Breaking: HID Global to buy Mercury Security Products from ACRE LLC

ACQUISITION HID Global, a subsidiary of ASSA ABLOY, is on the cusp of acquiring Mercury Security Products from ACRE LLC, the group that owns Vanderbilt Industries and ComNet. Founded in 1992 Mercury Security Products supplies OEM access control hardware, with an installed base of four million control panels worldwide. HID Global, which was acquired by ASSA ABLOY in 2000, develops products, services and solutions related to the creation, management and use of secure identities .

Headquartered in Austin, Texas, the company has over 3,200 employees worldwide and operates in more than 100 countries. Subject to regulatory approval and customary closing conditions, the deal is expected to go through in the final quarter of 2017. Financial terms of the agreement are not being publicly disclosed. Houlihan Lokey Capital Inc and Raymond James & Associates Inc acted as financial advisors to ACRE and Mercury. Strategic move Divesting Mercury after many years of success since ACRE purchased the business in 2013 is a strategic move that allows ACRE to focus on its core access control, video and intrusion businesses under the Vanderbilt and ComNet brands, said ACRE CEO Joseph Grillo. HID is the perfect home to provide for the continued growth and success of Mercury, which will remain a valued technology supplier to Vanderbilt. We caught up with Grillo, who came third in our roll call of the top 10 influencers among security manufacturers/service providers 2017, at IFSEC 2017, where he emphasised that ACRE is still very much in the market for more acquisitions.

ACRE (Access Control Related Enterprises) has acquired several security businesses since it was formed in 2012 by Grillo, including Schlage SMS from Ingersoll Rand in 2012, Mercury itself in 2013, the Security Products Division of Siemens AG in 2014, and Access Control Technology (ACT) and ComNet in 2016.

Related Topics Eagle Eye Networks acquires Panasonic Cloud Management Services Europe BV Veracity acquires command and control specialist iComply FLIR Systems acquires developer behind world s smallest drone: Prox Dynamics

Eagle Eye Networks introduces analytics to the Eagle Eye Cloud Security Camera VMS

cloud surveillance Eagle Eye Networks has released the first phase of its video analytics platform, which offers users line crossing, intrusion detection and object counting functions within the Eagle Eye Cloud Security Camera VMS. Businesses needn t necessarily replace existing cameras to install Eagle Eye Analytics, because it will function on any camera including analogue variants that is supported by the Eagle Eye Cloud Security Camera VMS. Here are some advantages that the platform offers by dint of being cloud-based, according to Eagle Eye Networks: Cloud benefits Rapid deployment Users needn t install additional hardware or software to access the analytics, which are activated from the web dashboard or mobile app No requirement for on-site technicians, remote project management or system replacement Available to customers for as little as $4-5 per camera, per month Analytics functions Line crossing.

Detects when an object crosses a virtual line. Users can specify direction and can receive notifications. Useful for receiving notifications when a security boundary (eg a fence, restricted area or one-way road) is crossed. Also well suited to monitoring building entrances, loading docks and parking lots. Intrusion detection. Detects when an object encroaches into an area defined by the customer, generating an instant notification. Object counting. Counting how many objects cross a line in both directions, object counting is useful for counting cars as well as people. Total daily count and current count delta are displayed.

Offering benefits beyond just security, the analytics generates meaningful insights from which businesses especially retailers can optimise processes and enhance customer experience. Eagle Eye Networks says The Eagle Eye Cloud Security Camera VMS Analytics are a true cloud solution that are available on demand, per camera, instantly activated, and customers are only charged for what they use, says Eagle Eye Network s founder and CEO, Dean Drako. Over the next few years, customers will have the option to turn on more sophisticated analytics as Eagle Eye Networks cloud-based model leads the physical security industry in making analytics more functional and more accessible. A customer says If cloud-based solutions appeal to large enterprises on account of their rapid scalability, then smaller businesses that choose them often do so because they unburden them of so many system management and maintenance tasks. Aaron Diaz, owner of Gulf Coast Hardware stores in Southwest Florida, explains how he intends to deploy the new analytics platform: Our store is nearly 6,000 square feet with additional outside retail areas and I m really excited about the ability to receive alerts based on activity in areas I specify. The counting will come in handy for me to gain a better understanding of the number of visitors (daily), who may or may not make a purchase. About Eagle Eye Networks Founded in Austin, Texas in 2012, Eagle Eye Networks has in a short space of time become the undisputed leader of cloud-based video surveillance solutions in North America. Having acquired Panasonic Cloud Management Services Europe BV in June 2017, it can now claim dominance of the European market too. Eagle Eye Networks, which also has offices in Asia, supports cloud and on-premise recording as well as both digital and analogue cameras all accessed via the web or mobile applications.

