Skip to content
  • Home
  • News
  • About
  • Contact
  • CA Login
Top Utility Menu
Twitter page opens in new windowLinkedin page opens in new window
Search:
Threat Analysis Group
Threat Analysis Group
Threat Analysis GroupThreat Analysis Group
  • Security
    Metrics
  • Risk
    Management
  • Security
    Operations
  • Forensic
    Security
  • Security
    Technology
  • Publications
    & Research
  • Security
    Metrics
  • Risk
    Management
  • Security
    Operations
  • Forensic
    Security
  • Security
    Technology
  • Publications
    & Research

News and Issues

You are here:
  1. Home
  2. News and Issues

2019 – 2022 Human Trafficking/Commercial Sex Acts in Houston

UncategorizedFebruary 9, 2023

Download Report

Read more

Do Property Crimes Escalate into Violent Crimes?

Crime Analysis, UncategorizedApril 28, 2022

Violence escalation is defined as a single crime in progress that escalates into violence or escalates into further violence. Violent…

Read more

Crime Thresholds

Crime AnalysisApril 4, 2022

Emile Durkheim, a pioneer in criminology, suggested that crime was not indicative of a pathology or illness in society but…

Read more

Foundations of a Successful Security Program

Crime Prevention, Security, UncategorizedMarch 24, 2022

A successful security program or initiative should be rooted in sound crime prevention theory and research and designed for specific…

Read more

Unraveled: An Evidence-Based Approach to Understanding and Preventing Crime

UncategorizedJanuary 10, 2022

Unraveled is the result of over 7 years of research to bridge the gap between criminology and private sector security…

Read more

Violent Crime Typology

UncategorizedJune 10, 2021

Violent crimes represent a small but significant portion of the reported crime in the United States.  Categorically, violent crimes occur…

Read more

Identifying and Responding to Sex Trafficking Victims in Healthcare Environments

Healthcare Security, Human TraffickingJune 3, 2021

Human trafficking has been identified as a global problem and occurs in most countries, including the United States. Traffickers use…

Read more

Not All Evidence is Equal

Forensic Security, Research/StudiesJuly 7, 2020

In the United States, we often base criminal justice policy on ideology, rather than research.  This sometimes results in time,…

Read more

Crime Analysis: Defined

Crime Analysis, Threat Assessment, UncategorizedMay 13, 2020

Crime analysis is a set of evidence-based analytical techniques and processes used to quantitatively analyze crime and security data to…

Read more

Strategic Security Management

UncategorizedMay 13, 2020

Available now: Strategic Security Management: A Risk Assessment Guide for Decision Makers, Second Edition Strategic Security Management (2nd Edition) Strategic…

Read more

Workplace Violence Prevention for Health Care and Social Service Workers Act

Healthcare Security, Workplace ViolenceDecember 3, 2018

November 16, 2018 WASHINGTON, D.C. – Today, Congressman Joe Courtney, (CT-02), a senior member of the House Education and Workforce…

Read more

Recent Reports on Risk Management

Security Risk Assessment, UncategorizedSeptember 26, 2017

Enterprise Risk Management The Global Risks Report The Meaning of Security in the 21st Century

Read more

Report on Retail Shrink

RetailSeptember 26, 2017

This unique and timely study, commissioned by the RILA Asset Protection Leaders Council, is the latest in a series of…

Read more

2016 Crime Statistics Released

Crime Analysis, Optimization/Metrics/ROI, Threat Assessment, UncategorizedSeptember 26, 2017

2016 FBI Uniform Crime Report

Read more

2015 FBI Uniform Crime Report (Crime Statistics) Released

Crime AnalysisSeptember 29, 2016

  2015 UCR:  https://ucr.fbi.gov/crime-in-the-u.s/2015/crime-in-the-u.s.-2015

Read more

Recommended Reading: Risk Terrain Modeling

Crime Analysis, Crime PreventionSeptember 13, 2016

Features of a landscape can influence and enable behavior. Consider a place where children repeatedly play. When we step back…

Read more

Stranger v. Non-Stranger Crime

Crime Analysis, Research/Studies, Threat AssessmentAugust 19, 2016

When assessing the crime risk of a Place, it is important to distinguish violent crimes which pose a threat to…

Read more

Violent Crime Rates for U.S. cities with the highest population

UncategorizedJuly 17, 2016

I’m amazed that the media pays so much attention to violence in Chicago and ignores cities with more violence.  If you…

Read more

IAHSS-Foundation’s 2016 Healthcare Crime Survey reveals significant drop in Violent Crime, but….

