We got you covered.
Home Blog Page 18

Investigative Interviews – A Refresher for Investigators

0
Investigative Interviews

Whether you are interviewing a suspect, witness, or victim, let us review some basic reminders to make your investigative interviews more productive and successful in obtaining factual and truthful information.

To start understanding yourself.

Check your personal biases and prejudices at the door. Going in with your mind ready and set on a conclusion can lead you down the wrong path and waste valuable time.

The Pre-Plan

Part of the planning process is to draft interview questions and objectives for your interview in advance of the conversation you plan to have with the subject.

Draft the who, what, where, when, why and how questions along with other questions you will want to ask the subject. Remember at a minimum the five W’s and one H questions should be asked.

In the interview opening it is important to have a friendly greeting and to build rapport. Starting an interview with a serious tone could close off the subject that may limit your ability to gain details. Setting the interview environment or room properly must also be planned. In every case it is important to separate witnesses and eliminate as many distractions as possible. Create a safe environment and one that will provide an atmosphere inviting and conducive for truth telling.

Investigative Interviews: Where to Begin

Start the interview with open ended questions to assess behavior. It is recommended that non-threatening questions such as what your full name is, where do you live etc., be asked first. This will set the tone and at the same time give you feedback on how a person responds verbally and nonverbally to what is expected to be truthful answers. Next ask questions about the incident or crime at hand and ask the subject to explain responses.

You close the interview by summarizing what the subject stated to assure you have it correctly and to lock them into their accounting of the facts. After the initial interview you can provide a business card for possible follow up. This will give you an opportunity to check back for inconsistencies.

One of the best skills an investigator must possess is listening. Listening requires four elements.

  • Receiving, is interpreting, and understanding the verbal and nonverbal behaviors.
  • Attending, is being able to ignore distractions and pay attention to what the subject is stating.
  • Assigning is decoding what is being said.

Are you sure you are interpreting what they are conveying? What did the subject mean? Ask follow-up questions for clarification.

  • And last, is remembering.

We do not all have photographic memories so take notes. Listening is the most neglected part of any interview. However, with practice anyone can become a better listener.

Investigative Interviews: The Set-Up

As briefly mentioned above room and environment set up and cautions when conducting interviews is especially important. The most crucial thing is privacy. Remove the subject from distractions and assure interruptions are minimal if any. Remove items that the subject can play with.

In addition, conduct an interview in a non- supportive environment, such as the subjects comfort zones- their home, office, or a location they feel safe in. Most investigators are aware of many of these suggestions but are good reminders. It is also important to emphasize that signs of authority such as badges, handcuffs and guns should be removed whenever possible while conducting interviews as well as removing any objects that could be used as a weapon against you or the subject.

When talking to witnesses and victims it is important to get their cooperation. The interviewer must show the benefit of cooperation. A simple statement such as we need your help to prevent this from happening again is a good opener, but you must also establish that the perpetrator needs to be dealt with.

Of course, concern of the witness and victim could cause lack of cooperation especially in domestic or family connection matters. If a relationship exists between a witness and suspect such as in domestic cases, it is possible the victim will go back and inform the subject and later change their statement.

Verbal and Non-Verbal Behavior

In evaluating behavior, it is important to note that we evaluate the subject against the population, against himself to establish a behavioral norm and in the context of the situation. Be aware of your behaviors while conducting the interview too. Remember the subject is also interpreting your verbal and nonverbal behaviors.

When interviewing it is and attempting to interpret behaviors it important to emphasize that behavioral clusters carry more weight than just one verbal and nonverbal sign of deception. Two or more should be considered when assessing behavior.

With more than 50% of the communication nonverbal it is crucial for investigators to be aware and sharpen their knowledge of the interpretation of behaviors. Deceptive individuals trigger an autonomic nervous system reaction. In other words, fight, or flight.

Our body prepares us to fight or flight without any action from us whatsoever. As a result, physical, verbal, and vocal responses can be noticed during the fight or flight reaction. Conversely other non-vital bodily functions cease in a flight or fight response such as digesting and salvation.

Investigative Interviews
Investigative Interviews – A Refresher for Investigators by Alan Saquella

Interpreting Body Language

While interpreting movements of the largest part of the body, the torso, shoulders and posture it is important to note that truthful people tend sit comfortably and not make large or exaggerated movements.

Deceptive subjects may display one or more of the following:

  • Trunk leans excessively back or forward or sides,
  • Gross body shifts or frozen,
  • Excessive tension in muscles,
  • Scratches body,
  • Shoulders slumped or rounded,
  • Protects abdominal area, and,
  • Excessive perspiration, rapid respiration, or deep breaths.

The legs and feet can provide some good indications of deception as well:

  • Use legs to provide barrier,
  • Legs extended or crossed to keep distance,
  • Shifts or crosses legs at questions,
  • Taps or circles foot after answer,
  • Escaping position- pointing towards door or exit,
  • Muscles hold tension, and,
  • Rarely has feet planted.

The head, neck and eyes can also demonstrate deceptive responses. Look for the following:

  • Head leaning far back or forward,
  • Phony, beaten, or distraught expression,
  • Nods from waist or abrupt jerky movement of the head,
  • Cold, hostile, or rapid eye movement,
  • Bug eyed, haunted look, tears, or moist eyes,
  • Poor or aggressive eye contact,
  • Closing eyes before lie or after lie is given, and,
  • Frowning eyebrows.

Interpreting Eye Movement

Eye Movement (Neurolinguistics) can also give an investigator clues as to truth of deception.

The eyes are used by each of us as we begin to recall or create information from our visual, auditory-or kinesics channels. By determining which representational system, a subject is using, the interviewer can ascertain whether the information is being recalled or created.

Eye Movement of Subject: 

  • Up and to the left: visually recalling or remembering
  • Up and to the right: visually creating or lying
  • Straight across to the left: recalling something heard
  • Straight across to the right: creating something heard
  • Down and to the left: internal dialogue
  • Down and to the right: internal feelings

Interpreting Facial Cues

The mouth, nose and neck provide additional signs of deception and are easily noticed.

Look for the following in each category:

Mouth

  • Lips puckered, bites lip, wets lips, smirks,
  • Yawns, dry clicking mouth, clears throat,
  • Signs, deep breaths, phony smile,
  • Tension held in mouth and jaw, swallows often,
  • Foam at mouth corners, or,
  • Non funny laugh occurs after a lie is spoken.

Nose

  • Pick, rub, blow, flared nostrils, itching or discharge.

Neck

  • Voice box moves repeatedly, carotid artery pulsates on side of neck, rash appears at front of base of the neck.

Vocal signals

While non-verbal signs paint a picture of deception, Verbal and vocal signals are exceptionally reliable indicator of deception too.

