, have sustained power supply, require planning and expertise to deploy. Typically placed in areas that frequent conversations such as conference and break rooms.  Are often disguised as fire alarms, radios, TV’s, clocks and many other common office or home devices.

Types of Devices:

Through the years, listening and recording devices have been improved significantly, both in their covert nature and ability to capture detailed audio and video.  They are also easily obtainable, overall inexpensive and easily deployed with minimal skill and training.  Additionally, some usually innocent devices may be used to conduct illicit surveillance activities.  While by no means an exhaustive list, here are a few types of listening, monitoring and recording devices.

  • Two-Way Radios & Baby Monitors: Easily obtainable, cheap and simple to deploy. With a constant power supply, these can transmit indefinitely or until discovered.
  • Digital Recording Device: Very affordable and newer models can record for days and have voice activation, increasing battery life. Must be physically retrieved for exploitation.
  • Remotely Activated Cell Phones: This requires specialized software (apps), physical access to the phone and additional technical skills, however it is completely possible to turn someone’s phone into a remote listening device. Activation of cameras, interception of live phone calls and video messaging is possible with today’s technology.
  • Laser Microphones: These are extremely powerful and prohibitively expensive listening devices that bounce a specialized laser off glass (such as in an office building), detect the vibrations from conversations and send back to the operator for conversion into audio and further exploitation. Extremely rare in the private sector.
  • Covert Audio/Video Cameras: These devices are small, wi-fi capable, inexpensive and easily obtainable from spy shops, eBay and Amazon. They are often designed to be hidden inside other objects such as stuffed animals, tissue boxes, cell phone chargers or other electronic devices.  These can also be hidden on people, such as lapel pins, buttons, writing pens and even shoes.

What is TSCM?

Technical Surveillance Countermeasures (TSCM) is the systematic and comprehensive detection, identification and potential neutralization of illicit recording, listening or monitoring devices.  Proper TSCM is conducted by trained and industry certified technicians with some of the most advanced detection equipment available.  These TSCM specialists have years of operational experience, hands-on technical training and subject matter expertise in the field.

Buyer Beware:

There are countless online spy shops and specialty stores that offer low priced, cheaply made and mostly ineffective “bug detection” gear.  These devices often have flashing lights, gimmicky names and detect very limited frequency bandwidths only inches away.  Do not trust your privacy to toys.  Detection of illicit devices requires numerous specialized (and expensive) pieces of equipment that detect certain types of devices, radio frequency bands, infrared and even microwave transmissions.   From non-linear junction detectors to spectrum analyzers or near field detection receivers and other specialized equipment, the correct devices must be used to comprehensively detect, identify and neutralize covert technical surveillance devices.

Samaritan Protective Services has the trained personnel, operational experience and assets to meet the unique needs of clients nationally and globally.  If you or your organization is in need of a quality and comprehensive technical surveillance countermeasures program, contact us today.  Samaritan’s team of professional risk managers will discuss our portfolio of risk management solutions and how a strategic partnership with us can provide value and peace of mind.

International Travel Security: Considerations for a Safe Journey

Copyright Samaritan Protective Services, Woodbridge, Virginia

International Travel Security: Considerations for a Safe Journey

International travel can be an enjoyable and productive part of life for personal and professional reasons.  For the most part, everyone has to travel at some point to support business, organizational priorities or maybe just a family vacation.  Whether a veteran business traveler or new passport holder eager to see the world, there are some active steps to help reduce risk.  We will discuss some key security and wellbeing considerations while also sharing resources to help ensure a safe and effective trip.