Crime Analysis, Healthcare SecurityMay 20, 2016

Are we winning the battle against violence in U.S. hospitals?  The IAHSS-Foundation’s 2016 Healthcare Crime Survey, published in May, seems…

Read more

Crime Prevention Recommended Reading: Place Matters

Crime Analysis, Crime Prevention, Optimization/Metrics/ROI, Research/Studies, Threat AssessmentApril 11, 2016

Over the last two decades, there has been increased interest in the distribution of crime and other antisocial behavior at…

Read more

The Crime Triangle

Crime Analysis, Crime Prevention, Threat AssessmentNovember 18, 2015

The problem analysis triangle (sometimes referred to as the crime triangle) provides a way of thinking about recurring problems of…

Read more

Pharmacy Robbery

Crime Prevention, Healthcare SecurityOctober 1, 2015

This guide begins by describing the problem of pharmacy robbery and reviewing factors that increase its risks. It then identifies…

Read more

License Plate Recognition Technology

TechnologyOctober 1, 2015

The GMU Research Team discovered that LPR technology is rapidly diffusing into U.S. law enforcement. Over a third of large…

Read more

IAHSS Foundation publishes Body Worn Camera study

Healthcare Security, Research/StudiesSeptember 28, 2015

The objective of the IAHSS Foundation’s “Evidence Based Healthcare Security Research” series is to identify and summarize valid studies and…

Read more

ASIS Publishes Risk Assessment Standard

Security, Security Risk AssessmentSeptember 23, 2015

This Standard provides guidance on developing and sustaining a coherent and effective risk assessment program including principles, managing an overall…

Read more

Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations (RAND Corp)

Crime Analysis, Optimization/Metrics/ROI, Research/StudiesJune 10, 2015

Predictive policing is the use of analytical techniques to identify promising targets for police intervention with the goal of preventing…

Read more

2015 Healthcare Crime Survey

Crime Analysis, Healthcare Security, Optimization/Metrics/ROIMay 7, 2015

The International Association of Healthcare Security and Safety Foundation’s 2015 Healthcare Crime Survey was commissioned under the Research and Grants…

Read more

OSHA 3148 Update

Healthcare Security, Workplace ViolenceApril 7, 2015

Healthcare and social service workers face significant risks of job-related violence and it is OSHA’s mission to help employers address…

Read more

Sandy Hook Advisory Commission releases Final Report

Active Shooter, Research/Studies, School/College/UniversityMarch 25, 2015

EXECUTIVE SUMMARY On the morning of December 14, 2012, Adam Lanza (―A.L. killed his mother, Nancy Lanza, while she slept…

Read more

Protecting Federal Facilities Remains A Challenge

Active Shooter, Crime Prevention, Research/Studies, Security Officers / Personnel, Terrorism, Workplace ViolenceJanuary 27, 2015

The Federal Protective Service continues to face challenges ensuring that contract guards have been properly trained and certified before being…

Read more

Independence requires Vendor Neutrality

Consulting, Independence, Research/Studies, TechnologyJanuary 19, 2015

Since it’s inception in 1997, Threat Analysis Group, LLC has been an independent security consulting company.  This means we are not…

Read more

Social Engineering in Action

InfoSecJanuary 16, 2015

Great video of people willingly giving away their passwords.  Unfortunately, real world social engineering yields similar results.   Jimmy Kimmel:…

Read more

Good editorial on Crime Prevention

Crime PreventionJanuary 16, 2015

What causes young inner-city men to kill each other? Where do we start? At the root causes of poverty, discrimination,…

Read more

2013 FBI Crime Statistics (Uniform Crime Report)

Crime Analysis, Research/StudiesNovember 17, 2014

  FBI releases 2013 Uniform Crime Report (crime statistics)

Read more

Conducted Electrical Weapons in the Healthcare Environment

Healthcare Security, TechnologyNovember 17, 2014

Conducted Electrical Weapons – also called Conducted Electrical Devices – are more commonly known as stun guns or TASERs (the…

Read more

FBI publishes Active Shooter study

Active ShooterSeptember 24, 2014

“In this study, the FBI identified 160 active shooter incidents, noting they occurred in small and large towns, in urban…

Read more

NIJs new CrimeSolutions.gov website

Crime Prevention, Optimization/Metrics/ROI, Research/StudiesSeptember 20, 2014

A new National Institute of Justice website, CrimeSolutions.gov, uses rigorous research to determine what works in criminal justice, juvenile justice, and…

Read more

FBI adds animal cruelty as crime against society in uniform crime report

Crime AnalysisSeptember 20, 2014

  Article on the new UCR crime Current Animal Cruelty Statistics from State UCR programs

