<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" >

<channel><title><![CDATA[JMA Security Services | Licensed Security Guards - Santa Rosa & Sonoma County - Media Blog ]]></title><link><![CDATA[https://www.jmasecurity.com/media-blog]]></link><description><![CDATA[Media Blog ]]></description><pubDate>Thu, 09 Apr 2026 13:08:22 -0700</pubDate><generator>Weebly</generator><item><title><![CDATA[Fatal stabbing at Montgomery High School March 1, 2023]]></title><link><![CDATA[https://www.jmasecurity.com/media-blog/fatal-stabbing-at-montgomery-high-school-march-1-2023]]></link><comments><![CDATA[https://www.jmasecurity.com/media-blog/fatal-stabbing-at-montgomery-high-school-march-1-2023#comments]]></comments><pubDate>Thu, 09 Mar 2023 18:57:10 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.jmasecurity.com/media-blog/fatal-stabbing-at-montgomery-high-school-march-1-2023</guid><description><![CDATA[On March 1, 2023, a stabbing occurred at Montgomery High School in Santa Rosa, California. The incident left two&nbsp;students injured, one of whom later died and a second hospitalized&nbsp;. The incident sparked fear and concern among students, parents, and the community as a whole.While incidents like this are rare, they do happen, and it is important to be prepared for them. Knowing how to respond in a crisis situation can be the difference between life and death. In this blog, we will discus [...] ]]></description><content:encoded><![CDATA[<div class="paragraph">On March 1, 2023, a stabbing occurred at Montgomery High School in Santa Rosa, California. The incident left two&nbsp;students injured, one of whom later died and a second hospitalized&nbsp;. The incident sparked fear and concern among students, parents, and the community as a whole.<br />While incidents like this are rare, they do happen, and it is important to be prepared for them. Knowing how to respond in a crisis situation can be the difference between life and death. In this blog, we will discuss the importance of knowing how to respond to incidents like the Montgomery High School stabbing.<br />First and foremost, it is important to understand that no one expects to find themselves in a situation like this. It can be overwhelming and frightening, but it is crucial to remain as calm as possible. Panic and chaos can make the situation worse and lead to further injuries or fatalities.<br />In the event of an incident like this, it is important to follow the school's emergency protocol. Schools have emergency procedures in place for a reason, and they are designed to keep students and staff safe. It is important to listen to any instructions given by school officials, law enforcement, or emergency responders. This may include instructions to evacuate the building or to shelter in place.<br />If you find yourself in a situation where you cannot follow the school's emergency protocol, it is important to have a plan. Know the layout of the school and the locations of exits and safe areas. If possible, barricade yourself in a secure area and stay out of sight of the attacker.<br />Another important aspect of responding to a crisis situation is communication. It is important to communicate with others around you and to contact law enforcement or emergency responders if possible. If you are unable to make a call or send a message, try to find someone who can.<br />Finally, it is important to remember that incidents like this can have a lasting impact on those involved. It is important to seek support and help if needed. Schools and communities often have resources available for those who need them.<br />In conclusion, the stabbing at Montgomery High School in Santa Rosa, California was a frightening reminder that incidents like this can happen anywhere. It is important to be prepared and to know how to respond in a crisis situation. Remember to stay calm, follow emergency protocols, have a plan, communicate with others, and seek support if needed. Together, we can work towards creating safer schools and communities.</div>]]></content:encoded></item><item><title><![CDATA[Security Guard Shoots Suspect Oakland CA]]></title><link><![CDATA[https://www.jmasecurity.com/media-blog/security-guard-shoots-suspect-oakland-ca]]></link><comments><![CDATA[https://www.jmasecurity.com/media-blog/security-guard-shoots-suspect-oakland-ca#comments]]></comments><pubDate>Sat, 15 Feb 2014 17:48:48 GMT</pubDate><category><![CDATA[crime]]></category><category><![CDATA[private security]]></category><category><![CDATA[security]]></category><category><![CDATA[security guards]]></category><category><![CDATA[security patrol]]></category><category><![CDATA[Theft]]></category><guid isPermaLink="false">https://www.jmasecurity.com/media-blog/security-guard-shoots-suspect-oakland-ca</guid><description><![CDATA[A security guard hired to patrol an Oakland neighborhood by residents frustrated with an overtaxed city police force shot and wounded a burglary suspect Thursday after the man confronted him with a screwdriver, authorities&nbsp;said.The shooting happened in the Upper Dimond neighborhood, where residents in a five-block area hired a company called Security Code 3 last fall and touted the guards' presence with signs on their&nbsp;lawns.Just before noon, one of the firm's uniformed guards interrupt [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;">A security guard hired to patrol an Oakland neighborhood by residents frustrated with an overtaxed city police force shot and wounded a burglary suspect Thursday after the man confronted him with a screwdriver, authorities&nbsp;said.<br /><span style=""></span><br /><span style=""></span>The shooting happened in the Upper Dimond neighborhood, where residents in a five-block area hired a company called Security Code 3 last fall and touted the guards' presence with signs on their&nbsp;lawns.<br /><span style=""></span><br /><span style=""></span>Just before noon, one of the firm's uniformed guards interrupted a burglary at a home on Harding Way, said police Capt.&nbsp;<a href="http://www.sfgate.com/?controllerName=search&amp;action=search&amp;channel=crime&amp;search=1&amp;inlineLink=1&amp;query=%22Rick+Orozco%22" style="">Rick Orozco</a>. The guard spotted at least two people trying to make off with a flat-screen television and a telescope, police&nbsp;said.<br /><span style=""></span><br /><span style=""></span>The guard chased one of the suspected burglars in his Toyota Corolla - marked with the words "Private Patrol" and with an amber light bar on the roof - before getting out of the vehicle and chasing the man, Orozco&nbsp;said.<br /><span style=""></span><br /><span style=""></span><br />The pursuit ended in the driveway of Caria Tomczykowska's home on the 4000 block of Waterhouse Road, where the suspect, described as being about 18 years old, turned toward the guard with a screwdriver, police&nbsp;said.<br /><span style=""></span><br /><span style=""></span>The guard fired a single shot, wounding the man in the leg, police&nbsp;said.<br /><span style=""></span><br /><span style=""></span>Residents said they had opted for private patrols because of a spike in burglaries in their neighborhood from 2011 to 2012. They pay $475 a year per&nbsp;household.<br /><span style=""></span><br /><span style=""></span>Tomczykowska said the guard who shot the suspect was "just a remarkable man" and a "hero for the neighborhood today." Police have not identified&nbsp;him.<br /><span style=""></span><br /><span style=""></span>Tomczykowska said of the shot suspect, "I'm sorry that this young man got himself into the situation that he did, but I hope that the leg wound will slow him down for a good time to&nbsp;come."<br /><span style=""></span><br /><span style=""></span>Petro Petreas said he lives next to the house on Harding Way that was burglarized. He called the guard service "an extra layer of protection that can be helpful, and it seems like today they responded and did the job the way they're supposed&nbsp;to."<br /><span style=""></span><br /><span style=""></span>The shot suspect was being treated at&nbsp;<a href="http://www.sfgate.com/?controllerName=search&amp;action=search&amp;channel=crime&amp;search=1&amp;inlineLink=1&amp;query=%22Highland+Hospital%22" style="">Highland Hospital</a>&nbsp;and was expected to survive. His name has not been released. A second man fled the scene in a Mercedes-Benz SUV and abandoned it in nearby Dimond Park, police&nbsp;said.<br /><span style=""></span><br /><span style=""></span>The guard who shot the suspect is part of the neighborhood's regular patrol, said&nbsp;<a href="http://www.sfgate.com/?controllerName=search&amp;action=search&amp;channel=crime&amp;search=1&amp;inlineLink=1&amp;query=%22Richard+McDiarmid%22" style="">Richard McDiarmid</a>, regional manager for Security Code&nbsp;3.<br /><span style=""></span><br /><span style=""></span>"Situations like this, you can't foresee," McDiarmid said. "Security business is basically 'observe and report.' Unfortunately, sometimes things escalate that are beyond our control, and self-defense comes into&nbsp;play."