Blog Post

Leveling the Playing Field

By Steven Barket
Las Vegas

NOTE: I am not an attorney, nor can I give legal advice. These are my opinions formed over decades of work.

When it comes to leveling the playing field against an adversary, telling your side of the story is crucial. In any conflict or dispute, there are multiple perspectives and interpretations of the events that have taken place. If you allow your opponent to define the narrative unchallenged, you risk losing control of the conversation and becoming overwhelmed by their version of events.

By telling your side of the story, you can provide context and nuance to a situation. You can explain why certain decisions were made, clarify your intentions, and refute false accusations. In doing so, you can help to create a more accurate picture of the situation for those who are following the dispute and make it harder for your opponent to spin the narrative in their favor.

One of the most effective ways of telling your side of the story is through clear and concise communication. This can be in the form of press statements, interviews, or social media posts. It is essential to avoid getting bogged down in the details of the dispute and instead focus on the key messages that you want to convey. By keeping your messages simple, you can ensure that they are easily understood and have the greatest impact.

Another important tool for telling your side of the story is to build a strong narrative around your position. By creating a compelling story, you can engage people emotionally and help them to understand your perspective. A strong narrative includes elements such as characters, conflict, and resolution. By framing your position in this way, you can help people to understand the motivations behind your decisions and see the situation in a more nuanced way.

In addition to clear communication and a strong narrative, it is essential to have a proactive approach to dealing with your opponent’s accusations. If you allow false accusations to go unchallenged, they will quickly become accepted as the truth, making it harder to fight back later. Instead, it is crucial to have a swift and robust response to any claims made against you, using facts and evidence to refute their arguments.

Finally, it is important to take the high road when telling your side of the story. This means avoiding personal attacks or inflammatory language, as this will only serve to detract from your position. Instead, focus on the key messages that you want to convey and present them in a calm, reasoned manner.

Telling your side of the story is an essential tool in leveling the playing field against an adversary. By providing context and nuance to a situation, creating a strong narrative, and being proactive in your approach, you can help people to understand your perspective and refute false accusations. By maintaining a calm and reasoned tone, you can ensure that your messages are heard and that your position is taken seriously. Ultimately, by telling your side of the story, you can help to create a more accurate picture of the situation and ensure that justice is served.

Physical Security is a Growing Concern

By Steven Barket
Las Vegas

NOTE: I am not an attorney, nor can I give legal advice. These are my opinions formed over decades of work.

Physical security in urban environments is a growing concern for individuals and organizations alike. As populations grow and cities expand, more people are living and working in urban areas, and the need to maintain physical security is becoming increasingly important. In this essay, we will explore some of the challenges faced in establishing physical security measures in urban environments and discuss some of the strategies that can be employed to overcome them.

One of the main challenges in establishing physical security in urban environments is the complexity of the cityscape. Urban environments are often a labyrinthine mixture of buildings, bridges, roads, and public spaces, which can make establishing clear boundaries and access control points challenging. Criminals and other malicious actors can exploit the complex urban environment, blending in with the population or using the architecture to their advantage.

To counter this challenge, urban planners and security professionals can employ a variety of strategies. First, physical barriers like bollards, fences, and walls can be used to create clear boundaries and restricted access points. Second, technology such as CCTV, access control systems, and alarms can be used to monitor traffic and secure vulnerable areas. Finally, everyone who wants to pay attention to these kinds of measures can be engaged through education and awareness campaigns to help identify and report suspicious behavior.

However, there are other challenges to establishing physical security in urban environments, including the need for emergency response systems. Due to the high population densities and complex building structures, response times for emergency services can be slower in urban areas. This can be particularly problematic in the case of critical incidents, where quick responses can be the difference between life and death.

To address these concerns, emergency response systems need to be designed to be predictive and reactive. Predictive emergency response systems rely on technology such as sensors and predictive analytics to anticipate when and where an incident may occur. Reactive emergency response systems deal with the aftermath of an incident, facilitating the rapid response of emergency services and the rescue of victims.
Effective emergency response systems rely on close collaboration between security professionals, emergency services, and local government. This can be achieved by establishing clear communication lines and setting up joint training exercises. It is also essential to establish protocols for managing information sharing and emergency responses.

Another challenge facing security professionals in urban environments is the need for effective communication. Due to the large and diverse populations that often exist in urban areas, communicating with the public effectively can be a challenge. Security organizations need to be proactive in developing communication strategies that engage the public and facilitate the reporting of suspicious activity.
To tackle this challenge, security organizations can engage with local communities, businesses, and other stakeholders. This can be achieved through community outreach programs, town hall meetings, and the establishment of advisory groups. By creating these lines of communications, security organizations can establish themselves as partners in the community, gathering valuable information and intelligence that can be used to prevent crime and protect the public.