The company says it offers bank-level security and encryption. Eagle Eye s RESTful API platform and Big Data Video Framework accommodates indexing, search, retrieval, and analysis of live and archived video. Eagle Eye s open Video API has facilitated integrations with alarm monitoring, third party analytics, security dashboards, and point of sale system integrations.

Eagle Eye sells its products through authorised global resellers and installation partners. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals. Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Click here to Download now

Eagle Eye Networks acquires Panasonic Cloud Management Services Europe BV

Cloud-based video surveillance Eagle Eye Networks has acquired Panasonic Cloud Management Services Europe BV (PCMSEU), whose flagship products are Panasonic Cameramanager and Panasonic Nubo. The two companies operate in the same market cloud-based video surveillance with Eagle Eye Networks the dominant force in North America and PCMSEU the clear European leader. PCMSEU operates more cloud-recorded cameras than any other company in Europe by some distance.

The acquisition of CMSEU gives Eagle Eye Networks a bridgehead into the European market and creates a truly global player in a still nascent cloud surveillance market that is growing at a much faster rate than the conventional DVR/NVR segment. Panasonic Cloud Management Services Europe BV will be renamed Eagle Eye Networks BV. Serving as the European headquarters for Eagle Eye, the European giant will now sell and support the expanded Eagle Eye product line. Our dealers in Europe have responded with overwhelming support for this acquisition. It will greatly enhance our sales and support efforts in the European market, said Dean Drako, CEO of Eagle Eye Networks. The strong and experienced team in cloud video surveillance at our new Eagle Eye EMEA headquarters will make it possible for us to provide a tremendous level of support to all of our dealers in the region. Eagle Eye Networks are exhibiting at IFSEC International between 20-22 June 2017 at London ExCeL. You will find th em on stand C1025 . Get your free badge now.

The Eagle Eye NuboCam All PCMSEU employees will be retained following the deal. Cameramanager co-founders Rishi Lodhia and Tijmen Vos will remain with the company as managing director and technical director of Eagle Eye Networks EMEA respectively. Said Rishi Lodhia: This is a unique opportunity to bring two pioneers in cloud video surveillance together and deliver a broad portfolio of innovative cloud surveillance solutions. Eagle Eye and Cameramanager dealers worldwide will now have a wider selection of cloud video products to meet their customers needs. Panasonic Cameramanager, on which small and medium businesses can watch and manage live and recorded surveillance footage from their smartphone, will be renamed Eagle Eye CameraManager. Eagle Eye plans to expand global sales of CameraManager to meet demand for direct camera to cloud connectivity. CameraManager cloud surveillance products boast optional storage methods, motion detection, push notifications and cloud based video analytics. Lacking the onsite bridge device of the Eagle Eye Cloud Security Camera VMS, the CameraManager solution can be more cost-effective for smaller camera counts per location. Eagle Eye Cameramanager Eagle Eye Networks BV will continue to sell Eagle Eye Cloud Security VMS in Europe to customers that prioritise camera interoperability and have high camera counts.

Eagle Eye Cloud Security Camera VMS supports more than 1,000 different digital cameras, over 10,000 different analogue cameras, up to 10 years of video retention and very large camera counts. Panasonic Nubo, which becomes Eagle Eye NuboCam, is an LTE camera and was the world s first mobile video monitoring surveillance camera when it launched in 2015. Datacenters Eagle Eye Networks operates datacenters in California, Texas, Canada, Japan (two), the UK and thanks to the acquisition two in the Netherlands. Eagle Eye Networks are exhibiting at IFSEC International between 20-22 June 2017 at London ExCeL. You will find th em on stand C1025 . Get your free badge now. Visit Europe s only large-scale security event in 2017 Taking place in London, 20 22 June 2017, IFSEC International gives you exclusive hands-on access to over 10,000 security solutions, live product demonstrations, and networking with over 27,000 security professionals.