Read more

Persuading Senior Management with Effective, Evaluated Security Metrics

Optimization/Metrics/ROI, Research/StudiesJuly 14, 2014

ASIS releases comprehensive study on the development and implementation of security metrics. Security metrics are vital, but in the field…

Read more

The ability to analyze a million crimes

Crime Analysis, Threat AssessmentJune 18, 2014

Opening paragraph of forthcoming article on Crime Analysis: With no better evidence than the pocket-sized computer most of have nearby…

Read more

Crime Analysis for Problem Solving Security Professionals in 25 Small Steps

Crime Analysis, Security Risk Assessment, Threat AssessmentJune 17, 2014

While the daily assessment of terror threats applies primarily to security professionals who are charged with protecting critical infrastructure assets,…

Read more

ASIS publishes a Security Business Case Development Guide

Consulting, Optimization/Metrics/ROI, Research/StudiesJune 12, 2014

This guide to developing a business case, written by the ASIS International Leadership and Management Practices Council, is designed to…

Read more

HBR: Data Driven Management Fears

Optimization/Metrics/ROI, Threat AssessmentJune 7, 2014

“From a management perspective, making decisions based on data is a clear win. Yet it’s often difficult to adopt a…

Read more

SIW: Liability for Installed Surveillance Cameras

Crime Prevention, Forensic Security, Research/StudiesMay 3, 2014

Interesting questions and good responses featured in SecurityInfoWatch.com: One of our clients is reluctant to install cameras because they believe…

Read more

Verbal De-escalation of the Agitated Patient

Healthcare SecurityApril 14, 2014

Consensus Statement of the American Association for Emergency Psychiatry Project BETA De-escalation Workgroup ABSTRACT:  Agitation is an acute behavioral emergency…

Read more

GAO recommends limiting funding for TSA Behavior Detection Activities

Terrorism, Threat AssessmentApril 9, 2014

In November 2013, GAO reported that (1) peer-reviewed, published research we reviewed did not support whether nonverbal behavioral indicators can…

Read more

LAX Active Shooter Report and Recommendations

Active ShooterMarch 20, 2014

Incident Background:  On November 1, 2013, a man carrying an assault rifle opened fire inside Terminal 3 on a busy…

Read more

National Incident Based Reporting System (NIBRS)

Crime AnalysisMarch 18, 2014

Created to improve the quantity and quality of crime data collected by law enforcement, the FBI UCR Program’s National Incident-Based…

Read more

Federal Security Officers lacking Active Shooter Training

Security Officers / PersonnelFebruary 28, 2014

“Several of the Department of Homeland Security’s (DHS) Federal Protective Service’s (FPS) guard requirements are generally comparable to those of…

Read more

Normal Crime Levels

Crime AnalysisJanuary 31, 2014

Emile Durkheim, a French sociologist, suggested that crime was not indicative of a pathology or illness in society, but at certain levels…

Read more

Newtown Report Published

Active ShooterNovember 26, 2013

EXECUTIVE SUMMARY The purpose of this report is to identify the person or persons criminally responsible for the twenty-seven homicides…

Read more

Shrink Cost Retailers $112 Billion, Averaging 1.4 Percent of Sales

Consulting, RetailNovember 12, 2013

“Shrink, comprised of shoplifting, employee or supplier fraud, organized retail crime and administrative errors, cost the retail industry more than…

Read more

FBI says violent crime increased 0.7% while property crime decreased 0.9% in 2012

Crime AnalysisOctober 24, 2013

“The FBI estimated that in 2012,  the number of violent crimes increased 0.7 percent, according to the figures released today.…

Read more

Home Invasion Robbery

Crime Analysis, Crime Prevention, SecurityOctober 1, 2013

“Home invasion robbery has characteristics of both residential burglary and street robbery. Like residential burglars, home robbers must usually gain…

Read more

Assigning Police Officers to Schools

School/College/UniversityOctober 1, 2013

“Police agencies have long provided services to schools. It has only been in the past two decades, however, that assigning…

Read more

The Criminology of Place

Crime Analysis, Crime Prevention, Research/StudiesSeptember 27, 2013

“The study of crime has focused primarily on why particular people commit crime or why specific communities have higher crime…

Read more

School Security Research

Research/Studies, School/College/University, Security Officers / Personnel, TechnologySeptember 16, 2013

“The National Association of School Psychologists cautions against over-emphasizing extreme physical security measures or universally increasing armed security in schools…

Read more

Perception vs. Reality: Neighborhood Security

Crime Analysis, Crime PreventionAugust 15, 2013

“Your perception of any city or neighborhood is largely determined by things you can’t quantify, like the vague feeling that…

Read more

3-D Printed Keys

TechnologyAugust 14, 2013

“MIT Students Release Program To 3D-Print High Security Keys” Forbes Article Thanks to SRB for sharing this story.

