Top Fingerprint Services in Albuquerque, NM 87123

Recent Reviews View all

Albuquerque's Summit Security & Investigation

5.0

By Flepmicks

BUY FAKE PASSPORT, (fastexpertdocs@gmail.com), FAKE DRIVING LICENSE, (DRIVING LICENSE), FALSE IDENTITY CARD, (ID CARD), FALSE VISA, FALSE BIRTH. We are a team of professionals with many years of experience in producing fake passports and other identity documents, best quality producers of fake documents. With more than 10 million documents circulating in the world. We offer only original high qualities of true-false passports, driver driving, ID cards, stamps, birth certificates, fake diplomas international and other products for a number of countries like: USA, Australia, Belgium, Brazil, Norway Canada, Italy, Finland, France, Germany, Israel, Mexico, Netherlands, South Africa, Spain, United Kingdom. Contact: fastexpertdocs@gmail.com General Support: fastexpertdocs@gmail.com Do not hesitate to contact us by email or call at any time and in any discretion. ...read more

Albuquerque's Summit Security & Investigation

5.0

By charlenethay

My big back yard was overgrown with bushes and weeds and was looking just plain awful. I pulled open the yellow pages to look for a landscaping company and at the very top of the list was this company. I called and that same day they were able to stop by. I explained what I wanted and he told me he could get it started the following week. In this conversation I discovered that he was very innovative and accommodating to my needs. My back yard looks phenomenal. Thanks again! ...read more

Albuquerque's Summit Security & Investigation

5.0

By Anonymous

The professionals at Summit Security & Investigation were fantastic. We started out using them for a temporary security job at our house to secure it after a fire. Items had been stolen prior to us hiring them and after the fire. We also hired Robb Hamic to investigate the theft and find the thief, which he did. He helped us to recover a significant amount of or things that we would've lost otherwise. I highly recommend this company to anyone. ...read more

New Photos 16 photos

View all 16

Blogs View more

Albuquerque, NM- find hidden assets prior to filing for divorce

Albuquerque, NM- December 15, 2009-Women who are planning a divorce should find hidden assets prior to hiring an attorney and filing the petition.Women need to look at the impending divorce as a potential pitfall if they don't know the "rules of the game."Divorces are expensive but a bad divorce can torment the parties for a lifetime.Robb Hamic is a licensed Private Investigator and asset location specialist.He has listed some information to help women sort out the details so they can prevail in a marital settlement agreement. "I am shocked at how many men try to hide assets from their wives.Many men have elaborate schemes set up to conceal money, investments, 401K assets, land or houses and income," says Robb Hamic, President of Summit Security&Investigation; http://summitsecurity.accountsupport.com/securityservices.htm#privateinvestigation"Men often use confusion, threats and intimidation to force their spouses to sign off on a divorce that isn't fair," he says.Many of Mr. Hamic's clients contact him prior to hiring an attorney so that they can document hidden assets, income, activity, abuse, children's issues and to find answers to their questions."Divorces can be confusing and I appreciate the opportunity to share my knowledge with my clients so that they can clarify any misconceptions," says Mr. Hamic. New Mexico is considered a "Community Property" state. Community property is defined as all property and debt that was acquired from the date of marriage until legal separation or divorce. The community assets will be split equally by the District Court if the spouses are unable to reach an agreement.Many spouses are not fully aware of the financial affairs of the other party.Many people are concerned that money is missing, values are incorrect or that other assets were acquired during the marriage either in the name of the spouse,relative or a company. Robb Hamic http://www.robbhamic.comis an investigation professional with ten years of private experience prior to being a Bernalillo County Sheriff's Detective, specializing in White-Collar crime.Robb has been hired by many high-profile attorneys in New Mexico and Nevada for pre-divorce asset searches and investigative documentation.Mr. Hamic works directly with clients to uncover the truth and acts as an advocate for their safety.Mr. Hamic combines a blend of investigative services, personal protection, anti-stalking, self-defense training and counter-surveillance methods to meet his client's needs.He typically works for medium to high net-worth individuals dealing in property settlements of at least $500,000.His fees are hourly based plus expenses and he works from a retainer agreement with his clients.Contact Mr. Hamic on his cellular phone for a confidential evaluation. Robb Hamic, President Summit Security&Investigaiton robb@callsummit.com 505-255-7233 (cellular) www.facebook.com/rhamic(facebook) ...read more

By Albuquerque's Summit Security & Investigation December 14, 2009

Negligent Security in New Mexico!