Covering every aspect of security, from access control and video surveillance to smart buildings, cyber, border control and so much more.

Time is running out, register now to avoid missing out

Public security – Wikipedia

From Wikipedia, the free encyclopedia See also: public safety

Public security is the function of governments which ensures the protection of citizens, organizations, and institutions against threats to their well-being and to the prosperity of their communities.1

To meet the increasing challenges in the public security area, responsible public institutions and organisations can tap into their own intelligence to successfully address possible threats in advance. They optimise their internal structures, use synergies, and carefully balance costs and benefits of their measures.


Organised crime and international terrorism are hardly deterred by geographical, linguistic, or financial barriers. Competence and administrative hurdles play into their hands. The latter has largely contributed to public security becoming an important political and economic issue, nationally as well as internationally. Politics, public organisations and businesses closely collaborate to guarantee public security and maintain a stable environment for economic prosperity.

Although public security significantly contributes to the attractiveness of a location, the productivity of its people, and hence the overall success of an economy, the sector frequently suffers from low budgets, limited resources, and inadequate information systems. Large events, pandemics, severe accidents, environmental disasters, and terrorism attacks pose additional threats to public security and order.

The police, federal police and border authorities nonetheless need to warrant the security of the country as a fundamental prerequisite for the domestic political ability to act. The quality and scope of potential threats have changed significantly, and the tasks and general framework for the police, federal police and border authorities have changed accordingly.





There are five sub-sectors within public security:

Law enforcement

Police Services:

Intelligence and information sharing

Emergency Management

Emergency Services:


Justice Services:

Interior services:

Global public security

See also: Criminal justice system

  • There are ever new hot spots and crises representing new challenges for public security globally
  • A worldwide collaboration across all areas of public security becomes ever more important due to global threats
  • The vision of politics and the industry is maximum integration of all organisations and systems
  • This vision is reflected in the past, current, and expected future investments
  • International congresses and fairs are also dominated by issues of optimal integration / collaboration

See also

External links

  1. ^ http://cradpdf.drdc-rddc.gc.ca/PDFS/unc131/p538238_A1b.pdf

Authority control

Public Security - Wikipedia Retrieved from “https://en.wikipedia.org/w/index.php?title=Public_security&oldid=737632978

Public health surveillance

From Wikipedia, the free encyclopedia

Public health surveillance (also epidemiological surveillance, clinical surveillance or syndromic surveillance) is, according to the World Health Organization (WHO), “the continuous, systematic collection, analysis and interpretation of health-related data needed for the planning, implementation, and evaluation of public health practice.”1 Public health surveillance may be used to “serve as an early warning system for impending public health emergencies; document the impact of an intervention, or track progress towards specified goals; and monitor and clarify the epidemiology of health problems, to allow priorities to be set and to inform public health policy and strategies.”1

The term applies to surveillance of populations and is distinct from active surveillance, which applies to individuals. Techniques of public health surveillance have been used in particular to study infectious diseases. Many large institutions, such as the WHO and the CDC, have created databases and modern computer systems (public health informatics) that can track and monitor emerging outbreaks of illnesses such as influenza, SARS, HIV, and even bioterrorism, such as the 2001 anthrax attacks in the United States. Many regions and countries have their own cancer registry, one function of which is to monitor the incidence of cancers to determine the prevalence and possible causes of these illnesses.

Other illnesses such as one-time events like stroke and chronic conditions such as diabetes, as well as social problems such as domestic violence, are increasingly being integrated into epidemiologic databases called disease registries that are being used in cost-benefit analysis in determining governmental funding for research and prevention. Systems that can automate the process of identifying adverse drug events, are currently being used, and are being compared to traditional written reports of such events.2 These systems intersect with the field of medical informatics, and are rapidly becoming adapted by hospitals and endorsed by institutions that oversee healthcare providers (such as JCAHO in the United States). Issues in regards to healthcare improvement are evolving around the surveillance of medication errors within institutions.3

Syndromic surveillance

See also: Disease surveillance

Syndromic surveillance is the analysis of medical data to detect or anticipate disease outbreaks. According to a CDC definition, “the term ‘syndromic surveillance’ applies to surveillance using health-related data that precede diagnosis and signal a sufficient probability of a case or an outbreak to warrant further public health response. Though historically syndromic surveillance has been utilized to target investigation of potential cases, its utility for detecting outbreaks associated with bioterrorism is increasingly being explored by public health officials.”4

The first indications of disease outbreak or bioterrorist attack may not be the definitive diagnosis of a physician or a lab.