<br /><span style=""></span><br /><span style=""></span>He added that the guards' goal "is to be seen. We're a deterrent. Hopefully the people that are committing crimes, they see that there's security in the area and they go to a different area, quite&nbsp;frankly."<br /><span style=""></span><br /><span style=""></span>Many Oakland residents have hired private guards to conduct patrols in their&nbsp;neighborhoods.<br /><span style=""></span><br /><span style=""></span>"I wasn't sure how I felt about it at first, just because it seems almost like a privileged thing to have," said&nbsp;<a href="http://www.sfgate.com/?controllerName=search&amp;action=search&amp;channel=crime&amp;search=1&amp;inlineLink=1&amp;query=%22Marianne+Vlahos%22" style="">Marianne Vlahos</a>, who lives on Waterhouse Road near the site of Thursday's shooting. "But yeah, it makes me feel more&nbsp;comfortable."<br /><span style=""></span><br /><span style=""></span></div>]]></content:encoded></item><item><title><![CDATA[Close Quarter Battle]]></title><link><![CDATA[https://www.jmasecurity.com/media-blog/close-quarter-battle]]></link><comments><![CDATA[https://www.jmasecurity.com/media-blog/close-quarter-battle#comments]]></comments><pubDate>Fri, 17 Jan 2014 04:12:07 GMT</pubDate><category><![CDATA[private security]]></category><category><![CDATA[security]]></category><category><![CDATA[security patrol]]></category><category><![CDATA[self defense training]]></category><guid isPermaLink="false">https://www.jmasecurity.com/media-blog/close-quarter-battle</guid><description><![CDATA[The practice of hiring private armies goes back to ancient times, and the mystique associated with mercenary warrior has been the subject of many historical studies and fictional charecterizations. This episode of CQB takes a more contemporary look at a day in the life of a group of civilian contractors and how their role has evolved on the modern battlefield. Using its "sub-second" analysis techniques and intimate first-person footage, CQB reveals the backgrounds, training and equipment of toda [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;">The practice of hiring private armies goes back to ancient times, and the mystique associated with mercenary warrior has been the subject of many historical studies and fictional charecterizations. This episode of CQB takes a more contemporary look at a day in the life of a group of civilian contractors and how their role has evolved on the modern battlefield. Using its "sub-second" analysis techniques and intimate first-person footage, CQB reveals the backgrounds, training and equipment of today's "soldiers for hire" and how private armies are re-shaping the way conflicts are conducted around the world.</div>]]></content:encoded></item><item><title><![CDATA[Boeing 777 Plane Crashes in Sanfrancisco Airport Today July 6, 2013]]></title><link><![CDATA[https://www.jmasecurity.com/media-blog/boeing-777-plane-crashes-in-sanfrancisco-airport-today-july-6-2013]]></link><comments><![CDATA[https://www.jmasecurity.com/media-blog/boeing-777-plane-crashes-in-sanfrancisco-airport-today-july-6-2013#comments]]></comments><pubDate>Sat, 06 Jul 2013 19:32:41 GMT</pubDate><category><![CDATA[private security]]></category><category><![CDATA[security]]></category><category><![CDATA[security guards]]></category><guid isPermaLink="false">https://www.jmasecurity.com/media-blog/boeing-777-plane-crashes-in-sanfrancisco-airport-today-july-6-2013</guid><description><![CDATA[http://usnews.nbcnews.com/_news/2013/07/06/19323541-boeing-777-crashes-while-landing-at-san-francisco-airport    Boeing 777 crashes while landing at San Francisco airportBy Daniel Arkin, Staff Writer, NBC NewsA Boeing 777 operated by Asiana Airlines crashed while landing at San Francisco International Airport on Saturday, according to the Federal Aviation Administration.The airplane was coming in from Seoul, South Korea and apparently crashed sometime after touching down on Runway 28. No other d [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;"><a href="http://usnews.nbcnews.com/_news/2013/07/06/19323541-boeing-777-crashes-while-landing-at-san-francisco-airport" style="">http://usnews.nbcnews.com/_news/2013/07/06/19323541-boeing-777-crashes-while-landing-at-san-francisco-airport</a><br /></div>  <div class="wsite-youtube" style="margin-top:10px;margin-bottom:10px;"><div style="text-align: center;"><object width="400" height="330"><param name="movie" value="http://www.youtube.com/v/5z-71IIcz3E?version=3"></param><param name="wmode" value="transparent"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed src="http://www.youtube.com/v/5z-71IIcz3E?version=3" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" wmode="transparent" width="400" height="330"></embed></object></div></div>  <div class="paragraph" style="text-align:left;">Boeing 777 crashes while landing at San Francisco airportBy Daniel Arkin, Staff Writer, NBC News<br />A Boeing 777 operated by Asiana Airlines crashed while landing at San Francisco International Airport on Saturday, according to the Federal Aviation Administration.<br /><span style=""></span><br /><span style=""></span>The airplane was coming in from Seoul, South Korea and apparently crashed sometime after touching down on Runway 28. No other details were immediately available.<br /><span style=""></span><br /><span style=""></span></div>]]></content:encoded></item><item><title><![CDATA[Security Strategies for Special Events]]></title><link><![CDATA[https://www.jmasecurity.com/media-blog/security-strategies-for-special-events]]></link><comments><![CDATA[https://www.jmasecurity.com/media-blog/security-strategies-for-special-events#comments]]></comments><pubDate>Sat, 06 Jul 2013 17:54:13 GMT</pubDate><category><![CDATA[community event]]></category><category><![CDATA[fundraiser]]></category><category><![CDATA[private security]]></category><category><![CDATA[security]]></category><category><![CDATA[security guards]]></category><guid isPermaLink="false">https://www.jmasecurity.com/media-blog/security-strategies-for-special-events</guid><description><![CDATA[Planning security for a special event requires a tailored approach that balances effective, non-excessive, security measures against a realistic assessment of the likely threats to the event. A "one size fits all" approach to security fails to consider the very aspects of the event that make it unique. Meeting planners are well served by obtaining a customized security plan. This article offers insight into the threats special events may face and what meeting planners can do to include appropria [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;">Planning security for a special event requires a tailored approach that balances effective, non-excessive, security measures against a realistic assessment of the likely threats to the event. A "one size fits all" approach to security fails to consider the very aspects of the event that make it unique. Meeting planners are well served by obtaining a customized security plan. This article offers insight into the threats special events may face and what meeting planners can do to include appropriate security measures.<br /><span style=""></span><br /><span style=""></span>For the purposes of this discussion, special events fall into three categories: 1) unique events that warrant a focus on security simply because they are so rare (e.g., a summit meeting among industry leaders to forge or fight a new regulatory process); 2) events that would otherwise be considered normal, except for the unique nature of the guests or agenda; and 3) events that are controversial or worthy of media attention. The security strategy for these types of events should address threat assessment, the components of a basic security plan (to include emergency action plans), and the criteria to use when selecting a security vendor.<br /><span style=""></span><br /><span style=""></span><strong style="">I. THREAT ASSESSMENT</strong><br /><span style=""></span><br /><span style=""></span>A threat assessment should first identify and then quantify potential risk. The goal is to separate likely threats from perceived or even imagined ones. For the inexperienced planner, emotions can run high when considering possible threats, clouding rational thinking during the planning stages. The experienced event security planner, on the other hand, can distinguish the conceivable from the irrational and develop a plan that adequately addresses legitimate concerns without wasting resources on the unnecessary. Appropriate security measures offer three critical benefits; namely, they provide:<br /><span style=""></span><br /><span style=""></span><ol style=""><li style="">a deterrent effect that dissuades would-be attackers</li><li style="">preventive measures that will intercept the attackers</li><li style="">emergency plans that prepare everyone to respond appropriately should an incident occur.