Send an Email

Fundamentals for a Successful Security Program

The Security Executive Council has identified 13 fundamental considerations for a successful corporate security program. It can be used to structure a new program and/or assess an existing one. It may also provide some assurance to management that your program is in step with other successful security organizations.

These proven practices will set any security program on a strong footing, helping to ensure that it is organizationally aligned, professionally operated, appropriately resourced, and defensible.

Further information can be found here https://www.securityexecutivecouncil.com/download/1407

Surveillance Law | Enhanced View

Essentially, surveillance enhanced view allows one to view a scene with more clarity and detail by increasing or improving in value, quality, desirability, or attractiveness.

Currently, there are no existing laws regarding enhanced view, but rather guidelines outlined in rulings determined on a case-by-case basis.

During any given surveillance, there can be three forms of enhanced view. They include:

  1. Assuming an aided, unnatural, or contorted position
  2. Illuminating an otherwise darkened area
  3. Magnifying what is visible to the “naked” eye, or otherwise not visible

The use of enhancement devices, in and of themselves, are lawful. Surveillance professionals often use tools that can magnify a view, such as binoculars and zoom lenses on cameras and camcorders. Using such methods has been upheld in many instances as constitutionally proper; however, not all enhanced views are appropriate. Until such time that the Supreme court addresses the issue of enhancement methods or tools, the lower courts will continue to use their discretion in determining which enhancements are lawful.

Let’s address some of these issues. The lawfulness of the surveillance is often determined by the positioning of the investigator in relation to the location of the subject.  To avoid this jeopardy, the professional investigator must frequently assess, “to what extent are my enhancement efforts violating a subject’s expectation of privacy?”

We have not yet seen decisions on surveillance of activities on public streets or other public areas being a violation of the Fourth Amendment. However, surveillance in public areas such as public restrooms or dressing rooms, and locker rooms, may violate the civil rights of those viewed.

The courts have established specific guidelines of visual enhancements when the area under observation is more private, such as a home or fenced yard; however, those guidelines vary in different jurisdictions. In that light, an investigator may observe a home from public areas, such as parking lots, public streets, or any area that can be accessed by the public.

Courts support photographing activities that can be seen with unaided vision or enlarging photographs that merely enable one to see items that were in plain view, though in greater detail.  In the opinion of the courts, guidelines for using mechanical devices to enhance a view into the home also differ dramatically.

Can a surveillance professional use an enhancement device to view from a distance (to avoid detection) any activity that could have been observed with the unaided vision from a closer vantage point, i.e., enhanced views that are confined to the window area of a residence? Yes. Any activity viewed inside the home must be viewable from a public space. Courts look more favorably on the use of enhancement devices, which simply confirm those activities observed with unaided vision.  An enhanced view is lawful in instances when the observations are not in an attempt to see something that is not in plain view without the enhancement device.

Finally, it is important to remember that each situation is uniquely different when dealing with legal issues of enhanced views.  In general, visual enhancement devices are not illegal, however, their application relates to specific parameters.  These parameters are determined by the particular area in which the effort is conducted and the protections that area affords to the people in these areas.  The protections may be established by a subject’s reasonable expectations as well as the efforts of the subject to ensure privacy.

This article is not intended to provide legal advice. It is the sole opinion of the author. Be sure to seek professional legal guidance. And perhaps equally as necessary, communicate what you are doing with your client as they would likely experience any adverse outcome of a surveillance operator’s illegal or unethical activities.

For further information about our professional surveillance capabilities, call (253) 852-7000 or complete the online Contact Form.

Mom reaches $2 million settlement with apartment owner

Naomi Jones’ mother has reached a settlement with Aspen Village Apartments’ management and ownership in a lawsuit alleging negligent security at the complex led to her 12-year-old daughter’s murder.

On Monday, attorneys for Shantara Hurry announced they had settled with apartment complex owner, Aspen Village Acquisition LLC, for $2 million. Hurry also reached a settlement with the management group, Progressive Management of America Inc., under confidential terms.

Hurry said she hopes the case causes other apartment complex owners to improve their standards of monitoring who is living or visiting a property.

Read the rest of the story here.

Tenant Blames Shooting on Lack of Security After Drug Arrests

An Opa-locka tenant who was shot after confronting a drug dealer claimed the landlord should have boosted security after 10 drugs arrests in three years.

A tenant who was shot outside his Opa-locka apartment complex reached a $1 million settlement in a negligent-security lawsuit against the property owner.

Read more in this article by Law.com.

Do you have a Workplace Violence Policy and Emergency Management Plan?

Recent FBI/DOJ statistics show that workplace shooting events are on the rise. Leaders and managers are increasingly aware of the need to prepare for these threats. At the same time, research shows that the larger the organizations, the least amount of effort are given to effective and proper planning, preparation, and resiliency.

Shooting incidents are forcing the security sector to revisit best practices and standards in the effort to protect an organization’s assets and people. Take note gentle readers; a training class is not a best practice or standard! With what is a rise in frequency, scope, and severity of mass casualty attacks, organizations as a whole must fundamentally change how they react to violent events. We generally find that our cleints are significantly behind the curve.