Pay close attention to the following during investigative interviews:

  • Vague, stammering, long pauses,
  • Answers too quickly, short or elaborate too long,
  • Talks Softly, Mumbles through hand,
  • Complains of rights being violated,
  • Time inconvenient for interview,
  • Uncomfortable environment,
  • Unsolicited premature excuses,
  • Relies on uncheckable sources,
  • Overly nice, polite, or respectful, sir, madam etc.,
  • Thank the interrogator for accusing them at end of interview,
  • Helpfulness-goes back to work and is overly helpful – comes back to test the water,
  • Delayed responses, pausing before answering,
  • Repeats question back to you,
  • Responds with other questions,
  • Hanging sentences, starts then stops,
  • Non-responses- acting as if they did not hear the question,
  • Uses physical behavior to cover delay- cough, deep breath, clears throat, sighs, picks lint, or goes through a grooming gesture, and,
  • Memory problems when asked, but may have details of what they were doing the date of crime for cover.

Qualifiers are statements that come before a denial. Pay special attention to these:

  • At this point in time, If I recall correctly, To the best of my knowledge,
  • Emphasized truthfulness; Honestly, Honest to God,
  • I cannot remember,
  • Changes story,
  • Offers to repay company but will not admit theft, fraud, or crime,
  • Word choice, use of plurals and avoid contractions, I did not steal those tires, and,
  • Emphasize what they did not do to avoid admitting to what they did do.

Remember, both truthful and untruthful subjects will demonstrate behaviors and you as the trained professional investigator will need to dig deeper to get the truth and factual information.

While verbal and non-verbal behaviors may indicate deceptive or truthfulness, follow up questions should also be asked to validate what you are interpreting.

Conclusion  

Pre-planning and preparation are the most important steps to take before conducting investigative interviews. Room set up and/or the location in which the interview is being conducted is equally important. Utilizing supporting tactics to establish rapport, finding something in common will help keep the dialog going and allow the subject to continue to provide information.

Your appearance and demeanor support this effort. Similarly avoid slang and make certain to have the right attitude when going into the interview. Remove signs of authority to avoid showing bias and avoid negativity. As a professional investigator your behavior should be professional but inviting. Lastly slow down avoid rapid-fire questions.

Give the subject time to answer the questions and for you to assess a response or reaction. By employing many of the suggestion’s investigators conducting investigative interviews can become more productive and successful in obtaining truthful and factual information.

Executive Protection Beyond 2023

0
executive protection beyond 2023

I entered the security industry in 2007 as a police officer. Over the last few years I have noticed some positive changes. Not everything will change, there are a lot of basics that don’t need change, a few things that can’t be replaced. One of the areas the industry has made a lot of improvements in, is online study and increased availability of quality courses by reputable providers. I have made some comments below in my article about recommendations for technology products, training schools and equipment. These are my picks. They are not the go-to for everyone, but based on my experiences, these are my recommendations and thoughts on executive protection beyond 2023.

Technology

I’ve started with technology because I am a sucker for new and shiny things in our industry. IF it looks cool and Gucci, I must try it. Some items are clever but still land up in that bottom draw labelled, “just in case”, but there are some things that I have picked up over the last year or two that are my go-to for every day carry or must have for the job ahead.

What do I look for in technology? Improved quality, lighter and smaller to carry and if it can save you time or help you work smarter, it is always worth a try.

My top 5 items I carry are the following:

  1. The newly launched CellAED defibrillator out of Australia. This is a single use device that’s weighs less than 500 grams slides easily into any laptop bag or backpack.
  2. Good, quality, clear communications. That’s why when I work in a team, I always have my N-ear 360 ear pieces on me.  They provide clear comms via a micro speaker, and I don’t get any ear fatigue after hours of use.
  3. Compact battery phone charger. As we work long days and often don’t have time to plug your phone into a wall charger, it is always important to have that compact charger to boost your phone life on a busy day.
  4. A quality flashlight, and yes, size does matter. There are size restrictions going through aviation security. TSA require flashlights to be less than 7 inches (17.78 cm) and they must be non-tactical (no sharp edges).
  5. Electronic counter surveillance tools. Again, this technology has become more affordable, more accessible and is great for basic searches and unplanned movements.

There is also great communication technology that’s being released. One of the devices I am excited about, is the iPhone 14 and its ability to send an SOS message via satellite. This technology will continue to develop, and I wouldn’t be surprised in the next 2 years if we see a mobile phone that works on multiple networks including satellite communications.

Protective Intelligence

Executive Protection operators continue to focus on lone attackers, fixated individuals or groups threatening violence or protest. Post Covid lockdowns we have seen an explosion in small anti-government groups, anti-capitalism movements, new right-wing groups and people claiming to be sovereign citizens. Between 2021 and 2023 we have seen the outbreak of war in Ukraine and increased tensions in the Pacific with China. There is great technology available to mass monitor multiple people and groups. Geofencing is also a great way to monitor peoples online behaviour towards your clients or locations of interest.

I don’t see things settling down. My prediction for executive protection beyond 2023 is that we will see the following:

  1. Increased violent and aggressive behaviour across all types of crime.
  2. Continued decline in police numbers in some major cities.
  3. Increase on public relying on private security across various levels.
  4. Larger security teams looking after high net people/families.
  5. Private security to be provided more powers to fill the void of low police numbers in some city centres.

Protective intelligence is a leading part of any Executive Protection team. There are some great people or companies out there offering quality intelligence or social media monitoring services. This saves you having to employ a full-time person or take time away from other team members. Reports produced by experienced people in the intelligence community can help create a realistic and targeted risk/threat assessment.

executive protection beyond 2023
Executive Protection Beyond 2023
by Mark Richards

Travel and Logistics

With global borders open again, we have seen a quick return to travel. Here in Auckland, New Zealand we have had weekly arrivals of new cruise ships and the airports across the country are seeing large numbers returning. People want to travel and the people we look after want to get back to business. There seems to be a growing number of climate action groups targeting air travel. There have been disruptions around private jets and recently climate groups have discussed targeting companies that provide air points to customers as a reward.

I believe we will continue to see major disruption to airports as climate action groups continue to target air travel. There is also a big push for companies to use electric vehicles. There are some great EV vehicles that are available to the market but I would still recommend using a petrol/diesel SUV with 4×4 capability. With recent weather events, the unreliability of electric cars and a poor charging network, there is a lot of risk in using an EV for transport. I don’t see this changing anytime soon in the future. The demand for electric cars and lack of resources to build and maintain them means we will be relying on petrol/diesel vehicles for a few more years.

I would recommend purchasing the ISO 31030:2021 Travel Risk Management – Guidance for organisations. This is a up to date standard that covers all travel risks in detail. (ISO – ISO 31030:2021 – Travel risk management — Guidance for organizations)

Training and skill development

The best thing to come out of covid lockdowns are all the great online schools which became available. Some well-respected organisations started online classes and courses because of the travel restrictions. I did a few courses and for someone who lives outside the USA, it was great to access to the online classes.

Don’t get me wrong, there is no replacement for in person training, shaking hands and meeting people in person. It is great though to now have the option of renewing certificates, refreshing the basics, and developing new skills without the cost of international travel and cost of accommodations.

The other great opportunities that have recently sprung out of the executive protection community are the number of informative Podcasts, chat groups, websites, and magazines. Sharing new ideas, information, talking about lessons learnt and discussing current industry topics.