</li></ol>Effective security reassures the public without detracting from the event&rsquo;s image or inconveniencing the attendees. To achieve this balance, the event planner should select an experienced security practitioner who has diverse experience and the proper personnel to implement the security plan professionally.<br /><span style=""></span><br /><span style=""></span><strong style=""><em style="">Target Evaluation Criteria</em></strong><br /><span style=""></span><br /><span style=""></span>Potential attackers will assess the value of an event form several different perspectives, depending on their motivation and objectives. Consider asking the following types of questions to establish the total set of possible threats, and then you can begin to qualify them in terms of their likelihood and reasonableness:<br /><span style=""></span><br /><span style=""></span><ol style=""><li style="">Who would benefit from the failure of the event if an incident were to occur?</li><li style="">Who would benefit from a mere disruption of this event?</li><li style="">What interest would any groups with a history of violence or disruption have in the event as an arena to publicize their cause?</li></ol>When developing the list of possible threats, pay particular attention to the extent of media coverage the event will likely generate. Threats increase dramatically when the event is high profile, so gauge the level of controversy surrounding the event along with the expected media coverage. Attendance by VIPs presents another potential source of threat that may even be independent of the nature of the event itself. For example, a college commencement speech is not necessarily a significant event unless the speaker is Bill Gates and he is due to speak about the future of privacy controls on e-business.<br /><span style=""></span><br /><span style=""></span>Intelligence gathering plays a crucial role in assessing potential threats and therefore requires an honest assessment of the efforts made, if any, to discover specific threats. While it is true that most attackers seldom offer a warning and most individuals or groups who make threats do not act on them, it is not prudent to ignore specifically stated threats. Thus, finding out if anyone is gathering intelligence on your behalf is a crucial step in security planning.<br /><span style=""></span><br /><span style=""></span>History also plays a significant role in threat assessment, and event planners should determine if the history surrounding the event itself, the venue, or any of the higher profile attendees warrants concern. Just how important is history? Consider that the attacks of September 11th were the second assault on the World Trade Center. The lone positive note in this reminder is that some of the procedures and emergency plan modifications that resulted from the first assault probably created conditions that saved lives in the second, more serious attack.<br /><span style=""></span><br /><span style=""></span>Threat assessment for the event planner is not limited to threats with an obvious or even indirect connection to the event or it&rsquo;s attendees. The representative or symbolic value of the event or venue may also constitute a potential risk. Terrorists and other politically or religiously driven groups seek to further their goals by first creating recognition of their cause in a theatrical manner and then instilling fear by eroding the public&rsquo;s confidence in their protective forces. Ask yourself if your event provides an opportunity for the spectacularly horrific.<br /><span style=""></span><br /><span style=""></span>In summarizing the threat assessment process, the event must be evaluated not just as a singular event linked to a specific theme, but as an opportunity for exposure. First, think creatively in defining the total set of possible threats, then narrow them down to what are the more likely ones and define your security plan to deter, intercept or adequately react to those threats.<br /><span style=""></span><br /><span style=""></span><strong style="">II. BASIC SECURITY PLAN COMPONENTS</strong><br /><span style=""></span><br /><span style=""></span>Assessing the likely risks is only the first step in successful event security planning. The remainder of this discussion focuses on the other basic security plan components: entry criteria and access control, critical area protection, specific security concerns, specific deterrents and responses, and emergency action plans. These components are evaluated and implemented with four objectives in mind:<br /><span style=""></span><br /><span style=""></span><ol style=""><li style="">1 DETERRENCE. This equates to the degree a particular security measure will deter a would-be attacker.</li><li style="">2 PREVENTION. This determines the effectiveness of a security measure in intercepting an attempted security breach or preventing certain assaults or disruption.</li><li style="">3 ENVIRONMENTAL ASSESSMENT. The cumulative effect of the various security measures will determine the general level of safety. Only through an honest assessment of the level of security at the event can you properly respond to threats communicated during the event, such as bomb threats.</li></ol><strong style=""><em style="">Entry Criteria and Access Control</em></strong><br /><span style=""></span><br /><span style=""></span>How will you control access to your event? Choices range from free and open public admission to access restricted to those who have been "cleared." Obviously, the very nature of the event will largely dictate the reasonable access options, and these options, in turn, will directly affect the security measures that are necessary for the event. Limiting access begins to address certain threats. However, choosing access criteria becomes a balance between the intended openness of the event and the resulting need for additional security.<br /><span style=""></span><br /><span style=""></span>If an event is intended to allow free and open public access, the security planner will not have the chance to screen out a potential attacker unless there is specific intelligence that would warrant entrance refusal on an individual basis. Other security plan components will have to take this into account. For example, more internal security monitoring is required than would be necessary for an event with restricted access. Requiring paid admission might reduce the likelihood of threat from random opportunists, but it hardly changes the security status of the internal environment.<br /><span style=""></span><br /><span style=""></span>Requiring picture identification to obtain an event access badge is one possible step up in access control. This would screen out many potential meddlers, as well as provide a record of who is in attendance. Requiring an invitation along with a photo ID to gain entry offers even greater access control and provides an immediate indication of uninvited individuals seeking entrance who may have sought to disrupt the event.<br /><span style=""></span><br /><span style=""></span>The most restrictive means of access control is probably inappropriate for most events &mdash; clearance only. Here, the potential guests are pre-screened to some agreed upon level. This method allows the security team to ensure that the individual does not represent a threat before being invited. In this type of event, the security planner can be reasonably sure that any potential disruptions or threats will not come from within the event and can adjust security precautions accordingly. In such applications, all of the event staff and any vendors&rsquo; staff will also be pre-cleared and identified with a badge or garment pin of some type. This level of security is usually reserved for high level gatherings that are smaller by nature and have an obvious need for such control.<br /><span style=""></span><br /><span style=""></span>Consistent with the access criteria is the level of scrutiny the attendees and staff undergo upon entry into the event. Limiting access to the event is one security measure and limiting what those people can bring into the event is another. Again, a number of alternatives are available, but the decision will be guided by the nature of the event and it&rsquo;s attendees, as compared to the anticipated threats. It should be noted that ample notification should be given to all attendees and staff as to what items will not be allowed into the event venue. Notification should take the form of pre-event communication and obvious posting of the policies and forbidden items in parking areas and at the gates. The following inspection options will allow you to detect forbidden items:<br /><span style=""></span><br /><span style=""></span><ul style=""><li style="">cursory visual inspection</li><li style="">physical inspection of packages</li><li style="">use of magnetometers and/or hand-held metal detectors</li><li style="">x-ray equipment and physical pat-downs</li><li style="">canine inspection.