Using a normal influenza outbreak as an example, once the outbreak begins to affect the population, some people may call in sick for work/school, others may visit their drug store and purchase medicine over the counter, others will visit their doctor’s office and other’s may have symptoms severe enough that they call the emergency telephone number or go to an emergency room. Syndromic surveillance systems monitor data from school absenteeism logs, emergency call systems, hospitals’ over-the-counter drug sale records, Internet searches, and other data sources to detect unusual patterns. When a spike in activity is seen in any of the monitored systems disease epidemiologists and public health professionals are alerted that may be an issue. An early awareness and response to a bioterrorist attack could save many lives and potentially stop or slow the spread of the outbreak.

The most effective syndromic surveillance systems automatically monitor these systems in real-time, do not require individuals to enter separate information (secondary data entry), include advanced analytical tools, aggregate data from multiple systems, across geo-political boundaries and include an automated alerting process.5

A syndromic surveillance system based on search queries was first proposed by Gunther Eysenbach, who began work on such a system in 2004.6 Inspired by these early, encouraging experiences, Google launched Google Flu Trends7 in 2008. More flu-related searches are taken to indicate higher flu activity. The results closely match CDC data, and lead it by – 1 2 weeks. The results appeared in Nature.8 More recently, a series of more advanced linear and nonlinear approaches to influenza modelling from Google search queries have been proposed.9 Extending Google‘s work researchers from the Intelligent Systems Laboratory (University of Bristol, UK) created Flu Detector;10 an online tool which based on Information Retrieval and Statistical Analysis methods uses the content of Twitter to nowcast flu rates in the UK.11


Influenzanet is a syndromic surveillance system based on voluntary reports of symptoms via the internet. Residents of the participant countries are invited to provide regular reports on the presence or absence of flu related symptoms. The system has been in place and running since 2003 in the Netherlands and Belgium. The success of this first initiative led to the implementation of Gripenet in Portugal in 2005 followed by Italy in 2008 and Brasil, Mexico, and the United Kingdom in 2009.

Laboratory-based surveillance

Some conditions, especially chronic diseases such as diabetes mellitus, are supposed to be routinely managed with frequent laboratory measurements. Since many laboratory results, at least in Europe and the US, are automatically processed by computerized laboratory information systems, the results are relatively easy to inexpensively collate in special purpose databases or disease registries. Unlike most syndromic surveillance systems, in which each record is assumed to be independent of the others, laboratory data in chronic conditions can be theoretically linked together at the individual patient level. If patient identifiers can be matched, a chronological record of each patient’s laboratory results can be analyzed as well as aggregated to the population level. Laboratory registries allow for the analysis of the incidence and prevalence of the target condition as well as trends in the level of control. For instance, an NIH-funded program called the Vermedx Diabetes Information System12 maintained a registry of laboratory values of diabetic adults in Vermont and northern New York State in the US with several years of laboratory results on thousands of patients.13 The data included measures of blood sugar control (glycosolated hemoglobin A1C), cholesterol, and kidney function (serum creatinine and urine protein), and were used to monitor the quality of care at the patient, practice, and population levels. Since the data contained each patient’s name and address, the system was also used to communicate directly with patients when the laboratory data indicated the need for attention.

Out of control test results generated a letter to the patient suggesting they take action with their medical provider. Tests that were overdue generated reminders to have testing performed. The system also generated reminders and alerts with guideline-based advice for the practice as well as a periodic roster of each provider’s patients and a report card summarizing the health status of the population. Clinical and economic evaluations of the system, including a large randomized clinical trial, demonstrated improvements in adherence to practice guidelines and reductions in the need for emergency room and hospital services as well as total costs per patient.141516 The system has been commercialized and distributed to physicians, insurers, employers and others responsible for the care of chronically ill patients. It is now being expanded to other conditions such as chronic kidney disease. A similar system, The New York City A1C Registry,17 is in used to monitor the estimated 600,000 diabetic patients in New York City, although unlike the Vermont Diabetes Information System, there are no provisions for patients to have their data excluded from the NYC database. The NYC Department of Health and Mental Hygiene has linked additional patient services to the registry such as health information and improved access to health care services.

