Security Guards Cut Days before Camden Office Stabbing

Security Guards Cut Days before Camden Office Stabbing

The head of a union that represents child welfare employees said the stabbing of a state caseworker in a Camden Office building came three days after security officers were redeployed from the location, according to a report.

Authorities said Camden resident Taisha Edwards, 30, went after the caseworker with a knife around 1 p.m. at a Haddon Avenue office. Edwards has a history of mental illness, police said. The victim, 29-year-old Leah Coleman, was stabbed more than 20 times, according to media reports.

Camden County Police Chief Scott Thomson said Edwards used a 9-inch steak knife and called the attack "sudden and swift." Coleman suffered stab wounds to the face, chest and back.

Camden County Prosecutor's Office spokesman Andy McNeil said other workers in the state office subdued the suspect, who was charged with attempted murder, aggravated assault and weapons offenses.

They have eliminated security for the most dangerous job in the state," said Hetty Rosenstein, area director for the Communications Workers of America.

Judith Meltzer, a monitor appointed to oversee New Jersey's child welfare system, said Tuesday morning she was looking into changes that resulted in Department of Human Services police being redeployed from the site.

But she added caseworkers thrust into volatile family situations need to feel safe.

"There's certainly a danger when something like this happens, given the amount of attention it will get, that it will have a chilling effect on the people willing to do this kind of work," Meltzer noted.

About the Author

Matt Holden is an Associate Content Editor for 1105 Media, Inc. He received his MFA and BA in journalism from Ball State University in Muncie, Indiana. He currently writes and edits for Occupational Health & Safety magazine, and Security Today.

Featured

  • Teaching Old Dogs, New Tricks

    After more than 30 years in the security integration business, today’s video surveillance systems are certainly not the same CCTV systems I sold and installed when I first started hanging cameras. Back in the day, there were only a handful of companies out there and one that started with a “P” stood above the rest. If you were fortunate enough to get invited to travel on their private jet out to California to tour the factory, it was a real honor. I have a picture somewhere in my garage collecting dust, of me sitting in the co-pilot seat. I know, old-man highlights, but still very cool. Read Now

  • Why Communication is Key in an Emergency

    During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery. Read Now

  • Trust But Verify

    Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks. Read Now

  • Impact on Digital Transformation

    A 2023 Statista report projects that by 2030 there will be 30 billion Internet of Things (IoT) devices in use. That is three times as many as there were in 2020. The numbers continue to grow because connecting sensors and systems, especially across a business, promises big efficiency gains and new insights. As such, the IoT and IIoT (Industrial Internet of Things) have become a launching pad for digital transformation -- not only for individual organizations but for entire industries. Read Now

Featured Cybersecurity

Webinars

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3