Read more

Violence and Climate

Research/StudiesAugust 4, 2013

“Shifts in climate are strongly linked to increases in violence around the world, a study suggests.  US scientists found that…

Read more

Crime Prevention Equals Crime Reduction

Consulting, Security Risk AssessmentJuly 25, 2013

Security is rarely a popular subject from the organizational perspective.  Because it is typically a cost item, with little immediate…

Read more

Optimizing Security through Crime Analysis

Crime AnalysisJuly 18, 2013

Typically, security is one of those budget line items that does not contribute directly to a company’s bottom line, and…

Read more

Security is not a Dichotomy

Security Risk AssessmentJuly 12, 2013

Security is often addressed as something that is either present or absent.  However, security is not a dichotomy.  Security is…

Read more

The Spectrum of Guidance

Consulting, Research/StudiesJuly 5, 2013

When evaluating security, consultants apply a spectrum of guidance when developing recommendations.  The spectrum begins at one end with the…

Read more

LED Lighting for Security Applications

TechnologyJune 15, 2013

“A business case can be easily made for a transition to white LED lighting. Here’s an overview of the benefits,…

Read more

Implementing Standards

Standards and GuidelinesJune 9, 2013

In recent years, security and non-security industry associations have developed security standards that address various aspects of a security program…

Read more

Crime in Hospitals

Healthcare SecurityMay 5, 2013

Increasingly, we’re seeing crimes occurring in hospitals by people who “look” like they belong.  Scrubs or lab coats are the…

Read more

Aviation Security

Security, TerrorismApril 29, 2013

“Aviation security is costly, controversial, and contentious; no other security measures directly affect such a large portion of the country’s…

Read more

Ingenuity by Burglar

Crime PreventionApril 12, 2013

“DALWORTHINGTON GARDENS — The discovery of a hidden camera may help solve a series of break-ins at upscale homes in…

Read more

Use of Force by Security Officers

Consulting, Security Officers / Personnel, Standards and GuidelinesMarch 19, 2013

Allegations of excessive use of force are common in both law enforcement and security.  The article and video below illustrate…

Read more

Security Operations Center (Command Center) Metrics

Optimization/Metrics/ROIFebruary 10, 2013

Security Technology Executive has a good article on critical metrics for Security Operations Centers. Critical metrics include Transfer rates, Staff…

Read more

ASIS-International begins development of [Security] Risk Assessment Standard

Security Risk AssessmentJanuary 18, 2013

The new Risk Assessment standard will be developed jointly between ASIS International (ASIS) and RIMS (the Risk and Insurance Management…

Read more

Reducing Fear of Crime

SecurityDecember 10, 2012

Key assumptions for Reducing the Fear of Crime: Fear matters—it negatively affects individuals and communities. Fear is real—while it is…

Read more

FBI releases 2011 Uniform Crime Reports

Crime Analysis, Optimization/Metrics/ROI, Research/StudiesDecember 10, 2012

“The FBI’s UCR Program is a nationwide, cooperative statistical effort of more than 18,000 city, university and college, county, state,…

Read more

FBI Report on Terrorism (2011)

TerrorismDecember 10, 2012

“Over 10,000 terrorist attacks occurred in 2011, affecting nearly 45,000 victims in 70 countries and resulting in over 12,500 deaths.…

Read more

FBI National Gang Threat Assessment (2011)

Research/StudiesDecember 10, 2012

“Gangs are expanding, evolving and posing an increasing threat to US communities nationwide. Many gangs are sophisticated criminal networks with…

Read more

More Lawyers Using Security Videos As Evidence

TechnologyDecember 10, 2012

“Security video still may be a novelty in civil cases, but it is a familiar and effective tool for criminal…

Read more

Possible indicators of terrorist activity in hotels

Crime Prevention, TerrorismNovember 9, 2012

Known or possible terrorists have displayed suspicious behaviors while staying at hotels overseas—including avoiding questions typically asked of hotel registrants;…

Read more

Failure to Properly Design and/or Install Security Systems

Security, TechnologyOctober 26, 2012

The failure to properly design and/or install Security Systems can have significant repercussions and may result in injuries.  A recent…

Read more

Security Risk Formula Redux

Security, Security Risk AssessmentOctober 19, 2012

Copyright 2012 Threat Analysis Group, LLC   Excellent explanation and examples of how assets, threats, and vulnerabilities impact Security Risk:…

