PPOs
PPOs
PPOs
PROFESSIONAL
PROTECTION
OFFICER
PRACTICAL SECURITY
STRATEGIES AND EMERGING
TRENDS
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or any information storage and retrieval system, without
permission in writing from the publisher. Details on how to seek permission, further information about the
Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance
Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher
(other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden
our understanding, changes in research methods, professional practices, or medical treatment may become
necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and
using any information, methods, compounds, or experiments described herein. In using such information or
methods they should be mindful of their own safety and the safety of others, including parties for whom they
have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any
liability for any injury and/or damage to persons or property as a matter of products liability, negligence
or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the
material herein.
ISBN: 978-1-85617-746-7
10 11 12 13 14 10 9 8 7 6 5 4 3 2 1
Contents
iii
iv CONTENTS
6. Effective Communications
CHARLES T. THIBODEAU III
Effective Communications Defined 75 PROTECTION OFFICER
Due Diligence Based on Effective FUNCTIONS
Communications 75
Channels of Communications 76
The Six Essentials of Effective 9. Automation in Protection Operations
Communications 76 KEVIN E. PETERSON
Consider the Audience 76
Verifying Communications with Feedback 77 Historical Perspective 107
Myths and Misconceptions in Contemporary Security Environment 108
Communications 77 The Role of the Professional Protection Officer 112
Proper Use of Communications Devices 77 Summary 113
Summary 80 References 114
CONTENTS v
Convergence 179
Continuing Education 180
V
Physical Security Certification 180 SAFETY AND FIRE
References 181
Resources 181
PROTECTION
Introduction 295
VII Causes of Disruptive Behavior 296
Stages of Management of Disruptive
DEVIANCE CRIME AND Behavior 296
VIOLENCE Crisis Development Behavior Modules 297
Protection Officer Guidelines 298
Verbal and Physical Disruptive Behavior 298
22. Workplace Crime and Deviance Empathic Listening 299
NORMAN R. BOTTOM AND Nonverbal Communications 299
WHITNEY D. GUNTER Controlling Disruptive or Violent Behavior 299
Team Intervention 300
Theories of Workplace Crime 255 Positive Factors Resulting from Team
Theft Prevention 258 Approach 300
Response to Theft 262 Leadership in the Team Approach 301
Summary 264 Safety Considerations in Crisis
References 266 Intervention 301
Resources 266 Conclusion 301
Resources 302
23. Substance Abuse
FRANCIS J. ELLIOTT, 26. Strikes, Lockouts, and
GLEN KITTERINGHAM, AND
TERENCE M. GIBBS Labor Relations
DAVID J. DELONG
Impact on Business and Industry 270
Substance Abuse: What is the Motivation? 271 Strikes 305
How Problematic Behavior and Dependence Searches 308
Develop? 272 Employee Misconduct and Dishonesty 309
How is Substance Abuse Perpetuated? 273 Employee Discipline 309
Conditions Adversely Affecting the Types of Discipline 309
Workplace 274 Arbitration 310
How Must Industry Respond? 274 Summary 310
viii CONTENTS
Introduction 331
Types of Potential Emergencies 332
Scope of the Problem 335 IX
Emergency Planning Considerations 336
Vulnerability Analysis 338 INVESTIGATIONS
Developing the Emergency Response Plan 342
Reviewing and Integrating The Emergency
31. Investigation: Concepts and Practices
Response Plan 343
Conclusion 346 for Security Professionals
References 346 CHRISTOPHER A. HERTIG
Resource 347
Investigative Logic 383
History of Investigation 384
29. Terrorism Preliminary Investigation 385
ROBERT METSCHER Follow-up Investigation 385
Intelligence 386
What is Terrorism: A Definition Dilemma 349 Liaison 387
Why Violence? Why They Do What They Do 352 Notes and Reports 388
The Reason for the Action 353 Auditing 389
CONTENTS ix
Interviews 390 Overt Personal Surveillance 422
Investigative or Focused Interviews 391 Covert Electronic Surveillance 422
Informants 393 Overt Electronic Surveillance 423
Undercover Investigations 394 Equipment Requirements 423
Shopping Services 395 Privacy Issues 423
Surveillance 395 Recording and Retention 424
Behavior/Condition Analysis 396
Testifying in Legal and Quasi-Legal Proceedings 397
Managing Investigations 398
35. Report Writing and Field Notes
Conclusion 399 RAV-ZURIDAN YISRAEL
References 401
Resources 401 Introduction 427
Importance of Report Writing 427
Field Notes 428
32. Crime and Incident Scene Reports Should be Written 428
Procedures What Should be Reported 429
DENNIS SHEPP Qualities of Good Reports 429
References 431
What is an Incident? 403
The Scene 404
Hazards to an Incident Scene 404
Determining Boundaries 405 X
Protect and Preserve the Scene 405
Evidence 406
LEGAL ASPECTS OF
Making Detailed and Accurate Notes 408 SECURITY
Working with Law Enforcement and
Investigators 409
Conclusion 410
36. Legal Aspects of Security
References 410 DAVID L. RAY
Introduction 435
33. Interviewing and Statements The Development of Our Laws 436
DENNIS SHEPP Types of Laws—Criminal and Civil 437
Conclusion 446
Introduction 413
What is Interviewing? 413
The Power of Communication 414
The Interview Process 416 XI
Deception 417
Concluding the Interview 418 OFFICER SAFETY AND
Conclusion 418 USE OF FORCE
References 419
Resources 419
37. Use of Force
CHARLES T. THIBODEAU AND
34. Foundations for Surveillance CHRISTOPHER A. HERTIG
MICHAEL STROBERGER
Use of Force 449
General Types 421 Use of Force in General 450
Covert Personal Surveillance 422 Justifying the Use of Force 451
x CONTENTS
The security world is constantly changing, constant attention; as one famous terrorist agency
both in the context in which it has to operate, once remarked, “We only have to succeed once.”
and in terms of what it can offer as a response Being on our guard, benefiting from research
to a wide range of threats. This is true across the findings, and following good practice are cru-
world. Indeed, globalization and the impact of cial. Books like this one are designed to help.
technology are just two trends that have seen The coverage of this book is broad, covering
to that. As a consequence, security has become domains such as communication, protection
more complicated; or, at least, the breadth of officer functions, crime prevention, safety, infor-
knowledge that a good security operative, at any mation security, workplace violence, risk man-
level, needs to draw upon has been stretched. agement, investigations, private security law,
One of the positive signs of the march of and the use of force. The book provides proven
security professionalism is that there is now knowledge to protection officers to enable them
more research being gathered on security- to take on the arduous tasks of asset protection
related issues. Scholars in universities, research and loss prevention.
institutes, companies, and professional bod- This book strives to provide a foundation for
ies have helped to develop a global knowledge improving the skill level and efficiency of pro-
base. The good thing about security is that tection officers. As a basic text for achieving the
knowledge from around the world has rele- Certified Protection Officer certification, this
vance to a broad range of circumstances. After book will be studied over and over by opera-
all, threats are often the same. Terrorist attacks tives across continents. It will also serve as a
take place globally, and the sorts of responses research resource for those looking to develop
needed are often similar, if not the same. The insight into an array of security topics. The edi-
principles of security apply across the board, tors are to be commended for ensuring that this
though the contexts differ, and how the prin- edition builds positively on previous ones.
ciples are applied needs to be adapted to meet
Professor Martin Gill
local needs. This is where skill comes in. Skills
Director
are needed from those who assess risks and
Perpetuity Research & Consultancy
those who manage them, from senior executives
International (PRCI) Ltd
to street-level protection officers.
148 Upper New Walk
It is a sad fact that offenders often move faster
Leicester LE1 7QA, UK
than response agencies. We know that many of
those who commit crime adapt quickly; they share Dr. Ona Ekhomu, CFE, CPP
knowledge and experiences; doing so often gives Chairman
them an edge. Just as people move themselves and School of Management and Security
their assets around the world with ease, offenders 10 Turton St.
have tried to do so as well. Stopping them requires Lafiaji, Lagos, Nigeria
xiii
Contributors List
Sandi J. Davies began her career in contract a chapter relating to crime prevention in Canada
security in 1980 with a primary focus on person- in the Handbook of Loss Prevention and Crime
nel administration. She became deeply involved Prevention (Butterworth-Heinemann). In 1995,
in training and was instrumental in developing again in a cooperative effort, Ms. Davies and Mr.
security officer training programs for a major Minion had published a book entitled The Security
national security guard company. Her interest Supervisor Training Manual with Butterworth-
in security training grew, and in 1988 she joined Heinemann. In 2008, the third edition of this text,
the newly formed International Foundation for coedited by Chris Hertig, was released entitled
Protection Officers (IFPO) as a program admin- Security Supervision and Management: Theory
istrative assistant. In 1991, she was elected exec- and Practices of Asset Protection, again published
utive director of IFPO and has been a driving by the leader in Security Trade Publications,
force in the Foundation’s program development Butterworth-Heinemann. Sandi was the editor of
and administration. Sandi became a member of Protection Officer News published by IFPO for 13
ASIS International in 1985 and served in execu- years until it went into an electronic format.
tive positions at the chapter level. Chris Hertig, CCP, CPOI, is a member of the
In addition, Sandi was also a member of the Behavioral Sciences Department at York College
Advisory Board for the Northwest Territories of Pennsylvania where he teaches courses in secu-
Security Officer Certification Committee. In 1994, rity planning and supervision, crime prevention
Sandi was the chairperson for the Asset Protection and physical security, legal standards of security
Advisory Board for Mount Royal College in and asset protection, ethical issues in criminal
Calgary, Alberta, Canada. In 1999, Sandi agreed to justice and criminal investigation. In addition to
serve on the Advisory Board of the International his regular teaching assignment, he has taught
Foundation for Cultural Property Protection. Ms. self-defense and martial arts for the education
Davies is also a member of the Technical Advisory department. Prof. Hertig has also given noncredit
Board for the Canadian General Standards Board courses in report writing, crowd management,
on Security Officer Training Standards. Most officer survival, and public relations.
recently, Sandi was chairperson for the Private Prior to York College, Mr. Hertig spent three
Security Services Council of ASIS International. years as a nuclear security training administrator,
Ms. Davies has had numerous articles pub- developing and teaching a wide range of instruc-
lished in security publications, such as Security tional topics for security personnel in accordance
Management and SECURITY magazine, relating with U.S. Nuclear Regulatory Commission
to certification and training of security personnel. requirements. A Certified Protection Officer
In the early 1990s, Ms. Davies, in a cooperative Instructor (CPOI) through the International
effort with the IFPO Founding Director Ronald Foundation for Protection Officers (IFPO),
R. Minion, coedited the Protection Officer Training Prof. Hertig has given presentations to numerous
Manual (Butterworth-Heinemann). That text is professional and civic organizations. He has also
now in its eighth edition. In 1994, she contributed consulted with instructional program providers.
xv
xvi CONTRIBUTORS LIST
Prof. Hertig has published several hundred arti- Prof. Hertig began his career while in col-
cles, reviews, and chapters on various topics. He lege as a student aide to the Campus Security
has been a featured columnist in several security Department. He was a member of the U.S.
industry publications and assisted in establishing Army ROTC and served an internship with
IFPO’s Article Archives, an online collection of the Columbia County Juvenile Probation
research papers for students and practitioners. Department. After graduation, he worked for
Chris served as coeditor of Security Supervision and several security services firms as a security offi-
Management: Theory and Practice of Asset Protection cer, investigator, and supervisor. He also spent
(Butterworth-Heinemann) with Sandi J. Davies, a summer as a member of the Park Police in
the Foundation’s executive director. Mechanicsburg, PA.
Chris has been a longtime member of Prof. Hertig holds a master ’s in arts
ASIS International, serving on the Academic (Criminology) from Indiana University of
Programs Council as well as the Academic– Pennsylvania, a bachelor ’s (Sociology) from
Practitioner Symposium Group. He is a charter Bloomsburg University of Pennsylvania, and an
member and past president of the Pennsylvania associate (Commercial Security) from Harrisburg
Association of Criminal Justice Educators Area Community College. He has also com-
and an active member of the International pleted graduate courses in adult education from
Association of Law Enforcement Educators Penn State University, has been board certified
and Trainers. He was also a member of the in security management by ASIS International,
International Association of Campus Law and holds the designation of Certified Protection
Enforcement Administrators for many years. Professional (CPP).
xix
xx INTRODUCTION
universe is in constant flux, and the only con- aware of the danger of data loss, and numerous
stant is change; little could he have imagined laws govern what must be done if data is com-
the pace of that change in the 21st century. promised. Cyberterrorism not only puts data
Advances in medicine, science, and tech- at risk, it can put essential services and infra-
nology are happening at a dizzying pace, and structure at risk. Guarding against this type of
news travels the globe in the blink of an eye. threat requires continuing education about the
Information of all sorts is available with just a ever-evolving risks, deterrents, prevention, and
few keystrokes, and people can stay in constant laws. Unlike the night watchman, who only
touch via electronic media. Journeys that once worried about physical security with its fences,
took weeks, months, or even years now take gates, and access points, today’s protection
mere hours. It is a small world these days, and officer must also guard against an enemy that
economic problems and social unrest in one moves at the speed of light. The protection offi-
nation can be felt in many others. cer must not only protect the physical premises
Where once the term “security” might have and equipment, but must also guard against an
referred to the lone night watchman whose great- enemy that moves silently to disrupt services,
est adversary was a burglar hoping to pick a lock, incapacitate infrastructure, and steal data.
those days are long gone. The night watchman’s The National Fire Protection Association’s
role was viewed as merely a job that did not gar- (NFPA) “Guide for Premises Security” and
ner much respect in the community. “Standard for the Installation of Electronic
Today’s private security professionals are Premises Security Systems” have both caused
finding their roles greatly expanded in numer- changes that may not make news headlines, but
ous arenas worldwide, due, in part, to a much will certainly impact the industry. The former
greater global threat and a reduction in public will not affect the general public, but fire protec-
law enforcement protection. The current eco- tion, security consultants, facility managers, and
nomic situation has caused an increase in some insurance companies will be forced to deal with
types of crimes. At the same time, those eco- it. ASIS has already begun setting standards
nomic realties have also forced local municipal- that have impacted the industry. The latter more
ities to reduce public law enforcement efforts or less cements the impact of the former.
through layoffs or hiring freezes, even though While the quest for mutual respect and seam-
the need for more protection is growing. less cooperation between public and private
The threat of terrorism was spotlighted for security has improved over the years, it must
the United States and the world on 9/11, and it remain an ongoing goal for both the private and
is still an ever-present threat worldwide. It has public sectors. Mutual respect and cooperation
and will continue to impact the industry, partic- between public law enforcement and private
ularly in the areas of research and risk manage- security is essential to ensuring that security
ment methodologies. needs are met effectively.
In recent years, cyberterrorism, which Increasingly, security functions have been
threatens infrastructure and services by attack- contracted out to private security firms to fill
ing computer networks via the Internet, has the gap between what government can do and
become a very serious threat. It can and has what is needed. Private security firms are even
resulted in the loss of billions of dollars of pro- stepping in to fill the roles that military person-
prietary information, and compromised data at nel once filled on military installations and even
a broad range of institutions, from government war zones. A new type of protection officer is
agencies to banks, credit card companies, and increasingly stepping forward to fill the need,
business firms. Company executives are acutely ready to deal with new situations and challenges
INTRODUCTION xxiii
as they come along, thanks to ongoing educa- ● Successfully complete a midterm
tion and training. examination.
Currently, corporations that once relied on ● Successfully complete a supervised final
that night watchman to patrol a fence as suffi- examination. (A proctor may be located
cient protection are increasingly instituting their within the candidate’s organization or
own in-house security departments. An inte- community.)
gral part of this overall protection process is the
professional security manager and supervisor, (Both examinations are based on the contents
complemented with a security staff capable of of this textbook.)
attending to ongoing protection needs. Generally,
corporations require their security managers
and supervisors to be well educated, trained, G. CERTIFIED PROTECTION
and experienced. Private security firms are also OFFICER (CPO) FINAL
demanding educated, trained professionals. CHALLENGE PROGRAM
The night watchman might have been able
to do his job with limited education, but in This textbook, The Professional Protection Officer:
today’s ever-changing, challenging security Practical Security Strategies and Emerging Trends, is
climate, professionals must be educated and also the text for the CPO Final Challenge Program,
well trained to fulfill their new, evolving, and which is the fast-track method of obtaining
demanding roles. This new breed of security the CPO certification. The Final Challenge
professional is winning respect by proving it option eliminates the course of study and goes
is skilled and very capable of carrying out the directly to the final exam, which is the same one
most sophisticated, demanding roles. They are that is part of the CPO program. Questions on
dedicated professionals with the credentials the final exam come from the material in the
needed to keep themselves, their employers, textbook.
and their employers’ assets from harm. Contact the International Foundation for
Protection Officers (IFPO) for more information
regarding the Certified Protection Officer and/
F. CERTIFIED PROTECTION or other programs.
OFFICER (CPO) PROGRAM
They can be employed as independent con- that teach; but the primary beneficiary is the
sultants, by a security services agency, by the student or working protection officer.
military, by a state government, by the federal The editors of the Professional Protection
government, and by other organizations. The Officer: Practical Security Strategies and
term “protection officer” is not easy to define. Emerging Trends are honored to work with so many
Titles vary, specific tasks vary, locations vary, academicians, researchers, and outstanding security
employers vary, but the one thing that all pro- professionals since the planning of the first edition.
tection officers have in common is that they are These talented and dedicated security profession-
willing to take risks and put into place preven- als have worked tirelessly in supporting, promoting,
tive measures to protect tangible assets, such as and contributing to the International Foundation
buildings, intangible assets, such as data, and for Protection Officers and all of its worthwhile pro-
of course, the public. They assume the risks so grams. “We could not have done it without you!”
that others can go about their business and not A special thanks goes to Alice Grime, Charles
have to worry about potential harm. Thibodeau, and Jamie Ingram for their techni-
This textbook is written as a useful reference cal support and assistance in the production and
for security supervisors, managers, and those development of this textbook.
Protection Officer
Code of Ethics
xxv
xxvi PROTECTION OFFICER CODE OF ETHICS
Conclusion
Strive to Learn
The job of protecting life and property
To become professionally competent, each offi- focuses much attention on the individual secu-
cer must constantly strive to be knowledgeable rity officer. Hence, it is essential to be aware of
about all aspects of his or her chosen career. How the need for professional conduct at all times.
to protect people, assets, and information must By strictly adhering to each section in this code
always be a learning priority for every officer. of ethics, it may be expected that we as indivi-
duals and the industry as a whole will enjoy
a good reputation and gain even more accep-
Develop Rapport
tance from the public as well as private and
It is necessary to be constantly aware of the government corporations. You as the individual
image that our profession projects. All officers officer must be a principal in this process.
U N I T I
FOUNDATIONS
1
Concepts and Theories
of Asset Protection
Jim Ellis and Christopher A. Hertig
3
4 1. CONCEPTS AND THEORIES OF ASSET PROTECTION
I. FOUNDATIONS
ASSET PROTECTION 5
mitigate the risk. All of the mitigation efforts and defense/response. Each piece of the layered
must be designed so as not to “substantially protection concept can work on its own. However,
interfere with the operation of profitability of the the most complete protection is afforded through
enterprise” (ASIS, 2003, p. 6). Mitigation efforts combining all of the layers.
that do substantially impact operations are much Deterrence is the practice of discouraging
less likely to see executive support regardless of an individual or group from even attempting
the level of risk, as they also substantially impact to attack the asset. This can be accomplished
the profitability of the company. through a number of means such as signage,
fencing, lighting, cameras, or people. Signage
at the perimeter of the enterprise property
Cost/Benefit would warn trespassers of the property line
A cost/benefit analysis must also be con- and the penalty for proceeding further. Further
ducted to help assist in evaluating the mitigation enhancements to the signage could include the
measures against the costs incurred. According addition of fencing, lights, and cameras. In a
to the ASIS International General Security Risk personal protection role, the deterrence would
Assessment Guideline, the cost benefit process appear to be provided by the ring of protection
“involves three steps: officers, or specialists around a high-profile
individual. In some rare circumstances, the illu-
● Identification of all direct and indirect
sion of additional layers of protection can be a
consequences of the expenditure.
better and more cost-effective deterrent.
● Assignment of a monetary value to all costs
Detection is the identification of a threat,
and benefits resulting from the expenditure.
preferably at the earliest possible opportunity.
● Discounting expected future costs and
Alarm sensors, cameras, and even protection
revenues accruing from the expenditure to
officers, are all means of detecting and identi-
express those costs and revenues in current
fying threats to the enterprise. A threat identi-
monetary values” (ASIS, p. 4).
fied earlier in the asset protection process gives
If the cost/benefit evaluation determines that the remaining layers of protection more time to
the cost of mitigating the risk is greater than the contribute to the overall protection of the asset.
cost of the asset, then other measures must be Delaying the attacker also gives the other
employed. layers of defense a chance to work together.
Sufficient layers of delay must be incorporated
so that the detection and defense/response
ASSET PROTECTION pieces of the asset protection continuum can
perform their roles. Delay can be accomplished
through an expansive perimeter that takes
Layered Protection
a while for the attacker to cross, fences that
Asset protection through risk mitigation take time to climb, strong doors that must be
typically involves a concept of layered protec- breached, and interior levels of protection such
tion, also known as defense in depth. In this as additional doors into rooms or a safe that
concept, the asset is considered to be in the takes even more time to enter.
center, surrounded by concentric layers of pro- A sufficiently delayed attacker allows for a
tection. Each layer contributes individually, defense to be mounted from within the site to
and as part of the whole, to the overall protec- repel the attacker, or for a sufficient response to
tion of the asset. The principles behind layered be put together and proceed to the site. However,
protection consist of deterrence, detection, delay, the layers of protection must delay the attacker
I. FOUNDATIONS
6 1. CONCEPTS AND THEORIES OF ASSET PROTECTION
long enough so as to be able to stop him on the traditionally used by military forces to scout out
way to the asset, or on his way out with the asset, the location and disposition of an opponent. They
but before he leaves the property with the asset. are used today by police and security forces.
While still endeavoring to locate hostile indi-
viduals (felons), modern police patrols are used
PHYSICAL SECURITY to assess community environments. In a con-
temporary asset protection scheme, patrols are
Physical security planning was originally not only concerned with criminal acts but also
based upon response to a military threat. A tra- with unauthorized activities, safety and fire pro-
ditional reference for physical security is FM tection issues, and the performance of auxiliary
19-30 Physical Security, published by the U.S. services. These can include delivering the com-
Army, while a modern reference is the Facilities pany mail, checking gauges, conducting light-
Physical Security Measures Guideline published ing surveys, assessing behavior, enforcing lease
by ASIS International. agreements, and assisting customers. Note that
The process used to plan physical security community policing or problem-oriented policing
measures is as follows: strategies that public police have adopted are
1. Identify assets. These generally include very similar to what security practitioners have
personnel, property, information, and image. been doing for decades.
2. Loss events are exposed. Risks are identified.
This involves research rather than “seat of the CRIME PREVENTION THROUGH
pants” reasoning! ENVIRONMENTAL DESIGN
3. Probability of the loss events occurring is
calculated. Crime Prevention Through Environmental
4. Impact of occurrence is assessed for each loss Design (CPTED) is a system whereby territo-
event. This means, the effect the loss event riality reinforcement is established via barri-
will have in terms of direct, indirect, and extra- ers, access control, and surveillance. Its genesis
expense costs. may have been in the construction of castles
5. Countermeasures are selected. There can and forts. The contemporary beginnings of it
be a vast array of interventions; generally were through the writings of Oscar Newman
physical security utilizes target hardening (Defensible Space) and C. Ray Jeffrey (Crime
techniques, such as patrols, access control, Prevention through Environmental Design). CPTED
lighting, intrusion detection, surveillance, theory consists of these various components:
weapons detection, and so on.
6. Countermeasures are implemented. Territoriality: Boundaries and property
7. Countermeasures are evaluated as to their lines are marked. This can be the placement
effectiveness. Traditionally, this step has been of barriers, shrubbery, and the use of
avoided by practitioners in physical security different colors of walkways to mark areas.
and crime prevention. Psychological deterrents to trespass are
erected to establish territoriality.
Note: See www.securitysolutions.com and Surveillance: Observing areas makes detection
www.securitymagazine.com for products and and deterrence of criminal behavior more
applications. likely. There are several types of deterrence:
Patrols are a key part of a physical security Natural—keeping areas open to
system. They serve as catalysts for the system, observation, such as by clearing bushes
bringing all parts together. Patrols have been near access points, having windows facing
I. FOUNDATIONS
RISK MANAGEMENT AND INSURANCE 7
out into a common courtyard, or placing E — Error in planning or execution, which
a picnic area near a basketball court. All of results in lost funds;
these make for easier observation of the area C — Crime that causes loss and/or injury;
to be protected. They facilitate detection of UP — Unethical/unprofessional practices,
criminal or unauthorized activity. such as misrepresentation, discrimination,
Electronic—technological aids are used, conflict of interest, and so on.
such as closed circuit television (CCTV)
Accidents cost extensive amounts of direct loss
and volumetric intrusion detection systems,
(cost of replacement and repair) as well as indi-
such as passive infrared (PIR) sensors.
rect loss (downtime, investigative costs, lowered
Organized—patrols by security personnel,
morale, legal fees, etc.) and extra-expense loss
police, or citizen crime watches.
(advertising, rental of new rooms or equipment).
Access control: Maintaining boundaries
Note that there are also extensive administrative
by restricting access to an area. Access is
law requirements under OSHA (Occupational
controlled via the use of locks, biometric
Safety and Health Administration) and state
systems, access cards, and other methods.
agencies (CALOSHA and Pennsylvania
Access control is a physical deterrent to trespass.
Department of Labor and Industry) with which
Positive activity support: In a significant
organizations must comply. Safety is a major
departure from physical security, CPTED
concern to organizations for all of these reasons.
uses activities that divert people in the
Many persons in charge of security are also in
environment from involvement in crime.
charge of safety. A Director of Safety and Security
This may take the form of recreation,
has become a common title in health care, on col-
entertainment, or volunteer efforts that help
lege campuses, and in hotel environments.
society (volunteer fire companies for youth).
Maintenance: The repair of “broken
windows.” An environment that is not
kept up properly may degenerate further.
RISK MANAGEMENT AND
People see broken windows and believe it is
INSURANCE
acceptable to break other windows.
“Risk management” is a term closely associ-
A “snowballing” or “rolling ball” effect
ated with the insurance industry. It is similar con-
occurs. Prompt repair and cleaning of damage
ceptually to the physical security planning process
or graffiti are essential parts of CPTED.
in its implementation, but it deals with risks other
than “security” threats caused by humans. It is
SAFETY not limited to “target hardening” (risk reduction)
approaches, such as the use of locks, barriers,
Safety ushers in the more contemporary intrusion alarms, and so on. Strategies for manag-
emphasis on asset protection and incorporates ing risk include the following:
the WAECUP Theory of Loss Control developed
Risk avoidance—such as completely avoiding
by Bottom and Kostanoski in Security and Loss
the risk of an earthquake by avoiding
Control (first published by Macmillan in 1983).
geographic areas where there are active fault
W — Waste of time, resources, man-hours, lines, staying out of countries that are known
space; to kidnap people for ransom, or not making
A — Accident that causes injury, downtime, dangerous products, such as explosives.
increased workers’ compensation costs, and Risk transfer—means transferring
so on; the financial impact of loss to another
I. FOUNDATIONS
8 1. CONCEPTS AND THEORIES OF ASSET PROTECTION
organization or entity. Insurance coverage is assets across some distance so that no one
the usual means of risk transfer. The insurance vulnerability can affect the entire enterprise
company takes on the cost of repairing or is another example.
replacing the asset at risk instead of the Risk reduction or risk mitigation—means
enterprise. Of course, this comes at some reducing the probability of a loss-causing
cost and some delay in repairing or replacing event through the adoption of preventive
an asset as the insurance company must measures. That is, taking methodical,
investigate and process the claim. Outsourcing appropriate steps to lessen the risk to the
hazardous operations to other organizations is organization or the frequency, probability,
another example of risk transfer. and impact of such risks and losses. Physical
Risk assumption, risk retention, or risk security and crime deterrence would be
acceptance—refers to accepting the risk, as it considered risk reduction. So, too, would the
has a very low probability of occurring; the use of safety equipment.
risk is extremely difficult to protect against;
or the cost of changing the risk to the assets is As you can see, risks can be reduced in a num-
so great or so low that any effort to change it ber of ways, but they are never truly eliminated.
would either be too expensive or the losses so Insurance can be thought of as the “last line
low as to be inconsequential. For instance, it is of defense” in a physical security system. It
extremely unlikely that an asteroid will strike; provides the policyholder with financial com-
it is also impractical to defend against it. It pensation from the insurance company after a
would likewise be impractical to purchase loss has occurred. According to Purpura (1991),
insurance for a machine that has exceeded its loss prevention originated within the insurance
useful shelf life and has no intrinsic value. industry. Note that while the term “loss preven-
Risk spreading—implies using redundant tion” is utilized primarily within the retail sec-
systems of communication, power, or tor, it is gradually being replaced with the more
information storage. The separation of representative term “asset protection.”
PRACTICAL EXERCISE
Pick some assets, such as vital information, terrorism, theft, and so on. In the column on the
that an organization needs to operate: peo- right, list a risk management approach, such
ple, works, art, and so on. Place these assets in as transfer, avoidance, or acceptance, which
the boxes to the left. Next, place the primary would be most appropriate for dealing with the
threats that may face those assets such as fire, threat.
I. FOUNDATIONS
RISK MANAGEMENT AND INSURANCE 9
Insurance policies provided by an insurance Liability insurance—to cover legal costs
company are driven by the probability of loss and compensatory damage awards (punitive
events occurring based on actuarial tables. The damages are not generally covered).
premiums and deductibles are adjusted accord- Attorney’s fees and associated costs can
ing to the loss event probability; so, too, is the become quite high during civil litigation
availability of insurance if insurance carriers regardless of whether the case is settled or
deem a risk to be too high and refuse to write goes before a court.
a policy. In these cases, organizations must self- Fire insurance—one of the first types of
insure or join an insurance pool of other organi- insurance developed; some policies mandate
zations that pool their funds in a liquid account that the insured conduct periodic patrols
that is set aside in the event of a loss. There are of various areas on the property—the use
also government insurance programs for crime of watch tour systems had developed as a
and floods on the federal level, and workers’ result of this.
compensation on the state level. Burglary insurance—for losses associated
Various types of insurance coverage have with unlawful intrusion. Burglary insurance
evolved, such as the following: policies generally require evidence of forced
entry.
Business Interruption—for losses incurred Robbery insurance—coverage for forcible
after a disaster, accident, or fire while a thefts committed in the presence of another.
business is not operating. Business interruption Theft insurance—policies cover losses from
insurance helps to control indirect losses theft; may include burglary and robbery losses.
stemming from lost productivity. Bonds—fidelity bonds require investigation
Kidnap and Ransom (K & R)—for firms that of the covered employee by the bonding
have had executives abducted by criminals company (the insurer); these bonds indemnify
or terrorists. This coverage became popular the holder against dishonest acts committed
in the early 1980s in response to left-wing by the employee. The holder of the bonds is
terrorist kidnappings in Latin America. The exempt from financial responsibility for the
film Proof of Life with Russell Crowe portrays dishonest acts of the employee.
K & R coverage. Employment Practices Liability (EPL)—
Worker ’s Compensation—required by state insures against legal costs due to unlawful
laws to compensate workers injured on the employment practices such as sexual
job from the results of work-related accidents harassment, discrimination, and so on.
and occupational diseases (Purpura, 1991, Contemporary liability exposure for ongoing
p. 265). Rates paid for premiums by employers illegal employment practices is substantial,
are based on job hazard, and in part on an with awards and settlements running into
employer’s record of accidents. the multimillions.
EMERGING TRENDS
An emerging new paradigm of asset protec- homicide/suicide bomber is an especially trou-
tion is the consideration that must be made for bling trend and is difficult to provide sufficient
an attacker who will enter a protected area with levels of protection against. The amount of time to
the goal of destroying an asset in place. The detect, delay, and defend is essentially reduced by
I. FOUNDATIONS
10 1. CONCEPTS AND THEORIES OF ASSET PROTECTION
half as the attacker does not have to add in time Specialization in the industry is the continu-
to flee. Depending on the asset to be protected ation of a long-standing trend that is gaining
and the preexisting environment in which the greater acceptance outside of the business. Both
protection officer must operate, strengthening the large and small security businesses are finding
ability to detect and delay the adversary must be specialties in which to focus and thrive. Some
given especially careful consideration. This may security officer companies are established as, or
include the addition of intelligence assets that can are establishing, separate divisions devoted to
overtly or covertly uncover the adversary’s plans. retail security in malls and protection of chemical
Cooperative information sharing with other enti- plants or nuclear power stations. Electronic secu-
ties such as law enforcement or in some areas, the rity companies may find specialization in surveil-
military, may be the best option for strengthening lance systems for casinos or integrating various
the detection aspect of asset protection. security, fire alarm, and building control sys-
Like the homicide/suicide bomber, improvised tems into a cohesive platform using the client’s
explosive devices (IEDs) are also an especially trou- computer network.
bling trend. Not limited to areas of conflict, domes- Professionalism is also the continuation of a
tic extremist organizations have used these devices long-standing trend that is finding favor by the
to intimidate, maim, and destroy. Special attention companies and clients that security profession-
and alternative plans must be carefully developed als work for and with. College degrees at the
for organizations that conduct work that may Bachelor’s and Master’s levels are an almost uni-
attract the attention of such groups, including spe- versal requirement for security managers at all
cialized protection plans for executives. In areas of levels, and for some security officers in special-
conflict where the threat of IEDs is real, options for ized sectors. Certification by industry organiza-
reducing the risk include, but are not limited to, tions such as the International Foundation for
traveling covertly, using decoy vehicles, or using Protection Officers and ASIS International is also
telephones, videos, and Internet conferencing. becoming a requisite for some companies.
I. FOUNDATIONS
SECURITY QUIZ 11
Fossum, J. (1982). Labor relations: Development, structure, pro- Johnson, T. (2002). Retail loss prevention management models
cess. Dallas, TX: Business Publications, Inc. Unpublished paper. York College of Pennsylvania.
Garcia, M. L. (2001). The design and evaluation of physical pro- Kuykendall, J. (1986). The municipal police detective: An
tection systems. Boston, MA: Butterworth-Heinemann. historical analysis. Criminology, 24(1).
Girard, C. M. (1989). Planning, management and evalua- Mackay, J. (1996). Allan Pinkerton: The first private eye.
tion, Chapter 31. In L. J. Fennelly (Ed.), Handbook of loss New York, NY: John Wiley & Sons.
prevention and crime prevention (2nd ed.). Boston, MA: Matthews, L. J. (1990). Pioneers and trailblazers: Adventures of
Butterworths. the old west. New York, NY: Derrydale.
Gilbride, B. P. (1999). Sexual harassment. In S. J. Davies & Nalla, M., & Newman, G. (1990). A primer in private security.
R. R. Minion (Eds.), Security supervision: Theory and Albany, NY: Harrow & Heston.
practice of asset protection. Woburn, MA: Butterworth- National Advisory Committee on Criminal Justice
Heinemann. Standards and Goals. (1976). Report of the task force on
Green, G., revised by Fischer, R. J. (1987). Introduction to private security. Washington, DC.
security (4th ed.). Boston, MA: Butterworths. Peak, K. J. (1997). Policing in America: Methods, issues, chal-
Hertig, C. A. (2002). Investigative concepts. Unpublished lenges. Upper Saddle River, NJ: Prentice-Hall.
paper. York College of Pennsylvania. Purpura, P. P. (1991). Security and loss prevention: An intro-
Hertig, C. A., Fennelly, L. J., & Tyska, L. A. (1998). Civil duction. Stoneham, MA: Butterworth-Heinemann.
liability for security personnel. Naples, FL: International Sennewald, C. A. (1985). Effective security management (2nd
Foundation for Protection Officers. ed.). Boston, MA: Butterworths.
I. FOUNDATIONS
C H A P T E R
2
The Evolution of Asset Protection
and Security
Christopher A. Hertig and John Christman
13
14 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
current legal prohibition against drugs is analo- demands different protective strategies and
gous to Prohibition. This is an arguable point: tactics. These change with technological
drugs are not as socially accepted as the drink- developments. Politics and economics are
ing of alcohol was in 1920s American society. also factors. In 2008 and 2009, piracy on
Nonetheless, the emergence of black markets the high seas became a major issue due to
due to extensive consumer demand for illegal large numbers of unemployed mariners.
goods or services is something that all students 4. Demographics—population size, density,
of asset protection should appreciate. age distribution—plays a key role in crime
control and safety. Large numbers of
recent immigrants who do not understand
THE CYCLE OF HISTORY
the language or customs of their newly
adopted country create safety and security
The security industry has a rich and varied
challenges. College students living in
background. “Security” implies protection: safety
dormitories create another set of challenges.
from attack, espionage, or sabotage. It means
High-rise office buildings with business
being able to live, work, or play free from harm,
tenants have different protection needs from
in a stable environment. Organizations must take
two-story apartment complexes for low-
measures to minimize disruption. These mea-
income families. Security measures must be
sures are dependent on a variety of factors, such
relevant to the environment in which they
as threat probability, criticality, culture of the
are implemented and every environment is
organization, financial resources available, and so
different.
on. The measures taken have changed over time.
5. Military forces and concepts are intimately
The historical development of “asset protec-
involved in protection. Foreign invaders,
tion” (the broader, more contemporary term
riots that have to be contained by soldiers,
encompassing safety and fire protection) and
and international terrorists are all addressed
“security” (the older term; more oriented to
by military forces. Contemporary pro-
crime/espionage/terrorism issues) reveals sev-
tective forces often operate on a military
eral trends. These trends appear to be cyclical
organizational structure. Police, security,
in nature.
and firefighting organizations have a
1. Private initiatives generally precede public. paramilitary chain-of-command with
In many cases, private protective measures sergeants, lieutenants, and captains. The
are started to fill a void in services offered military has clearly exerted an influence over
by governments. Private corporations are police, security, and fire departments.
more nimble and flexible than governments. 6. Security efforts generally are a step behind the
This enables them to start new programs, latest methods of criminal attack. The saying
protection or control forces, etc. “As one hole in the net is mended, the fish swim
2. Control forces may be involved in class toward another” seems particularly relevant.
struggles. Control forces—military, police, 7. Protective efforts are usually initiated
security—work to keep certain groups of after serious problems have occurred. The
citizens in line. September 11, 2001, attacks on the Pentagon
3. There is a strong relationship between and World Trade Center initiated substantial
commerce and protective needs. The amount reforms in the federal government, such as
and type of commerce (ships, trains, Internet, the Transportation Security Administration.
and so on) determines the threats or risks Wars and major natural disasters also create
posed to the commerce system. Each risk new protective organizations, laws, and so on.
I. FOUNDATIONS
KEY TERMS 15
8. Protective efforts often are spawned by Asset protection takes a broader view. It is
the need for mutual protection. Homeland also concerned with waste, errors and accidents,
Security is a current example: governmental natural disasters, labor shortages, equipment
units at all levels coming together in breakdowns, fires, and so on. Asset protection
partnership with private organizations to covers any loss an organization suffers that is
protect against terrorism. Another example is not related to marketing.
fire societies that were established in Boston Crime Prevention through Environmental
in 1718, where society members helped each Design, (CPTED), is a theory of crime deter-
other to salvage goods after a fire (Cote & rence based on environmental design. Facilities
Bugbee, 1988). are constructed—or arranged—in such a way
that criminals feel uncomfortable and refrain
from committing crimes.
KEY TERMS Physical security is a plan or design devel-
oped for the purpose of attempting to eliminate
“Assets” are tangibles or intangibles that or minimize the threats posed by potential loss
have value. If assets are stolen, lost, destroyed, event occurrences. It incorporates locks, bar-
or damaged, the entity (organization or individ- riers, access control systems, lighting, alarms,
ual) owning them suffers a loss. There are four and security officers. Physical security is a vast
basic classifications of assets: field of study. It can be said that it is the “heart”
of security. It encompasses CPTED as well as
1. People—employees, visitors, clients,
procedural controls.
patients, students, and so on.
Personnel security is designed to screen out
2. Property—real estate, buildings, raw
undesirable employees. It is done to protect
materials, equipment, merchandise, and
both the employer and other employees. The
so on.
screening, or vetting, of employees to prevent
3. Information—vital information that is
probes by foreign intelligence agents originated
necessary for an organization’s survival,
within the military-industrial complex of the
such as employee and vendor lists,
1950s to 1980s. The old term “industrial secu-
organizational plans, and other items
rity” (as in “American Society for Industrial
without which the organization could not
Security”) referred to Department of Defense
operate; confidential information such
(DOD) contractor firms. These companies made
as patient records, personnel or student
munitions, tanks, airplanes, and so on for mili-
records; proprietary information such as
tary usage. While espionage—in particular
trade secrets, customer lists, and marketing
economic espionage—is a major issue, contem-
plans; classified information that is essential
porary personnel security also deals with work-
to national defense.
place violence, internal theft, and terrorism. The
4. Image—the image cultivated through years
current emphasis on terrorism could be seen as
of public relations and advertising that an
a historical cycle repeating itself—the Cold War
organization or individual (celebrity) has
measures concerning spies bearing some simi-
established. Customer goodwill is an asset.
larity to the issues of terrorism. Each era was
So, too, is a positive image that will not attract
focused on persons infiltrating facilities and
the ire of extremist groups or individuals.
information sources and causing problems.
Security is concerned with those threats that Asset protection encompasses those threats
are posed by humans. Espionage, sabotage, posed by nature, accident, market, and economic
theft, and assault are examples. factors as well as those posed strictly by humans.
I. FOUNDATIONS
16 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
Asset protection incorporates fire protection, hired soldiers from the northern Viking regions.
HAZMAT, and safety within the discipline. The Varangian Guards operated for hundreds of
It seeks to identify and manage all risks posed years, serving as bodyguards, suppressing riots
to an organization and incorporates many con- and occasionally functioning as combat troops.
cepts of risk management. Asset protection is the In the American Revolution, Britain employed
approach used in addressing problems by many German mercenaries from the province of Hessia
organizations. It is perhaps similar to the “all (Hessians). It was not until the rise of Napoleon
hazards approach” used in emergency manage- that the use of standard full-time armies on
ment. In some cases, the term “loss prevention” active duty was typical. Privately hired soldiers
is used. This has been particularly common in and security personnel were the norm for most
the retail security sector. of history (Maggio, 2009). Today there are pri-
As threats change over time and involve dif- vate military companies who provide security,
ferent environments, asset protection is a truly intelligence, and logistical services to nations.
dynamic undertaking. The history of security/ Iraq and Afghanistan have seen expanding
asset protection is formulated in a variety of markets for these firms. Modern armies are too
areas. Security is influenced by commerce, war, small to do all that is asked of them. As a result,
natural disaster, economic and cultural changes. private companies have stepped in to handle
security and other functions that don’t abso-
lutely require soldiers.
THE WARTIME GROWTH OF A review of some events in history that cre-
SECURITY ated security problems is outlined here.
Military defense is often discussed in the July 1916—an explosion at Black Tom
literature on the history of security. Ortmeier Island, a munitions storage facility in New
(1999) reveals that in prehistoric times, cave Jersey, was set off by a German saboteur.
dwellers stacked rocks around perimeters in This increased War Department security
front of their caves to both mark this space and measures. German agents also set fires, filled
warn off intruders. The Praetorian Guard in fire extinguishers with gasoline, sold heroin
ancient Rome were military personnel. Military to soldiers to make them addicted, and even
threats employ military approaches. Such contaminated the milk supply at the Ft.
approaches often utilize military personnel and Leavenworth Cadet School with nitrogenous
incorporate military culture. germs. German agents also fomented
“Defense-in-depth” is a military concept strikes in key war industries to slow down
wherein assets are protected by successive lines production of war materials (Velke, 2004).
of defense. This includes clear zones, outer The potential for problems caused by
perimeters, inner perimeters, and soldiers or saboteurs, foreign intelligence agents (spies),
protection officers. This is a key element of and terrorists who are state-sponsored
physical security plans. Contemporary facility creates a need for increased security
models of defense-in-depth incorporate layers measures during all military conflicts. Note
of protection. Safes and vaults, alarm systems, that in most discussions of terrorism, foreign
and insurance coverage all comprise the layers agents are not included, although they can
of the protection plan. be a major problem.
Military threats and organizations have been World War II—U.S. Department of War
employed throughout history. The Byzantine established internal security division and
empire, which replaced the Roman empire, swore in 200,000 security officers as military
I. FOUNDATIONS
HISTORY OF POLICING 17
police auxiliary. State National Guard units system required every male over the age of 12
were also activated. In some cases, states to form into a group of 10 with his neighbors
had Home Guard organizations that enabled called a “tithing.” The tithing was sworn to
the National Guard to engage in combat or help protect fellow citizens and apprehend
combat support activities while the Home and deliver persons who committed crimes.
Guard maintained a domestic security posture. Ten tithings were grouped into hundreds who
Korean War—The “Cold War” era began with were directed by a constable. The constable was
heightened tensions between the United States appointed by a nobleman and was, in effect, the
and Russia. The Industrial Security Manual first police officer (Peak, 1997).
was published in 1952. This was considered Note that early Roman and English—and
the “Bible” of Department of Defense (DOD) later American—policing functions were depen-
contractor security procedures. It established dent on citizen involvement. This is still true
information protection, personnel security, today. Homeland Security requires citizens to
and physical security measures for DOD be vigilant for indications of terrorism. Major
contractors. Since the United States was in a disasters require government, corporate, and
wartime economy until about 1975, there was nonprofit volunteer organizations (Red Cross)
heavy activity in this sector. Many security to work together. The lesson is that the need for
personnel worked in “industrial security.” mutual assistance spawns protective efforts.
In the early nineteenth century, London con-
tinued to have a large population with crime
HISTORY OF POLICING and disorder problems. As few organiza-
tional models were available at this time, the
Police in Ancient Rome consisted of the military model was adopted for the London
Praetorian Guards, which was a military unit. Metropolitan Police (Ortmeier, 1999). What
There were also cohorts who kept peace. The Robert Peel established in 1829 in London
vigiles were civilian freemen who controlled served as an organizational model for police
fires and assisted in controlling crime and disor- and security departments. In America, cities
der. It is interesting to note that urban mob vio- began to develop uniformed police forces in the
lence was one reason why municipal police were mid-1800s. These forces were similar to what
formed in both England and the United States. we have today. Peel set forth a series of princi-
With the Norman Conquest of England in ples upon which a police force could be estab-
1066, there were several significant governmen- lished and administered. While his specific
tal developments: frame of reference was public law enforcement,
the principles are also adaptable to uniformed
1. The introduction of feudalism, a contractual
private protection forces:
relationship between lords of the manor,
and their tenants or vassals. Feudalism was
1. The police must be stable, efficient, and
a system in which the landholder provided
organized along military lines.
for the security of the tenant peasants in
2. The police must be under government control.
exchange for a portion of the harvest.