We are a part of an international industry which has opened itself up and sharing experiences that took years to learn through mistakes. I think with professionals continuing to share their experiences on social media and executive protection online schools continuing to grow, it will help develop the industry by working towards improving our global standards and certifications.

Final Remarks and Recommendations

My personal recommendations for training schools, podcasts, and online reading are:

  1. Enablement Advisors – Ivor Terret brings global security experience from the ground to the Board room. I would recommend listening to any podcast/interview with Ivor Terret available online.
  2. SECFOR International – Rick Sweeney, great online courses and great in person courses in the USA.
  3. The Institute of Strategic Risk Management – Great online courses and lectures by Dr David Rubens
  4. Conversations in Close Protection is a great podcast with Chris Story and Chuck Randolph.
  5. The Circuit Podcast with Phelim Rowe, Elijah Shaw, Jon Ross and Shaun West.
  6. Great reading with EP Wired Magazine, great articles via LinkedIn or website.

We don’t know exactly what lies in the future for executive protection beyond 2023 but the global demand for our services continue to grow.  We have great people sharing tons of knowledge and letting us learn from their experiences. EP is a great industry with a fantastic future!

Princess Haya and her British Bodyguard – An EP Perspective

0
Princess Haya and her British bodyguard

The scandal involving Princess Haya and her British bodyguard has caused a stir in the media and raised questions about the potential risks for high-profile individuals. From an executive protection and diplomatic security perspective, this scandal highlights the importance of maintaining professional boundaries between security personnel and their clients. 

In this article, we will explore the implications of this scandal and the risks associated with personal relationships between security personnel and their clients, drawing insights from the concept of VIP protection.  

Princess Haya and her British Bodyguard – The Scandal  

Princess Haya, a member of the royal family in the United Arab Emirates, was reportedly caught in a compromising position with her British bodyguard. While the details of the scandal are still emerging, the incident highlights the potential risks of personal relationships between protectors and their principals.  

These situations compromise the protectors’ objectivity and ability to their job effectively. This can result in conflicts of interest and ethical dilemmas that can compromise security.  

Also, they may inadvertently disclose confidential information or fail to maintain proper security protocols. This can put their clients at risk of physical harm, blackmail, or other security breaches.  

Maintaining Professional Boundaries – Best Practices  

To avoid the potential risks and implications of personal relationships between security personnel and their clients, it is important to maintain professional boundaries. This means keeping a professional relationship with clients and avoiding any personal involvement that may compromise safety.  

As we said, security personnel should avoid becoming too familiar or too friendly with their clients. They should also avoid engaging in any personal activities with clients that may compromise their objectivity or ability to perform their duties effectively.  

However, employers must also play a role in maintaining professional boundaries between security personnel and their clients. They should establish clear policies and guidelines for employee conduct and ensure that security personnel understand the importance of always maintaining these boundaries. 

Princess Haya and her British Bodyguard
Princess Haya and her British Bodyguard – An EP Perspective

Princess Diana’s Precedent  

Princess Diana’s relationship with her bodyguard, Barry Mannakee, has been the subject of much speculation and controversy. Mannakee was assigned as a personal protection officer to the Princess in 1985, and their relationship was said to have developed into a close friendship over the next two years.  

While some have claimed that the relationship between Diana and Mannakee was romantic in nature, others have suggested that it was simply a close, platonic friendship. Whatever the truth may be, it is clear that their relationship was a complicated one, particularly from an executive protection standpoint.  

As a member of the royal family, Diana’s personal security was of the utmost importance, and her bodyguard was responsible for ensuring her safety at all times. Any personal relationship between the Princess and her bodyguard would have been a cause for concern, as it could have compromised the effectiveness of her security detail and put her safety at risk. 

Conclusion 

The scandal surrounding Princess Haya and her British bodyguard is not only a cause for concern for the safety of the Princess but also for the reputation of the executive protection industry. The personal relationship between Princess Haya and her bodyguard has called into question the professionalism and ethical standards of the industry, highlighting the need for clear guidelines and regulations.  

When executive protection professionals engage in personal relationships with their clients, they compromise the safety and security of those they are hired to protect. The risk of personal involvement and bias in decision-making processes can lead to a breakdown of trust and a failure to fulfill the primary duty of protecting the principal.  

The executive protection industry is built on a foundation of professionalism, expertise, and trust, and incidents like this can erode that foundation. To maintain the reputation and integrity of the industry, it is imperative that guidelines and regulations be established to prevent personal relationships between clients and their security personnel.  

This scandal also emphasizes the importance of accountability and transparency in the industry. Employers must establish protocols for vetting and monitoring their employees to ensure that they maintain professional boundaries and uphold ethical standards. In the end, the safety and security of high-profile individuals depend on the professionalism and competence of their security personnel. Personal relationships have no place in this industry and can put lives at risk. 

By upholding ethical standards and maintaining professional boundaries, the executive protection industry can maintain the trust of its clients and the public. 

The Attack on the Israeli Ambassador in Spain

0

In recent years, there has been a significant increase in attacks on foreign diplomats, particularly Israeli ambassadors. In this article, we will analyze the recent attack on the Israeli ambassador in Spain, with a focus on the performance of the ambassador’s executive protection team, and what it means for the future of diplomatic relations between Israel and Spain.  

Background  

Israeli Ambassador to Spain, Rodica Radian-Gordon, was attacked by multiple pro-Palestinian activists during a lecture at a university in Madrid. In a video that circulated on social media, the ambassador is seen being evacuated to a secure room by her security detail, while dozens of activists swarm around them.  

The lecture resumed shortly after. Reportedly, the local police sent forces to the scene and evacuated the protesters, the ambassador’s lecture resumed. 

The ambassador’s executive protection team was on hand, and they quickly sprang into action, deescalating the situation and stopping the attackers. The Spanish police arrived soon after and arrested the attackers, who have since been identified as members of a local anarchist group.  

The lecture on Wednesday was occasioned by the 30th anniversary of the Oslo Accords between Israel and the Palestinians. 

The Diplomatic Community Reacts  

The attack on the Israeli ambassador in Spain has sent shockwaves through the diplomatic community, with many nations expressing their condolences and condemning the violence.

The Israeli government has called for an immediate investigation into the incident, and the Spanish government has promised to do everything in its power to bring the attackers to justice.  

Attack on the Israeli Ambassador

The Performance of the Executive Protection Team  

The swift and effective response of the ambassador’s executive protection team is a testament to their training. The team’s ability to deescalate the situation and prevent the attackers from causing further harm demonstrates the importance of having a well-trained and equipped executive protection team.  

This incident also highlights the ongoing threat to foreign diplomats and the need for continued investment in their security. 

Impact on Israel-Spain Relations  

The attack on the Israeli ambassador in Spain has the potential to significantly impact the relationship between the two countries. In recent years, Israel and Spain have been working to strengthen their diplomatic ties, and this attack could set back those efforts.  

However, both governments have emphasized their commitment to maintaining good relations and ensuring that this incident does not escalate into a larger diplomatic crisis.  

“We are appalled by the violence of the anti-Israel demonstrators, which was directed against the Israeli ambassador at the conference at Complutense University to mark 30 years of the Oslo peace accords. We thank the dean for her determined and courageous leadership of open and balanced academic discourse. We do not comment on issues related to the security of the embassy,” said the Israeli Embassy in Madrid. 