Read more

Shootings in Hospitals

Healthcare SecuritySeptember 24, 2012

A new study entitled, Hospital-Based Shootings in the United States: 2000 to 2011, concludes “Although it is likely that not every…

Read more

Security Metrics

Optimization/Metrics/ROISeptember 17, 2012

Security metrics come in a wide variety of flavors and few are applicable to all type of enterprises.  Security metrics…

Read more

Retail Theft

RetailAugust 30, 2012

According to the 24th Annual Retail Theft Survey, both the apprehensions and recovery dollars from shoplifters and dishonest employees rose; up…

Read more

Cloud and Online Vulnerabilities

InfoSecAugust 7, 2012

This is an excellent, yet sad, article regarding online and cloud vulnerabilities.   “In the space of one hour, my…

Read more

Security Flaws in some Hotel Room Locks

Hotel/Motel, SecurityAugust 2, 2012

“At the Black Hat security conference Tuesday evening, a Mozilla software developer and 24-year old security researcher named Cody Brocious…

Read more

Hospital Crimes, as reported to Joint Commission, Continues to Rise

Crime Analysis, Healthcare SecurityJuly 27, 2012

Criminal Events (Assaults, Rapes, and Homicides), reported to TJC, increased from 28 in 2010 to 49 in 2011   Joint…

Read more

A Primer on Place-Based Crime Prevention

Crime Prevention, Research/Studies, SecurityJuly 21, 2012

“Criminologists and crime prevention practitioners are increasingly aware of the importance of places of crime. A place is a very…

Read more

Calling all Hospital Security Directors and Managers

Healthcare SecurityJuly 20, 2012

As you know, justifying security FTE’s is a challenge, particularly in tight economic conditions. In an effort to assist the…

Read more

The Public Sector is catching up

Consulting, Crime AnalysisJuly 9, 2012

“Predictive-analytics software is the latest piece of policing technology working its way into law-enforcement stations around the country….it calculates its…

Read more

Security Officer Use of Force

Security, Security Officers / PersonnelJuly 9, 2012

The International Association of Professional Security Consultants (IAPSC), the most respected and widely recognized consulting association in the security industry,…

Read more

IAHSS publishes Security Design Guidelines

Healthcare SecurityJune 14, 2012

SIW:  “The International Association for Healthcare Security & Safety announced that it has released a new handbook on “Design and…

Read more

ASIS releases Physical Asset Protection standard

Standards and GuidelinesMay 25, 2012

Security Management Standard: Physical Asset Protection (2012) This Standard presents a comprehensive management approach for the protection of assets by…

Read more

Crime in Schools and Colleges

School/College/UniversityMay 11, 2012

Crime in Schools and Colleges:  A Study of Offenders and Arrestees Reported via National Incident-Based Reporting System Data   “Schools…

Read more

Internet Crime Report

InfoSecMay 11, 2012

“In 2011, the Internet Crime Complaint Center (IC3) actively pursued its mission to address crimes committed using the Internet, providing…

Read more

Metrics for Security Staffing

Consulting, Healthcare Security, Optimization/Metrics/ROI, SecurityApril 25, 2012

At the International Association for Healthcare Security and Safety conference in May 2012, we are presenting “A Model for Predicting…

Read more

ASIS releases new standard: Management System for Quality of Private Security Company Operations

Standards and GuidelinesApril 23, 2012

Management System for Quality of Private Security Company Operations – Requirements with Guidance (2012) This Standard builds on the Montreux…

Read more

Review says Ohio hospital has security problems that could jeopardize patient safety

Healthcare SecurityApril 12, 2012

“CHILLICOTHE, Ohio — The government plans to end federal Medicare funding to a central Ohio hospital after inspectors said security…

Read more

2011 National Gang Threat Assessment

Threat AssessmentMarch 8, 2012

“Gangs are expanding, evolving, and posing an increasing threat to U.S. communities. That’s the bottom line of the just-released 2011…

Read more

Understanding Risky Facilities

Crime PreventionFebruary 21, 2012

Building on their past research on situational crime prevention, Drs. Clarke and Eck explain the concept of risky facilities in…

Read more

Spike in Violent Incidents in Hospitals

Healthcare SecurityJanuary 31, 2012

“Over the past decade, hospitals across the nation have been subject to an alarming increase in violent incidents; in the…

Read more

Latest Problem Oriented Policing Guide addresses Sexual Assaults

Crime PreventionJanuary 27, 2012

This guide begins by describing the problem of sexual assault of women by strangers and reviewing factors that increase its…