As of early 2012, the registry contains over 10 million test results on 3.6 million individuals. Although intended to improve health outcomes and reduce the incidence of the complications of diabetes,18 a formal evaluation has not yet been done. In May 2008, the City Council of San Antonio, Texas approved the deployment of an A1C registry for Bexar County. Authorized by the Texas Legislature and the state Health Department, the San Antonio Metropolitan Health District19 implemented the registry which drew results from all the major clinical laboratories in San Antonio. The program was discontinued in 2010 for lack of funds.

Laboratory surveillance differs from population-wide surveillance in that it can only monitor patients who are already receiving medical treatment and therefore having lab tests done. For this reason, it does not identify patients who have never been tested. Therefore, it is more suitable for quality management and care improvement than for epidemiological monitoring of an entire population or catchment area.

See also


  1. ^ a b Public health surveillance, World Health Organization (accessed January 14, 2016).
  2. ^ Kilbridge PM, Campbell UC, Cozart HB, Mojarrad MG (Jul Aug 2006). “Automated Surveillance for Adverse Drug Events at a Community Hospital and an Academic Medical Center”. J Am Med Inform Assoc. 13 (4): 372 7. doi:10.1197/jamia.M2069. PMC 1513675Public Health Surveillance. PMID 16622159.
  3. ^ disa.mil PDF
  4. ^ “webcitation.org”. webcitation.org. Archived from the original on December 22, 2006. Retrieved 2014-04-18.
  5. ^ United States Centers for Disease Control and Prevention (WebCited/cached version)
  6. ^ Eysenbach G (2006). “Infodemiology: Tracking Flu-Related Searches on the Web for Syndromic Surveillance”. AMIA Annu Symp Proc. 2006: 244 8. PMC 1839505Public Health Surveillance. PMID 17238340.
  7. ^ “Google Flu Trends”. Google.org. Retrieved 2014-04-18.
  8. ^ Ginsberg J, Mohebbi MH, Patel RS, Brammer L, Smolinski MS, Brilliant L (2009). “Detecting influenza epidemics using search engine query data”. Nature. 457 (7232): 1012 4. doi:10.1038/nature07634. PMID 19020500.
  9. ^ Lampos, Vasileios; Miller, Andrew C.; Crossan, Steve; Stefansen, Christian (3 Aug 2015). “Advances in nowcasting influenza-like illness rates using search query logs”. Scientific Reports. 5 (12760). doi:10.1038/srep12760.
  10. ^ “GeoPatterns – Flu Detector – Tracking Epidemics on Twitter”. Geopatterns.enm.bris.ac.uk.

    Retrieved 2014-04-18.

  11. ^ Lampos V, De Bie T, Cristianini N (2010). Flu Detector – Tracking Epidemics on Twitter. ECML PKDD. pp.

    599 602. doi:10.1007/978-3-642-15939-8_42.

  12. ^ “vermedx.com”. vermedx.com. Retrieved 2014-04-18.
  13. ^ “MacLean CD, Littenberg B, Gagnon M. Diabetes Decision Support: Initial Experience with the Vermont Diabetes Information System in Community Primary Care. ”Am J Pub Health” 2006; 96:593-595″. Ajph.org.

    1970-01-01. Retrieved 2014-04-18.

  14. ^ Littenberg, B; MacLean, CD; Zygarowski, K; Drapola, BH; Duncan, JA; Frank, CR (Mar 2009). “The Vermedx Diabetes Information System reduces healthcare utilization.”. The American journal of managed care. 15 (3): 166 70. PMID 19298097.
  15. ^ Maclean, CD; Gagnon, M; Callas, P; Littenberg, B (Dec 2009). “The Vermont diabetes information system: a cluster randomized trial of a population based decision support system.”. Journal of general internal medicine. 24 (12): 1303 10. doi:10.1007/s11606-009-1147-x. PMC 2787948Public Health Surveillance. PMID 19862578.
  16. ^ Khan, S; Maclean, CD; Littenberg, B (Jul 2010). “The effect of the Vermont Diabetes Information System on inpatient and emergency room use: results from a randomized trial.”. Health outcomes research in medicine. 1 (1): e61 e66. doi:10.1016/j.ehrm.2010.03.002. PMC 2958673Public Health Surveillance. PMID 20975923.
  17. ^ 1 Archived June 9, 2007, at the Wayback Machine.
  18. ^ “Frieden, Thomas R; “Letter: New York City’s Diabetes Reporting System Helps Patients and their Physicians”; ”American Journal of Public Health”; July 16, 2006″. Ajph.aphapublications.org.