  • Situational Awareness & Blending In: Situational awareness is a learned skill that everyone should develop. Simply being aware of your surroundings and identifying if you may be followed or surveilled can give valuable time to seek assistance or safety.  If something doesn’t feel right, it probably isn’t.  Listen to your gut instinct, as it could save your life.  Additionally, you might be a tourist, but you shouldn’t look like one.  Take note and do research on the area you are visiting, how the public dresses and local customs.  In most situations it is quite easy to spot someone that is not a local.  Opportunistic criminals may specifically target tourists or foreign business travelers due to the perceived ease of access and vulnerability.  Make yourself a “hard target”.
  • Document Control: Never surrender your passport or other important documents to anyone that cannot be verified. If your passport is lost or stolen, contact your country’s nearest embassy or consulate for emergency assistance.
  • Political Considerations:
  1. Corruption & Social Concerns: Many countries have a serious problem with corruption that can affect the safety, security and freedom of movement for foreigners. Additionally, there may be socially acceptable activities in one country that are severely restricted, banned or could put an individual in legal peril in another. For example, there are some countries in which LGBTQ activities could result in prison or worse. Contact your embassy or consulate for additional information.
  2. Government Stability: Some countries are suffering from internal strife, potentially threatening their very existence. The fall of a government would pose many challenges and potential security risks to a traveler. There could be rioting, destruction of infrastructure, a military takeover or loss of basic public services. As an example, just this month the President of Sri Lanka resigned and fled the country due to failed domestic and economic policies, leaving a power vacuum. It is advised to research and assess the nation’s government stability before travel.
  3. Civil Unrest: Along with the previously mentioned government stability, other social and economic consideration could lead to demonstrations and/or civil unrest. France, for example, is well known to have frequent labor strikes and demonstrations that lead to property damage, transportation shutdowns and even violence. Find out what the geopolitical landscape and local issues of the country are, along with planning mitigation strategies prior to your trip.
  4. Intelligence Gathering & Cyber-Security: There are many countries that are not as open and trusting with foreigners. Additionally, some nations actively conduct surveillance, intelligence gathering and signals interception against Western guests. If your travels take you to “unwelcome” territory, you can be all but certain that your accommodations are bugged for listening and/or video recording and more than likely being surveilled. In countries such as North Korea, Russia and Iran, surveillance and control of incoming and outgoing communications is prevalent.

Crime Statistics

  1. Types of Crimes and Targeted Demographics: Crime statistics and types change dramatically with location. For example, Mexico City has a higher rate of petty crimes and theft than Copenhagen. It’s imperative to analyze and be familiar with who is conducting crimes, those typically targeted and assess whether you could fall within the risk spectrum.
  2. Area Specific Crimes: There are areas within countries and even individual cities that have varying levels and types of crime. Some areas might have increased drug related crimes, others may have kidnapping risks to foreigners. Crime is also frequently different between urban and rural areas. It’s important to have an understanding of the risks associated with the specific areas to be traveled.

Terrorism Risks: Unfortunately, there are very few places in the world that have little to no risk of terrorist activity. Often, terrorist attacks are initiated in heavily populated areas such as shopping centers, sports arenas or places of worship. Also, a specific demographic may be targeted. Ensure you have as much information about the overall risk as possible. There are numerous publicly available resources to gain valuable information; some are at the bottom of this article.

Food & Water Safety: Food security and water safety standards are not universal. Some countries, particularly developing nations, have very few food safety regulations and policies. Know where your food is coming from and who prepared it. If in doubt about the safety of the water source, stick with sealed bottled or canned water/drinks. Dry or packaged foods are typically safer due to factory sealing. Avoid raw or undercooked foods that may contain pathogens. If prepared food is considered, ensure it is served hot, as high heat kills the majority of germs that cause illness.

Road Safety & Public Transportation: If you will be driving, be cognizant that road surfaces may not be up to the standard you are accustomed in your home country. As an example, Switzerland has some of the best road surfaces and lowest traffic accidents in the world. In comparison, Madagascar is known to have few paved and safe roads to travel on. If using public transportation, be knowledgeable about the safety record of the subway systems, buses and taxi services. Some older systems in less developed countries do not meet the stricter safety requirements that most are used to in the West.

Availability & Access to Healthcare: Falling ill or suffering from an injury in another country can be frightening and potentially life threatening. Does the host country have adequate and available healthcare? Does your insurance provide coverage for services outside of your home country and are there provisions for emergency evacuation? This is an important consideration that most people forget.

Key Points of Contact: It is very important to have names, numbers and addresses of key contacts within the area of travel. Save contact information for consulates and embassies. Also, know how to reach emergency services. In the United States, the number is 911 but, in the UK, it is 999. Ensure that someone (friends, family or business associates) know where you are and have a way to contact you. In times of emergency, seconds count and knowing how to contact help is critical.

