Send an Email

Workplace Violence Policy and Emergency Management Plan

Recent FBI/DOJ statistics show that workplace shooting events are on the rise. Leaders and managers are increasingly aware of the need to prepare for these threats. At the same time, research shows that the larger the organizations, the least amount of effort are given to planning, preparation, and resiliency.

Shooting incidents are forcing the security sector to revisit best practices and standards in the effort to protect an organization’s assets and people. With what is a rise in frequency, scope, and severity of mass casualty attacks, organizations must fundamentally change how they react to an assailant.

As we revise planning and education procedures around active shooter incidents, research shows that we are not moving quickly enough to develop realistic training, drills, and scenarios to shape best-practice response efforts. Further, there is an ever-increasing need for more effective utilization of technology to better communicated and account for people in the heat of these attacks.

Emergency Management Cycle

Here are some important recommendations to consider:

  1. Establish a Workplace Violence Policy and Emergency Management Plan. Every organization needs a clear, concise, and deployable policy and plans for a proper response to incidents of violence. Typically, policies and plans provide critical guidance as to how people and incidents are to be managed.
  2. Include active shooter-specific response procedures in your Workplace Violence Policy and Emergency Management Plan. Include specific procedures in your plans; who does what, when, and where. Ensure that all employees have access to and understand the plan.
  3. Conduct regular training with your personnel. Properly train, and then retrain, your employees about your overall workplace violence policy and plan, to include a shooting event. Employees should be adept in how to report threats and how to respond during violent events.
  4. Develop a relationship with local law enforcement agencies. We all must be prepared to work closely with local law enforcement. They have a plan; does it parallel yours? The last thing you need is to yourself in the weeds exchanging information during or after the incident has occurred. Reach out to your local law enforcement agencies and develop a relationship with them well in advance of any problems. Let them train in and get to know your facility better. Perhaps they will practice with you.
  5. Deploy an Emergency Communication System. Communication is key to critical incident notification. Numerous third-party systems are available to you. Effective emergency communication could make the difference between life and death.
  6. Maintain up-to-date employee information to facilitate your Emergency Communication System better. While violence may not be preventable, accurate, effective, and timely communication does save lives.
  7. Conduct a simulated workplace violence event with your incident response team with a focus on the post-event aftermath and its effect on people and the continuity of business. A violent event may last minutes. However, the repercussion could last for years. Also, be sure to include your Emergency Communication System in your exercises and testing.
  8. How often should I test? That’s the potentially expensive question! My answer is; test to competency.

For further information about how Trident can assist you in a Violence Mitigation Program or an Emergency Management Plan, please contact us at (253) 852-7000.

Yet another “best practice” to inspect for electronic surveillance devices.

Does your organization conduct an electronic countermeasures sweep of the AirBNB or rental home before your executives arrive? Well, you should, and have every justification and reason to do so! Here is, yet again, an example of one of those legitimate concerns.

If you are concerned about an upcoming event, please give us a call at (253) 852-7000. We sell “peace of mind”. Let us help.

Pacific Northwest Association of Investigators 2019 Winter Training Conference

Another successful PNAI training event was held this past week at the Washington State Criminal Justice Training Commission in Burien, WA!

It was a fast-paced day beginning with attendees learning about the latest in cellular telephone forensics from Gordon Mitchell of Future Focus.

Gordon Mitchell presenting on telephone forensics

Sandra Robb of Capital Accounting provided updates on the latest Federal and State tax laws, and things we all can do to mitigate or prevent those unintended audits.

Sandra Robb discussing tax law and audit prevention.

The lunch networking session was led by Martin Radley of Radstone Investigations and Consulting.  Attendees introduced themselves and spoke of the challenges they expected this coming year and how they were going to manage or overcome them.  A very informative topic!

After lunch, effective web design and the myths of Search Engine Optimization were explained in detail by Marty Longe from Umbrella Graphics, the Trident website designer.

Marty Longe presenting on web design and SEO.

And the last presentation of the day was on Surveillance Best Practices, paneled by PNAI members Mike Canaan from Trident Investigative Service, Inc., two other local investigators Keith Shores and Andy Holmes. Audience participation was high during this presentation, with lots of questions and answers provided.  The exchanges were so many that the program was not completed before the end of the day. Attendees asked that panel to reconvene at the next conference to complete the presentation, which we will do.

We are excited to report that our attendance from the last or prevent, with attendee responses being overwhelmingly positive!  We expect an even greater turnout at the next training event.