    1970-01-01. Retrieved 2014-04-18.

  19. ^ “Metropolitan Health District”. Sanantonio.gov.

    Retrieved 2014-04-18.

Public Health Surveillance Retrieved from “https://en.wikipedia.org/w/index.php?title=Public_health_surveillance&oldid=730086733

Attack Stopped, Gunman Wounded by Armed Security Guard in …


In San Antonio, Texas, over the weekend, an attack on a restaurant and movie theater was stopped by an armed security guard. The gunman first attacked a Chinese restaurant where he worked, firing at his co-workers and then chasing them into the parking lot. According to reports, Jesus Garcia, 19, then encountered a police cruiser, shooting out the officer s window before chasing one or more co-workers into a movie theater, firing multiple shots.

He wounded a bystander in the theater lobby, but luckily the man survived. Bexar County Sgt. Lisa Castellano, who was off duty and working as a security guard at the theater, chased Garcia into a bathroom, shooting him several times.

Garcia is now in stable condition and being held on a $10 million bond.

The attack was reportedly sparked when Garcia s girlfriend, who also works at the restaurant, broke up with him earlier in the day.

Watch the report from Happening Now:

Why Aren't Armed Security Guards Available To Protect Elementary …

Why did mass murderers like Adam Lanza and James Holmes, both with high IQ s, both gamers and both loners, choose their targets and kill Innocent adults and children who they had no previous contact with. Was it the infusion of violent video games were you kill hundreds of your enemy and earn points that influenced goofballs Adam Lanza and James Holmes in their bizarre world. Why were their targets unprotected, don t we deserve to go to a movie or send our children to school and not have to worry about some crazed wack job shooting up the place?

Adam Lanza the unhinged gunman who slaughtered 26 children and adults1 at Sandy Hook elementary school arrived with guns blazing blasting his way into the building, according to Connecticut State police. He was not voluntarily let into the school at all, Connecticut State Police Lt.

Paul Vance said at a Saturday morning press conference outside Sandy Hook Elementary School, where Adam Lanza unleashed one of the worst massacres in US history2 before committing suicide. He forced his way into the school.

Today, two of the Sandy Hook Elementary children were laid to rest, Noah Pozner and Jack Pinto, a New York Giants fan.

Adam Lanza a string bean-thin goth kid3 described by friends as a genius first shot his mother then drove to the school in her car with at least three of her guns: a Glock and a SIG Sauer, and a .223-caliber Bushmaster rifle. And the gunman had access to even more guns than the trio found at the school cops recovered a .45-caliber Henry repeating rifle, a .22-caliber Marlin rifle, and a .30-caliber Enfield rifle, a law enforcement source told CNN.

Why did mass murderer James Holmes pick the Cinemark theater in Auroura out of all the movie theaters 4within 20 minutes of his apartment showing the new Batman movie that night.

It appears that the Cinemark theater in Auroura was the only one where guns were banned5 (legal concealed gun holders). In Colorado, individuals with permits can carry concealed handgun in most malls, stores, movie theaters, and restaurants.

But private businesses can determine whether permit holders can carry guns on their private property. Most movie theaters allow permit holders carrying guns.

But the Cinemark movie theater was the only one with a sign posted at the theater s entrance6. They also did not have armed Security Guards at the entrance like many of the other surrounding theaters did. Madman James Holmes researched and did surveillance on the nearby movie theaters and found the Cinemark movie theater 7a easy target with no customers armed in the theater and no armed Securtiy Guards on the property, no one to fight back.

I have been a private detective for almost 20 years in Florida and I have seen a lot situations with waring divorced parents in confrontations in school parking lots which could have escalated to violence if not for a armed Security Guard, everybody in Florida has a gun.