Emergency Evacuation: A key component of any security and risk management plan is to have a way out. Are plans and assets in place to hasten your departure due to an emergency, civil unrest or illness? Do you have an open-ended transportation ticket? Who will you contact to assist evacuate you, your colleagues or loved ones?

Online Resources:

  1. Overseas Security Advisory Council (OSAC) – Provides detailed information on the security, geopolitical and crime statistics on countries around the world.
  2. U.S. Department of State – Issues travel alerts based on updated and relevant information on crime, terrorism, health concerns and more.
  3. CIA World Factbook – A wealth of general information on the history, political nature, geography and people of a country.
  4. UK Foreign Office – The same principle as the U.S. Department of State advisories for travel. Another great source of country specific information and security concerns.

Samaritan Protective Services has the trained personnel, operational experience and assets to meet the unique needs of clients nationally and globally.  If you or your organization is in need of a quality and comprehensive travel security program, contact us today.  Samaritan’s team of professional risk managers will discuss our portfolio of risk management solutions and how a strategic partnership with us can provide value and peace of mind.

Continuity Planning: Ensure Resilience Before, During and After a Disaster

Copyright Samaritan Protective Services, Woodbridge, Virginia

The Only Thing Certain is Uncertainty

Businesses and organizations of all types and sectors face unique challenges to their operations on a daily basis, however some incidents can pose more significant risk than others. We live in an unpredictable world that poses hazards in many ways. From natural disasters to terrorist attacks or cyber threats, the risk landscape is ever evolving and requires consistent mitigation strategies. Some private sector businesses play a vital role in the protection, operation and maintenance of Critical Infrastructure (CI) systems. Some of these can include energy, healthcare, transportation and communications, requiring comprehensive strategies and planning to ensure continued operations after a disaster.

Organizations must update plans, train personnel and test their Continuity of Operations (COOP) planning on a regular basis. The planning process should include key leaders and stakeholders to determine the organization’s unique needs and challenges during a contingency. A Business Continuity Plan (BCP) must be tailored to each organization, their functions and essential operations; not approached with a cookie-cutter mentality.

Disaster and Recovery Response

What is Business / Organization Continuity Planning

In short, a BCP is a multifaceted set of detailed plans, processes and actions that facilitate mission essential tasks and operations continue, allowing the organization to recover from a significant negative impact event. The plan consists of numerous parts, including a detailed Risk Assessment, Business Process Analysis, Impact Analysis and prioritization of essential functions.

Determine Mission Essential Tasks & Operations

Determining essential tasks (and who is responsible for their execution) for the organization to continue operations is one of the most important and tedious parts of the BCP. This is a very unique and specialized process to each organization. What is vital for a telecommunications organization to continue operations will be different from a healthcare facility.

Some things to consider:

  • Location: If the primary location of operations is compromised, is there a secondary location identified, equipped and staffed to support critical operations? Can these functions be accomplished remotely or require on-site personnel and specialized equipment?
  • Communication: Does your organization require constant and reliable communication with staff, customers or government agencies? What happens when the power goes out? Has alternative power generation been considered? If power is off-line, does this affect your physical security systems?
  • Specialized Equipment: Does your business require the use of special or not easily replaceable equipment or devices? If this device went off-line for a period of time, how would that effect operations? Are there operational redundancies or backups?
  • People: People are the most important resource to any organization. Have key players been identified and understand their role in a contingency, to include any required delegation of authority? Are plans in place to provide life support, economic aid or support to families after a disaster? If a key player is incapacitated or unwilling/unable to support COOP operations, are others identified with the required training and understanding to perform the duties of the primary? Has a dedicated Crisis Action Team been established?
  • Record Keeping: Most businesses are required to keep certain things on record for a period of time. This might be financial records, personnel files, client information or numerous other types of data that is crucial for the organization to operate. If access to this record was curtailed or the data was destroyed, how would this effect your organization? Are there backup servers, cloud-based resources or hard copies available?
  • Partner Organizations: Some organizations require the assistance of outside entities or suppliers to effectively run operations day to day. What are the potential impacts if a key supplier is unable to deliver critical supplies or services? What are the impacts if this is reversed and your organization is unable to deliver? Are there additional vendors or partners available in emergency situations? Are agreements in place between partner organizations that specifically address contingencies?