</li>Regardless of which detection methods are used, if items will be collected at entrance points, accountability for the item and ensuring it is returned to it&rsquo;s owner after the event must be addressed. It may be wiser to forgo the offer to collect forbidden items and instead instruct individuals to either discard the item or return it to a place of their choosing (e.g., car, hotel room, bus) before they are permitted entry.<br /><span style=""></span><br /><span style=""></span>One final thought regarding access control and inspection. Often the choice of a particular level of control and inspection hinges on the need to balance convenience versus necessary security. Event planners demand convenient and efficient entry for their patrons, and security planners focus on eliminating all risk. Security planners should realize that although security today may be given increased consideration, it is not the ultimate priority. Therefore, professional security practitioners have learned to offer recommendations, which are backed by logical analysis, that allow for relatively smooth and efficient traffic flow upon entry, without sacrificing the minimum required level of safety.<br /><span style=""></span><br /><span style=""></span><strong style=""><em style="">Critical Area Protection</em></strong><br /><span style=""></span><br /><span style=""></span>Having addressed the security of the perimeter, we must now look at certain critical areas within the event venue. These areas require special attention because of the effect that disruption or other problems in these areas could have on the event itself. Critical areas within the venue include, but are not limited to:<br /><span style=""></span><br /><span style=""></span><li style="">parking areas and loading docks</li><li style="">key event rooms</li><li style="">VIP areas and media areas</li><li style="">ventilation and HVAC systems</li><li style="">food and refreshment set-ups, and</li><li style="">exhibit areas</li>.These areas may require either further access restrictions, increased package inspection, increased lighting and security monitoring, a method for detecting tampering, or a combination of all of the above, in addition to other site-specific measures.<br /><span style=""></span><br /><span style=""></span>Parking lots, especially those beneath the event venue, are vulnerable to large vehicle bombs and are also likely places for personal assaults. Loading docks are also vulnerable to the introduction of large bombs disguised as some other item, and they are a source of entry for those seeking to avoid the scrutiny of other access points.<br /><span style=""></span><br /><span style=""></span>Key event rooms make ideal targets for individuals who intend to disrupt the event, and VIP rooms and media areas are also attractive to potential disrupters who have an agenda they want to have publicized. VIP rooms are doubly attractive because they house the "controversial" special guest who may be the focus of an assault. Security plans should address emergency evacuation from or problem containment within these areas. Safe rooms where VIPs can be taken should be planned in advance.<br /><span style=""></span><br /><span style=""></span>Recent developments have raised the level of concern surrounding the security of ventilation and HVAC systems, as well as food set-up areas. The problem here can be summarized in two words &mdash; introduction and distribution. Airflow, food, and beverages all represent opportunities for a dangerous foreign substance to be introduced to the venue and distributed to its occupants. These scenarios, though unlikely in most events, must not be disregarded.<br /><span style=""></span><br /><span style=""></span><strong style=""><em style="">Specific Security Concerns</em></strong><br /><span style=""></span><br /><span style=""></span>The security planner must assess general security concerns through the use of &ldquo;what if&rdquo; scenarios to determine whether enough has been done to deter or prevent disruptive occurrences. However, security planners must also address reactive measures that will have to be anticipated and coordinated. Evaluating the event environment for specific incident scenarios should include the following possibilities:<br /><span style=""></span><br /><span style=""></span><li style="">bomb threats or an actual explosion</li><li style="">some type of armed assault by an individual or a group</li><li style="">a specific attack on a special guest</li><li style="">a demonstration or disturbance</li><li style="">chemical or biological attack</li><li style="">a power outage or fire related problem</li><li style="">an uncoordinated media rush or unexpected crowd hostility</li><strong style=""><em style="">Specific Deterrents or Response</em></strong>s<br /><span style=""></span><br /><span style=""></span>In addition to the intelligence gathering, access control, entry inspection procedures, and critical area protection issues we have discussed, event planners may need to consider other specific security measures to address the "what if" scenarios. The following general considerations may need to be evaluated (this is not intended to be an all inclusive list):<br /><span style=""></span><br /><span style=""></span><li style="">Canine sweeps prior to and during an event will allow the security team to confidently assess the situation and make prudent reactive determinations in the event of a bomb threat. Canine inspection of packages upon entry may also be considered.</li><li style="">Specific areas and equipment can be monitored with additional security cameras and protected with tamper-evident locks and seals. This would include ventilation intakes, HVAC units, utility controls, and special presentation equipment.</li><li style="">Evacuation plans and regrouping areas should be designated for both general population evacuation and key area evacuation. Relocation facilities may also need to be considered.</li><li style="">Arranging for armed law enforcement at the event to augment your security vendor may be necessary. If this is the case, law enforcement officials should be involved in the security planning process.</li><li style="">Background and records checks may be required of the event staff and any vendor employees. This is usually only done in conjunction with events that are restricted to clearance-only access. At a minimum, event planners should obtain thorough employee lists from event staff and vendors.</li><li style="">Designated safe areas for VIPs and controversial guests should be established to provide an emergency safe haven in the event of an incident. The safe areas may assist the guest's personal security team by enabling them to safely guard their protectee without having to take the guest away from the event until the problem passes.</li><li style="">Arranging for the necessary accommodations to allow the media to effectively do its job will reduce the likelihood of them becoming disruptive. Requiring media credentials and identifying media members is a good first step. Also remember to grant them dedicated space that will afford them ample room and position to do their jobs without overrunning the event.</li><li style="">Treat food set-up areas as if it were cash you are laying out. Protect it in that way, and people will not need to worry about the possibility of tainted food or beverages.</li><li style="">Distribute to event staff and security personnel profiles of any known troublemakers who may have surfaced at past similar events. Establish a liaison with local law enforcement to gather intelligence and arrange for emergency response.</li><li style="">Ensure your event planners remain within occupancy guidelines established by the local fire marshal.</li><li style="">Ensure the security team has been briefed as to the coordination that will be required between them and responding emergency service personnel who may be deployed to an incident at the event.</li><strong style=""><em style="">Emergency Action Plans</em></strong><br /><span style=""></span><br /><span style=""></span>An effective response to an assault or disruption calls for the coordinated execution of a pre-determined emergency response plan. Ideally, this plan should be developed in concert with the local emergency service personnel who would respond. Coordination with local law enforcement and local fire and rescue teams will be necessary to ensure they and the security team work together to handle the emergency.