Maybe they might want to rethink there choice: Aug 29, 2012 Norcross GA, When Tina Mack dropped off lunch to her son at Palmer Elementary School this morning, she wondered: What happened to the security guard8?

Her son, now in fourth grade, has attended Palmer since kindergarten. The school s had security every year until now. This is honestly the first time I can say I don t feel safe sending him there, she said9. Security guards at Cheston, Forks, Palmer, March, Shawnee, Tracy and Paxinosa elementary schools were eliminated as part of the Easton Area School District s layoffs for 2012-13. We don t have security guards at the elementary schools any longer10, board member Frank Pintabone said today.

Teachers are picking up that slack. .What the hell is this man thinking????

During the last couple of weeks I have taken an advanced firearms training course and also qualified for a Security Officer license under the supervision of Derek Jones.11 Over the years Derek Jones has received numerous certificates in criminal justice12. The University of Florida is just one of the schools. In May of 2008 Derek traveled to Ontario, California to become a NRA Law Enforcement Certified Firearm Instructor in a course sponsored by the Ontario Police Department.

He is proficient in criminal and investigation procedures, armed and unarmed security, firearms, weapons training and basic electronics.

Derek Jones passed on some of his wisdom to me, stating that the first line of defense for schools and movie theaters and malls and just about every other place where large groups of people and children congregate should be armed Security Guards with radios who could confront suspicious people and contact Law Enforcement immediately on the OUTSIDE of the building, before the perp gets into the building.


  1. ^ Adam Lanza the unhinged gunman who slaughtered 26 children and adults (www.nypost.com)
  2. ^ Adam Lanza unleashed one of the worst massacres in US history (www.nypost.com)
  3. ^ Adam Lanza a string bean-thin goth kid (www.nypost.com)
  4. ^ James Holmes pick the Cinemark theater in Auroura out of all the movie theaters (www.foxnews.com)
  5. ^ the Cinemark theater in Auroura was the only one where guns were banned (www.foxnews.com)
  6. ^ Cinemark movie theater was the only one with a sign posted at the theater s entrance (www.foxnews.com)
  7. ^ Cinemark movie theater (www.foxnews.com)
  8. ^ What happened to the security guard (community.ashworthcollege.edu)
  9. ^ This is honestly the first time I can say I don t feel safe sending him there, she said (community.ashworthcollege.edu)
  10. ^ We don t have security guards at the elementary schools any longer (community.ashworthcollege.edu)
  11. ^ Derek Jones. (djsfa.com)
  12. ^ Derek Jones has received numerous certificates in criminal justice (djsfa.com)

Daily Kos: Private Lives, Public Surveillance

Whether people think about this election s hot button issues in this framework or not, many of our country s so-called social issues are issues of privacy. While lawmakers fought over the economic and religious implications of hot topics like gay marriage, abortion, health care and cybersecurity1, they were essentially deciding what level of privacy Americans should be entitled to under the law, and how strictly the Constitution should be interpreted to provide or deny that privacy.

I thought about this struggle between the private lives of citizens and the public decisions of legislators and administrations when I saw a story from Texas about high school sophomore Natalie Hernandez suing her school following her expulsion. Hernandez was expelled from her high school because she refused to wear her school s name badge, which contains an RFID tracking device.

Hernandez says the badge violates her religion the badge is considered a mark of the beast and by forcing her to wear it, the school district is violating her First Amendment rights. After the school offered her a name badge without the tracking device, which she refused, the school expelled her.

I think the religious aspect of this case is not as important as the general question of privacy . Yes, the mark of the beast claim allows Hernandez to make a First Amendment argument, and in cases like Wisconsin v.

Yoder, the Supreme Court has made exceptions for religious beliefs in public education before. But there s more to this case than a school wanting to know where a student is, and a Christian student refusing to let them because of religious reasons. This case is a sign of privacy debates in the age of technology.

The obvious conflict in this case is the right to privacy of the students, versus the necessity of tracking them of the administration.

The school district argues that the RFID trackers are meant to keep students on the school premises during school hours, and to make sure that they re in class when they should be. The students argue that the school is unnecessarily tracking their every move for reasons that could easily be solved by other solutions and if the feed were accessible to others outside the school, they could put students in danger by making all of their movements traceable.

The second conflict is the how free schools are to begin with. With regards to constitutional rights to expression and privacy, schools are considered special places they re grouped with prisons and military bases in legal terms (prisons also often require tracking devices).

