We had a very good year in 2019 thanks to a superior management team and great new and old clients and employees. We celebrated over a casual holiday lunch.
Seated Christy Beaver Office Mgr, Dan Aloe President/Owner, Mark Drear Vice President
Standing Dylan Chappell Assist Ops Mgr, Mike Virgin Director of Operations
Here's a refresher on fire extinguisher use and fire prevention. https://www.youtube.com/watch?v=5dMAGhCsGkQ
The criminality of an individual is by itself not sufficient for a crime to occur. Though in many cases, a criminal will be so determined to commit a crime that it will be impossible to deter, the circumstances of the situation and environment need to have certain characteristics for a crime to be possible.
Situational Crime Prevention works on four principles: that if the effort needed by the criminal to commit the crime is increased, that if the risks to the criminal during perpetration are increased, if the potential rewards for the crime are reduced, and if the excuses to plead ignorance of the act being illegal are removed, then the likelihood of the crime being committed drops significantly.
In many environments it is impossible to remove the assets on site that make tempting targets for an intrusion. That leaves the best path to stopping one to be making it clear to the potential intruder that his goals in theft or vandalism will be extremely difficult to achieve, and impossible to do so without being identified. With hardening measures such as physical barriers and access control systems, and highly visible surveillance by cameras, or most effectively by live personnel that can react to an situation immediately, almost any area will be passed on for a more vulnerable and less intimidating target.
Essential to the success of a protection operation is a clear understanding of what actually threatens a property. A retail store, off-shift factory, and a high security facility will all have vastly different, but equally valid security needs. They have different assets that need protection, and different means of intrusion would be used to get to them. Implementing a security plan designed for a different type of property can be highly ineffective.
To ensure that the security plan is both reliable and flexible, and also practical enough to be effective, the property itself should be visited and explored during the plan’s creation. Consultation can be done with officers who have protected that or similar sites, and previous break-ins or incidents at similar environments reviewed. The plan should be a living document that both the security provider and client requesting the service are open to the possibility of modifying if the operational situation changes.
When there is a full comprehension of the environment and risks that it faces, a complete operation can be realized. Putting together deterrent factors, depth defenses with delay barriers, and reaction protocols help to make a property as secure as possible.
As the science of crime deterrence updates every day, so too do the crime prevention techniques applied to building design and project layout improve. While many of the new design concepts are impossible to apply to an already constructed location, some principles can be implemented anywhere that will both stop crime before it happens and improve the quality of life there.
Most important is that a location must appear to be safe, secure, and maintained to any party that is looking to intrude. Fences and property are a simple way to show that the owner cares about his property’s integrity and are a surprisingly effective deterrent. A site that is well cared for gives an impression of being secure, broken windows and downtrodden areas can give a sense of neglect and vulnerability to a potential intruder.
Good lighting is essential. Pathways and hallways are especially vulnerable due to their frequency of use. Making sure that these areas can be well observed from outside areas significantly reduces any form of risk.
Effective use of signage will keep occupants of a location safe by giving them and understanding of their responsibility in the mutual effort of security, as well as making sure that they understand the characteristics of the environment. A more extensive application of this principle can be applied with an information kiosk, concierge, or well-trained security officer.
Avoid establishing areas where surveillance is impossible. Any place that is isolated from outside observation is the most likely area for an incident to occur. Solutions to consider are adding windows if possible, cameras, or regular patrols inside, depending on the nature of the specific location.
Labor Day is the opportunity for employers and employees to be rewarded for their efforts and hard work. We hope that you enjoy a safe and secure Labor Day weekend with family and friends.
We celebrate the founding of our country, Capital Asset Protection would like to pass along our wishes that you have a safe and enjoyable holiday.
A barrier is an obstacle that defines the limits to an area and prevents penetration by persons, animals, or vehicles. It can be either natural or artificial, and both types can be incorporated into a security operation.
A basic security concept is to surround your target with multiple barriers, a concept known as defense in depth. This allows for a mixture of deterrent and delay barriers. Perimeter barriers should properly warn an intruder to keep out, either with explicit wording or intuitive design, and thus defeat an intrusion without actually being tested. The explicit display of present security and property demarcation eliminates any chance of accidental intrusion.
Barriers that are meant to function after the perimeter is breached operate differently under the assumption that any intruder past that point has willingly and purposefully ignored deterrent measures. At this point, the purpose switched to delaying the intruder. Any physical barrier can be surpassed with enough effort and time, therefore the design logic should not be to prevent the possibility of the barrier being breached, but to make it require so much effort that it is not worth it, or so much time that the intrusion cannot be completed.
In some security operations, once the protection plan is put into place, the status and quality of the operation is not checked until an incident occurs that establishes poor performance by the post’s defenses or the officer’s manning it. Regular evaluations by direct supervision and higher management ensures both that the integrity of [the defense] is maintained, and that the highest quality of officers is recognized, rewarded, and retained.
Assessments should be made both by local management, as well as by independent supervisors with no direct ties to the post to avoid complacency. Features checked should include at the very least the physical state of the post, the condition of any delay barriers and deterrence warnings, as well as the physical appearance of the officer and a check of their response to management’s arrival and their understanding of the post’s orders.
All observations should be documented for filing and evaluation. Being made available to all levels of management and the owners of the property, these reports allow an easy determination as to whether enhanced security measures need to be implemented, or additional training of officers performed.
Identity management is a part of the process of access control. In almost every post that a security officer is stationed, there will be some individuals that are supposed to have access to the property. The means of identifying if an individual is authorized is one of the more important parts of the security operation.
There are several ways to verify that an individual is supposed to have access to a particular area. Badges and ID cards are effective solutions, especially if they are hard to counterfeit. Uniforms with features specific to a department are another common feature that makes it very easy to quickly determine where the wearer should be. When the number of people allowed to enter a property is small, the security officer can be presented with a list to cross check against, or they can be informed in advance when to expect a visit to enable them to turn away all other arrivals.
If the physical access control is implemented with strict enough defenses paired with an identity checking procedure that is proven to be effective, personnel stationed inside can presume that anyone that has made it inside is authorized and can focus on other functions.
Exploring What Creates A Protected World