On May 3, 2019,following a jury verdict rendered months earlier, a California court entered a final judgment for $845 million in favor of semiconductor maker, ASML, in its suit against rival, XTAL, for stealing trade secrets related to ASML’s lithography technology. More…
TIP: Damages in trade secret cases can be significant, as demonstrated by this case, which underscores the importance of companies taking proactive steps to be ready to effectively respond if theft occurs.
The firm’s female office manager also said Wiegand also engaged in unprofessional behavior, including inappropriate touching and comments, that made the two women feel uncomfortable and caused them emotional harm.
Recent FBI/DOJ statistics show that workplace shooting events are on the rise. Leaders and managers are increasingly aware of the need to prepare for these threats. At the same time, research shows that the larger the organizations, the least amount of effort are given to effective and proper planning, preparation, and resiliency.
Shooting incidents are forcing the security sector to revisit best practices and standards in the effort to protect an organization’s assets and people. Take note gentle readers; a training class is not a best practice or standard! With what is a rise in frequency, scope, and severity of mass casualty attacks, organizations as a whole must fundamentally change how they react to violent events. We generally find that our cleints are significantly behind the curve.
As we revise planning and education procedures around active
shooter incidents, research shows that we are not moving quickly enough to
develop realistic training, drills, and
scenarios to shape best-practice response efforts. Further, there is an ever-increasing
need for more effective utilization of technology to better communicated and
account for people in the heat of these attacks.
Here are some important recommendations to consider:
Establish a Workplace Violence Policy, and, Emergency Management Plan. Every organization needs a clear, concise, and deployable policy and plans for a proper response to incidents of violence. Typically, policies and plans provide critical guidance as to how people and incidents are to be managed.
Include active shooter-specific response procedures in your Workplace Violence Policy and Emergency Management Plan. Include specific procedures in your plans; who does what, how, when, and where. Ensure that all employees have access to and understand the plan.
Conduct regular training with your personnel. Properly train, and then retrain, your employees about your overall workplace violence policy and plan, to include a shooting event. Employees should be adept in how to report threats and how to respond during violent events.
Develop a relationship with local law enforcement agencies. We all must be prepared to work closely with local law enforcement. They have a plan; does it parallel yours? The last thing you need is to yourself in the weeds exchanging information during or after the incident has occurred. Reach out to your local law enforcement agencies and develop a relationship with them well in advance of any problems. Let them both train in and get to know your facility better. Perhaps they will practice with you.
Deploy an Emergency Communication System. Communication is key to critical incident notification. Numerous, reasonably-priced, third-party systems are available to you. Effective emergency communication often makes the difference between life and death.
Maintain up-to-date employee information to best facilitate your Emergency Communication System. While violence may not be preventable, accurate, effective, and timely communication will save lives.
Conduct regular simulated workplace violence events with your incident response team with a focus on the post-event aftermath and its effect on people and the continuity of business. A violent event may last minutes. However, the repercussions could last for years. Also, be sure to include your Emergency Communication System in your exercises and testing.
Finally, how often should I test? That is probably the most simple question to answer; you test and retest and retest to competency.
For further information about how Trident can assist you in a Violence Mitigation Program or Emergency Management Plan, please contact us at (253) 852-7000.
Does your organization conduct an electronic countermeasures sweep of the AirBNB or rental home before your executives arrive? Well, you should, and have every justification and reason to do so! Here is, yet again, an example of one of those legitimate concerns.
If you are concerned about an upcoming event, please give us a call at (253) 852-7000. We sell “peace of mind”. Let us help.
Another successful PNAI training event was held this past week at the Washington State Criminal Justice Training Commission in Burien, WA!
It was a fast-paced day beginning with attendees learning about the latest in cellular telephone forensics from Gordon Mitchell of Future Focus.
Sandra Robb of Capital Accounting provided updates on the latest Federal and State tax laws, and things we all can do to mitigate or prevent those unintended audits.
The lunch networking session was led by Martin Radley of Radstone Investigations and Consulting. Attendees introduced themselves and spoke of the challenges they expected this coming year and how they were going to manage or overcome them. A very informative topic!
After lunch, effective web design and the myths of Search Engine Optimization were explained in detail by Marty Longe from Umbrella Graphics, the Trident website designer.
And the last presentation of the day was on Surveillance Best Practices, paneled by PNAI members Mike Canaan from Trident Investigative Service, Inc., two other local investigators Keith Shores and Andy Holmes. Audience participation was high during this presentation, with lots of questions and answers provided. The exchanges were so many that the program was not completed before the end of the day. Attendees asked that panel to reconvene at the next conference to complete the presentation, which we will do.
We are excited to report that our attendance from the last or prevent, with attendee responses being overwhelmingly positive! We expect an even greater turnout at the next training event.