And while the US Supreme Court decided that students and teachers do not shed their constitutional rights to freedom of speech or expression at the schoolhouse gate in Tinker vs. Des Moines2, schools can still do things like search students lockers, place restrictions on their school newspapers, and limit free expression by implementing and enforcing dress codes because they must balance the rights of the students with the order and safety of the school.

It makes sense that teachers and school administrators would want to know where students are when they re at school if they re cutting P.E. and hanging out in the bathroom, or lingering a little longer at lunch than they should.

But the attendance-boosting RFID cards aren’t foolproof what s to say a student can t pass off their ID card to a friend to carry around for the day? Furthermore, can t teachers just pay attention to who is present and who isn’t by taking attendance, and making a round of the hallways once and again? It would certainly save money, those trackers can t be cheap.

To make students wear these tracking devices sets a dangerous precedent for limiting students privacy even further within an already restricted space, and put schools closer to prisons on the legal privacy spectrum.

It takes accountability away from students, who should show up to class of their own volition, and takes away accountability from teachers, who should be paying attention to keeping students in class. Perhaps this method of tracking could be used at schools for at-risk students or juvenile facilities where students have made past infractions and require more attention, but it’s excessive for the average kid at a public school that took longer to get to class than his peers.

Furthermore, Constitutional precedent only allows an invasion of students privacy to keep school order and to protect students safety. And while the RFID device does help to find where students are at all times and helps the administration ensure that students are in class when they say they are, this tracker badge requirement invades a student s privacy more than necessary for a school to keep order it s a disproportionate response, and shouldn’t be allowed to continue.


  1. ^ cybersecurity (www.politico.com)
  2. ^ Tinker vs.

    Des Moines (www.bc.edu)

Security guard opens fire, kills replacement at Houston shopping …

Posted on: 4:49 pm, November 25, 2012, by , updated on: 04:53pm, November 25, 20121

HOUSTON, Texas (CNN) Texas deputies say a security guard who recently lost his job opened fire and killed his replacement Saturday at a shopping center in Houston.

Authorities took the suspected gunman into custody after they say he shot and killed the victim.

Investigators say the company they worked for provided security for a food market.

Deputies learned even though the alleged shooter lost his job weeks ago, businesses at the shopping plaza still paid him when he continued to show up for work.

Officers say Saturday afternoon, November 24th he noticed another security guard working instead of him.

The security guard pulled his weapon and discharged it multiple times into our victim, a 38-year-old Hispanic male who unfortunately died at the scene. It s just a sad thing, Sgt. Robert Spurgeon with the Harris County Sheriff s Office said.

Customers described the suspect as someone who sometimes had run-ins with co-workers.

Deputies say it s unclear why the security guard lost his job.


  1. ^ (fox6now.com)

Real Texas PI: The Growing Trend of Unlicensed Private …

I have noticed through what I can see in advertising and promises on the internet, that there is a large increase in people and companies doing private investigation work without a license.

Where I see this glaring increase, is in companies that are offering pre-foreclosure “assessments” of properties for banks and lending companies. Legally, only 2 types of people can do this in Texas and they are both licensed entities. You have to have a license to be a Real Estate Broker and also a private investigator. What is being done is considered an investigation under the law. It is not a “grey area” or “maybe” could be an issue, this is out right illegal activity in the State of Texas. You can be fined for doing it and you can be fined for hiring an unlicensed person to do it.

The other commonly occurring unlicensed activity is “skip tracing” by companies and people that are not licensed investigators or investigations companies. Skip tracing is basically finding or locating a person who has “skipped out” on some type of financial obligation. I have noticed that process servers are advertising that they will do these locates for a fee. If they are not a licensed investigator, they are doing it illegally. Process servers are only allowed to “skip trace” someone that they are actually attempting to serve. They cannot charge for locating someone. They can only charge for serving that person.

I am not talking about state or governmental agencies that do similar work, they are obviously not required to be an investigations company.

Why am I concerned? It is hard enough to do business the right way and compete with others who do business the right way. It is not just illegal for these unlicensed companies to to this service, it is an unfair advantage, by not fulfilling the requirements to become a licensed company.

Whatever you do – don’t hire or use these unlicensed companies, and Stay Safe!