Read more

The Concept of Security

SecurityJanuary 27, 2012

Bruce Schneier’s excellent explanation of the Concept of Security You Tube Video

Read more

Pharmacy Robbery on the rise

Healthcare Security, Research/StudiesJanuary 16, 2012

“Over the past three years, at least 1,800 pharmacy robberies have occurred across the country.”  The Drug Enforcement Administration report…

Read more

Informative article on Hospital Security

Healthcare SecurityJanuary 16, 2012

“Hospitals — long considered places of healing — have experienced an increase in violent crimes in the last decade.  In…

Read more

Follow the 10 Year Olds

SecurityJanuary 5, 2012

For as long as memory serves, following the smokers helped identify access control weaknesses and hiding spots around a campus…

Read more

Actual Crime Data: a Key Metric for Security

Crime AnalysisDecember 6, 2011

Security professionals operating in today’s increasingly competitive environments face the unique challenge of providing security that reduces crime and loss,…

Read more

Interesting Perspective on Walls

SecurityDecember 2, 2011

  New York Times Wall  

Read more

Hospital Security Managers & Directors: We need your help

Security Officers / PersonnelNovember 28, 2011

We are working on a project to identify industry benchmarks for security officer staffing levels. It is recognized that hospitals have…

Read more

The Future of Access Control?

TechnologyNovember 10, 2011

Smart Phones already double as cameras, navigation systems, personal assistants, and soon, they’ll be unlocking our doors using Near Field…

Read more

Infant Abduction foiled by Alert Staff

Healthcare SecurityNovember 10, 2011

This is a good example of the positive impact on staff security awareness training. Article

Read more

ENA Violence in Emergency Department Study released

Healthcare SecurityNovember 5, 2011

Nine hundred deaths and 1.7 million nonfatal assaults occur each year in the United States due to workplace violence. These…

Read more

The Downside Of Biometrics [Fast Company]

TechnologyOctober 24, 2011

“Biometrics are the next big thing in government and homeland security.”   Fast Company article

Read more

IHSSF publishes study on Prisoner Escapes from Hospitals

Healthcare SecurityOctober 21, 2011

The International Healthcare Security and Safety Foundation recently published a study on hospital escapes by forensic (prisoner) patients.   2011…

Read more

Cloud Security White Paper

InfoSecOctober 8, 2011

The Cloud Security Alliance’s Security as a Service working group releases white paper to identify consensus definitions of what Security…

Read more

Time Magazine: 5 Weird Things People Are Stealing While the Economy’s in Bad Shape

Crime AnalysisOctober 8, 2011

“Robbing a bank is so unoriginal. Because of a combination of an economy in horrific shape and the rising monetary…

Read more

Security Risk Assessment Process Flow Chart

Security Risk AssessmentOctober 6, 2011

Threat Analysis Group, LLC has redesigned the Security Risk Assessment Flow Chart.  The latest version of the flow chart, seen…

Read more

Study says Real-Time Monitored Public Surveillance Cameras are Effective

Crime Prevention, Research/StudiesSeptember 29, 2011

“Between 2007 and 2010, researchers from the Urban Institute’s Justice Policy Center studied public surveillance systems in Baltimore, Chicago, and…

Read more

Law Enforcement and Private Sector collaborating on Organized Retail Crime

RetailSeptember 23, 2011

Government Accountability Office:  Retailers collaborate with law enforcement agencies to detect and deter retail theft and investigate potential ORC cases,…

Read more

Mississippi Town requires Convenience Stores to have Security Officers

Retail, Security Officers / PersonnelSeptember 9, 2011

In a 4-2 vote, the Jackson City Council on Tuesday approved an ordinance requiring convenience stores to have a security…

Read more

Fast Company: Crime Information Warehouse

Crime AnalysisSeptember 7, 2011

“A new crime-busting warehouse is helping officers spot crime trends as they develop in real time. IBM’s Crime Information Warehouse…

Read more

Super Controllers and Crime Prevention

Crime PreventionAugust 30, 2011

Security Journal has an excellent article entitled:  Super controllers and crime prevention: A routine activity explanation of crime prevention success…

Read more

Security Staffing Approaches

SecurityAugust 23, 2011

A new report by the Government Accountability Office (GAO) identifies various security staffing approaches used by government agencies.  The purpose of…

Read more

Feedback Loops Enhance Security Efforts

Optimization/Metrics/ROIAugust 15, 2011

A recent article on Feedback Loops in Wired Magazine suggests that is we “provide people with information about their actions in…

Read more

What is a security mix?

