Posts

Why Local Businesses Should Build Strong Relationships with Law Enforcement

Why Local Businesses Should Build Strong Relationships with Law Enforcement

Frank Costa, President Nexgen Protection Services – 

Building strong relationships with law enforcement has always been crucial to a successful loss prevention program. Historically, the relationship between retail stores and local law enforcement has been a part of both community safety and retail performance, reinforcing the critical elements of security and well-being.

Trust and respect are essential, along with a general understanding of how we can work together to keep our communities safe and our businesses successful.

SOURCE: 

Brittain, J. Fostering Next-Level Partnerships That Make a Difference, Loss Prevention Magazine, 11/20/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

License Plate Recognition (LPR): Secure, Intelligence Led Approach Retail Protection

License Plate Recognition (LPR): Secure, Intelligence Led Approach Retail Protection

Frank Costa, President Nexgen Protection Services – 

Retailers are increasingly focused on establishing additional layers of control – so it makes sense why License Plate Recognition (LPR) is becoming a common talking point when it comes to LP strategies.

The scope of loss prevention has expanded to human safety first and foremost. This shift is matching the rise of Organized Retail Crime and violence in stores.

LPR systems use high-resolution cameras and other systems to capture and convert images of license plates into alphanumeric text, which can then be cross-referenced. Retailers worldwide have adopted LPR (sometimes known as ANPR) increasingly as an important component of their security strategies.

 

SOURCE: 

Elevating Retail Security Integrating License Plate Recognition and

Audio Detection into Your Safety Strategy, Loss Prevention Magazine, 12/10/2023.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Cargo theft involves the manipulation of data and identities to gain access to freight under false pretenses.

Cargo theft involves the manipulation of data and identities to gain access to freight under false pretenses.

Frank Costa, President Nexgen Protection Services – 

Organized retail crime (ORC) has been the buzzword in the retail loss prevention world for well over the past decade. During that time, the lack of support from the criminal justice system has certainly negated most of those efforts.

Criminals will establish fake trucking and brokerage companies with the sole intention of stealing cargo. They go through the same process as legitimate carrier information, registration, obtaining insurance, and operating authority. These companies then start completing legitimate jobs to establish a history of work performed. Once established, the thieves target high-value loads within their customer network to steal.

Insist on placing disposable GPS trackers inside your high-value loads. These cost-effective devices eliminate reverse logistics and device management while providing complete visibility of your freight, in real-time, from anywhere around the world. If and when a theft were to occur, you could follow the load in real-time from your phone to assist law enforcement in finding its exact location.

As of now, there is no silver bullet that will stop these thefts from occurring. But understanding the problem, training your staff, and installing protective measures will certainly act as a shield to help fend off these criminals.

SOURCE: 

Tabor, J. Strategic Cargo Theft: What It Is, How It Started, and What You Can Do to Stop It, Loss Prevention Magazine, 10/01/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Rising Workplace Violence Necessitates The Need For Implementing A Structured, Approach To Incident Response.

Rising Workplace Violence Necessitates The Need For Implementing A Structured, Approach To Incident Response.

Frank Costa, President Nexgen Protection Services – 

Every year, thousands of American workers report being victims of workplace violence, with assaults resulting in 57,610 injuries in 2021-22 alone, according to the National Safety Council. 

These alarming statistics underscore the urgent need for managers and safety professionals to implement a structured, approach to incident response. By adopting this proactive strategy, businesses can not only respond effectively to violent incidents but also mitigate future risks, ensuring a safer environment for all employees.

Most Common Challenges in Proper Incident Response

  • Information overload can occur in the chaos following an incident, making it difficult for staff to capture all relevant details accurately. As a result, important information may be missed or recorded inconsistently.
  • Communication breakdowns often arise when attempting to quickly alert nearby locations about potential threats, especially in the absence of a standardized communication system.
  • Connecting the dots between incidents can be challenging without a centralized system that allows for data comparison across different locations and time periods, making it difficult to determine if an incident is isolated or part of a larger trend.
  • Resource allocation becomes guesswork when there are no data-driven insights to guide decisions about where to deploy additional measures, particularly in high-risk areas or during specific time periods.
  • Learning from incidents is hampered when there isn’t a systematic way to analyze past events, leading to missed opportunities for implementing lessons that could prevent future incidents.
  • Balancing speed and thoroughness is a common challenge, as the urgency to respond quickly to violent incidents often conflicts with the need for thorough data collection and analysis.

 

These challenges require a thoughtful, systematic approach to incident response. By addressing these issues head-on, businesses can significantly improve their ability to respond to and prevent violent incidents, creating safer environments for employees and customers alike.

SOURCE: 

Workplace Violence Reporting: Proper Responses to Violent Incidents, Loss Prevention Magazine, 09/26/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

TSA Final Rule Enables Continued Acceptance of Driver Licenses at Airport Security Checkpoints

TSA Final Rule Enables Continued Acceptance of Driver’s Licenses at Airport Security Checkpoints & Federal Buildings

Frank Costa, President Nexgen Protection Services – 

Consistent with the Transportation Security Administration’s (TSA) efforts to enhance the passenger experience, TSA published a final rule in the Federal Register that would allow passengers to continue using mobile driver’s licenses (mDL) for identity verification at TSA airport security checkpoints once REAL ID enforcement begins on May 7, 2025.