<br /><span style=""></span><br /><span style=""></span>Communication is probably the most critical element of any emergency response plan. The security personnel will have to first establish their own communication protocols to be used in the emergency, then follow the directives issued by local authorities who will take over when they arrive. It is best to arrange for the division of duties and responsibilities, and linking of communication systems in advance to ensure the different entities can perform the tasks they are best suited for, without duplicating efforts or getting in each other&rsquo;s way.<br /><span style=""></span><br /><span style=""></span>Communication channels and protocols may also change with the transition from normal event operations to emergency status. During a crisis, the venue&rsquo;s public address system may be used differently. Security may be asked to change the radio channel they were using; however, they will want to keep a communications link with a law enforcement representative. Event planners will need to stay in touch with both security and law enforcement. All of this coordination of communication and tactics on the part of law enforcement and security will ideally take place in what is known as a command post. The emergency command post may be different than the event coordination office or even the security command post used under normal circumstances. Law enforcement may have their own mobile unit or may designate an area to be set up within the venue. The emergency command post becomes the center of communications, decision making, and coordination of actions during the emergency.<br /><span style=""></span><br /><span style=""></span>During the planning stages, the security coordinator and law enforcement representative should meet to plan how to most effectively use all of the resources available to them in the event of an emergency. There are certain functions that law enforcement will take over and there are other functions that security may be better suited to handle because of their familiarity with the event venue. Event planners should attend these meetings to gain an understanding of the best way to deal with the remaining time of an event or the attendees who may not have been affected by the incident.<br /><span style=""></span><br /><span style=""></span>Other considerations for the emergency plan, which will address a broad range of possible incidents, would include but are not limited to the following:<br /><span style=""></span><br /><span style=""></span><li style="">emergency fire evacuation routes and gathering points</li><li style="">slightly different evacuation procedures in the event of a legitimate bomb threat</li><li style="">decision criteria for handling a bomb threat or a suspicious item</li><li style="">evacuation and/or search duties for the security team in the above events</li><li style="">protocols for armed response if other than by law enforcement</li><li style="">chain of command and delegation of functions</li><li style="">coordination of on-site and responding medical services</li><li style="">determine who will communicate with the attendees to minimize panic and maintain orderly movement</li><li style="">determining who will comment to the media about the situation</li>The emergency response plan requires extensive preparation and resources, yet the security planner hopes that it will never have to be implemented. This should not, however, mask its importance. If security and event planners have not been able to deter or prevent an incident, they will be judged by how well they were prepared to handle it once it happened. A well-coordinated effort using pre-planned guidelines will be the key to minimizing the effects of any incident.<br /><span style=""></span><br /><span style=""></span><strong style="">III. SECURITY VENDOR SELECTION</strong><br /><span style=""></span><br /><span style=""></span>Security planning for events is a specialized niche within the security industry requiring unique skills and experience. When evaluating potential vendors, be sure to carefully review their qualifications in the following areas:<br /><span style=""></span><br /><span style=""></span><strong style=""><em style="">Experience</em></strong><br /><span style=""></span><br /><span style=""></span>Earlier we mentioned the crucial balance between safety and convenience. The ability to strike this balance comes only from experience gained at specific events for which the security planner had to justify a particular security measure and the degree of application, as well as decide which security measures were not necessary. This requires far more than a rudimentary knowledge of what procedures should be followed. Balancing specific threat levels and deciding which security measures should be implemented requires experience with the outcome of these decisions. Look at the resumes and assignment histories of the executives, managers, and field supervisors of each prospective security vendor, and then ask about the backgrounds of the people who will be leading the charge at your event.<br /><span style=""></span><br /><span style=""></span><strong style=""><em style="">Reputation and Stability</em></strong><br /><span style=""></span><br /><span style=""></span>There are literally thousands of security companies, but only a small percentage of them are respected for the quality of their work. The companies that possess the knowledge and capability to succeed, distinguish themselves in the industry. Ask for references. Ask other event planners who they have used and whether they were pleased with the outcome. Did their vendor discuss the issues that you have just finished reading? Also check industry publications. The companies with extensive knowledge are usually not afraid to share it, so pay attention to who writes articles and participates in speaking engagements.<br /><span style=""></span><br /><span style=""></span><strong style=""><em style="">Diversity of Capabilities</em></strong><br /><span style=""></span><br /><span style=""></span>Select a vendor whose personnel can satisfy all of your event security needs. This may involve planning, staffing with security officers, security screening equipment, canine assistance, executive protection, and crisis management. Many companies will advertise diverse capabilities and then subcontract out all of the pieces, leaving you with a semi-coordinated hodgepodge. Ask the vendor how many of the services will be performed by their own employees. Be wary of companies who have to subcontract for more than one or two disciplines.<br /><span style=""></span><br /><span style=""></span><strong style=""><em style="">Personnel Training</em></strong><br /><span style=""></span><br /><span style=""></span>Ask the vendor to provide training outlines and schedules. Also ask to visit their training facility, even if you have no intention of doing so. The vendor's reaction will carry its own message. Security personnel training should include legal guidelines, operational procedures, fire prevention, first aid, communication skills and report writing, confrontation management, emergency preparedness, and practical exercise training as a minimum.<br /><span style=""></span><br /><span style=""></span><strong style="">SUMMARY</strong><br /><span style=""></span><br /><span style=""></span>Planning security for special events demands the skills acquired through experience &mdash; experience working with event planners and local emergency responders to realistically assess likely threats to the event, and experience developing a focused security plan. The security plan must establish the minimum security measures required to accomplish a balance between safety and convenience, while effectively addressing potential threats. When evaluating these security measures, you must carefully weigh the deterrent and preventive value they offer against the threat level, as well as the reactive preparedness of the security team. The plan must be designed and implemented by a qualified team with the experience to win the confidence of event management and local emergency responders. For any plan to work, the decision makers have to trust the security advisors, and that trust can only come when the security planner is absolutely confident that the security measures are necessary, reasonable, and can be implemented with minimal inconvenience to attendees and staff.<br /><span style=""></span><br /><span style=""></span></ul></div>]]></content:encoded></item><item><title><![CDATA[FBI  Tape on Boston MarathonBombing Suspects]]></title><link><![CDATA[https://www.jmasecurity.com/media-blog/fbi-tape-on-boston-marathonbombing-suspects]]></link><comments><![CDATA[https://www.jmasecurity.com/media-blog/fbi-tape-on-boston-marathonbombing-suspects#comments]]></comments><pubDate>Thu, 18 Apr 2013 23:49:11 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.jmasecurity.com/media-blog/fbi-tape-on-boston-marathonbombing-suspects</guid><description><![CDATA[              Either scripts and active content are not permitted to run or Adobe Flash Player version10.0.0 or greater is not installed.      [...] ]]></description><content:encoded><![CDATA[<div> <div id="202864258933031823" align="left" style="width: 100%; overflow-y: hidden;" class="wcustomhtml"> <object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" width="555" height="457" id="comcastplayer1436"> <param name="movie" value="http://xfinity.comcast.net/ve/1.0/26555459919/555/457/"> <param name="wmode" value="transparent"> <param name="quality" value="high"> <param name="allowScriptAccess" value="always"> <param name="allowFullScreen" value="true"> <object type="application/x-shockwave-flash" data="http://xfinity.comcast.net/ve/1.0/26555459919/555/457/" width="555" height="457"> <param name="wmode" value="transparent"> <param name="quality" value="high"> <param name="allowScriptAccess" value="always"> <param name="allowFullScreen" value="true">  <p>Either scripts and active content are not permitted to run or Adobe Flash Player version10.0.0 or greater is not installed.</p><a href="http://www.adobe.com/go/getflashplayer"><img src="http://www.adobe.com/images/shared/download_buttons/get_flash_player.gif" alt="Get Adobe Flash Player"></a> </object> </object> </div> </div> ]]></content:encoded></item><item><title><![CDATA[Private Security Contractors Replace US Troops]]></title><link><![CDATA[https://www.jmasecurity.com/media-blog/private-security-contractors-replace-us-troops]]></link><comments><![CDATA[https://www.jmasecurity.com/media-blog/private-security-contractors-replace-us-troops#comments]]></comments><pubDate>Fri, 12 Apr 2013 02:58:28 GMT</pubDate><category><![CDATA[private security]]></category><category><![CDATA[security]]></category><guid isPermaLink="false">https://www.jmasecurity.com/media-blog/private-security-contractors-replace-us-troops</guid><description><![CDATA[  Is this a good thing or bad? Let us know your thoughts... [...] ]]></description><content:encoded><![CDATA[<div class="wsite-youtube" style="margin-top:10px;margin-bottom:10px;"><div style="text-align: center;"><object width="500" height="412"><param name="movie" value="http://www.youtube.com/v/E6-dnhnYzcM?version=3"></param><param name="wmode" value="transparent"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed src="http://www.youtube.com/v/E6-dnhnYzcM?version=3" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" wmode="transparent" width="500" height="412"></embed></object></div></div>  <div class="paragraph" style="text-align:left;">Is this a good thing or bad? Let us know your thoughts...</div>]]></content:encoded></item><item><title><![CDATA[The Human Race Santa Rosa CA]]></title><link><![CDATA[https://www.jmasecurity.com/media-blog/the-human-race-santa-rosa-ca]]></link><comments><![CDATA[https://www.jmasecurity.com/media-blog/the-human-race-santa-rosa-ca#comments]]></comments><pubDate>Tue, 09 Apr 2013 20:57:44 GMT</pubDate><category><![CDATA[community event]]></category><category><![CDATA[fundraiser]]></category><category><![CDATA[security guards]]></category><category><![CDATA[security patrol]]></category><guid isPermaLink="false">https://www.jmasecurity.com/media-blog/the-human-race-santa-rosa-ca</guid><description><![CDATA[                       The Human Race is a nationwide community fundraising event for nonprofit organizations and is the largest collaborative fundraising event in Sonoma County as well as the largest Human Race in the nation!  The Sonoma County Race features a 3K and 10K run and walk through Howarth and Spring Lake Parks, rain or shine.  Organizations and businesses recruit walkers/runners/pledge-gatherers to raise funds. Funds can be raised for any nonprofit organization, school or church. The [...] ]]></description><content:encoded><![CDATA[<div class="wsite-youtube" style="margin-top:10px;margin-bottom:10px;"> <div style="text-align: center;"> <object width="400" height="330"> <param name="movie" value="http://www.youtube.com/v/3kZ3X4mMi9w?version=3"> <param name="wmode" value="transparent"> <param name="allowFullScreen" value="true"> <param name="allowScriptAccess" value="always"> <embed src="http://www.youtube.com/v/3kZ3X4mMi9w?version=3" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" wmode="transparent" width="400" height="330"> </object> </div> </div>  <div> <div id="663100906232024212" align="left" style="width: 100%; overflow-y: hidden;" class="wcustomhtml"> <iframe src="//www.facebook.com/plugins/like.php?href=https%3A%2F%2Fwww.facebook.com%2Fjosemiguelalbor&amp;send=false&amp;layout=standard&amp;width=450&amp;show_faces=true&amp;font&amp;colorscheme=light&amp;action=like&amp;height=80" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:450px; height:80px;" allowtransparency="true"></iframe> </div> </div><span class='imgPusher' style='float:left;height:0px'></span><span style='z-index:10;position:relative;float:left;;clear:left;margin-top:0px;*margin-top:0px'><a><img src="https://www.jmasecurity.com/uploads/1/1/5/5/11553190/8233798.jpg" style="margin-top: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 10px; border-width:1px;padding:6px;" alt="Human Race 2013 Santa Rosa CA JMA Private Security Community Event" class="galleryImageBorder"></a></span>  <div style="display: block; font-size: 90%; margin-top: -0px; margin-bottom: 0px; text-align: center;"> <span style='z-index:10;position:relative;float:left;;clear:left;margin-top:0px;*margin-top:0px'></span> </div>  <div class="paragraph" style="text-align:left;display:block;"> The Human Race is a nationwide community fundraising event for nonprofit organizations and is the largest collaborative fundraising event in Sonoma County as well as the largest Human Race in the nation!<br> <br> The Sonoma County Race features a 3K and 10K run and walk through Howarth and Spring Lake Parks, rain or shine.<br> <br> Organizations and businesses recruit walkers/runners/pledge-gatherers to raise funds. Funds can be raised for any nonprofit organization, school or church. The run and walk is open to all.<br> <br> The Human Race is a proven fundraiser that has been successful for Sonoma County nonprofits for 31 years and continues to grow. The Volunteer Center provides marketing, publicity, materials, and experienced assistance. Nonprofits and businesses provide the people power.<br> <br> In 2012 there were over 8,500 participants, and over $700,000 was raised for over 253 nonprofits who benefited from the event. The first Human Race in 1981 raised $1,800.<br> <br> <br> For additional information or to support&nbsp;<strong style=""><u style=""><font color="#FF0000">The Human Race</font></u></strong>&nbsp;visit&nbsp;http://www.humanracenow.org/race-info/<br> </div> <hr style="width:100%;clear:both;visibility:hidden;"> ]]></content:encoded></item><item><title><![CDATA[North Korea vows to restart nuclear facilities]]></title><link><![CDATA[https://www.jmasecurity.com/media-blog/north-korea-vows-to-restart-nuclear-facilities]]></link><comments><![CDATA[https://www.jmasecurity.com/media-blog/north-korea-vows-to-restart-nuclear-facilities#comments]]></comments><pubDate>Tue, 02 Apr 2013 19:14:46 GMT</pubDate><category><![CDATA[north korea]]></category><guid isPermaLink="false">https://www.jmasecurity.com/media-blog/north-korea-vows-to-restart-nuclear-facilities</guid><description><![CDATA[ SEOUL, South Korea (AP) &mdash; North Korea said Tuesday it will restart its long-shuttered plutonium reactor and increase production of nuclear weapons material, in what outsiders see as its latest attempt to extract U.S. concessions by raising fears of war.A spokesman for the North's General Department of Atomic Energy said scientists will quickly begin "readjusting and restarting" the facilities at its main Nyongbyon nuclear complex, including the plutonium reactor and a uranium enrichment p [...] ]]></description><content:encoded><![CDATA[<span class='imgPusher' style='float:left;height:0px'></span><span style='z-index:10;position:relative;float:left;;clear:left;margin-top:0px;*margin-top:0px'><a><img src="https://www.jmasecurity.com/uploads/1/1/5/5/11553190/2671066.jpg" style="margin-top: 5px; margin-bottom: 10px; margin-left: 0px; margin-right: 10px; border-width:1px;padding:3px;" alt="Picture" class="galleryImageBorder" /></a><div style="display: block; font-size: 90%; margin-top: -10px; margin-bottom: 10px; text-align: center;"></div></span> <div class="paragraph" style="text-align:left;display:block;">SEOUL, South Korea (AP) &mdash; North Korea said Tuesday it will restart its long-shuttered plutonium reactor and increase production of nuclear weapons material, in what outsiders see as its latest attempt to extract U.S. concessions by raising fears of war.<br /><span style=""></span><br /><span style=""></span>A spokesman for the North's General Department of Atomic Energy said scientists will quickly begin "readjusting and restarting" the facilities at its main Nyongbyon nuclear complex, including the plutonium reactor and a uranium enrichment plant. Both could produce fuel for nuclear weapons.