Develop, Test and Update the Plan

A well designed BCP goes through a cycle and is continuously updated to reflect changes within the company, operating environment, personnel and new and emerging threats.

One of the most important aspects of a well-established risk management plan is testing and exercising.  A plan is only as good as its weakest part.  Key leaders should regularly test what works, what doesn’t and identify vulnerabilities or parts of the BCP that may be difficult or impossible to implement.  Also, both key personnel and general staff should be informed and trained on their roles, responsibilities and expectations in a COOP scenario.

Does your organization need assistance creating, updating or exercising your BCP? Samaritan provides organizations of all sizes comprehensive continuity consulting.  Our staff has years of contingency planning experience in the private sector and the federal government, to include Continuity of Government (COG) planning.

Executive Protection: A Critical Component of a Comprehensive Security Package

Executive Protection: A Critical Component of a Comprehensive Security Package

Copyright Samaritan Protective Services, Woodbridge, Virginia

What is Executive Protection?

Executive Protection (EP) is defined as a unique and specialized security program with the primary function of providing for the protection of individuals from tangible and intangible threats or risk factors.  Depending on location and market, EP goes by many names; Bodyguard, Close Protection Operative, Personal Protection Specialist and a host of others.

Typical Executive Protection end users may include some of the following:

  • Corporate Executives
  • Celebrities
  • Diplomats
  • Political Candidates
  • Religious Figures
  • Media Personalities
  • Threatened or At-Risk Persons (Domestic Violence Survivors, Workplace Violence, etc.)

Services are often provided on an as needed basis, such as for special events or when there is an elevated risk due to internal or external factors.  Some Principals require around the clock protection.  Each situation is unique and requires an in-depth analysis in order to provide the needed services.

Who are the “Protectors”?

Capable EP Agents come from a diverse spectrum of backgrounds, providing specialized insight into risk management and the protection of people, property, information and reputations. Most (but not all) are former military, law enforcement or come from the intelligence field. Executive Protection should not be an “entry level” profession and takes years of training, operational experience and maturity to provide the highest level of client service.

Each state mandates specific training and licensing requirements for security personnel, including Executive Protection. Additionally, more advanced training in specialized areas is required.

Some of these may include:

  • Successful Completion of Advanced Executive Protection Training
  • Emergency Medical Technician / Basic Life Support
  • Protective Driving
  • Solo Practitioner Operations
  • Threat & Vulnerability Assessments
  • Advanced Weapons Handling
  • Open-Source Intelligence (OSINT)
  • Concierge & Customer Service
  • Behavioral Analysis
  • De-escalation Techniques
  • Surveillance & Surveillance Detection
  • Estate & Residential Security Practices
  • Domestic & International Travel
  • Physical Security & Access Control

The media and Hollywood often portray a stereotypical Bodyguard in a dark suit, sunglasses with an earpiece and is more brawn than brains.  This could not be farther from the truth.  Successful and experienced practitioners utilize intelligence, analysis and threat detection to navigate the risk landscape for clients.  The primary function should always be to detect, monitor, mitigate and avoid risks as opposed to responding to them.  While risk can never be truly eliminated, with proper planning and coordination it can be significantly reduced.

An Effective Team Integration

To ensure efficiency, productivity, safety and client satisfaction, Executive Protection personnel should be integrated within the team.  This can and should include Corporate Security Managers, Human Resources, Facility Managers, Personal Assistants and even Home Office Staff (Butlers, Nanny’s, Estate Managers, etc.).

EP practitioners should be viewed as trusted partners dedicated to the success of the organization, individual or family they serve.  They have a specialized but enormous responsibility to the Principal.

Is Your EP Program Effective?

Some organizations have in-house security and protective services.  Some have none and others outsource due to a number of reasons.  Many factors play a part; financial, perceived need or lack thereof, company culture and desires of the protectee.  Does your EP team have the required training, licensing and experience? Are they effective members of an overall risk management strategy? Have you considered the risks in not having an established program in place?