Stay tuned! Keith Shores, the PNAI Education Committee Chair will be announcing the dates of the next PNAI Training Conference scheduled for this early Fall.
Assigning a large number of protective
agents to a high-profile event is no longer sufficient to counter realistic
threats; we must pre-plan such events with an “adversarial” mindset.
The “Red Team” concept is a strategic military and intelligence organization component used to break away from institutionalized cultural “group think” to foresee an attack from an adversary’s point of view. Then test an organization’s readiness to withstand and detect a targeted attack.
Sometime known as non-destructive physical Penetration Testing, Red-teaming can predict the enemy’s most likely avenue of attack, and therefore give us insight into comprehensive protective measures.
Today, a pre-incident
analysis is the best-practice protocol to predict the primary locations you
need to either secure when planning the security and response aspects of a
major upcoming event.
Trident consultants have the experience
of planning large events and deploying such assets as:
Plain-clothes, armed or unarmed protective agents dressed to blend in with attendees
Plain-clothes, armed or unarmed counter-surveillance operatives dressed to blend in with attendees
Uniformed and plain-clothes law enforcement
Unformed protective agents dressed as ticket-takers or usher
Paramedics and other medical professionals
Armed response teams made up of skilled law enforcement and private sector professionals
Protective Escorts to watch over individuals to and from parking lots, nearby venues
customize our protective services based upon numerous factors such as, but not
size of venue(s)
tasking requested by clients
Can you afford to not
know? Trident Security Consultants have a
broad-spectrum of experience from federal and local law enforcement, military,
corporate and legal investigative fields, with knowledge, experience, and
equipment that exceeds any other investigative agency in the Pacific Northwest.
To learn more about our protective consulting and event risk management services, call us at (253) 852-7000 during our office hours 8:30 A.M. to 5:30 P.M. Pacific Time, Monday through Friday. When calling after hours or if you reach our voice mail, please leave a message and our on-duty investigator will return your call at the earliest opportunity.
One of the most challenging aspects of our business is working with clients who might otherwise express unrealistic expectations of what can be accomplished in surveillance. As crime and terrorism have been forefront in our minds, our society, in general, is more vigilant of their surroundings. And then add the often significant component of urban congestion and traffic to the equation, and it can be extremely difficult to reach a successful conclusion to surveillance.
How do we increase our odds? Often a second or third surveillance operative is appropriate for the scope of work. This is where the question is asked; does a second or third surveillance operator increase the odds of obtaining your objective? In most cases, yes.
HOW DOES THIS IMPROVE OUR ODDS? A few examples are:
More eyes on a subject or subject location
Ability to watch multiple exit points
Ability to have stationary eyes on the subject while other operators pick up the departure
Parallel follow-cars and the ability to change what’s viewed in the subject’s rearview mirror
More easily plan for complicated or multiple possible subject departure routes
WHAT CAN YOU, THE CLIENT, DO TO INCREASE OUR SUCCESS? We know that information is power. As it is available to you, provide us with:
Current, and detailed subject information to include physical description and photographs
“Significant other” details
Social media and activities
Known support addresses — family, friends, medical providers, legal advisors, etc.
TECHNOLOGY WE USE TO FACILITATE OUR SUCCESS comes in many forms. This may include, but not limited to:
Suitable surveillance vehicle options for the environment we work or the subject we follow
Each team member has a two-way radio with both direct and repeater capability
Maintain a continuous team conference call on the operators cellular phone
Team location or positioning on a shared smartphone or tablet map applications
Shared chronological field notes are taken live on a smart phone or tablet
Multiple covert video camera options to be used in nearly any environment or scenario
THE CHALLENGES AND IMPEDIMENTS TO SUCCESS REMAIN. While no one can guarantee results, there are many conditions and factors outside of our control which can negatively affect an outcome. Examples are:
Intersections and traffic lights
Traffic and area congestion
A subject who is naturally suspicious
Someone who has been counseled by their legal advisors to watch for surveillance
A subject who performs a SDR (Surveillance Detection Route)
A subject who uses multiple modes of transportation such as being on foot, using public transportation, or ride share.
Inadequate, or no suitable surveillance positions to watch our intended subject or activity
And then there is the subject who does not leave their home or work on the day we conduct our surveillance.
Trident Investigators have a broad-spectrum of experience from federal and local law enforcement, military, corporate and legal investigative fields, with knowledge, experience, and equipment that exceeds any other investigative agency in the Pacific Northwest which will significantly increase the opportunity for positive results. Can you afford to not be successful?
Want to know more? Call us at (253) 852-7000 during our office hours 8:30 A.M. to 5:30 P.M. Pacific Time, Monday through Friday. When calling after hours or if you reach our voice mail, please leave a message and our on-duty investigator will return your call at the earliest opportunity.
Signup for Blog Posts
Get our most recent posts sent to your email inbox!