The Dangers of Anarchist Groups  

Anarchist groups have a long history of attacking diplomats and foreign officials, and they often see these attacks as a way to draw attention to their political agenda. In the case of the attack on the Israeli ambassador in Spain, the anarchist group responsible has stated that their actions were in protest of Israel’s policies towards Palestine.  

While the attack has been widely condemned, it has also shed light on the growing tensions between Israel and Palestine and the role that anarchist groups play in exacerbating those tensions.  

The Take-Away 

The attack on the Israeli ambassador in Spain is a concerning development in the world of diplomacy and underscores the importance of having a well-trained and equipped executive protection team. The swift and effective response of the ambassador’s detail demonstrates the value of investing in their security.  

While it is important to hold the attackers accountable, it is also crucial for the Israeli and Spanish governments to work together to prevent future incidents and maintain positive diplomatic relations. 

Check out the video below and let us know what is your opinion on the EPA’s reaction.

Assassination Attempt on Queen Elizabeth II: What We Know

0

In the first treason case in decades, there was an assassination attempt on Queen Elizabeth in 2021. Luckily, the perpetrator was caught before anything happened, but what if it had? This is not the first assassination attempt on Queen Elizabeth, but it was the last one before her tragic passing on September 8th last year.

Jaswant Sing Chail (21) was caught at Windsor Castle on Christmas 2021 while attempting to scale the walls while carrying a crossbow. When authorities confronted him, he stated, “I am here to kill the queen.”

How It Went Down

The failed assassin Jaswant Sing Chail mounted the castle using a rope ladder. He explored the grounds for nearly two hours before a royal officer discovered him near the Queen’s quarters on the day of the break-in.

The officer drew a taser on the criminal when he encountered him at 8:10 a.m. and asked, “Morning, can I help, mate?” followed by a statement that he was there to kill the Queen. The officer told Chail to put down his weapon and go down on his hands and knees, which the invader obeyed.

This assassination attempt on Queen Elizabeth is scary because the security wasn’t ready to prevent this situation from happening in the first place. There will have to be more serious measures implemented in the Royal Family’s security in the future. The risk is simply too big to leave things like this to chance.

“Please don’t take my clothing, shoes, gloves, masks, etc, don’t want post-mortem, don’t want embalming, thank you and I’m sorry,” Chail wrote on a letter found in his possession. Prior to this assault, Chail allegedly applied to join the Ministry of Defense Police in order to become closer to the royals.

The Story Behind The Assassination Attempt

This assassination attempt on Queen Elizabeth was allegedly motivated by rage and revenge. The invader posted a Snapchat update on social media. The recordings were discovered to have been taken four days earlier. Around 20 people on his contact list got the video in which he said:

“This is revenge for those who have died in the 1919 Jallianwala Bagh massacre. It is also revenge for those who have been killed, humiliated and discriminated on because of their race.”

On April 13, 1919, British forces opened fire on 10,000 unarmed demonstrators in the Indian city of Amritsar, killing an estimated 379 persons and wounding 1,200. Civil unrest and dissatisfaction were spreading across India at the time, notably in Punjab, as British officials failed to reverse harsh wartime measures that constrained India’s political sovereignty.

Previously, on April 10, 1919, reports circulated in Amritsar that several notable Indian leaders had been detained, provoking violent riots with armed soldiers. British officials imposed a restriction on public meetings, such as the hundreds that gathered in the afternoon of April 13 at the Jallianwala Bagh park, some to protest and others to celebrate the Sikh spring festival of Baisakhi.

Although experts question whether a distinct Sikh identity emerged, many Sikhs today see Baisakhi as a pivotal point in the Sikh faith.

The area was surrounded by high walls and had only one exit, trapping everyone inside as the army allegedly shot hundreds of rounds of gunfire. The murder became synonymous with modern Indian history, galvanizing support for Indian nationalism and independence from Britain.

Generally, people think that the security of presidents, prime ministers, and royal families is  perfect and impenetrable. All of us with years of experience working in the industry know that this is not true and that high-level security frequently has a lot of flaws.

This is the case of the mentioned attack on the late Queen of England. We don’t have enough information for a complete analysis, but from the information we got from the media, we can state that: The attacker was performing surveillance of the facility for an extended period of time – without being spotted by royal security.

So we have an evident lack of counter-surveillance. The fact that the attacker managed to jump the fence of the residence is proof that the physical security of the residence was insufficient. The surveillance failed in terms of both human and technical factors, because no one saw him climbing, jumping, and entering the residence. No alarm systems were activated, and no camera detected the intruder at the moment. All of this was accomplished by a single troubled individual.

Can you imagine what would happen if the attack was perpetrated by trained professionals, terrorists, etc.? Recent “benign” attacks on French and Chilean presidents and many other attacks on the members of the European Parliament, members of royal families show that the security of her high-level personality is very vulnerable.

We have to change and improve the security of these individuals, to avoid tragedies in the near future.

Ivan Ivanovich, Vice President and Partner at WSO – Worldwide Security Options

Act of Treason

In the United Kingdom it is illegal under the Treason Act of 1842 to commit or attempt an attack, to threaten the Queen with a weapon, or to disturb the peace. Under the statute, Chail faces up to seven years in prison. The last time a treason attempt equated to prison time for the perpetrator was in 1981. Marcus Sarjeant was sentenced to five years in jail. This happened after shooting blank bullets at the Queen during a ceremony in London.

The previous Treason Act of 1351 was more severe, making all assaults on a monarch punishable by death. The only person convicted under the more serious 1351 statute was William Joyce, who was executed in 1946 for spreading Nazi propaganda.

The assassination attempt on Queen Elizabeth or of any monarch is a serious crime and the people who try this have to be aware of the consequences of their actions. While not common, these attempts can become bad or even tragic. This is why security measures have to be at the best possible level.

The Hampshire, England citizen will appear in court on March 31 as the first individual in the United Kingdom to be convicted of treason in more than 40 years. He pled guilty to possessing a lethal weapon and threatening to murder the Queen. Chail is presently getting therapy in a high-security mental institution.

Hotel Security and Executive Protection: Key Considerations

0
hotel security and executive protection

All sorts of travellers, from business to recreational demand superior customer service and expect their safety and security to be looked after when booking into a hotel, think about it, how often when booking a hotel do we take into consideration how effective the security measures are when we book a room for a night or a hotel for a two-week holiday with our family? Sure, we may read the reviews on Booking.com about the quality of the rooms, service and the quality of the location and food, but rarely does the “normal” holiday maker or businessman investigate the depth of hotel security and safety.

During this global pandemic businesses were struggling, many still are, this includes hotels. With fewer people travelling, in turn causing hotels to lay off staff due to a decrease in occupancy. Will your favourite hotel still be operational? will that excellent valet attendant, and bartender still be working? will people still travel like they once did? these are all questions we need to ask ourselves.

When the global gateways open to all, the competition will be fiercer than ever. Hence why it’s now time for hotels to review their security and safety strategies, staff awareness training, and embed a positive, unintrusive security culture.