Samaritan Protective Services has the trained personnel, operational experience and assets to meet the unique needs of clients nationally and globally.  If you or your organization is in need of a quality and comprehensive EP program, or you are not pleased with your current one, contact us today.  Samaritan’s team of professional risk managers will discuss our portfolio of risk management solutions and how a strategic partnership with us can provide value and peace of mind.

Contact Samaritan Protective Services today for a free consultation.

Samaritan Protective Services is located at 3985 Prince William Parkway, Suite 203, Woodbridge, VA 22192. Founded in 2015, we specialize in Executive Protection, Corporate Security, Workplace Violence ProtectionBodyguard, Armed Security, Close Protection, Security ConsultingSecurity for places of worship, Dignitary Protection, Celebrity ProtectionEvent Security, Private Investigations, TSCM, Armored Car, Surveillance, Counter surveillance, Secure Transportation, VIP Protection Services, Intelligence and Risk Advisory, Emergency Response and more.

Workplace Violence: Training, Prevention & Response

Workplace Violence: Training, Prevention & Response

Copyright Samaritan Protective Services, Woodbridge, Virginia

The threat of violence in the workplace continues to increase.  It is a very real hazard that does not discriminate between people, type of work environment or location.  Security Managers and Human Resources personnel must have a detailed plan of action in order to prevent violence in the workplace.

2021 has proven to be challenging for corporate risk managers.  This year alone, there have been numerous attacks in diverse workplaces.  Here are a few examples:

  • May 26th, 2021 – A mass shooting took place in San Jose, California at the Santa Clara Valley Transportation Authority. The gunman killed 9 people and later committed suicide.  The subject had been employed since 2012.
  • Aug 3rd, 2021 – Gunman entered a dentist office in Tennessee shortly before 6am and opened fire, striking a manager and two Security Officers. Subject was a former employee and subsequently killed by responding law enforcement.
  • August 27th, 2021 – A Department of Public Works employee in Mt. Vernon, New York fatally stabbed a coworker after a dispute.
  • September 23rd, 2021 – Active shooter killed one person and wounded 12 people in a Kroger grocery store prior to taking his own life.  The shooter was identified as a former employee, terminated the previous Thursday

What is Workplace Violence?

 The Occupational Safety and Health Administration (OSHA) defines Workplace Violence as: “any act or threat of physical violence, harassment, intimidation, or other threatening disruptive behavior that occurs at the work site. It ranges from threats and verbal abuse to physical assaults and even homicide”.

Recognize the Stressors & Signs Leading to Workplace Violence

There are many stressors that can lead someone toward a path of violence.  According to the FBI Behavioral Analysis Unit, more than one stressor on an individual has typically manifested prior to an act of violence.

Stressors may include:

  • Diagnosed and undiagnosed mental health problems
  • Financial difficulties
  • Job performance or issues
  • Relationship conflicts with friends, parents or coworkers
  • Spousal problems
  • Drug and/or alcohol abuse
  • Criminal or Civil concerns
  • Loss of a close friend or family member
  • Sexual Frustration

Typically, there are pronounced and visible warning signs that someone could be planning or thinking about committing violence.  Supervisors, corporate security managers and co-workers should be keenly aware of “red-flags”.

Signs may include:

  • Making direct threats toward people or an organization
  • Displaying an unusually angry or argumentative demeanor and easily agitated
  • Shares an interest in previous attacks or acts of violence
  • Minimizes the value of human life
  • Makes vindictive or vengeful statements, such as “He will get what he deserves”
  • Displays symptoms of chronic depression; lethargic, not engaged, loss of interest in previously enjoyed activities, loss of confidence, etc.
  • Makes suicidal comments
  • Has a known drug or alcohol addiction
  • Fascination or obsession over weapons and dangerous items
  • Is nervous, paranoid and always seems “on edge”

None of these items alone mean that a person is actively planning an attack or is dangerous.  That being said, multiple warning signs can be an indicator that the individual may be unstable and intervention could be required to ensure the safety of all, including the person concerned.

