Posts

Terrorist-Organizations

The Trump Administration Designates Several Cartels as Terrorist Organizations

Frank Costa, President of NEXGEN Protection Services on Terrorist Organizations:

The Trump administration designated eight Latin American cartels as terrorist organizations on Thursday, a designation typically reserved for groups with political goals achieved through violence.

The U.S. Department of State filed the notice of the designation in The Federal Register on February 20. The action targets the following cartels:

  • Cartel del Golfo (CDG), also known as the Gulf Cartel and the Osiel Cárdenas-Guillén Organization
  • Cartel del Noreste (CDN), also known as the Northeast Cartel and Los Zetas
  • Cartel de Jalisco Nueva Generación (CJNG), also known as the Jalisco New Generation Cartel
  • Cartel de Sinaloa, also known as the Sinaloa Cartel, the Mexican Federation, and the Guadalajara Cartel
  • Carteles Unidos, also known as United Cartels, Tepalcatepec Cartel, Cartel de Tepalcatepec, the Grandfather Cartel, Cartel del Abuelo, and Cartel de Los Reyes
  • La Nueva Familia Michoacana (LNFM)
  • Mara Salvatrucha (MS-13)
  • Tren de Aragua (Aragua Train)

The eight cartels’ members are described as “foreign persons who have committed or attempted to commit, pose a significant risk of committing, or have participated in training to commit acts of terrorism that threaten the security of U.S. nationals or the national security, foreign policy, or economy of the United States,” according to the State Department filing.

Source:
Gates, M. (February 20, 2025). United States Designates 8 Cartels as Terrorist Organizations. Security Management Magazine.



security threats

Security Threats: Keeping Convenience Stores Safe

Frank Costa, President of NEXGEN Protection Services on Security Threats:

Store owners and operators often face security threats. A difficult balancing act between maintaining profits and implementing security measures—especially when the costs of security are presented alongside traditional profit generators like marketing or product stocking.

Convenience stores come in many forms, from the mom-and-pop bodega in New York City to the sleek Speedway on the side of a cross-country highway. Despite their differences, all of these stores serve millions of U.S. customers looking for a quick drink, snack, or pack of cigarettes.

Given the transient nature of the convenience store industry, it’s a business where you never know who will walk through your door at any given time. While the convenience of these stores appeals to patrons, it also attracts criminals. Thieves frequently target these locations in hopes of stealing cash and merchandise. Organized criminal groups tend to focus on items that can be resold on the black or gray market, such as cigarettes, alcohol, lottery tickets, or other popular products.

Some owners might assume that enhancing store security requires the latest (and possibly most expensive) surveillance system or locks. However, it’s essential to first assess the overall environment and understand the specific threats a store faces.

Larger companies with multiple locations, whether regionally or nationwide, often have security departments that can conduct risk assessments. Relying on these resources can help identify local crime trends and determine what factors might impact a particular store.

Source:
Mosqueda, S. (February 10, 2025). Keeping Convenience Stores Safe from Physical Threats. Security Management Magazine.


Fraud-Schemes-Continue-to-Rise

Fraud Schemes Continue to Rise

Frank Costa, President of NEXGEN Protections Services on Fraud Schemes:

Fraud remains a persistent problem that organizations continue to struggle with, including the U.S. Federal Trade Commission (FTC), one of the federal agencies tasked with addressing fraud schemes.

Below are some of the top fraud scams that affected individuals and organizations in 2024 and are likely to continue being a problem in 2025.

  1. Investment Scams
    This scam tactic has been around for ages. Fraudsters often present themselves with seemingly lucrative business opportunities that promise regular returns—if you invest immediately.
  2. Business Email Compromise (BEC)
    BEC schemes have been around since email was first introduced and typically occur in one of two ways, according to Schlereth.
    Fraudsters either spoof a legitimate email address or domain name, often adding an extra letter so the sender appears authentic at a quick glance. Alternatively, they may use social engineering to obtain an employee’s credentials and then log into the victim’s work email. CFOs and CEOs are particularly lucrative targets.
  3. Check Fraud
    What’s old is new again. Check fraud surged last year, especially after individuals posted videos on social media showing themselves writing bad checks, depositing them at ATMs, withdrawing cash before the check bounced, and sharing their behavior.
    “Fraudulently altered checks can cause significant losses to financial institutions and disrupt bank operations,” the report states. “Due to the nationwide surge in check fraud targeting U.S. mail, the Financial Crimes Enforcement Network (FinCEN) issued an alert urging financial institutions to be vigilant in identifying and reporting such activity.”
  4. Impersonation Fraud
    In this scam, criminals claim victims are suspects in financial crimes and threaten arrest or violence unless they pay the criminals. Additionally, fraudsters are impersonating customer service and tech support providers, often targeting individuals over 60 by phone. They claim that the victim’s computer has been compromised and needs immediate repair.