Stay tuned!  Keith Shores, the PNAI Education Committee Chair will be announcing the dates of the next PNAI Training Conference scheduled for this early Fall.

Event Risk Managment: An Adversarial Mindset

Assigning a large number of protective agents to a high-profile event is no longer sufficient to counter realistic threats; we must pre-plan such events with an “adversarial” mindset.

The “Red Team” concept is a strategic military and intelligence organization component used to break away from institutionalized cultural “group think” to foresee an attack from an adversary’s point of view.  Then test an organization’s readiness to withstand and detect a targeted attack.

Sometime known as non-destructive physical Penetration Testing, Red-teaming can predict the enemy’s most likely avenue of attack, and therefore give us insight into comprehensive protective measures.

Large crowds can be especially difficult to work.

Today, a pre-incident analysis is the best-practice protocol to predict the primary locations you need to either secure when planning the security and response aspects of a major upcoming event.

Can you pick out our protective agent? It’s not the guy in the suit.

Trident consultants have the experience of planning large events and deploying such assets as:

  • Plain-clothes, armed or unarmed protective agents dressed to blend in with attendees
  • Plain-clothes, armed or unarmed counter-surveillance operatives dressed to blend in with attendees
  • Uniformed and plain-clothes law enforcement
  • Unformed protective agents dressed as ticket-takers or usher
  • Paramedics and other medical professionals
  • Armed response teams made up of skilled law enforcement and private sector professionals
  • Protective Drivers
  • Protective Escorts to watch over individuals to and from parking lots, nearby venues
  • Technical Surveillance Countermeasures (TSCM) services
Or, we can dress the part.

We customize our protective services based upon numerous factors such as, but not limited to:

  • Physical size of venue(s)
  • Number of doors
  • Number of attendees
  • Threat Assessment/Known Threats
  • Additional tasking requested by clients
No venue is too large.

Can you afford to not know?  Trident Security Consultants have a broad-spectrum of experience from federal and local law enforcement, military, corporate and legal investigative fields, with knowledge, experience, and equipment that exceeds any other investigative agency in the Pacific Northwest. 

To learn more about our protective consulting and event risk management services, call us at (253) 852-7000 during our office hours 8:30 A.M. to 5:30 P.M. Pacific Time, Monday through Friday. When calling after hours or if you reach our voice mail, please leave a message and our on-duty investigator will return your call at the earliest opportunity.

Benefits of Multiple Surveillance Operators

One of the most challenging aspects of our business is working with clients who might otherwise express unrealistic expectations of what can be accomplished in surveillance.  As crime and terrorism have been forefront in our minds, our society, in general, is more vigilant of their surroundings.  And then add the often significant component of urban congestion and traffic to the equation, and it can be extremely difficult to reach a successful conclusion to surveillance.

How do we increase our odds?  Often a second or third surveillance operative is appropriate for the scope of work.  This is where the question is asked; does a second or third surveillance operator increase the odds of obtaining your objective? In most cases, yes.

HOW DOES THIS IMPROVE OUR ODDS? A few examples are:

  • More eyes on a subject or subject location
  • Ability to watch multiple exit points
  • Ability to have stationary eyes on the subject while other operators pick up the departure
  • Parallel follow-cars and the ability to change what’s viewed in the subject’s rearview mirror
  • More easily plan for complicated or multiple possible subject departure routes

WHAT CAN YOU, THE CLIENT, DO TO INCREASE OUR SUCCESS?  We know that information is power.  As it is available to you, provide us with:

  • Current, and detailed subject information to include physical description and photographs
  • Vehicle information
  • “Significant other” details
  • Social media and activities
  • Known support addresses — family, friends, medical providers, legal advisors, etc.

TECHNOLOGY WE USE TO FACILITATE OUR SUCCESS comes in many forms.  This may include, but not limited to:

  • Suitable surveillance vehicle options for the environment we work or the subject we follow
  • Each team member has a two-way radio with both direct and repeater capability
  • Maintain a continuous team conference call on the operators cellular phone
  • Team location or positioning on a shared smartphone or tablet map applications
  • Shared chronological field notes are taken live on a smart phone or tablet
  • Multiple covert video camera options to be used in nearly any environment or scenario

THE CHALLENGES AND IMPEDIMENTS TO SUCCESS REMAIN. While no one can guarantee results, there are many conditions and factors outside of our control which can negatively affect an outcome.  Examples are:

  • Intersections and traffic lights
  • Traffic and area congestion
  • A subject who is naturally suspicious
  • Someone who has been counseled by their legal advisors to watch for surveillance
  • A subject who performs a SDR (Surveillance Detection Route)
  • A subject who uses multiple modes of transportation such as being on foot, using public transportation, or ride share.
  • Inadequate, or no suitable surveillance positions to watch our intended subject or activity
  • And then there is the subject who does not leave their home or work on the day we conduct our surveillance.