July 31, 2009- Albuquerque, NM-     As the economy continues to deteriorate, an increasing number of New Mexicans are becoming the victim of crimes on commercial properties, gas stations, grocery stores, parking lots, restaurants, night clubs, bars, apartments, property management, hotels and every conceivable other place that people operate for profit.  Business owners have a distinct duty or standard of care to protect their customers, tenants, residents and invitees from injury, crime, danger and risk.  A risk assessment is the first step in determining potential risks.  Business owners in New Mexico are not good about performing risk assessments or the measures that are required to provide adequate security. Don't be the victim.  Contact me if you have been injured.  I may be able to help. robb@callsummit.com Property Managers and owners- this is for you! Countless property managers have been surveyed to determine details of their risk assessment and property security programs. The results were very disappointing because of the apparent lack of understanding of premises liability and negligent security issues on the part of those managers responding to the survey. The survey results indicate that the overwhelming majority of property managers and owners would not be able to successfully defend litigation for negligent security. The plaintiff would probably be successful in demonstrating that, at best, there was a minimal attempt to identify risk. A negligent action would result in injury. The surveys were sent to property managers for commercial properties. The properties included apartments/condominiums, office buildings, hotels/motels, retail stores/malls, manufacturing/assembly facilities, and industrial parks. The results of the surveys reported: Fifty-seven percent of the respondents had not conducted any type of risk assessment for theirproperties. The remaining respondents had conducted some form of risk assessment within the previous two years.The property manager or an independent security consultant conducted the assessments. The analysis tasks included the identification of security risks and vulnerabilities existing within or on the facility property and inspection of the facility to identify actual or potential security vulnerabilities resulting from the facility design or maintenance. Only one survey conducted reported meeting with local law enforcement officials to identify the crime problem within the area.None reported meeting with adjacent businesses to identify common security risks and vulnerabilities or meeting with staff members and tenants to identify their security knowledge and concerns.The minimal actions of the security consultants to identify potential risks bring into question their professional knowledge of premises liability and negligent security claims. This identifies the necessity to ensure that the consultant has the skills and knowledge to best meet your needs.One property reported that a consultant had conducted a risk assessment but there was no written report of findings. The plaintiff's attorney will certainly directly state or imply that there was a "cover up" of risks on the property. More than half of the respondents reported that security instructions, policies and procedures had been compiled but were not readily available to staff members. Less than 30 percent of the respondents stated that the security instructions, policies and procedures had been reviewed within the last year for adequacy, sufficiency and currency. The remainder had not reviewed the security protocols since their initial implementation. None could prove that the security protocols for the property had been communicated to tenants or staff members. Proven awareness of security requirements is a basic litigation issue. About one-half of the properties reported utilizing contract security officers or off-duty police officers. Approximately 15 percent of the respondents reported any form of requirement for staff members or tenants to report specified incidents occurring on the property. The primary response was similar to "any incident that makes for an unsafe workplace." This is basically a "do whatever you want to do" response. One property manager reported, "security is not an issue." This property had not conducted a risk assessment, leading to the conclusion that if you don't know of a potential risk, you have no problem. This type of situation and comment would make for a very ecstatic plaintiff's attorney. There is apparent confusion as to the value of a viable risk assessment program leading to appropriate security protocols. What should I Do To Protect My Property? Once you assess and identify the risk you must develop a proper security protocol. Know the risks Identify reasonable and appropriate risk countermeasures Educate staff and tenants Document activities Reinforce requirements Periodically reevaluate risks and countermeasures Identifying The Risk A methodical risk assessment is the basis for all mitigation actions. Until you know the "enemy", you cannot adequately prepare! The enemy is not only the criminal assailant. The enemy may be a terrorist, a threat to business profitability, negligent security litigation, adverse public relations, and many other personal and business threats. CLICK HEREfor resources for security risk assessments in New Mexico, Colorado and Nevada. A comprehensive risk assessment should be conducted to establish a threat baseline. Periodic reevaluations, normally annually, should be conducted to identify factors that may have changed–new tenants may influence probability factors, may increase or decrease crime potential, world affairs may raise threat levels. Various individuals may conduct risk assessments but the primary qualifier should be the individual's expertise in identifying risk and developing viable countermeasures. The property manager may be very qualified at managing individual properties, but does this person have the requisite knowledge of proper security countermeasures? Using anindependent security consultantmay be an alternative, providing professional expertise and impartiality. A security systems vendor may provide assessment services but caution must be exercised to ensure impartiality. Property managers must be concerned with risk loss events facing their business clients as well as their own staff members. The initial step in any risk assessment is determining the probability that a risk loss event will occur. This is the foreseeability element in potential litigation–did the owner and manager know, or should they have known, that there was a probability that such an event could occur. Many tasks comprise risk identification. An individual risk may not appear to be a problem–when viewed in relationship to other risks, the complexity increases. What to assess is as important as how to conduct the assessment. As a minimum, the following tasks should be included in the risk assessment: Discussions with property management staff and tenants.This