Crime PreventionAugust 3, 2011

A security mix is a combination of security measures that, when properly deployed, can effectively protect assets. A good security…

Read more

Violence in Mental Hospitals is “Normal”

Healthcare SecurityJuly 21, 2011

“Thousands of assaults occur each year at California’s state psychiatric hospitals. Last October, a patient allegedly murdered a staffer at Napa…

Read more

Hospital Security Articles

Consulting, Crime Analysis, Crime Prevention, Healthcare Security, SecurityJune 30, 2011

Over the past couple of years, Threat Analysis Group, LLC has published several articles on hospital security.  The articles address…

Read more

Two Documents Address Crime Analysis and Metrics-Driven Decision Making

Crime Analysis, Crime Prevention, SecurityJune 16, 2011

Two comprehensive documents address crime analysis as a tool for metrics/data-driven decision making.  While one is geared to law enforcement…

Read more

LA Times: Rising violence shows hospitals should boost security

Healthcare SecurityJune 1, 2011

“Hospitals have long been considered sacrosanct – places for healing and helping – but they are no longer immune to…

Read more

FBI says violent crime down 5.5 percent

Crime AnalysisMay 31, 2011

“Preliminary figures indicate that, as a whole, law enforcement agencies throughout the Nation reported a decrease of 5.5 percent in…

Read more

Violence Prevention & Response Toolkit

Healthcare SecurityApril 22, 2011

The Emergency Nurses Association created a Workplace Violence Toolkit designed specifically for the emergency department managers and is also useful…

Read more

Hospital staff push back after police officers are replaced with security officers

Healthcare SecurityApril 15, 2011

“Nurses at St. Joseph’s Hospital in St. Paul are sounding alarms over a change in emergency room security staff.  In…

Read more

Woman poses as doctor, diagnoses patients

Healthcare SecurityApril 15, 2011

A lack of security policy or a lack of policy enforcement?   Toronto Globe Article

Read more

NCJRS posts Security 101 document

Crime Prevention, Security Risk Assessment, Standards and GuidelinesApril 14, 2011

The National Criminal Justice Reference Service recently published a literature review and secondary data analysis entitled, “The Private Security Industry:…

Read more

The Security Continuum

Crime Prevention, SecurityApril 1, 2011

The Security Continuum includes four distinct security strategies – – – Deterrence, Prevention, Mitigation, and Investigation. Deterrence is designed to…

Read more

Another Perspective on Threats vs Vulnerabilities

Crime Prevention, SecurityMarch 24, 2011

A paper in the Journal of Physical Security defined threats and vulnerabilities as follows: Threat: Who might attack against what…

Read more

Who is in your facility?

Crime Analysis, Healthcare SecurityMarch 10, 2011

As many security professionals of open campuses know, identifying who is coming on your property is challenging.  Keeping the bad…

Read more

Hospital Security and the threat of active shooters

Healthcare SecurityFebruary 9, 2011

From Campus Safety Magazine: “In June, the Joint Commission issued a  Sentinel Event Alert urging hospitals to pay greater attention…

Read more

IAHSS 2011 Conference

Healthcare SecurityJanuary 13, 2011

IAHSS and the Ontario Chapter will host the 43rd Annual General Membership Meeting and Seminar Program May 22-25, 2011 at…

Read more

CCTV cameras help solve ‘six crimes a day’ in London

Crime PreventionDecember 28, 2010

Despite recent studies to the contrary, London’s Metro Police says CCTV cameras help solve ‘six crimes a day’ in London.…

Read more

WSJ: Hospital employee allegedly steals $3.8 million

Healthcare SecurityDecember 4, 2010

The internal threat, while not unique to the health care environment, is pervasive and can have a significant impact on…

Read more

Active Shooter Guidance for Hospitals

Healthcare SecurityDecember 3, 2010

According to the California Hospital Association, “An active shooter is defined as an individual who appears to be actively engaged…

Read more

Quick Hits

Research/StudiesDecember 3, 2010

Charles A. Sennewald’s Effective Security Management 5th Edition has been announced with an updated chapter on Statistics as a Management…

Read more

An example of a Hospital Active Shooter Drill gone bad

Healthcare SecurityNovember 11, 2010

“An off-duty cop pretending to be a terrorist stormed into a hospital intensive care unit brandishing a handgun, which he…

Read more

Ten Principles of Opportunity and Crime

Crime PreventionOctober 21, 2010

1. Opportunities play a role in causing all crime 2. Crime opportunities are highly specific 3. Crime opportunities are concentrated…

Read more

Are you maximizing existing security resources?