As we revise planning and education procedures around active shooter incidents, research shows that we are not moving quickly enough to develop realistic training, drills, and scenarios to shape best-practice response efforts. Further, there is an ever-increasing need for more effective utilization of technology to better communicated and account for people in the heat of these attacks.

Emergency Management Cycle

Here are some important recommendations to consider:

  1. Establish a Workplace Violence Policy, and, Emergency Management Plan. Every organization needs a clear, concise, and deployable policy and plans for a proper response to incidents of violence. Typically, policies and plans provide critical guidance as to how people and incidents are to be managed.
  2. Include active shooter-specific response procedures in your Workplace Violence Policy and Emergency Management Plan. Include specific procedures in your plans; who does what, how, when, and where. Ensure that all employees have access to and understand the plan.
  3. Conduct regular training with your personnel. Properly train, and then retrain, your employees about your overall workplace violence policy and plan, to include a shooting event. Employees should be adept in how to report threats and how to respond during violent events.
  4. Develop a relationship with local law enforcement agencies. We all must be prepared to work closely with local law enforcement. They have a plan; does it parallel yours? The last thing you need is to yourself in the weeds exchanging information during or after the incident has occurred. Reach out to your local law enforcement agencies and develop a relationship with them well in advance of any problems. Let them both train in and get to know your facility better. Perhaps they will practice with you.
  5. Deploy an Emergency Communication System. Communication is key to critical incident notification. Numerous, reasonably-priced, third-party systems are available to you. Effective emergency communication often makes the difference between life and death.
  6. Maintain up-to-date employee information to best facilitate your Emergency Communication System. While violence may not be preventable, accurate, effective, and timely communication will save lives.
  7. Conduct regular simulated workplace violence events with your incident response team with a focus on the post-event aftermath and its effect on people and the continuity of business. A violent event may last minutes. However, the repercussions could last for years. Also, be sure to include your Emergency Communication System in your exercises and testing.
  8. Finally, how often should I test? That is probably the most simple question to answer; you test and retest and retest to competency.

For further information about how Trident can assist you in a Violence Mitigation Program or Emergency Management Plan, please contact us at (253) 852-7000.

Pacific Northwest Association of Investigators 2019 Winter Training Conference

Another successful PNAI training event was held this past week at the Washington State Criminal Justice Training Commission in Burien, WA!

It was a fast-paced day beginning with attendees learning about the latest in cellular telephone forensics from Gordon Mitchell of Future Focus.

Gordon Mitchell presenting on telephone forensics

Sandra Robb of Capital Accounting provided updates on the latest Federal and State tax laws, and things we all can do to mitigate or prevent those unintended audits.

Sandra Robb discussing tax law and audit prevention.

The lunch networking session was led by Martin Radley of Radstone Investigations and Consulting.  Attendees introduced themselves and spoke of the challenges they expected this coming year and how they were going to manage or overcome them.  A very informative topic!

After lunch, effective web design and the myths of Search Engine Optimization were explained in detail by Marty Longe from Umbrella Graphics, the Trident website designer.

Marty Longe presenting on web design and SEO.

And the last presentation of the day was on Surveillance Best Practices, paneled by PNAI members Mike Canaan from Trident Investigative Service, Inc., two other local investigators Keith Shores and Andy Holmes. Audience participation was high during this presentation, with lots of questions and answers provided.  The exchanges were so many that the program was not completed before the end of the day. Attendees asked that panel to reconvene at the next conference to complete the presentation, which we will do.

We are excited to report that our attendance from the last or prevent, with attendee responses being overwhelmingly positive!  We expect an even greater turnout at the next training event.

Stay tuned!  Keith Shores, the PNAI Education Committee Chair will be announcing the dates of the next PNAI Training Conference scheduled for this early Fall.

Event Risk Managment: An Adversarial Mindset

Assigning a large number of protective agents to a high-profile event is no longer sufficient to counter realistic threats; we must pre-plan such events with an “adversarial” mindset.

The “Red Team” concept is a strategic military and intelligence organization component used to break away from institutionalized cultural “group think” to foresee an attack from an adversary’s point of view.  Then test an organization’s readiness to withstand and detect a targeted attack.

Sometime known as non-destructive physical Penetration Testing, Red-teaming can predict the enemy’s most likely avenue of attack, and therefore give us insight into comprehensive protective measures.

Large crowds can be especially difficult to work.

Today, a pre-incident analysis is the best-practice protocol to predict the primary locations you need to either secure when planning the security and response aspects of a major upcoming event.

Can you pick out our protective agent? It’s not the guy in the suit.

Trident consultants have the experience of planning large events and deploying such assets as:

  • Plain-clothes, armed or unarmed protective agents dressed to blend in with attendees
  • Plain-clothes, armed or unarmed counter-surveillance operatives dressed to blend in with attendees
  • Uniformed and plain-clothes law enforcement
  • Unformed protective agents dressed as ticket-takers or usher
  • Paramedics and other medical professionals
  • Armed response teams made up of skilled law enforcement and private sector professionals
  • Protective Drivers
  • Protective Escorts to watch over individuals to and from parking lots, nearby venues
  • Technical Surveillance Countermeasures (TSCM) services
Or, we can dress the part.