is the most important of all risk assessment activities. Staff members and tenants are intimately acquainted with the property and its operation. In their daily activities, they will become aware of problems not readily obvious to the outsider. The greatest outcome is that this promotes "buy in" by staff, management and tenants. The security program becomes a mutual effort when their thoughts are a part of the decision process, thus facilitating compliance with security protocols. Meeting with local law enforcement officials.The type and amount of crime occurring in the neighborhood will impact on criminal acts occurring on your property. No property "is an island unto itself" and must prepare to counter the potential for risk from the external environment. Many law enforcement agencies have crime prevention units that can assist in identifying problem areas. Meeting with adjacent businesses to identify common problems.This provides a conduit for mutual exchange of information and aids in developing mutual assistance programs. Court decisions have held that local security measures do not identify the required standard of care. In other words, each facility is dissimilar in risk and more than one security measure may counter the same risk. A security officer may guard a door at one property while appropriate security devices and response procedures may provide the same degree of protection at another facility. Analyzing the building design and property terrain in terms of potential hazards.Clear sight lines may influence security measures as will design features such as lengthy and winding corridors or extensive landscaping. Identifying property security risks and vulnerabilities.A property utilized to manufacture hazardous materials presents a very different problem than an office building with low profile tenants. Also to be considered is the overflow vulnerabilities caused by adjacent properties. The building with low profile tenants that abuts a chemical plant may inherit the problems of their neighbor. Preparing a risk assessment report.The risk assessment results must be reported to executive management. This document is the justification for security protocols and expenditures. Additionally, it is a vital defense document in the event of litigation. It will show that an effort was made to identify risk–foreseeability in legal jargon–and develop appropriate risk reduction measures. Identifying Reasonable and Appropriate Risk The next step in the process is the identification of appropriate measures to reduce risk. The probability of eliminating all risk is minimal. Risk reduction requires a composite program of personnel, policies, procedures, systems, and devices. Each component plays a unique role and the absence of one component negates the overall effectiveness of the program. Adopting the security measures of other facilities is not the solution to your problem. Each facility is unique in design and risks and therefore, the chosen countermeasures must be appropriate for the facility to be protected. There may be different measures of equal value to use to secure a facility. The question then arises as to the appropriate and cost effective measure to meet your particular need. Security Officers Security officers are one of the primary means of providing protection, however their use is not without potential problems. The quality of personnel and performance standards of the security officer, either proprietary or security vendor, are frequently questioned. Some States do not have minimum personnel and training requirements for security officers, such as Colorado however New Mexico and Nevada have standards for security training, qualifications and background checks.. Therefore, it is important that standards be agreed between the parties to best protect the interests of the property owner and manager. The security plan should state in specific details your service expectations and include penalty and incentive clauses to enhance performance. Security Systems Security systems and devices must be appropriate for their performance expectations and must be periodically inspected and maintained. Once it has been decided to utilize a device or measure, there is an assumption that a need has been recognized by management for that particular level of security. Failure to ensure that the device or measure functions properly will increase liability exposure. Access control and closed circuit television (CCTV) systems are the most commonly used systems. Access control systems include metal keys, combination locks, and most frequently, computer programmable card access devices. The advantage of the card access system is the ease and low cost of personnel access authorization. A unique identification in the access card provides an audit trail for subsequent review and analysis. During the decision making process considerations should be given to integrating various systems to maximize cost efficiencies. Among other things, the access control system can be used for time and attendance reporting, access to restricted areas, monitoring security officer activities, and allowing procurement of supplies and equipment from storage areas. Policies and Procedures Policies and procedures are critical to proper functioning of security activities and performance of systems and devices. Policies must be developed and communicated to staff and tenants to identify management expectations. Policies are complemented by procedures outlining how the policy goals are to be accomplished. The procedures are the "how to" component of the policies. Procedures must be periodically reviewed to ensure they are current and appropriate for an environment subject to frequent change. The human element is a central ingredient of the countermeasures program. A sufficient number ofadequately trained personnelmust be available to implement the procedures atall times that the facility is occupied. Procedures that can be easily and effectively implemented during normal daytime business hours may not be viable during times of reduced staffing. Therefore, the staffing level is a major consideration when choosing measures to implement a policy or procedure. Educating Staff and Tenants Educating staff and tenants, unfortunately for many managers, may be an exercise in futility.  