Optimization/Metrics/ROISeptember 24, 2010

On the heals of a significant security breach or crime, organizations often beef up security by adding more security personnel,…

Read more

Crime Analysis for Problem Solving Security Professionals in 25 Small Steps

Crime AnalysisSeptember 1, 2010

The mission of the Center for Problem-Oriented Policing is to advance the concept and practice of problem-oriented policing in open…

Read more

Physical vs. Operational Security Assessments

ConsultingAugust 24, 2010

Does your security consultant or internal security staff assess both physical and operational aspects of the security program?  We often…

Read more

ER Nurses fear more assaults as programs cut

Healthcare SecurityAugust 12, 2010

Nurses fear even more ER assaults as programs cut By JULIE CARR SMYTH (AP) COLUMBUS, Ohio — Emergency room nurse…

Read more

California Department of Public Health addresses hospital security

Healthcare SecurityJuly 28, 2010

The law requires, after July 1, 2010, all licensed GACHs, APHs, and SHs to conduct, not less than annually, a…

Read more

New Mom Questions Hospital’s Security Following Beating

Healthcare SecurityJuly 22, 2010

A mother who was attacked after giving birth at a Milwaukee hospital is calling for increased security at the facility. …

Read more

Infant Abduction Statistics

Healthcare SecurityJuly 19, 2010

The National Center for Missing and Exploited Children updated their statistics for 2009 and which date back to 1983.  Infant…

Read more

Four Bullets = Two Shootings at One Hospital

Healthcare SecurityJuly 16, 2010

On the heals of Joint Commission’s alert on hospital violence, the Cleveland Clinic experienced two shootings, one self inflicted, one…

Read more

IAPSC Texas Security Conference 9/15/10

ConsultingJuly 7, 2010

The International Association of Professional Security Consultants is hosting its first regional security conference in Texas.  Building on successful regional…

Read more

Joint Commission: Crime up in hospitals

Healthcare SecurityJune 4, 2010

“Once considered safe havens, health care institutions today are confronting steadily increasing rates of crime, including violent crimes such as…

Read more

Catastrophic Health Events Report Released

Healthcare SecurityJune 3, 2010

The Center for Biosecurity at UPMC recently released a  Preparedness Report that proposes the following key elements of a national…

Read more

The Value of Interviews in Security Risk Assessments

ConsultingJune 3, 2010

People that work at the facility have a better understanding of the security problems than I do when I first…

Read more

Schneier on Security: Why Aren’t There More Terrorist Attacks?

TerrorismMay 9, 2010

Bruce Schneier is an internationally renowned security technologist and author. Described by The Economist as a “security guru,” he is…

Read more

Threat, vulnerability, risk – commonly mixed up terms

ConsultingMay 3, 2010

What are the most commonly mixed up security terms? Threat, vulnerability, and risk. While it might be unreasonable to expect…

Read more

Do security officers know what they are protecting?

Security Officers / PersonnelApril 30, 2010

In most cases, there is a fairly obvious answer to this question. Typically, security personnel are deployed in the protection…

Read more

Vulnerability and Risk Assessment in the Environment of Care

Healthcare SecurityApril 16, 2010

Vulnerabilities are opportunities, opportunities for crime, opportunities for rule breaking violations, opportunities for loss.  By definition, a vulnerability is a…

Read more

Return on Security Investment

Optimization/Metrics/ROIApril 12, 2010

Organizations can obtain a measurable return on investment through cost savings on security personnel deployment, effective implementation of physical security…

Read more

What types of threats should you be looking at?

ConsultingApril 9, 2010

What types of threats should you be looking at? From a security perspective, a threat is an act or condition…

Read more

Designing Security in Hospitals

Consulting, Healthcare SecurityMarch 17, 2010

You’re a very busy hospital security manager.  At 2 pm on one of your normal busy days, you receive a…

Read more

What is Data Driven Security?

Optimization/Metrics/ROIMarch 11, 2010

Data driven security is a concept utilized by organizations operating in a constantly changing environment to effectively manage the dynamic…

Read more

Hospital Security

Healthcare SecurityFebruary 21, 2010

Securing the environment of care is a challenging and continual effort for most healthcare security managers, who face unique challenges…

Read more

What to look for in a security consultant….

ConsultingFebruary 21, 2010

Like all professional services, security consultants are a diverse group.  Many have years of experience while others have just entered…

Read more

Independent Security Consultant

ConsultingFebruary 21, 2010

An independent security consultant maintains his/her integrity at all times. An independent security consultant is not affiliated with any manufacturer…

Read more
Load more
Threat Analysis Group
© Threat Analysis Group, LLC - All rights reserved.

Experts in Security Risk Reduction and Evidence-Based Outcomes
(281) 494-1515info [at] threatanalysis.com

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Go to Top