Planning & Preparation

Most might believe that acts of violence in the workplace are random, hastily thought out and executed planning.  This can sometimes be true; however, data shows that most assailants conduct extensive planning.  The FBI published surprising statistics regarding assailant planning and preparation:

Planning: The act of making the decision to carry out an attack, justifying the motive, selecting targets and conducting research.

 Preparing: The act of gaining materials (firearms, explosives, knives, etc.), dry runs, testing security vulnerabilities and finalizing personal affairs.

Planning Time Preparation Time
26% 1-2 Months 28% Less Than 24 Hours
18% 3-5 Months 26% 1 – 7 Days
15% 8-30 Days 22% 8 – 30 Days
12% Less Than 24 Hours 11% 1-2 Months
12% 1-7 Days 9% 3-5 Months
9% 6-12 Months 4% 6-12 Months
8% 13-24 Months

*Percentages rounded

Prevention of Workplace Violence

Preventing acts of violence in the workplace does not happen by accident.  Prevention and response require a deliberate, calculated and comprehensive plan to be effective.

  • Have a Plan – Corporate SOP should have a comprehensive plan in place to address the identification of threats, intervention and prevention of workplace violence. Does the business continuity or facility security plans have protocols in place for what to do during an active attack situation?  Has a workplace vulnerability assessment been completed?
  • Employee Training – According to a 2019 SHRM study, 19% of HR personnel do not know what to do or how to handle potential workplace violence and 55% of workers are unsure or unaware of their employers’ workplace violence prevention strategy. It is important to have regular, relevant and tailored training programs in place for the workforce and corporate leadership.
  • Human Resources & Security Cooperation – Human Resources and Security personnel should play an active role in the prevention of workplace violence. From the hiring process to identification of red flags and intervention, a constant line of communication should be in place.  Many companies offer programs to reduce stress, access to mental health professionals and an open-door policy to air and resolve grievances.  The strategies used should be tailored to the company, workforce and potential vulnerabilities.  It takes teamwork at all levels to reduce risk across the board.
  • Response – It is imperative to have a detailed plan of how to respond to an active attack. Close coordination with local law enforcement, employee response training (run, hide, fight) and third-party risk managers are valuable tools to reduce risk and respond appropriately.

Halloween Safety Tips

Halloween Safety Tips

As families begin to prepare for a Halloween of fun and sweets, it is important to remember valuable safety and security considerations.  Statistics show an average 50% increase in violent crime, burglaries, theft and vandalism on Halloween.  Also, alcohol and drug related crimes tend to surge during the holiday.

Here are Samaritan’s top tips and tricks for ensuring a safe, secure and fun Halloween:

Child Safety

  • Visibility is severely limited after sunset. Ensure children wear bright or reflective clothing or additions to their costumes.  It is also a good practice to carry a flashlight, glowstick or other illuminating device that will be visible to motorized traffic.
  • Check all items received. Avoid anything that appears to be homemade and without a protective factory packaging (brownies, fruit, cakes, etc.).  When in doubt of where an item came from, throw it out.
  • Use the “Buddy System”. Children should trick-or-treat in groups, pairs or under the supervision of a parent or guardian.  Stick to lit and known sidewalks and avoid unlit areas such as alleys.
  • If your child has a cell phone, consider installing a family GPS tracking app. This will allow parents and guardians to have near real time view of where their children are in the neighborhood.  There are numerous free, low cost and easy to use apps such as Life360, FamiGuard, Find My Kids and more.
  • Teach children to be mindful of their surroundings and the activities of others. They should be reminded to keep an eye out for anyone following them, erratic drivers and to not enter into a stranger’s home or vehicle.  If they feel unsafe or uncomfortable with a situation, seek help immediately.