<br /><span style=""></span><br /><span style=""></span>The reactor began operations in 1986 but was shut down as part of international nuclear disarmament talks in 2007 that have since stalled. North Korea said work to restart the facilities would begin "without delay." Experts estimate it could take anywhere from three months to a year to reactivate the reactor.<br /><span style=""></span><br /><span style=""></span>The announcement will boost concerns in Washington and among its allies about North Korea's timetable for building a nuclear-tipped missile that can reach the United States, although it is still believed to be years away from developing that technology.<br /><span style=""></span><br /><span style=""></span>The nuclear vows and a rising tide of threats in recent weeks are seen as efforts by the North to force disarmament-for-aid talks with Washington and to increase domestic loyalty to young North Korean leader Kim Jong Un by portraying him as a powerful military commander.<br /><span style=""></span><br /><span style=""></span>Hwang Jihwan, a North Korea expert at the University of Seoul, said the North "is keeping tension and crisis alive to raise stakes ahead of possible future talks with the United States."<br /><span style=""></span><br /><span style=""></span>"North Korea is asking the world, 'What are you going to do about this?'" he said.<br /><span style=""></span><br /><span style=""></span>The unidentified North Korean atomic spokesman said the measure is meant to resolve the country's acute electricity shortage but is also for "bolstering up the nuclear armed force both in quality and quantity," according to a statement carried by the official Korean Central News Agency.<br /><span style=""></span><br /><span style=""></span>The statement suggests the North will do more to produce highly enriched uranium. Uranium worries outsiders because the technology needed to make highly enriched uranium bombs is much easier to hide than huge plutonium facilities. North Korea previously insisted that its uranium enrichment was for producing electricity &mdash; meaning low enriched uranium.<br /><span style=""></span><br /><span style=""></span>Kim Jin Moo, a North Korea expert at the Korea Institute for Defense Analyses in South Korea, said that by announcing it is "readjusting" all nuclear facilities, including the uranium enrichment plant, North Korea "is blackmailing the international community by suggesting that it will now produce weapons-grade, highly enriched uranium."<br /><span style=""></span><br /><span style=""></span>U.N. Secretary-General Ban Ki-moon said Tuesday that North Korea appears to be "on a collision course with the international community." Speaking in Andorra, the former South Korean foreign minister said the crisis has gone too far and international negotiations are urgently needed.<br /><span style=""></span><br /><span style=""></span>China, North Korea's only major economic and diplomatic supporter, expressed unusual disappointment with its ally. "We noticed North Korea's statement, which we think is regrettable," Chinese Foreign Ministry spokesman Hong Lei said. South Korea also called it "highly regrettable."<br /><span style=""></span><br /><span style=""></span>Yukiya Amano, chief of the International Atomic Energy Agency, said the North's decision "is another step which is deeply troubling for us and the world."<br /><span style=""></span><br /><span style=""></span>The North's plutonium reactor produces spent fuel rods laced with plutonium and is the core of Nyongbyon. It was disabled under a 2007 deal made at now-dormant aid-for-disarmament negotiations involving the North, the U.S., South Korea, Japan, China and Russia.<br /><span style=""></span><br /><span style=""></span>In 2008, North Korea destroyed the cooling tower at Nyongbyon in a show of commitment, but the deal later stalled after the North balked at allowing intensive international fact-checking of its past nuclear activities. North Korea pulled out of the talks after international condemnation of its long-range rocket launch in April 2009.<br /><span style=""></span><br /><span style=""></span>North Korea "is making it clear that its nuclear arms program is the essence of its national security and that it's not negotiable," said Sohn Yong-woo, a professor at the Graduate School of National Defense Strategy of Hannam University in South Korea.<br /><span style=""></span><br /><span style=""></span>North Korea conducted its third nuclear test in February, prompting a new round of U.N. sanctions that have infuriated its leaders. It has since declared that the armistice ending the Korean War in 1953 is void, shut down key military phone and fax hotlines with Seoul, threatened to launch nuclear and rocket strikes on the U.S. mainland and its allies and, most recently, declared at a high-level government assembly that making nuclear arms and a stronger economy are the nation's top priorities.<br /><span style=""></span><br /><span style=""></span>The Korean Peninsula technically remains in a state of war because a truce, not a peace treaty, ended the Korean War. The United States stations 28,500 troops in South Korea as a deterrent to North Korea.<br /><span style=""></span><br /><span style=""></span>Washington has said it takes the threats seriously, though White House press secretary Jay Carney said Monday the U.S. has not detected any military mobilization or repositioning of forces in North Korea.<br /><span style=""></span><br /><span style=""></span>The North's rising rhetoric has been met by a display of U.S. military strength, including flights of nuclear-capable bombers and stealth jets at annual South Korean-U.S. military drills that the allies call routine but that North Korea claims are invasion preparations.<br /><span style=""></span><br /><span style=""></span>South Koreans are familiar with provocations from the North, but its rhetoric over the last few weeks has raised worries.<br /><span style=""></span><br /><span style=""></span>"This is a serious concern for me," said Heo Jeong-ja, 70, a cleaning lady in Seoul. "The country has to stay calm, but North Korea threatens us every day."<br /><span style=""></span><br /><span style=""></span>North Korea added its 5-megawatt plutonium reactor to its nuclear complex at Nyongbyon in 1986, and the country is believed to have exploded plutonium devices in its first two nuclear tests, in 2006 and 2009.<br /><span style=""></span><br /><span style=""></span>There had long been claims by the U.S. and others that North Korea was also pursuing a secret uranium program. In 2010, the North unveiled to visiting Americans a uranium enrichment program at Nyongbyon.<br /><span style=""></span><br /><span style=""></span>Analysts say they don't believe North Korea currently has mastered the miniaturization technology needed to build a warhead that can be mounted on a missile, and the extent of its uranium enrichment efforts is also unclear.<br /><span style=""></span><br /><span style=""></span>Scientist and nuclear expert Siegfried Hecker, one of the Americans on the 2010 visit to Nyongbyon, has estimated that North Korea has 24 to 42 kilograms of plutonium &mdash; enough for perhaps four to eight rudimentary bombs similar to the plutonium weapon used on Nagasaki in World War II.<br /><span style=""></span><br /><span style=""></span>It's not known whether the North's latest atomic test, in February, used highly enriched uranium or plutonium stockpiles. South Korea and other countries have so far failed to detect radioactive elements that may have leaked from the test and which could determine what kind of device was used.<br /><span style=""></span><br /><span style=""></span>North Korea is under a U.N. arms embargo over its nuclear program. On Tuesday, the U.N. General Assembly overwhelmingly approved a treaty regulating international arms trade over the objection of North Korea, Iran and Syria.<br /><span style=""></span><br /><span style=""></span></div> <hr style="width:100%;clear:both;visibility:hidden;"></hr>  <div class="paragraph" style="text-align:left;">SEOUL, South Korea (AP) &mdash; North Korea said Tuesday it will restart its long-shuttered plutonium reactor and increase production of nuclear weapons material, in what outsiders see as its latest attempt to extract U.S. concessions by raising fears of war.<br /><span style=""></span><br /><span style=""></span>A spokesman for the North's General Department of Atomic Energy said scientists will quickly begin "readjusting and restarting" the facilities at its main Nyongbyon nuclear complex, including the plutonium reactor and a uranium enrichment plant. Both could produce fuel for nuclear weapons.<br /><span style=""></span><br /><span style=""></span>The reactor began operations in 1986 but was shut down as part of international nuclear disarmament talks in 2007 that have since stalled. North Korea said work to restart the facilities would begin "without delay." Experts estimate it could take anywhere from three months to a year to reactivate the reactor.