Trident Investigators have a broad-spectrum of experience from federal and local law enforcement, military, corporate and legal investigative fields, with knowledge, experience, and equipment that exceeds any other investigative agency in the Pacific Northwest which will significantly increase the opportunity for positive results.  Can you afford to not be successful?

Want to know more?  Call us at (253) 852-7000 during our office hours 8:30 A.M. to 5:30 P.M. Pacific Time, Monday through Friday. When calling after hours or if you reach our voice mail, please leave a message and our on-duty investigator will return your call at the earliest opportunity.

Executive Security | the Dynamic of Tragedy

We all know this person.  Their name is often followed by CEO, Chairman, or some other executive title. These are work hard, play hard, high-energy individuals dedicated to the business of business. There is never enough time in any given day to accomplish all of their tasks.  They are well-paid, own at least one large home, drive expensive cars, and their children attend private schools. Their ability to multi-task is unsurpassed. 

This executive is generally “highly focused,” often occupied with research and development, cost analysis, travel, meetings, budget cuts, manufacturing, distribution, and competition. In this constant state of rush, others continually see to it that “the boss” isn’t bothered by things which might interfere with their concentration or productivity; everyone wants to keep their executive happy and moving.

Unfortunately, this is the time when bad things happen.  Often SITUATIONAL AWARENESS is non-existent.  The executive and their assistants have fallen into their day-to-day routine, laser-focused on the task at hand, moving quickly from project to project.

Do you think they saw this coming?

To further compound this scenario, the executive is not aware of their own vulnerabilities. After all, “bad things happen to someone else,” or, “who would want to harm me”?This ominous question is usually answered one of two ways.  One; that unfortunate event does happen. Or two; a qualified security professional assesses and then determines the risk and vulnerabilities.

Rational thinkers must truly appreciate this state of mind, taking the time to frequently look above the turmoil of day-to-day activities to view what’s going on around us.  And yes, that includes the executive.  It’s not necessarily difficult to establish reasonable physical security protective measures.  However, it is the breaking of the institutional barriers, facilitating the change of adult behavior, and educating the executive and those around them which often poses the most significant challenge for a security professional.

For over three decades, Trident has served clients who are concerned about personal, family, and business security. We are proactive. People at risk cannot afford to wait for a crisis to arise. Adept at the full spectrum of security operations, we are particularly proud of our unique abilities and diverse disciplines to assess and then augment existing security deficiencies. Our consultants design a cohesive, synergistic best-practice security program and system to fit your requirements while minimally impacting business operations.

Call us at (253) 852-7000 to see how we can help.

Nationwide Illicit Drug Trends

A leading provider of drug screening services recently released its annual drug testing statistics. In 2017, statistics showed that 4.2 percent of employees screened for drug use tested positive, the highest positivity rate in more than a decade.

Rates of Cocaine use among tested employees rose, as did Methamphetamine use.

The rate of employees testing positive for Marijuana has continued a five-year increase, most striking in states that have legalized its use. Most disturbing was that these same findings were also found in the Federally mandated, safety-sensitive workforce, to include, rail, bus, and truck drivers; pilots; and workers in nuclear power plants.

While it may be premature to believe that the use of Marijuana is pervasive in our workforce, the trend is telling.

As the legalization of Marijuana continues to spread across the country, it is becoming clear that the challenges illicit drug use pose to employers is not going away any time soon.

Trident provides canine contraband detection services of work areas; vehicles, vessels and aircraft of all types; storage facilities; warehouses; and private residences to help ensure that areas remain contraband free. Call us at (253) 852-7000 for further information about our contraband detection services.

Our newest piece of TSCM gear!

I recently attended a Research Electronics International (REI) five-day class in Cookeville, TN, for my newest Electronic Surveillance Countermeasures tool, the REI TALAN.

The TALAN 3.0 Telephone and Line Analyzer represents advanced capability to detect and locate illicit tampering and security vulnerabilities on digital, analog, and VoIP telephone systems. This new hardware provides the ability to test twisted pairs against modern telecommunication threats including shield and ground.

The TALAN is an impressive piece of gear for our kit!  Call us at (253) 852-7000 for further information about our eavesdropping detection services.

Signup for Blog Posts

Get our most recent posts sent to your email inbox!