Source:
Gates, M. (February 1, 2025). Trend Alert: 4 Fraud Schemes to Watch in 2025. Security Management Magazine.

 

Security Protection

Executive Security Protection: Risks, Extremist Influencers, Shifting Tactics

Frank Costa, President of NEXGEN Protection Services on Security Protection:

Concerns about executive safety remain high. Not only was UnitedHealthcare CEO Brian Thompson tragically killed in December 2024, but there have also been multiple other incidents involving threats against business executives. Additionally, social media influencers and other sources have incited calls for similar attacks.

High-level executives without an executive security protection (EP) team are increasingly vulnerable to becoming targets.

The heightened emotional climate surrounding politics and public figures has made executive protection more challenging—and more essential. Politically motivated threats were notably higher in 2024. More than 50 members of Congress were victims of swatting attacks, and 700 members had faced threats the previous month. (Many threats were not publicly reported, so they are not included in TorchStone’s official threat count.)

Tactics are also evolving. Threat incidents are now categorized as verbal or written threats, harassment, stalking, physical attacks, and other crimes, which may include financially motivated offenses such as robberies, home invasions, and property crimes.

Source:
Gates, M. (February 5, 2025). EP Trends: Residential Risks, Extremist Influencers, Shifting Tactics. Security Management Magazine.



Incident Report

Well-Written Incident Reports: An Essential Element of Effective Public-Private Partnerships

Frank Costa, President NEXGEN Protection Services —

Receiving well-written, complete, and timely incident reports from private security partners is a critical aspect of any case. While verbal witness statements can be helpful, they do not provide the level of detail that investigators need to understand the full scope of a case.

In recent years, there has been growing emphasis on the importance of effective partnerships between private security and public law enforcement. As the demands on law enforcement increase alongside recruiting challenges and shrinking budgets, private security will inevitably take on more responsibilities traditionally handled by public agencies.

With law enforcement struggling to meet the rising demand for their services and facing a shortage of new officers, the burden of safety and security falls increasingly on private security personnel. This shift means that private security must excel in all aspects of their role. One core requirement is proficiency in writing comprehensive and factual Case Incident Reports (CIRs).

Furthermore, the ability of private security officers to write clear and effective reports becomes especially crucial when facing legal challenges. In the eyes of the court, if an event isn’t documented, it essentially didn’t happen.

 

Source:
Conley, T. (January 20, 2025). Well-Written Incident Reports Are an Essential Element of Effective Public-Private Partnerships. Security Management Magazine.

Lighting Standards

Lighting Standards for Parking Facilities

Frank Costa, President of NEXGEN Protection Services:

While there have been several advancements in technology that can improve a facility’s physical security, simple and cost-efficient lighting upgrades can make a significant impact. Effective lighting in parking facilities can deter trespassers, reveal tripping hazards, and make properties feel safer.

For any owner or operator of a parking area, it’s important to understand the relevant lighting requirements. Although building codes can vary across jurisdictions and regions, at least two organizations have provided standards that all parking facilities can meet to help increase safety and security for users and staff as a baseline.

Parking structures. These areas are difficult to light since there are few vertical elements to reflect light or provide contrast to moving objects. In some municipalities, building codes require a bright white horizontal stripe on walls, at waist height, to improve contrast. The lack of ceiling clearance restricts the height of luminaires and requires the fixtures to spread the light horizontally. This is excellent for lighting vertical surfaces; however, if video cameras are used, the luminaire design should be selected to reduce glare at the camera lens. A horizontal illuminance level of 5 footcandles with a uniformity ratio of 4:1 provides an adequate level of security.

Open parking.  The height of luminaires is less restricted in open than in covered parking unless local codes and light trespass become factors. The higher light sources tend to provide horizontal illumination. Energy conservative, high-pressure sodium lighting has high efficiency, high lumens per watt, and is cost-effective for open parking. Recommended light levels range from a minimum of 0.2 footcandles in low-activity general parking and pedestrian areas to 2 footcandles in high-activity vehicle areas. Cash collection and vehicular access control areas should be maintained at a minimum of 5 footcandles.