Establishing physical security in urban environments remains a significant challenge in contemporary society. However, by using a range of architectural, technological and engagement strategies, you can overcome some of the challenges. The critical components of effective physical security in urban areas include establishing clear boundaries, deploying advanced technology, and building relationships with the community. Effective security systems are key to ensuring the safety of the public and the continued growth of urban environments.

Maintaining Personal Security

By Steven Barket
Las Vegas

NOTE: I am not an attorney, nor can I give legal advice. These are my opinions formed over decades of work.

Personal security is an essential aspect of our daily lives. In today’s modern world, where our lives revolve around connectivity, we expose ourselves to a vast array of digital and physical risks. It is, therefore, crucial to understand how to maintain personal security to prevent unwanted consequences that could arise from digital or physical threats.

When it comes to personal security, the most crucial factor is to be aware of the threats and the potential risks involved. Not being aware of the possible threats is like walking blindfolded into the woods. You are exposing yourself to unnecessary dangers. Being aware of the threats allows us to take preventative measures, which could save us from disastrous consequences. It is essential to identify possible personal security threats and determine how to manage the risks.

In today’s hyper-connected world, digital security is equally important as physical security. Cybersecurity is an ever-increasing issue; hackers breed in places where they can find the slightest of vulnerabilities. It’s important to recognize the risks of cyber threats and how they are carried out to steer clear of potential attacks. A crucial step to maintain digital security is by regularly updating passwords, ensuring two-factor authentication wherever possible, and avoiding public Wi-Fi networks to handle sensitive information.

Another aspect of personal security is physical security. Personal security risks vary from everyday scenarios, such as walking on a dimly lit street, to international business travel. It is important to evaluate the environmental factors of the area you are in, and if there are any known hazards, to exercise the necessary precautions. When outside in an unfamiliar area at night, use well-lit and populated areas to move around, always avoiding areas that pose a potential threat.

One must be able to determine where they are in an environment and determine what potential risks are around them. Spend some time familiarizing yourself with a building or area before fully letting your guard down. If you travel internationally for work or personal reasons, consider employing the help of a professional firm that specializes in trip security, providing diversified solutions that can help you manage potential risks and ensure your safety throughout your stay.

Understanding personal security threats isn’t enough. One must take proactive measures to ensure personal security at all times. One such step is practicing good basic hygiene practices in handling personal data. Limiting the personal information we give out is a good start. Furthermore, avoid posting personal data on social media platforms and other public domains that could make it easy for people to identify your location and personal profile.

In a world that is ever changing, security systems are becoming more advanced and sophisticated. The days of using standard metal keys to secure property are long gone. Today’s home and business security systems are advanced, offering impenetrable solutions that are almost impossible to get past. Such systems include facial recognition, retina scanning, and thumbprint technology, which offer an unparalleled level of personal security.

It is important to have emergency plans in place, such as holding fire drills in your place of work, and talking to your family about what to do in case of an emergency at home. It is important to make sure that those close to you know how to handle different emergency situations to make sure everyone stays safe.

In conclusion, personal security is a crucial aspect of our daily lives. With the widespread use of technology, it is important to understand digital and physical security risks and how it impacts us. Promoting personal security awareness involves identifying potential threats, practicing basic hygiene life practices, employing proactive measures, and being prepared for emergency situations. In the end, maintaining personal security boils down to being aware, alert, and taking the necessary steps to prevent catastrophic situations and keeping ourselves and our loved ones safe.

The Effort to Maintain Anonymity Online

NOTE: I am not an attorney, nor can I give legal advice. These are my opinions formed over decades of work.

In the age of social media and the internet, it can be a challenge trying to maintain anonymity online. Whether you’re an avid social media user or you’re simply browsing the web, it’s important to understand the risks associated with sharing personal information online. While social media platforms and websites are designed to keep users connected and engaged, they can also be a breeding ground for cybercriminals looking to steal personal information and identities.

One of the most effective ways to stay anonymous online is to use a Virtual Private Network (VPN). VPNs create a secure connection between your device and the internet, helping to protect your data from prying eyes. By routing your internet traffic through a secure network of servers, VPNs help to protect your data by encrypting your traffic and masking your IP address. This allows you to browse the web with an added layer of privacy, making it more difficult for advertisers and cybercriminals to track your online activity.

Another effective way to stay anonymous online is to use a Tor browser. Tor stands for The Onion Router and is a free, open-source browser that allows users to browse the internet anonymously. The Tor browser uses a network of servers to encrypt your communication and mask your IP address, making it difficult for anyone to track your online activity. However, it’s worth noting that Tor is not a perfect solution and using it can sometimes slow down your internet speed.

