Red-Flags-of-Potential-Violence

8 Warning Behaviors of Potential Violent Attackers

Frank Costa, President Nexgen Protection Services – 

Mass attackers rarely hide all warning signs of potential violence or conflict ahead of a confrontation. Instead, many present red flags or proximal warning behaviors that together form patterns of risk. 

8-Warning-Behaviors-of-Violent-Attckers

8-Warning-Behaviors-of-Violent-Attckers

The Terrorist Radicalization Assessment Protocol (TRAP-18) identifies eight unique proximal warning behaviors.

  1. Pathway Warning Behavior
  2. Fixation Warning Behavior
  3. Identification Warning Behavior
  4. Novel Aggression Warning Behavior
  5. Energy Burst Warning Behavior
  6. Leakage Warning Behavior
  7. Last Resort Warning Behavior
  8. Directly Communicated Threat Warning Behavior

 

SOURCE: 

Meyer, C., What Are the 18 Behavioral Red Flags of Potential Violence?, Security Management, 11/13/2023.

#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats



Retailers-Must-Adopt-Proactive-Security-Measures-to-Combat-Crime

Retailers Must Adopt Proactive Security Measures to Combat Crime

Frank Costa, President Nexgen Protection Services – 

Beyond the financial implications of theft on retailers’ margins and profitability, the escalating levels of violence and the perception of threats of violence connected to theft are also a significant source of concern for retailers. 

Given the surge in violent incidents, an increasing number of retailers are prioritizing the safety of their staff by adopting a “hands-off” approach when dealing with shoplifters.

A secure perimeter is the first line of defense against external theft, including theft linked to Organized Retail Crime (ORC). ORC groups use tactics like theft and fraud to steal merchandise in large quantities. These groups can be difficult to identify and catch, making it challenging for retailers to prevent these crimes.

It is imperative that retailers adopt proactive security measures in order to combat the ever-evolving threat of retail crime. By integrating new technologies into current security strategies, retailers can not only address security challenges proactively but also fortify their ability to protect assets, fostering a secure environment for the collective safety of customers and employees. This strategic integration marks a significant step toward a more robust and secure future for the retail sector. 

 

SOURCE: 

“Elevating Retail Security: Integrating License Plate Recognition and Audio Detection into Your Safety Strategy”, Loss Prevention Magazine, 12/10/2023.

#protectionservices #securitystandards #publicsaftey  #mobilesecurity #secruitythreats

 

Security-for-Educational-Institutions-Necessitates-A-Multilayered-Multifactor-Approach

Security for Educational Institutions Necessitates A Multilayered – Multifactor Approach

Frank Costa, President Nexgen Protection Services – 

Security in educational institutions goes beyond traditional measures, encompassing a multilayered, multifactor approach that combines technology, personnel training, and emergency preparedness.

According to the Partner Alliance for Safer Schools (PASS), an independent group dedicated to improving school safety, there are five layers of protection to consider: districtwide, property perimeter, parking lot perimeter, building perimeter, and classroom or interior perimeter.

Policies should be applied identically across all public buildings within the school district. Strong written policies can ensure that people know what to do in an emergency and can support security professionals in their efforts to drive compliance with essential safeguards and accountability. 

To be effective, policies centered on preparedness and prevention, as well as response and recovery, need to be woven into the fabric of the school community.

Layers-of-Protection

Layers-of-Protection

 

SOURCE: 

Grace, G., “Strengthening Schools: A Look at K-12 Security Layers and Emergency Preparedness”, Security Management, 03/01/2024.

#protectionservices #securitystandards #publicsaftey  #mobilesecurity #secruitythreats