The final rule, effective November 25, 2024, allows states to apply to TSA for a temporary waiver of certain REAL ID requirements written in the REAL ID regulations. Once approved, those state mDLs will continue to be accepted at TSA airport security checkpoints. TSA will publish on its website a list of states where mDLs are approved for federal acceptance. After emerging industry standards and federal guidelines are finalized, TSA intends to issue a future rule making to set more comprehensive requirements for mDLs that will eventually replace the waiver provisions established by this rule.

 

For more information on REAL ID, please visit TSA.gov/real-id. For more information about TSA’s use of digital identification, please visit TSA.gov/digital-id.

 

SOURCE: 

Anderson, L. TSA final rule enables continued acceptance of mobile driver’s licenses at airport security checkpoints, federal buildings, Security InfoWatch, 10/25/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

The Glendale Police Department Uses Tech to Expedite its 9-1-1 Response

The Glendale Police Department Uses Tech to Expedite its 9-1-1 Response

Frank Costa, President Nexgen Protection Services – 

The Glendale Arizona Police Department was alerted to a shooting by following a 9-1-1 call’s real-time transcript.  The real-time crime center (RTCC) analysts immediately pulled up the security camera at the intersection and saw the homicide suspect fleeing in the victim’s vehicle. The officer was able to react before a computer-aided dispatch (CAD) incident was entered and apprehended the suspect after a pursuit.

Motorola Solutions’ CommandCentral Aware unifies voice, video, and data feeds from public safety, private enterprise, and community-facing systems, leveraging AI to verify incident data and speed up response. Built to the highest security standards, the command center solution surfaces, on a single pane of glass in the RTCC, 9-1-1 call details, the location of resources in the field, data from license plate readers and footage from fixed video, mobile, and body cameras.

 

SOURCE: 

Arizona police department utilizes Motorola 9-1-1 intelligence to halt active shooter, Security Infowatch, 10/17/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

 

Factors to Consider When Implementing a Physical Security System.

Factors to Consider When Implementing a Physical Security System.

Frank Costa, President Nexgen Protection Services – 

While technology like cameras, alarms, and access control systems are crucial components, they are only as effective as the people who use and manage them and the systems that deploy them. When installing physical security systems, the focus should be on the holistic operation of the system rather than the functioning of individual components. 

Tight collaboration between security and IT stakeholders delivers significant value to both security and business operations, but it’s important to clearly define and communicate goals and expectations from the start. 

 

SOURCE: 

Anderson, L. What Is The Most Overlooked Factor When Installing Physical Security?, Security Infomed, 09/10/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

An Effective Physical Security Plan Starts with Deterrence, Detection, Delay, & Response.

An Effective Physical Security Plan Starts with Deterrence, Detection, Delay, & Response.

Frank Costa, President Nexgen Protection Services – 

Deterrence, Detection, Delay, & Response.

Physical security technology helps to control access, monitor behavior, and respond to potential threats, thus enhancing overall security posture. It involves securing organizational assets from harm due to physical events, including natural disasters like fires and floods, and human-inflicted dangers like theft and vandalism.

Elements of an effective physical security plan–

  1. Deterrence: Deterrence can encompass various equipment such as signage, security cameras and door access systems. It also includes physical barriers such as doors, locks and walls.  
  2. Detection: Technologies used for physical security detection measures are sensors, alarms and automatic notifications via video management software. 
  3. Delay: Simple security measures such as additional doors, locks and security guards can help delay incidents. More advanced physical security technology, such as key card access and mobile credentials, can make it more difficult for unauthorized users trying to enter a building.  
  4. Response: A response strategy such as building lockdowns or automatically notifying emergency services is critical. 

Successful and effective plans should include these technologies to ensure that a facility can prevent physical threats and take necessary action if a security breach occurs.

 

SOURCE: 

Berg, D. Playing a Crucial Role, Security Today, 09/1672024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

Body Cameras Deliver Enhanced Security and Accountability

Body Cameras Deliver Enhanced Security and Accountability

Frank Costa, President Nexgen Protection Services – 

Retailers seek effective solutions to the growing issues of theft and violence, the adoption of body cameras has emerged as a promising way to enhance security and accountability. This technology offers not just a way to record events as they unfold but it also serves as a preventive measure by visibly demonstrating that customer behavior is being monitored.

Body cameras can be strategically implemented to address these challenges, providing both immediate and long-term benefits to retailers. The operational, technological, and strategic advantages of integrating body cameras must be carefully considered. It’s important to ensure that all stakeholders are equipped with the knowledge to make informed decisions.

SOURCE: 

Wolfe, C. WHITEPAPER: Top 10 Points for Retailers to Consider Before Purchasing Body Cameras. Loss Prevention Magazine, 06/21/2024.
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats

loss protection strategies

Loss Prevention Strategies for Effective Collaboration

Frank Costa, President Nexgen Protection Services – 

 

The most effective loss protection strategies are those that engage every level and department within an organization.

The essence of this collaborative approach is to move beyond the traditional confines of asset protection. It’s about breaking down the silos and fostering a culture where asset protection is seen as a shared responsibility.

To be effective, asset protection leaders must ensure they are seen as valuable partners rather than roadblocks. This involves actively seeking ways to support other departments’ goals and finding solutions that benefit the entire organization. When others see you as a collaborator rather than an obstacle, they are more likely to include you in critical meetings, ideation sessions, and decision-making processes.

 

SOURCE: 

Shugan, D. Collaborative Approaches to Asset Protection: Engaging All Stakeholders. Loss Prevention Magazine, 08/01/2024
#protectionservices #securitystandards #publicsaftey  #mobilesecurity #securitythreats