I often get asked to review these measures, usually in depth, especially if it is for a HNWI or high-profile guest who is preparing for a stay, this forms part of an advance of a location, I have done many assessments over the years when it comes to hotel reservations and selection, specifically on 5* luxury locations.

We unknowingly are entrusting a hotel with the responsibility of ensuring our Rolex, passport and money is safe in our bedroom, perhaps entrusting the concierge with our keys to a new Lamborghini and our expensive luggage, how often do you leave your luggage unattended whilst checking into a hotel? Or valuables in the car when the valet takes it to park in the basement?

Warren Buffet once said – “It takes 20 years to build a reputation and 5 minutes to ruin it”.

If you consider this for a minute, it is imperative that all staff understand the role they play in safety and security, and what is expected of them, delivered through training, and awareness notifications. Security often gets taken for granted, because we feel it does not affect us, however it affects all of us, every day, no matter where we are, not just in a 5* hotel. A hotel has many employees, who, when implemented correctly, can be a cost effective, proactive force multiplier for the security department.

Any hotel operator, manager or CEO who overlooks a professional security team is set for failure. It only takes one act of violence or adversary action to ruin your name, brand, and reputation.

hotel security and executive protection
Hotel Security and Executive Protection: Key Considerations

Customer Service vs. Security and Safety Measures

When entering a hotel, you generally are first greeted by the concierge, then the front office staff, these members of our team are constantly reminded, and correctly so, that the customer comes first, they are number one, if it were not for the customers you, me and our colleagues would be out of a job. It is vital to maintain professional and friendly interaction with the guest whilst also thinking about security measures and protocol, for example are we checking for ID when a guest requests a replacement room key? How do we verify the person asking for a key, is in fact the guest?

What protocols are in place to ensure we are not handing the wrong room card or car keys over to the wrong person? Even a valet ticket is not a proof of identify. What happens if a car is parked by one valet shift, that shift then changes and the said guest drops his ticket in the toilet, another guest picks up the ticket and collects the car, unknown to the new valet shift that this is a different person making an attempt to steal a car? How do we verify this?

At all times you must consider the bigger picture, if you were to give the keys to the car or the room key to the wrong person, who would be impacted by this and to what effect it would have on you, your team, the hotel, the brand, the customer, and the list goes on, think about it, we all have a responsibility.

Screening of External Contractors & Staff

Ask yourself this: how well do we know the company we use to maintain our marble floors in the main lobby? How sure are we that this company operate a professional and safe practice for its clients? Would we want these contractors to gain access to our hotel facilities, back of house areas and most importantly guests and their rooms? To allow them access to our confidential documents, clients possessions and the hotels valuable stock? How do we manage this process? What controls are in place?

It is imperative to scrutinize all external contractors prior to allowing them access to your hotel, what measures do they have in place to ensure that their company is able to guarantee that their personnel are able to carry out the work safely and efficiently without impacting the safety of the guests and security of the hotel, after all, it is them who is providing a service to us, so we have a right to question why we should elect to use that service.

Any external contractor from security, delivery drivers, flower arrangers, cleaners, decorators, and gardeners must have their credentials checked thoroughly; I cannot stress how imperative this is, remember, they are providing the hotel owners and managers with a service, nobody will question why you were doing your job correctly, if you have a gut instinct or are unsure, check credentials.

Security should check credentials and verify a person has approved access privileges. If they are who they say they are they will respect you are doing your job, if they give you problems, tell your supervisor, manager or better still, the person that gave you the request to check, I like nothing more that explaining to a contractor or staff member as to why these measures are in place and who is impacted if they are not adhered to.

Credentials are worn for a reason; they are in place to help make the environment we all work in safe and secure and deter an adversary.

Key Card Access

A few years ago, I witnessed a demonstration at a security conference where a former criminal hacker turned IT consultant was able to use several programs and tools to unlock and reprogram a hotel key card system after finding major flaws in its internal security server.

Larger hotel groups now employ people to monitor systems around the clock and to check for breaches in their servers, however this is something to consider, no electronic device or computer system is 100% safe or reliable, neither is a human, however as a human we can help mitigate risk.

We do not want unwanted guests in our back-office areas, staff rooms or guest rooms. If you find a suspicious individual in a back of house area or in a public area, inform both the security and hotel manager on duty immediately, ensure you give an accurate location and appearance and document this using a pen and paper, if you have one on you, or, and, over the radio.

As a hotel guest or future guest if a hotel has a safe at the front desk it is wise to ask them to look after your passport and any substantial amounts of cash you may have. Often the handing over of possessions at the front desk would be on surveillance cameras, and the safe in the back-office area would also be monitored by surveillance, this ensures peace of mind.

Hotel Security and Executive Protection
Hotel Security and Executive Protection: Key Considerations

After Hour Access Control

It is very important that the guest and your team members feel safe and have a person to go to if they require assistance regarding safety and security issues, especially at night. When foot traffic decreases in public areas it is important to maintain a security presence, surveillance cameras must be monitored continuously, this includes the loading dock, entrances and exits, back of house areas, corridors, lifts, car park and perhaps entrances to special suits and rooms if appropriate, if a hotel has a presidential suit or wing it is not uncommon for them to have a range of cameras focused in these areas for added security measures.

To monitor surveillance cameras in a large hotel or venue is highly skilful and to do it correctly takes a lot of time and knowledge, this plays an integral role in round the clock security, especially at night when staff numbers are decreased, and the possibility of crime is increased perhaps. It is important that any night-time security posts are in regular contact with a security control room or shift leader, a check-in process is advisable to ensure all locations are secure and guards are safe. This also re-assures management, and the business, that staff members are doing what they are paid to do instead of sleeping on duty.

Location Specifics – Crime Statistics

It is important to consider crime statistics in the area in which the hotel is located and take these figures into account. Is there an increase in car theft or people being robbed for valuables? Are there a lot of pickpockets in the area? All these factors need to be considered as to how a hotel implements a security strategy once a Risk Assessment has been conducted, and what measures the security director needs to take to ensure his team are performing efficiently to keep guests and employees safe.

Think about this scenario, you are a member of the concierge team, it is 0200hrs and a couple of ladies approach you for directions to a club that is located a few blocks away, you have heard that there have been a number of complaints from other female guests that they have been subjected to some harassment down the same stretch of road, you notice that the ladies are also wearing high heels, so instead of suggesting them to walk the route, you offer them a taxi, not only are you providing the guest with excellent service, you are also ensuring that they are safe at the same time, despite it being out of our jurisdiction we are still able to mitigate the risk of the ladies being impacted by these reports of harassment down the street.

Can Hotel Security Ensure Efficient and Professional Protection?

This is a very hard task, the more common “stereotypical” security guard is likely to assume that they are there purely to break up fights and look imposing. However, these security guards are very easily replaced, they have no place in a 5* hotel or 5* establishment. If you are offering impeccable levels of service and intending on exceeding guest expectations, security plays a huge role in this.