Another way to stay anonymous online is to use a disposable email address. Disposable email addresses are temporary email accounts that allow you to sign up for services or subscribe to newsletters without providing your real email address. This helps to protect your personal information from phishing attacks and spam emails. By using a disposable email address, you can avoid receiving unwanted emails or having your email address sold to third-party advertisers.

It’s important to use strong passwords when creating accounts online. Weak passwords are easy to hack and can be a major vulnerability. A strong password should include a mix of uppercase letters, lowercase letters, numbers, and symbols. Additionally, you should avoid using the same password for multiple accounts. Use a password manager to create and store unique, strong passwords for all of your accounts to stay safe online.

Be mindful of the information you share online. Social media platforms are designed to encourage users to share personal details, but it’s important to be careful with the information you share. Try to avoid sharing your full name, address, phone number, or other sensitive personal information online. Additionally, be cautious about sharing photos with identifying information, such as pictures that show where you live or work.

In conclusion, staying anonymous online is a growing concern for many internet users. By following these tips and best practices, you can enjoy a safer, more secure online experience. Whether you’re using a VPN to encrypt your data, using a disposable email address to protect your personal information, or being mindful of the information you share online, there are many ways to stay anonymous and protect your privacy online. Remember that the internet can be a risky place, but by taking the necessary precautions, you can enjoy all the benefits it has to offer while staying safe and anonymous online.

John L. Smith, Barricade Books and the Anarchist Cookbook Connection

john-l-smith-barricade-books-anarchist-cookbook

By Steven Barket
Las Vegas, Nevada

I’ve previously detailed the relationship between John L. Smith and the publisher of several of his books, Barricade Books.

Barricade is a bit of a notorious book publisher. And by notorious, I really mean sleazy. Just take a look at some of the titles they’ve published: “Naked Came the Stranger,” which was purposefully written to be a bad book — a hoax by a group of writers trying to show how awful and debased and over-sexed American literature had become — “Ordeal” by Linda Lovelace (who you must remember was the star of the breakthrough pornographic movie in the mid-70s, “Deep Throat”, “The Sensuous Woman” by “J”, “Sex and the Single Girl” by Helen Gurley Brown, to name a handful.

But there’s one that’s really just over the top. It’s “The Anarchist Cookbook” by William Powell. First published in early 1970, it truly was a book that provided detailed information on how to create anarchy. It described how to make homemade explosives and other lethal weapons, how to make illicit drugs at home, how to create telecommunications devices, sabotage and survivalist techniques –- all kinds of mayhem. It has been called “the most disquieting ‘how-to’ book of contemporary times.”

Upon deeper review, it seems clear to me why John L. Smith went with this publisher. Sure Barricade Books focuses on memoirs, true crime stories and Mafia titles – certainly subject matter that can have a Vegas connection; but those kinds of books could have connections with almost any major city – New York, Chicago, Boston, L.A., Philadelphia, Miami, Dallas, etc.

The connection is the late founder of Barricade Books, Lyle Stuart. (Stuart died in 2006 at the age of 83.) Stuart had a pretty deep connection with Las Vegas. He was part-owner of the original Aladdin Hotel & Casino in Las Vegas, and he was a gambling authority, who wrote a number of books on gambling, and who also advised casinos on how to protect themselves from cheats and cons.

Stuart’s second wife, Carole Stuart, succeeded him in taking over Barricade Books at his death. The thing is, if I were Barricade Books, if I were Carole, I’d be staying far away from accepting any more books from John L. Smith. JLS already has been the source of a couple of multi-million dollar libel suits with the books he’s written: a $3.1 million libel suit for his book, “Running Scared: The Life and Treacherous Times of Las Vegas Casino King Steve Wynn” and a $15 million libel suit for his book, “Sharks in the Desert: The Founding Fathers and Current Kings of Las Vegas.”

If I’m Barricade Books, and I see a manuscript come in from John L. Smith, I’m returning to sender unopened. But that’s just me.

Of course, it’s a little bit of a comeuppance for Barricade, to be involved in a couple multi-million dollar lawsuits. It was Stuart who it appears took advantage of a young author named William Powell who brought him “The Anarchist Cookbook.” Powell was only 19 years old at the time he was shopping his manuscript around, and he was doing so without an agent. To quote Powell, “I submitted the manuscript directly to a number of publishers without the help or advice of an agent. Ultimately, it was accepted by Lyle Stuart Inc. and was published verbatim – without editing – in early 1970. Contrary to what is the normal custom, the copyright for the book was taken out in the name of the publisher rather than the author. I did not appreciate the significance of this at the time and would only come to understand it some years later when I requested that the book be taken out of print.”