You must be able to demonstrate that staff members and tenants were aware of the requisite policies and procedures. Even when a tenant is responsible for safety and security within their leased space, it is necessary to ensure that they are aware of the security policies and procedures relating to the property common areas. A tenant should be mandated through lease provisions to receive this information and training and also be responsible for providing the information to their employees. Not only must employees and new tenants be made aware of your safety and security expectations upon their assignment to your property, it is necessary to conduct periodic refresher training. The methods used to present this training will be unique to your business environment. It may be formalized lecture style instruction for large groups or an individualized program. Documenting Security Activities Identifying activities to be documented should be outlined in a security manual or related document. Housekeeping activities such as opening and closing entrances, inspection rounds and personnel changes are commonly reported activities. The unusual occurrences provide an area for questions. It is recommended that, as a minimum, the following non-routine occurrences should be documented: Any action or incident resulting in financial loss to any person or corporate entity in excess of a specified minimum about. Any action or incident which could result in financial loss to any person or corporate entity in excess of a specified minimum about. Any action or incident, which is a violation of any criminal law or ordinance. Any action or incident, which could result in civil litigation on behalf of, or against your employer. Any action or incident, which could result in a request for security services at a future time, e.g., potential employee violence problem resulting from spousal abuse restraining order of other actions. Any termination of an employee, which could result in injury to any person, damage to property, or disorderly conduct. Any irregular occurrence, significant maintenance problems, medical emergencies, personal or equipment accident resulting in a requirement for immediate or possible future medical care. Any wherein the occurrence should be report to your employer of recorded for information and future reference. Management, should identify specific examples of each activity to be documented. When in doubt, document the occurrence is a wise directive. Tenants should be required by lease provisions to report specific incidents, particularly of an actual or potential criminal nature. Voluntary reporting increases liability potential. Reevaluating Risks and Countermeasures The only constant in the business environment is change. In the property management arena tenants come and go, the world situation creates new threats, technological advances make security equipment more cost effective, neighborhood demographics change, and security equipment and services vendors suffer the same business crises as property management firms. Periodic appraisals of risks and countermeasures must be conducted to make certain that the proper protection level is provided and that the most cost effective measures are utilized. At least semi-annually, meetings with staff and tenants should be held to obtain input as to the effectiveness of the security protocols. A more detailed risk assessment and analysis should be conducted annually. Is A Risk Assessment A Genuine Business Benefit? There are several financial and non-financial benefits gained from a comprehensive risk assessment. The primary benefit is the increase in safety and security for your staff members and tenants. This benefit is difficult to evaluate in financial terms. It is primarily a psychological benefit that increases productivity because of reduced fear for personal safety. It is a feeling of well being created by the awareness that management is concerned with people as individuals and not solely as instruments of financial gain. The threat of negligent security litigation is omnipresent. A risk assessment with appropriate follow-up will reduce the potential of a lawsuit being filed against the property manager and owner. If litigation is initiated, it will demonstrate that a legitimate attempt was made to provide a safe and secure environment. Where the assessment was conducted and countermeasures instituted, the key issue will be whether the measures were "reasonable and appropriate." Without an assessment, the question will be how could you initiate "reasonable and appropriate" measure if you had no idea of the actual risks to be countered? The risk assessment may suggest the need for various security systems or devices. These measures may be expensive when viewed from the perspective of their singular use. When viewed as part of an integrated system, cost efficiencies can be expanded to cover other vital areas. Why expend funds for a separate time and attendance system or critical items security system when they can be integrated into the overall security system at an appreciably reduced cost? Viewing security as a separate entity, and not as a part of the overall loss prevention strategies, adds unnecessary costs and reduces benefits. Using security as a marketing tool is another benefit. However, this benefit is not without potential pitfalls. The use of such words as "state of the art security" or "high security" may have some potentially costly nuances not readily obvious. They will become obvious during litigation when the plaintiffs allege that because of these or similar words, they reduced their personal vigilance for threats to their safety. It is strongly suggested that any use of security as a marketing tool be discussed with, and approved by, legal counsel. As with other issues, what you intend to say and how it is perceived by others may have completely contradictory interpretations. Don't leave it to a jury to decide; let your legal counsel decide for you before it becomes an issue. The risk assessment should never be viewed as a negative aspect of property management. It is a vital tool in providing a safe and secure environment for staff, tenants, and the public. Foreknowledge is less costly than learning the truth through litigation. About the writer Robb Hamic is a former Bernalillo County Sheriff's Deputy and Detective and US Army Gulf War Veteran. He is the principal of Summit Security & Investigation, a regional security provider to the Southwest.  Mr. Hamic is a private investigator, security consultant and expert witness.  He was featured in theAmerican Society for Industrial Security Magazine "Security Management" in July 2009.  Mr. Hamic is an author and writes a normal training articles for law enforcement trainers.  He is a certified law enforcement trainer and instructs thousands in self defense, use of force, security and law enforcement training yearly.  Mr. Hamic is also a military trainer.  He can be reached by e-mail: robb@callsummit.com and you can visit his websites:Summit Security & Investigation,Summit Self DefenseorIsraeli Combat Shooting. Bibliography Blake, William F., CPP, CFE and Walter F. Bradley, Esq.,Premises Security: A Guide for Security Professionals and Attorneys, Butterworth-Heinemann, Boston, MA, 1999 Fischer, Robert J. and Geion Green,Introduction to Security, 5th Edition, Butterworth-Heinemann, Boston, MA, 1992 Hayes, Read, CPP,Retail Security and Loss Prevention, Butterworth-Heinemann, Boston, MA, 1991 American Society for Industrial Security (ASIS), various articles and points of reference International Protection Officers Manual 7th edition , Butterworth-Heinemann, Boston, MA, 2003 ...read more