A hotel must impose an inviting and welcoming atmosphere, the whole idea about customer service is to make the guest feel special, to offer them an experience they will not find anywhere else, that means you have increased the chances of the guest returning in the future. Security must dress to suit their surroundings, they must dress and act accordingly, I cannot stress how important pride in self-appearance is in all aspects of security, I know of huge contracts that have been lost because security operatives were not shining shoes correctly or wearing ties correctly and were wearing suits three sizes too small.

A modern-day security operative in a 5* hotel must take on two roles, a host, and a security operative; they must be a customer service representative, an ambassador for the hotel and brand, have some pride, not only in yourself, but your employer.

It is a skill that takes time to learn and master, how to do both without impacting too much on the other, when this is effectively done, you will not only save money but gain more clients. It is very difficult to recruit such individuals unless they have had a well-rounded and diverse background.

Emergency Response Plan (ERP)

It is important that directors of security, the executive management team and owners meet with the local authorities and emergency services often to establish effective lines of communication and deal with requests from both parties professionally and effectively, in a time of crisis, you may require support from local emergency services, and quickly.

Emergency services are paramount to the efficient and effective running of a hotel; they can offer extensive support and training in certain areas which are valuable to hotel staff. They most importantly help form the ERP that will be in place at the hotel in case of an emergency, be it small or catastrophic. It is important to prepare for the worst-case scenario to ensure the premises, its staff and guests are ready at a moment’s notice.

If a VIP is staying at your hotel you will want to be prepared, and liaising with emergency services is imperative to a successful operation. Not only in order for you to plan your security requirements, but to ensure you proactively benefit and work alongside the emergency services. Being professional in such an event is important, you want the VIP to return to the hotel in the future because his security detail were pleased with your professionalism as a team and the safe and secure environment you created during their visit.

Conclusion

Professional hotel security operatives and staff require constant training and advice to remain motivated and knowledgeable. Those who are working within a 5* hotel are subjected to high demands and expectations, not only from guests but work colleagues and management.

It is important that staff receive regular, stimulating, and fit-for-purpose training in various aspects of operations to perform better, especially training in security and safety aspects of the operation, cross training is vital in a hotel to allow employees to gain a better understanding of different operational aspects and it is very important for team building.

In front of house areas such as the front desk and concierge areas it is important for staff to be able to uphold safety and security protocol and maintain impeccable levels of service, who do the guests meet first? If all staff can have a better understanding of all aspects of the operation, such as different outlets and in this case security and safety, more hotels would see an increase in growth, reputation, and income.

Ask yourself this, what part do you play in the chain?

 

Regards,

Adam

Enterprise Security Risk Management and Executive Protection

0
Enterprise Security Risk Management

Enterprise Security Risk Management (or ESRM) is a security program approach that helps raise the profile of security. To put it simply, it occurs by linking security activities to an enterprise’s mission and business goals. This occurs through various risk management methods designed to gather informational data. Ultimately, both the organization and its leaders will understand risk with a perspective on real-time impacts.

Of course, the executive protection industry has evolved tremendously over recent years. For one thing, during the cusp of a global pandemic, most organizations adopted the inevitable digital workspace or hybrid work model. What’s more, the image of bodybuilders in matching black suits with earpieces still resonates in the perception of the general public but also the principal.

Secondly, with close-quarter protection making up a sizable amount of protective details, sadly, strategic planning and research are often bywords when planning for the protection of persons, property, and brands.

And that’s precisely where ESRM falls in the scope of executive protection. Enterprise Security Risk Management is a strategic approach that allows organizations to incorporate security management professionals into advisory capacities to better protect their assets.

Let’s remember; employees are an organization’s most valuable asset.

Why Should Executive Protection Professionals Care About ESRM?

As mentioned above, valuable employees who merit executive protection – either as a C-Suite member being escorted to their place of residence, or a management team traveling to satellite locations abroad – ESRM becomes a force multiplier in EP because it asks its principal(s) “What keeps you up at night?”

Now, this question does not always generate clear or simple answers. There are a plethora of risks and threats that a principal(s) may not be aware of. Again, that’s precisely where ESRM comes in. To help get the principal(s) from point A to point B and then safely home is the overall, operational objective.

However, it’s vital to understand that security risks are dynamic. Just as with everything else, the factors affecting an enterprise’s security risks are subject to change. With the ESRM mindset, an EP team takes a guided and supportive role in the safety and security of the brand – and they do this in an ongoing way.

The strategic scope of ESRM in executive protection includes some of the following:

  • Working closely with the organization’s Chief Security Officer (CSO) to see what is at stake if something happens to the principal(s). For example, loss of business or defamation of character.
  • Strengthening the partnership with contract security management if the principal’s organization has corporate locations that are under 24/7 private protection.
  • Gathering reports generated by private security teams and local authorities to better aid in the planning of the route of travel for the principal(s).

As evident, the types of strategic routes to take can be endless. The ESRM approach can be implemented into any organization or assignment, an executive protection team leader can weave this concept into the protective framework as an additional layer of security in protecting persons, property, and brands.

The Takeaway

ESRM is an approach that’s most likely here to stay. Managing the range of risks organizations and their client’s face is not getting any easier. As more regulative and legislative hurdles arise, this adds additional challenges to the business of doing business. For this reason, more and more CSOs and EP teams are adopting the ESRM approach.

I would encourage everyone in executive protection and related fields to ask pertinent questions about ESRM. Such questions may include:

· What does ESRM mean to your principal(s) and organization?
· How can you utilize the strategic methods of ESRM to serve the client and organization better?

 

What To Expect With Private Executive Protection 

0

In today’s ever-evolving world, executive protection has become increasingly important. As organizations expand and operate in an environment with higher risks, executives need to be secure at all times. This is where private executive protection services come into play. 

In this article, you’ll learn what to expect and the benefits of hiring an experienced security team.  

Introduction to Private Executive Protection  

These services provide an organization with a highly trained team of security professionals who can protect executives and other high-profile individuals from potential threats.   

Private executive protection is designed to ensure that these individuals are kept safe in any given setting, including business trips, public appearances, travel, and in the office.  

When hiring EPAs, it’s important for people looking for these services to do their best to research the company they are considering hiring. Also, their credentials should be top-notch to make sure they are up-to-date on the latest security protocols and best practices.   

They can do this by:  

  • Researching the company’s background and certifications, 
  • Requesting credentials from their team of experienced security personnel   
  • Inquiring about any specialized services, such as threat assessment and analysis   
  • Asking them to provide references from previous clients.  

The Role of a Bodyguard  

When it comes to private executive protection services, bodyguards play a major role in ensuring the safety of their clients. Bodyguards are professionals who have the skills and knowledge necessary to quickly assess a situation. Also, they will need to create effective strategies for handling any potential threats.   

Some strategies include:  

  • Conducting threat assessments and identifying potential risks  
  • Maintaining a high level of physical fitness to ensure they can protect their client in any situation   
  • Adapting to changing environments quickly and responding appropriately   
  • Developing detailed security plans and protocols   
  • Operating advanced surveillance equipment (cameras or listening devices).  

Bodyguards will often accompany their protectee to various events as well as provide surveillance when needed. Also, they have to stay ahead of changes in security protocols so they can properly protect their client. 