<br /><span style=""></span><br /><span style=""></span>The announcement will boost concerns in Washington and among its allies about North Korea's timetable for building a nuclear-tipped missile that can reach the United States, although it is still believed to be years away from developing that technology.<br /><span style=""></span><br /><span style=""></span>The nuclear vows and a rising tide of threats in recent weeks are seen as efforts by the North to force disarmament-for-aid talks with Washington and to increase domestic loyalty to young North Korean leader Kim Jong Un by portraying him as a powerful military commander.<br /><span style=""></span><br /><span style=""></span>Hwang Jihwan, a North Korea expert at the University of Seoul, said the North "is keeping tension and crisis alive to raise stakes ahead of possible future talks with the United States."<br /><span style=""></span><br /><span style=""></span>"North Korea is asking the world, 'What are you going to do about this?'" he said.<br /><span style=""></span><br /><span style=""></span>The unidentified North Korean atomic spokesman said the measure is meant to resolve the country's acute electricity shortage but is also for "bolstering up the nuclear armed force both in quality and quantity," according to a statement carried by the official Korean Central News Agency.<br /><span style=""></span><br /><span style=""></span>The statement suggests the North will do more to produce highly enriched uranium. Uranium worries outsiders because the technology needed to make highly enriched uranium bombs is much easier to hide than huge plutonium facilities. North Korea previously insisted that its uranium enrichment was for producing electricity &mdash; meaning low enriched uranium.<br /><span style=""></span><br /><span style=""></span>Kim Jin Moo, a North Korea expert at the Korea Institute for Defense Analyses in South Korea, said that by announcing it is "readjusting" all nuclear facilities, including the uranium enrichment plant, North Korea "is blackmailing the international community by suggesting that it will now produce weapons-grade, highly enriched uranium."<br /><span style=""></span><br /><span style=""></span>U.N. Secretary-General Ban Ki-moon said Tuesday that North Korea appears to be "on a collision course with the international community." Speaking in Andorra, the former South Korean foreign minister said the crisis has gone too far and international negotiations are urgently needed.<br /><span style=""></span><br /><span style=""></span>China, North Korea's only major economic and diplomatic supporter, expressed unusual disappointment with its ally. "We noticed North Korea's statement, which we think is regrettable," Chinese Foreign Ministry spokesman Hong Lei said. South Korea also called it "highly regrettable."<br /><span style=""></span><br /><span style=""></span>Yukiya Amano, chief of the International Atomic Energy Agency, said the North's decision "is another step which is deeply troubling for us and the world."<br /><span style=""></span><br /><span style=""></span>The North's plutonium reactor produces spent fuel rods laced with plutonium and is the core of Nyongbyon. It was disabled under a 2007 deal made at now-dormant aid-for-disarmament negotiations involving the North, the U.S., South Korea, Japan, China and Russia.<br /><span style=""></span><br /><span style=""></span>In 2008, North Korea destroyed the cooling tower at Nyongbyon in a show of commitment, but the deal later stalled after the North balked at allowing intensive international fact-checking of its past nuclear activities. North Korea pulled out of the talks after international condemnation of its long-range rocket launch in April 2009.<br /><span style=""></span><br /><span style=""></span>North Korea "is making it clear that its nuclear arms program is the essence of its national security and that it's not negotiable," said Sohn Yong-woo, a professor at the Graduate School of National Defense Strategy of Hannam University in South Korea.<br /><span style=""></span><br /><span style=""></span>North Korea conducted its third nuclear test in February, prompting a new round of U.N. sanctions that have infuriated its leaders. It has since declared that the armistice ending the Korean War in 1953 is void, shut down key military phone and fax hotlines with Seoul, threatened to launch nuclear and rocket strikes on the U.S. mainland and its allies and, most recently, declared at a high-level government assembly that making nuclear arms and a stronger economy are the nation's top priorities.<br /><span style=""></span><br /><span style=""></span>The Korean Peninsula technically remains in a state of war because a truce, not a peace treaty, ended the Korean War. The United States stations 28,500 troops in South Korea as a deterrent to North Korea.<br /><span style=""></span><br /><span style=""></span>Washington has said it takes the threats seriously, though White House press secretary Jay Carney said Monday the U.S. has not detected any military mobilization or repositioning of forces in North Korea.<br /><span style=""></span><br /><span style=""></span>The North's rising rhetoric has been met by a display of U.S. military strength, including flights of nuclear-capable bombers and stealth jets at annual South Korean-U.S. military drills that the allies call routine but that North Korea claims are invasion preparations.<br /><span style=""></span><br /><span style=""></span>South Koreans are familiar with provocations from the North, but its rhetoric over the last few weeks has raised worries.<br /><span style=""></span><br /><span style=""></span>"This is a serious concern for me," said Heo Jeong-ja, 70, a cleaning lady in Seoul. "The country has to stay calm, but North Korea threatens us every day."<br /><span style=""></span><br /><span style=""></span>North Korea added its 5-megawatt plutonium reactor to its nuclear complex at Nyongbyon in 1986, and the country is believed to have exploded plutonium devices in its first two nuclear tests, in 2006 and 2009.<br /><span style=""></span><br /><span style=""></span>There had long been claims by the U.S. and others that North Korea was also pursuing a secret uranium program. In 2010, the North unveiled to visiting Americans a uranium enrichment program at Nyongbyon.<br /><span style=""></span><br /><span style=""></span>Analysts say they don't believe North Korea currently has mastered the miniaturization technology needed to build a warhead that can be mounted on a missile, and the extent of its uranium enrichment efforts is also unclear.<br /><span style=""></span><br /><span style=""></span>Scientist and nuclear expert Siegfried Hecker, one of the Americans on the 2010 visit to Nyongbyon, has estimated that North Korea has 24 to 42 kilograms of plutonium &mdash; enough for perhaps four to eight rudimentary bombs similar to the plutonium weapon used on Nagasaki in World War II.<br /><span style=""></span><br /><span style=""></span>It's not known whether the North's latest atomic test, in February, used highly enriched uranium or plutonium stockpiles. South Korea and other countries have so far failed to detect radioactive elements that may have leaked from the test and which could determine what kind of device was used.<br /><span style=""></span><br /><span style=""></span>North Korea is under a U.N. arms embargo over its nuclear program. On Tuesday, the U.N. General Assembly overwhelmingly approved a treaty regulating international arms trade over the objection of North Korea, Iran and Syria.<br /><span style=""></span><br /><span style=""></span></div>]]></content:encoded></item><item><title><![CDATA[Stealth Bombers over North Korea To Show Power]]></title><link><![CDATA[https://www.jmasecurity.com/media-blog/stealth-bombers-over-north-korea-to-show-power]]></link><comments><![CDATA[https://www.jmasecurity.com/media-blog/stealth-bombers-over-north-korea-to-show-power#comments]]></comments><pubDate>Tue, 02 Apr 2013 19:12:03 GMT</pubDate><category><![CDATA[north korea]]></category><guid isPermaLink="false">https://www.jmasecurity.com/media-blog/stealth-bombers-over-north-korea-to-show-power</guid><description><![CDATA[ [...] ]]></description><content:encoded><![CDATA[<div class="wsite-youtube" style="margin-top:10px;margin-bottom:10px;"><div style="text-align: center;"><object width="400" height="330"><param name="movie" value="http://www.youtube.com/v/uHTsfFnJo5M?version=3"></param><param name="wmode" value="transparent"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed src="http://www.youtube.com/v/uHTsfFnJo5M?version=3" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" wmode="transparent" width="400" height="330"></embed></object></div></div>]]></content:encoded></item></channel></rss>