By Albuquerque's Summit Security & Investigation October 11, 2009

Robb Hamic: Every Business needs a risk assessment/ security plan

August 5, 2009- Albuquerque, NM-     Robb Hamic says, "If you are a business owner- you are flying blind without a good risk assessment and security plan no matter the size of your business."  If you invite people to your location, you are responsible in some way for their safety.  Employee security is also a big concern for New Mexico business.  In the event of lawsuit, you may pay the price if you don't have one.  Security companies are also responsible for providing a good plan for their clients.Security professionals have been struggling for years with the daunting task of designing operational procedures and protocols for their staff.The challenge of security protocol design lies in adapting operational and business considerations, with legal constraints into one effective, threat oriented procedure. Unfortunately, security and threat mitigation are not always the first issues to contend with in the design process. In fact, liability issues and business objectives, while extremely important, may overshadow the threat mitigation needs of the organization; a situation that can produce a reactive and ultimately ineffective security procedures.This predicament dictates the design of a security procedures that includes the following:-Highly articulated procedures that describe in detail: suspicion detection, threat         assessment and threat mitigation-A comprehensive decision making matrix that can accommodate liability constraints.-Simple and easy-to-understand procedures that can be integrated smoothly into general operations.-Mitigation procedures that have both a deterrence effect and a customer service value.In order to design an effective threat oriented protocol we must first identify the aggressors' capabilities, resources and methods of operation with regard to the specific environment being protected.  Simulating the aggressors and their method of operation will help to compile suspicion indicators as they are derived from each terrorist or criminal scenario and integrate them into the protocol.The security procedure should also include a comprehensive decision making matrix. When designing this matrix it is extremely important to differentiate between threat and suspicion. Suspicion can be defined as "any unusual or abnormal behavior or situation that MIGHT indicate threat". Threat, on the other hand, can be identified as "a suspicion indicator that could not be refuted and therefore is threatening" This distinction generates a protocol where the decision-making hierarchy is based on the following segmentation:-Responsibility for detection of suspicion.-Responsibility for assessment of threat.-Responsibility for deployment of mitigation procedures.The language of the protocols and procedure should be simple and articulated to reflect exactly the action required from the law enforcement officer or security guard. It is important to avoid legal vocabulary and keep the wording short and to the point. Creating a common terminology around the protocol facilitates the integration of the protocol and the training of personnel.The mitigation procedures should have a deterrence effect for the aggressor, yet a customer service value for the innocent bystander. The biggest deterrence for terrorists and criminals is a security officer armed with all the right questions. The protocol should include who-what-where questions that can be used by personnel to assess threat and refute suspicion. A question such as "how can I help you?" is surprisingly effective in creating both customer satisfaction and terrorist and criminal deterrence.The design and maintenance of a proactive threat oriented procedure is certainly a challenging task that requires attention to many different constraints and objectives. This newsletter covers only some of the issues concerning security protocol design. If you want more information on security and threat mitigation procedure design, please contactRobb Hamic, President ofSummit Security & Investigation. ...read more

By Albuquerque's Summit Security & Investigation October 11, 2009