3. The absence of crime will best prove the
2. The centralization of government.
efficiency of police.
3. The reorganization of the church.
4. The distribution of crime news is absolutely
One protection development that was estab- essential.
lished was a community-based system of polic- 5. The deployment of police strength both by
ing called the frankpledge. The frankpledge time and by area is essential.
I. FOUNDATIONS
18 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
6. No quality is more indispensable to a police police forces are older in most cases. Private polic-
officer than a perfect command of temper; ing preceded public policing with merchant,
a quiet, determined manner has more effect parish, and dock police forces in England. Public
than violent action. and private were difficult to distinguish from
7. Good appearance commands respect. each other. Railroad Police were, and still are,
8. The securing and training of proper persons a privately employed police force with full law
are at the root of efficiency. enforcement authority. Many states in America
9. Public security demands that every police enacted legislation to establish railroad police
officer be given a number. forces. In many rural areas these were the only
10. Police headquarters should be centrally law enforcement agencies in existence. By 1914
located. there were 12,000 railroad police in America.
11. Police officers should be hired on a During World War I they were deputized by the
probationary basis. federal government (Purpura, 2002). The Coal and
12. Police records are necessary to the correct Iron Police in Pennsylvania were also privately
distribution of police strength. employed and had law enforcement powers.
Current policing in the United States was
In the mid-nineteenth century, major American
greatly influenced by the Omnibus Crime Control
cities began to develop police departments.
and Safe Streets Act of 1968. This created the Law
These forces evolved out of earlier night watch
Enforcement Assistance Administration (LEAA),
systems that utilized volunteers or civilians.
which funded training and education for police.
Some of these forces only operated at night, and
Police by the thousands began to acquire col-
they were no longer effective at controlling crime
lege educations. Criminal justice programs were
in burgeoning urban environments. Organized,
started at colleges across the country. While there
paid, full-time police operating under the prin-
were only five or so institutions offering degrees
ciples established by Robert Peel began to take
in criminal justice prior to 1968, today there are
shape.
thousands. The LEAA also provided grant mon-
State police forces also developed. The
ies for equipment and crime analysis by police
Pennsylvania State Police is generally regarded
departments. The LEAA also spent massive sums
as the first modern state police department.
on developing criminal justice.
While Texas and Massachusetts had state police
Fees were used to pay for early police ser-
forces, these were vastly different from the orga-
vices. The Parliamentary Reward System in
nizations we think of today as “state police.”
England paid a fee of 40 English pounds to
The Pennsylvania State Police have full law
private persons who captured felons. Both
enforcement authority. They also are respon-
Jonathan Wild and the Bow Street Runners were
sible for traffic control on state highways such
early private detectives who worked under the
as the Pennsylvania Turnpike. In some states,
Parliamentary Reward System. In the nineteenth
there are separate highway patrol forces that
century, there were private detectives who
specialize in traffic law enforcement (California
received rewards for recovering stolen prop-
Highway Patrol, Ohio Highway Patrol).
erty. Over time these private detectives were
replaced by public police, due to criticism of
“PRIVATE SECURITY” OR “PUBLIC their methods as well as the entry of insurance
POLICE”? companies. Once there were insurance policies
to compensate policyholders for their losses, the
Policing is both public and private. Public incentive to recover stolen property subsided
policing as we know it is relatively recent. Private (Kuykendall, 1986). This change was gradual;
I. FOUNDATIONS
“PRIVATE SECURITY” OR “PUBLIC POLICE”? 19
U.S. police often worked for rewards. One of the 4. Federal agencies such as the Secret Service
notable contributions of Allan Pinkerton was and U.S. Marshals are really more concerned
that he established a code of ethics and forbade with security than law enforcement
the acceptance of rewards by his men. functions. There is also the Federal Protective
There are still some examples of fee systems Service, National Security Agency, and
in use today, but these are rare. Constables in Customs and Border Protection. While the
Pennsylvania are private citizens with arrest officers who work for these organizations
powers who serve warrants and perform vari- have law enforcement authority, they are
ous court functions on a fee basis. The consta- first and foremost protection organizations.
ble system was imported from England and is 5. Government agencies often have either
an elected office in Pennsylvania. Note that an proprietary or contract security departments.
advantage of the fee system is that the govern- Housing bureaus, school systems, parks
ment is only paying for services rendered. There departments, reservoirs, and so on are
is no benefit package such as health insurance protected by security personnel. Some cities
and retirement. and counties have their own proprietary
Some other examples of “private secu- security departments.
rity” or “public law enforcement” include the 6. Military and federal installations have
following: security forces. These may be either
proprietary government employees or
1. Police in major cities may serve as private contract officers. The U.S. federal
“ambassadors” of the city. These officers government is a large user of contract
may be stationed in transportation centers or security services.
public facilities where people visiting the city 7. Shopping centers are private properties open
are likely to meet them. This is the same role to the public for business. They usually have
played by private protection officers in hotels, proprietary security forces. Some have police
resorts, casinos, and shopping centers. The substations within so that close cooperation
concept is the same: aid and assist visitors and between mall management, the security
preserve the quality of life for those visitors. department, and the police department is
2. Contract security personnel patrol apartment facilitated.
complexes, housing developments, and 8. Commissioned security officers are used
shopping centers in a form of “community- in some environments. These are privately
oriented policing.” Some firms specialize employed protection officers who have
in “weeding” out the criminal element via police commissions. This enables them to
surveillance and apprehension of drug make arrests under certain circumstances,
dealers and other criminals. This helps create for certain types of offenses and/or within
a safe environment for the contract officers to a specified area. Large hospitals and resorts
assume their “community-oriented” policing located in remote locations, and quite a few
role. They help neighborhood children, private colleges, use this model.
organize community activities, and so on.
3. College campuses often have campus The blending of police and security was great
police who conduct more asset protection in the nineteenth century and, it is probably
and security work than law enforcement safe to say, within the past 30 years or so. It
functions. Some colleges have both police will probably continue as our society becomes
and security divisions. Almost all have some increasingly complex and we more frequently
type of student patrols. utilize resources on a contractual/outsourcing
I. FOUNDATIONS
20 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
or task force basis. Computer crimes will neces- amounts of heat and oxygen, virtually anything can
sitate contracting out for investigative exper- become fuel for a fire.
tise by government agencies. So, too, will cost The threat of fire varies with the environment.
considerations as police are extremely expen- The perception of that threat also changes. Before
sive employees to maintain. Police require the Civil War, fire insurance executives gener-
extensive preemployment screening, training, ally viewed fire as good for business (Purpura,
equipment, and health and pension benefits. 1991). Fires were similar to airplane crashes in
As a result they will have to be used more judi- that they were relatively improbable events that
ciously. Functions that do not absolutely require created hysteria and spurred the purchase of
a sworn law enforcement officer can be per- insurance policies. Insurance companies made
formed by a civilian. This can be a municipal money on these policies until excessive fires—
proprietary or contract employee. in heavily populated areas where buildings
Additional factors in this blending are retire- were constructed of wood—caused enormous
ment plans and an aging population. Retired amounts of claims to be paid.
police do not make enough money to cease Here is a brief overview of some major
working. Employing them as security officers or events in the development of fire protection
investigators may utilize their skills in a mutually beginning in the 1600s:
beneficial manner to both employer and officer.
An area of concern is police “moonlighting” 1631: A disastrous fire in Boston resulted in
in security. This can create numerous problems, the first fire ordinance in the United States.
such as determining whether the off-duty police This ordinance prohibited wooden chimneys
officer is a police officer or security officer when and thatched roofs (Ortmeier, 1999). Wooden
making apprehensions, and so on. There may chimneys were banned in London in 1647
be a temptation to use official databases for (Cote & Bugbee, 1988). Wooden chimneys
the benefit of a private employer. Preferential were often used in American soldiers’ winter
treatment of the employer (store, mall, the- quarters and the cabins of slaves.
ater, restaurant, hotel, etc.) by the police may 1666: The Great Fire of London spread due
occur. Off-duty work may also begin to take to closely situated wooden buildings, wind,
precedence over the full-time job. The officer and dry weather. The fire initiated some
may spend too many hours working off-duty interest in fire prevention by insurance
and become tired. Officer survival concerns companies. A complete code of building
are greatly expanded with off-duty police. regulations was adopted but not made
Employers of off-duty police may also have a effective, since commissioners to enforce the
hard time controlling them. Terminating their regulations were not appointed until 1774
employment can create intense hostility from (Cote & Bugbee, 1988).
local police departments. 1667: Phoenix Fire Office—a private
firefighting service that suppressed fires
on subscribers’ property. Subscribers’ had
FIRE PROTECTION a crest on their buildings to mark them.
Other private fire companies also formed.
Fire protection is a major issue in asset pro- Today, some industrial complexes and other
tection. Fire can destroy almost anything. It is a facilities have their own proprietary or
chemical process whereby heat, fuel, and oxy- in-house fire brigades. Some of these are
gen combine in a chemical chain reaction to well equipped and can suppress small fires.
turn a solid or liquid into a gas. With adequate In most cases, fire departments are paid
I. FOUNDATIONS
COMMERCE 21
public professionals. Volunteer firemen Association. This resulted in the
are also used and play an important development of the National Building Code
role in providing firefighting services to for municipalities (Purpura, 1991).
many areas. Some fire departments are
a hybrid of paid and volunteer
firefighters. COMMERCE
1871: Peshtigo Fire—a logging community
in Wisconsin; Peshtigo had very dry weather Commerce has a tremendous relationship
and this aided the spread of a forest fire to asset protection. Professional security per-
that burned vast acres of land. A massive sonnel must understand the marketing of their
firestorm formed where the fire consumed employer’s goods and services in order to be
oxygen at such a rate that it created effective. A retail loss prevention agent must
significant draft. Firestorms occur where a understand that selling merchandise is the
fire is large enough to essentially create its reason for the existence of the store, not the
own mini-weather system. The Peshtigo apprehension of shoplifters. Marketing must
Fire was probably the worst fire in U.S. be balanced with security. They are “both different
history. It is relatively unknown because the sides of the same coin.” It can be said, in both a
Chicago Fire, which occurred a few days theoretical and practical sense, that “marketing
later, received more attention from the news is the ‘flip side’ of security.”
media. From the beginning of the nineteenth cen-
1871: Chicago Fire. As in the Great Fire of tury until the development of the railroads,
London, closely situated wooden buildings massive canal networks were constructed in
caught fire in dry weather. The wind the eastern United States. During their heyday,
whipped the fire through Chicago, and the canals had asset protection concerns with acci-
city was destroyed. We commemorate the dents and labor shortages. Workers were some-
Chicago Fire with Fire Prevention Week. times injured and barges and canals damaged.
Fire Prevention Week is held each year in Railroad expansion during the nineteenth
October. century was dramatic. Railroads were neces-
1894: Underwriter’s Laboratories (UL) sary to ship goods and raw materials in large
was formed. UL is an independent testing quantities. Railroads had, and still have, a vari-
laboratory. It subjects products to extensive ety of security and safety issues. Nineteenth-
tests to see if they work as they are supposed century American railroads faced attacks and
to and if they are safe. sabotage of tracks and telegraph lines by Native
1896: The National Fire Protection Americans, buffalo stampedes, wrecks, and
Administration development of standards labor difficulties. The labor problems included
for fire protection. These standards are used both shortages of workers and strikes. While
throughout the industry and are the basis for the railroads had their own police forces and
many municipal fire codes. contracted with the Pinkerton Agency, they also
1948: The National Burglar and Fire Alarm relied on an external control force—the Union
Association (NBFAA) was formed. NBFAA Army. The Army had nearly 5,000 soldiers
offers membership, publications, seminars, patrolling along and around the tracks in 1868
and professional certification programs for (Matthews, 1990). Human resource manage-
alarm installers. ment problems (recruitment of quality person-
1965: National Board of Fire Underwriters nel), safety issues, and external threats faced
was merged with the American Insurance by the railroads, parallel the challenges facing
I. FOUNDATIONS
22 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
contemporary asset protection managers. Today’s protection due to their vast wealth, as do cur-
manager is concerned with personnel recruitment rent celebrities such as rock stars, film stars, and
(hiring) and retention (keeping workers), OSHA corporate executives.
compliance, and external threats such as terrorist With the availability of retail store out-
attacks. lets and self-service shopping, shoplifting has
Air transport is vulnerable to theft, safety become a major issue. It is a low-tech crime
problems, terrorists, and “air rage” by emotion- that can be carried out by juveniles, drug
ally disturbed passengers. In 1969, numerous addicts, and so on. With the high value of some
airplane hijackings occurred, and in 1974, the store merchandise, sophisticated professional
Anti-Hijacking and Air Transportation Security thieves, and even terrorist groups engage in
Act was passed, establishing security programs retail theft. Organized Retail Theft (ORT) incor-
at airports. “Air rage” and the September 11 porates theft, repackaging, and distribution of
hijackings as well as the shoe bomb possessed the stolen product. It is a sophisticated opera-
by Richard Reid are more current issues. tion involving various entities and warehouses
Shipping on the high seas has historically to store the merchandise.
presented problems with piracy and labor/ Contemporary loss problems include the
human resource management (HRM) issues. counterfeiting of name brand items. Cigarettes
Contemporary cruise ships face issues such as are also a prime black market item because of
drunken, assaultive passengers and lawsuits their cost due to tax increases. Criminal enter-
due to cases of sexual harassment and rapes. prises that respond to these black markets are
The threat of terrorism is also very real, be it becoming more sophisticated. The theft of infor-
through the commandeering of a cruise ship, mation concerning the development of new
the smuggling of weapons of mass destruc- toys and drugs are major issues. “Competitive
tion aboard freighters, or attacks on ports such intelligence” and counterintelligence are key
as detonating an explosive-laden ship within asset protection functions today. Internet crimes
a harbor. Piracy—the robbery or hijacking of ranging from harassing e-mails to viruses,
ships—continues to be a problem in some areas. diversion of funds, denial of service attacks,
Telephone communication and Internet com- and espionage are also problems. The theft of
merce are the new fronts for security issues phone service and credit (identity theft or credit
relating to commerce. Disinformation (the delib- card theft) is also a major problem. Identity
erate dissemination of false information such as theft/fraud creates large amounts of indirect
“urban legends”), theft of communications ser- loss to the victim as investigating and clean-
vices, and so on are major concerns. ing up the problem takes enormous amounts
of time. Employers of identity theft victims are
also affected by a loss of productivity as the vic-
ECONOMIC AND MARKETING tim must take time to straighten out the finan-
TRENDS AND ASSET PROTECTION cial mess.
Criminal targets change as rapidly as eco-
The desirability of an asset has an effect on nomics and markets dictate. Understanding
the probability of its being stolen. A funda- markets is crucial to comprehending and
mental component of protection is to assign a subsequently planning protective measures.
monetary value to something. Historically, the Marketing is the “flip side” of security in more
“robber barons” of the late nineteenth century ways than one.
needed protection of their railroads, coal mines, Generally speaking, criminals outpace the
and steel mills. They also needed personal efforts of police and security professionals.
I. FOUNDATIONS
DEMOGRAPHICS 23
Historically, they have been able to create loss The Molly Maguires were an underground
by being one step ahead of protective measures. organization predominantly comprised of Irish
miners, who perpetrated assaults and homi-
cides against those they didn’t like. They also
DEMOGRAPHICS engaged in acts of sabotage against the rail-
roads. They were thugs in the eyes of Allan
Demographics play a major role in asset pro- Pinkerton, labor union activists according to
tection. Demographic theories of crime causation revisionist historians in the 1970s, and, per-
focus on the changing composition of the popu- haps, to a degree, terrorists. The “Mollies”
lation. Urbanization theories of crime causation were investigated by a Pinkerton operative in
focus on the changing of a society from rural to a three-year undercover operation. Many of the
urban, and cultural-difference theories focus on Molly Maguires were hanged in the mid-1870s.
cultural conflict within a society (Ortmeier, 1999). The Molly Maguires took their name from Irish
Population shifts in London during the activists/criminals who dressed as women and
Industrial Revolution brought in large numbers fought the landlords in Ireland (a class strug-
of shop workers who had previously worked in gle). See The Molly Maguires with Sean Connery
farming. There were cultural conflicts, drunken- and Richard Harris for a 1969—and perhaps
ness, overpopulation, and rampant crime. Riots “revisionist”—perspective on this.
were common and police action needed to be The Molly Maguires case was important
concerted and organized (along military lines). as it was probably the first use of a task force
American cities, such as New York during the (Pinkerton men teamed with Coal and Iron
1850s, experienced similar crime and social Police) as well as the first major undercover
problems. investigation.
Immigration has caused increases in crime Invariably there are criminals among immi-
due to cultural conflicts—for example, the rapid grant groups who exploit their fellow country-
expansion of Irish immigration in America dur- men. In most cases, organized crime activity
ing the period 1845 to 1852 in response to the dissipates after the immigrant group becomes
Potato Famine of 1847. Coleman (1969) cites assimilated into the dominant culture. Common
census statistics from 1870 as stating that there examples of this are slave trading, prostitution,
were 8,641 Irish immigrants to the United States gambling, narcotics, and smuggling. Extortion
in 1845, 29,540 in 1847, and 157,548 in 1852. As via protection rackets as well as criminal group
the coal mines provided, on their face, lucrative infiltration of organized labor also occurs. See
offers of employment, numerous Irish immi- the movies Goodfellas and Once Upon a Time in
grants became employed as coal miners. Irish America for some perspective on organized
miners who felt exploited struck back at the crime infiltration.
mine bosses and railroad owners through orga- Current immigrant criminal enterprises are
nized criminal activities. from Russian organized crime groups, South
PRACTICAL EXERCISE
List an ethnic group that is largely employed in a certain industry. Do their employers exploit that
group? How? What types of actions could they take to exact revenge on their employers?
I. FOUNDATIONS
24 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
Korean groups, and so on. With the breakup numerous other types. Note that not all terror-
of the Soviet Union, many of these immigrant ist activity is politically inspired. In the United
groups have turned to criminal enterprises. States many are the acts of mentally ill individ-
A new wrinkle is that some organized crime uals. Whatever the motivation behind it, each
today is transnational and crosses international terrorist threat requires both a proactive and a
borders. The more traditional organized crime reactive response to it.
groups have stayed within their own ethnic Terrorism can perhaps be understood by
group and preyed upon the members. looking at a few significant events.
Population density, culture, age, gender, 1848—Communist Manifesto was written
and other factors also play heavily in terms of by Karl Marx and Friedrich Engels. This
safety issues. Elder care requires certain aspects established the political theory of Marxism—
of asset protection. Government requirements often called “Communism.” The bourgeoisie
for long-term care facilities and patients suffer- (ruling class of capitalists) exploit the
ing from Alzheimer’s create daily challenges. proletariat (laborers). The proletariat should
Emergency planning for a population that is not rise up and overthrow the bourgeoisie and
ambulatory and has failing hearing and sight is establish a utopian society, a “dictatorship
also an issue. In school security, managers must of the proletariat” where everyone shares
focus on drug dealing, evacuation plans, active equally. Propaganda was used to educate the
shooters, parking, and crowd management at masses and inspire them to revolt. Marxism
special events. Hotel security must be concerned was born in 1848 and left-wing terrorist
with a transitory population. Issues include dis- groups throughout the world followed it.
orderly guests, dishonest employees, sexual 1886—The Haymarket Riot in Chicago
assault, and fire and guest services. Each popu- was instigated by anarchists during a rally
lation has unique safety and security needs. against McCormick Harvester. A bomb was
thrown and seven policemen were killed,
with another 60 injured. Six workers were
CLASS STRUGGLES AND also killed as police and workers exchanged
TERRORISM gunfire. Anarchists believed in the abolition
of governments. This movement utilized
A recurrent theme concerning the history of terror tactics such as assassination (William
security and that of policing is the presence of McKinley and six other heads of state) and
class struggles. Class struggles were apparent bombings. They were very active in France,
during the French Revolution and later with Russia, Italy, Spain, Germany, and the United
the development of terrorism as a significant States during the later nineteenth and early
security/law enforcement problem. It also twentieth centuries. There are still anarchists
relates, to some degree, to the problems encoun- in contemporary American society, but their
tered with the organized labor movement in violent activities have subsided greatly since
America. The following discussion on terrorism the 1880s to the 1920s. After the Haymarket
relates to left-wing and right-wing terrorism Affair, local industrialists donated land to
that is politically and economically inspired. the federal government so that troops could
Left-wing terrorists are usually anti-government be stationed nearby. Fort Sheridan was built
and have socialist leanings. Right-wing ter- for this purpose.
rorists are anti-government and highly con- 1969—There were numerous hijackings of
servative. These are two basic classifications airliners to Cuba by dissident individuals.
of political extremism. There are, however, There were also bombings of federal
I. FOUNDATIONS
CLASS STRUGGLES AND TERRORISM 25
buildings. In the Munich Massacre, Israeli government that raised their taxes and took
athletes at the Olympics were killed by away their gun ownership rights. Minority
Palestinian terrorists. The Munich Massacre groups were seen as taking their jobs. In
showed the world that terrorism was indeed urban areas, the Skinheads formed. American
a problem. It brought terrorism to the living Skinheads are based on a working-class move-
rooms of the world via television. ment in the United Kingdom during the early
1972—Patty Hearst and the Symbionese 1970s. The British Skinheads wore Doc Martens
Liberation Army (SLA)—a left-wing boots and close-cropped hair, and they targeted
antigovernment group. The granddaughter minority group members and immigrants for
of newspaper magnate William Randolph taking their jobs. The right-wing groups gain
Hearst was kidnapped by the SLA and later followers during economically depressed times.
joined them. She was “underground” for They are also inspired by government control
20 months, traveling across the country. over gun ownership and increased taxes.
The Patty Hearst case showed that fugitives In the 1990s and into the early twenty-first
could remain underground for extensive century, terrorism perpetrated by right-wing
periods of time in the United States. See the extremists was largely overshadowed by the
film The Patty Hearst Story for an excellent activities of radical Islamic fundamentalists.
treatment of how left-wing radicals operated A series of terrorist events within the late
in the United States during the early 1970s. 1990s and early twenty-first century include the
1973—Nyack Incident—several left-wing following:
terrorist groups thought to be long dormant
collaborated on a “fundraiser” (armored car
● The 1993 World Trade Center bombing by
robbery) in Nyack, New York. This showed Islamic fundamentalists who planted an
that groups thought to be long dormant were explosives-laden vehicle in the parking
still active. Note that the Vietnam War created garage and detonated it.
intense antigovernment feelings in the United
● The 1995 Oklahoma City Bombing by right-
States. After the U.S. involvement in Vietnam wing terrorists who used a massive truck
ended in 1973, much of the left-wing sentiment bomb to demolish the Alfred P. Murrah
faded. The Nyack Incident showed that there Federal Building.
were still some virulent left-wing terrorist
● The September 11, 2001, World Trade
groups operating. That is an important Center and Pentagon attacks by Islamic
lesson: that groups no longer “on the radar” fundamentalists associated with al-Qaeda.
can reemerge. Note that occasionally 1970s The attackers hijacked four airliners and
terrorists are still being caught. The Nyack crashed two of them into the World Trade
Incident also showed that left-wing groups Center and one into the Pentagon. One
were working in concert with one another. airliner was crashed in a field near Somerset,
This is a major concern with terrorism as “the Pennsylvania, after passengers overpowered
enemy of my enemy is my friend.” Alliances the hijackers. This alerted the United States
can easily and quickly form between groups. that it had a serious problem with some of the
more radical followers of Islam.
In the 1980s and 1990s, right-wing terror-
ism became more of an issue than left-wing, In Madrid on March 11, 2004, 192 peo-
Marxist-inspired terrorist activity. Economically ple were killed and 1,841 wounded when 10
disenfranchised males in rural America often bombs exploded on four commuter trains. The
believed that they were being subjugated eco- bombs exploded within minutes of each other.
nomically by Jewish bankers and a federal Seven of the key suspects, including the alleged
I. FOUNDATIONS
26 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
master mind, died in the explosion. A police- The 9/11 attacks in America, the 3/11 attacks
man was also killed. Twenty-one people were in Madrid, and the attack in Mumbai all illus-
arrested in connection with the attacks, most of trate the workings of organized, dedicated ter-
them Moroccan (http://news.bbc.co.uk/2/shared/ rorists. To better understand the forces driving
spl/hi/guides/457000/457031/html/. Retrieved radical Islamic fundamentalists, consider the
October 11, 2009). The choice of multiple targets following:
in a simultaneous coordinated attack is a key
feature of an operation by al-Qaeda. The attack Old vs. New—there is a “clash of cultures”
appears to have been designed to inflict the maxi- between traditional ideals and new, Western
mum number of civilian casualties. This is also values. There is also a power shift away from
consistent with previous al-Qaeda operations religious leaders who formerly had much
(http://news.bbc.co.uk/2/hi/europe/3582501 more control over their followers.
.stm. Retrieved October 11, 2009). Class struggles—large numbers of
In Mumbai, India, on November 28, 2008, 151 unemployed or underemployed persons
people were killed by terrorists using automatic living in poverty.
weapons and hand grenades. The 60 terrorists Demographics—undereducated or
were in nine different groups with some attacking miseducated Middle Eastern or Muslim
train stations and others taking hostages in a hotel young men who have been taught that the
(http://www.boston.com/bigpicture/2008/11/ United States is “The Great Satan.” These
mumbai_under_attack.html. Retrieved October impressionable young men can become an
11, 2009). Islamic fundamentalists based in army of destruction if the right conditions
Pakistan were behind the attack. are met.
PRACTICAL EXERCISE
Develop a list of specific threat actions posed by terrorists, such as bombings, assassinations, cyber
attacks, kidnapping, and so on. Next, list a proactive countermeasure to be used before the attack is
launched. Finally, list a reactive countermeasure to be employed as the attack is taking place or after
the attack has occurred.
I. FOUNDATIONS
LABOR RELATIONS 27
Culture of warfare—some areas of the of earlier labor issues. One must understand
world have experienced warfare for an the historical context of “labor relations” in
extended period of time. This warfare may American society to fully appreciate the devel-
be low, medium, or high intensity. In most opment of both labor unions and control forces.
cases it is low-intensity guerrilla warfare or “Labor relations” during “the mean years”
insurgency. In some cases, entire generations of 1866–1937 (Calder, 1985) consisted of some
of people have been immersed in wars. tactics employed by management that would
Afghanistan, Palestine, and Bosnia are be unacceptable by contemporary society.
examples of this. These included the intimidation of labor lead-
Religion—a perversion of Islam that ers, spies, and “agent provocateurs” (persons
emphasizes traditional values and who instigate illegal activity and then work to
demonizes the West has occurred. Religion have the participants arrested for violating the
is a powerful influence on people. law) in unions; assaults with machine guns;
People who are living in poverty or feel the importation of strike breakers (workers who
discriminated against may turn to religion replace those who are on strike); the subversion
as an answer to their problems. Religion of attempts by workers to organize by the pro-
also gives legitimacy to the exhortations motion of interethnic conflict; and the use of
of leaders. If a leader advocates deviant thugs to intimidate workers.
behavior—violence—it may be acceptable to Note: See Matewan with James Earl Jones,
his impressionable followers. Chris Cooper, and Mary MacDonald for an
Charismatic leaders—all dynamic groups excellent treatment of this topic based on the
have charismatic leaders. Extremist groups 1920 Matewan Massacre. The Matewan Massacre
thrive on them. A charismatic leader can was a gun battle waged between striking min-
exploit—as did Adolf Hitler—cultural, ers and the Baldwin-Felts Detective Agency in
social, and economic forces in a negative Matewan, West Virginia.
way. Charismatic leaders can create large These are some of the key events in the
numbers of youthful terrorists. struggle of organized labor within the United
States.
I. FOUNDATIONS
28 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
the plant so that they could not work. The Philadelphia City Cavalry after the Great
workers assumed that Frick would do this Anthracite Strike in 1903–1904.
and reopen the plant using strikebreakers 1933—National Industrial Recovery Act
(employees who replace striking workers). insured collective bargaining rights. Wagner
Three hundred Pinkerton detectives came Act (National Labor Relations Act) created
by barge up the Monongahela River and the National Labor Relations Board in 1935,
tried to secure the plant. A battle ensued giving a real enforcement function to the
which lasted all day. The workers used a National Industrial Recovery Act.
small cannon to try and sink the barges 1937—Battle of the Overpass. During a strike
and set them on fire by pouring oil into the against the Ford Motor Company, labor
river and lighting it. The Pinkertons were leader Walter Reuther and a companion were
defeated and had to surrender (Fossum, severely beaten by Ford Service security
1982). Nine strikers and seven Pinkertons officers while not doing anything illegal. This
were killed (Gage, 2009). The militia were beating was not unusual except that it was
called in by the governor. Interestingly photographed by newspaper reporters. The
enough, Frick was later shot by an anarchist American public was not sympathetic toward
who attacked him in his home. unions as they were regarded as “communist”
1894—Pullman Strike—the Pullman or “anarchist.” With the Battle of the
Palace Car Company laid off half of their Overpass, however, the public was outraged
employees and forced the rest to take a at the actions of Dearborn, Michigan, police
40% wage cut. Workers were required to and Bennett’s Ford Service men—the end of
live in company housing. After the wage “the mean years” of labor relations.
reductions, there was no reduction in the 1947—In 1946, there were a large number of
rent for the housing. The local strike became strikes; organized labor reached its zenith in
a sympathy strike as American Railway this period. Congress passed the Taft-Hartley
Union (ARU) members refused to handle Act. One of the provisions of the Act is that
trains with Pullman cars. Trains were the U.S. president, through the attorney
stopped and Pullman cars were uncoupled. general, can obtain an injunction against
The rail owners assembled trains so that a strike or lockout if a substantial area is
if Pullman cars were uncoupled, mail cars affected or national security is
would also be cut off. Interfering with the threatened.
mail was a federal offense. Eugene Debs, the
ARU leader was sent to jail for conspiring Today, there are specialized contract secu-
to obstruct the mail. President Grover rity firms that have strike security forces. These
Cleveland called out the Army so that the firms supply consulting and guard service to
mail could be delivered and the strike was companies having labor difficulties. They gen-
broken (Fossum, 1982). erally employ persons with a military back-
1900—Latimer Massacre—large numbers ground and provide their personnel with
of Serbian miners were killed by sheriffs’ training in labor law, crowd management, and
deputies during a strike in Latimer, so on. These specialized firms are able to man-
Pennsylvania. The United States offered an age volatile labor disputes with minimal harm
official apology to the government of Serbia to persons or property. Additionally, the collec-
after this incident. tive bargaining rights of workers are upheld.
1905—Pennsylvania State Police—first Strikes are handled in a much more professional
modern state police force. Formed from the manner than in the past.
I. FOUNDATIONS
LAW 29
PRACTICAL EXERCISE
It is 1920. The Great War is over and you are a military veteran with service in World War I. You
are out of work and have several children to feed. The best employment prospect is with a private
security firm that is doing strike security work. How do you feel about this?
I. FOUNDATIONS
30 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
2. Civil law relates to legal standards, which evidence and can’t be sold). The processes
govern the conduct between individuals. for forfeiture and civil recovery are not
Civil law relates to contracts that include the encumbered by constitutional protections
following. to the accused (as in criminal law) and the
a) Contract security service burden of proof is a preponderance (majority
b) Private investigative service such as 55%) of the evidence. In a criminal
c) Armored car service case, proof beyond a reasonable doubt (99%
d) Personal protection/executive protection certainty) is required. Civil laws are being
service used increasingly to combat criminal activity.
e) Alarm monitoring Civil law also covers torts or private
f) Alarm response wrongs committed against another, such
g) Employment contracts for management as defamation, invasion of privacy, assault,
and labor battery, and so on. Torts may be thought of
h) Nondisclosure pacts—agreements not to as the civil equivalent of crimes. It must be
disclose proprietary information, such as borne in mind, however, that the definitions
trade secrets are different.
i) Noncompetitive agreements or pacts— Negligence is a failure to exercise reasonable
agreements not to seek employment and due care (such as not following a
with competing firms within a specific recognized standard) by doing something
time frame and/or geographic area after dangerous or not doing something, which
termination of employment is necessary for safety. In order to prove
j) Leases between landlords and tenants— negligence, the plaintiff (party bringing
these can be individuals who rent the action or suit) may have to show the
apartments or businesses, such as in following:
shopping centers ● The existence of a duty
Civil law also involves asset forfeiture and ● A failure to perform that duty
civil demand or civil recovery. The former ● Injury or harm occurring to a party to whom
is a civil process used by law enforcement
the duty was owed
officials to obtain property used to commit ● The harm was reasonably foreseeable
crimes. Once a drug dealer or fence has ● The harm was caused by the failure of the
been arrested, their home, car, and any
defendant to perform the duty (Hertig,
other asset they have that has been used
Fennelly, & Tyska, 1998)
in the commission of the offense is taken.
This is a civil process before any criminal 3. Administrative or regulatory law is
conviction has occurred. Civil recovery is established to regulate technical aspects
used by merchants to obtain monetary fees of society. Administrative or regulatory
from shoplifters. Shoplifters are sent a civil agencies are created by the federal or
demand letter stating that if they do not pay state legislature. These agencies have the
a certain fee they will be sued. As a civil suit authority to create rules and regulations.
will ruin someone’s credit, many people They investigate and enforce compliance
simply pay the money, which is collected by with those regulations. They also adjudicate
a third party. This is much more effective for violations and mete out punishments. These
merchants, as they do not have to proceed agencies are very powerful. Complying with
with criminal prosecution, tying up time their regulations is extremely important; so,
and merchandise (this must be kept as too, is complying with them and remaining
I. FOUNDATIONS
HISTORY OF SECURITY SERVICES 31
in business. Federal administrative agencies National Labor Relations Board, and so
in the United States include the following: on) that regulate the employer-employee
a) Occupational Safety and Health relationship. Labor law also consists of
Administration contracts between employees and employers
b) National Labor Relations Board and privacy issues.
c) Environmental Protection Agency
d) Federal Aviation Administration
e) Nuclear Regulatory Commission HISTORY OF SECURITY SERVICES
f) Federal Communications Commission
g) Equal Employment Opportunity Security services or contract security agen-
Commission cies have played a large role in both public and
Agencies also exist on the state level, private protection. Outsourcing or contracting
such as CALOSHA or the Pennsylvania for security makes economic sense. Flat hourly
Department of Labor and Industry, Human rates are charged and clients do not have to
Relations Commission, Alcoholic Beverage worry about benefit costs and associated human
Commissions, Private Detective and Protective resource management issues. The client can
Agent Licensing Board, and so on. There hire as many personnel as desired for as long as
are also city or municipal boards of health, desired. This provides for flexibility in protection.
building inspection, zoning, and so on. These Additionally, contract service firms may have
regulate food handling in public kitchens, specialized expertise that the client does not.
fire escapes and fire detection equipment, the There are career opportunities here for
number of parking spaces required, setback those who are adept at sales, client relations,
rules from property lines, building permits, and HRM. Security services are growing and
and so on. For information on state security will continue to do so. In addition to standard
licensing, see the International Association of “guard service” there are alarm response, alarm
Security and Investigative Regulators (http:// monitoring, armored car, personal protection
www.iasir.org). specialists (PPS), and private investigation.
The 1990 Campus Security and Student There will always be a need to understand the
Right to Know Act passed in the United dynamics of the outsourcing process for both
States requires colleges to report all crimes contractors and clients.
committed on their campuses. They While contract security firms usually offer
must also publish crime statistics. The private investigative services, most firms spe-
Act is enforced by the U.S. Department cialize in one or the other. Early security service
of Education, which can levy monetary firms began by offering investigative services
penalties for noncompliance. Another and later transitioned into contract security. This
important regulatory law is the Bank happened because there were greater markets—
Protection Act of 1968. This law established and profits—in providing security service. In
security standards to be used in banks that some cases, this continues to occur, although
are insured by the Federal Deposit Insurance the growth in demand for private investigation
Corporation (FDIC). Portions of the Act are is robust enough to allow companies to be prof-
enforced by different federal agencies. itable while keeping investigation as their sole
4. Labor or employment law consists of service. Pinkerton, a Scottish immigrant, became
statutory laws, court decisions, and involved in investigation by accident. While
administrative agency regulations (Equal searching for wood to make barrels, the young
Employment Opportunity Commission, cooper discovered a gang of counterfeiters.
I. FOUNDATIONS
32 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
Pinkerton established the largest protective and monitors home alarm systems and has
investigative agency in the world with branch become a household name in the United
offices in many countries. By the mid-1990s, States.
Pinkerton had 250 offices worldwide with over 1909—William J. Burns—Burns was
50,000 employees (Mackay, 1996). Pinkerton had the original head of the “Bureau of
extensive centralized records and a code of eth- Investigation,” which later became the
ics, used undercover investigation, employed Federal Bureau of Investigation under
the first female detective (Kate Warne—60 years J. Edgar Hoover in 1932. William J. Burns
before the first female police officer), and used founded the William J. Burns Detective
wanted posters. Pinkerton is credited with Agency in 1909. He was virulently
being the first to start a security service; in actu- antianarchist and anticommunist, believing
ality there were other services started before that unions were being controlled by
him, but none has become as well known as subversives and that unions were fronts
his was. for anarchists and communists. Burns
was known for his ability to use evidence
1858—Edwin Holmes started the first collection at the scene of a crime to capture
“central office” (central station) for alarm suspects. In 1910, he apprehended the
monitoring and response. Today we use McNamara brothers, who were president
the term “central alarm station” or “central and secretary of the United Iron Worker’s
station.” Many central stations are contract, Union, for a bombing of the Los Angeles
off-premises facilities that monitor intrusion, Times building. He traced them from parts
fire and process (temperature or pressure of the unexploded bomb. The McNamaras
gauges), or duress (emergency medical or were supposedly avowed anarchists. In the
robbery) alarms. Customers pay for the 1970s and 1980s, Burns International Security
monitoring services. Holmes Protection Services, Inc. became one of the largest
provides monitoring and alarm response contract security firms in the world. It has
services. since been acquired by Securitas.
1874—American District Telegraph (ADT) 1954—George Wackenhut founded the
was founded. ADT became the largest alarm Wackenhut Corporation (wackenhut
company in the world. Their main product .com—see the job info on the Custom
was magnetic contact switches Protection Officer program). The firm
(the little gray boxes above doors and provided security services in over 55
windows in restaurants and stores). Today different countries backed by a staff of 70,000
they provide a wide variety of electronic employees. It also provided staffing for
security equipment. They also provide prisons on a contract basis. Wackenhut was
CCTV, access control systems, and fire acquired by the Danish firm Group4falck
protection systems. ADT bought Holmes in 2002. The parent firm is now known as
Protection in the late 1990s. ADT is now “G4S” and Wackenhut is “G4S Wackenhut.”
a unit of Tyco Fire and Security Services G4S Wackenhut provides access control
(Purpura, 2002). and perimeter security to the U.S. army in
1891—Brinks Armored became the largest various overseas locations (http://www.g4s
armored car company in the world. Founded .com/uk/uk-working_for_g4s/uk-join_us/
by Washington Perry Brinks, the firm trans- uk-vacancy-kosovo.htmTail. Retrieved
ports cash and other valuables. Brinks also October 10, 2009).
I. FOUNDATIONS
THE PATH TO PROFESSIONALISM 33
I. FOUNDATIONS
34 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
I. FOUNDATIONS
CONTEMPORARY CAREERS IN ASSET PROTECTION 35
as well as legal issues relating to privacy, search protection, such as those that detect vibration
and seizure, property rights, and the rights of on a chain link fence or beam-type systems,
employees (legal consultant role). Patrol officers such as microwave placed along a perimeter
must also be able to respond to problems that line), or area protection (volumetric intrusion
may occur, such as slippery walkways, blocked detection for an area such as passive infrared
emergency exits, hazardous materials spills, or PIR or ultrasonic).
fires, fights, or crimes in progress. Obviously, 2. Fire alarms that may be ionization detectors
patrol officers need a variety of skill sets. They (responding to the products of combustion
must be competent in many things. in the earliest phase of a fire).
Retail loss prevention agent: Positions that 3. Emergency, panic, or duress alarms, which
are available with many large firms. These jobs are activated by someone in distress.
offer persons the ability to learn valuable investi- 4. Process alarms that monitor equipment or
gative skills, such as surveillance and interroga- utilities (temperature, water pressure, air
tion. They are readily available and often accept pressure, power).
part-time employees. There are extensive oppor-
tunities for advancement within retail security! What began as a security office is now a cen-
Central alarm station operator/dispatcher: tral alarm station/dispatch center. Obviously,
Security officers in many environments will act facility managers must plan for the eventual
as dispatchers or central alarm station opera- expansion of their security offices. Serious
tors. They will monitor alarm panels, CCTV thought must be given to alarm response. If
screens, and electronic access control systems. alarms notify property managers of problems,
As technology expands, so does the job of the there must be a rapid, effective response to
central alarm station operator. These central resolving those problems. This is a key issue
alarm stations may be either proprietary or con- in protection that has traditionally been over-
tract. In a proprietary “in-house” setting, central looked. Contract alarm response or patrol car
alarm stations evolve over time. Many facilities service is one option: what Edwin Holmes
develop central alarm stations in an incremen- started in 1858 needs to be integrated into a
tal manner. They often start with a security contemporary asset protection system. Persons
office that has a desk, a telephone, and a radio. beginning careers in asset protection should
After a while, the organization will add addi- seek to understand the central alarm/dispatch
tional monitoring systems. First, there is a cam- operation. It is “the brain” of the security
era observing the lobby. Next, there is a camera operation, serving as a command, control, and
on the parking area. Then there may be intru- communications center.
sion detection systems in sensitive areas which Auditor/investigator: Auditors check on
annunciate (terminate) at the central office. Fire things such as financial records (financial
alarm panels may also be located there. Finally, audits) or procedures (procedural or opera-
an electronic access control system is added tional audits) to see if conditions are what they
which has a monitor in the central office. are supposed to be. Audits seek to uncover
There are access control systems and alarm deviations from procedure, errors, or criminal
systems. The reader must bear in mind today behavior (Purpura, 2002). A deviation from a
we have various types of alarms. procedure might be documenting something
that the writer did not verify occurred—taking
1. Intrusion alarms, which are point protection a “shortcut.” Audits may also uncover errors
(on a specific point, such as door or such as mistakes made in pricing merchandise
window), perimeter protection (fence or forgetting to record required information.
I. FOUNDATIONS
36 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
Criminal behavior may include falsifying graduate students. Winning papers are eligible
employee attendance records or removing raw for cash prizes.
materials from the workplace. Audits may start The International Foundation for Protection
investigations or investigations may launch Officers also features links to colleges on their
audits to see the scope of the problem. Audits Web site (http://www.ifpo.org). The foundation
may detect loss stemming from waste, error, has also provided scholarships to faculty who
crime or unethical/unprofessional practices. In teach security courses.
that sense they support the WAECUP Model of Networking is crucial to career success in
Loss Control. security or investigation, as not all good jobs
Private investigators: They work for com- are advertised publicly. Almost all are obtained
panies, individuals, or governments on a fee through personal contacts. There is an old
basis. They contract out to perform various saying:
types of investigative activity. Criminal inves- “If you don’t know nobody, nobody knows you.”
tigation done by private investigators includes This saying makes up for in accuracy what
undercover investigation of workplace theft, it lacks in English. Professional contacts can
sabotage, or drug abuse. Surveillance of sus- be gained through organizational member-
pected employees may also be conducted. Some ship, such as ASIS International, IFPO, or the
private investigators are forensic accountants, International Foundation for Cultural Property
trained to investigate fraudulent accounting Protection (http://www.ifcpp.org). Professional
and present a case in court. Fraud examination organizations usually have job placement ser-
is a large and growing concern of all types of vices and membership directories. They provide
organizations, not just insurance carriers. Visit members with the opportunity to meet oth-
the Association of Certified Fraud Examiners at ers in their field and discuss matters of mutual
http://www.acfe.com for more information on concern. Attendance at seminars sponsored
fraud examination. by professional organizations is another way
Specialized security functions such as K-9 to network. Management-level personnel can
handlers, crowd management specialists who participate in the International Association of
work concerts in arenas, strike security person- Healthcare Security & Safety (http://www.iahss
nel, and information technology (IT) specialists .org) or the International Association of Campus
also exist. These persons are specialists with Law Enforcement Administrators (http://www
unique skill sets. They have prior experience, .iaclea.org).
training, and education that qualify them for Professional development can be obtained
their positions. They have “paid their dues” through a variety of sources. Professional orga-
and evolved in their careers. nizations offer seminars and online programs.
Educational opportunities are available both Some offer certification programs such as the
online and in traditional college programs. International Foundation for Cultural Property
Persons wishing to move up the ranks of man- (http://www.ifcpp.org) that offers both the
agement will need higher education. The Web Certified Institutional Protection Specialist
site asisonline.org has information on careers (CIPS) and Certified Institutional Protection
and academic programs. There is an extensive Manager (CIPM) designations.
listing of colleges that offer academic course-
work in security. In addition, ASIS offers full- “Learning never ceases.”
time college students membership at greatly This chapter discussed the past and present.
reduced rates. There is also a Student Paper The future belongs to those who reach out
Competition for both undergraduate and and grasp it.
I. FOUNDATIONS
EMERGING TRENDS 37
EMERGING TRENDS
Security service firms are moving into new Threats to commerce/supply chain security
markets. Providing security at special events are necessitating more attention. Guarding drug
is one example. While contract security at con- shipments against hijacking or covert diversion
certs or sporting events has been going on for is an example. As fears of pandemics grow, as
a long time, now companies are hiring special- does the abuse of prescription drugs, pharma-
ized service firms for other types of events. The ceuticals have become targets for theft.
company Christmas party or picnic may be Piracy on the high seas is rampant. This is of
examples. Securing abandoned buildings is a concern, as approximately 90% of the world’s
new line of business where contract firms have cargo travels by sea. Consulting, kidnap and
partnered with exterminators to offer a complete ransom negotiation, and armed security officers
package of care for a vacant property. Recovering are services that can be offered to the shipping
assets in the wake of floods and other disasters is industry. Just as the Pinkerton National Detective
another new line. This goes with disaster recov- Agency provided protection for railroads in the
ery services where firms will take care of food, nineteenth century, so, too, will contract firms
clothing, lodging, and toilets after a disaster. offer services relating to goods in commerce.