We customize our protective services based upon numerous factors such as, but not limited to:

  • Physical size of venue(s)
  • Number of doors
  • Number of attendees
  • Threat Assessment/Known Threats
  • Additional tasking requested by clients
No venue is too large.

Can you afford to not know?  Trident Security Consultants have a broad-spectrum of experience from federal and local law enforcement, military, corporate and legal investigative fields, with knowledge, experience, and equipment that exceeds any other investigative agency in the Pacific Northwest. 

To learn more about our protective consulting and event risk management services, call us at (253) 852-7000 during our office hours 8:30 A.M. to 5:30 P.M. Pacific Time, Monday through Friday. When calling after hours or if you reach our voice mail, please leave a message and our on-duty investigator will return your call at the earliest opportunity.

Benefits of Multiple Surveillance Operators

One of the most challenging aspects of our business is working with clients who might otherwise express unrealistic expectations of what can be accomplished in surveillance.  As crime and terrorism have been forefront in our minds, our society, in general, is more vigilant of their surroundings.  And then add the often significant component of urban congestion and traffic to the equation, and it can be extremely difficult to reach a successful conclusion to surveillance.

How do we increase our odds?  Often a second or third surveillance operative is appropriate for the scope of work.  This is where the question is asked; does a second or third surveillance operator increase the odds of obtaining your objective? In most cases, yes.

HOW DOES THIS IMPROVE OUR ODDS? A few examples are:

  • More eyes on a subject or subject location
  • Ability to watch multiple exit points
  • Ability to have stationary eyes on the subject while other operators pick up the departure
  • Parallel follow-cars and the ability to change what’s viewed in the subject’s rearview mirror
  • More easily plan for complicated or multiple possible subject departure routes

WHAT CAN YOU, THE CLIENT, DO TO INCREASE OUR SUCCESS?  We know that information is power.  As it is available to you, provide us with:

  • Current, and detailed subject information to include physical description and photographs
  • Vehicle information
  • “Significant other” details
  • Social media and activities
  • Known support addresses — family, friends, medical providers, legal advisors, etc.

TECHNOLOGY WE USE TO FACILITATE OUR SUCCESS comes in many forms.  This may include, but not limited to:

  • Suitable surveillance vehicle options for the environment we work or the subject we follow
  • Each team member has a two-way radio with both direct and repeater capability
  • Maintain a continuous team conference call on the operators cellular phone
  • Team location or positioning on a shared smartphone or tablet map applications
  • Shared chronological field notes are taken live on a smart phone or tablet
  • Multiple covert video camera options to be used in nearly any environment or scenario

THE CHALLENGES AND IMPEDIMENTS TO SUCCESS REMAIN. While no one can guarantee results, there are many conditions and factors outside of our control which can negatively affect an outcome.  Examples are:

  • Intersections and traffic lights
  • Traffic and area congestion
  • A subject who is naturally suspicious
  • Someone who has been counseled by their legal advisors to watch for surveillance
  • A subject who performs a SDR (Surveillance Detection Route)
  • A subject who uses multiple modes of transportation such as being on foot, using public transportation, or ride share.
  • Inadequate, or no suitable surveillance positions to watch our intended subject or activity
  • And then there is the subject who does not leave their home or work on the day we conduct our surveillance.


Trident Investigators have a broad-spectrum of experience from federal and local law enforcement, military, corporate and legal investigative fields, with knowledge, experience, and equipment that exceeds any other investigative agency in the Pacific Northwest which will significantly increase the opportunity for positive results.  Can you afford to not be successful?

Want to know more?  Call us at (253) 852-7000 during our office hours 8:30 A.M. to 5:30 P.M. Pacific Time, Monday through Friday. When calling after hours or if you reach our voice mail, please leave a message and our on-duty investigator will return your call at the earliest opportunity.

Nationwide Illicit Drug Trends

A leading provider of drug screening services recently released its annual drug testing statistics. In 2017, statistics showed that 4.2 percent of employees screened for drug use tested positive, the highest positivity rate in more than a decade.

Rates of Cocaine use among tested employees rose, as did Methamphetamine use.

The rate of employees testing positive for Marijuana has continued a five-year increase, most striking in states that have legalized its use. Most disturbing was that these same findings were also found in the Federally mandated, safety-sensitive workforce, to include, rail, bus, and truck drivers; pilots; and workers in nuclear power plants.

While it may be premature to believe that the use of Marijuana is pervasive in our workforce, the trend is telling.

As the legalization of Marijuana continues to spread across the country, it is becoming clear that the challenges illicit drug use pose to employers is not going away any time soon.

Trident provides canine contraband detection services of work areas; vehicles, vessels and aircraft of all types; storage facilities; warehouses; and private residences to help ensure that areas remain contraband free. Call us at (253) 852-7000 for further information about our contraband detection services.

Signup for Blog Posts

Get our most recent posts sent to your email inbox!