Stuart essentially appropriated the copyright of the book without the author’s knowledge – just took over the copyright of the work of an author who was too young to know any better and who had no professional representation to look out for him.

So now that I think about it, maybe John L. Smith and Barricade Books are just the right match after all.

John L. Smith of the Las Vegas Review Journal – Litigation Exposed

john l smith las vegas review journal exposed

By Steven Barket
Las Vegas, Nevada

Money, money, money, money – MONEY!

That’s the way the O’Jay’s lyrics went at the beginning of their song called, “For the Love of Money” – repeated six times in a row. It was a catchy pop tune from back in the 70s and it seems to capture the core of what John L. Smith is all about: hanging onto that money!

How else would you explain it? This is a guy who gets paid a six-figure salary, had more than $200,000 in cash through various accounts, including retirement accounts, had a nice, pricey home that he lived in and could have used as an asset, yet opted to arrange for his daughter to go to the Ronald McDonald House for cancer treatment, which is set up for low-income families of little means who can’t afford costly medical procedures. Saving all his cash for what, his divorce?

Then, after getting hit with a $15 million libel suit, he files bankruptcy and stiffs other doctors and medical facilities who had helped treat his daughter. Nice.

Consider also, a few years back, the the lawsuit Smith slapped on the publisher of one of his books, “Running Scared: The Life and Treacherous Times of Las Vegas Casino King Steve Wynn.” The suit was filed to try to force the publisher, Barricade Books, to give an accounting of the sales of that book and show royalties that were due to be paid to him. Smith’s lawsuit claimed that the book was in its 15th printing and that Barricade had collected hundreds of thousands of dollars on the sales of the book. Smith thinks there’s somewhere north of $10,000 in royalties owed to him.

Hmmmm.

A quick Google search of the book shows it’s available for as low as $1.00 through eBay. You could also order it for $2.94 from Barnes & Noble, $3.59 from Overstock.com, $5.99 from Biblio … you get the idea. It’s not a high-dollar item. But I guess JLS wants to try to squeeze every penny out of the deal.

(By the way, the production of that book also generated a $3.1 million libel suit filed by Steve Wynn against the publisher, Barricade Books.)

Barricade Books may be one of the sleaziest book publishers out there. They say they are an independent publishing company specializing in non-fiction titles and featuring biography, memoirs, true crime and Mafia titles. They also seem to like to court controversy. Just check out a few of their juicier titles: “Naked Came the Stranger,” which was written to be bad, and full of sex, as something of a hoax by a group of writers trying to show how awful and debased American literature had become, “Ordeal” by Linda Lovelace, “The Sensuous Woman” by “J”, “Sex and the Single Girl” by Helen Gurley Brown, to name a handful.

Come to think of it, I guess Smith trying to squeeze as much as he can out of that deal with Barricade might be necessary for him now. Remember, the man who slapped a $15 million libel suit on him years ago, multi-billionaire Sheldon Adelson, just became the new owner of the Las Vegas Review Journal, where John L. Smith works as a columnist.

If you’re John L. Smith, that’s got to make you a little nervous, don’t you think?

Ex-Metro Detective Thomas (Tom) Dillard Nailed in Jury’s Verdict

dillard court case TORN page 20 highlighted IMG_3995

It doesn’t get any more clear than this one damaging page that you see succinctly summing up the jury’s findings in the United States District Court, District of Nevada case brought by Howard L. Haupt, Plaintiff, versus Thomas D. Dillard, Defendant, case No. CV-S-90-121-PMP(RJJ).

Dillard is a former Metro detective who should have known better. The case brought by Haupt against Dillard hinged on a case that Haupt was charged with in which a 7-year-old boy was abducted from Whiskey Pete’s Casino and was subsequently found dead under a trailer on the casino grounds. Dillard was one of the detectives assigned to that case. Haupt was acquitted in the case but not before Dillard called the judge to try to influence the judge’s instructions to the jury before they began deliberation. The judge admitted that he felt intimidated by Dillard’s actions.

The summary document above is from Day 12 of the trial of Haupt v. Dillard — The Verdict — Page 20. Guilty on all four counts before the jury:
1. Violating Howard Haupt’s right to a fair criminal trial.
2. A finding in favor of the defendant for damages as a result of that violation.
3. Malicious or reckless disregard for Haupt’s right to a fair criminal trial.
4. Punitive damages as a result awarded to plaintiff Haupt for $1 million.

In anybody’s book, that’s a pretty substantial smack-down.