Protection of government buildings and Supply chain security efforts are not only
transportation of inmates are other expanding contracted out; more and more organizations
lines of business for contract firms. The federal are taking steps to ensure the protection of their
government in the United States is probably the supply chains internally. And theft is only one
largest employer of contract security services. source of loss for an organization. Any disrup-
There are also more security services for tion of a supply chain, be it due to strikes, civil
governments and armed forces in hostile areas. unrest, terrorism, or natural disasters, costs an
These services include personal protection and organization money. An increasing number of
facility security. The clients may be govern- organizations will have personnel on board who
ment or military organizations. They may also will work on supply chain security. These indi-
be private companies. In war-torn areas of the viduals will perform risk assessments, monitor
world, such as Iraq and Afghanistan, contract various aspects of the supply chain, and investi-
security personnel provide personal protection gate problems as they occur.
for VIPs. They are also providing fixed site secu- Along with this is an increased emphasis
rity in unstable areas where there is exploration on international crime and loss problems. The
and development of natural resources. Oil, gas, International Foundation for Protection Officers
and minerals all require processing and they all has designated persons as Certified Protection
require protection. These resources are some- Officers in over 50 different countries. ASIS
times highly valuable (such as precious metals) International continues to expand with local
and can be stolen by criminal or terrorist gangs. chapters being formed in new areas of the
They may also be targets of insurgents and ter- world. There are more international security
rorists who wish to disrupt the flow of oil or gas. conferences with attendees from private compa-
As energy demands increase so, too, does the nies, nonprofit organizations, and governments
need to find new sources of fuel. Many of these attending.
sources are in remote areas where insurrection, Identity theft/fraud will continue to grow.
terrorism, or banditry can be a problem. New schemes and means of acquiring personal
I. FOUNDATIONS
38 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
and financial data will evolve. As a result the require liaison between police and corporate
convergence of physical and IT security will security departments in banks and credit card
increase. A greater use of biometric access sys- companies as well as state and federal agen-
tems for entry into databases is occurring. So, cies. Identity theft/fraud is multijurisdictional.
too, are educational initiatives designed to pre- Perhaps a historical cycle is repeating itself; out-
vent the problems in the first place. Security laws in the American West committed crimes in
departments in all organizations will play a various jurisdictions, making it difficult to appre-
greater role in educating the workforce about hend them. Filling the void were the Pinkertons
various types of hazards. and other private investigative agencies. Later on,
Investigative efforts in the wake of identity governmental investigative agencies were formed
theft/fraud are also growing. These investigations to combat the problem.
I. FOUNDATIONS
SECURITY QUIZ 39
I. FOUNDATIONS
C H A P T E R
3
Role of the Professional
Protection Officer
M. A. Kevin Palacios and Christopher A. Hertig
41
42 3. ROLE OF THE PROFESSIONAL PROTECTION OFFICER
but the core of the job description remains the few off-duty police. Sometimes persons in the
same. A person who chooses a career path in military are assigned to security work temporar-
safety or security will never stop being a pro- ily within the armed forces. In other cases they
tection officer. They will never cease to protect work for a civilian employer as a security officer
people, information, assets, reputation, and the or retail loss prevention agent.
environment surrounding an organization. The key is that the person’s major focus is on pro-
The protection officer may be acting as the tection of others, tangible assets such as property, or
agent or representative of the landlord. They intangible assets such as information or reputation.
may not have any arrest authority beyond that Legal authority or job title is not the determinant of
of a regular citizen. In other cases they may what a “protection officer” is.
have some type of police commission with spe-
cific arrest authority: they may arrest for certain
offenses and/or within a specific area. They may
LEVELS OF PROTECTION STAFF
be members of a law enforcement organization
A general framework for the design of security
whose job assignment is protecting a public fig-
functions within an organization is as follows:
ure, coordinating crime prevention activities,
or guarding government buildings. Protection 1. Nonprotection employees. They need basic
officers may be civilian or military, sworn or information about self-protection and some
unsworn. Job titles vary considerably; a protec- method to report hazards and threats.
tion officer may be referred to in different ways. 2. Basic Level Protection Officer. Includes
While the more common titles are “security offi- everyone from the protection team who must
cer,” “security guard,” or “retail loss prevention follow simple orders, look after activities
agent,” some protection officers may have the carried out by nonprotection employees, and
title of “police officer,” “campus police officer,” work in a low- to mid-threat environment.
“special officer,” “crime prevention coordina- Basic level officers don’t need any previous
tor,” “loss prevention officer,” “deputy sheriff,” experience and might (or might not) need
“military policeman,” and so on. (In many states operational—basic level—specialized skills.
these titles are controlled by state law. The state This person needs a basic training, enough to
statutes should be reviewed in each state to cover foreseeable situations he or she might
determine the words you may or may not use.) encounter. Completion of state or provincial
This protection officer could have full-time, training, Officer Basic Training, Basic
part-time, or occasional employment. Part-time Protection Officer programs through AST
security work is very common in some areas. Corporation, Basic Security Officer Training
Many security service firms are largely staffed Series through the Professional Security
by part-time personnel. Amusement parks that Officer Training Network, 360 Training
are open during the summer may employ a large programs, and so on.
seasonal staff during the busy season. The secu-
Examples include uniformed guards, door-
rity department may be managed by a small core
men, patrol guards, and so on.
of permanent persons. It is not unusual for police
officers to work occasional security details. This 3. Intermediate Level Protection Officer. The
may be while they are on official police duty or Intermediate Level officer is related to the
it may be while off-duty for a private employer. CPO; it includes everyone who must follow
Security service firms that provide protection more complex orders, look after processes
during special events may use a combination of carried out by protection and non-protection
regular staff, part-time probation officers, and a employees, works in a mid- to high-threat
I. FOUNDATION
MAJOR ROLES OF PROTECTION OFFICERS 43
environment, and needs previous experience Management representative—the officer acts
and specialized skills. This person needs as an agent, a representative of management to
a complete understanding of the various employees, visitors, and others. This is where the
unexpected situations he might encounter. officer is concerned with representing the phi-
Therefore, training has to be very complete. losophies of management (employer or client). In
This is why they should complete both order to do this effectively, they must thoroughly
the Certified Protection Officer, (CPO) understand the mission statement of the organi-
certification and employer training. zation. They need to know what the policies are
Examples include group leaders, personal and the underlying philosophy behind them.
protection specialists, retail loss prevention The major emphasis in the management repre-
officers, radio operators, central alarm sentative role is on positive relations with the vari-
station monitors, contract security in high- ous publics with which security departments deal
threat zones, and so on. (employees, customers, visitors, patients, ven-
4. Advanced Level Supervisory and Managerial dors, local law enforcement officers, etc.). A solid
Protection Officers. This level correlates background in public and customer relations is a
with the educational and experience level necessity. So, too, is diplomacy when dealing with
of individuals who have been designated other departments, external agencies, and so on.
Certified in Security Supervision and Another aspect of this role is educational.
Management (CSSM). It includes everyone Security officers may be very active in educating
who must give orders and make decisions employees, visitors, students, guests, patients,
regarding personnel. This person must have and so on about safe practices. As the officers
an understanding of how the full entity grow professionally, they may become increas-
(organization) works, people management, ingly involved in educational efforts. As the
leadership, and motivation. This is a line security industry becomes more complex, requir-
supervision or entry-level management ing the protection of more intangible assets, this
position. This individual must have met all educational role will become more common.
CPO certification requirements in addition Intelligence agent—in this role the officer
to supervisory and management courses. collects information for management. The offi-
Completion of the Foundation’s Security cer must have an understanding of what infor-
Supervision and Management Program is mation is pertinent. They cannot pry into areas
recommended. that are not managerial concerns related to loss.
At the same time, they must be effective at gain-
Examples include shift leaders, security super-
ing critical loss-related information.
visors, asset protection team leaders, and so on.
While application of the Waste, Accident,
Error, Crime, and Unethical Practices (WAECUP)
model is useful, another point to remember is
MAJOR ROLES OF PROTECTION
that large problems start as small ones. Issues
OFFICERS
such as terrorism, crimes, safety hazards, envi-
ronmental hazards, data loss, major embarrass-
There are several major roles that protection
ments, and so on generally begin as unusual or
officers fulfill.
out-of-the-ordinary situations. From there, they
1. Management representative mushroom into serious problems.
2. Intelligence agent An old safety concept is that there is often “a
3. Compliance or enforcement agent leak before a break.” That is, a major problem
4. Legal consultant starts out as a small issue. A crack in a wall or
I. FOUNDATION
44 3. ROLE OF THE PROFESSIONAL PROTECTION OFFICER
floor may mean significant structural damage. or “mental rehearsal.” It is simply a process
It may also indicate extensive erosion of soil where officers construct scenarios and
underneath the building. It is a small crack, but review how they would be handled. These
it may indicate much larger problems. could be crime, terrorism, emergency or
When investigating crime or misconduct, the crisis management concerns, and so on.
principle of expansive significance is important Safety issues may include slip and falls,
to remember. “Minor is major.” Minor criminal structural collapse, persons tripping, or the
issues often turn out to be of major significance onset of medical problems (diabetic shock,
once they are fully investigated. Major crime heat stroke, seizures, heart attacks, etc.).
problems are resolved through combating
minor criminal behavior. The same is true of Playing the “What-If? Game” helps prepare
employee misconduct; it often turns out to be the officer for response to the event as if they have
more extensive than it initially appeared. seen it before. It also aids in uncovering unforeseen
loss events/scenarios. This is part of the ongoing
In short, professional protection officers must risk assessment that protection staff perform on
collect intelligence on changes in the environment,
unusual situations, or suspicious persons.
a daily basis. Note that significant issues should
be documented. Preferably this documentation is
Most, but by no means all, of the intelligence reinforced by personal communication with the
agent’s role is performed while the officer is on appropriate supervisory personnel.
patrol. Officers on patrol should always do the Obviously, proficiency in human and public
following: relations is important to fulfilling the role effec-
1. Look up—see if there are any pipes leaking tively. Most information comes from people.
or water coming from another floor. Check Officers who are approachable learn more about
for items improperly stacked. Look for what is going on in the environment they are pro-
problems with the ceiling or roof. tecting. Officers must be approachable but they
2. Look down—look for problems in footing. cannot use the workplace as their social network.
Look for spills on the floor from soft drinks, They must exhibit interest in people and processes
bottles of liquid detergent, liquid from pipes without getting personally, romantically, or finan-
or storage tanks. Look for ice or snow. Look cially involved. Professional protection officers
for carpet that is not properly fastened engage in short, productive interactions with peo-
down. Look for tripping hazards such as ple. They make every conversation an interview.
items left on the floor. Enforcement or compliance agent—this is
3. Look around—check for equipment and where the officer enforces the rules of the envi-
machinery that are not turned on or off when ronment. He or she gains compliance with the
they are supposed to be. Verify that all trash rules. The officer must know the rules to be
collection points are properly maintained. enforced. He or she must be thoroughly conver-
Trash can become a safety or fire hazard. It sant with them. The officer modifies and man-
may also indicate attempts at theft where an ages human behavior so that the rules established
employee discards something for later retrieval. by management are followed.
It may also indicate things being thrown out Sometimes the term “enforcement agent” is too
that should not be. Trash collection points may strong, too law enforcement-oriented to work in
relate to any or all parts of the WAECUP model. a security setting such as a hotel, resort, or office
4. Whether on patrol or on post, officers should complex. Protection officers must be acutely aware
always play the “What-If? Game.” This is of the cultural expectations of their work environ-
also known as “constructive daydreaming” ment. They must understand the “territory.”
I. FOUNDATION
WHAT IT MEANS TO BE A PROFESSIONAL 45
In some cases they will have to be very direc- first step but understanding how to interpret it
tive; in most they will be more like “compliance and apply it to a specific environment is what is
ambassadors.” Most people simply need to be really needed. Personnel knowledgeable about
reminded about what the rules are. Diplomacy this are in demand. Those who wish to move up
and tact are the most frequently used tools of into leadership roles will jump at every opportu-
professional protection officers. nity to learn about the interpretation and appli-
There are two major aspects to enforcement: cation of regulations, standards, and guidelines.
1. Procedural—the “what” of enforcement.
The officer must know what to enforce.
This includes all rules and procedures. The WHAT IT MEANS TO BE A
officer must know what the rules are and PROFESSIONAL
review them regularly. Job knowledge in this
area is a prerequisite to success. Note that A professional protection officer distin-
in many instances the confidence displayed guishes him- or herself by dedication and com-
by a knowledgeable officer goes a long way mitment. They are not simply performing a
toward convincing people to listen to them. job in order to receive compensation. They are
2. Interpersonal—the “how” of enforcement. instead dedicated to serving their employers,
This entails interpersonal skills and clients, and the community as a whole. Because
communications. Using the proper words, of their commitment, they stand out from oth-
articulating clearly, and speaking at the ers who may share their same job title and pay
proper volume and tone are crucial to grade. They have achieved professional status,
effective communication. The remainder a few aspects of which are discussed below:
of human communication—about two- ● Follows a code of ethics. The International
thirds—is nonverbal. Posture, appearance,
Foundation for Protection Officer’s code
and gestures come into play here.
of ethics is presented in this book. Each
Legal consultant—In this role the officer item in the Code contains a key aspect of
knows the relevant legal standard and applies professionalism.
it. The officer makes legal assessments. These ● Shares a common history with his
assessments relate to a variety of issues: privacy, colleagues. A glimpse of the professional
search and seizure, property rights, and compli- history shared with other protection officers
ance with administrative laws, and so on. is displayed in various chapters throughout
A related compliance concern is making sure this text. A common history creates a bond
that all organizational rules are being enforced. between officers.
These rules often originate from professional ● Supports and works with colleagues. A
standards or guidelines. They may also be in professional protection officer respects and
place due to insurance company requirements. works with others. Officers analyze various
Contemporary protection officers are fac- problems and help each other address
ing increased demands in this area. The role of them. Effecting and maintaining productive
“legal consultant” is becoming more important. relationships with colleagues is very
It is also becoming increasingly complex. important.
Astute security professionals will learn all ● Owns a common body of knowledge. The
that they can about laws, standards, and guide- different chapters of this book cover the
lines. They will keep abreast of them and be varied aspects that a contemporary protection
able to apply them: knowing a regulation is the officer must master in order to succeed in an
I. FOUNDATION
46 3. ROLE OF THE PROFESSIONAL PROTECTION OFFICER
I. FOUNDATION
WHAT IT MEANS TO BE A PROFESSIONAL 47
Of course, while fulfilling ever broader Cycle (Brown & Blackmon, 2001); the protection
duties, the protection officer must always process is no exception:
prioritize his attention to the most critical ● PLAN—Preventative Functions. The cycle
resources to be protected. These are (in order
begins by planning protective measures
of priority):
BEFORE they are performed.
● PEOPLE. Employees, agents, third-party
● DO—Mitigation Functions. All protective
workers, customers, visitors measures performed DURING daily
● INFORMATION. Physical and digital operations.
records, proprietary info, other information
● CHECK—Loss Event. Verification of
to maintain confidentiality, integrity, and protective systems takes place during loss
availability events, but the effectiveness of a system
● ASSETS. Those that the organization could also be verified by a protection officer
owns, manages, maintains, controls, or is during audits and inspections.
responsible for (facilities, goods, assets of
● ACT—Response Functions. AFTER an
monetary value) emergency arises, the officer must respond
● REPUTATION. Hard-earned public image; accordingly, bring all operations back to
everything that contributes to the desired normal, and provide the cycle with the
positioning of the organization necessary feedback.
● ENVIRONMENT. Surrounding the
organization, natural, community,
stakeholders’ interests, social responsibility
P PREVENTATIVE
FUNCTIONS
MITIGATION
FUNCTIONS
D
Core Functions
The protection officer must become a valu-
able member of the organization; his partici-
pation in systems, processes, and activities
must always add value. The value added by a
protection officer ’s performance is measured in A RESPONSE
FUNCTIONS
EMERGENCY
C
the level of improvement that his work brings
into the organization’s protective process and
objectives:
● Vigilance of better practices and recommend Simply stated, in any given organization,
state-of-the-art standards (in addition the core function of the protection officer is to
to the organization’s regulator-specific ensure the continuity of the protective cycle;
requirements) to prevent all possible hazards from becoming
● Improving policies, procedures, job-specific threats, to mitigate threats in order to decrease
instructions (not just following them) the probability and potential consequences of
● Always reporting adequately and keeping its occurrence, but also to respond adequately
adequate records and timely to all types of loss events in order
to regain control of the situation while prevent-
It is widely accepted that every process of an ing future occurrences (beginning of a new-
organization must fulfill a Plan-Do-Check-Act improved cycle).
I. FOUNDATION
48 3. ROLE OF THE PROFESSIONAL PROTECTION OFFICER
I. FOUNDATION
SUMMARY 49
how to act, and when to report. At the same contracts to sell all empty containers of
time, the supervisor organizes a talk to hazardous materials to a recycling plant that
employees given by the local police about could treat them accordingly—this funds
crime awareness and the effects of crime in the whole campaign. The company revises
the organization (MITIGATION). its liability insurance to include this newly
● The supervisor then initiates an internal discovered risk while negotiating a premium
investigation while reporting this risk to reduction based on the calculated associated
management. She recommends changes value of potential loss (RESPONSE).
in procedures (employees will have to
exit the premises through the front door),
equipment (garbage containment area needs
to be fenced in), and people (recommends Around the Globe
changing the patrol procedures to include Financial austerity and competition among
a more thorough check of the trash area) organizations show the importance of loss pre-
(RESPONSE). vention efforts to all sizes of organizations
around the globe. This has also pushed com-
mercial organizations to seek new markets and
ADVANCED PROTECTION resources in different areas of the world. Some
OFFICER organizations with high-risk appetites are ven-
turing into historically inhospitable environ-
ments. Protection officers at these firms are
● It has been reported to the Health, Safety, facing broader language and cultural challenges.
Security, and Environmental Quality Laws and regulations vary greatly in differ-
manager of a petrochemical facility that ent regions of the world. Nevertheless, huge
someone is stealing empty containers from efforts are taking place to standardize proce-
hazardous materials. He identifies this as dures, training, and risk management models
a health and environmental threat, since all over the world.
inhabitants of poor neighborhoods in the
surrounding area might be using them
to store water for washing and cooking
(PREVENTION). SUMMARY
● After assessing the risk, he sets up
an awareness campaign to train the A professional protection officer is dedicated
surrounding neighbors of the threat the to protecting people, information, physical
empty containers pose. The company gives assets, reputation and the environment sur-
away new containers to these people, rounding organizations. As a professional, the
while profiting from a positive Socially officer follows a code of ethics, shares a com-
Responsible Capital Campaign (goodwill mon history with his colleagues, and owns a
from the villagers) (MITIGATE). common body of knowledge.
● As part of the campaign, the firm arranges The titles and designations given to protec-
for doctors from the closest public hospital tion officers may be insufficient when we need
to measure levels of contamination among to express the tasks these dedicated men and
villagers and the nearby river. It also women perform.
I. FOUNDATION
50 3. ROLE OF THE PROFESSIONAL PROTECTION OFFICER
EMERGING TRENDS
Despite the fact that the basic role of all pro- the carrying of weapons. Contemporary protec-
tection officers remains the same, the duties tion officers are more likely to have some type of
performed by protection officers are becoming weaponry than in the past. This may not be fire-
increasingly specialized: health care protection, arms; it is usually pepper spray or some other
retail loss prevention, campus security, school secu- nonlethal weapon.
rity (elementary to secondary grades), shopping There are also heavily armed protection offi-
center security, high-rise building protection, bank- cers in areas of the world where civil strife and
ing security, and so on. These specialties, or verti- warfare prevail. Hence, there is a more military
cal markets, continue to evolve. Some of the major emphasis than ever before. This trend will con-
contract agencies have coursework tailored to par- tinue as energy exploration moves into danger-
ticular sectors: these providers know full well that ous areas and people’s demand for security
they must take every means possible of meeting (employees at these locations) increases.
their clients’ specific needs. The American Society There is also a greater need for effective liai-
for Industrial Security International also has a large son with police, fire, emergency medical, and
number of councils devoted to specialty areas. In military organizations. Regional disasters such as
addition, there are professional associations such massive snow storms, earthquakes, or hurricanes
as the International Association of Campus Law require close cooperation. So, too, does the pro-
Enforcement Administrators, the International vision of security at major public events: there
Foundation for Cultural Property Protection, and are 50 or more different organizations providing
the International Association of Healthcare Security security at the Super Bowl in the United States.
and Safety that cater to specific sectors. The issue of training continues to be a concern.
Convergence between physical and logical While on paper it may appear as though security
security is well advanced, and convergence with personnel are being trained, closer inspection
other risk management functions within the reveals that this is often not the case. Sometimes
organizations (health, environment, safety, and in contract security there is a major disconnect
quality) are quickly gaining momentum; this between the corporate policy on training and
and the increased use of technology have what actually happens in the field. Maggio (2009)
demanded a new breed of highly trained/highly cites a 2005 study in New York City in which it
educated protection officers (especially at the was found that most security personnel reported
supervisory and management levels). having less training than was required. Moreover,
Protection officers are moving into more of the training that was given failed to emphasize
a leadership/ambassadorial role. While many terrorism or working with police or firefighters.
are entry-level employees, they are also coordi- One possible solution to the training dilemma
nators. They design and develop programs in is state or provincial mandates. A state or prov-
safety and security. They are more like profes- ince may require security officers to have a
sionals in that they use discriminating judgment, certain amount of training and to be licensed.
determining their own course of action rather Unfortunately, it takes a long time to get legislation
than being told what to do by superiors. enacted. Once it is in place the training is generally
They continue to utilize additional technol- minimal. Also, the regulations rarely cover all pro-
ogy and this technological prowess is giving tection officers; most state/provincial laws only
them a more professional appearance. So, too, is cover contract security personnel.
I. FOUNDATION
REFERENCES 51
There are some positives to this, however. in selecting a security service provider. Should
In the United Kingdom, the Security Industry this occur, there may be both an increase in costs
Authority is improving regulations for door and a degradation of service.
supervisors and others. There are inspections University degrees and internationally recog-
being done to insure that protection officers in nized professional certifications, such as the ones
clubs are licensed. In California and Ontario, awarded by the International Foundation for
both contract and proprietary security personnel Protection Officers and ASIS International, are in
are regulated. As of this writing, the province of great demand among quality-conscious employ-
Alberta is also moving in that direction. ers all around the globe. This trend will continue
Outsourcing of police services to private con- as society places more emphasis on obtaining
tract firms continues. While public police may credentials.
espouse the principles of community policing, they While degrees and professional certifications
may not be able to practice it. The reality is that are key components of professionalism, so, too,
public police have budgetary concerns and lim- are guidelines and standards. Voluntary guide-
ited resources. There is a movement in some areas lines or compulsory standards developed by pro-
toward having private security personnel perform fessional associations are having a major impact
order maintenance and quality-of-life patrols. A on the practice of protection. At the present time,
security service firm may be better equipped to do standards and guidelines are being developed
this in large shopping centers, parks, or housing on an array of topics such as the Private Security
developments. The public police can then focus Officer Selection and Training Guideline by ASIS
more on investigations, drug enforcement, and the International. This guideline establishes mini-
response to felonious behavior. mum criteria for selecting and training security
This shift also triggers an evolution of the officers. It is of obvious use to employers and
protection officer from being a “private secu- contract agencies. It may also assist regulatory
rity” officer to becoming something of a public bodies in establishing state or provincial licens-
servant. Such a role may create confusion in the ing requirements. (http://www.asisonline.org/
mind of the officer. Only thorough education, guidelines/inprogress_published.htm. Retrieved
training, and highly structured socialization will October 13, 2009). In addition to employers,
prevent role confusion. contractors, and governmental agencies, insur-
Another driver of this trend is the growth of ance carriers can use standards and guidelines.
security service providers. Some of these compa- Policyholders may receive a premium reduction
nies are quite large and operate internationally. for meeting a guideline or standard.
Others are not as large or international but may Obviously, standards and guidelines will
have a major share of a local or regional mar- have a major impact on the practice of protection
ket. Either scenario may lead to monopolization. over time. And the professional protection officer
Once this happens, the client has limited choice is a key factor in compliance.
References
Resources
Brown, S., & Blackmon, K. (2001). Operations management: Training courses online can be obtained through AST
Policy, practice and performance improvement. Woburn, Corporation (http://www.astcorp.com). There are a wide
MA: Butterworth-Heinemann. variety of courses! Specialized topics can be studied to
Maggio, E. J. (2009). Private security in the 21st century: prepare for new assignments or jobs. These courses can
Concepts and applications. Sudbury, MA: Jones & Bartlett. be used to target individual career interests and earn
I. FOUNDATION
52 3. ROLE OF THE PROFESSIONAL PROTECTION OFFICER
I. FOUNDATION
SECURITY QUIZ 53
b. Always reporting adequately and keeping 10. One of the steps taken during response
adequate records functions performed by protection officers
c. Improving policies, procedures, is recovery. Which of the following is an
job-specific instructions example of it?
d. All of the above a. Assets not damaged during a fire are
9. All actions taken before active protection quickly moved into a secure location
measures are performed can be included b. A claim is filed with an insurance
in the preventative functions. Which of the company
following is not one of those actions? c. Video footage from a bank robbery is
a. Preventative investigations given to local police
b. Identification of hazards and risk factors d. All the above
c. Induction training
d. Separate physically or in time the
aggressor from the objective
I. FOUNDATION
C H A P T E R
4
The Protection Officer as a Leader
Franklin R. Timmons and
Scott A. Watson
55
56 4. THE PROTECTION OFFICER AS A LEADER
I. FOUNDATIONS
THREE CRITICAL LEADERSHIP SKILLS 57
the most reluctant to assume those roles (Hertig EXPECTATIONS OF LEADERS
et al., 2008; Johnson, 2005; Sennewald, 1985;
Watson, 2007). Now that we understand what it takes to be an
effective employee, let’s examine what additional
TEAM MEMBER SKILLS: THE expectations we have of leaders. Remember, as
FOUNDATION OF LEADERSHIP we previously stated, a leader is any individual
who influences the willing actions of others in sup-
If you make the decision that becoming a port of organizational goals and processes.
leader is a worthwhile goal, the hard work Additional traits that can characterize a leader
begins as a team member. As team members, we in any organization include:
all have certain understood and implied respon- 1. Encourages open communication.
sibilities. Much of what we do is grounded in the 2. Advocates teamwork, to eliminate error
roles and expectations set forth by the organiza- traps, and strengthen firewalls.
tion we serve, but other characteristics include 3. Seeks out and eliminates organizational
the values that we, as team members, possess. weaknesses that foster error traps.
You cannot be an effective leader until you have 4. Reinforces desired work behaviors.
first met the basic tenets of being an effective 5. Knows the importance of preventing error
team member. Some very important attributes of traps.
being an effective team member are: 6. Challenges atmospheres that support
complacency.
7. Works to clarify organizational and
1. Communicate effectively; in fact, over- individual employee issues.
communicate. 8. Champions “across the board” adherence to
2. Be aware of error traps in the workplace or the highest standards.
daily work processes. 9. Ensures all workers fully understand the
3. Ensure that firewalls or protection is in potential consequences of unsafe behavior.
place to address the error traps. 10. Minimizes unfamiliarity among members of
4. Be motivated to improve operations; always the team.
strive for excellence.
Leadership involves the ability to understand
5. Continuously identify ways to improve
the goals of the organization we serve. For the
human performance.
sake of our chapter, let’s refer to everyone out-
6. Advise management when problems exist
side our sphere of influence as our customer. Our
in performing work.
clients, our managers and supervisors, our peers
7. Have a questioning and supportive attitude
and our community, no matter who that may
as well as a willingness to be a proactive
be, are our customers. Once we understand the
problem solver.
goals and objectives of our customers, then we
8. Embrace and practice the STAR concept
can better serve their needs (Hertig et al., 2008;
(Stop, Think, Act, Review).
Johnson, 2005; Sennewald, 1985; Watson, 2007).
9. Strive for success but have a plan for failure.
Continually ask, “What if?”
10. Take the time required to do the job right THREE CRITICAL
the first time. LEADERSHIP SKILLS
(U.S. Department of Energy, 2009) The development of leadership skills is a
lifelong process, so a complete list and detailed
I. FOUNDATIONS
58 4. THE PROTECTION OFFICER AS A LEADER
explanation of all the skill sets required for cognizant, not only of what constitutes violations
effective leadership could fill several librar- of law and organizational policy but also what
ies. What follows is an overview of three broad appears to violate such laws and policies. Only by
categories of practice that all leaders should doing so can the protection officer avoid doing
study and strive to master. wrong, while engendering confidence in those
Practice 1: Ethics. This is the cornerstone of he or she serves (Department of the Army, 2006;
the protection field. The organizations we serve Hertig et al., 2008; Johnson, 2005; Sennewald,
entrust us to protect their most valuable assets. 1985; Watson, 2007).
As a professional protection officer, you are Practice 2: Mission Focus. Organizations
likely to have access to secure areas of the facility exist for a purpose. This purpose is the organi-
in which you work. You are also likely to have zation’s mission or reason for existence. The role
access to confidential information, knowledge of the security department is to provide profes-
of specific security vulnerabilities, and the trust sional protective services that allow the organi-
of individuals within the organization. As a zation to accomplish its mission. The role of the
result of this expanded access, knowledge, and protection officer is to ensure that the security
trust, we in the protection field are held to a department accomplishes its mission to serve
higher standard of behavior than the popula- the organization. Those who wish to be lead-
tion at large. ers in the protection field must be familiar with
the organization’s mission and how the security
department contributes to accomplishing it.
I. FOUNDATIONS
THREE CRITICAL LEADERSHIP SKILLS 59
Practice 3: Interpersonal Communication. communicating nonverbally. No matter how
Organizations consist of groups of people all you or another individual communicates
working together under a common structure for nonverbally, clarification is critical in
a common purpose. An ability to understand checking for understanding. A nonverbal
and relate to people is a key element in effec- message has meaning, just as a verbal
tive leadership because it enables the leader to one does. The content is more difficult to
influence others to accomplish organizational “read,” but it is just as important. Many
and departmental missions. actions are interpreted with specific feelings,
There are four basic communication skills whether or not those feelings were meant
needed of every leader: verbal, nonverbal, lis- to be conveyed by the sender. By asking for
tening, and writing (Figure 4-1). The optimal clarification, misunderstandings can be kept
way to communicate is face-to-face. This allows to a minimum.
both the sender and the receiver of informa- 3. Listening Skills: Listening is often-
tion to engage in real-time verbal and nonver- times the most overlooked aspect of
bal analysis. It also allows for clarification and communication. Although more than half of
immediate feedback. our communicating time is spent listening,
compared to other types of communication,
1. Verbal Communication: Verbal
we spend a small amount of time learning
communication is comprised of the spoken
how to listen effectively or actively. In
word. It is very important because it allows
order to improve your listening skills, listen
us to:
actively, devoting all of your concentration to
a. Express ourselves in words.
the task. In fact, to be a good leader, we must
b. Ask questions and clarify nonverbal
be a good listener. We must understand what
communication actions.
the expectations really are and we must align
c. Provide feedback to the listener.
our roles and responsibilities to meet those
2. Nonverbal Communication: Nonverbal
expectations. Comprehension is the primary
communication is just that; communicating
goal of listening. We need to understand the
with your body or emotions. Some experts
message being sent before we can process
say that we do the vast majority of our
the information, evaluate it, and provide a
response. NOTE: If at any time, during this
process, you get confusing information—ask
for clarification!
4. Writing Skills: Writing is another key
element in communication and a skill
developed over a lifetime. As a professional
Verbal Non-verbal protection officer you may find yourself
writing incident reports, daily logs, email
communications, proposals, training
programs, statements, security survey
Writing Listening
reports, and annual reports along with a host
of other correspondence. There are many
ways to enhance one’s writing capability
but the best teacher is direct experience and
professional feedback from peers, managers,
FIGURE 4-1 Four key areas of interpersonal communication. supervisors, and customers.
I. FOUNDATIONS
60 4. THE PROTECTION OFFICER AS A LEADER
Over time, writing tends to improve, so assessing your strengths, weaknesses, and
don’t be discouraged if this is a weak area motivations, as well as those of others
for you. around you.
4. Continually Assess the Situation: Life
The protection officer who strives to main-
moves quickly and situations can change
tain the highest standards of ethics, constantly
instantly. As a professional protection
remains aligned with departmental and organiza-
officer and a leader, you must prepare for
tional mission, develops solid interpersonal com-
whatever is coming next. This can only
munications skills, and will make steady progress
be accomplished by training yourself to
in developing leadership skills (U.S. Department
develop and maintain situational awareness.
of the Army, 2006; Elgin, 1980; Sennewald, 1985).
5. Remember What Is Truly Important: As
mentioned earlier, ethics is the cornerstone
of the protection field and an organization’s
TEN STEPS TO BECOMING AN mission is its reason for existence. Always
EFFECTIVE LEADER keep in mind that ethics is more important
than a specific job; your career is more
The following 10 steps or precepts are pro-
important than a specific position and the
vided as a guideline for the serious student of
mission is more important than pet projects or
leadership.
short-term gains. Remembering what is truly
1. Be the Leader You Would Want to Follow: important will help you keep perspective.
Remember our definition of leadership: any 6. Take Action: A leader must know when
individual who influences the willing actions to act and when to wait. Failure to act,
of others in support of organizational goals especially in the protection field, can be
and processes. Ask yourself, “What type of very costly.
leader would I be willing to follow?” Once 7. Position Yourself and Your Organization
you answer that question, strive to be that Well: A leader must position him- or
leader! herself to be ready to take advantage of
2. Accept That Conflict Is a Normal and opportunities when they arise. As you move
Healthy Part of Growth: Remember that forward in any situation always be aware of
conflict is inevitable in all areas of human potential opportunities and take the time to
endeavor. While some conflicts can have position yourself and your team so that you
negative effects, the absence of conflict can capitalize on them when they arise.
would mean that everything would always 8. Be Adaptable: It is easy to get hung up on
stay the same and improvement would ideas, but not all ideas are acceptable to the
never occur. When engaged in a conflict, ask organizations we serve, nor are all ideas
yourself, “What progress can be made by workable. Always be ready to adapt your
actively listening to another point of view?” plans to suit the needs of the organization.
3. Know Yourself and Know Others: A leader Doing so will allow you to overcome
has to be completely honest about his or obstacles quickly and be more effective in
her strengths and weaknesses as well as the long run.
the strengths and weaknesses of others. 9. Avoid Predictability: The protection field
Only by doing so can the leader make requires structure and accountability, but
significant progress toward accomplishing it also requires staying one step ahead of
both the departmental and organizational situations and those who would victimize
goals. Train yourself to be constantly the people or organizations we serve.
I. FOUNDATIONS
PITFALLS OF LEADERSHIP 61
10. Collect and Use Information: Information is and managers hired to protect the status quo.
the lifeblood of an organization and affects Change not only drives fear, it also drives the
the functioning of an effective protection fact that more effort is required to complete the
team. As a leader, it is important to collect change. This entire process means moving out-
and properly use information about the side the individuals’ comfort zone. Many peo-
organization, threats, vulnerabilities, and ple believe in the saying “don’t rock the boat.”
a host of other matters. By being mission- An important point to consider is that the boat
focused and honing the interpersonal skills is already rocking. The question is, do we steer
necessary to develop good relationships, the organization (boat) into the wave or do we
the professional protection officer will find allow the organization to be broadsided? A key
more sources of information and, in turn, be element to help any organization better deal
a more effective leader. with the effects of change is TRUST.
Trust can’t be purchased. It is a house that
These 10 steps or precepts, if worked on, will
must be built one brick at a time. It opens the
help the professional protection officer in devel-
door to the path for success. Trust is earned
oping solid leadership skills (Watson, 2007).
through the following simple steps:
● Honesty—Can an employee/customer
THE LEADER AS AN believe what you say?
AGENT OF CHANGE ● Integrity—Can an employee/customer
believe you will keep your promise?
As the last link between senior management ● Openness—Can employees/customers
and line employees or customers, it is the lead-
believe that you will share what you know?
er’s job to assist in the implementation of change.
To do this, certain obstacles must be overcome. (Hertig et al., 2008; Johnson, 2005)
There are several strategies for reducing resis-
tance to change. Much resistance to change
comes from lack of trust or people having to
PITFALLS OF LEADERSHIP
operate outside their comfort zone.
Resistance can sometimes be overcome or the
Oftentimes, people who see themselves as
impact lessened if the following are completed:
leaders think that others will follow them with-
1. Fully explain the upcoming changes. out question. Leaders must understand that
2. Make certain employees or customers fully leading is more about serving, negotiating,
understand the change. motivating, communicating, and actively listen-
3. When possible, discuss why the change is ing than the physical act of leading. Incorrectly
required. assessing a situation and trying to be overly
4. Identify and discuss the possible effects with persuasive or dominant can bring disaster to
employees or customers. a leader, especially one who has just assumed
5. Answer questions, or take the information that role.
and follow-up if you don’t know the answer. Some pitfalls that a leader should recognize
6. Build trust with your employees; they will and consider are as follows:
better accept the change.
1. Leading is more about achieving a shared
7. Be honest and be consistent.
goal, not managing or supervising people.
Change can potentially create fear in the orga- 2. A leader has to always display confidence,
nization and paranoia in the minds of executives trustworthiness, and truth. In other words,
I. FOUNDATIONS
62 4. THE PROTECTION OFFICER AS A LEADER
characteristics that make someone want to August 27, 2009, from http://www.hss.doe.gov/
follow them. nuclearsafety/ns/techstds/standard/hdbk1028/doe-
hdbk-1028-2009_volume2.pdf.
3. Many times, other employees/customers Watson, S. A. (2007). The art of war for security manag-
have the answers or at least some thoughts. ers; ten steps to enhance your organizational effectiveness.
Leaders need to be active listeners. Burlington, MA: Elsevier.
4. Make certain the elements of leadership are
aligned with corporate or customer goals
and desires. Resources
Bolton, R. B. (1979). People skills: How to assert yourself, lis-
(Hertig et al., 2008; Johnson, 2005; Sennewald, ten to others and resolve conflicts. New York, NY: Simon &
1985; Watson, 2007) Schuster.
Elgin, S. H. (1993). The gentle art of written verbal self defense:
How to write your way out of life’s delicate situations. Upper
Saddle River, NJ: Prentice Hall.
CONCLUSION Fujishin, R. (1993). Discovering the leader within; running small
groups successfully. San Francisco, CA: Acadia Books.
A leader is any individual who influences the Sawyer, R. D., & Tzu, S. (1994). The art of war. Boulder, CO:
willing actions of others in support of organizational Westview Press Inc.
goals and processes. While leadership roles can be
rewarding, they come at the high cost of con-
S E CURI TY QU I Z
sistent hard work and dedication, often with-
out a discernible return on investment. Those 1. Leaders and supervisors are not one and
who wish to assume leadership positions in the same. Our expectation is that every
the protection field must be prepared to put the supervisor is a leader but not every leader is
needs of the team above their own. They must necessarily a supervisor.
exercise the highest standards of ethics, remain a. True
mission-focused, and develop the solid interper- b. False
sonal skills necessary to motivate others (Hertig 2. The key for a supervisor to get anyone to do
et al., 2008; Johnson, 2005; Sennewald, 1985). anything is to:
a. Threaten them to do it
b. Get them to want to do it
References c. Bribe them to do it
d. None of the above
Elgin, S. H. (1980). The gentle art of verbal self defense. Upper
Saddle River, NJ: Prentice Hall. 3. Leadership is not about self-interest; it is
Hertig, C. A., McGough, M., & Smith, S. R. (2008). about being other-person-centered. Thus,
Leadership for protection professionals. In S. J. Davies & before embarking on a mission to become a
C. A. Hertig (Eds.), Security supervision and management leader, one should conduct a self-examination
(3rd ed.) (pp. 219–239). Burlington, MA: Elsevier.
in all the following ways, except to:
Johnson, B. R. (2005). Principles of security management.
Upper Saddle River, NJ: Prentice Hall. a. Assure that no one in the group will be
Sennewald, C. A. (1985). Effective security management (2nd able to pass you up and become your boss
ed.). Newton, MA: Butterworth-Heinemann. b. Make ethics more important than your
U.S. Department of the Army. (2006). FM 22 army lead- career
ership competent, confident, and agile. Retrieved
c. Have a deep desire to help others solve
August 27, 2009, from http://greerfoundation.org/
CouncilofPromisingLeaders.html. both work-related and personal problems
U.S. Department of Energy (2009). Human performance d. Find the potential in subordinates and
improvement handbook; Volume 2: Human performance tools push those subordinates to self-actualize
for individuals, work teams and management. Retrieved
I. FOUNDATIONS
SECURITY QUIZ 63
4. An effective team member will display the d. Reader-friendly written material, sending
following attributes: complete, clear, easily understood
a. Continuously identify ways to improve communications
human performance 8. The optimal way to communicate is written.
b. Advise upline management when a. True
problems exist in work performance b. False
c. Be motivated to improve operations and 9. Some experts say we conduct a vast amount
always strive for excellence of our communications nonverbally. No
d. All the above matter how we or others communicate
5. Traits that can characterize a leader in any nonverbally, we must always strive
organization include all the following, except: for clarification if we want to achieve
a. Advocate teamwork in the ranks understanding. Which of the following is
b. Encourage open communications true about nonverbal communications?
c. Support complacency in the ranks a. The content is more difficult to read than
d. None of the above verbal and written communications
6. There are numerous critical leadership skills. b. The message being sent is usually
A leader will display all of the following skill just as important as other forms of
sets, except: communication
a. High ethical beliefs and attitudes c. Asking for clarification will keep the
b. A high ability to communicate well while misunderstanding to a minimum
understanding and relating to all people d. All the above
c. Learning how the mission of the 10. Leaders are often called upon to institute
organization compares to the leader’s change in a department. Change is hard
career goals to accept by many subordinates because
d. Being aware of the organization’s mission of insecurities or lack of trust. Resistance
and being focused on accomplishing that can be overcome by all of the following
mission suggestions, except:
7. There are four communication skills needed a. When possible, discuss why the change is
for every leader. Which of the following is not required
one of them? b. Inform the employees that if they cannot
a. Never missing a chance to shut up accept the change you will help them find
(listening) work elsewhere
b. Top down as a priority communications c. Be honest and consistent
direction d. Answer questions, or take the information
c. Complete and concise face-to-face and follow-up if you don’t know the
communications answer
I. FOUNDATIONS
C H A P T E R
5
Career Planning for Protection
Professionals
Christopher A. Hertig and Chris Richardson
65
66 5. CAREER PLANNING FOR PROTECTION PROFESSIONALS
3. While it is usually easy to see why someone Persons with college degrees tend to obtain
has been successful in a career, it may not higher-paying jobs, yet this is not always easy
be evident why someone did not succeed. to see. The career ladder they follow is not sim-
“Nobody gives you a scorecard when it comes to ple. College graduates may not see the immedi-
a career.” ate benefit of having a degree. It may take them
several years and several jobs for the degree to
really help them advance. After all, there are rel-
EDUCATION atively few “requirements” but many “expecta-
tions,” meaning that while the degree may not
Education is the cornerstone of career place- be required, it is expected.
ment and advancement. There are rare excep- The jobless rate for college graduates is much
tions where advancement to the most senior lower than the rate for non-graduates. This
level has occurred without advanced degrees, holds true in both boom and bust economic
but for the most part, in today’s market, a climates. During good times and bad, degreed
degree is essential. There are over 100 colleges persons have significantly lower rates of unem-
and universities offering degrees or programs ployment. Earnings are also much greater for
in security management and over 1,600 that graduates. Graduating from high school creates
offer criminal justice degrees or programs. a wage jump of about 32%; some college experi-
Furthermore, many of these academic institu- ence without a degree increases wages approxi-
tions offer online programs, enabling access for mately 13%. Graduation from college increases
more “nontraditional” students. salaries around 77% (Leonard, 2009).
Additionally, education enables a broader
view of the industry and the various disciplines.
It helps people to see how their job functions, TRAINING
however exciting or mundane, contribute to a
larger mission. Education helps prepare stu- Training is a structured learning experience
dents to lead others and manage the mission. designed to enable one to perform a specific
Education is an essential career component. task. Employees who are trained can perform
Unfortunately, it is not always easy to deter- tasks more efficiently and more safely. Training
mine exactly where education helps one to aids employers by increasing the effectiveness
advance. Holding a degree or certificate may or of employees. Training also increases the com-
may not aid one in getting a job. Generally, the munication between employees and manage-
degree experience should help prepare one for ment. It helps to give the employees a better
the process of preparing a résumé, researching idea of management’s expectations.
employers, and being interviewed. Employers Training also reduces the fear and frustration
look favorably upon persons that have demon- employees face when confronted with problems
strated the commitment and personal organiza- on the job. Training prepares them for the job
tion necessary to obtain a degree. and thus they feel more confident. As a result,
But in many cases, having a degree does not training generally reduces employee turnover.
automatically open doors. There may be other Employees are more engaged when they have
qualifications that the employer seeks, such as received adequate training.
experience, licensing, or certification. A degreed Professional organizations such as the British
individual may become confused and discour- Security Industry Association, the International
aged when finding that their education does Foundation for Protection Officers, and the
not automatically get them a position. Electronic Security Association (formerly the
I. FOUNDATIONS
EXPERIENCE 67
National Burglar and Fire Alarm Association) be thought through beforehand. The costs and
support training efforts. The International benefits should be weighed. Finding out what
Association of Chiefs of Police (IACP) has been a employers think of the training is important.
staunch advocate of training. The IACP launched Lengthy, extensive training classes must be
various training initiatives such as the Training scrutinized before enrolling in them.
Keys: short instructional memos on specific There is a common mistake made by people
topics. These keys could be easily delivered to completing training at a police academy (which
classes of police officers by a supervisor. Finally, is several months in length and costs thou-
ASIS International launched a “Standard on sands of dollars) which is assuming they are
Security Officer Selection and Training” to ensure guaranteed employment. While this will help
that hiring standards were met and training one to get a police job, it does not guarantee it.
addresses all the areas that it needs to address. Additionally, state Police Officer Standards and
While professionals have supported training Training Commissions generally place a time
both within professional organizations and as limit on completing an academy and finding
individuals, there are many issues involved in employment. A police academy graduate may
providing training. have only 2 years to find a job or be decertified.