In addition, bodyguards typically utilize defensive countermeasures. These include creating escape routes and monitoring exits to ensure that the individual is safe at all times. High-risk situations can happen at any time, but they are not that common in real life. Still, the bodyguard must be prepared.  

Furthermore, if there is an incident, bodyguards will intervene and take the necessary steps (such as contacting law enforcement) to ensure that the principal is safe. 

Types of Private Executive Protection Services 

Professional security companies offer a variety of services to their clients. They range from basic protection and surveillance to advanced intelligence-gathering capabilities. Depending on the individual’s needs, they may be provided with a team of bodyguards.  

A high-net-worth family might need a team of bodyguards around the premises at all times, as well as surveillance. In contrast, a famous CEO who can travel more on his own could only need a few professional bodyguards around him. The situations around the number of EPAs can vary, so it is always better to consult with the executive or their assistant. 

This team can provide 24/7 protection or a single security specialist who is trained in specific areas such as crowd control and evacuation procedures. Also, some of them just need agents around them in order to note to the public that they are important people. 

In addition to providing protection, professional security companies also provide proactive solutions for organizations looking to minimize risk. This includes: 

  • conducting background checks on employees, 
  • screening visitors before granting access, 
  • installing state-of-the-art surveillance equipment, and 
  • providing intelligence reports so that people close to the executive can stay informed about potential threats.   

Benefits of Hiring Private Executive Protection  

For starters, executives and other high-profile individuals can have peace of mind knowing that their security needs are being met. They will be aware of the team of experienced professionals who are well-versed in the latest security protocols.   

Additionally, having a dedicated team ensures that any potential threats can be identified and addressed quickly and efficiently. This would minimize any disruptions or risks.   

Hiring private executive protection also allows organizations to save time and money. This means that they no longer have to hire an entire in-house security team. By outsourcing this service, companies can enjoy cost savings while still ensuring their executive’s safety is a top priority.   

Tips for Choosing the Right Security Company 

When it comes to choosing the right security company and service plan for your needs, there are a few things to keep in mind. Start by assessing your executive’s needs and budget. Knowing what services you require and how much you’re willing to spend will help narrow down your options.   

It’s also important to make sure that the company is:

  • licensed,  
  • insured and  
  • compliant with applicable laws for providing private EP services.   

Finally, make sure the company offers a level of customer service that meets or exceeds your needs. Also, ask about their policies for handling emergency situations as well as how they handle requests for additional services.  

Final Thoughts  

Finding the right private executive protection service is essential for any organization looking to minimize risk and ensure their executives are safe and secure.  

By taking the time to research companies, assessing individual needs and budgets, and choosing a company that offers quality customer service, organizations can rest assured that their security needs are in good hands.    

As we saw, some of the most important things to look for in a private executive protection provider include:  

  • Ability to provide 24/7 protection and surveillance, 
  • Proactive solutions for risk minimization,   
  • Background checks on employees and visitors,   
  • Installation of state-of-the-art surveillance equipment,   
  • Intelligence reports for staying informed about potential threats,   
  • Cost savings from outsourcing security needs,    
  • Protection from legal liability in the case of an incident.  

While there may be other things to consider when choosing a security company and service plan, these are some main points to keep in mind.  

With the right provider in place, executives can focus on what really matters – their job.

International Executive Protection Services: What to Look For

0

When hiring executive protection services, looking for a company with extensive experience in the security industry is crucial. This ensures that the protection team is well-trained and able to handle any potential threat to the executive. So, if you are looking for international executive protection services, let us explore some of the most important factors that you need to consider.  

Availability  

Availability is one of the most important considerations when seeking international executive protection services. You need to ensure that the security team can provide round-the-clock coverage.

Additionally, they need to travel with you on business trips and be available for emergency situations. It’s also important to consider how quickly the team can mobilize and deploy if needed.   

Ask yourself these questions:   

  • Does the company have the resources in place to respond on time?   
  • Is their staff flexible enough to adjust their schedules?  

If the answer is yes, the service you are considering is the right one for you.   

Defensive (and Verbal) Skills  

The security team you work with should have extensive defensive skills.  They need to possess a full understanding of how to handle different violent situations such as  

In most cases, this is not what is going to happen because these situations are rare.  

Make sure that at least one person on the team has basic medical training and is capable of treating minor injuries on-site, rather than needing to wait for an ambulance or another specialist.

Sometimes, it is also beneficial to look for a security team that is fluent in different languages and has the ability to negotiate in a variety of cultural settings if needed.   

For example, if the team is going to Africa where there are a lot of different languages people speak, you can hire locally sourced and vetted protective staff to help translate. This ensures that sensitive information stays safe during the principal’s visit. 

This means that the international executive protection services you choose can make a significant difference regarding your well-being. It’s essentially why defensive skills are very important in this area of expertise.  

Reputation  

When seeking international executive protection services, it’s important to research the company’s reputation. Look at their website and talk to their former clients to get an idea of what kind of service you can expect.

This will ensure that any security team you hire is experienced and reliable, whether you subcontract or need them as part of your in-house detail.  While there may be cheaper services out there, it is important to focus on quality rather than cost.  

Discretion  

Discretion is an essential factor when choosing international executive protection services. The security team might need to sign NDAs that state that they will not be able to share any information on the protectee. This is important, especially for media, which are always looking to get information on influential people from their current or former bodyguards.   

Also, discretion is key when it comes to the safety of the executive, so you should look for a security team that will not be in their way but will be attentive to their safety needs.  

Resilience  

Next, the security team should be capable of remaining resilient in difficult situations. If there are big groups of people present, they should be aware of them and create distance in order to protect the principal.

It’s better if they stay close to the protectee and focus on being with them. Some principals even enjoy having EP agents close by because it signals to others that they are important people.  

Resilience is essential when it comes to international executive protection services, as it ensures that the principal remains safe and secure at all times. If the security team can remain composed, even in the face of danger, it will help to ensure that any threat is quickly identified and neutralized.   

Communication  

The security team should be highly communicative and have the ability to quickly relay information back to the executive or their staff. If a situation arises, they need to be able to follow the plan of action they prepared and communicate it efficiently with  

  • Encrypted communicators, and 
  • Two-way communicators (Walkie-Talkies).  

Good international executive protection services will also provide regular updates on the status of their operations. This is important so that agents, assistants and people close to the executive can remain informed at all times. Also, it is because, in a good plan of action, there will be solutions and preventions to every problem.

This includes the problem of communication.   

Businesses should invest in the right technology when traveling abroad. Having a secure communications system in place is essential, as it allows your security team to communicate with you quickly and effectively if needed.    

Having up-to-date tracking devices on all company personnel ensures that their locations can be monitored at all times.   

This includes encrypting data files and using virtual private networks (VPNs) whenever possible. In addition, it’s important to ensure that all devices are updated with the latest software patches and antivirus programs, as this can help reduce potential security risks which include:   

  • Malware and fake links,   
  • Phishing scams and   
  • Third-party apps.   

Being Proactive: How to Handle International Issues?  