Home Safety

  • Home SafetyAn illuminated home implies that it is occupied. Turning interior and exterior lights on is a powerful deterrent to vandals, pranksters and those wishing to use the cover of darkness for nefarious reasons.  If you have a lighted sidewalk or security lights, this can also aid in preventing trick-or-treaters from trips and falls.  If you will not be home on Halloween night, consider installing a timer device on some lights to automatically turn on at a predetermined time.
  • Ensure exterior doors and windows are locked, including garage entrances. Most criminals will attempt the path of least resistance in order to achieve their goals.  Do not make it easy for them by leaving a door or window unsecured.
  • If your home has a garage, consider parking your vehicle inside for the evening. This reduces your vehicle’s chances of being targeted for vandalism or accidentally damaged.  Don’t forget to lock your vehicle too.
  • Ensure your home alarm system is working properly and family members know how to use it, including the panic setting. Systems with CCTV cameras should be checked to verify the cameras are active and recording as designed.  Do not forget to rearm your security system at the end of the night.
  • Be on the lookout for suspicious activities that are out of place. If it doesn’t feel right, it probably isn’t.  Maintain awareness of loiters and unfamiliar vehicles and persons in your neighborhood.  Report any suspicious personnel or activities to your local law enforcement agency.

Contact Samaritan Protective Services today for a free consultation.  We provide security solutions for you!

Residential Security: More Than Just Preparing For Unwelcome Guests

Residential Security: More Than Just Preparing For Unwelcome Guests

As professional risk management consultants, we are often tasked with estate security for clients. This can range from providing a risk assessment and recommendations to providing comprehensive solutions for the property and those residing there. This can be both a daunting and thankless job for those new to residential/estate security. It is quite different from the mobile assignments we all love, but just as important to the protection of a Principal and their family.

When conducting assessments, some Executive Protection personnel immediately focus in on preventing outside threats such as intruders, stalkers, paparazzi and the like. While this is important (it might be the compelling reason we were retained), it is not the limit of our concerns. We must take a holistic approach to security and “all-hazards management”. Our charge as protection specialists is, well, to protect….from anything that could affect the wellbeing of our client.

In addition to physical security, passive measures such as CCTV or remote monitoring, consider the following vulnerabilities when assessing a residential environment:

Fire Prevention – A home fire is a very dangerous and costly incident that can be mitigated to an extent, with the proper planning and resources. Does the home have active and serviceable fire detectors? Are the fire detectors merely to alert residents of fire/smoke or are they tied in with the security system that is monitored for response? Given the large size of some estates, some have opted to install automated water sprinkler systems. Depending on the materials the structure was built with and size, this might be an added value. Are other adequate fire suppression devices, like extinguishers in the home? Vulnerable areas such as garages, kitchens, workshops and basements should have quick access to a fire extinguisher.

Also take into consideration things in the home that can be a fire hazard. Are there fireplaces that need cleaning or maintained? Are there tapestries, drapes or other flammable items that pose a hazard?

Carbon Monoxide – Carbon monoxide is a scentless and tasteless gas that prevents oxygen from being retained in red blood cells, causing tissue and brain damage as well as leading to death if not properly treated. Broken items in the home such as a furnace can leak carbon monoxide and lead to tragedies. Some fire detectors come equipped with carbon monoxide detectors as well. This is something to think about while addressing fire mitigation solutions.

Estate Maintenance – While not typically at the forefront of a protection specialists mind, the overall maintenance of the property and structures on it are of concern to us. Has a recent storm caused damage to the roof, security gates or backup generators? Is the home older, requiring renovation or eradication of a mold problem. Does the property have sufficient lighting during hours of darkness? Don’t be afraid to ask these questions to the Estate Manager or other responsible party. Large residences require significant upkeep and maintenance. Just like with any home, small issues can grow into larger ones as time progresses.

Vehicles – We are typically tasked with driving a Principal, possibly in their vehicle. Have we determined that maintenance is up to par? Are there potential recalls that could affect the safety of the vehicle(s) in question?

Locks – More in line with typical physical security concerns, locks (door, gate, garage, etc) pose a significant challenge to ensuring the security of the residence. Do all locks and keys work correctly? Do any lock mechanisms jam or have they been damaged by weather or other means?

An estate requires different people and staff to run effectively. When personnel resign or are terminated from their positions (security personnel included), are locks and gate combinations changed? Any combination should be changed at regular intervals to enhance security. While inconvenient at times, it can be a powerful means of keeping the good guys in and the bad guys out.