Training is expensive for employers to provide. The students must know themselves and the
Aside from the instructional costs, the employer employment market before going into debt.
is paying employees for their time yet not directly Another pitfall, which some young people fall
benefiting from it, as the employees are being victim to, is taking the wrong courses. Some peo-
paid for non-productive time while they are ple take all manner of martial arts and firearms
learning. This situation has helped to propel the training. While this is desirable in moderation,
growth in distance learning. Distance learning job seekers should beware of potential employ-
helps one avoid many of the costs associated with ers branding them as “Martial Arts Masters of
training as well as with scheduling problems. Mayhem” or “gun nuts.” In some employment
Distance learning also helps individuals to learn settings this is the “kiss of death” for job appli-
on their own; some contract security firms and cants. Martial skills should be bundled with
police departments have embraced this concept. other competencies such as first aid, firefighting,
These organizations provide motivated employ- customer service, writing, research, and so on.
ees with the option of professional growth. One solution to obtaining training is through
Anyone serious about pursuing a career volunteer work. Volunteer fire companies and
should seek out training on their own. Doing ambulance services provide training to their
so helps them to learn important skills. It also members. There are also occasions when agen-
makes them more attractive to employers. cies that offer services to crime victims or disaster
Trained individuals may save an employer relief will train volunteers. While the Red Cross
money on training costs. In some areas it is is well known, there may also be local organiza-
becoming increasingly common for people to tions that will offer training to volunteers.
send themselves through a police academy so
that they are more certain of landing a police
job. A person who has completed training on
their own also stands out as someone who is EXPERIENCE
motivated and employers generally wish to hire
only the most motivated of personnel. Experience in a particular field or in a posi-
As completing training costs time and tion is one of the most cited criteria or qualifi-
money, taking an instructional program should cations for employers. A quick search through
I. FOUNDATIONS
68 5. CAREER PLANNING FOR PROTECTION PROFESSIONALS
online job boards or job openings will reveal volunteer experience, something to put on their
that the majority of the positions requires a résumé, and references for future jobs.
“minimum” number of years of experience. If
experience is not required for a particular posi-
tion, there are often other qualifying criteria LICENSING/CERTIFICATION
such as education, certification, or skills listed
as a prerequisite. With some positions a license is required.
Internships are an excellent way for a student This may be at the state, provincial, or county
to gain experience in the security and/or crimi- level. In some cases, there are also cities that
nal justice industry. Employers are much more license security and police personnel.
inclined to hire an intern with no or limited expe- Research into career options must include
rience than a permanent employee with no or licensing requirements. There are almost always
limited experience. The significant differences are licenses required for armed security personnel. It
the internship has defined employment dates, is also common to license those who offer inves-
the intern is more closely supervised, and intern- tigative services on a contractual basis (private
ships are often unpaid. investigation). Some jurisdictions license alarm
Two new Web sites have been recently launched installers, security consultants, personal protec-
to connect employers and students with intern- tion specialists, door supervisors in clubs, and
ships. The Web site www.securityinternships.com locksmiths.
provides a listing of security internships listed by Certification is another valuable addition
employers with both a proprietary and contract to the résumé and skill set of security profes-
security staff. The Web site www.criminaljusticein- sionals. Almost every security discipline and
ternships.com provides a listing of criminal justice security society or organization has their own
internships with local, state, and federal agencies. certification and it is worthwhile to seek out
Both Web sites offer more than just a listing of and obtain the relevant certifications.
internships. They offer résumé templates, schol- There are more recognized certifications than
arship information, career news articles, and a others, but as with educational institutions, it is
listing of other valuable Web sites. important to vet the certifying body to ensure
There are times when career planning the validity of the certification.
involves a transition into another field or dis- To be a well-rounded professional, certifica-
cipline. For example, a security director may tions in areas other than security contribute to
want to transition into audit or compliance. success. For instance, a certification in public
While these two fields are loosely related, the speaking, finance, accounting, or computers
transition may be smoother if it occurs within can provide additional opportunities and salary
the same organization. It is more difficult to increases.
transition into another field or discipline at
another company or organization.
Volunteering is another approach to filling NETWORKING
the experience void in one’s résumé. Volunteer
work can sometimes be performed for non- Networking with security industry experts
profit organizations such as churches or civic can excel the progression of security profession-
organizations. It can also be offered by different als. Networking can begin at any career stage and
departments in one’s employing organization; is advantageous to both young and experienced
an employee may volunteer to perform work security managers and executives. Networking
outside of their department. This gives them can occur during industry conferences, through
I. FOUNDATIONS
CAREER ADVANCEMENT 69
social mediums such as LinkedIn, and through Search and Knock ’em Dead Resumes, both writ-
professional associations. It also occurs through ten by Martin Yate.
job experience, various job assignments, and The objective of the job search and résumé
meeting people through employment. is to provide an opportunity for an interview.
All too often, networking is considered a Arguably the most important process in land-
tool to find employment. Although it is advan- ing a position, the interview is where the final
tageous to network with industry peers and decision to hire the most qualified and best can-
colleagues to search for a security position, didate occurs. Nothing should be overlooked
networking has many other benefits beyond during this process.
finding the next job. It allows one to reach out Preparation for the interview should be thor-
to others for assistance with solving a complex ough and well thought out. It is important to
problem or to benchmark a process or proce- research the employer to ensure the applicant
dure. Networking also enables one to stay up- knows the history of the company and is up-
to-date on industry news and trends. In this to-date on any recent news such as mergers,
respect, networking aids in finding jobs. It also expansion, stock price, awards, and so on. In
helps in succeeding at those jobs. addition to researching the company, the appli-
cant should drive to the interview location the
day before to ensure that directions are accurate
JOB SEARCH and to notate the amount of travel time.
Social networking sites are being used more
Online job searching has surged in the past frequently by employers to screen applicants. It
decade. The Internet allows for an unprece- is imperative for an applicant to scour through
dented number of jobs to be listed by employers any social networking site they are members of
and searched by applicants. There are large com- to ensure any pictures or videos that could be
panies such as monster.com and careerbuilder deemed inappropriate are removed prior to the
.com that list job openings for every career and application process.
discipline available. There are also niche job sites
that focus on specific industries.
Before a job search can be started, a résumé CAREER ADVANCEMENT
must be constructed. A résumé is often the
first exposure an employer has to an applicant. Career progression goes beyond education
Furthermore, the employer or recruiter spends and experience. Security professionals have
less than 30 seconds reviewing a résumé. This attributed their successful climb up the pro-
signifies the importance of an impressive résumé verbial “ladder” to credibility, leadership, and
in getting an interview for a position. interpersonal skills. These qualities and skills
There are two formats for résumés: func- develop over time and require an investment
tional and chronological. A chronological résumé of time and energy devoted to a career path.
focuses on the time format of experience. It There are four approaches to reaching career
typically lists employment and other activities objectives: become a resident expert on a secu-
according to dates, with the most recent listed rity topic, develop a personal brand, culti-
first. A functional résumé doesn’t focus on dates; vate a mentorship, and establish a network of
rather, it focuses on a narrative style of skill sets colleagues.
and experience. Excel at one’s current job tasks. While the
A widely recognized resource for job search- knowledge, skills, and abilities required for
ing and résumé writing is Knock ’em Dead Job a supervisory position differ from those of a
I. FOUNDATIONS
70 5. CAREER PLANNING FOR PROTECTION PROFESSIONALS
subordinate, people who don’t “shine” will not Find a mentor. Mentors are important. They
be promoted. provide guidance and insight. They enable the
Being visible is important. Joining commit- person being mentored to grow on their own
tees and taking on additional projects is one into new levels of competency. They aid the pro-
way to do this. Mach (2009) states that it is tégé in gaining additional areas of competence.
advantageous to work across your organization. Sponsors are another means of helping one
Richardson (2009) states that there are four advance in their career. A sponsor is someone
strategies that can help security professionals who brings along a subordinate when they
advance on the job: becoming an expert in some themselves obtain a promotion. Sponsors may be
area; developing a personal brand; finding a chosen to head up a different division of an orga-
mentor; and networking. nization. Care must be taken in choosing a spon-
Become an expert in an area that is needed. sor. Sometimes sponsors fall out of favor within
A retail loss-prevention officer who masters an organization. A sponsor who is on the wrong
interviewing, a casino security professional side of politics is not a good sponsor to have. In a
who can design camera systems, or a protection similar vein, a sponsor who is not very ethical is
officer at a high security facility who becomes a a liability. Ethics is crucial in this regard.
software expert are all in demand. Becoming a In some cases, promotion within one’s
reliable source of information or expertise gets employment organization is simply not hap-
one noticed. It opens up opportunities to work pening. This may be due to a small number of
on special projects and meet new people. positions being available. It may also be the
Develop a brand. A brand is a unique style. case that the persons holding those positions
One person may project himself as an innovator. are not leaving them. In these situations, one
Another may be a researcher. Still another may either has to be satisfied staying where they are
excel at social relationships and politicking. or seek employment in another organization.
EMERGING TRENDS
Enrollment in colleges and universities is In addition, academia has noticed this trend and
at an all-time high. Employers are streamlin- consequently there are a growing number of col-
ing processes and asking employees to do more leges and universities that offer a degree or pro-
with less. When employers hire, they have gram in Crisis or Emergency Management.
the ability to be more selective and seek out the Job searching and applying for jobs are
most qualified candidate. A reduced workforce increasingly becoming online activities. It must
and an influx of applications for open positions be noted, however, that there is a major role
increase the competitiveness of the candidates. for interpersonal, face-to-face interaction. The
Experience and education are two of the most practices of investigation, asset protection, and
important areas that set candidates apart. so on, are interpersonal endeavors. They can-
Emergency management is closely related to not be completely performed electronically.
security and homeland security. Emergency or Additionally, the job search and acquisition pro-
crisis management has been a career field that cesses require in-person abilities. One will be
has rapidly expanded over the past several years. limited without a personal network. In addition,
There are many career opportunities available with job candidates who don’t do well in interviews
government, private, and nonprofit organizations. will not be hired.
I. FOUNDATIONS
SECURITY QUIZ 71
I. FOUNDATIONS
72 5. CAREER PLANNING FOR PROTECTION PROFESSIONALS
d. A job allows the student to earn money 8. Why do employers search social networking
while in school sites for applicant information?
5. On average, how many certifications should a. They want to find other candidates for
one obtain? other open positions
a. 8 b. Searching these sites provides a quick
b. 4 and efficient way to learn more about
c. 9 the candidate
d. None of the above c. To find a specific person’s résumé
6. What is the difference between a functional d. Employers do not search social
and a chronological résumé? networking sites on job applicants
a. A functional résumé lists the functions that 9. There are four strategies for developing a
you performed at a job career; choose the one that is not a strategy.
b. A functional résumé is a summary of a. Develop a personal brand
experience, whereas a chronological résumé b. Network
lists jobs or positions by dates of employment c. Find a mentor
c. There is no difference d. List one’s résumé on an online job board
d. A chronological résumé only lists 10. What is one of the fastest growing fields
education and certification related to security?
7. When interviewing for a job, what preparation a. Law enforcement
is necessary (choose the best answer)? b. Homeland security
a. Drive the route to the interview location c. Private detectives
the day before d. Contract security
b. Research the organization
c. Be prepared to answer standard interview
questions
d. All of the above
I. FOUNDATIONS
U N I T II
COMMUNICATIONS
6 Effective Communications
7 Security Awareness
8 Central Alarm Stations and Dispatch Operations
C H A P T E R
6
Effective Communications
Charles T. Thibodeau
75
76 6. EFFECTIVE COMMUNICATIONS
To comply with this mandate, businesses but if these six factors are present, communica-
must conduct perpetual risk analysis, vulner- tions will be extremely effective.
ability assessments, integrated countermea-
sure designs, security officer training, employee
security awareness training, and contingency
planning. However, without “effective” commu- CONSIDER THE AUDIENCE
nications, none of these practices and procedures
could exist. Thus, effective communications are Everyone communicates at different lev-
a key element in assisting businesses in meeting els. If you are communicating with someone
their mandate to provide proof of compliance who is many levels below your communica-
with required levels of due diligence. tion level, the message you are sending stands
a good chance of being misunderstood. In
addition, assuming that everyone speaks and
CHANNELS OF understands on your level is almost a guaran-
COMMUNICATIONS tee that you will be an ineffective communica-
tor. The midpoint between talking above your
There are four channels of communications audience and talking below your audience is
in any organization or company: top-down, currently the seventh-grade level. If you want
bottom-up, horizontal, and the grapevine. The perfect clarity in your communications, then
first three are essential for information to flow speak slowly, carefully choosing your words,
in every direction. These are the formal and using no more than five- or six-letter words,
official forms of communications. The fourth and choosing words that are commonly known.
form of communications found in most orga- In many cases, when asked to repeat a message,
nizations is the grapevine, which consists of an the receiving person uses different words. Thus,
outgrowth of informal and casual groupings of each time you are requested to repeat a mes-
employees. Effective communications in any sage, say it in different words.
security department requires all four of these The security officer’s communications must
forms. They provide maximum performance also accommodate the language difficulties
both during stable and predictable periods and of an ever-growing ESL (English as a Second
during times of stress. Language) population. Spanish and French
are common, second to English, and there
is an ever-growing Asian population whose
THE SIX ESSENTIALS OF languages include Korean, Laotian, Hmong,
EFFECTIVE COMMUNICATIONS Mandarin, and Vietnamese. The security officer
of the future may indeed need to be bilingual.
Effective communications must be: Another consideration is medically afflicted
people with communication impediments,
● Timely
although there may be nothing you can do to
● Complete
breach their communication difficulties. When
● Clear
dealing with the deaf, blind, or people afflicted
● Concise
with multiple sclerosis (MS), patience is your
● Factual
greatest asset, and a strong commitment to help
● Accurate
these people will get you through it. Just be
This is a bare bones list of requirements. Cer- persistent until you can find the way each one
tainly, the complete list includes other attributes, communicates.
II. COMMUNICATIONS
PROPER USE OF COMMUNICATIONS DEVICES 77
II. COMMUNICATIONS
78 6. EFFECTIVE COMMUNICATIONS
ringing sound from all the other phones in the directly to the mainframe of the local telephone
room. This phone will have no dial-out capabil- office and it will operate on its own power.
ity; in fact, the face of the phone will have no Therefore, this direct tie to the outside world
dialing keyboard. will be somewhat protected from numerous
The reason for having a separate red phone threats. The conduit-encased phone line would
for emergencies is that the security operator or almost assure an outside line during any power
dispatcher will at some point need to communi- outage or computer failure that could cripple the
cate over the regular phone lines to call for fire, facility’s PBX or electronic telephone system.
police, or emergency medical assistance and for In some facilities a fourth, black phone is
other assistance. If the emergency phone is tied physically identical to the red phone; it can-
into the 10-button phone, the emergency event not be dialed. This phone is dedicated to panic
caller at the scene of the emergency must be put alarm annunciation. If there is a threat on exec-
on hold while public assistance is being called. utive row, or a robbery in the credit union, cer-
Never hang up on the emergency event caller or tain designated employees are trained to use
put the emergency event caller on hold during the black phone for “duress code” messages.
an actual emergency. The caller under the stress The cell phone is the newest addition to the
of an emergency may hang up whenever they phone systems available for security officers. In
cannot hear the sound of your voice or noise in many locations, security departments are invest-
the control center. ing in cell phones that double as two-way radios.
In addition, each security station in the facil- At this point, for most security departments, these
ity should be equipped with a red phone as telephone-radio combination units are too costly.
well as a regular phone. When an emergency In other locations, cell phones are used as back-
call comes in, each red phone should be picked up units to the two-way radios for communica-
up with the remote stations just listening in to tions where two-way radio signals are blocked by
the conversation between the dispatcher and dead spots. Cell phones play an important part
emergency event caller. during patrol duties to allow emergency calls to
Then, before hanging up, each station will be made from the scene, back to the control cen-
confirm that they have received the message ter when the two-way radio is ineffective. The cell
heard over the red phone. The emergency tele- phone can also be used for calls directly to the 911
phone system is not a place to skimp on cost emergency response centers.
or design when so much depends on effective
communications during emergencies. In fact,
just in case you lose your connection with the
Two-Way Radios
emergency event caller, it is best to jot down The two-way radio is the primary mobile
that person’s name and phone number immedi- communications device that almost all security
ately at the outset of the call. officers use to communicate with the control
A third phone, a yellow phone, would be a center and between other officers, supervisors,
single analog line separate and apart from the and management. There are some problems
facility PBX or electronic telephone system. This with most two-way radio systems and that
phone will have a hardwired four-lead tele- trouble includes, but is not limited to, failure
phone cable inside of a conduit from the wall to operate in dead spots, being susceptible to
jack in the room where the phone is located to operator error, and having short battery life. In
the street-level mainframe. The conduit will addition, an adequate two-way radio system
lessen the threat of the line being cut or burned is expensive; the units are bulky and take up
through during an emergency. This line will tie space on a crowded utility belt. Some of these
II. COMMUNICATIONS
PROPER USE OF COMMUNICATIONS DEVICES 79
radios break down regularly and are costly to to allow for processing. If this is not done, your
maintain. However, all of these shortcomings message will be clipped at both ends. When
aside, we could not do the security job as well holding the transceiver up to talk, hold it to the
as we do without effective communications side of your mouth and speak across the micro-
devices like the two-way radios. phone. Do not speak directly into the micro-
Two-way radios are miniature radio stations phone or you may speak too loudly and cause
and as such, something called “ground-wave distortion of the transmitted message.
propagation” makes the difference between The frequency of the radio also has an impact
effective communications and either broken on effective communications. Most radios used
communications with static or no communica- by security are FM transceivers. They are either
tions at all. Ground-wave propagations are the VHF or UHF. Two-way radios that are called
scientific explanation that explains how a radio VHF transceivers work on what is known as
signal travels from the source antenna to the very high frequency. The UHF radios operate
receiving antenna. It also explains that if any- on ultrahigh frequency. The difference between
where along that path, there is an object that these two transmission levels is the lower the
is so well grounded, like an I-beam or other frequency, the longer the wavelength. That
metal object, the signal may be short-circuited means the VHF signal will travel a long way, but
and driven into the ground before the message a VHF signal is a relatively weak signal and does
reaches the receiver’s antenna. Because the trans- not work as well in tall buildings with lots of
mission antenna sends out many pear-shaped steel. By contrast, the UHF transceiver is a stron-
signals, not just one, to overcome this signal ger signal but has a much shorter wavelength.
interference problem, the officer needs only to That means that it packs a wallop and works
walk a few feet from where the transmission is well in tall buildings with lots of steel, but it
garbled and the signal may be reestablished. cannot travel too far. A UHF system with numer-
The two-way radio is most effective with the ous repeaters in line is possibly the most effec-
antenna 90 degrees perpendicular to the ground. tive two-way radio communications system.
The antenna should be pointing straight up
in the air during use. By tipping the antenna
Pagers
sideways or horizontal to the ground, the unit
becomes directional and the strongest transmis- The pager takes a telephone call to respond
sion will be along the line where the antenna is to unless it is a voice pager or a text pager that
pointing. If a two-way radio antenna is pointing displays messages. Pagers are nice because
away from the receiving antenna, then the radio they are small and work just about every-
is being used in a very ineffective manner. where. However, they do not allow the mes-
In many systems, signal strength gets a boost sage receiver to respond with a message and
by use of a repeater. A repeater is a great help but they do not allow for verification that the signal
the process by which it works makes it somewhat was received and understood. Pagers should be
user-unfriendly. The repeater receives the signal, used for back-up only. Two-way radios and cell
turns it around, and sends it back out as a more phones are the best communications devices for
powerful signal. That process takes time; thus, portable operations.
the two-way radio communicator must hold the
transmission switch down for two seconds before
talking in order to engage the repeater and then
Intercoms
the communicator must hold the switch down In a retail setting or a hospital setting emer-
for two seconds after the message is finished gency, codes are sent over the intercom. We all
II. COMMUNICATIONS
80 6. EFFECTIVE COMMUNICATIONS
know that “code blue” means cardiovascular signal exceeds maximum input peak-to-peak fre-
problems complicated by respiratory failure. quency. You do not have to speak loudly when
We know that “code red” means fire. In some announcing over an intercom, as they have
retail companies a call over the intercom such as built-in amplifiers to adjust the sound level.
“Mr. Jones, please come to the front of the store”
means that security is needed at the front of the
store. The intercom is useful when it is working, SUMMARY
but traditionally the intercom system is a weak
link in the communications systems of any facil- Effective communications do not exist when
ity. There are problems with volume and static, the speaker and the receiver are not “on the
and they seem to have more than their fair share same page.” That is the bottom line in many con-
of maintenance needs. If the intended receiver tract dispute cases where the seller and the buyer
of the message is out of the area where there are failed to reach a “mutual assent to the same
no speakers, the message will not be received. proposition.” This means that the buyer expected
In addition, there usually are no procedures to to receive something that the seller was not sell-
inform the communicator that the message was ing; thus the contract could be declared null and
received and understood. Despite the prob- void all because the buyer and seller were expe-
lems, however, intercoms are still needed. Extra riencing a lack of effective communications.
speakers should be placed in remote and hard- One of the situations that led to the death of
to-hear-in areas all over the facility to assure hundreds of firefighters in New York City dur-
emergency messages reach everyone. If you ing the 9/11 terrorist attacks in 2001 was the
work in a facility equipped with intercoms for fact that their two-way radio system failed.
communications and you even think that a mes- Poor communications turned deadly in that sit-
sage might have been transmitted over an inter- uation. We have to be continuously vigilant of
com, call dispatch and check out your suspicion. effective communications in our security work.
The mistake that a communicator can make Failure to communicate effectively, including
using the intercom is to speak too loudly into the failure to communicate at all, can very quickly
speaker. Many systems will distort if the input turn into serious injury or death.
EMERGING TRENDS
As states across this country continue to pass effective communications in the workplace. These
laws for mandatory security officer training, effec- supervisors should not hesitate to have a security
tive communications will be an important part of officer rewrite his or her report when that report
that training. A training curriculum authorized by fails the effective communications test. In addition,
a state licensing board will likely contain report poor report writing should be rewarded with man-
writing as a mandatory component. It will be a datory writing class refreshers taken repeatedly
supervisor’s prerogative to assure that the officers until effective communications improvement is
in his or her command are following the report observed. It is very possible that this turn around
writing training they receive. Therefore, it will trend in effective communications will emerge
take the state licensing board and the security offi- over the next decade as security departments
cer trainers and supervisors, both in contract and work toward ensuring that effective communica-
proprietary security, to enforce acceptable levels of tions exists throughout the security industry.
II. COMMUNICATIONS
SECURITY QUIZ 81
II. COMMUNICATIONS
C H A P T E R
7
Security Awareness
James E. Sellers
83
84 7. SECURITY AWARENESS
on security throughout the organization and to organization down, but should also flow
keep security in the forefront of every employee’s back up to the top. It is in this way that
mind during the day. It involves a sense of duty outdated procedures are discovered and
by those who could be affected to be aware of corrected.
security practices as they relate to daily activi- 2. Modern security techniques now involve
ties of the organization. Although the plan can more collaboration with external associates
be extensive, it does not require every employee such as customers, venders, contractors,
to know every aspect; many times it will apply insurance providers, security consultants,
to specialized or departmental duties. public safety officials, law enforcement, the
Security awareness provides a framework of fire department, government emergency
established policies and procedures that partici- management operators, and others. By
pants employ by reporting unsafe conditions, collaborating with associates a synergy is
suspicious activity, and noticing general safety developed that acts as a force multiplier.
breaches, merely as second nature. Value is added to the security plan by using
Team members are trained and polled regu- proven ideas from experienced external
larly to heighten their awareness about chang- contributors.
ing trends in practices and rapidly advancing
Security departments should liaise with local,
technology. In the past, the main concern has
state, and federal law enforcement officials.
been on physical site security issues; focusing
These officials can speak with management to
mostly on gates, doors, windows, and locks.
reinforce security and safety practices that the
Today, along with physical awareness, security
security department recommends including in
initiatives must include internal matters, like
company policies and procedures. The secu-
avoiding workplace violence, enhancing per-
rity manager should solicit the officials to offer
sonal safety, and being up-to-date on the latest
advice and feedback from their observations.
information technology, including safe Internet
The internal and external partners described
practices. Greater emphasis must now be placed
above become stakeholders through common
on these issues, more so than in the past.
interests and shared goals that help the organi-
zation succeed. Stakeholders may be directly or
indirectly related to an organization and may
EXPANDING THE TEAM offer input that reflects commitment to ongo-
THROUGH PARTNERSHIPS ing functions. As stakeholders, managers and
employees all benefit through financial or per-
To be effective, the security department sonal investment, employment, and so on. All
should instill “security awareness” among share the belief that it is in their best interest
members from all layers of the organization as to protect and promote the organization as if it
well as external partners. were their very own. See Figure 7-1.
1. Employees should be made to feel part of the
awareness team and should be solicited for
their ideas to improve security. Encourage TECHNIQUES FOR REINFORCING
employees to report security problems POLICY AND PROCEDURES TO
and correct safety potential issues when INCREASE SECURITY AWARENESS
observed. Use a double loop communication
model, which means that information To greatly increase security awareness, mem-
should not only flow from the top of the bers from all layers of the organization and
II. COMMUNICATIONS
DOUBLE LOOP LEARNING 85
Management
Security
All employees
department
External
partners
FIGURE 7-1 Security awareness with partner approach (stakeholder). Figure courtesy of J. E. Sellers, 2009.
external partners should be instilled with a ● Security awareness meetings should be held
sense of partnership through interactive activi- with all departments at least every quarter.
ties that include orientation sessions, training,
Technology such as Internet e-mail, Webcast
security updates via newsletters, e-mails, and
training, and electronic newsletters, now enable
informative signage.
security departments to easily and inexpensively
● All employees should be apprised of the communicate and distribute valuable security
organization’s policies and procedures and safety information throughout the organi-
upon entering the organization. Employee zation. The correspondence should focus on the
orientation should be documented and positive outcomes that can be achieved if the
signed to indicate the rules are understood. organization’s security procedures are followed.
● Organizational policies and procedures should See Figure 7-2.
be clear, concise, and written correctly. They
should also be reviewed and updated annually,
at a minimum. Print and electronic copies DOUBLE LOOP LEARNING
should be readily available to all employees.
● Repetition of the security awareness message Management should consider the Double
will lead to increased involvement. Loop Learning theory of Argyris and Schon
● Repetition can be accomplished by such (1978). In this theory the organization becomes a
methods as daily exposure through the use “learning organization” by detecting and correct-
of posters, weekly exposure via e-mails, ing errors through questioning and modification
and monthly or quarterly exposure through of existing norms, procedures, polices, and objec-
newsletters and handouts. tives. According to Fiol and Lyles (1985), learning
II. COMMUNICATIONS
86 7. SECURITY AWARENESS
Security Information
Suggestions Security Policy and
from Employees Procedure
to Management from Management
(ideas are considered to Security
to correct errors and Department
improve security)
Security Information
from
Security Management
to All Employees
FIGURE 7-3 Developing security awareness. Double loop learning security awareness communication model (J. E. Sellers, 2009).
Adapted from Argyris and Schon (1978).
II. COMMUNICATIONS
RESOURCES 87
in discussions on security policies, procedures, organization. This technique uses examples in
and other security programs. The groups con- which security awareness leads to a successful
sist of mostly “end users” who operate under outcome, resulting in an increase in safety or a
the policies. It is this group that often can offer reduction in crime. The “lessons learned” exam-
practical solutions for seemingly complicated ples show how security awareness fits into the
“problems.” Focus groups have brief scheduled organization’s culture or even contributes to creat-
meetings that have minimum interference with ing a security culture where one was nonexistent.
the company’s scheduled core activities. The “lessons learned” examples help employ-
Surveys: Short surveys on security aware- ees and partners understand why strong secu-
ness should be included in e-mails, newsletters, rity is important to them personally as well as
and Webcasts. The surveys can be evaluated to to the success of the organization.
identify what areas of the security awareness
program should be adjusted to keep it on track.
Information from the focus groups and sur- RESOURCES
veys should be available within the organiza-
tion to lend credence to the double loop security Security department managers should reach
awareness communication process and improve out to available resources provided by professional
the management/employee partnership. groups when setting policies and procedures. There
are a number of industry-specific organizations
that provide support by sharing information with
LESSONS LEARNED their members. There also are security organiza-
tions such as IFPO and ASIS that have established
The technique for obtaining greater involve- guidelines on security topics. These organizations
ment in security awareness should include a have Websites that offer security information and
collection of lessons learned from inside the provide links to other valuable sources.
EMERGING TRENDS
Ever-improving and changing technology pro- could result. These security breaches may include
vides business opportunities, yet at the same time computer viruses that can be introduced via the
creates security dilemmas for security managers. Internet. These viruses can attack the organiza-
Subjects, such as information technology (IT), tion’s computer system and result in lost pro-
now occupy much of the security department’s ductivity and expensive corrective action. It is
resources. Technology in the form of cellular imperative that all stakeholders know how they
phones, computers, digital cameras, copiers, and can be affected and be made aware of the dangers
facsimile machines, while increasing the speed of misusing information technology. They must
of conducting business, can also be a method be vigilant, use safe Internet practices, and report
for compromising valuable organizational or any suspicious computer activity. The security
personal information through theft or misuse. director should always seek better ways to pro-
Without safeguards, including rules regarding the vide employees with the knowledge necessary
use of electronic devices, severe security breaches for secure information technology use.
II. COMMUNICATIONS
88 7. SECURITY AWARENESS
II. COMMUNICATIONS
C H A P T E R
8
Central Alarm Stations and
Dispatch Operations
Sean Smith, Jim Ellis, and Rich Abrams
INTRODUCTION
CHAPTER OBJECTIVES
● Explain the history of central alarm In the modern world of safety and security,
stations and dispatch centers and how the necessity of a fully functional central alarm
they evolved into the technologically station and dispatch center must not be under-
advanced operations of today estimated. According to Abrams (2003), “The
control room is the nerve center of any safety
● Provide an overview of the various types
and security department.” Such an operation is
of alarm and control systems that may
capable of detecting nearly any emergency that
be monitored by a central station, as well
could occur, 24 hours a day, 7 days a week. Such
as computerized visitor management
situations may include fire, burglary, major facil-
systems
ity equipment failure, or certain natural disas-
● Introduce the numerous types of sensors ters. Equally as important is the responsibility of
incorporated into alarm and control a dispatcher to coordinate communications with
systems that transmit messages back to protection officers in the field, as well as assist
the central station agencies and the general public. Alarm systems
● Provide an overview of the transmission are powerful tools in the prevention of crime
media by which messages are and disaster, but the observations of the field
transmitted from alarm and control officer and the report from the customer on the
sensors to their systems’ central telephone are also vital. Dispatchers are trained
processors to obtain and record all the information neces-
● Introduce the reader to the sary to send an appropriate response to any sit-
communications equipment utilized by uation, ranging from a customer who is locked
dispatchers in a central station, with a out of his or her office to a field officer being
focus on radio and telephone systems assaulted by a suspect. Thanks to sophisticated
detection and communication equipment—and
89
90 8. CENTRAL ALARM STATIONS AND DISPATCH OPERATIONS
very quick thinking—dispatch and monitoring alarm systems, such as an attached clock that
staff are prepared to coordinate an immediate could activate and deactivate the system at cer-
response to all of the above and more. tain intervals, as well as a latching circuit that
required authorized personnel to manually
reset the system prior to deactivating the audi-
HISTORY OF CENTRAL ALARM ble alarm (Fischer, 2008b).
AND DISPATCH CENTERS Around the year 1877, Holmes installed the
first network of burglar alarm systems con-
In the past, humans acted as both alarm nected to a central station (Ellis, 2007). He sent
sensors and transmission media. In order his son to Boston to establish a second central
for a response to occur, an emergency situa- station there. While in Boston, Holmes Jr. dis-
tion had to be directly observed by a citizen, covered that alarm signals could be transmit-
who then rushed to police or fire headquar- ted to a central station via preexisting telephone
ters to notify the authorities in person wires, and vice versa. He set up a network of
(National Communications Institute [NCI], 700 telephones connected to the Boston central
2001). However, this process began to change office, and promptly informed Holmes Sr., who
when William Cooke and Charles Wheatstone set up a similar operation in New York City. In
invented the electrical telegraph in 1837 1878, Holmes Sr. expanded his telephone inter-
(Stewart, 1994). The telegraph was tailored ests by becoming president of the newly formed
to the public safety industry in 1852, when Bell Telephone Company. He sold his interest
William Channing invented the fire alarm tele- in the company 2 years later but retained the
graph (Fischer, 2008a), which allowed a citizen exclusive right to utilize Bell telephone wires
to activate a pull box, sending a signal with the for his alarm circuits (Fischer, 2008c).
location of that box to the local fire company. In 1871, Holmes was introduced to direct
In 1853, Augustus Russell Pope developed competition when Edward Callahan formed the
and patented the first modern burglar alarm in American District Telegraph company, which
Somerville, Massachusetts. It involved an open eventually became ADT. They utilized manual
electrical circuit that connected the doors and action call boxes connected to a central moni-
windows in a building; when a protected door toring station (Ellis, 2007). When the station
or window was opened, the circuit would close received an alarm, messenger boys were dis-
and activate an audible alarm. Pope only com- patched to the source and would immediately
pleted one installation, however. The patent report their findings to local police or fire offi-
was sold in 1858 to Edwin Holmes, who greatly cials via preexisting call boxes. By 1875, ADT
expanded the business (Fischer, 2008a). had expanded from New York City to Brooklyn,
Holmes installed his first burglar alarm sys- Baltimore, Philadelphia, and Chicago (Fischer,
tem in Boston in 1858 (Ellis, 2007). However, 2008d). At this time, the company offered
within 1 year, he chose to relocate to New York police, fire, and all-purpose messenger boy ser-
City, because at the time, it was perceived to be vices; however, within a few years, they began
where “all the country’s burglars made their to offer a contract security patrol service known
home” (Fischer, 2008b). By 1866, Holmes’s cli- as the “Night Watch.” Even so, messenger boy
ent base had grown to over 1200 residential cus- services initially accounted for over 70% of the
tomers. Around this time, he began marketing company’s revenue. However, use of this ser-
to business entities as well as private residences, vice declined rapidly with the development
with great success. The year 1868 brought sev- and proliferation of the telephone. In 1901,
eral technological advances to Holmes’s burglar R. C. Clowery, then owner of ADT, decided the
II. COMMUNICATIONS
TYPES OF MONITORING SYSTEMS 91
wisest course of action was to focus almost touch screens, enhanced caller ID, voice record-
exclusively on police, fire, and security services ing, and telecommunication devices for the deaf.
(Fischer, 2008d). Two-way radios have evolved into networks
In 1877, the city of Albany, New York, pur- including many advanced features, such as:
chased the world’s first police telephones ● touch screen interface
and installed them in the mayor’s office and ● voice recording
five city districts (Stewart, 1994). In 1883, the ● remote paging
Gamewell Company created a call box that ● remote activation and deactivation of
could be used by the police or the public. These
handheld units
call box systems were installed in Washington,
DC, Chicago, Detroit, and Boston within the Pencil-and-paper record-keeping systems
next several years. In the United Kingdom, gas have been replaced by computer-aided dis-
lights were installed on top of police call boxes, patch software, making it much easier to enter
which could be lit by police headquarters in new data and retrieve archived information.
order to notify the officer on foot patrol to con- These systems can be integrated with a variety
tact the nearest station (Stewart, 1994). of other programs, including report manage-
Radio communication for police would ment software, telephone or radio interfaces,
come many years later. The first police radios geographic mapping and tracking systems, and
in America were utilized by officers in Detroit, even alarm-monitoring software.
Michigan, in 1928. These were only capable of
transmitting from the base station to a mobile
radio. Bayonne, New Jersey, became the first TYPES OF MONITORING SYSTEMS
police department to utilize two-way radios
in 1933 (Institute of Electrical and Electronics A security officer might come into contact
Engineers, 2009). At that time, and for many with any number of monitoring systems when
years, a dispatch center was a relatively sim- staffing a console. Each system may control a
ple operation. A typical center would consist specific action or sequence of actions if so pro-
of a telephone system, a radio system, and a grammed. The most complex are integrated sys-
record-keeping interface. The telephone sys- tems that operate multiple individual operations
tem was basic, unlikely to incorporate features from one software application.
that were not found in residential or office tele-
phones, other than a manual switchboard used
to redirect calls. The radio system was a simple
Alarm Systems
desk microphone with a “push to talk” switch. At the basic, but most reliable, end of the
Records were kept by hand on a series of paper spectrum is an alarm system that monitors
forms (NCI, 2001). Such an operation may be areas of a facility. This would consist of sen-
staffed by a switchboard operator, or by a police sors placed around the facility and connected
or protection officer assigned to the desk. to a central console. In some systems, the con-
Currently, the core functions of a dispatch sole might include lights and a buzzer such
center remain the same: telephone communica- that a violation or alarm would cause both the
tion, radio communication, and recordkeeping. light and buzzer to activate. Toggle switches
However, the technology has changed drasti- connected in the circuit allow for areas to
cally over the years. Consumer-grade telephones be shunted, bypassed, or silenced until the
have been replaced with multi-line telephone alarm can be investigated. This also allows for
terminals accompanied by features such as a sensor with a fault on it to be silenced until
II. COMMUNICATIONS
92 8. CENTRAL ALARM STATIONS AND DISPATCH OPERATIONS
repaired. However, this generally leads to the something that is known, generally a personal
assumption that any alarm on that device is identification number; something that is car-
usually a false alarm. It is therefore imperative ried, such as a card or token; or something that
to repair any part of the system that is malfunc- the authorized person has, such as a fingerprint
tioning as soon as possible. Depending on the or iris (the colored part of the eye). The creden-
type of sensor that is malfunctioning, it may be tial is entered, swiped, presented, or scanned,
necessary to station an additional security offi- and, after some level of verification, access is
cer in that area or conduct additional patrols. granted or denied.
Modern alarm systems have a keypad that Access control systems come with various
operates much in this same fashion, but with the means of operation and scope from a single
addition of a communicator that allows the sig- door to many thousands of doors or alarms
nals to be transmitted offsite to another console around the world. At the small end of the access
in a neighboring facility, an alarm central moni- control spectrum is the single door keypad at
toring station, or in rare cases, to the police. Some which a person enters a code that is mechani-
modern alarm systems will spell out the location cally or electronically verified. Most access con-
of the alarm in a textual format. As long as the trol systems use a card-based credential, which
naming convention is consistent across the sys- is swiped or presented to an electronic reader to
tem and all officers are trained in how to locate gain access. These systems can be used across
an alarm that is spelled out, this can be a very just a few doors to many thousands of doors
cost-effective method of monitoring a facility. and sensors connected via the company’s com-
Fixed graphical alarm panels will show an puter network. The most secure access control
outline of the facility and critical areas being systems utilize a biometric authentication pro-
monitored within. When an alarm is generated, cess. Biometrics entails using something that is
it is much easier to find and locate the alarm part of the person for verification of identity,
because the alarm is shown relative to the lay- such as fingerprints, hand geometry, vein pat-
out of the facility. Computer-based graphical tern recognition, voice print, and iris recogni-
alarm panels will also show the facility, but tion. Biometrics can be used as the sole means
can be modified as the facility or the system of verification, but are frequently used in con-
expands in scope and coverage. junction with a card reader.
Another main component of medium- to
large-sized access control systems is the distrib-
Access Control Systems uted processor, sometimes referred to as a field
Access control systems are based on the controller. This computer is installed between
premise that issuing keys to all employees the main computer and the card reader at the
who need them is generally not cost-effective. door and communicates back to the main com-
Another premise of an access control system is puter only when necessary, such as to request
that it would be cost prohibitive to rekey the updated information about card holders or
facility should a key be lost. Finally, an access when there is an alarm. The distributed proces-
control system can limit employee access; sor makes all of the decisions as to granting or
allowing them entry only to areas in which they denying access to a person who presents their
are authorized, or granting entry during certain card at the card reader, therefore taking the pro-
times of day. cessing load off the main computer and allow-
An access control system uses a means of ing the entire system to operate faster. The
verification, known as a credential, to allow a distributed processor also allows the system to
person to enter an area. The credential can be continue to operate if the connection back to the
II. COMMUNICATIONS
TYPES OF MONITORING SYSTEMS 93
main computer is interrupted. Typically, distrib- that allows the application to show building
uted processors control between 2 and 16 doors layout or to import floor plans from another
and allow for the connection of various sensors, application. Thus, all activity in the system is
just like a regular alarm system. Distributed presented on a single screen. Automatic actions
processors can communicate to the main com- for certain events can be programmed into such
puter via a communications protocol such as a system, such as calling up a particular camera
RS-232 or RS-485, although an increasing num- when a door goes into alarm.
ber of systems are now being connected to a
company’s internal computer network (intra-
net). Newer systems are taking the network
Fire Alarm Systems
connection all the way down to the card reader Of all the alarm systems, it is most critical for
at the door. Other systems use a Web-based security officers to understand the basic opera-
interface for programming the system and can tion and interaction of fire alarm systems. Fire
communicate down to the distributed proces- alarm systems are regulated by building and
sor via the network or through the wireless data fire alarm codes adopted by the municipality
network available from cell phone companies. in which the facility resides. Because different
The main computer in an access control municipalities may adopt different codes, how
system can be a simple desktop computer for a system operates or is installed at one location
small systems up to redundant mirrored serv- might be quite different at another location. As
ers for very large systems, or any combination fire alarm systems are so essential for the safety
in between. In smaller systems, the computer is of the employees and the well-being of the
used for entering cardholder information and facility, it is critical to have a thorough working
programming the system, whereas in larger knowledge of the operation of the system and
systems there may be multiple computers dedi- the security officer’s role in its successful use. It
cated to programming and photo badge cre- is also very important to understand the proper
ation or monitoring and controlling the various operation of the system and expectations of the
alarms and doors connected to the system. In fire department.
the largest systems the desktops communicate Fire alarm systems typically have a main
to a server, which is a high-speed computer able control panel with a display. If necessary, addi-
to perform several thousand operations per sec- tional displays can be installed in other areas.
ond: essential for controlling the flow of data Larger systems may incorporate a graphical
back and forth across a large access control sys- display of the facility and locations of the vari-
tem. In some cases, a secondary server is kept ous sensors therein. Where the alarm must be
on standby to act as a reserve to the primary monitored offsite, a communicator or dialer is
server should it fail or need periodic mainte- installed to allow the fire alarm to send alerts
nance. When this secondary server is receiving to an alarm company central station or, in some
the same updates at almost the same time as the rare cases, to the fire department.
primary server and can automatically take over Like intrusion alarm systems, fire alarms
the processing load, it is said to be redundant can be connected with a number of devices
or mirrored. on a zone. Newer, larger fire alarm systems
Access control systems can be used to moni- (and intrusion alarm systems as well) utilize
tor alarms, such as door alarms, duress buttons, a multiplex loop, where all of the devices are
or environmental situations (high or low tem- connected on the same loop, with each device
perature, sump pump, water level). The control having its own unique identifier or address.
systems typically contain a graphical interface This type of system is known as a multiplex or
II. COMMUNICATIONS
94 8. CENTRAL ALARM STATIONS AND DISPATCH OPERATIONS
addressable system. The largest fire alarm systems the central monitoring station, dispatchers can
integrate dozens or hundreds of control panels control these cameras at will, in order to focus on
across several facilities, with a dedicated main locations or individuals that require close obser-
computer in the company command center for vation at a given time. These cameras can also be
monitoring. set up to focus on a series of locations, one after
another, each for a preset length of time.
CCTV cameras generally incorporate a
Building Automation Systems (BAS) method of recording the images they monitor.
Building automation systems operate much This allows protection officers to revisit images
the same, and in a similar configuration, as to verify descriptions of individuals and events,
access control systems. Building automation and also to retain those images for use as evi-
systems control heating, ventilating and air con- dence. At particularly sensitive locations, video
ditioning (known collectively as HVAC), as well may be recorded on a continuous basis, but this
as lights. More expansive systems can assist in very quickly consumes a great deal of data stor-
controlling elevators, escalators, and irrigation age space. Cameras that are integrated with
systems. Building automation systems may other sensors—intrusion sensors, for example—
integrate with, or share the same software and can be set up to focus on a specific area and
hardware as, an access control system. begin recording when an alarm is received from
the associated sensor. A dispatcher typically has
the ability to begin and end a video recording
Closed-Circuit Television Systems (CCTV) at any time and to take a single snapshot image.
Closed-circuit television (CCTV) systems Images have typically been stored on video
allow dispatchers to watch over a large number cassettes, in either real time or time-lapse for-
of areas at once. They provide an excellent (and mat (Ruiz, 1999). However, the current trend
cost-effective) way to monitor high-sensitivity is for image files to be digitally stored onto
and high-risk locations at all times, without computer hard disk drives either using digital
needing to post a protection officer at those video recorders, (DVR), or with several drives
locations. The cameras used may be easily vis- together, or onto large capacity storage devices
ible to the public or they may be hidden to the known as network attached storage (NAS) or
point of near-invisibility, depending on the needs storage area networks (SANs). It is possible to
of the organization and the locations at which connect the hard disk drives into a configura-
they are stationed. tion known as a redundant array of indepen-
From the central monitoring station, a dis- dent disks, or RAID. Such a configuration has
patcher may be able to view up to 16 separate the capability of either manually or automati-
images in real time on a single monitor (Nelson, cally backing up drives so that the failure of
1999). Alternatively, he or she may view a single any one drive does not result in the loss of all
image at a time, and switch to other images on recorded data. Other options for exporting
demand or at preset intervals. The video images images include CD-ROM compact disks, digital
may be in color or black-and-white format. video disks, or even USB flash drives.
According to Nelson (1999), color images are
better for identification purposes, while black-
and-white images have better performance in
Integrated Systems
low light. Cameras may be stationary, but those As security and fire alarm systems become
with pan, tilt, and zoom capabilities can easily more expansive in scope and operation, it is
be installed wherever they are necessary. From sometimes necessary to link the systems together
II. COMMUNICATIONS
TYPES OF SENSORS 95
under one controlling piece of software or appli- ● Glass break sensors. When a pane of glass
cation. Other times it is necessary to link various breaks, it emits sound waves in a specific
systems together, such as human resources sys- frequency. Glass break sensors are able to
tems, parking applications, and payroll systems, pick up this frequency and generate an alarm
so that there is greater functionality and more in response. They are particularly useful
accurate information flowing automatically near windows and glass doors (J. Russell,
between those systems. Such systems are generi- personal communication, July 8, 2009).
cally referred to as “integrated systems.” ● Motion sensors. Microwave sensors send
waves of electromagnetic energy back and
forth within an area. If an intruder enters,
TYPES OF SENSORS the energy is interrupted, and the sensor
generates an alarm. Passive infrared sensors
All security, fire, and other alarm systems detect the body heat of an intruder and
incorporate a wide variety of sensors at vari- generate an alarm in response. Ideally, an
ous points throughout a protected facility. The area will be protected by dual-technology
basic purpose of a sensor is to detect a physi- sensors. These combine microwave and
cal change in the environment, interpret what infrared technology into one sensor,
event might be taking place, and transmit that increasing the reliability of the system and
information back to a central processor where it decreasing the number of false alarms
is translated into a format that can be read by transmitted to the monitoring station
the dispatchers in the central alarm station. (Morris, 2003).
● Electric eye. This type of sensor consists
of a transmitter, which generates infrared
Intrusion Sensors light in a straight line, and a receiver
directly opposite the transmitter. When
Intrusion sensors are meant to determine
the beam of light is broken by an intruder,
whether an unauthorized person has accessed,
an alarm is sent to the central processor.
or attempted to access, a protected area (Garcia,
Electric eyes have declined in popularity
1999). Various types of sensors can be placed
due to the availability of motion detectors
around the perimeter of a facility, around a
with greater reliability (J. Russell, personal
smaller area within the facility, or on a particu-
communication, July 8, 2009).
lar spot or item (Morris, 2003). They typically ● Seismic sensors. These are able to pick up
incorporate a short delay prior to generating an
vibrations on a surface and when a certain
alarm, in order to allow an authorized person
vibration threshold is reached, an alarm is
to deactivate the system without sending a false
generated. Seismic sensors may be placed on
alarm to the monitoring station. Types of intru-
floors in order to detect a walking intruder,
sion sensors include:
or on walls or doors, to detect an attempted
● Magnetic contact switches. These are placed break-in (J. Russell, personal communication,
on doors, windows, and other potential July 8, 2009).
access points. Typically, the first part of the ● Pressure sensors. These detect the weight
mechanism is placed on the frame and the of a person or object. If an intruder steps
second part is placed on the movable portion on a pressure mat, the change in surface
of the access point. When the access point is weight activates an alarm. Alternatively, a
opened, the magnetic signal is interrupted pressure switch may be placed underneath
and the sensor generates an alarm. an object at risk of theft or removal. Again, if
II. COMMUNICATIONS
96 8. CENTRAL ALARM STATIONS AND DISPATCH OPERATIONS
an intruder removes the object, the change in not be programmed to unlock the door, as
surface weight triggers an alarm. this allows the door to be unlocked from the
● Panic and duress alarms. These are switches outside without a key or card.
that must be manually activated by a staff ● Keypad locks. These devices require
member when he or she is threatened by an an employee to input a numeric code in
intruder or other emergency. Typically, they order to bypass the locking mechanism.
are utilized in high-risk or high-sensitivity Because codes can be easily transferred to
areas and are hidden from the general unauthorized persons, these locks are often
public. Alternatively, handheld wireless used in conjunction with other access control
panic alarm triggers may be issued directly measures.
to employees (Morris, 2003). ● Magnetic strip readers. An employee is
issued a card with a magnetic strip, which
is embedded with numerical data. The
Access Control Sensors employee swipes the card through the
reader, which uses that data to verify his
Access control sensors may be used to detect
or her authorization for access (J. Russell,
unauthorized access to a facility, and to gener-
personal communication, July 8, 2009).
ate security alarms in response. However, they ● Proximity card readers. Proximity cards are
may also be used to grant access to authorized
also embedded with a numeric identifier.
personnel when presented with the proper cre-
The staff member waves the card near the
dentials. Several types of access control sensors
reader, which utilizes radio frequencies to
are often used at a single entry point in order to
receive the data, which is sent to the field
provide multiple layers of security:
controller. The field controller verifies the
● Magnetic contact switches. These operate in card and grants or denies access accordingly
the same manner as they do when applied to (Best, 2003).
intrusion detection systems. These switches ● Wiegand card readers. A Wiegand card
are able to detect whether a door is open contains specially treated wires with a
or closed; if the door is opened without unique magnetic signature. A sensing coil
presentation of a proper credential, a forced inside the reader receives the data contained
door alarm will be generated (J. Russell, within the employee’s card (Best, 2003). The
personal communication, July 8, 2009). card can either be swiped or passed through,
● Request-to-exit devices. Also known as REX depending on the design of the reader.
switches, these are sometimes embedded ● Biometric readers. These detect the unique
into the crash bar or doorknob on the interior characteristics of parts of a person’s body in
of a door. A motion sensor may also be used order to verify his or her access privileges.
as a request-to-exit device when mounted Biometric readers include fingerprint scanners,
above the door, to sense a person traveling handprint scanners, retinal scanners, facial
toward the door to exit. When the door is recognition, and voice recognition.
opened properly in order to exit an area, the
REX switch is triggered and bypasses the
Fire Alarm Sensors
magnetic contact switch, avoiding a false
alarm. However, if the door is left open for The ability of fire to devastate lives and prop-
an extended period of time, a held door erty should never be underestimated. Fire alarm
alarm will be generated. Unless there is a sensors seek to prevent significant damage by
requirement to do so, REX devices should detecting fires in their earliest stages, allowing
II. COMMUNICATIONS
TYPES OF SENSORS 97
protection officers and fire officials ample time or combustion particles. They typically
to respond. Fire alarm sensors include (J. Russell, incorporate ultraviolet light sensors, infrared
personal communication, July 8, 2009): light sensors, or visible light sensors.
● Pull stations. These switches are
● Heat detectors. These measure changes strategically placed throughout a protected
in a room’s ambient temperature. They facility, and when a person observes fire or
are programmed to a certain baseline smoke, he or she is encouraged to manually
temperature and when the room’s pull the nearest switch, triggering a fire
temperature exceeds the baseline, a fire alarm and speeding evacuation of the
alarm is triggered. area. Unfortunately, pull stations are easily
● Photoelectric smoke detectors. This type of abused. To activate a pull station in order
detector contains an electric eye, generating to cause a false public alarm is a criminal
a beam of infrared light within its housing. offense in most jurisdictions; therefore,
When smoke enters the detector, it refracts protection officers responding to such
that infrared light, and an alarm is triggered alarms should be prepared to enforce their
in response. organization’s relevant policy or involve
● Ionization detectors. These devices contain local law enforcement as appropriate.
a tiny amount of radioactive material, which
creates radiation in an ionization chamber.
Any smoke that enters will absorb some of Building Automation Sensors
the radiation and change the electrical charge Building automation sensors are typically
within the chamber, prompting the device used to measure and adjust the heating, ven-
to send an alarm signal to the monitoring tilation, air conditioning, lighting, and other
station. environmental conditions in a protected facility.
● Air sampling detectors. These are often They include:
used to protect rooms filled with sensitive
equipment, such as computer servers. They ● Gas detectors. There are several different
continuously take in air from the room types of gas detectors, each of which will
and analyze the air samples for smoke or measure the levels of a particular type of
combustion particles. If a positive result is gas in the air (such as natural gas, carbon
received, the detector generates an alarm monoxide, carbon dioxide, and radon). If the
and in many cases, immediately causes a fire gas levels exceed a preset tolerance, an alarm
suppressant to be discharged within the room. is generated.
● Beam detectors. These utilize an electric ● Level indicators. These are often applied
eye, which extends a beam of infrared light to tanks that hold liquids or gases that are
across an entire room, rather than within critical to a facility’s operation. When the
the housing of a photoelectric detector. They amount of liquid or gas in the tanks drops
are most often used in rooms with very below a preprogrammed level, a notification
high ceilings, where it would be impractical can be sent to the central monitoring station
to install and maintain a smaller detector. or to personnel who will refill the tanks
Again, the beam of light will be refracted (J. Russell, personal communication, July 8,
by smoke in the room and an alarm will be 2009).
triggered. ● Temperature sensors. As the name suggests,
● Flame detectors. These are able to spot these measure the ambient temperature in a
actual flames, rather than sense smoke room. They are often utilized in rooms where
II. COMMUNICATIONS
98 8. CENTRAL ALARM STATIONS AND DISPATCH OPERATIONS
scientific experiments are being conducted ● Motion sensors or Video Motion Detection
and the temperature must be kept extremely (VMD). Certain types of motion sensors
hot, extremely cold, or within a specific can be incorporated directly into a CCTV
range. If the temperature falls out of the camera. These typically utilize a reference
pre-set range, an alarm is triggered. image, which is compared to the image
● Power failure sensors. These are integrated currently being picked up by the camera,
with the electrical system of a facility. When in order to detect whether the image has
a power failure occurs, a notification alarm changed significantly (J. Russell, personal
can be sent to the central monitoring station. communication, July 8, 2009).
At the same time, devices such as backup ● Facial recognition. This biometric technology,
generators and emergency lights can be when integrated with sophisticated CCTV
automatically activated. cameras, can identify potentially dangerous
● Integrated sensors. Some of the same individuals by comparing a face with wanted
devices used to detect intruders—magnetic person lists or terrorism watch lists. They
door switches and motion sensors, are most often utilized by law enforcement
for example—can be integrated with officials at immigrations checkpoints, such as
lighting systems. In this way, lights can be airports (Best, 2003).
programmed to turn on automatically when
a staff member enters a darkened room.
TRANSMISSION MEDIA
II. COMMUNICATIONS
VISITOR MANAGEMENT SYSTEMS 99
● Optical fiber. This type of material is number of visitors each day as part of their nor-
increasing in popularity at a rapid pace. It mal operations. Personnel at the front office or
was once far more expensive to install a fiber security office must fulfill two functions: first,
optic network than a copper one, but like they must determine whether or not to allow a
most technological innovations, fiber optics visitor access to the building. Second, they must
are dropping in price. Copper wire carries keep a log of all visitors who have arrived and
signals in the form of electricity; optical fiber departed.
carries signals in the form of light, which is less In the past, organizations typically relied
inherently dangerous. Additionally, optical on a paper sign-in sheet at the building’s main
fiber is able to carry larger amounts of data at a entrance. A visitor would write his or her name,
faster rate than copper wire. Both transmission time of arrival, specific destination within the
media can be cut or damaged, but like copper building, and purpose of the visit on the sign-in
wire, optical fiber is continuously monitored, sheet. Personnel at the desk would verify the
so the central monitoring station will be made visitor’s identity, ensure that he or she had per-
aware as soon as this occurs. mission to enter the building, and in most cases,
● Radio transmission. This method utilizes the issue a temporary identification badge for the
air as its transmission medium. Alarm signals visitor to wear while on the premises. The visitor
are sent via a certain radio frequency from would then be required to sign out when exiting
point A directly to point B. This solution can the building. This type of procedure is still in
cover a much longer distance than copper place at many organizations, especially smaller
wire or optical fiber. A drawback with some ones, due to its simplicity and low cost.
radio systems, however, is that the signal However, for many larger organizations,
is prone to interference from trees, other electronic visitor management systems prove
objects, or competing radio signals (J. Russell, safer and more cost-effective because staff mem-
personal communication, July 8, 2009). bers no longer need to spend time logging visi-
● Cellular transmission. Cellular signals are tors in and out, and personally clearing each
similar to radio signals; in fact, they operate one through applicable unwanted person data-
within the radio frequency spectrum. The bases (Savicki, 2007). Such solutions greatly
difference is that cellular signals are transmitted increased in popularity after September 11,
at a higher frequency within that spectrum. 2001. A typical electronic visitor management
Additionally, they utilize cell towers that are system consists of a kiosk at the building’s
capable of digitally processing, sending, and entrance, an attached printer, and software that
receiving the signals over a wider area than links the kiosk to the front office or security
traditional radio signals. Unfortunately, this office. A visitor approaches the kiosk and enters
transmission medium is not continuously his or her personal information or presents his
monitored; therefore, in fire alarm systems, it or her driver’s license for the machine to read.
can only be used as a backup method, rather The purpose of the visit must also be provided
than a first line of defense (J. Russell, personal (Moorhouse, 2008). The kiosk may check the
communication, July 8, 2009). individual through applicable state and national
databases—sex offender registries are typically
utilized in school settings—as well as organi-
VISITOR MANAGEMENT SYSTEMS zationally defined unwanted person databases.
If the visitor is not cleared, he or she is issued
Several organizations—large office build- a voided identification badge and appropriate
ings and schools, for example—receive a large staff members are notified automatically to take
II. COMMUNICATIONS
100 8. CENTRAL ALARM STATIONS AND DISPATCH OPERATIONS
further action (Savicki, 2007). If the visitor is switch between functions quickly and easily.
cleared, the kiosk prints an identification badge Typically, the operator will be equipped with a
for him or her to wear on the premises, which headset, in order to move about the station and
includes a facial photograph, the date, time, keep both hands free while communicating with
and purpose of the visit (Moorhouse, 2008). An a caller. The system may incorporate several
added benefit is the ability of staff members to incoming emergency lines and several incom-
easily search the software database for detailed ing nonemergency lines, which would likely be
information on previous visitors. shared by all telephone consoles at the station.
It is also possible to integrate a visitor man- Each console would also have access to its own
agement system with a building’s access con- line for outgoing calls. Alternatively, all emer-
trol system. For example, the card printed by gency calls may be routed to a dedicated “red
the kiosk may be programmed with certain phone” in the station, eliminating the need to
electronic credentials, which would allow the place an emergency caller on hold while brief-
bearer to enter authorized doors by swiping ing police, fire, or emergency medical services
the card or presenting it to an electronic reader. (Thibodeau, 2003). It is common for all tele-
Alternatively, frequent visitors may be issued a phone calls, incoming and outgoing, emergency
permanent card or tag, which can be presented and nonemergency, to be automatically recorded
to the kiosk when entering or exiting the build- and archived for supervisors to refer to later.
ing, without necessitating a new identification In agencies with very advanced technology,
card for each visit (Savicki, 2007). telephone systems may be integrated with a
variety of other systems in the central station.
For example, it is possible to connect certain
COMMUNICATIONS telephone software with certain computer-aided
dispatch software and geographic mapping
Communications equipment plays a huge role software. In these situations, the central station
in the successful resolution of alarms, criminal may receive an emergency call, and the location
and policy violations, emergency situations, and, provided by the caller ID may be automatically
of course, customer service. In a modern central highlighted on a computerized map. The loca-
monitoring and dispatch station, communication tion might then be automatically imported into
takes many forms. However, the vast majority of the computer-aided dispatch software when a
communication is performed verbally, through new event is created by the operator.
telephone lines and radio channels. Organizational policy varies with regard to the
A modern telephone system in a central usage of cellular phones by protection officers in
station will incorporate many technological the field. When they are permitted, they can be
advances available to the general public, such as very useful tools for relaying information back
caller ID, preset number dialers, and the ability and forth that is sensitive but nonemergency in
to place callers on hold or transfer them to other nature. At the very least, it is common for a patrol
lines. However, the system should also be tai- supervisor to be equipped with an organization-
lored for use by emergency service personnel. issued cellular phone for this purpose.
The system’s interface may be a series of Radio systems are equally as important as
physical keys on what looks like a very large telephone systems in both emergency and non-
telephone base, or it may be integrated with emergency situations. They are the most fre-
touchscreen software, to allow the operator to quently used method by which field officers
II. COMMUNICATIONS
CONCLUSION 101
communicate with their dispatchers and with messages—to be sent and received. Certain digital
each other. A modern radio system interface, radio systems can even be integrated with certain
like that of a modern telephone system, may computer-aided dispatch software, which can
consist of a set of keys or may incorporate a communicate via text with individual radio units.
touch screen for ease of use. The same headset
used by the operator for telephone communica-
tion will often be integrated with the station’s CONCLUSION
radio system as well. Additionally, the cen-
tral station should be equipped with software Remember: the most important component
enabling an operator to see the name or ID of of a central monitoring and dispatch operation
a handheld or mobile unit; to page, activate, or is you, the protection officer assigned to the sta-
deactivate an individual unit; to acknowledge tion. Cutting-edge technology is no substitute for
emergency signals received; and to perform an individual with good communication skills,
maintenance functions. sound judgment, knowledge of department pol-
The radio system will typically be capable of icy, and proper and up-to-date training.
monitoring and transmitting on a large number After completing the initial department-
of channels simultaneously. These may consist approved courses and on-the-job training, it
of the primary channel, an emergency channel, is important to continue growing as a profes-
a tactical channel, maintenance and custodial sional. This is achieved in part by studying
staff channels, and many more. Direct monitor- current departmental policy and seeking con-
ing and transmitting on local police, fire, and tinuous feedback from coworkers and super-
emergency medical channels is also possible. visors. However, in order to keep up with
A two-way radio operates in either simplex or industry developments and open up additional
duplex mode. In simplex mode, a radio transmits training opportunities, it is often wise to turn to
and receives messages on the same frequency a professional organization.
and communicates directly with other radios. In The International Foundation for Protection
duplex mode, a radio transmits and receives mes- Officers is an excellent starting point. Their
sages on two different frequencies. This mode Certified Protection Officer program is extremely
also incorporates a repeater. A repeater is sim- beneficial to officers both in the field and at the
ply a stationary device, attached to an antenna, central console. Several organizations exist, how-
which receives a radio message, amplifies it to ever, which provide more specialized opportuni-
increase its range, then retransmits the message ties for dispatchers and monitoring personnel.
to its destination. Duplex mode is far more com- The Association of Public Safety Communications
mon than simplex mode in this day and age. Officials (APCO) and the National Emergency
Radio equipment can be either analog or digi- Number Association (NENA) provide continu-
tal. Analog equipment has been in use for many ing education programs and advocacy for dis-
years. It tends to be less complicated than digital, patchers in the public and private sectors. The
and is therefore less expensive to purchase and National Burglar and Fire Alarm Association
maintain. It also tends to be more compatible (NBFAA), the Security Industry Association (SIA)
with existing radio systems. Digital equipment and Central Station Alarm Association (CSAA),
allows for a larger number of officers to talk provide similar services, but are geared toward
at once on the same channel. It also allows the life safety and security alarm monitoring end
for different types of data—for example, text of the spectrum.
II. COMMUNICATIONS
102 8. CENTRAL ALARM STATIONS AND DISPATCH OPERATIONS
EMERGING TRENDS
● As we have seen, many different types of organizations, analog systems provide
alarms can be integrated with each other to plenty of functionality at a greatly reduced
achieve optimal results. Likewise, telephone cost. While digital equipment is on the
and radio systems can be integrated with rise, analog equipment is far from
computer-aided dispatch software and a obsolete.
variety of other software packages. The ● Text-based communication has been
ability to integrate is highly valued, and as utilized among protection officers for
technology improves, the ability will continue years, incorporated into the mobile data
to become more widespread. terminals installed in many police and
● Plain language radio transmission is rapidly security vehicles. It has also been utilized
becoming the preferred protocol for many in telecommunications devices for the deaf,
organizations, rather than the use of 10-codes which allow the hearing-impaired to quickly
and other codes to denote certain types of call for emergency assistance. However,
events. This is because plain language makes very recently, a call center in Iowa became
it far easier to cooperate with other agencies the first in the nation to accept emergency
during emergency situations. text messages to 911 (Svensson, 2009). This
● Digital radio systems are becoming more capability is likely to be adopted by many
widespread, thanks to their enhanced more emergency call centers in the near
voice and data transmission capabilities, future. Whether or not similar technology
and the potential for integration with will become popular in the private sector
software applications. However, for many remains to be seen.
II. COMMUNICATIONS
SECURITY QUIZ 103
Ruiz, H. C. (1999). Security technologies. In S. J. Davies & from http://www.eee.strath.ac.uk/r.w.stewart/boxes
R. R. Minion (Eds.), Security supervision: Theory and prac- .pdf.
tice of asset protection (2nd ed.) (pp. 263–271). Burlington: Svensson, P. (August 5, 2009). Iowa 911 call center
Elsevier Science. becomes first to accept texts. ABC News. Retrieved from
Savicki, M. (April 26, 2007). School uses high-tech check- http://abcnews.go.com/Technology/wireStory?id
point for visitors. The Charlotte Observer. Retrieved from 8259735.
http://www.lobbyguard.com/news/charlotteobserver- Thibodeau, C. T. (2003). Effective communications. In
20070426.htm. Protection officer training manual (7th ed.) (pp. 166–170).
Stewart, R. W. (1994). The police signal box: A 100 year Burlington: Elsevier Science.
history (University of Strathclyde, 1994). Retrieved
II. COMMUNICATIONS
U N I T III
PROTECTION OFFICER
FUNCTIONS
9
Automation in Protection
Operations
Kevin E. Peterson
107
108 9. AUTOMATION IN PROTECTION OPERATIONS
services themselves remained largely low-tech, A number of studies in recent years have
focusing on armed guards and facility protec- projected massive expansion of electronic secu-
tion (Smith, 2003). rity systems employing advanced technologies,
The next major jump in security services but they also concluded that the human element
occurred as World War II approached and the (i.e., security officers) will not be predominantly
defense industrial complex emerged. The field replaced by technology (Webster University,
of “industrial security” was established to meet 2009). This conclusion is particularly interest-
the needs of the federal government in manag- ing, and profound, since some of those studies
ing security requirements for defense contrac- were funded by security systems vendors.
tors. The “industrial security” era resulted in Nonetheless, technology can and should be
a wide array of new security-related technolo- exploited by the security services industry—-
gies, concepts, and procedures—and an increase and this will require officers and supervisors
in the use of security officers. Existing security who are well rounded in technology applica-
providers opened specialized divisions and new tions. Some of these applications are discussed
providers were established to meet the need. in the remainder of this chapter, according to
Despite these innovations and forward-looking the primary functions they perform.
companies, many people viewed the security
industry as nothing more than night watch-
men, even up to and through the 1960s. Over CONTEMPORARY SECURITY
the next three decades, the use of security offi- ENVIRONMENT
cers became more prevalent. Ironically, one rea-
son for this may have been the development of Today, an increasing number and variety of
security technology such as electronic access technology applications support security func-
control and surveillance systems. For example, tions. The most relevant of these applications,
these technologies led to the establishment of from the perspective of the professional protec-
security operations centers (or command cen- tion officer, are listed below.
ters), which created a new function for protec-
tion professionals.
During these years, computer and commu-
Incident Management Systems
nications technologies developed rapidly and Few would argue that one of the most tedious
permeated virtually every type of business as tasks for the protection officer is report writing.
well as our personal lives. However, the secu- Originally, incident management systems simply
rity services industry is generally perceived as changed the task of writing a hardcopy report
having been slow to embrace technology in the into a computer-based function where officers
performance of their mission. would enter the same data into a computer using
The terrorist attacks of September 11, 2001, a word-processing-like program. One of the
brought new and intense attention to the secu- benefits of this change was that users of these
rity industry in both the public and private sec- reports no longer had to deal with issues such
tors. One of the benefits of this attention was the as poor handwriting and missing pages. Data
development and implementation of new and entry, however, was awkward, formats were
improved security technology applications. cumbersome, and it was difficult or impossible
Essentially, it gave a “shot in the arm” to secu- to include attachments, diagrams, and sketches.
rity budgets and made it easier for security pro- The functionality of incident management
fessionals to justify innovations in equipment, systems expanded rapidly and developed into
tactics, and techniques. more integrated tools such as IRIMS (Incident
There is no excuse today for using a hand- Near-term plans for CAP Index include
written sign-in log as a visitor management tool. “… an ‘ultimate dashboard’ that will merge
In addition to the inefficiencies and inability to crime forecasting with site surveys and risk
electronically store and access data, hardcopy assessment, event history and loss-related
visitor logs can represent a security vulnerability. alerts …” (Groussman, 2008, p. 63). Tools like
Visitors can generally view the log while they are this should be used for strategic security plan-
signing in and see who else (individual, company, ning, making a business case for new policies
etc.) was recently in the facility. In some environ- and programs, and conducting risk assessments.
ments, that may be very sensitive information— It is extremely useful to track crime data for a
or may at least represent a privacy issue. given location over time and also be able to
compare crime levels in surrounding areas.
Crime Mapping
Another category of automation that is Geospatial Information Systems (GIS)
increasingly important to the crime prevention
Closely related to crime mapping, GIS pro-
and security communities is that of crime map-
vides a graphic view of various situations by
ping. The most well-known and respected pro-
leveraging the capability to layer information
vider of crime mapping services is CAP Index.
from different databases or inputs over a map
They refer to their primary capabilities as crime
or image. This tool is generally used for exterior
forecasting and security risk analysis. This firm
spaces (e.g., a map of a city or neighborhood),
provides several products, all based on objec-
but can also be used with diagrams, campuses,
tive crime and incident data. Among the uses
or even building interiors. The objective may be
for this type of data are:
to review historical data (such as incidents or
● Site selection—used by organizations to aid a particular type), identify patterns of activity,
in determining where to locate new facilities display sensitive locations or areas that warrant
or where to expand existing facilities based special security attention, support an investi-
in part on local crime data gation, identify traffic patterns (vehicular, foot,
● Rank and compare—the ability to compare or product), or compare any type of data with
crime statistics at different locations other data sets by location.
● Security allocation—data to assist in One example of a GIS provider is ESRI, which
determining security force deployment, staff has supported a wide variety of homeland secu-
augmentation, and resource allocation rity, law enforcement, disaster management,
● Litigation defense—crime data can be used and public safety projects. They provide com-
to justify corporate policies and procedures mercial-off-the-shelf (COTS) software as well
that may be questioned during a security- as individualized consulting and project man-
related lawsuit or other legal action agement services. The ESRI Web site states that
● Loss prediction—products can be integrated “a geographic information system … integrates
with corporate data such as shrinkage figures hardware, software, and data for capturing,
to aid in predicting losses and setting risk managing, analyzing, and displaying all forms
tolerance (thresholds) for specific retail or of geographically referenced information. GIS
other sites allows us to view, understand, question, inter-
● Return on investment (RoI)—data can be pret, and visualize data in many ways that reveal
used to justify security expenditures and relationships, patterns, and trends in the form
projected budgets for specific sites or entire of maps, globes, reports and charts.” Regarding
enterprises force protection and security applications,
get side tracked and go off on tangents, focus- much that they more readily accept technol-
ing more on the online environment than on ogy in their workplace. Still, the effective use of
the investigative or security objectives. Second, automated security tools should be emphasized
there is a natural assumption that anything in officer training and education programs.
extracted from databases or online sources is Two graduate students in a Business and
credible. Users must remember to validate and Organizational Security Management program
corroborate all sources, including those that studied college curricula designed to pre-
originate in online databases or files (ASIS pare protection officers for a career in security.
International, 2006, p. 73). Among their findings was a distinct lack of
coursework addressing emerging technology
issues. They concluded that course content
THE ROLE OF THE should include orientation on automated tools
PROFESSIONAL such as incident and visitor management sys-
PROTECTION OFFICER tems as well as crime mapping and analysis.
According to their report, “Security officers
Protection professionals, whether operating lacking this knowledge would be placed at a
in a government or private sector environment, great disadvantage among peers …” (Bolyard &
are increasingly relying on technology and Powell, 2007, p. 4).
automated applications such as those described In addition to individual officers, security
in this chapter. Individuals who embrace tech- service providers might consider expanding
nology and leverage it as a tool in performing their service offerings to include items such as:
their duties—and in their own professional ● Conducting automation-assisted risk
development—are those who will excel. In fact,
assessments
the same applies to security services providers. ● Providing security technology training
As security business consultant Mark Gottlieb
services
puts it: ● Recommending security technology
Due to advances in security technology, computer solutions to clients
literate guards who understand “smart buildings” ● Including automated crime analysis or crime
and possess an understanding of the loss preven- mapping within security services
tion function will find their services in high demand.
... Technological improvements and innovation are
● Providing security services specific to IT
changing the role of the security guard. Security environments (e.g., data centers)
firms must keep abreast of these changes (Gottlieb, ● Providing IT security services
2006, p. 4).
As systems and procedures become more
Only a few years ago, administrators at a integrated and technology-dependent, we must
college offering an associate’s degree in crimi- also begin to consider the “security of security
nal justice and security management stated systems.” The Alliance for Enterprise Security
that their students—those employed as, or Risk Management began to address this issue in
aspiring to become, security officers—were a booklet entitled “Convergent Security Risks in
literally “afraid” of computers. For that rea- Physical Security Systems and IT Infrastructures.”
son, the college was extremely hesitant to add One of the many recommendations presented in
computer skills to their learning objectives and the booklet was:
curriculum. Connecting special systems and devices to orga-
Today, things have changed as people rou- nizations’ networks introduces new and usually seri-
tinely use technology in their personal lives so ous levels of risk. The trade-offs between connecting
and
We need to be careful to use technology as
… the amount and variety of security data flow- a tool rather than allow ourselves to be used
ing into their information systems is only going by technology. Nonetheless, professional pro-
to grow … as their corporations grow and as new tection officers should develop a technology-
technology-based security systems come online. The
corresponding need to store and organize this data
friendly mind-set, develop their skills, and
for meaningful use will thus become an even more incorporate high-tech thinking into their profes-
pressing issue … (McIlravey, 2009, p. 9). sional worldview.
EMERGING TRENDS
The driving force in today’s electronic secu- Electronic security systems are now routinely
rity systems is “integration.” Security systems capable of being controlled from remote sites
are increasingly integrated with fire and life via the Internet (over secure connections) and
safety systems, communications systems, and even using mobile devices such as a BlackBerry
even automated building controls. This allows or iPod (including activation/deactivation of
new capabilities such as “downstream controls” access cards, and dissemination of threat alerts
and “automatic lockdowns.” In other words, a to specific audiences). This trend is expected to
breach at an entrance turnstile might lock down continue and will require security professionals
the elevators or close selected interior doors. to keep up on these technologies (Belfor, 2008).
Building controls may include doors and locks, Somewhat related is the trend toward greater
elevators, lighting, HVAC, and communications functionality of incident management systems.
systems. Today, these controls can be integrated Data is being collected, analyzed, and utilized
with CCTV, intrusion detection, and electronic in unprecedented ways. Contemporary systems
access control systems. can provide valuable data for corporate inves-
Another important trend is toward remote tigations, level-of-trust decisions, on-site inci-
monitoring and control of security systems. dent management, evacuation management,
10
Patrol Principles
Christopher A. Vail
117
118 10. PATROL PRINCIPLES
Although they were nonmilitary, they were armed paid watchmen were those paid by merchants,
with staves and the traditional short swords. These parishioners, and householders. In 1737, the
patrolmen were also assigned to patrol geographi- Elizabethan Act of 1585 was enlarged to allow
cal precincts. cities to levy taxes to pay for the night watch.
As people moved north toward England In 1748, Henry Fielding suggested that polic-
and developed collective living arrangements ing was a municipal function and that some
(the precursors to towns), a form of individual form of mobile patrol was needed to protect
and group responsibility for policing began the highways. The Bow Street Runners were
to emerge through the concept of local self- formed, with a foot patrol to operate in the inner
government. Around A.D. 700, tithings (groups areas of London, and a horse patrol to operate in
of ten families) were formed for the purpose of the outer areas. In 1829, the Home Secretary, Sir
maintaining the peace and protecting the com- Robert Peel, introduced “An Act for Improving
munity. Tithingmen were elected by the group, the Police In and Near the Metropolis”—the
and their responsibilities included raising the Metropolitan Police Act. This legislation forms
hue and cry upon learning of a crime in the the basis for law enforcement organizational
group and dispensing punishment. Ten tith- structure in America. Setting the stage for orga-
ings were called a hundred and the head man nized patrol activity, 1 of the 12 fundamental
was called a reeve. Several hundreds within the principles of the Act stated that “the deploy-
same geographical area were collectively called ment of police strength by time and area is
a shire (the equivalent of our county) and the essential.” By the end of 1830, the metropolitan
chief law enforcement officer was called a shire- area of London was organized into 17 divisions
reeve (what we now call the sheriff). and superintendents were appointed. Patrol sec-
William, the duke of Normandy, introduced a tions were created, and each section was broken
highly repressive police system in A.D. 1066, in down into beat areas.
which collective security was deemed far more Basically, Peel replaced the patchwork of pri-
important than individual freedom in England. vate law enforcement systems then in existence
He divided England into 55 separate military with an organized and regular police structure
districts and appointed an officer of his choice that would serve the state and not local interests.
to be the shire-reeve in each shire, or military He believed that deterrence of criminal activ-
district. The state assumed the responsibility for ity should be accomplished by patrol officers
keeping the peace in this system. England lived trained to prevent crime by their presence in the
under this system until the Magna Carta (Great community. Hence, modern patrol was born.
Charter) was written in A.D. 1215, guarantee- Many English systems and beliefs became
ing civil and political rights to individuals and the basis for American social, political, legal, and
restoring local control to the communities. governmental systems. In New England, com-
In 1252 in England, the watch system was munities were formed around towns and villages,
established. People appointed to the duty of which relied on constables to provide protection
watchman had the responsibility for keeping and keep the peace by using the watch system.
the peace. They were unpaid and were often The South was more rural and agricultural, with
the dregs of society—the old, infirm, sick, and smaller communities. The county was the primary
criminally inclined. After 1285, some watches form of government, in which the sheriff system
grouped together for the purpose of safety, was the prominent form of law enforcement. As
forming a “marching watch,” which may be expansion moved westward, law enforcement
considered the first form of patrol organiza- organizations combined the functions and roles of
tion found in our present-day system. The only constable and sheriff.
5. Type of facility being protected, and the The officer should have a positive attitude
organizational image and culture of the facility when going to work—his or her mind should
6. The threat model and degree of vulnerability be focused on the job ahead. No personal prob-
of the facility lems, hobbies, or business should be carried to
work with the officer.
Depending on the size of the patrol area
There should be absolutely no ingestion of
and access to a car, or in some cases where golf
alcoholic beverages or other psychoactive sub-
carts are used, the officer can also carry patrol
stances at least 8 hours before going on duty.
dogs. Dogs enable the officer to search a large
The officer should have had ample rest before
and/or complex environment very quickly with
going to work, as he or she will need to be both
minimal manpower. In very large areas, aerial
mentally and physically alert on duty. Officers
patrols may be conducted by helicopter. In rug-
should have a positive attitude and an accom-
ged terrain, horses or ATVs may be used. Each
panying bearing that reflects courtesy, polite-
of these methods has some capacity to carry
ness, and a willingness to serve. These are basic
equipment.
qualities of professionalism, which instill confi-
dence in a department.
All personal and company equipment issued
PREPARATION FOR PATROL or used while on duty should be checked to
ensure that it is in working order. For exam-
Preparation for going on patrol duty is not ple, making sure a pen has ink for note-taking
only the physical act of putting on a uniform; it or a radio has working batteries, which can be
also requires mental and psychological prepara- life-saving if the officer needs to call for help.
tion. Security officers should act and look pro- Officers need to know all policies, rules, and
fessional not only while on duty, but also while regulations that pertain to the security of the
going to work. This not only produces a posi- facility, and particularly, the assigned patrol
tive impression on the people they serve, but it post. While proper procedures for performing
helps the officer to perform better. When they the job should be known, many officers have
look and act like professional security officers, their own procedures for accomplishing a task.
such demeanor demands more respect from If used, they should be in compliance with
others. This respect generates a positive attitude accepted practices of the security agency, the
in the officer, and he or she becomes more con- client, and certainly, the law.
fident and more competent in his or her work. It is important, when preparing to go on
While people should not “judge a book by its patrol, that the officer knows the property he or
cover,” the fact remains that people do judge pro- she is protecting “like the back of his/her hand.”
tection officers based on their first impression. The location and condition of emergency equip-
Clothes “do make the man,” so one’s personal ment, water shut-off valves, electrical controls,
appearance is important. The officer’s uniform fire alarms, and telephones should be known, as
should be properly tailored and in good con- the patrol officer may be the first responder to a
dition—neat, clean, and pressed. There should situation requiring their use. The location of any
be no holes, patches, or loose threads dangling hazardous materials, or places where hazard-
from it. Shoes and leather equipment should be ous materials are worked with, should be firmly
polished. Male officers should be clean shaven. implanted in the officer’s mind. All doors and
Hair and fingernails should be clean. No items windows, and the condition they’re normally
not authorized by the employing organization found in, should be well known. This includes
should be attached to the uniform. knowledge of existing scratches or other marks
any expected VIPs, vendors, contractors, and opportunity, the desire, and the tools. Patrol
so on. Determine if there are any communica- officers have a direct influence over the first one
tion “dead areas” and where they are. In other and some influence over the second. An effective
words, to be fully prepared to go on patrol, an patrol officer, by following accepted patrol proce-
officer must know what has happened, what is dures, can and will hinder the first element—the
happening, and what is likely to happen. opportunity to commit a criminal act. By ensur-
One area of preparation often overlooked by ing all doors and windows are properly closed
many officers and departments is that of con- and locked, ensuring there is adequate lighting
tinuing training and education. With the many in vulnerable areas such as where safes or valu-
and increased demands placed on security per- ables are kept and around the building(s) proper,
sonnel today, it is essential for the officer to stay and making access difficult to possible targets
abreast of the latest laws, equipment, products, for criminal activity, opportunities for the crim-
services, and procedures in security. This infor- inal are reduced or eliminated. This is the very
mation is gained only through education or essence of loss prevention.
training. Companies who contract out for their While the patrol officer may not be able to
security services, proprietary security depart- directly influence a person’s desire to commit
ments, and security companies themselves, a crime, that desire is greatly hampered by the
should provide basic and ongoing training for very presence of a security officer perform-
their security officers. Companies can estab- ing his or her patrol duties in a professional
lish internal training programs, send officers way. It is indeed a rare criminal who will com-
or require officers to attend local colleges that mit a crime in the presence of a patrol officer
have security educational programs, or have (although it has happened), especially one who
their officers take home-study courses. is visible, alert, and showing confidence. The
There are also private vendors who special- third element is not controllable by security
ize in conducting security training programs. personnel; however, security officers should
If a local police department has a “ride-along” know what tools are generally used by crimi-
program, this can provide excellent training for nals. Guns are obviously a tool, but some peo-
the security officer. Another way for an officer ple have the authority and permission to carry
to gain new information and knowledge is by weapons. Screwdrivers and pry bars are com-
reading security- and law enforcement–related mon everywhere, but in the hands of a criminal,
professional journals and magazines. Protection they become burglar tools. Information gather-
News, Security, Police and Security News, FBI Law ing equipment, such as photographic or record-
Enforcement Bulletin, and Security Management ing devices, may be used to steal information.
are all excellent sources of up-to-date profes- Radio transmitting or monitoring devices may
sional information. also be used by terrorists and sophisticated pro-
fessional criminals.
Patrol is never routine; anything is liable to
TECHNIQUES OF PATROL happen at any time. Therefore, there are two
major principles of patrol that guide the effec-
As stated earlier, patrol is defined as the act tive patrol officer. The first principle of patrol
of moving about an area to provide protection is that it should always be done in a random
and conduct observation. In the security world, fashion. Never patrol by driving or walking
the majority of patrol activity is focused on the in the same direction. Alter routes; change the
prevention of criminal behavior. A crime can- pace occasionally; walk or drive for a while and
not occur unless three elements are present: the then stop to look and listen. Sometimes, turn
known as creative daydreaming or mental flashlight. If there is a glare from lights, use it
rehearsal) is played as an officer patrols his or to your advantage if necessary! Use flashlights
her area by thinking of any possible incident, judiciously; don’t have them turned on more
remote as it might be, that could occur at any than necessary (although for walking safety
place or time. For instance, the officer could they should be used if other light sources are
think of what to do if someone came running not available). “See others before they see you.”
out of an office or building that is supposed to
be closed and locked, just as he or she gets there.
The officer could think about what actions to
take if he or she heard a loud explosion, or gun-
FACTORS THAT INFLUENCE
shots in the area. What would an officer do if he
PATROL EFFECTIVENESS
or she smelled smoke in the area or saw a fire in
As patrol is an expensive loss control tech-
progress? What would an officer do if he or she
nique, it only makes sense to have the officer
saw a chemical leak in progress? The list goes
detect the greatest number of loss-causing situ-
on and on. Doing this might uncover a potential
ations as possible. The WAECUP theory of loss
loss event that has occurred or is occurring. It
control is applicable here.
will also keep an officer up-to-date on company
rules, regulations, policies, and procedures. Waste—Patrol officers check scraps being
It is a form of self-training, as the officer can thrown away, look for lights, heat, and water
determine his or her own needs for improve- turned on needlessly.
ment and take the appropriate steps to correct Accident—Officers look for spills and other
any deficiencies in his or her professional life. slippery walking conditions. Always observe
Finally, it makes response to the event more effi- all around patrol points for fire hazards,
cient, should it occur. It may save the life of an materials stacked too high, and so on. “Look
officer or the life of another. up, down, and all around.”
Light and noise discipline should be prac- Error—Patrol officers should be thoroughly
ticed when on patrol. This means that patrolling briefed prior to their shift as to what
officers should avoid making any more noise activities are occurring in their patrol
than is necessary. They should keep the radio environment. They should check and
turned down somewhat, keep keys and equip- double-check schedules of building openings
ment from jangling, and so on. They should and shipments of personnel arrivals.
be able to “hear others before they hear you.” In many cases, the security department
Note that radio net discipline is also important; functions as “the grease in the machine,”
overuse of the radio ties up the net and depletes making things run smoothly between
the battery. Extended conversations should be different departments. In most organizations,
carried out by landline methods, such as tele- security makes sure that things don’t “fall
phones. Note, too, that backup means of com- through the cracks.” Patrol officers can play
munication should always be considered when a key role in alleviating problems caused by
on patrol or fixed post duty. Always have a con- simple human error.
tingency plan if the primary means of commu- Crime—Become familiar with criminal
nication doesn’t work. behaviors in the local area. Also, keep up-to-
Similarly, light discipline should be prac- date on criminal trends within the industry.
ticed. This means avoid being silhouetted. Speaking with local police and reading
Never sit with lights behind you or stay in a car industry-specific management literature are
with the dome light on. Use a clipboard light or good ways to maintain one’s professional
11
Traffic Control
Arthur A. Holm
131
132 11. TRAFFIC CONTROL
in order to keep traffic moving with a minimum must therefore assume a military bearing, with
of delay and maximum of safety. weight evenly distributed on both feet.
Since traffic control duty may require an offi- When not engaged in signaling motorists,
cer to remain at his post for hours in all kinds he/she must stand in the “at ease” position,
of weather, protective clothing must be readily facing traffic, and with hands at his/her sides.
available. Proper protection against the elements When directing traffic, shoulders must be in
is an important factor in maintaining efficient line with the flow of traffic and attention must
traffic control. It has been observed that a wet or be directed to the vehicular movement.
cold officer presents a hazard to himself as well
as to motorists.
Proper clothing should also include high- HAND SIGNALS
visibility material to increase the safety value
during nighttime assignments, whether the Prompt compliance to hand signals is depen-
intersection is well lit or not. dent on the officer’s ability to use uniform,
clearly defined, and understandable gestures.
Intersectional control does not call for compli-
ROADWAY POSITIONS cated choreography or wild arm movements.
Improper hand signals, although highly
The position selected to direct traffic entertaining to bystanders, cause confusion,
must be suited to the particular intersection hesitation, and lead to violations and accidents.
and expected traffic patterns. It must com- Unusual movements undermine the purpose of
mand a full view of the intersection and its traffic control and direction.
approaches. In turn, the officer must be com- Stopping traffic: Two clearly defined motions
pletely visible to the motorists and pedestrians. are required to stop traffic. First, select the
In many instances, noncompliance to gestures vehicle to be stopped. Look directly at the
or whistle signals is caused by the inability of driver, and point in his direction with the arm
the motorist to see the officer. Usually, officers fully extended. The position is held until you
assigned to traffic control will select a position are observed by the driver. Then raise your
in the center of the intersection or at one of the hand so that the palm is extended. The position
corners. is held until you are observed by the driver.
Then raise your hand so that the palm is toward
1. The center of the intersection: This position
the driver and the arm is slightly bent at the
affords the greatest visibility, but it is also
elbow.
the most hazardous. This location is usually
Maintain this position until the oncom-
selected when traffic signals are inoperative,
ing traffic has stopped. With the one arm still
traffic is not moving at a high rate of speed,
raised, turn your head and repeat the procedure
and where there is little pedestrian traffic.
with your other hand to stop the traffic moving
2. The corner position: Intersections having
in the other direction. The arms are now low-
heavy pedestrian or vehicular turns can
ered until all traffic has stopped (Figure 11-1).
be controlled by an officer standing a few
Starting traffic: To start vehicular movement
feet off the curb line at one of the corners
on the cross street, pivot a quarter turn to place
providing the greatest personal safety and
your shoulders parallel with the vehicles waiting
better pedestrian control.
to move. When the intersection is cleared, turn
Posture serves to communicate the fact that your head to one side facing the waiting traf-
the officer is in command of the situation. He/she fic. Attract attention by pointing to the lead car.
2 STOP 4 STOP
protection officer must exhibit sound judgment Vehicles should be allotted space by ensur-
in selecting his position. For example, when ing one section is filled in an orderly fashion
an extremely heavy flow of traffic is expected before rotating to another section. The signals
at a football game, a pregame plan should be to start and stop traffic are extremely important.
formulated. Practice them.
12
Crowd Management and Special
Event Planning
Patrick C. Bishop,
Terence M. Gibbs, and
Jennifer Lantz
137
138 12. CROWD MANAGEMENT AND SPECIAL EVENT PLANNING
normally held in restraint may be released crowd can quickly become unruly and very
in an emotional crowd. This temporary violent.
release of emotions is a strong incentive to an 4. Hostile—Crowds of this nature are generally
individual to participate in the activities of motivated by feelings of hate and fear to the
the crowd. It provides the opportunity to do extent they are prepared to fight for what they
things he or she has been inwardly desirous want. The most prominent types are strikes,
of doing but hitherto has not dared. political demonstrations, and hoodlums or
rival mobs. Hostile crowds may have leaders
who direct and maintain a high degree of
hostility in their followers, but not always.
TYPES OF CROWDS 5. Escape—An escape crowd is one that is
attempting to flee from something it fears. It
The behavior of crowds varies widely depend-
is leaderless and completely disorganized,
ing on its motivational interest. Crowds are clas-
but it is homogeneous in that each person
sified in accordance with their behavior patterns
is motivated by the same desire, which is to
and it is essential that any security measures
escape. Once an escape crowd reaches safety,
are based on recognition and understanding of
it will lose its homogeneity and its members
the type of crowd they must deal with. The fol-
must then be handled as refugees.
lowing outline is representative of most of the
crowd types that might be encountered in this
country.
CROWD ACTIONS AND
1. Acquisitive—The members of an acquisitive SUGGESTED COUNTERMEASURES
crowd are motivated by the desire to get
something. They are best illustrated by a The majority of crowds do not, as a rule,
crowd of shoppers seeking items in short resort to violence; however, any crowd is poten-
supply or at an auction sale. They have no tially dangerous or at the least, aggressive. The
leaders, little in common, and each member mood of a peaceful crowd—that is, acquisitive,
is concerned with his or her own interest. spectator, or expressive—may change quickly to
2. Expressive—In this type of crowd, the that of a hostile or “escape” crowd. Since most
members gather to express their feelings concern is caused by a hostile crowd, as opposed
such as at a convention or political rally. to the other types mentioned, a more thorough
The expressive crowd is usually well study should be made of it.
behaved; however, some persons in it may A hostile crowd is usually noisy and threat-
feel that slight disorders and unscheduled ening, and its individual members may harass
demonstrations should be condoned by security personnel. This kind of crowd will
the officials. When they are thwarted or hesitate to participate in planned lawlessness
restrained, resentment occurs and their because it generally lacks organization and
otherwise cheerful enthusiasm may be leadership in its early stages. However, it may
replaced by hostility. provide the seedbed for “mob” action when it
3. Spectator—This crowd gathers to watch is aroused by the more forceful persons who
out of interest, curiosity, instruction, or assume leadership. It may also be triggered into
entertainment. It is invariably well behaved violence by the undesirable actions of individ-
and good humored initially, but since ual protective personnel.
spectator sporting events, parades, and so on Aroused crowds will often vent their resent-
tend to stir the emotions rapidly, this kind of ment and hostility on those assigned to maintain
6. Using a recognized leader. An effective them pass through the ranks and then close
method of counteracting the developing rapidly behind them.
leadership in a crowd is by using someone
having greater appeal to the crowd. A
trusted labor leader, a member of the clergy, WHEN VERBALIZATION
a well-known sports figure, or a well-known DOESN’T WORK
civil rights leader can often successfully
plead for order and reason. Depending on When verbalization is not effective, there may
the origin and cause of the crowd formation, be a need to physically move crowd members.
an appropriate public figure or official may This should be done only as a last resort, and
greatly assist in calming the excitement and should include verbalization. It should be a
emotions of the crowd. planned action, only be done after professional
7. Preventing panic from developing in a instruction has been received on the proper
crowd. Panic is caused by fear and is most procedures. The following are some physical
often found in the “escape” crowd fleeing control techniques that are appropriate for the
from disaster or the threat of disaster or movement of people in crowds:
violence. The primary cause of panic is 1. “Heavy hands”—Assert your presence with
blockage of the escape route. Security actions your hands in front of you.
should aim at providing an escape route, 2. Be assertive! Do not take a backward step
directing and controlling the progress of when moving the crowd.
the crowd along the route, and at the same 3. Destabilize resistant persons by one or more
time dividing the crowd into small groups, of the following techniques:
if possible. The following control techniques a) Upper torso restraint.
might be implemented: b) Arm around waist with an escort hold.
a) Display a helpful, calm and confident c) Belt lift with an escort hold.
attitude. Loudspeakers should be used to d) Bracketing with an escort hold.
give directions and helpful information. e) Pressure point control as appropriate.
b) Use rational members of the crowd to f) Wristlocks, team control position, arm
assist in calming or isolating hysterical bars, etc. as appropriate.
persons.
c) Provide first aid and medical attention to
the injured and weak, particularly women SECURITY AND
and children. DEMONSTRATIONS
d) Use security to block off routes so as
to channel movement in the desired Security organizations assigned to supervise
direction. Care must be taken to ensure demonstrations have a twofold responsibility.
that the security forces do not panic a Regardless of individual convictions, they must
crowd by hasty action, arrogance, or first protect the peaceful demonstrators who are
thoughtlessness. exercising their right to protest.
8. Directing women and children. Crowds Spectators not in sympathy with the demon-
and demonstrators may resort to having stration constitute a potential threat of violence.
women or children wheeling baby carriages This is often aggravated by counterdemonstra-
at the head of their advance. If the marchers tion whether it is organized or spontaneous.
must be stopped, an attempt should be made Crowd control forces must also protect the
to divert the women and children or let general public from demonstrators who infringe
3. Communications (radio and telephone, PA 2. Take lawbreakers into custody and turn over
system) to the police for arrest.
4. First aid staff 3. Use reasonable force to enforce the law.
5. Ambulance or first aid rooms a) Do not overlook violations or defiance of
6. Doctors lawful orders.
7. Location of event b) The use of unreasonable force often incites
8. Fire procedures, equipment, personnel a crowd which normally would be passive
9. Communications center or curious.
10. Media observation area c) Charges of brutality are often made in
11. Entry and exit location for VIPs an attempt to discredit the security force;
12. Parking they will have no basis in fact if brutality
13. Lavatories is not used.
14. Food concessions 4. Remain on the fringe of the crowd. Do not
15. Disabled persons areas (wheelchairs) get too close or mix with a hostile crowd.
16. Entertainment before or after event Remain out of reach and observant of crowd
17. Signs and individual activities, pending the arrival
18. Timing schedule of reinforcements.
19. Number of security personnel and degree 5. Assist fellow officers who may be in
of expertise required trouble. If one of your associates situated
20. News releases and media precoverage near you is physically attacked, go to his
21. Time of year and type of environment or her immediate assistance. Arrest the
22. Alternate power sources assailant. To permit such a person to escape
23. Size of crowd expected will encourage others to assault or try to
24. Vehicles for movement of VIPs, and overpower individual security personnel.
so on 6. Refrain from participating in crowd activities.
a) An aggressive crowd will invariably
As you can see, when a large crowd control
throw a barrage of rocks, sticks, bottles,
event is known and sufficient time is avail-
and so on at opposing forces. DO NOT
able for preplanning, the event should be able
throw them back at the crowd! This will
to take place with minimal problems for both
only precipitate greater hostility and
security staff and participants alike.
supply the crowd with more missiles.
b) Withdraw to a safe distance until
dispersal operations can be commenced.
PERSONAL BEHAVIOR
a) ARROWHEAD
THIS IS USED TO STRIKE INTO AND SPLIT A CROWD OR MOB, TO PROVIDE AN
ESCORT FOR A PERSON (S) TO A GIVEN POINT THROUGH A FRIENDLY OR DIS-
ORGANIZED CROWD. THE USE OF AN ADDITIONAL INVERTED ARROWHEAD AT
REAR OF THE FORMATION WILL GIVE ALL-AROUND PROTECTION.
b) LEFT FLANKING AND RIGHT FLANKING
friendly or disorganized crowd. The use of 7. Are the security personnel properly briefed
an additional inverted arrowhead at rear of on the type of crowd?
the formation will give all-around protection. 8. Is the company providing security
2. Left flanking and right flanking—Used to properly licensed?
move a crowd or mob to the right or left, 9. Have all required permits been obtained?
or to turn a crowd away from the front of a 10. What is the seating?
building, fence, and so on. 11. What is the procedure for extracting
3. Line—Used to move a crowd or mob problem people from the crowd and
straight back up the street. ensuring that they leave the venue without
posing a threat to anyone inside or outside
the venue?
CROWD MANAGEMENT 12. Is supervision present and adequate?
ASSESSMENT 13. Are communications, including two-way
radios, adequate?
1. What is the officer-audience ratio? 14. Is alcohol being served at the event?
2. Are the security personnel deployed in a way If so, what are the procedures for
as to maximize surveillance of the crowd? controlling access to alcoholic
3. What type of performance is this? beverages?
4. Are the security personnel properly trained 15. What are the evacuation procedures in the
to handle the crowd? event of panic in the crowd?
5. Are the security personnel knowledgeable 16. In the event of a cancellation after the
in first aid? audience has been admitted to the venue,
6. Are the security personnel licensed and what procedures are in place to placate the
armed with any weapons? crowd?
EMERGING TRENDS
The first and foremost emerging trend is a greater are sworn in for the duration of the fair. Some of
awareness by organizational management of the the officers then joke that they are “suspended
problems and potential liabilities associated with without pay for 355 days” once the fair is over.
special events. Special events are complex under- In addition to the fair police, there are township
takings and many things can go wrong. Perhaps police, and some contract security personnel.
the best way to conceptualize this is the old saying York County Deputy Sheriffs perform security
“whatever else can go wrong, will go wrong.” at concerts held at the fair. Private investigative
It is clear that special event security is a firms conduct surveillance and make controlled
division of the security field that needs to be buys from vendors who sell counterfeit goods.
addressed. It is defined as a part of physical York County Probation Department person-
security, but it is not ongoing. It is occasional; nel search for probation violators and perform
only temporary. As such, it may not garner the security at concerts. This is an excellent means
attention that it deserves. of both apprehending probationers who are in
An interesting example of event security is violation as well as deterring troublemakers.
at the oldest fair in the United States, the York Deputy U.S. Marshalls sometimes conduct sting
County Fair, in York, Pennsylvania. Security operations for fugitives.
at the fair is difficult because of the number of Gang activity is prevalent, especially on stu-
people in such a small space. The fair takes place dent nights when students get in for free. Nearly
in September, so planning must begin in March. 100 police officers are required, and EMS needs
There must be adequate EMS (emergency medical to be prepared for possible mass casualty situ-
services), fire, and police in place. In fact, the fair ations. It is evident that there is a need for even
has its own police force, a group of officers who more officers, but monetarily it isn’t possible.
So the trend is to reach out to the private sector money depending on the size of the venue and if
and specialized service firms for security at these the event was set up correctly. INA also utilizes
types of special events. probation officers who take vacation days to
In addition to the example of the York Fair, man special events. The probation officers are all
we are seeing more varied and creative use of college graduates who have had some relevant
protection forces across the board. These include training and experience.
proprietary security, t-shirt security, contract Another trend is having more restrictions in
security, off-duty police, and so on, all working place as to what can be brought into an event, as
in contact with one another. INA, Inc., based out well as more restrictions on tailgating parties and
of Harrisburg, Pennsylvania, finds that using serving alcohol. There is also an increase in the
off-duty police officers saves a great deal of use of dogs and horses at some special events.
13
Environmental Crime Control
Glen Kitteringham
151
152 13. ENVIRONMENTAL CRIME CONTROL
Will it require a simple or a complicated fix? In follow-up measures and programs. While the
some cases, simple is usually cheaper and can intent of this chapter is not to argue the pros
be just as successful as more expensive security and cons of one theory over the other, one com-
measures. ment will be made. While all the programs
There is a danger in thinking that once secu- and money spent upon social crime control
rity measures have been implemented, there can be considered laudable, it would be a fool-
will never again be a crime or unwanted activ- ish security manager who donated his or her
ity in the same area. Crime may or may not security budget to a social crime control pro-
occur. Other factors may be at work, including gram regardless of how noble it may seem.
the effects of displacement and diffusion of ben- Government and big businesses have spent
efits (to be explained). This forces the security billions of dollars on this issue for many years,
practitioner to continually review the area from but physical security forces are required more
many different perspectives. Has new tech- than ever.
nology made the old security solutions moot? Environmental crime control has not been
Will an attack come from a different direc- relegated the same attention and respect as the
tion, during a different time of day? Will the social crime control model. Social crime con-
attacker be forced to try new methods or big- trol has been practiced in one form or another
ger or better tools, or will be there be a different for hundreds of years. In contrast, environmen-
attacker? Continual awareness and review are tal crime control grew from work completed at
necessary. the University of Chicago in the 1920s. It was
there that more attention was paid to the area
in which the crime was being committed than
ENVIRONMENTAL CRIME to the people who committed the criminal acts.
PREVENTION VERSUS SOCIAL The theory laid dormant for several decades,
CRIME PREVENTION but was given a rebirth by the influential writer
and social commentator, Jane Jacobs, when she
A simple explanation of environmental crime wrote The Death and Life of Great American Cities
prevention is that environmental crime prac- in 1961. Her work inspired both C. Ray Jeffery
titioners focus their attention and energies on and Oscar Newman, both of whom took off in
locations of potential criminal activity. These new directions: Jeffery, with his book, Crime
practitioners “look for crime patterns and seek Prevention through Environmental Design, and
to explain them in terms of environmental Newman, with his Defensible Space. In turn,
influences. From these explanations they derive both researchers inspired others, such as Paul
rules that enable predictions to be made about and Patricia Brantingham, Tim Crowe, Ronald
emerging crime problems, and that ultimately V. Clarke, and Marcus Felson. What follows is
inform the development of strategies that an overview of the various environmental crime
might be employed to prevent crime” (Wortley control theories.
& Mazerolle, 2008, p. 1). Locks, doors, and other
barriers, CCTV equipment, and patrolling secu-
rity officers are all examples of environmental
THEORIES
crime control measures. On the other side of the
coin is social crime prevention. This area focuses
Rational Choice Theory
upon social programs, education, employment
creation, welfare, unemployment insurance, Rational Choice Theory was first presented
police, corrections, and other after-the-fact by Ronald V. Clarke and Derek B. Cornish in
Increase the Effort Increase the Risks Reduce the Rewards Reduce Provocations Remove Excuses
1. Harden target (both premise 6. Extend guardianship 11. Conceal targets 16. Reduce frustrations and 21. Set rules
and laptop itself ) • Take routine precautions: • Off-street parking stress • Rental agreements
• Steering column locks go out in groups at night • Gender-neutral • Efficient queues and • Harassment codes
and immobilizers leave signs of occupancy phone directors polite service • Hotel registration
• Anti-robbery screens carry phone • Unmarked bullion • Expanded seating
• Tamper-proof packaging • “Cocoon” neighborhood trucks • Soothing music/muted
watch lights
2. Control access to facilities 7. Assist natural surveillance 12. Remove targets 17. Avoid disputes 22. Post instructions
IV. CRIME PREVENTION AND PHYSICAL SECURITY
• Entry phones • Improved street lighting • Removable car • Separate enclosures for • “No Parking”
• Electronic card access • Defensible Space design radio rival soccer fans • “Private Property”
• Baggage screening • Support whistleblowers • Women’s refuges • Reduce crowding in • “Extinguish camp
3. Screen exits 8. Reduce anonymity 13. Identify property 18. Reduce temptation 23. Alert conscience
• Ticket needed for exit • Taxi driver IDs • Property marking • Controls on violent • Roadside speed
• Export documents • “How’s my driving?” • Vehicle licensing pornography display boards
• Electronic merchandise decals and parts marking • Enforce good behavior • Signatures
tags • School uniforms • Cattle branding on soccer field for customs
• Prohibit racial slurs declarations
• “Shoplifting is
stealing”
4. Deflect offenders 9. Use place managers 14. Disrupt markets 19. Neutralize peer pressure 24. Assist compliance
• Street closures • CCTV for double-deck • Monitor pawn • “Idiots drink and • Easy library
• Separate bathrooms for buses shops drive” checkout
women • Two clerks for • Control classified • “It’s OK to say No” • Public lavatories
• Disperse pubs convenience stores ads • Disperse • Litter bins
• Reward vigilance • License street troublemakers at
vendors school
5. Control tools/ weapons 10. Strengthen formal surveillance 15. Deny benefits 20. Discourage imitation 25. Control drugs and
• “Smart” guns • Red light cameras • Ink merchandise • Rapid repair of alcohol
• Disable stolen cell • Burglar alarms tags vandalism • Breathalyzers in
phones • Security guards • Graffiti cleaning • V-chips in TVs pubs
• Restrict spray paint sales • Speed humps • Censor details of • Server intervention
to juveniles modus operandi • Alcohol-free events
2 What The type of If security measures An addict, failing to gain access to an office to steal
offense carried out prove to be adequate, laptops to trade for drugs, may instead conduct a street
consideration should robbery. An offender may switch from robbing banks
be given to the offender to writing bad checks. An offender may switch from
changing offenses. crimes of violence to Internet-based scams.
3 When The time in which Daytime, nighttime, The offender may change the time of their offense. If
the crime was morning, afternoon, they cannot tunnel into a bank vault at night, they may
committed evening, weekdays, rob the bank during the day. A laptop thief, if unable to
weekends, summer, defeat physical security after hours, may decide to talk
winter, etc. their way past a receptionist to gain access.
4 Where The location of the Moves on to another If an offender cannot gain access to one building, they
criminal act house, store, may attempt to go next door to gain access. Regardless,
neighborhood, city, state/ the expectation is that they will go elsewhere. They
province, or country, etc. may change locations because they have become too
well known in their present area.
5 Why The type of target Weaker, younger, older, There are a variety of reasons why the offender may
which is attacked less security, female, male, switch targets. If a location is attacked and the target
inability to overcome turns out to be removed, the offender may take other
current security measures, items. Retail thieves may enter a pharmacy intending
etc. to steal drugs, but if narcotics are not available and
cash is, they will switch targets.
6 How The method used Gun, knife, pen, computer, The offender may change their modus operandi. For
to complete the vehicle, etc. example, the terrorists who brought down the World
crime Trade Center towers originally used a vehicle bomb
in the underground parking garage. When that failed,
they used airplanes as cruise missiles.
reflects a real attempt to understand crime flux, but social group cohesiveness, or a host of other
because it serves as a convenient excuse for doing aspects. Acknowledging the complexity of the
nothing (‘Why bother? It will only get displaced’)”
(1997, p. 978).
theory, a crime prevention response cannot come
from one area alone. Instead, a multidisciplinary
A further, somewhat controversial point to approach must be taken, in which responses are
displacement is that there may be a benefit to tailored to the situation. One must consider the
displacing certain kinds of crimes. For example, criminal opportunity, the individual offender,
drug and prostitution control may be made eas- his or her readiness and willingness to commit
ier or more tolerable when it is away from resi- crime, and the combination of the previous three
dential neighborhoods or concentrated in one aspects as they impact the sociocultural, eco-
locale (Pease, 1997, p. 979). nomic, legal, and environmental cues. Granted,
this is not an easy theory to employ from a theo-
retical or a practical perspective. Some of the
components of this theory are certainly beyond
ROUTINE ACTIVITY THEORY the security practitioner’s reach to address, but
knowing that a detailed examination of the envi-
Routine activity theory, developed by Cohen ronment is required may enable practitioners to
and Felson, revolves around three things: a view the environment from a broader perspec-
“potential offender, a suitable target, and the tive. Knowing that decisions to conduct criminal
absence of a capable guardian” (Bottoms & Wiles, activity are often carried out for entirely differ-
1997, p. 320). All three must come together in ent reasons than previously suspected gives the
order for criminal activity to be realized. Routine security officer the opportunity to view criminal
activity theory relies on the same rational choice activity in a new light.
methodology as situational crime prevention
techniques. As in any theory, routine activity
theory has its criticisms. One of the primary criti- CRIME PREVENTION THROUGH
cisms is the assumption that criminals are rational ENVIRONMENTAL DESIGN
in their decision making. They may not use the (CPTED)
same rationale as the person implementing the
security measures. They may not even be aware CPTED, probably the most well known of
of the situational crime prevention techniques the environmental crime control theories, was
put into effect. They may be under the influence first discussed by Dr. C. Ray Jeffery in 1971. To
of drugs or alcohol or, for whatever reason, they quote Tim Crowe, a huge proponent, CPTED
may simply not care about the security measures. “expands upon the assumption that the proper
design and effective use of the built environ-
ment can lead to a reduction in the fear of crime
CRIME PATTERN THEORY and the incidence of crime, and to an improve-
ment in the quality of life” (Crowe, 1991, p. 1).
Crime pattern theory, developed by Paul and There are three key concepts specific to
Patricia Brantingham, is a rather complex amal- CPTED. These concepts are:
gamation of both rational choice and routine The use of natural surveillance. Natural sur-
activity theories, as well as a further introduc- veillance refers to increasing the ability of legiti-
tion of sociocultural, economic, legal, and physi- mate place users to see farther and wider, while
cal environmental cues. The premise is that decreasing the ability of illegitimate place users
crime does not occur randomly in time, place, to hide when waiting for the right time to carry
3. Community culture: positive social and occupants can easily adopt proprietary
cultural activities. attitudes;
4. Threshold capacity: positive community ● Those which improve the natural capability
resources that do not overwhelm the area, of residents to survey both the interior and
proper land density use and zoning, and a exterior of the residential space;
lack of crime generators. ● Those which enhance the safety of adjoining
Second-generation CPTED focuses on the phys- areas such as communal facilities;
ical and social aspects of communities to mini-
● Finally, through the judicious building
mize both criminals and criminal opportunities. materials to reduce the perception of
peculiarity such as vulnerability, isolation
and stigma of housing projects and their
DEFENSIBLE SPACE: CRIME residents (Newman, 1971).
PREVENTION THROUGH
URBAN DESIGN
PRACTICAL APPLICATIONS
This theory revolves around the public hous-
ing environment and seeks to reduce crime As one can see, there are some similarities
through the use of natural surveillance, natural between Defensible Space and CPTED applica-
access control, and territorial concern. tions. The important concept of legitimate users
History of Defensible Space. While Oscar versus illegitimate users, the proper and effec-
Newman has written many influential pieces on tive utilization of surveillance, both natural and
this important concept over the past 30 plus years, man-made, and creating safe havens for normal
two of his most important works are Architectural users are common to both. Knowing and under-
Design for Crime Prevention, published in 1971 standing who belongs in an area and who does
through the U.S. Department of Justice, and not (legitimate users versus illegitimate users of
Defensible Space, published in 1972. Additional space), the importance of various types of sur-
books, such as Creating Defensible Space from veillance, and encouraging legitimate users of
1996, published through the U.S. Department of space to use or reclaim areas for activities are
Housing and Urban Development, add to his sig- recommendations that security practitioners
nificant body of work. can understand and appreciate.
Concept and Strategies. While there will
not be a detailed analysis of all the concepts
that encompass the theory of Defensible Space,
SUMMARY
a general overview will be made. The writer
While this chapter has not detailed each and
encourages interested parties who seek a
every theory or practice of crime prevention, it
deeper understanding to access the aforemen-
has provided an overview of the main existing
tioned books for an in-depth analysis. Basically,
environmental crime theories. Readers are encour-
Defensible Space calls for proprietors and
aged to further examine the theories outlined
legitimate users of residential space to act as
here, as they are an important aspect of crime con-
guardians of their living areas. To quote from
trol. While certainly not the only theories, rational
Architectural Design (p. 2):
choice, routine activities, CPTED, Defensible Space,
Physical mechanisms for achieving Defen-
crime pattern theory, and situational crime preven-
sible Space are as follows:
tion techniques comprise an important basis for
● Those which serve to define spheres of explaining some of the root causes of why certain
influence of territorial influence which crimes may occur repeatedly in specific locations.
4. There are ______ aspects of displacement? c. Acting under the influence of drugs or
a. Three alcohol
b. Four d. The absence of a capable guardian
c. Five
d. Six ANSWER KEY
5. There are three key concepts specific to Manual Questions
CPTED. Which of the following is not one? 1. Environmental Crime Prevention and Social
a. Natural surveillance Crime Prevention
b. Defensible space 2. Environmental, location, criminal
c. Natural access control 3. potential, criminal
d. Territorial behavior 4. Displacement
6. There are _____ main categories of 5. Diffusion, security
Situational Crime Prevention Techniques. 6. Location
a. Three 7. Rational choice theory
b. Four 8. Rational choice theory
c. Five 9. Six
d. Six 10. Defensible space
7. Further, the categories have ___________
different sub-categories? Interim Questions
a. Three 1. Potential, target, capable
b. Five 2. Crime pattern, environmental clues
c. Seven 3. Residential, natural, natural, territorial
d. Nine 4. CPTED, increase
8. Defensible Space: Crime Prevention 5. Benefits, situational, techniques, decrease
Through Urban Design was created by: 6. Five
a. Oscar Newman 7. Five
b. Marcus Felson 8. Oscar Newman
c. Patricia Brantingham 9. Defensible Space
d. Ronald V. Clarke 10. Acting under the influence of drugs or alcohol
9. This revolves around public housing and
seeks to reduce crime through the use of Ten Final Questions
natural surveillance, natural access control 1. Defensible, guardians
and territorial concern. 2. Situational, crime, five
a. Crime Prevention Through 3. rational
Environmental Design (CPTED) 4. Environmental, Chicago, location
b. Crime Pattern Theory 5. Natural, illegitimate
c. Defensible Space 6. Location
d. Rational Choice Theory 7. Rational choice
10. Routine Activity Theory, developed by 8. Five
Cohen and Felson, revolves around three 9. Five
things: which of the following is not one of 10. Defensible Space
the three factors?
a. A potential offender
b. A suitable target
14
Physical Security Concepts and
Applications
Kevin T. Doss and
Denis A. O’Sullivan
161
162 14. PHYSICAL SECURITY CONCEPTS AND APPLICATIONS
added benefit of the security planning process according to their nature. All threats can be
is the potential for increased security awareness grouped under the following headings: indus-
throughout every level of the organization. trial disaster, natural disaster, civil disturbance,
The security planning process consists of the crime, and other risks.
following five steps: Industrial disasters—these should be easy
to identify, associated threats related to on-site
1. Assets are identified.
or adjacent activity. The following are typi-
2. Loss events are exposed.
cal industrial disasters that might affect most
3. Occurrence probability factors are assigned.
companies: explosions, fires, major accidents,
4. Impact of occurrence is assessed.
and structural collapse. To correctly assess the
5. Countermeasures are selected.
threat, you must intimately know the nature of
Let’s look at each of these steps. company activity, the nature of activity on adja-
cent properties, dangerous routes, flight paths,
1. Assets are identified
and the existence of nearby major oil or gas
At first glance, this step would appear easy;
pipelines.
however, this is not necessarily the case. Have
Natural disasters—the potential for a natu-
you ever attempted to take inventory of your
ral disaster largely rests with the geographic
personal property? The major problem seems
location of the company property. If the prop-
to be “how to;” that is, do we include every nut
erty is located in the southeast United States, it
and bolt? For the purpose of following the secu-
is reasonable to identify hurricanes as possible
rity process, this is not necessary. It should suf-
loss events. Similarly, if the property is located
fice to group assets according to category except
in California, it would be reasonable to plan for
where an item is especially attractive (from a
earthquakes. Other areas may suggest the need
thief’s viewpoint) and valuable. The following
to identify floods or tornados as threats.
categories should encompass the majority of
Civil disturbance—most companies can be
assets for most companies:
threatened either directly or indirectly by actions
– land – buildings that can be categorized as civil disturbances. If
– heavy machinery – production equipment your company is engaged in weapons technol-
– office equipment – office furniture
ogy, or indeed any activity that might be viewed
as threatening the environment, it is reasonable
– vehicles – cash or other negotiables
to expect that the company might become the
– goodwill – public image target of demonstrators. All labor disputes fall
– raw material – finished product under this heading.
Crime—it is relatively easy to identify crimes
Depending on the nature of the company’s
that might affect company operations. Any
activities, there may be other categories. In any
or all of the following will affect most compa-
event, there is one asset which has not been
nies: arson, assault, bomb threats, breaking and
mentioned primarily because it is controversial:
entering, theft, and vandalism. If a company is
employees. Employees are a company’s most
engaged in high-tech, it would be reasonable to
valuable asset, although some people do not
also include espionage, extortion, and sabotage
like to group them with all the other assets.
as likely threats.
2. Loss events are exposed Other risks—this is meant to be a catch-all
This step consists of exposing all possible for those threats that do not neatly fit the above
threats to the assets that were identified. Similar categories. Two examples are disturbed persons
to how we group assets, we group threats and loss of utilities.
accurate calculations can be made. In addition, Referring to our matrix, we can quickly see
one must document the process and keep accu- that the recommended level of protection is
rate written records of the recorded data. This “level IV,” the highest level possible. This would
allows for better-informed decisions regarding suggest using an effective detection system cou-
the selection and implementation of physical pled with an efficient suppression system.
security countermeasures. The large number and variety of assets and
There are several methods or processes avail- associated threats means that we will end up
able to the security practitioner when select- with a complex pattern of different levels of
ing countermeasures; however, the simplest protection. This is not as confusing as we might
method to ascertain the desired levels of pro- expect, particularly if we think in terms of
tection is a matrix as illustrated in Figure 14-1. security-in-depth.
For example, consider the threat of fire. The Security-in-depth, also known as layered
probability of a fire can be rated as “moderately protection, is a concept that means placing a
probable” for most types of businesses; from a series of progressively more difficult obstacles
criticality point of view, we must consider fire in the path of an aggressor. These obstacles are
as potentially “very serious.” often referred to as lines of defense.
Unimportant I I I I
Moderately
I II II II
Serious
Levels of Security
I Low
II Medium
III High
IV Very High
2. Design should allow for an acceptable level types of gaseous discharge lamps take 2 to 5
of redundancy, without any unnecessary minutes to reach maximum intensity. They are
duplication of effort. very effective in areas where fog is prevalent.
A word of caution in relation to gaseous dis-
A systems approach is often referred to as charge lamps is that they make color identifica-
“systems engineering.” tion unreliable.
The remainder of this chapter will concen- Metal halide lamps are also of a gaseous
trate on the physical components of a protec- type, but due to the excellent color rendition
tion program. While space will not permit great this lamp offers, it is recommended for many
detail, we will attempt to explain the major security applications. Metal halide lamps can be
points relative to security lighting, security glaz- used very effectively with color CCTV cameras
ing, alarm systems, card access systems, locks due to the light properties which imitate natu-
and keying, closed circuit television, safes and ral daylight. The downside of this lamp is that
vaults, and fencing. it is expensive to use.
Incandescent lamps are typically used in res-
idential homes for lighting. They are very ineffi-
SECURITY LIGHTING cient and have limited use for security purposes
due to the short lifecycle and expense of use.
Security lighting has three primary objectives: Quartz lamps emit a very bright white
light. Lighting may be classified as floodlights,
1. It must act as a deterrent to intruders.
searchlights, fresnels, and street lighting. The
2. It must make detection likely if an intrusion
difference between floodlights and searchlights
is attempted.
is that searchlights project a highly focused
3. It should not unnecessarily expose patrolling
beam of light, whereas floodlights project a
personnel.
concentrated beam. Fresnels produce a rectan-
Lighting systems are often referred to gular beam of light and are particularly suit-
as “continuous,” “standby,” and “movable” or able for illuminating the exterior of buildings.
“emergency.” Streetlights produce a diffused light and are
Continuous lighting is most commonly used. suitable for use in parking areas and driveways.
Lamps are mounted on fixed luminaries and are Certain lighting intensities are recommended
normally lit during the hours of darkness. for specific situations.
Standby lighting is different from continu-
ous lighting in that the lamps are only lit as Perimeter or property boundary 0.15 to 0.4 fc
required. Parking lots (open) 2.0 to 3.0 fc
Movable or emergency lighting is portable Parking garage (enclosed) 5.0 to 6.0 fc
lighting that may be used to supplement either Vehicle entrances 1.0 fc
continuous or standby lighting. Light sources Pedestrian entrances (active) 5.0 fc
may be incandescent, gaseous discharge, or
Exterior of buildings 1.0 fc
quartz lamps. The common lightbulb emits
incandescent light. Open yards 0.2 fc
Gaseous discharge lamps are street-type
lighting and may be either mercury vapor or The foregoing are suggested lighting inten-
sodium vapor lamps. Mercury vapor lamps sities only; specific circumstances may dictate
emit a strong light with a bluish cast. Sodium different intensities. To explain the suggested
vapor lamps emit a soft yellow light. Both intensities, “fc” means foot-candle and simply
for many cash-handling situations, such as those program. Intrusion sensors are typically inte-
which occur in banks. Polycarbonate, consisting grated with physical barriers, such as a door
of several sheets of plastic laminated together, is or window, and must take environmental
highly resistive to ballistics; however, visibility is conditions into consideration to be effective.
somewhat impaired. Selection of the appropriate detector, from the
Special purpose: Under this heading, we will numerous and varied options available, is often
look at transparent mirror glass, coated glass, a difficult task. The end user is well-advised
heated glass, and rough or patterned glass. to become familiar with the different types of
Transparent mirror glass may be installed in a detectors/sensors available and must evaluate
door or in a wall. From one side, it is functionally both the application and environmental con-
a mirror, and from the other, it permits an unob- ditions prior to implementation. If relying on
structed view through the mirror. The primary advice from a vendor for proper intrusion sen-
purpose of transparent glass is for surreptitious sor selection, it is essential that the end user
surveillance. Flow-on or cement-on plastic coat- describe their objectives and make the vendor
ing is available for application to existing installed contractually responsible for meeting those
glass. This material may serve well as an interim stated objectives.
measure until a more appropriate vandal-resistive In the following paragraphs, we will look at
material can be installed. Rough or patterned glass different types of detectors: magnetic switches,
is available with many different designs that make metallic foil, audio, vibration, ultrasonic, photo-
it range from practically opaque to practically electric, passive infrared, microwave, dual tech-
transparent. This type of glazing is most appropri- nology, and video motion.
ate where there is a conflict between the need for Magnetic switches: These are often referred
privacy and natural light. to as door contacts. They may be either sur-
face-mounted or recessed. The choice is largely
an aesthetic one; however, the recessed ones
INTRUSION DETECTION do afford more protection from tampering.
Switches are commonly “unbalanced,” which
Every intrusion detection system is meant to means that they may be defeated by substitu-
detect the following: tion of a secondary magnetic field to keep the
contacts in the open position while the detector
1. Unauthorized entry magnet is moved away from the housing con-
2. Unauthorized movement within taining the contacts.
3. Unauthorized access to controlled areas or For high-security applications, a “balanced”
objects switch is available. This switch is designed to
There are three components to an intrusion withstand defeat by creation of a secondary
detection system: magnetic field. Magnetic switches have many
potential uses in addition to their traditional
1. Detectors/sensors use on doors and windows. They may be used
2. System controls on desk or file cabinet drawers or to secure
3. Signal transmission equipment to a fixed position.
Metallic foil: This is a narrow strip of metal
foil designed to break if the surface to which
Detectors/Sensors
it is attached is attacked. It is mostly used as
The design and implementation of intrusion a glass breakage detector and is commonly
sensors are critical for any physical security seen on storefront windows and glass doors.
The data processing equipment basically station to a commercial station in the event of a
acts as a receiver and interpreter of signals holdup of the monitoring personnel.
from the sensors/detectors and reacts to these Commercial monitoring falls into two cate-
signals in accordance with preprogrammed gories: monitoring stations or answering ser-
instructions. vices. The answering services are useful for the
The signal transmission equipment is the economical monitoring of signals transmitted
means by which an alarm is raised. This equip- by telephone dialers; however, this is not for
ment may simply activate a local siren, or it high security systems. Commercial monitoring
may send a signal over telephone wires to a stations are either Underwriters Laboratories
remote monitoring location. The telephone (UL) approved or they are not. UL-approved is
wires may be either dedicated (the most secure the best guarantee of quality service.
system) or through the normal telephone net- Note: An initial step in planning an intrusion
work by use of a digital dialer that transmits to detection system is to identify zones of pro-
a special type of receiver/decoder. tection in the building that will create a series
The on/off and reset controls can be keys, of independent subsystems. Each subsystem
toggle switches, or digital keypads. The digital should (1) be compatible with normal opera-
keypad is recommended. The backup power tions, and (2) allow for prompt response to a
supply is essential in case the electrical power specific problem area.
supply fails or is sabotaged. When the functional requirements of a sys-
The LED (light-emitting diode) system sta- tem have been identified, the system engineer-
tus indicators use different colors to indicate ing should be left to experts.
whether the system is on or off, or if there is
trouble in the system. The usual colors are red
for system okay (but in the off mode), yellow
for trouble somewhere in the system, and green CARD ACCESS
for armed and properly functioning.
The decision to use, or not to use, a card
access system should be based on the perceived
need for accountability and the accompanying
SYSTEM MONITORING financial considerations. An objective statement
for a card access system might read: “To eco-
There are basically three options: nomically eliminate the inherent security weak-
1. Local nesses in key access systems by electronically
2. Proprietary supervising and documenting the activities or
3. Commercial persons authorized to access the property.”
To be useful, a card access system should
A local system is just that, a siren or bell on have the following minimum capabilities:
the outside of the protected premises. This sys-
tem is not recommended due to its reliance on a ● Restrict access by authorized persons
passerby to actually call the police. to certain times and/or days of the
The proprietary system is similar to a local week.
system in that the system is monitored on-site ● Allow controlled after-hours access to
or remotely by employees of the owner of the selected areas within.
protected premises. If this system is used, it is ● Control after-hours access to a
advisable to have a link from the proprietary parkade.
Badge
number
analyzed
Valid
Time zone Door opens
badge
allows access for seconds
number
Door
relocks
Electric locks are particularly suitable for the Note: It is essential that the fire department
following: be consulted prior to any final decision on the
locks of any door that may be considered an
● Remote control of the after-hours pedestrian
emergency exit. Get their decision in writing,
entrance door
and carefully consider it before compliance.
● Grade-level emergency exit doors
Emergency exit devices that are normally
● Exit doors from stairwells to grade level
used on emergency exit doors cause justifi-
● All stairwell doors
able security concern. If permitted, only qual-
Electric locks are available where the strike ity electric or electromagnetic locks should
is normally in the locked or unlocked position. be used. If electric or magnetic locks cannot be
Electromagnetic locks are particularly suitable for used, great care should be taken to ensure
use on emergency exit doors, as there are no mov- the emergency devices use such features as
ing parts that can accidentally become jammed. the following:
Several conditions must be met before this type
of lock can be used on an emergency exit door: ● Deadbolts
● A manual or automated egress device to ● Deadlocking latches
unlock door within close proximity. ● Vertical locking bars for pairs of doors
● When activated, the fire alarm system must
be able to automatically deactivate the Remember that emergency exit devices can
locking device. be connected to a proprietary or commercially
● Each location must have a fire pull station monitored alarm system. Loud local alarms
in its vicinity, and its activation must are also an effective way to protect emergency
automatically deactivate the lock. exits.
department. Each scene must stand on its own Housings—several types of housings are
merit and be identifiable during playback. available. They fall into two categories: aes-
Weather monitoring is another example of an thetic and environmental. Housings can also
application using a scene view. effectively disguise the existence of a camera.
Great care must be exercised in designing a Monitors—monitors are available in differ-
CCTV system to ensure that the objectives are ent sizes and in color, monochrome, or LCD.
achieved. Caution is also necessary to ensure When a quality image is required, it is neces-
that costs do not get out of hand. This is a com- sary to use a high-resolution screen.
mon problem when the system is not designed Sequential switches—it is not necessary, or
by a security expert. usually desirable, to have a monitor for every
The following are suggested practical appli- camera. By using a sequential switcher, the
cations for CCTV: image from two or more cameras can be rou-
tinely rotated for viewing on one monitor. When
● Parkade areas, entrances/exits, shuttle
required, an operator can lock on the image
elevator lobbies, stairwells, and elevators
from one particular camera for select viewing.
● Shipping/receiving areas
Motion detectors—cameras are available
● Main floor elevator lobbies
with built-in motion detection capability. If
● Cross-over floors
movement occurs within the field of view of the
● Cash handling areas
camera lens, an alarm will sound at the control
All CCTV systems are made up of several center, or a video recorder will be activated to
components that an end user should be, at the record the activity that caused the alarm. This
very least, familiar with. The following is a brief feature is very valuable when using a large
description of each component: number of monitors.
Cameras—a primary consideration in rela- Pan/tilt/zoom—the need to use several cam-
tion to camera selection is the available light eras to cover an area or activity can be avoided
coupled with required image quality. The two by carefully positioning one camera and pro-
most common cameras in use today are the viding pan/tilt/zoom features.
charge coupled device (CCD) and the comple- Controls—in addition to the normal televi-
mentary metal oxide semiconductor (CMOS). sion controls, controls will be required for what-
Both are relatively stable camera platforms that ever special features are built into the system.
outperform older camera technology. Consoles—the design of a control center
Lenses—there are three major types of lenses console that houses a CCTV system is definitely
available for cameras today. They are fixed lens, an engineering task. Care must be exercised to
varifocal lens, and zoom lens. The fixed lens only ensure operator comfort, particularly in relation
offers a single point of view and is best used on to viewing angles and ease of accessibility of
indoor applications due to the more consistent controls.
environment. The varifocal lens offers a range Video recorders—a CCTV system should be
of views and great flexibility in application, as considered incomplete if it does not have the
long as the range is within the lens capabilities, ability to selectively record events. Recording
and the lens does not need to be refocused. The can be done on VHS recorders; however, these
zoom lens, by contrast, is best for situations in are quickly being replaced by digital video
which the lens needs to be refocused, should recorders (DVRs) and by network video record-
one change the field of view. The focus on a ers (NVRs). In some cases, the recordings are
zoom lens is maintained either through manual sent directly to a computer server using a graph-
or motorized adjustments. ical user interface (GUI). The GUI eliminates
Camera
Burglary-Resistive Safes
Interiors
In addition to their actual construction,
burglary-resistive safes have a number of pro- Sufficient options are available in interior con-
tective features: figurations so that the need for customization can
be avoided. Available features include fixed or
● Locks adjustable shelving and enclosed compartments
● Interior design that may be either key or combination-locked.
● Depository Available options increase proportionately to the
● Time locks size and cost of the safe.
● Time delay locks
● Relocking device
Depository
● Extra weight
● Floor anchoring This feature permits the insertion of prop-
● Counterspy dials erty, most often cash, without allowing access
to the safe contents. The depository is usually structural reasons, is floor anchoring—provided
fitted with an antifish device to inhibit retrieval a concrete slab is available.
of deposited property.
Counterspy Dials
Time Locks
It is not uncommon for thieves to note the
Time locks prevent access to the safe con- combination of a safe while surreptitiously
tents for predetermined timeframes by persons viewing it being unlocked. A counterspy dial
normally authorized for access. For example, prohibits anyone other than the person imme-
when a bank safe is locked at the close of the diately in front of the dial to see the numbers,
business day, it cannot be opened again until and only one number is visible at a time.
the following morning. Should the bank man- Apart from the foregoing obvious security
ager be taken from his home forcibly, he cannot features, we can tell little about a safe by look-
be forced to open the safe. ing at it; nowhere can appearances be more
deceptive. For this reason, a purchaser has to
Time-Delay Locks rely on a particular vendor or on independent
This feature is designed to protect against a appraisal. Independent appraisal is available
holdup. Opening a safe equipped with this fea- from Underwriters Laboratories Inc. (UL). If
ture requires keying the lock, followed by a pre- a manufacturer submits a product sample to
determined waiting period, before the locking UL, they will conduct various tests and issue
mechanism will unlock. A safe with this feature authority to the manufacturer to affix a specific
label to the protected line. The following UL
is often used at late-night convenience stores or
labels are available:
24-hour gas stations.
UL Labels Resistant to Attack From
Relocking Devices T.L.-15 Ordinary household tools for
15 minutes
These devices are designed to act as a second-
ary locking feature if the normal one is attacked. T.L.-30 Ordinary household tools for
30 minutes
For example, if someone attacks the combina-
tion dial with a sledgehammer, the relocking T.R.T.L.-30 Oxyacetylene torch or ordinary
household tools for 30 minutes
device will activate. After this happens, only a
qualified safe expert can open the safe. T.R.T.L.-30 6 Torch and tools for 30 minutes,
six sides
X-60 Explosives for 60 minutes
Extra Weight
T.R.T.L.-60 Oxyacetylene torch for 60
To prevent thieves from simply walking minutes
away with a safe, it is recommended that a safe T.X.-60 Torch and explosives for 60
weigh a minimum of 340 kg or 750 lbs. Most minutes
large safes do weigh 340 kg, and smaller ones T.X.T.L.-60 Torch, explosives, and tools for
can be ordered with extra weight added. 60 minutes
and it was not uncommon for the complete a risk assessment. It is also necessary to gain
frontiers of kingdoms in China to be walled a thorough understanding of the enterprise’s
(origin of the Great Wall of China). Closer to operation. For the purpose of this article, we
home, the old city of Quebec remains the only will discuss the fencing requirements for a typi-
enclosed city in Canada and the United States. cal manufacturing plant located in an industrial
Modern acts of terrorism and civil distur- area of a large city. The objective of the fenc-
bance have resulted in innovations in the types ing program is twofold—to control movement
and usage of fencing. Barbed tape (razor rib- to and from the property, and to minimize the
bon), a modern version of barbed wire, is a very need for costly manpower at control points. The
effective (if not vicious) defensive, or should we latter is to be attained by keeping the number of
say, offensive material. Its use is rarely justified, perimeter openings to a minimum.
except where the highest standards of secu- While it is true that the industry is becoming
rity are necessary—for example, in a federal ever more security conscious, it is also true that
penitentiary. the owners of industrial facilities do not want
The use of barbed tape in industrial facili- their property to look like a prison compound
ties is not common in North America. Barbed or armed camp. With this in mind, the first
tape can be used in coils along the top of fences, objective is to define the boundary of the prop-
instead of the conventional barbed wire over- erty. Most often, this will require a combination
hang. In very high-risk situations, coils of of structural and psychological barriers.
barbed tape stacked in a pyramid configuration From a psychological point of view, we are
between a double conventional fence will pro- only concerned with defining the boundary—-
vide a very effective defense. mostly for legal reasons, prevention of trespass,
Another product of modern terrorism is and liability lawsuits. Property definition may
the freely rotating barbed wire fence topping be simply a change in landscaping, or indeed,
recently developed in Ireland. When a would-be anything that distinguishes the property from
intruder grabs the overhang in an attempt to its neighbor.
gain leverage, a second overhang simply rotates Somewhere between the property line and the
into place. This is more effective than the con- area of company activity, it will be necessary to
ventional overhang and much more acceptable install a structural barrier that will act as a phys-
for routine application than coils of barbed tape. ical deterrence to the would-be intruder. Usually,
Fencing as used in most applications is the this barrier is a chain-link fence, and it should be
common chain-link type with a barbed wire, topped with a barbed wire overhang. The fol-
outward facing overhang. A major weakness lowing are suggested minimum specifications:
with the chain-link fence is the ease with which
it can be climbed. To overcome this problem, 1. Minimum of 70 in height excluding top
the British developed the “welded mesh fence.” overhang.
Compared to the 2-square-inch opening in 2. Wire must be 9-gauge or heavier.
chain-link fence fabric, the welded mesh fence 3. Mesh openings must not be larger than 2
has openings of 1.5 square inches. The openings square inches.
are 3 ½ and run vertically. The narrowness 4. Fabric must be fastened securely to rigid
of the openings makes it almost impossible for a metal or reinforced concrete posts set in
climber to gain purchase. The width of the open- concrete.
ings also inhibits the use of wire or bolt cutters. 5. There should be no more than 2 inches
Prior to making any decision on the location between the bottom of the fence and the
and type of fencing, it is necessary to conduct ground.
mutual benefits within the entire organization. of exposure to concepts and theory in security
When an organization can integrate their video, management. If already employed in the secu-
intrusion, and access control systems into their rity industry, an advanced degree can lead to
information technology systems, there are effi- faster promotions or an increase in salary.
ciencies that can improve the entire organization. Work experience is also a critical component,
A basic example of convergence would be and when combined with the proper education,
using the access control system over the corpo- it can lead to opportunities not afforded to those
rate network to transfer data and integrate with without the benefit of continued education.
the employee time and attendance system. The Universities such as the University of
human resources department can then utilize Leicester in the United Kingdom specialize in
the access control database (a physical security the compilation and distance education deliv-
subsystem) to track and calculate employee ery of security-specific educational opportu-
attendance and hours worked. Although this is nities. A bit closer to home, schools such as
a very basic example of convergence, it shows American Military University, York College of
how security technology can drive business Pennsylvania, and Eastern Kentucky University
efficiency and lower operating costs through offer studies that can be tailored to one’s spe-
convergence. cific area of focus. A fairly comprehensive list
One of the greatest challenges with con- of universities and colleges that offer security-
vergence is due to many departments having related degree programs can be found online at
different reporting structures, and correspond- http://www.asisonline.org/education/univer-
ingly different missions, within the orga- sityPrograms/traditionalprograms.pdf/
nization. Budgetary funding and political
wrangling can often hinder a converged envi-
ronment. Some organizations have created a PHYSICAL SECURITY
Chief Security Officer (CSO) position to assist CERTIFICATION
in the convergence of information technology
and procedures into the physical security func- ASIS International offers the only board cer-
tion. The CSO position usually has some over- tification program for physical security profes-
sight and direct accountability to make sure sionals worldwide. The ASIS Board Certified
that multiple departments work together in a Physical Security Professional (PSP) designa-
converged environment for the betterment of tion focuses on one’s proficiency in three major
the organization. domains of knowledge:
1. Physical security assessment
2. Application, design, and integration of
CONTINUING EDUCATION physical security systems
3. Implementation of physical security
There are many benefits in continuing one’s
measures
education in the security field. Continued
education is part of the career planning phase The course reference materials are comprised
and should not be overlooked as a method of eight publications, offering a substantial look
of differentiating oneself in the job market. It at physical security-related topics designed to
is more important than ever today to continu- assist security professionals in their career field.
ally improve one’s knowledge and education. It is important to point out that the ASIS
Employers are searching for employees that are “Board-Certified” designation brings accredi-
dedicated to their field and have a wide range tation to the certification process, and thereby
EMERGING TRENDS
The physical security field is quickly develop- directly from the manufacturer. Surreptitious attack
ing futuristic technologies to meet developing methods on smart locks are difficult, if not impos-
threats. The industry is adopting automated tech- sible, to achieve, thus making such locking devices
nologies to assist in the detection and assessment more effective when protecting critical assets.
phases prior to a security force response. Visual Currently, security professionals are being
analytics, which is the science of computer-aided asked to do more, using fewer resources, which
assessment for surveillance systems, is becom- can make the task daunting, even for the best and
ing more accurate, which has led to deployments brightest. Recent terrorist attacks have hastened
around the world. These analytically driven solu- the technology curve in order to develop robust,
tions allow for rapid detection and assessment scalable, user-friendly physical security solutions
using facial recognition, psychology of motion, in the never-ending effort to prevent such acts.
path analysis, and much, much more. The need for new technologies will be critical to
Even “simplistic” devices such as locks are allow these practitioners to respond and mitigate
becoming “smart” through the use of computer the risk. It is evident that as the threats become
chips and RFID technology. These smart locks are more sophisticated, physical security technol-
almost impossible to pick and do not allow for cop- ogy must improve to meet those challenges, both
ies of the keys to be made, except when ordered now and in the future.
S E C URI T Y QU IZ a. True
b. False
1. Risks are usually categorized into three 6. Deadbolt locks should have a minimum of a
categories. (Select one that does not apply) ½ throw.
a. People a. True
b. Property b. False
c. Legal liability 7. Card access systems permit accountability.
d. Insurance a. True
2. Physical security planning is a recognized b. False
security process that, if followed, will result 8. The most commonly used security fencing
in the selection of physical countermeasures material is:
based on appropriateness. a. Barbed wire
a. True b. Barbed tape
b. False c. Chain-link
3. The security planning process consists of d. Welded wire mesh
following a selected number of steps. 9. The minimum height of a security fence
a. Three should be:
b. Four a. 7 feet
c. Five b. 6 feet
d. Six c. 8 feet
4. Security-in-depth is also known as: d. 9 feet
a. Layered protection 10. Which of the following types of lighting are
b. Concealed protection only lit on an as-required basis?
c. Altered protection a. Continuous
d. Necessary protection b. Standby
5. Microwave detectors use high-frequency c. Movable
sound waves to establish a protected area. d. Emergency
15
Alarm System Fundamentals
Doug Durant and
Kevin Pound
183
184 15. ALARM SYSTEM FUNDAMENTALS
and software elements that require considerable many cases, this will scare the criminal off before
skill and training of assigned security staff. the crime can be completed. However, in other
The most effective physical security is “lay- instances, a seasoned criminal may realize a
ered.” An alarm system should be designed to response is dependent on someone in the local
provide one or more layers of detection around area not only hearing the alarm, but also taking
an asset. Each layer is made up of a series of action to investigate it. In short, the criminal may
detection zones designed to isolate the pro- be well aware that he has a certain amount of time
tected property and to control the entry and exit to “work,” despite the activation of the alarm.
of authorized personnel and materials.
In more sophisticated systems, sensors are
interfaced with electronic entry-control devices, 2. Central Station Monitoring
Closed circuit television (CCTV), alarm report- This is the best and most popular method of
ing displays (both visual and audible), and alarm monitoring. It consists of a company that is
security lighting. As you can see, the alarm sys- paid to provide monitoring services for a variety
tem can serve as a crucial “layer” in any physi- of clients. Typically, these alarm companies charge
cal security plan. a one-time installation fee and then bill monthly
for monitoring services. Alternatively, many larger
businesses may have all of their alarm signals
ALARM MONITORING monitored by their own control centers and have
an in-house or proprietary security force respond.
Your involvement with an alarm system will When an alarm signal is received, an
depend largely on how it is monitored. There employee of the alarm company is responsible
are four methods of monitoring. for notifying the police so they can respond. In
most cases, a company’s security officers are
also notified so they can respond as well.
1. Local Monitoring
Despite its popularity, central station moni-
This is the simplest form of alarm monitor- toring is not without problems. There have been
ing. It consists of a bell or horn located near the several documented cases where the alarm com-
protected door or window. In the event of an pany failed to make the proper notifications.
attempted penetration, the resulting sound is Some alarm companies will provide their own
intended to alert nearby police, security person- security officers to respond to and investigate
nel, neighbors, or company employees. alarm conditions. In these instances, the alarm
A major drawback of this approach is the fact company’s employees must be given keys to
that many people will not bother to investigate the protected premises in order to investigate
a blaring alarm. Furthermore, manpower short- alarms. From a security and business viewpoint,
ages often make a security or police response this should be considered an additional risk.
impractical. Although relatively inexpensive to
install, this form of alarm monitoring does not
provide an adequate level of protection for most
3. Direct Fire or Police Monitoring
situations. Also, a potential criminal can disable This is no longer a common method of alarm
these alarms relatively easily. In many jurisdic- monitoring. However, in some rural or remote
tions, local municipal noise laws require the bells jurisdictions the local police or fire station will
or horns to stop after a required period of time. monitor alarms from their headquarters. When
When activated, the audible alert tells the used, this method tends to be a relatively reli-
intruder his activities have been noticed. In able way to monitor alarms.
system. The types of controls provided usually Area protection is also sometimes called
depends on the type of display the system uses. volumetric protection. The sensors used for this
For example, keypads consist of a numeric or purpose protect the interior spaces of a busi-
LCD display system that are generally pro- ness or residence. These devices provide cover-
vided with a 12-digit keypad and several func- age whether or not the perimeter is penetrated
tion keys. These allow the operator to perform and are especially useful in detecting the “stay-
such actions as to secure, access, acknowledge, behind” criminal. As a general rule, area sen-
and reset alarms. sors may be active or passive. Active sensors
(such as microwave) fill the protected area with
an energy pattern and recognize a disturbance
ALARM SENSORS in the pattern when anything moves within the
detection zone.
A basic alarm system is divided into three By contrast, active sensors generate their
layers: perimeter protection, area protection, own energy pattern to detect an intruder. Some
and spot protection. Perimeter protection is the sensors, known as dual-technology sensors, use
first line of defense to detect a potential intruder. a combination of two different technologies,
Alarm sensors on the perimeter are typically usually one active and one passive, within the
mounted on doors, windows, vents, and sky- same unit.
lights. Since a vast majority of burglaries are Sensors used for area protection include the
committed using such openings, it is important following:
that they be a priority for protection. Commonly Microwave motion sensors. With microwave
used perimeter sensors include the following: motion sensors, high-frequency electromagnetic
Glass-break sensors. These detect the break- energy is used to detect an intruder’s motion
ing of glass. The noise from breaking glass con- within the protected area.
sists of frequencies in both the audible and Passive infra-red (PIR). These motion sen-
ultrasonic range. Glass-breakage sensors use sors detect a change in the thermal energy pat-
microphone transducers to detect the glass break- tern caused by a moving intruder and initiate
age. The sensors are designed to respond to spe- an alarm when the change in energy satisfies
cific frequencies only, thus minimizing such false the detector’s alarm criteria. These sensors are
alarms as may be caused by banging on the glass. passive devices because they do not transmit
Balanced magnetic switch. Balanced mag- energy; they monitor the energy radiated by the
netic switches (BMSs) are typically used to surrounding environment.
detect the opening of a door, window, gate, Dual-technology sensors. To minimize the
vent, skylight, and so on. Usually, the BMS is generation of alarms caused by sources other than
mounted on the doorframe, and the actuating intruders, dual-technology sensors combine two
magnet is installed on the door. The BMS has different technologies in one unit. Ideally, this is
a three-position reed switch and an additional achieved by combining two sensors that, individ-
magnet (called the bias magnet) located adja- ually, have high reliability and do not respond to
cent to the switch. When the door is closed, the common sources of false alarms. Available dual-
reed switch is held in the balanced or center technology sensors combine an active ultrasonic
position by interacting magnetic fields. If the or microwave sensor with a PIR sensor.
door is opened or an external magnet is brought Spot protection is used to detect unautho-
near the sensor in an attempt to defeat it, the rized activity at a specific location. It serves as
switch becomes unbalanced and generates an the final protective layer of a typical alarm sys-
alarm. tem. Assets most commonly secured with spot
EMERGING TRENDS
Alarm systems have and will continue to situation and allow them to respond effectively.
form a part of a protection plan in the fore- This will continue to help lower the false alarm
seeable future. However, the technology and rates and will help organizations comply with
reporting mechanisms that form part of an local and regional false alarm legislation.
alarm system continue to broaden. As with any Sensor technology continues to change, allow-
technology, end users will continue to look for ing for larger and more complex facilities or
smarter, faster, and more economical solutions. structures to be protected, along with new ways
The use of video analytics, in combination with to send those signals. Methods of alarm notifi-
CCTV, along with voice verification, will help to cation continue to be explored with improved
provide verified alarms. Alarm signals that gen- ways to provide mass notification alerts to large
erate attached video or captured images of the employee or student populations. Instant mes-
location of the alarm will provide the end user saging, text alerts, and cellular messaging are
with a clearer picture and understanding of the some of the options being used and improved.
● Maintain radio contact with fellow officers ● Know your company’s policy for alarm
and your security control center. response. Use common sense and avoid
● Maintain sound discipline. Keep radio volume complacency that can lead to tragic
low. Secure noisy keys and other equipment. consequences.
● If upon arrival to the scene, you detect ● Know of or how to locate appropriate phone
broken glass or other indications of an numbers and passwords for your monitoring
intrusion, do NOT proceed into the building. station.
Call the police and assume a position from ● Keep emergency call lists, updated with
where you can be a “good witness.” appropriate call-out lists, as well as local
● Evaluate all alarm information. Has there authorities.
been just one alarm? Is there a series of
Any alarm system is only as good as the
alarms which might indicate someone is
people who operate, monitor, and respond to it.
actually moving around the interior of the
Protection officers must be properly trained to
building? The professional evaluation of all
respond to alarms. They must understand how
alarms can assist you in determining where
their system works and the need to treat every
the intruder is. Relay this information to
alarm seriously.
responding police units.
S E C URI T Y QU IZ c. Four
1. In many cases, ________________ d. Six
______________ form the backbone of a 6. Which of the following is not a type of alarm
facility’s physical protection program. monitoring?
a. Alarm systems a. Central station
b. Covert surveillance b. Direct fire and police
c. Report writing c. Satellite
d. Physical force d. Proprietary
2. The primary purpose of an alarm system is: 7. Logging devices are used for:
a. To conduct area surveillance a. Recording system activities and faults
b. To serve as a physical barrier b. Controlling CCTV cameras
c. To provide early warning of an intruder c. Recording time and attendance of security
d. To lower insurance rates staff
3. According to the text material, the most d. Access control to computer networks
effective security is provided with a: 8. Alarm printers are typically:
a. Technical approach a. Of the color laser type
b. Layered approach b. Of the high-speed, continuous-feed type
c. Large security force c. Black and white and medium speed
d. Key and lock program d. Extremely expensive
4. In more sophisticated alarm systems, sensors 9. A glass-break sensor is an example of:
are interfaced with electronic entry-control a. A perimeter sensor
devices, CCTV, alarm reporting displays b. A spot sensor
(both visual and audible), and _____________ c. An area sensor
_____________. d. A volumetric device
a. Police patrols 10. A duress alarm is also sometimes called:
b. Aerial units a. A reset button
c. Sniper teams b. A panic button
d. Security lighting c. Activation switch
5. How many different types of alarm d. A silent partner
monitoring were examined in the text?
a. Two
b. Three
16
Access Control
Colin Best
191
192 16. ACCESS CONTROL
those who are unauthorized. This form of aid- that it is within the legal rights of the protec-
ing access control is common in large apartment tion officer to perform the arrest. The addition
complexes. Recognition of regular occupants by of locks to alternate entrances to the facility or
the security officer is actually considered a very property will also control access. Other forms of
secure form of controlling access; however, this additional physical security, such as CCTV and
“soft” method of access control becomes less alarm systems, will further assist in the preven-
effective as the volume of traffic increases. tion of unauthorized access, although physical
Achieving the task of controlling access may be security must not interrupt safe egress from the
considered somewhat difficult if an officer were, property or site in the event of an emergency.
for example, assigned the task to control access
to a property consisting of acres of land with no
fences or physical boundaries. Access control
EMERGENCY ACCESS CONTROL
could only be achieved by frequent patrols of
One must be sure, when controlling access, that
the protected area, challenging those unfamiliar
egress in the event of an emergency is not sacri-
persons caught on the property. In this example,
ficed. Local and national fire codes often present
those challenges may be the accepted form of
challenges to controlling access to many facilities,
access control, with no further control necessary.
and it is imperative that there is no sacrifice to
However, most facilities require additional forms
the safety of the occupants of a facility in order to
of controlling access, such as waste sites, storage
achieve better security. In most instances, policies
yards, and other facilities.
are drastically altered for access in an emergency.
In some circumstances, large properties or
Where policy dictates, a fixed post may become
defensible spaces may require a softer form of
a roaming position for the officer to facilitate an
physical barrier. This may be achieved through
escort for emergency medical services or the fire
dense foliage or even through designated walk-
department. The opposite may be true when a
ways with paint around the area of protection
roaming officer will be called from a roaming
or defensible zone. This form of control merely
patrol to a fixed position at the entrance of the
implies that a certain area is off limits and offers a
protected facility to provide speedy access for dis-
convenient path around the area.
patched emergency services.
Many properties cannot depend on this “soft”
Generally, an emergency such as fire, medi-
form of physical security. It is for this reason
cal concern, hazardous spill, or gas release
that it usually becomes necessary to add forms
should result in the halt of all work in the facil-
of physical security to achieve suitable access
ity to help facilitate access. Elevators and other
control. Fences may be erected around a prop-
conveyances should immediately be surren-
erty to control access and to “force” or “funnel”
dered from casual use for use by the emergency
visitors or employees to a common entrance or
service personnel. Parking control at a facility
“checkpoint” manned by a protection officer.
entrance or loading dock can be considered an
Appropriate signage indicating a no trespass-
access control duty where entrances are kept
ing order will aid in controlling access through
clear to make way for emergency personnel.
the message that anyone trying to breach secu-
rity and access the forbidden area risks arrest
and trespassing charges. In situations where it EXAMPLES OF ACCESS CONTROL
is expected that the protection officer will arrest
anyone caught trespassing, it is crucial that sig- Now that a given facility or property has
nage is in accordance with the laws concerning been equipped with fences, locks, and other bar-
local trespass acts. It is also extremely important riers, access can be controlled at one focal point.
to those without proper credentials. The per- consist of executive offices, chemical rooms, file
son wishing to gain access may very well have rooms, and other areas that may require limit-
legitimate business on the protected property, ing or curtailing access. Rather than posting
and outright denial could create losses for the an officer at every area, access is controlled by
facility or property being protected. It is for this way of physical security barriers such as doors,
reason that facilities need a clear policy for the locks, CCTV, alarms, and electronic access con-
denial of access to individuals without proper trol. The effectiveness of physical security is
credentials. further enhanced by strict key control, effective
There are some facilities that may employ monitoring of CCTV and alarm systems by the
a strict “No Authorization, No Access” policy security officer, and accurate database manage-
that will dictate that the person requesting ment in electronic access control systems. Other
access without proper credentials be denied. important tools used to aid access control are
Many facilities will have a “backup” procedure intercom, telephone, and other voice commu-
to obtain the proper authorization for access. nications systems. Requests for access can be
One example may be that a facility manager made from remote points within the facility,
or supervisor could be called to provide verbal allowing an officer to be dispatched or to grant
authority for access. Another example may be access remotely from an electronic access sys-
to require a visitor requesting access to call an tem, given proper authorization.
authorized occupant in the facility to provide
an escort.
When the security officer is left with the LOCKS AND KEY CONTROL
decision of whether or not to allow access, it is
usually best that the officer act on the side of Locks and keys have been around for thou-
caution and deny access until a fair approval sands of years and are definitely the standard
or compromise is reached. Advising the person for controlling access in many areas. Since their
that he or she has to be denied access is an act invention, the durability and security of locks
best accomplished with diplomacy and respect. and keys have greatly increased along with their
The event of the denial should also be docu- use. Today, they help control access to almost
mented on a report suitable for the employer or every structure imaginable. Generally speaking,
client. Policies for granting and denying access a lock is a mechanical device that consists of a
should comprise part of the protection officer’s cylinder, springs, and several pins or “tumblers”
post orders or standard operating procedures. that prevent rotation of the lock cylinder or
plug without the insertion of a correctly cut key.
Higher security locks manufactured today make
APPLYING PHYSICAL SECURITY unauthorized replication virtually impossible.
IN ACCESS CONTROL Proprietary key blanks can have a restricted issue
to one distributor or end user. A restricted propri-
For many facilities, control of access at any etary keyway, combined with strict key control, is
one point may not be practical, particularly in an effective form of controlling access. Permanent
large facilities with many areas such as indus- keys should not be issued without signature or
trial and office buildings. Posting officers at receipt. Identical keys should each have unique
these various checkpoints to control access control numbers permanently stamped on the
might be an effective form of access control, key to identify issue. Temporary issue of keys
but in most circumstances, would not be a cost- should be accompanied by signature on a regis-
effective, long-term solution. These areas may ter or key sign-out form indicating a return time.
will usually have a numeric or binary code that Systems can be interfaced or integrated with
is verified by a computer host, ensuring validity. other systems such as building automation, fire
systems, and human resources computer data-
bases. This allows the access holder to gain
access and turn on lights or air conditioning to
his or her work area with the use of the access
RADIO FREQUENCY (RF) system. With the activation of a fire alarm, an
INNOVATIONS access card could be automatically validated for
Most modern access control systems utilize use by the fire department.
a contactless or radio frequency card that, when
merely presented near a card reader, will be read ACCESS SYSTEM DATABASE
by the system and either permit or deny access. MANAGEMENT
Recent innovations in access control technology
have led to the use of contactless “smart” cards. Controlling the access system should have
In addition to providing the required data for tra- similar strict procedures to those of the key sys-
ditional electronic access control, other informa- tems. Issue should be controlled by consistent
tion can be stored on the card, such as personal and appropriate documentation. Typically, infor-
identification numbers to allow access, or even a mation is kept in a cardholder’s file, along with
biometric template, matching the cardholder’s a history of changes and authorizations. These
thumbprint or retina information to the content files should remain easily accessible by autho-
of the card. Other uses for the card may involve rized personnel until a set time has elapsed since
building automation or cashless vending. termination of the cardholder’s access. This not
only assists in audits, but can also control costs,
as a card with picture identification can be kept
on file in the event that the cardholder returns to
work in the near future. Returned damaged or
Modern electronic access systems have many
defective cards should be destroyed and docu-
features to enhance the level of access control
mented in the system database so identical cards
to a facility, area, or room. Turnstiles, interlock-
can be reissued in the future. Equal attention
ing mantraps, and parkade gates are combined
should be paid to the management of electronic
with access readers to prevent passback and
databases. Spelling and pattern consistency are
“piggybacking” in parking garages and high-
vital to good database management. Frequent
security areas. Cards may only allow one badge
software backups may one day pay off in the
in and one badge out to track the time in and
event of host server failure.
out of the facility or area. Some systems have
enhancements, such as the addition of “mobil-
ity impaired” access, to allow the extended BIOMETRIC TECHNOLOGIES
opening time of a door. In the event of a stolen
card, the card can be “tagged” with an alarm Biometric technology is slowly becoming more
upon use, alerting the operator at the monitor- commonly used in airports and other immigra-
ing station to dispatch security personnel to the tion checkpoints. Facial recognition technology
location of the cardholder. Meanwhile, the card is integrated into CCTV systems to identify indi-
remains active and permits access, so as not to viduals who are either wanted by law enforce-
alert the holder of the card. ment or may not be permitted travel to a given
EMERGING TRENDS
In addition to those trends in information images produced by this technology for viewing
security, there are many new and emerging by security personnel are truly vivid nude ren-
trends and tools that relate to the function of derings of passengers. The industry insists that
access control. These include, but are not limited privacy is maintained, as there are no stored
to, optical high-speed turnstiles, handheld explo- images, and the facial images are censored.
sive and biohazard detection, and most recently, Use of these systems has not only been insti-
millimeter wave scanning. Millimeter wave scan- tuted at airports and embassies, but is becoming
ning is the latest trend in pre-board screening at common in nightclubs and even theaters. The
airport facilities. While it is an effective replace- role of performing and facilitating access control
ment for manually searching passengers, privacy continues to evolve, as does the technology that
advocates criticize the technology as unnecessar- supports it. It is a vital first line of defense in the
ily invasive and a threat to personal privacy. The protection of people, assets, and information.
17
Detection Technology
Kevin T. Doss‚
Christopher A. Hertig, and
Bethany J. Redmond
199
200 17. DETECTION TECHNOLOGY
explosives. CT technology uses X-ray scanners consistency and uniformity make it possible for
that provide 3D images of the potential explo- dogs and handlers to be interchangeable among
sives. The costs to operate CT technology are teams. This also allows for additional flexibility
comparably higher than other explosive detec- among handlers should someone be out on sick
tion technologies. leave or take vacation time.
Typically, canine olfaction is used to detect
explosives at military bases or airports, or dur-
CANINE DETECTION ing special events. What’s more, they are very
effective in tracking down illegal substances
Dogs can be very effective instruments of at border crossings, public schools, and cor-
detection and offer great portability in a vari- rectional institutions. Dogs are also effective
ety of security applications. Research indi- in detecting both live humans and/or dead
cates that a dog’s olfactory system is 10,000 to bodies during environmental disasters such as
10,000,000 times greater than that of a human. Hurricane Katrina.
A dog’s keen sense of smell can be developed Additionally, the presence of a detection
and used in a variety of detection and security dog can provide a deterrent value to individu-
applications: als considering entering the area with prohib-
ited items or dangerous articles. Dogs are also
● Explosives
of high value when used to disarm or distract
● Human concealment and tracking
dangerous subjects.
● Drugs
It is worth mentioning that improper beha-
● Patrol services
vior by the dog and handler can ruin the
● Chemical weapons of mass destruction
reputation of the company or organization.
● Dual-trained as detection and bite dogs
Management should consider the potential
● Defense and protection of the handler
reputation damage resulting from unprofes-
Dogs trained for detection purposes may be sional behavior by the handler or dog and must
more reliable than other methods of detection ensure compliance with any legislation pertain-
because they are not very susceptible to false ing to the use of guard dogs. Indemnity against
alarms. Dogs are reliable and selective when harm or damage arising from the use of guard
detecting sources of chemical vapors and are or detection dogs should be provided by the
able to distinguish between very similar chemi- contractor. Another downside to using dogs is
cal compounds. Machines used in detection are the lengthy initial training period required for
adjustable and can be altered by users to reduce both dog and handler. Such training equates to
the occurrence of false positives. However, if cost, and many organizations do not have the
the threshold of the detection equipment is patience or funding to support it.
changed too much, the equipment may no lon-
ger be effective in detecting these substances.
A well-trained dog and handler team can typi- ELECTRONIC ARTICLE
cally work effectively for 8–10 hours. However, SURVEILLANCE
there are other variables to take into account to
determine how long a dog can work, such as vol- Electronic article surveillance (EAS) is a
ume of work, temperature, and amount of rest. technology that typically uses magnetic, VHF/
Consistency must be established during the train- microwave, or barcode sensors to detect fraudu-
ing regimen, and every handler and dog should lent activity. An EAS system is a protection sys-
be trained under the same conditions. Such tem that uses electronic sensors and detectors
EMERGING TRENDS
S EC U RI T Y QU IZ b. X-ray
Detection Equipment c. Pulse-field detector
d. CT scan
1. How many suspect components of an
6. Which chemical compound does
explosive device are needed to warrant a
chemiluminescence technology detect?
possible threat?
a. Carbon dioxide
a. Five
b. Nitroglycerin
b. Three
c. Nitrogen dioxide
c. One
d. PETN
d. Two
7. The selection of detection equipment should
2. Which component is not considered a basic
be based on:
component of an explosive device?
a. Life-cycle cost of the equipment
a. Explosive material
b. Reliability of the equipment
b. Detonator
c. Type of threat
c. Connecting wires
d. All of the above
d. Projectile
8. Electronic article surveillance (EAS) systems
3. Which of the following is considered to be a
are used to detect:
downside to using detection dogs?
a. Electrodes
a. A dog’s keen sense of smell can be
b. Merchandise surplus
developed and used to detect drugs and
c. Fraudulent activity
explosives
d. Retail invoices
b. Unprofessional behavior by a dog and
9. When responding to an alarm, it is
its handler may ruin the company’s
important to:
reputation
a. Use physical force
c. An individual may be deterred by the
b. Remove the suspected article from
presence of a detection dog from entering a
the area
facility with a dangerous item
c. Control access to the detection
d. A detection dog may be an effective tool
equipment
for detecting lost or missing persons after
d. Abide by company policy and procedure
an environmental disaster
10. Which of the following is not a consideration
4. A magnetometer is a kind of metal detector
when using X-ray detection technologies?
that detects:
a. Taking necessary precautions to protect
a. Zinc
one’s personal privacy
b. Aluminum
b. Implementing shift rotation for security
c. Ferromagnetic material
personnel to mitigate operator fatigue
d. Nonferromagnetic material
c. Training new operators is lengthy and
5. Which of the following is not a metal
expensive
detection technology used prominently in
d. Implementing proper training and
security applications?
corrective measures to reduce mistakes
a. Continuous wave device
made in assessment interpretations
18
Fire Prevention, Detection,
and Response
Michael Stroberger
209
210 18. FIRE PREVENTION, DETECTION, AND RESPONSE
e
He
e)
sid
xid
tur
at
en
izin
era
sid
yg
ga
mp
Ox
ge
(Te
Ox
at
nt)
yg
He
en
Re
ac
ain tio
Ch n
Fuel side
Fuel
(Reducing agent)
safe distance in the process of evacuating the common extinguisher types and the class of
immediate area (Figure 18-2). fire they are intended to be used on are as
follows:
● Dry chemical—these utilize a powder that
EXTINGUISHERS is expelled from the nozzle in a stream
of pressurized, nonflammable gas. Dry
The most critical aspect of deciding if you are chemical extinguishers are usually classified
going to attempt to extinguish a fire is deter- as usable on Class A, B, and C fires, as
mining if you can do so without serious risk to they will be both effective and relatively
your own safety or the safety of others. Make no safe in those applications. Dry chemical
mistake: fighting a fire is dangerous. By its very extinguishers extinguish the fire by coating
nature, this activity requires that you intention- the fuel of the fire, making it unavailable for
ally remain within, or move within, close prox- combustion.
imity to a highly hazardous environment. Care ● Carbon dioxide—these units produce a
should be taken to ensure that the responding cloud of snow-like particles that quickly
person understands the dangers and the equip- evaporate into a carbon dioxide layer. This
ment to be used, as well as its limitations. The layer reduces the available oxygen and cools
purpose of fighting a fire is to save lives and the area, breaking the fire triangle. They
property, not to risk them needlessly. are commonly classified as B and C type
When working in an environment with extin- extinguishers.
guishers that you may not have used before, it ● Water-based—water is a good extinguishing
is recommended that a test unit be obtained, agent for Class A fires, but can aggravate
even in a group setting, so that the area of other types. If used on burning liquids
effect, limits of range, and duration of use can (Class B), it can spread the fuel, thus
be explored. enlarging the fire area. If used on electrical
When deciding if it is appropriate to attempt fires (Class C), it can cause serious harm to
to extinguish a fire, it is important that the the responder, as it may conduct an electrical
equipment you select matches the fire type. charge, causing an electrical shock to be
Mismatching the extinguisher and fire types delivered to the holder of the unit or others
may result in a marked increase in the level standing in the runoff from it.
of personal danger to which the responder is ● Halogenated units—these are referred to
exposed. With this in mind, some of the more as “clean agent” extinguishers because they
materials. Such items as fire-resistant doors, It is essential that senior management review
designed to resist the spread of a fire for certain this program and support it. It is also essential,
periods of time, aid greatly in the containment and in some areas required, that the fire mar-
of a fire. However, to be effective, they must be shal have a chance to review the fire plan and
in their proper position and working in accor- approve it prior to implementation.
dance with their original design. As part of As part of a formal plan, alarm systems
every officer’s patrol, confirming that fire doors should be regularly inspected and tested to
are in proper condition and not propped or ensure that the components are functioning
wedged open should be a constant component. properly. This should include activation of every
sensor through cooperation with a qualified/
certified inspector or installer and the presence
FIRE PLANS or approval of the fire marshal.
Above all, the response portion of a fire plan
Designing a fire plan, prior to an actual event,
must be realistic in its assignments and expec-
is the most effective step in any fire prevention,
tations. It should be written with the following
fire detection, and fire response program. It is
limitations in mind:
through this plan that all of these factors should
be addressed and given structure and detail. ● Assign duties only to people or positions
Developing such a plan must be done in coop- that will always be present. If you work
eration with those expected to execute the plan, in an area where the patrol officer is the
and they should be involved from the beginning. only position that is staffed at all times, the
Without this, it is possible that aspects of the response plan should assume that this will
final plan may be unrealistic, and could prevent be the only person present for its critical
an effective program from being implemented. aspects. It is easier to assign an extra person
The written plan should include the follow- to a new duty than it is to find an extra
ing as a basic guide: person for a vacant function.
● Write each phase with the protection of lives
● Emergency contact names and telephone
as the primary focus, and property concerns
numbers
as a secondary motivation.
● A formal chain of command ● Write the plan based on existing equipment
● Detailed explanations of the responsibilities
and supplies only. Do not count on having
of each person or department in prevention
time to obtain other items before the plan
aspects
must be put into action.
● Detailed explanations of the responsibilities of
each person or department in response aspects The most important point about fire plans is
● An explanation of the equipment available, that they must be put into effect! What good is a
the frequency of inspection, and the method plan that is exhaustively researched, designed
of documentation by a broadly scoped committee, approved by
● An explanation of the training that personnel every member of the team, and then put on a
receive, the frequency of retraining, and the shelf and never utilized?
specific responsibilities bestowed as a result
of this training ARSON
● Charts and diagrams of the property,
detailing equipment locations, routes of Fires are not always accidents or acts of nature.
egress, evacuation meeting locations, and An alarming number of cases are thought to be
similar fixed points fires that are intentionally set for any of a vast
19
Occupational Safety and Health
and the Protection Officer
Kevin Palacios
217
218 19. OCCUPATIONAL SAFETY AND HEALTH AND THE PROTECTION OFFICER
an accident. (Examples: normal wear and ● Document the safety violation and
tear, pipes corroding from within, ropes forward a report to appropriate
becoming rotted creating an unsafe/ management.
unhealthy condition, or lack of preventive ● The protection officer who observes an
maintenance). The source cause sets the unsafe condition, or a safety hazard should
stage for an accident; it makes the accident do the following:
possible. ● Correct the condition or report it to
4. Unsafe/unhealthy acts—Human behavior someone who can correct it.
action(s) by the worker that deviate from ● Mark off the condition as a hazard
the accepted safe work procedure that cause where immediate corrective action is not
or contribute to an accident. (Examples: possible.
horseplay or workers not wearing proper ● Document the unsafe hazard or condition
personal protective equipment.) Unsafe acts and the action taken, forwarding the
are often what trigger an accident. They may report for appropriate action.
complete the cycle so that the accident event Unfortunately, most health-related hazards
occurs. Personal factor causes often serve as and risk factors can’t be easily/directly observed.
the reason for unsafe/unhealthy behavior. The officers must be aware of the potential
Personal factor causes are any personal symptoms and consequences associated with
characteristic or conditions that may cause their workplace in order to report them for early
or influence a worker to act in an unsafe/ diagnosis.
unhealthy manner. Examples of personal
factor causes include physical or mental
conditions, extreme fatigue, intoxication,
Common Safety Hazards
poor attitude, and tense relationships in the There are numerous safety hazards that the
workplace. protection officer should be made aware. Some
of the frequently encountered safety hazards or
conditions include the following:
THE ROLE OF THE PROTECTION 1. Fire protection
OFFICER IN OSH PROGRAMS – violation of no smoking regulations
– unusual odors, especially smoke
The protection officer is trained to observe
– obstructed passageways and fire doors
and identify potential hazards. The majority
– inadequate exit signs
of large companies maintain a loss prevention
– obstructions in front of hydrants, alarm
department with protection officers on duty
boxes, extinguishers
24 hours a day, 7 days a week. The protection
– electrical heaters and coffee pots left
officer is in a position to report and correct
turned on
unsafe acts, unsafe conditions, and potential
– improper disposal of waste
hazards while conducting routine patrols.
– flammable gases and liquids which are
The protection officer who observes a
uncontrolled in areas where they may
safety violation by a worker should do the
pose a hazard
following:
– paint or painting areas poorly ventilated
● Record the worker’s name. and not properly secured
● Notify the worker’s supervisor, advising him – gas pumping areas close to operations
or her of the violation. where an open flame may be used
about an incident. This is done for the purposes mental, and emotional well-being of employees.
of identifying causes and making recommenda- These policies and programs strive to:
tions to prevent the incident from happening
again.
● Prevent harmful health effects because of the
Industrial Hygiene—A science that deals work environment
with the anticipation, recognition, evaluation,
● Protect employees from health hazards while
and control of hazards in the workplace. These on the job
hazards may cause sickness, harm to employee
● Place employees in work environments that
health, discomfort, and inefficient perfor- are suitable to their physical and mental
mance on the job. Also known as occupational make up
hygiene.
● Address other factors that may affect an
Job Design—The planning of a job and the employee’s health and well-being, such as:
establishment of procedures for performing that
● Ineffective organization of work
job so that the potential for injury and illness is
● Harassment and violence in the workplace
reduced or eliminated.
● The need to balance work and family
Job Enrichment—Adding one or more responsibilities (e.g., elder care, child care)
related tasks or functions to an existing job.
● Promote healthy lifestyles
These may include some managerial functions Occupational Illness—A harmful condition
(e.g., planning, organizing, controlling). or sickness that results from exposure in the
Loss Control—Measures taken to prevent workplace to a biological, chemical, or physical
and reduce loss. Loss may occur through injury agent or an ergonomic hazard.
and illness, property damage, poor work qual- Occupational Safety—The maintenance of a
ity, and so on. work environment that is relatively free from
Material Safety Data Sheet (MSDS)— actual or potential hazards that can injure
A form that contains detailed information about employees.
the possible health and safety hazards of a Personal Protective Equipment (PPE)—Any
product and how to safely store, use, and han- device worn by a worker to protect against haz-
dle the product. Under the federal Hazardous ards. Some examples are respirators, gloves,
Products Act, suppliers are required to provide ear plugs, hard hats, safety goggles, and safety
MSDSs for all hazardous materials as a condi- shoes.
tion of sale. Organizations that use hazardous Physical Agent—A source of energy (e.g.,
products are required to keep an MSDS onsite noise, radiation, vibration, heat) that affects the
for each product. This is a provision of the Right body, a part of the body, or any of its functions.
to Know Act. The effects may be beneficial or harmful.
Medical Surveillance—The systematic Preventive Maintenance—A system for
approach to monitoring health changes in work- preventing machinery and equipment failure
ers to identify and determine which effects may through:
be work-related.
Nature of Injury or Illness—The main phys- ● Scheduled regular maintenance
ical characteristics of a workplace injury or ill- ● Knowledge of reliability of parts
ness (e.g., burn, cut, sprain, dermatitis, hearing ● Maintenance of service records
loss). ● Scheduled replacement of parts
Occupational Health—The development, ● Maintenance of inventories of the least
promotion, and maintenance of workplace reliable parts and parts scheduled for
policies and programs that ensure the physical, replacement
EMERGING TRENDS
Despite the fact that the basic role of most security and safety risks by packaging them
protection officers is currently somewhat lim- together into a single program. Such an approach
ited to physical and logical security, many pro- may be particularly helpful with international
tection officers already perform several duties operations: going into a foreign country presents
in OSH programs. This will be more common in a whole new host of risks. Convergence with
the future as the need for loss control, financial other risk management functions within the
austerity, and competition among organizations organization (health, environment, safety, and
grows. quality) is quickly gaining momentum.
Enterprise Risk Management is the assess- Laws and regulations vary greatly in different
ment and management of all risks that an orga- regions of the world; nevertheless, major efforts
nization faces. Business risks such as profit and are taking place to standardize procedures, train-
loss are being managed along with traditional ing, and risk management models globally.
20
An All Hazards Approach
to Hazardous Materials
Robert D. Jaffin
229
230 20. AN ALL HAZARDS APPROACH TO HAZARDOUS MATERIALS
These movement estimates do not even take into occurring. That is the unglorious but real chal-
account pipelines, which distribute some of the lenge for the professional protection officer.
most hazardous, although not necessarily the Yet, in today’s world, where the “all hazards
deadliest, materials in use. From a practical stand- approach” has become the standard, weather-
point, it is important to understand the generally related incidents and hazardous materials inci-
accepted concepts and definitions for hazardous dents represent the majority of recurring serious
materials. The best, but extremely complex, defi- incidents in the workplace.
nition is in Federal Standard 313D of the Material Awareness of the evolving technologies and
Safety Data, Transportation Data and Disposal the inherent dangers of many new products is
Data for Hazardous Materials Furnished to an often overlooked part of this job. Today’s
Government Activities. That standard takes over products, including products carried and used
two pages to define a hazardous material and ref- by protection professionals, represent their own
erences multiple external documents. set of new and unique hazardous material chal-
On a practical level, hazardous materials lenges. Here are some examples of new, and in
have been internationally categorized into one some cases variations on older, products that
of nine hazard classes. Some of these classes are represent new and often times overlooked or
further divided into divisions. The most widely misunderstood hazards:
used and commonly understood classifica-
tion system includes 23 classes and divisions. 1. Ethanol-enhanced fuels. It requires a
Seven of these classes and divisions represent different kind of foam to fight an ethanol-
inherently hazardous materials that must be or alcohol-based fire than a gasoline- or
considered immediate and direct threats in petroleum-based fire. Knowing that ethanol
any quantity. Those include certain classes and is being moved may require a facility, and
divisions of explosives, mass explosion hazard, its protection force, to increase the type and
projection hazard, fire or incendiary hazard; number of both portable firefighting devices
dangerous when wet materials; toxic inhalation and fire suppression systems available.
hazards; and high-level radioactive materials. 2. Lithium ion batteries. These batteries are
one of the most dangerous products that
are used in everything from toys to oxygen-
ROLE OF THE PROTECTION generating vests, aircraft black boxes to
OFFICER computers and UPS backup power supplies.
These batteries present such a great risk
A proactive approach on the part of any in transportation, as distinct from their
business and every individual leads to minimi- individual use in consumer products, that
zation, if not elimination, of hazardous mate- the international community has assigned
rials incidents. Education and training that new identification numbers for them; and in
specifically include a full explanation of all the 2008 Emergency Response Guidebook
the materials that move through or are used (ERG), for the first time in over 12 years
within a facility is the first line of defense. the U.S. Department of Transportation (U.S.
Understanding the terminology and federally DOT) added a new guide number. That
mandated response framework is a critical is particularly significant because there
part of that training. The fact is, there is noth- are over five million different hazardous
ing heroic or exciting about maintaining good materials but there are only 66 guides in
and safe work practices, and proper site secu- the ERG. If lithium ion batteries are short-
rity, to eliminate the possibility of an incident circuited they will generate a tremendous
is much more critical than being a “hero.” those recommendations and codify them into
Nowhere is that more important than when their own regulations. While hazardous mate-
dealing with hazardous materials. Mitigation rials fall under the Occupational Safety and
of danger in a hazardous materials release situ- Health Administration (OSHA), Environmental
ation should be left to those with proper train- Protection Agency (EPA), and DOT, the most
ing and experience. For protection officers, the comprehensive information available on the
first step is to self-protection, the next is mate- majority of these hazards comes from the fed-
rial identification, the next is to evacuate as eral DOT guideline 49 CFR parts 100 to 180
necessary and activate the appropriate contin- which is known as the “Hazardous Materials
gency or response plans, and the last step in Regulations” or HMR. The HMR are standard-
most circumstances is to provide containment. ized and harmonized with the rest of the world.
That may be as simple as maintaining a physi- Portions of the EPA and OSHA regulations
cal security perimeter or as complex as break- contain language and definitions that are not
ing out absorbent materials, turning off entire universally accepted and may be unique to the
HVAC plants, and preserving “crime scene” United States or North America. The HMR is
integrity. also one of the most difficult federal regulations
to read and understand. A good practical tool to
use is the most current version of the Emergency
TOOLS AND RESOURCES Response Guide; at the time of this writing that
would be the 2008 ERG. This guide is pub-
While protection officers should know some lished by the U.S. DOT in conjunction with
basic firefighting techniques and basic emer- other North and South American governments,
gency medical techniques including CPR and and has been updated on a 4-year cycle since
first aid, most security professionals recognize 1996. The next version is likely to be the 2012
that they are neither paramedics nor firefight- ERG, with a new ERG published again in 2016.
ers. The same concept is true for hazardous Copies of the regulations, as well as handy
materials response, containment, and mitiga- pocket-sized copies of the ERG, are available
tion. Small releases of less deadly materials can from a number of sources and the leading pro-
be handled by anyone with the right formal viders of this material have been included at the
training, basic knowledge of hazardous materi- end of this section. The single most valuable site
als response, an understanding of the risks and for obtaining additional HAZMAT information
protocols, and access to the Material Safety Data (although not emergency response information
Sheets (MSDS) to properly identify risks associ- in the face of a specific incident) is http://www
ated with each specific incident or material. .phmsa.dot.gov/hazmat.
The most universally accepted method to iden- The Emergency Response Guide is a tool that
tify and classify hazardous materials comes from should accompany the professional whenever
the world of transportation. The original work on duty; this author keeps one in the glove
was developed by the United Nations Committee compartment of his private vehicle. Learning
of Experts, who developed the “Orange Book” how to use the ERG is a key to minimizing and
of recommendations that is the basis for the mitigating the impact of hazardous materials
initial classification and identification of haz- releases. There are going to be times when the
ardous materials throughout the world; these most appropriate action is to turn and run! The
are not regulations but a set of recommenda- ERG is a quick response tool to initiate both
tions. Individual nations, as well as interna- protective and response/containment actions.
tional governing authorities, must recognize To paraphrase standardized training materials,
To a limited degree this method worked for standard (29 CFR 1910–1200) and Hazardous
a while. The problem is that after diluting so Communications (49 CFR Part 172, subparts D,
many hazardous materials into the environment E, and F). In addition, the EPA’s 40 CFR specifi-
for so many years, the environment has become cally addresses use of transportation labeling
saturated and, as a result, traces of those same and identifications within workspaces. If mate-
substances are appearing in our food and water rial is being used or processed in a workspace
supplies today—to say nothing of the long-term those communication standards require easy
and short-term health hazards faced by unpro- access to the MSDS. Assuming compliance with
tected response personnel, using no or minimal those requirements, between the information on
Personal Protective Equipment (PPE). an MSDS and the information contained within
Today, government and industry agree that the ERG, specifically the information provided
just as firefighting requires specialized train- for each guide number, professional protection
ing, response to hazardous materials requires officers can identify spilled materials and begin
specialized knowledge, training protocols, and to take mitigating or corrective actions.
protective equipment to ensure minimal risk to
the workplace, the environment, and all indi-
Determine the Quantity
viduals. Today there are firms that specialize
of the Released Substance
in enhanced material incident response and
cleanup and both public and private safety and After identifying the substance, it is important
security organizations create and train their to determine how much of it has been released.
specialized HAZMAT response teams. The uncontrolled release of 8 oz. (1 cup) of ace-
tone, while requiring caution in cleanup, does not
necessitate response from a HAZMAT team. The
THE INITIAL RESPONSE same quantity of cyanide or an explosive would
require extraordinary measures to be taken.
Whether or not a facility has a HAZMAT Quickly determining what substance has been
response team in place, there are some basic released allows more time for the HAZMAT
steps that must be followed. team to decide what course of action they must
take.
If the release is a liquid or solid and has
Identify the Substance Released occurred in a more or less open area, it may
There are several ways to safely determine be possible to see where the substance is leak-
what has been released. But the most important ing from. Never go near the area unless prop-
thing to remember is the basic instruction pro- erly trained in the required level of PPE; this
vided in the ERG: always stay upwind, uphill, prevents the professional from inadvertently
and/or upstream of any hazardous materials becoming another victim of the incident.
release until able to identify it. One way to iden- It may be possible to read the placard on a
tify material at the workplace is to ask the person transport vehicle or a larger shipment, or the
who was using it. This may not always be pos- label which should appear on smaller packag-
sible, since the employee in question may have ing, from a safe distance with or without the
been injured. However, there are several other use of binoculars. The identifying labels or plac-
safe ways to determine what a released sub- ards may have a class, such as “Poison Gas,”
stance is. In the United States, under 29 CFR and and should have the class or division number
49 CFR, the OSHA and DOT regulations, there is or, on placards of large enough quantities, the
both a requirement for a hazard communication specific universally recognized “UN number.”
and force rescue workers to jeopardize their own must be treated. This last concern increases
safety to save them. During the initial phases of the workload of response personnel who may
an incident, the risks of unauthorized personnel be overextended and understaffed initially.
interfering with or, worse, distracting response Another problem with the media intrusion is
personnel are very high. It is important to that their entry into restricted areas encour-
remember that initially the first protection pro- ages curiosity seekers to follow and go beyond
fessional on scene is the incident commander. safety barricades.
The media will take risks that most normal People like to watch others dealing with
citizens would never dream of. Reporters have problems. On a crowded highway, during rush
been known to cross barricades and sneak past hour, drivers will always slow down to take a
security to get a close shot of the incident area. closer look at any incident along their route,
This poses several problems: they interfere with even when that incident is on the other side of
the HAZMAT team’s operation by attempting the roadway. An accident, even on a divided
to talk to them and generally get in their way; highway, inevitably has the effect of drastically
they typically fail to follow safety precautions reducing traffic flow in both directions. That
and risk becoming exposed themselves; and same human curiosity draws onlookers to the
when they do become unintended victims, they scene of a hazardous materials incident.
EMERGING TRENDS
Hazardous materials will continue to evolve 9/11 attacks on the World Trade Center what jet
over time. As new chemicals, medicines, and fuel can add to the equation.
foodstuffs are manufactured, the potential for The Department of Homeland Security, as
dangerous concoctions escalates. Adding to the well as several state agencies, has placed regula-
danger is an increasingly crowded transporta- tions on chemical manufacturing plants. These
tion infrastructure. As highways and bridges are plants are being required to have security plans
more heavily traveled, the potential consequences and dedicated individuals in charge of the pro-
of a HAZMAT incident increase. A spill or release tection function. Such regulation is likely to
will affect more people in the future than at expand; new jobs and duties will evolve for pro-
present. tection officers at chemical facilities.
Hazardous materials management is a key Along with a more robust regulatory environ-
component of an anti-terrorism campaign. ment, the current concern with environmental pro-
Understanding the scope and nature of danger tection will undoubtedly play a role in hazardous
that surrounds different substances is a neces- materials manufacture and use. Organizations will
sary first step in protecting against terrorism. need to continually assess their risk of hazardous
Protection officers must appreciate the risks materials incidents in light of potential negative
associated with hazardous materials in and near publicity. They will also have to mount compre-
their work environment. Security measures must hensive media campaigns before, during, and
be enacted so that terrorists cannot divert or det- after a HAZMAT incident, likely making them
onate existing materials. We have seen with the more careful in hazardous material precautions.
INFORMATION PROTECTION
21
Information Security and
Counterintelligence
Kevin E. Peterson
241
242 21. INFORMATION SECURITY AND COUNTERINTELLIGENCE
LEGAL SECURITY
PROTECTIONS PROTECTIONS
3. Implement a definable plan for safeguarding back up the ones that were unsuccessful. As
trade secrets. Winkler puts it, when we apply defense in depth,
4. Secure physical trade secrets and limit access “security [isn’t] perfect, but it [is] prepared”
to trade secrets. (Winkler, 2005, p. 305). Examples of some of those
5. Confine intellectual knowledge. “layers” might be strong password protection,
6. Provide ongoing security training to encryption, biometric authentication, physical
employee security measures, personnel screening, attended
facility access (security officers), employee train-
(Federal Bureau of Investigation, 2009).
ing, and password-protected screensavers.
As indicated, it is important—in any private
or public sector setting—to find the proper bal-
ance between legal protections and security THE ROLE OF THE PROFESSIONAL
protections. Figure 21-2 shows some consider- PROTECTION OFFICER
ations for each.
To achieve protection objectives and ensure The most effective protection officers are those
they are consistent with the business or orga- who know their customer (the organization they
nization’s strategic goals, these two “commu- serve) and tailor the way they provide security
nities” of protection measures should work services to the customer’s mission and culture.
together to develop an integrated risk mitiga- In many organizations, information assets are
tion approach. Working in a vacuum can result absolutely crucial to the survival and success
in duplication of effort and significant waste as of the enterprise. Officers should recognize
well as poor results due to internal conflicts. this aspect of the organization and factor it into
Finally, according to well-respected consul- the performance of their protection duties. It
tant and author Ira Winkler, the best approach to should be noted that many contemporary com-
addressing risks to information assets is to apply panies are centered on information as their core
defense in depth (layered security) by incorporat- business function, hence our “information-based
ing both IT and traditional protection measures. society.” It is our responsibility to remember that
Even if one or a few layers fail, other layers will a key objective of information asset protection is
EMERGING TRENDS
Three emerging issues that are relevant to the and home settings. As such use and popularity
protection of information and intangible assets increases, systems and the data residing on them
are the increasingly interconnected global busi- become more attractive targets for a variety of
ness environment, the rapid advances in infor- adversaries.
mation technology, and the fact that we now These new technology tools can also be
have to consider—in a different way—the secu- exploited by adversaries to support their illicit
rity of security systems. These issues are dis- activities. The best examples at the moment are
cussed in this chapter, but need to be constantly the new cottage industry of information bro-
reviewed due to the unprecedented pace of kers and the use of sophisticated data-mining
change in today’s security environment. tools and techniques to target sensitive informa-
The advances in information technology tion. This trend will expand in the future and
have a number of implications. One is the new newly introduced business tools such as cloud
family of risks that are introduced by drasti- computing and wireless technologies will
cally increased use of information technol- likely be “abused” by bad actors for nefarious
ogy in business, organization, government, activities.
22
Workplace Crime and Deviance
Norman R. Bottom and
Whitney D. Gunter
255
256 22. WORKPLACE CRIME AND DEVIANCE
Denial of Injury It didn’t hurt anyone. I was just Not all internal (employee) theft is prevent-
borrowing it. able. This section will provide some ways to
Denial of Victim He deserved it. His kind minimize, moderate, and control this crimi-
deserve it. nal activity, but not stop it entirely. Protection
offers can have an impact by preventing, deter-
Condemnation of the The police are corrupt. That
Condemners teacher plays favorites anyway. ring, and displacing theft. When security is
He would have done it too. tight, thieves look for another place to steal.
Making theft so difficult and so much trouble
Appeals to Higher I was just following orders.
Loyalties I was doing God’s work. that the would-be thief will decide against it is
a reasonable goal for a loss prevention officer.
Preventing theft can save many jobs, and that
coworkers deserve whatever the crime costs includes one’s own.
them. Denial of injury is even easier to apply, as Opportunities for employee theft come about
it is not difficult for an individual to fail to rec- because of waste, accident, error, crime, and
ognize that their actions hurt a “faceless” corpo- unethical or unprofessional practices. The first
ration. This is especially true if they realize that letters of these opportunities (which are really
an insurance provider will cover losses. threats) come together to form the acronym
Note that other crimes, in addition to theft “WAECUP” (pronounced “wake up”). Below
may be neutralized by workplace criminals. is a list of WAECUP loss threats, with several
Condemnation of the condemners and appeals examples of each.
to higher loyalties may be used by those who
commit acts of sabotage or espionage. Labor A. Waste
union extremists, terrorists, and spies may 1. Protection officers who waste time create
focus on the employer, criticizing and blam- opportunity for employees to steal.
ing them for some perceived wrongdoing. 2. Waste containers are favorite stash places for
Terrorists involved in religiously based extrem- employees who steal.
ism may choose to believe that God has granted 3. Discarding usable items causes loss, as does
them the right to commit acts of sabotage. So, deliberately putting them in trash to be
too, may those who steal information and give stolen later on.
it to an adversary organization.
B. Accident
1. The confusion that surrounds an accident
Summary for Theories of
scene may be used to screen employee theft.
Workplace Crime
2. Arson has been used by employees to cover
These theories provide some ideas for how up theft. (What seems to be an accident can
criminological theories might be applied to actually be a crime.)
workplace crime and the prevention of such 3. Workman’s Compensation fraud may
crimes. Moving toward more specific strategies occur after an accident where the employee
and actions, the next section will provide an exaggerates the extent of the injury.
remember this, or your search will only cause is a second thing to remember. Get report results
trouble to you. Always check with a supervisor to the right individual(s). The right person or per-
before searching an employee or his property. sons will be able to take the necessary action.
Many companies have rules about what types So far, there are three main points to remem-
of items can be brought onto company property. ber. First, reporting must follow observation.
Know these rules. You may prevent a theft by Observation may involve sighting suspicious
advising an employee that the gunny sack in his activity by employees. Observation includes
hand cannot be brought in. threat potential, such as open doors. Or the pro-
Vehicle parking is another factor in conceal- tection officer may discover concealed company
ment. The personal vehicle of an employee property. First observe; then report.
should not be parked next to the storeroom The second main point is timely reporting. If
door, for example. In fact, employee parking you wait too long to report suspicious activity, the
should be at some distance from buildings and theft will take place. If you wait too long to report
doorways. Company policy establishes the a suspicious open door, stolen items will exit
parking rules, but you should point out parking through that door. If you wait too long to report a
hazards that make employee theft easier. concealed item, it will be removed by the thief.
Employee thieves may use their own car or The third main point is reporting to the right
truck. They may also use a company vehicle to person. The right person will react properly to
haul away the stolen merchandise. For example, a the threat you observed. The right person will
driver may load a few extra cases onto the truck, authorize or take corrective action in a timely
cases not listed on the manifest. These will be sold fashion. The right person will see that your work
for his personal profit and the company’s loss. is not wasted. Who is the right person(s)? Your
Some thieves are very bold. They will attempt supervisor, if available, is the right person. The
to walk out with stolen merchandise in their nonsecurity supervisor in the hazard area is
hands. Employees who attempt to remove com- another. Each company and each business will
pany property from the premises should have have a chain of command or leadership tree.
a pass or other authorizing document. Since Protection officers must know the responsibilities
pass forms may be stolen or counterfeited, it is of various managers. They must know how to
important to know and recognize authorized reach managers in case of an emergency, which
signatures. When in doubt, check with your can include a serious threat of employee theft.
supervisor. And make sure that the pass cov- Reports about employee theft should be both
ers each and every item. If the pass says “six” verbal and written. The need for verbal reporting
items, do not let the employee remove seven. often increases with rapidly unfolding events. The
need for written reports is twofold. First is clarity.
Verbal information often becomes distorted when
RESPONSE TO THEFT relayed from one person to another. Second is
record keeping. Written reports serve as the basis
for planning by the security and loss control staff.
Reporting
History tends to repeat itself, and hazards repeat
All observed suspicious activity, and espe- unless records are kept and used.
cially that involving employees, should be Written reports from protection officers are
immediately reported. Remember that all obser- sometimes hastily read by management, if read
vations and concealment findings are a waste of at all. This is especially true of shift reports. It is
time unless your results are promptly reported. hard to say why these reports are not properly
Along with the need for timely reporting, there used. Sometimes, it is the protection officer’s
supervisor. Routine searches should be done at know an area or the activities taking place as
different times, of course. If officers always check well as employees who work there. Changes
a trash container at 4:00 P.M., employee thieves in the workplace—for example, getting a ship-
will wait until 4:10 P.M. to stash the stolen goods. ment of new, valuable items, opening a formerly
Protection officers may not be allowed in sealed door, or hiring temporary help—can raise
some areas unless invited. Such areas often the potential for employee theft. New merchan-
include the research laboratory and executive dise represents something additional to observe.
offices. Barging into a research laboratory could Opening a previously sealed door means another
ruin experiments in progress. It is important access route to remove stolen merchandise.
to remember that company executives do not Temporary staff may themselves steal or be
want protection officers poking around when blamed as regular employees attempt theft.
important business is under way.
Public relations are the key to almost every-
thing the protection officer does. This is never SUMMARY
truer than in searching an employee’s bag,
briefcase, or vehicle. Your attitude during a This chapter presented some lessons about
search must be professional and nonthreaten- controlling employee dishonesty. Employees at
ing. Remember that you must work tomorrow all levels may steal from their employers. Most
with the same employees you search today. An employees steal what is immediately available
overbearing or nasty attitude will make ene- to them. Opportunities for theft come about
mies you cannot afford. because of WAECUP. Protection officers cannot
prevent all employee theft, but they can have a
positive impact. Theft prevention is a good idea
Employee Liaison at any time. Today, it is especially important
No protection officer can be successful with- because of the economic climate.
out help. Help will come from the protection Practical methods to prevent theft have been
staff, of course, but you can also get help from provided. These include tips on what to look
nonsecurity employees. It is necessary to cul- for, what to report, and what actions to take. As
tivate the respect of those employees who can a general rule, always look for the unusual and
assist you to estimate employee theft threats. out of place, but be prudent in taking action. An
Morale is a good indicator of theft potential. employee may have permission to take com-
When overall morale is high, there tends to be pany property off premises.
less employee theft. When moral is low, theft Protection officers can reduce theft of vis-
is more likely. The protection officer needs to ible items, but it is best to reduce opportunity
keep his or her finger on the pulse of employee for theft. Theft reduction requires knowledge
morale. This can best be done through contacts of company property, how it is marked, and its
in the workplace. value. Make a property list to aid one’s memory.
Often, nonsecurity employees will witness Concealment often comes before removal of
an employee theft, but fail to report it. This company property by the employee thief. Trash,
can continue for a long time. A protection offi- garbage containers, and garbage bags are favor-
cer who has the respect of key employees may ite hiding places. The thief may conceal valu-
receive valuable hints about the deviant activi- able merchandise behind less valuable items.
ties of employees. Everything should be in its place. Look behind
Liaison with nonsecurity employees has other shelved merchandise; examine storage rooms
benefits. A roving protection officer will never and broom closets.
EMERGING TRENDS
Losses caused by employees have been a con- loyalty and commitment to the employer are also
cern throughout history. At one time, employ- critical if theft, sabotage, espionage, and so on are
ers in England and the United States forbade to be controlled.
employees to talk during working hours. This Workplace crime is not limited to theft; sabotage
was to ensure that there was no loss due to by employees can also occur. There are various
wasted time. A more contemporary approach types of sabotage, from total or near total destruc-
to this issue is the use of temporary employees. tion of equipment and facilities (planting explo-
Contract service firms provide employees to cli- sives or incendiaries), to damaging equipment,
ent organizations on an as-needed basis. to deliberate work slowdowns. Sabotage may be
Such an approach cuts waste, but may create motivated by a variety of reasons. In construction
the potential for theft, espionage, and other crimes. and other industries, sabotage may be conducted
Obviously, all employees with access to assets must to prolong the work; damage slows completion of
be properly screened and supervised. Employee the project and keeps hourly workers employed.
Conversely, acts of sabotage may be motivated by to address the crime problem. Intelligence ana-
labor unrest during contract negotiations or strikes. lysts help to spot and track the activity of orga-
Sabotage may be committed by those advancing nized crime groups, terrorists, and embezzlers.
political or social agendas (terrorism), or it may The effective use of intelligence analysts helps to
be the work of foreign agents during times of war. detect crime or loss problems that are forming.
Regardless of the motivation, sabotage is a type of Intelligence analysts can also direct investigation
workplace crime. The control of sabotage is similar into crime or loss situations. Exception reporting
to the control of theft in most cases. systems, which spot deviations from the norm,
Organized crime has been involved in some such as an unusual amount of voided sales at a
workplaces for many years. Infiltration of busi- cash register, are part of a theft intelligence sys-
nesses, with the goal of exploiting their assets, is tem. Simply put, intelligence directs internal theft
a common occurrence. Organized crime groups investigations. It tells us where to start looking.
are now becoming involved with identity theft/ The individual protection officer plays a key
fraud. Exploitation of an insider who provides role in reducing workplace crime and deviance.
confidential customer or employee information Unfortunately, many organizations do not fully rec-
is a key concern. As information becomes a more ognize this, relying instead on accountants, audi-
valuable and accessible asset, such scenarios will tors, and human resources personnel to manage
likely increase. internal losses. This perspective is most often seen
Intelligence and crime analysis positions are with uniformed security personnel; plainclothes
becoming more common. In public sector organi- personnel, such as retail loss prevention officers,
zations, there are often crime analysts employed by tend to be more involved in internal loss problems.
police departments. Intelligence analysts may be In retail, loss prevention agents do various forms
employed within law enforcement or investigative of auditing, interviewing, and surveillance. In
organizations. Major corporations are also using many cases, retail loss prevention officers also are
the services of those who can conduct applied involved in educational programs for employees.
research on an organization’s loss problems. Crime Coordinating and delivering awareness programs
analysts help pinpoint where crime is occurring on internal loss, organized retail crime (ORC),
by day, time, and location. They aid in more effec- safety, and related topics are functions that are
tively deploying personnel and other resources often performed below the managerial level.
23
Substance Abuse
Francis J. Elliott, Glen Kitteringham, and
Terence M. Gibbs
269
270 23. SUBSTANCE ABUSE
and the employer, and the methods by which Green, 2008) and 90% of alcoholics are
to prevent or confront these risks. As a security employed in the workplace. Many of these
professional, you must be prepared to deal with employees are poly-drug abusers. That is,
substance abuse on the job and effectively com- they abuse more than one drug in the course
municate your observations and information of their drug-taking behavior. Employees with
to your supervisor. Because of your daily inter- alcohol and other drug problems represent
action with employees and others who visit 10–20% of any given workforce. Within this
your workplace, you must be able to recognize workforce, the highest concentration of abus-
conditions that may point to a security risk or ers is within the 18- to 25-year-old age group.
vulnerability A 2007 U.S. Department of Health and Human
For the purposes of this chapter, the phrase Services study shows that 20% of work-
“substance abuse” refers to the use, usually ers age 18 to 25 use drugs on the job, while
self-administered, of any psychoactive drug, the rate for 27- to 34-year-olds is 10%, 35- to
in a manner that deviates from the approved 49-year-olds is 7%, and 50- to 64-year-olds is
legal, medical, or social patterns within a given 2.6% (Larson, Eyerman, Foster, & Gfroerer,
culture. A drug is defined as any substance 2007). The Canadian Centre for Occupational
that by its chemical nature alters the structure Health and Safety put the 2002 economic cost
or function of the living organism. A psycho- of substance abuse to the Canadian workplace
active drug is one which alters the structure or at $39.8 billion (www.ccohs.ca/oshanswers/
function of the brain. Psychoactive drugs alter psychosocial/substance.html). U.S. government
mood, perception, or consciousness. Examples data suggests that the economic cost of the
include nicotine, alcohol, marijuana, cocaine, United States’ extensive involvement with mind-
amphetamines, and LSD. altering drugs and alcohol may be close to $400
Because our focus is on drugs that directly billion annually to the American business
affect performance and behavior on the job, community (U.S. Department of Health and
nicotine will not be a focus of this chapter. Human Services, 2009). The annual cost for a
However, it is important to note that nicotine single employee with a substance abuse prob-
consumption produces classic drug depen- lem is reported to be between 5% and 15% of
dence characteristics. Along with alcohol, it is a company’s health care budget (Fischer et al.,
considered a gateway drug for those who ulti- 2008). The European Monitoring Centre for
mately use other dependence-producing drugs, Drugs and Drug Addiction (2009) estimates
such as marijuana and cocaine. Finally, nicotine that at least 100 million Europeans, or 32% of
has been clearly identified as an insidious sub- the population, have a lifetime prevalence for
stance responsible for approximately 5.4 million using such drugs as cannabis, cocaine, ecstasy,
deaths worldwide and is referred to the big- amphetamines, and opioids. It is safe to assume
gest “killer in the world” by the World Health that their workforce is also directly impacted
Organization (United Nations Press Briefings/ by substance abuse. Aside from the substance
Tobacco). abuser population, there exist an unspecified
number of employees who are codependent.
These employees do not abuse drugs. However,
IMPACT ON BUSINESS AND they share a common thread. They are the
INDUSTRY spouses, children, and significant others who
arrive for work each day preoccupied with the
In the United States, recent studies reveal that physical and emotional condition of their loved
75% of illicit drug users (Fischer, Halibozek, & ones.
How each substance abuser will land is unpre- person. We also know that there are not enough
dictable, and is often guided by circumstance of these programs to meet the needs of the
beyond anyone’s control. afflicted. According to the U.S. government,
the cost offset is tremendous. For every $1.00
spent on treatment, $7.00 is saved on crime and
HOW PROBLEMATIC BEHAVIOR criminal justice costs. When factoring in health
AND DEPENDENCE DEVELOP care savings, a total of $12.00 is saved (U.S.
Department of Health and Human Services,
Today, drug dependency is viewed as a dis- 2009). In spite of the various programs and mod-
ease with identifiable causes, signs, and symp- els, we know that recidivism rates are high. So,
toms. As such, in many jurisdictions people for all that is known, the experts still have much
with addiction issues are protected by human to learn and continue to do so each day. There is,
rights councils. Dependency follows a predict- however, a solid body of evidence pertaining to
able course and outcome, and it is treatable. the stages of dependency and associated behav-
The disease of drug dependence can be the iors which the protection officer should know.
following: An understanding of the process is critical to
prevention and rehabilitation efforts.
● Primary—it is not simply the symptom
Drug dependence follows a predictable
of some other problem(s); it is in itself the
course of action which, most often, begins with
problem.
experimentation. This may be the result of curi-
● Contagious—it attracts others who are
osity, peer pressure, or a variety of other vari-
vulnerable.
ables or combination of variables. Everyone
● A family disease—it affects entire families,
is susceptible to the abuse of drugs and some
not just the individual abuser.
more so than others due to a host of social, envi-
● Chronic—it is difficult to control, is quite
ronmental, psychological, and biological issues
often recurring, and although treatable, it is
or, in some cases, heredity. What is significant is
incurable.
that each incidence of use makes the user more
● Fatal—it takes hundreds of thousands of
susceptible to continued use, up to and includ-
lives annually.
ing dependence. Further, the earlier drug use
Drug dependence may be physical or psy- begins, the more likely it is to progress to abuse
chological, and it represents an individual’s loss and dependence.
of control. Physical dependence occurs when a Another facet of dependence is recovery. The
person cannot function normally without the individual user has a greater opportunity for a
repeated use of a drug. If drug use is abruptly full recovery if treatment begins before depen-
discontinued, the person experiences severe dence sets in. The longer one uses a drug(s),
physical and psychic disturbance, known as the more complex the physical and psychologi-
withdrawal. Psychological dependence pro- cal symptoms become. As a result, recovery for
vides a strong psychological desire to continue the dependent person, or daily user, is a greater
the self-administration of drugs for a sense of challenge in most instances than recovery from
improved well-being. occasional use or experimentation. This is why
A great number of programs and treatment early intervention is significant.
approaches exist for the treatment of drug Whether an intervention occurs at home,
dependencies. What we do know about these work, school, or in the community, it is certain
various programs is that no single approach or that the earlier the intervention takes place the
program is effective for every drug dependent greater the opportunity is for recovery.
resources to establish sound drug-free work- by the layperson. These signs include the
place programs that will meet this challenge. following:
1. Observation of drugs and/or drug
paraphernalia in the workplace.
CONDITIONS ADVERSELY 2. Observation of suspicious activity, especially
AFFECTING THE WORKPLACE in secluded areas of the facility or parking
lots. Whenever suspicious activity is
As substance abusers arrive for work each
observed, you should immediately contact
day, they generally fit into one or more of these
your supervisor and request backup before
categories that present threatening conditions
approaching. However, immediate action
for employees and their employer:
may be necessary if a threat to personal
1. Appear for work under the influence of safety exists.
drugs and will be openly and obviously 3. Scent of chemical odors not commonly
impaired, or intoxicated and unfit for duty. present in the workplace.
2. Possess and use drugs on the job. Although 4. Observation of abnormal behavior, including
they are impaired, it will not be evident. the signs of intoxication. Keep in mind that
3. Sell or otherwise distribute, or transfer not all abnormal behavior is an indication
illegal drugs or legal drugs illegally, while of substance abuse. Some employees may
on the job. have legitimate medical problems that can
4. Display impairment due to the residual result in behavior similar to intoxication.
effects of drugs taken hours or even days Regardless of the cause, immediate action is
prior to coming to work. These effects may required to protect the employee, coworkers,
include emotional outbursts, personality and the company’s property and interest.
changes, irritability, combativeness, memory
problems, and the inability to complete
assignments.
5. Have codependent loved ones working at
HOW MUST INDUSTRY
jobs where they will be less productive.
RESPOND?
Keeping in mind that the protection officer The workplace plays an integral part in the
is not a diagnostician, recognizing impairment fight against substance abuse. When continued
due to sustained low dosages and residual employment is conditional upon being drug-
effects, or codependence, will be unlikely unless free, then employment becomes a powerful
he/she is informed of this by a third party. If incentive in support of a drug-free workplace.
third-party information is received, then the When a company demonstrates commitment
protection officer should bring this intelligence to a comprehensive program in support of a
to his/her supervisors immediately. These con- drug-free workplace, then the opportunity to
ditions are best left to supervisors and manag- affect attitudes, behavior, and the lifestyles of
ers who can evaluate these issues as a matter employees is significant. Through the influ-
of job performance and make the necessary ence of these programs, employees are likely
referrals, or take disciplinary action when per- to make healthier choices. Employees who are
formance is considered to be deteriorating. educated and committed to a drug-free life-
However, the protection officer should be alert style convey this attitude to their families and
for the outward signs of drug possession, use, friends. In effect, the employee not only serves
and distribution, which are often overlooked to reduce substance abuse at work, but he/she
strategy. However, these components cannot drugs can effectively supplement their income
address all situations. Sometimes a security by removing valuable equipment or money
response is required. This is true when reck- from the employer or other employees.
less and wanton behavior places the safety To counteract the activities of drug dealers,
of employees and the interest of the com- the company’s security department or inde-
pany at great risk. Protection officers should pendent contractor may have to employ certain
clearly understand why and when the security investigative techniques. For the most part, these
response is necessary. techniques include interviews with employees,
There is a small percentage of substance undercover operations, covert surveillance, or
abusing employees, perhaps 4–10%, who will searches conducted by drug-sniffing dogs or
not accept or benefit from an offer of assis- chemical process.
tance in the way of treatment or counseling. Interviews are conducted for the purpose of
These individuals include drug dealers who gathering intelligence that may dictate future
may or may not use drugs on the job, and users action, such as policy changes or the selection
who are not interested in or ready for recovery of an investigative technique. Employees quite
because they are in denial. Employees who deal often possess critical information, but may not
drugs are engaged in criminal activity that can- recognize its significance unless questioned by
not be tolerated. They make available the sup- a trained investigator.
plies on which troubled employees depend and An undercover operation is a specialized
they establish new opportunities for other types investigative technique. It is employed for the
of criminal activity such as gambling, pros- purpose of covertly infiltrating a workforce in
titution, and theft. A survey conducted with order to identify violations of company policies
substance abusing employees revealed that or law. These investigations are usually initiated
44% had sold drugs on the job. They sell their when there is a suspicion or clear knowledge
drugs in bathrooms, parking lots, vehicles, and that drug dealing is taking place, but the source
secluded areas. and the degree are unknown. Even if a source
In some cases, major drug trafficking orga- was identified, in many instances an undercover
nizations have directed dealers to secure jobs operation may be necessary to gather the evi-
in industry and to develop a clientele. Why? dence required for disciplinary or legal action.
Because (1) there is low police visibility, (2) Covert surveillance or hidden cameras are
security forces are well known and predictable, used when the activity in question is confined
and (3) there is a ready-made clientele. These to an individual or specific location. When this
types of employees create morale and safety is the case, a special surveillance camera can
problems and, in many cases, create a great be covertly secreted inside a ceiling, wall, fix-
deal of intimidation for employees and manag- ture, or a variety of other areas restricted only
ers alike. by one’s imagination. The greatest advantage to
Theft is a major problem for both employers the hidden camera is the undisputed nature of
and employees. Employees who use drugs on the evidence, a picture of the event, and those
or off the job need to support that use. In many responsible.
cases the cost of drugs is very high, costing The act of searching a work area or entire
thousands of dollars a month. To support this workplace is not a common practice in most
need, employees have been guilty of the theft industries. When a search is performed it is
of valuables such as equipment, money, and usually carried out by drug-sniffing dogs or by
trade secrets. By contrast, a person who spends chemical analysis. Most employers reject searches
$20.00–40.00 a week for marijuana and/or other by dogs, based on the perceived negative impact
(Black Beauties), Dexedrine (Dexies), and Ben- drugs. This not only creates an image problem,
zedrine (Pink Hearts). Ritalin and Preludin but also a safety problem, because many of the
are amphetamine-like substances that are also necessary precursor chemicals are highly flam-
popular. mable and/or explosive.
Amphetamines are taken orally as tablets
or capsules that vary in color, shape, and size.
Some, like methamphetamine or methcathinone Depressants: Alcohol, Barbiturates,
(CAT), are available in powder form and are Tranquilizers, Rohypnol
injected, snorted, or taken orally.
1. Behavior like that of alcohol intoxication, but
In addition to the drugs listed above, a whole
without the odor of alcohol on the breath
new class of substances referred to as “looka-
2. Staggering, stumbling, or decreased reaction
like” drugs have become problematic. Initially
time
utilized by truck drivers and students, these
3. Falling asleep while at work
substances have now infiltrated the workplace
4. Slurred speech
and are taking their toll. These substances can
5. Constricted pupils
be distributed legally. They consist of capsules,
6. Difficulty concentrating and impaired
tablets, and powders that contain legal, OTC
thinking
stimulants such as caffeine and ephedrine. They
7. Limited attention span
are marketed as “stay awake” and “stay alert”
drugs. However, their use can cause irritabil- These drugs, with the exception of alcohol,
ity and fatigue that in turn has contributed to are produced and obtained in the same manner
morale problems within the workforce. as amphetamines.
The use of stimulants, often referred to as The most commonly abused drugs in this
“uppers” or “speed,” on the job poses three group, aside from alcohol, are the barbiturates,
serious problems. First, being under the influ- such as Secondal (Red Devils), Tuinal (Rainbows),
ence of these drugs gives one a false sense and Nembutal (Yellow Jackets), and the benzodi-
that they are capable of achieving any task or azepines, such as Valium and Librium. Another
conquering any challenge. In this condition, popular drug in this classification is Rohypnol.
employees may use poor judgment or attempt The depressants possess two important char-
tasks that are beyond their training and knowl- acteristics that bear mentioning. First, as stated
edge, resulting in wasted time, property or per- in the definitions at the beginning of this sec-
sonal damage, safety infractions, and accidents. tion, they are potentiating when combined with
Second, in a stimulated, talkative, and hyperac- other depressant drugs. Second, withdrawal
tive condition, users often disrupt coworkers, from alcohol and other depressants is life-
thereby creating employee morale problems. threatening, and should always be done under
Finally, stimulant users tend to repeat tasks. medically supervised conditions.
This reduces productivity and quality control, Valium and Librium are the most widely pre-
and can affect morale in an environment depen- scribed and abused tranquilizers. They are also
dent upon a team effort. potentiating when combined with alcohol, bar-
Note: Many precursor chemicals necessary biturates, or other tranquilizers.
to manufacture illegal drugs are legitimately “Lookalike” substances containing antihis-
used in private industry. To avoid theft of tamines and analgesics like acetaminophen are
these chemicals by drug traffickers, a company also available as described for the stimulants.
should establish safeguards. Also, the work- Rohypnol is one of the latest fad drugs of the
place has been used to manufacture illegal 1990s, and is becoming increasingly popular
1. Odor of substance inhaled on breath and The role of any protection officer is that of
clothes protecting people and assets. The protection offi-
2. Excessive nasal secretions and watering of cer accomplishes this responsibility by observing
the eyes and reporting incidents or situations which pre-
3. Poor muscular control sent a threat to the people and assets he or she
4. Drowsiness or unconsciousness has a duty to protect. Substance abuse is one such
H
a LSD Acid, Microdot None None Degree Unknown Yes 8 to 12 Oral
l
l
u Mescaline and Peyote Mescal, Buttons, Mesc None None Degree Unknown Yes 8 to 12 Oral
c Illusions and hallucinations (with Longer and more intense “trip”
Withdrawal symptoms not
i MDA STP, Ecstasy, exception of MDA); poor episodes, psychosis, possible
Amphetamine Variants Yes Variable reported
COM, MDMA None Degree Unknown Degree Unknown Oral, Injected perception of time and distance death
n
o
Oral, Smoked,
g Phencyclidine PCP, Hog, Angel Dust None Degree Unknown High Yes Days Injected
e
n Oral, Injected,
s Other Hallucinogens DMT, DET, Psilocybin None None Degree Unknown Possible Variable Smoked, Snorted
C
a Pot, Frass, Sinsemilla,
n Thai Sticks, Marinol Marijuana - None,
Marijuana, THC Degree Unknown Moderate Yes 2 to 4 Oral, Smoked Euphoria, relaxed inhibitions,
n (Synthetic THC) THC - Antiemetic Fatigue, paranoia, possible Insomnia, nervousness, and
increased appetite, depth and
a psychosis decreased appetite
time perception distorted
b
i
s Hashish and Hashish Oil Hash, Hash Oil Hashish - None Degree Unknown Moderate Yes 2 to 4 Oral, Smoked
S Depo-Testosterone,
t Testosterone Delatestryl Hypogonadism Degree Unknown Degree Unknown Degree Unknown 14 to 28 days Injected
e Virilization, acne, edema,
r Anemia, Breast aggressive behavior, testicular Unknown Possible depression
o Nandrolone Nortestosterone, DECA Cancer Degree Unknown Degree Unknown Degree Unknown 14 to 21 days Injected atrphy, gynecomastia
i
d
s Oxymetholone Adadrol - 50 Anemia Degree Unknown Degree Unknown Degree Unknown 24 Oral
FIGURE 23-1 Controlled substances: Uses and effects. (Source: National Drug Institute.)
283
284 23. SUBSTANCE ABUSE
threat, and the protection officer represents a crit- Finally, every protection officer should com-
ical component in a company’s effort to combat municate his/her knowledge about the causes
this threat and maintain a drug-free workplace. and effects of substance abuse beyond the con-
By understanding the scope and nature of this fines of the workplace. By sharing this vital
problem, along with the specific security-related information about the perils of abuse, the pro-
concerns, the protection officer will be prepared tection officer can influence his/her family and
to recognize and report substance abuse situa- community in a most positive way.
tions that undermine safety and security.
EMERGING TRENDS
As we have seen in this chapter, substance prescription painkillers is safer than abusing
abuse is nothing new in our society. In recent “street” drugs (www.usdoj.gov/dea/
years, however, a new face of this menace emerged concern/prescription_drug_fact_sheet.html.
on the scene, presenting an immediate and future Retrieved on October 5, 2009).
threat to our well-being. It is the face of pre-
The ready accessibility of prescription drugs
scription drug abuse. Even children are abusing
subject to abuse and the misperception that they
prescription drugs.
are safer than street drugs must be addressed
Prescription drug diversion and abuse are
and corrected. The Substance Abuse and Mental
rapidly growing phenomena in our population.
Health Services Administration (SAMHSA),
The U.S. Drug Enforcement Administration’s
in its 2006 National Survey on Drug Use and
“Fact Sheet: Prescription Drug Abuse—a DEA
Health (September 2007), reports that 70% of
Focus,” presents sobering data regarding this
pain relievers, both prescription and OTC drugs,
emerging trend, including:
are obtained from friends or relatives (www
● The number of Americans abusing .usdoj.gov/dea/concern/prescription_drug_
prescription drugs increased from 3.8 million fact_sheet.html. Retrieved on October 5, 2009).
in 2000 to nearly 7 million in 2006, a startling The implications of this growing trend are
increase of 80%, more than the number who of great concern to security professionals. The
are abusing cocaine, heroin, hallucinogens, teenagers of today who are abusing prescription
Ecstasy, and inhalants combined. drugs are the adults of tomorrow who may very
● Prescription pain relievers are new drug well continue that abuse. Entering the work-
users’ drug of choice, vs. marijuana or place, they will bring with them the yoke of drug
cocaine, with hydrocodone being the most abuse and addiction that can lead to numerous
commonly diverted and abused controlled security threats, including employee theft and
pharmaceutical in the United States. workplace injury and violence.
● Opioid painkillers now cause more drug To rise up and effectively defeat this challeng-
overdose deaths than cocaine and heroin ing trend, we must develop and deliver to all
combined. stakeholders in our society a competent training
● Nearly 1 in 10 high school seniors admits to program that will raise their awareness level and
abusing powerful prescription painkillers. enable them to promptly and adequately iden-
A shocking 40% of teens and an almost tify the telltale signs of prescription drug abuse.
equal number of their parents think abusing This training must include the requisite steps
to be taken to restrict teen access to these drugs to grow and develop into healthy adults who
and encourage them in their lawful, proper, and will contribute to communal safety and security
responsible use, thereby enabling our children rather than threaten and undermine it.
8. Psychoactive drugs affect which of the 10. The protection officer is to take which of the
following: following actions in reference to substance
a. Brain abuse behavior in the workplace:
b. Blood a. Set up an undercover operation
c. Lungs b. Arrest the perpetrators
d. None of above c. Observe and report to your up line
9. Nicotine and marijuana are referred to as d. None of the above
which of the following:
a. Equal in terms of habit forming drugs
b. A harmless recreational drug
c. The most dangerous drug
d. Gateway drugs
24
Workplace Violence
Timothy A. Pritchard and Roger Maslen
287
288 24. WORKPLACE VIOLENCE
● Sabotages equipment and steals property for revenge However it manifests itself, “workplace vio-
● Verbalizes wishes to hurt coworkers and/or lence is a growing concern for employers and
management employees nationwide” (OSHA, 2002). While
● Sends sexual or violent notes to coworkers and/or we intuitively know that workplace violence has
management occurred in organizations for as long as organi-
● Sees self as victimized by management (me against zations have existed, only in recent decades has
them) the U.S. government measured and statistically
Level 3—Highly Injurious reported on the topic. One of the first work-
● Physical attacks and assaults shops held on the topic was on occupational
● Psychological trauma homicide prevention in 1990 in Washington,
● Anger-related accidents DC. This workshop, which was sponsored by
● Rape, arson, murder the National Institute for Occupational Safety
and Health (NIOSH), concluded, in part, that “it
is clear from the available data that workplace
Once you understand the types of work- violence is a public health problem of signifi-
place violence, you must also understand their cant proportion” (Bell & Jenkins, 1992). In that
sources. There are generally four sources of report, which covered the years 1980–1985, it
workplace violence: was reported that homicide was the third larg-
Criminal acts. A perpetrator has no relation- est cause of occupational injury death in the
ship to the business and commits a violent act at workplace. The statistics gathered in this study
a worksite in the course of committing another speak specifically to homicides. Today’s work-
crime. For instance, a homicide or assault occur- place violence analysis has a much better view
ring in the course of a robbery. of the problem.
Customer/client/patient violence. The per- In a 2006 survey conducted by the Bureau of
petrator is not an employee, but has a relation- Labor Statistics, U.S. Department of Labor, for the
ship with the business as a customer, client, or National Institute for Occupational Safety and
patient, and becomes violent while receiving Health, Centers for Disease Control, for the per-
services, or for reasons engendered by the busi- iod from September 2004 to June 2006, shows a
ness relationship. For instance, when a psychiat- broader and more detailed outlook of the perva-
ric patient assaults a physician, or a disgruntled siveness of workplace violence. From that survey,
client or customer threatens a company or one we learn that nearly 5% of the 7.1 million private
of its employees. industry businesses in the United States had a
Worker-on-worker violence. Stems from an workplace violence incident in the 12 months
employment relationship; this includes inci- prior to the survey. The survey found for employ-
dents in which a current or former employee ers with over 1000 employees:
(or independent contractor) harms or threatens
to harm another employee.
Workplace Violence Experience
Violence stemming from a personal relation-
ship. They occur in the workplace, but arise from Have Had an Incident 49.9%
a personal, or intimate, relationship between Criminal 17.2%
the perpetrator and victim. Someone may be
harassed, threatened, or harmed at their work- Customer/Client 28.3%
place by an abusive partner. This may occur in Co-worker 34.1%
instances where the abused partner, the abuser, or Domestic Violence 24.1%
both are employed at the workplace in question.
very real. Costs for losses could also be incurred officers will likely be among the first on the
over and above any insurance the organization scene if an incident occurs. Thus, it is essen-
may have. tial that security officers possess the personal
Loss of productivity. Employees placed in demeanor and professional skills necessary to
stressful situations and faced with traumatic respond to and successfully manage a work-
events of varying levels will quite probably place violence incident. Security personnel can
experience a reduction in productivity. For com- provide valuable assistance to law enforcement
panies already doing more with less, as a result officers who respond to a threat or violent inci-
of current financial realities, this could have sig- dent. A good, positive relationship with local
nificant impact on projects and core business. police agencies should expedite police response
Repair or replacement of equipment and to an incident. Each sector of our workforce
facilities. Vandalism, theft, damages caused by requires different skills from the security officer
an event of any level, could incur unnecessary (i.e., a security officer working at an industrial
costs to the corporation. site requires different skills from one working
Therefore, it is incumbent on the organiza- at a mall or hospital). However, the following
tional leadership to do all they can, at all lev- skills and attributes can considerably add to the
els, to prevent a workplace violence incident individual’s ability to have a positive impact on
from occurring. All individuals in the security the workplace violence prevention plan:
department, including all security officers, must ● Sound powers of observation
be an integral part of this prevention process to ● Vigilance of the activities in the workplace
achieve the maximum level of success. ● Ability to identify signs of potential violence
A successful workplace violence preven-
and effectively communicate them
tion program requires participation of several ● Strong skills in dealing with difficult people
departments inside an organization, including ● Ability to respond in a crisis
security, human resources, risk management, ● Verbal communication skills
and trade unions. This list is only an example; ● Clear understanding of the policies,
each organization may include or exclude cer-
procedures, and plans
tain departments as makes sense for their busi-
ness. The key is that the plan requires active Preparation for a likely incident, especially
participation by many. The plan consists of sev- one involving an external threat, is much easier
eral components, including: than preparing for any eventuality involving
an internal incident. Of all the workplace vio-
● A general workplace violence policy which
lence threats, there is little question that internal
is supported by the highest level of the
workplace violence threats cause organizational
organization and clearly supports a zero-
leaders the most significant level of anxiety.
tolerance position
This is due to the uncertainty of when and how
● Identification of organizational risks
a threat can emerge within the organization.
● A prevention plan
Upon investigation of incidents after they
● A response plan to workplace violence
occurred, it became apparent that people who
incidents (including testing of the plan)
perpetrated workplace violence displayed warn-
● An employee communication and awareness
ing signs prior to the incident. The good news is
program, which includes training for all
that only a very small percentage of employees
levels of staff and plan-active participants
who have violent propensities will actually per-
The security department is a key component form a violent crime. Employees who commit-
of the workplace violence plan, and security ted workplace violence often started out at the
EMERGING TRENDS
In recent years, the Internet has had an effect There is also more legislation, both in place
on workplace violence. There is much informa- and being written, to reduce the risk of work-
tion on the Internet about weapons, bomb mak- place violence. In some jurisdictions, Working
ing, and other strategies, and yet, there is also Alone Legislation either prevents employees
a lot of information on workplace violence and from working alone, or ensures that if they are
how to prevent it. Naturally, this has lead to working alone, they must be checked on at regu-
more public awareness of the issue. lar intervals.
that an organization can take to prevent a work- fact, the opposite is true. Every organization
place violence incident from occurring, and to has its inherent risks, and those risks must be
better prepare the security officer to recognize identified and mitigated by the organization’s
a potential threat and take appropriate preven- leadership. The security team should be a sig-
tive action, or properly react to an incident as it nificant part of this planning and mitigation
occurs. There is not one response plan or pro- effort. If an organization fails to plan, then it is
gram that fits the needs of all organizations. In planning to fail.
References
Bell, C. A., & Jenkins, E. L. (1992). Homicide in U.S. work-
S E CURI TY QU I Z
places: A strategy for prevention and research. Morgantown, 1. Workplace violence is broadly defined as the
WV: United States Department of Health and Human use of violence against workers.
Services.
a. True
Duhart, D. T. (2001). Violence in the workplace 1993–99. NCJ
Publication No. 190076. Washington, DC: United States b. False
Department of Justice. 2. Workplace violence can be categorized into
Occupational Safety and Health Administration. (2002). three levels. Fill in the blank for each level, and
Workplace violence fact sheet. United States Department of cross reference with the examples of each level.
Labor.
___________ Injurious (A)______ Argues with
United States Office of Personnel Management. (1998).
Dealing with workplace violence (OWR-09). customers
Sygnatur, E. F., & Toscano, G. A. (2000). Work-related homi- ______ Swears at others
cides: The facts. United States Bureau of Justice Statistics. ___________ Injurious (B)______ Physical
Bureau of Labor Statistics, U.S. Department of Labor, for the attacks
National Institute for Occupational Safety and Health,
______ Pranks
Centers for Disease Control. (2006). Survey of workplace
violence prevention, 2005. http://www.bls.gov/iif/oshwc/ ___________ Injurious (C)______ Verbalizes
osnr0026.txt . desire to hurt coworkers
ASIS International. (2005). Workplace violence prevention and ______ Causes psychological trauma
response guideline. ASIS International.
3. Workplace violence can occur in almost 7. Although the 2006 survey discussed in this
every workplace: small businesses, large section indicated that 51.4% of respondents
companies, government facilities. reported that workplace violence events had
a. True no effect on their workplace, 29.7% reported
b. False that this effect was observed:
4. An employee who exhibits rude manners a. Absenteeism
toward his or her fellow workers is a definite b. Turnover
workplace violence threat. c. Fear levels
a. True d. Productivity
b. False e. Morale
5. In a 2006 survey conducted by the Bureau of 8. Examples of workplace violence
Labor Statistics, U.S. Department of Labor, for situations are
the National Institute for Occupational Safety a. One worker’s aggression toward his or
and Health, Centers for Disease Control, what her fellow employees in the workplace
percentage of workplace violence events were b. An armed robbery of a taxicab driver
perpetrated by coworkers? c. Criminal activity involving personal
a. 22.7% injury to a worker
b. 34.1% d. All of the above
c. 24.1% 9. According to this chapter, the generally
d. 12.5% recognized primary objective of a security
6. There are many effects of workplace violence program is the protection of:
on an organization. Find the most correct a. Property and the organization’s
group of effects below. employees
a. Interruption to sales, Increased wages, b. People, property, and information
Loss of management, Repair/replacement c. Fire, property, and information
of equipment/facilities d. People, property, and money
b. Interruption to business, Increased 10. According to this chapter, a very small
legal/wages, Loss of machines, Repair/ percentage of employees who have violent
replacement of equipment/facilities propensities will actually perform a violent
c. Interruption to business, Increased legal/ crime.
medical fees, Loss of productivity, Repair/ a. True
replacement of equipment/facilities b. False
d. Complete organizational failure