When it comes to executive protection, being proactive is always the best option. This would include doing a location visit before the protectee arrives and arranging suitable lodging. 

Also, in cases of bigger risk, even hiring local support staff to help out is a great option. They will be able to help with their knowledge of the location as well as recommend vehicles to fit the local road conditions.  

Final Thoughts  

Ensuring executives are safe abroad is a complex and challenging task. With the right security team in place, it can be accomplished.   

When looking for international executive protection services, make sure to take into account  

  • Availability,  
  • Defense skills,  
  • Reputation,   
  • Discretion, 
  • Resilience, and   
  • Communication skills.   

A reliable company will have all these qualities and more, ensuring that your executive travels safely wherever they go.  

Additionally, businesses should always stay one step ahead by properly planning and investing in technology and systems to help protect their executives when traveling internationally. With the right preparation and security measures in place, business trips abroad can be carried out without any issues.   

So, if you were looking to hire the right executive protection agency for you or your client, make sure to consider this solution.  

Internal and Security Investigations Today

0
security investigations

Years of experience and discussions with colleagues in the corporate investigative field agree that internal and employee investigations can be disruptive to the work environment. Many workplace investigations are conducted are incredibly unsettling due to an extensive list of challenges, circles, and processes to follow. Security investigations are time consuming, expensive, embarrassing for interviewees, cause loss of productivity, and damage morale as they drag on.

Having conducted thousands of these investigations over the years has taught me a few lessons. Most importantly that each must be handled confidentially and involve as few people as possible of which are only those that need to be involved. Using an investigative team made up of security, human resources, compliance/legal and the subject matter experts who may be needed to assist with forensic accounting and cyber forensics. With the right group in place collaborating on each step of the investigation makes it is easier to keep the investigation on track.

The 4 Stages of Internal and Security Investigations

I like the concept of breaking down an Investigation into four distinct sections. The acronym for this is P.L.A.N. The letter “P” stands for preparation. As part of the preparation, the incident or investigation starts a report or information received about a particular crime or event. The letter “L” stands for learning.

In this stage, the investigator learns as much as possible about the case. Next is the letter “A” for analysis. Once you compile all the information from the learning phase you then analyze it to try to determine what has happened and how it was perpetrated along with the when, why, where, and who might be involved. The letter “N” in the acronym stands for notification. This is when the investigator notifies the superior or the manager of the investigation. In this phase, the investigator also provides the proposed path that the investigation will take, and the resources needed to support it.

The PLAN process works well when dealing with any type of internal or criminal investigation, however, when it comes to scaling security investigations involving scores of witnesses, victims and suspects, resources can become scarce including investigators available to conduct the interviews along with operating expenses to financially support all the necessary steps to assure the investigation is conducted thoroughly, and in compliance with laws, regulations, and organizational policies.

The Time Factor in Security Investigations

All this this must be considered as well as time. According to NAVEX Global, it takes 45 days to conduct an average internal investigation. Impacting the timeline are vacations, call outs, and geographic differences and time zone issues. Decisions will need to be made whether to interview in person or via video conferencing. Having taught interviewing and interrogation courses in college and to professional investigators, I strongly suggest in person interviews.

The longer an investigation takes the more likely information will leak thus contaminating evidence and witnesses can occur jeopardizing the investigation. Time is of the essence in any investigation. While having each member of the investigative team sign non-disclosure and confidentiality statements, once the interviewing of witnesses and suspects begins, it is anyone’s guess on how long it will take for the information to leak out.

Choosing the Right Investigator

Selecting the appropriate investigator to conduct the interview is also critical. Someone that has the right amount experience handling the type of investigation at hand is vitally important. In law enforcement, you would not want a homicide detective to interview a white-collar offender not having a forensic accounting background. Conversely in a corporate investigation, someone with a deep understanding of the company processes, terminology and appropriate interviewing approach should conduct the interview with the suspect.

security investigations

Another obstacle to consider is that investigative interviews are often particularly embarrassing and uncomfortable to the interviewee. The anxiety starts when they get a call or an email from HR, Security, or the Legal department that goes something like this, “We need to schedule a conversation with you about an ongoing investigation.”  Once in your presence, you start by asking for confidentially and possibly have the employee sign the NDA and remind the employee not to talk to their colleagues about the investigation.

Issues of Scale and Technology

This brings me back to scaling an investigation that has of upward of 50-100 potential witnesses and potential suspects. In a recent example, a distribution center with extensive merchandise inventory losses that employs over hundreds of workers including truck drivers, product handlers, shippers, receivers, and laborers all working in and around the facility 24/7 suffered from typical investigative methods due to the size of the warehouse, volume of product, and interconnected processes that occur in the facility.

CCTV systems, access control, and the other traditionally physical security technology proved ineffective in solving the loss problem. Sending a team of inventory specialists with investigators to conduct system audits, surveillance and conduct interviews among employees did not yield substantial results on a time-efficient schedule, while reducing operational efficiency, causing disruption to production and distribution, and potentially negatively impacted departmental relationships.

Case study: Verensics

Fortunately, and coincidently, I met the founders of Verensics’ that created an electronic narrowing interview process reduces the scope of suspects. In collaboration with researchers and professors from notable institutions like Georgia Tech and Kennesaw State University both located in Georgia, the software came to rescue in the case of the distribution center investigation. Once introduced to the company officials, the software was used in the investigation with all one hundred plus employees nearly simultaneously. Simply, the software leads each person down a path asking questions on a computer.

The person taking the assessment is being monitored on how long they take to answer a question, what answer is selected and if an answer has been changed. The questions will be automatically tailored to the performance of the person taking the assessment. The wording of the questions encourages truthfulness which also elicits admissions and knowledge of criminal activity and or policy violations in the workplace. At the end of the assessment the results are immediately available to the investigator for follow-up as needed.

Final Remarks

In the above case, the software program narrowed the suspect pool from over one hundred to just a handful, allowing the investigators to work and focus their efforts on interviewing just those few suspects resulting in the closure of the case with successful results, minimal costs and with removing the human errors caused by traditional methods described earlier.

What is more, the technology can substitute the need for traveling to a region of the country by using the software in other locations in advance of any travel. Travel might only be necessary when suspects are identified by the software.

The software works will in other investigations too. Security investigations of bribery, dishonesty, workplace violence, information theft, sexual harassment, sabotage & vandalism, unethical supplier and vendor relationships to employees, fraud, illegal drug and alcohol violations, and bullying/harassment. This technology has been successfully applied in government and law enforcement internal employee investigations, as well as many public and private organizations. Moreover, the software has pre-employment/routine employee screenings, insider threat programs, and internal workplace investigations applications as well.

Today, investigators have innovative solutions to complex and large-scale investigations involving scores of suspects, witnesses, and victims. Like CCTV cameras and drones using analytics to detect criminal activity, investigators now have opportunities to close more internal and security investigations faster with less disruption to the workplace by using the available technology available to them today.

Download Advance Work: Route Survey

    Download Advance Work: Restaurant

      Download Helicopter Extration: Landing Zone

        EP Career

        Your registry of the best opportunities in executive protection.

        EP Directory
        The right place to explore EP companies.