 

Source:
Mosqueda, S. (January 13, 2025). Lighting Standards for Parking Facilities. Security Management Magazine.



Security Protection: Conflict, Confusion & Chaos

Security Protection: Conflict, Confusion & Chaos

Frank Costa, President, Nexgen Protection Services

By 2025, emerging “rogue actors” will operate with increasing impunity as countries fragment—geographically, ethnically, and ideologically. Established political parties, both left and right, are in systemic decline, steadily losing primary vote shares to insurgent candidates and parties across the political spectrum.

For security professionals, the message is clear: the landscape is becoming more complex. However, with the right tools and strategies, it’s still possible to manage risks and seize opportunities. Technology will play a crucial role in identifying incidents, delivering personalized risk information, and supporting the fieldwork, local knowledge, and analysis provided by risk professionals.

The most resilient organizations in this fragmenting world will combine advanced technology with “human-in-the-loop” strategies, enabling better decision-making in an increasingly unpredictable environment.

Source:
(2025, Jan 06). An Era of Conflict: Navigating a ‘Fragmenting World’ in 2025. Security & Business Resilience.

Hashtags: #protectionservices #securitystandards #publicsafety #mobilesecurity #securitythreats


Active Shooter Situations: Handling Conflicts & De-Escalation Tactics

Active Shooter Situations: Handling Conflicts & De-Escalation Tactics

Active Shooter Situation

A violent altercation at an AutoZone auto parts store on Broadway in Newburgh, Orange County, left one man dead from a gunshot wound and another injured from stab wounds.

Frank Costa, NEXGEN Protection Services

NEXGEN Protection offers 24/7 security for your business with armed guards trained to protect and de-escalate conflicts. Our team of professional, armed guards is rigorously trained and experienced in handling complex security challenges, ensuring safety, peace of mind, and compliance with regulations.

Two men were injured—one sustained stab wounds, while the other was shot. Officers immediately rendered medical aid to both individuals. The man with stab wounds was treated for non-life-threatening injuries, while the man with the gunshot wound was pronounced dead at the scene.

The Rise of Physical Security De-escalation Tactics

The Rise of Physical Security De-escalation Tactics

Frank Costa, President, Nexgen Protection Services

In recent years, one of the most pressing issues at the center of national conversations has been the use of excessive and unnecessary police force. This topic will continue to be a focal point, and one major shift in the security industry will be the increased emphasis on de-escalation tactics and training for safety officers, with a focus on making this a first resort.

De-escalation training equips security personnel with the tools they need to resolve emergencies without the use of force. It empowers officers to slow down, assess situations more effectively, and communicate clearly with both the individual involved and their team. Just as importantly, it helps mitigate the risk of liability and reduce the potential for injuries to security personnel.

While having a physical security or human guarding team on-site is crucial and can prevent further escalation, hybrid security strategies that incorporate technology are becoming increasingly important. The remote work revolution is well underway, and many companies have adopted a hybrid office model, allowing employees to spend time both on- and off-site.

SOURCE: 

Weingot, D. Guard trends to watch in 2022. Security InforWatch, 02/14/2022.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Supply Chain Attacks: Exploiting Third-Party Vulnerabilities

Supply Chain Attacks: Exploiting Third-Party Vulnerabilities

Frank Costa, President, Nexgen Protection Services

The cybersecurity landscape continues to evolve at an unprecedented pace. With the rise of sophisticated attack methods, the integration of new technologies, and increasing connectivity across sectors, businesses are facing more complex cybersecurity threats than ever before. Staying informed and prepared is critical to protecting data, maintaining trust, and ensuring business continuity.

Supply Chain Attacks

As businesses increasingly rely on external vendors and partners, supply chain attacks have become a significant cybersecurity concern. In these attacks, threat actors infiltrate a company’s system by compromising a third-party provider, gaining access to multiple organizations through a single vulnerability.

How to Prepare:

  • Vendor Risk Assessments: Conduct thorough security assessments for all vendors and partners to identify potential vulnerabilities.
  • Contractual Security Requirements: Include cybersecurity clauses in vendor contracts to ensure security standards are upheld.
  • Network Segmentation: Isolate critical systems from external partners to prevent attackers from moving freely within your network.
  • Continuous Monitoring: Use real-time monitoring to track vendor activity and detect any unusual behavior early.

 

SOURCE: 

Top Cybersecurity Threats to Watch in 2025: How Businesses Can Prepare, Boston Institute of Analytics, 11/14/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats