chapter three private security concepts, tools and systems convergence 1
TRANSCRIPT
![Page 1: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/1.jpg)
Chapter ThreePrivate Security Concepts, Tools
and Systems Convergence
1
![Page 2: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/2.jpg)
Risk Management Criminal events and natural disasters
are often impossible to predict or prevent
Even the best security systems, operations, personnel and planning can’t foresee or prevent these tragic events from occurring
Mitigating the effects of an attack, is of paramount concern
2
![Page 3: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/3.jpg)
Risk Management “Risk Management” is the process of
balancing the cost of security with the overall corporate goal of producing goods, services and profits
And, the essential tools of Risk Management are: Risk Analysis or Risk Assessment and The Security Survey
3
![Page 4: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/4.jpg)
Risk Management “Risk Management” can also be defined
as the process involved in the anticipation, recognition, and appraisal of a risk and the initiation of action to eliminate the risk entirely or reduce the threat of harm to an acceptable level
4
![Page 5: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/5.jpg)
Risk Management A good “Risk Management” program
involves four basic steps: The identification of risks or specific
vulnerabilities An analysis and study of these risks
The likelihoodThe degree of danger in the event
5
![Page 6: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/6.jpg)
Risk Management A good “Risk Management” program
involves four basic steps: The optimization of risk management
alternatives The ongoing study of security programs
Not a one time programTest and retest the program Improving all the time
6
![Page 7: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/7.jpg)
Risk Management Curtis & McBride define “Risk
Management” as: A comprehensive review of assets that
could be damaged, stolen or lost presenting countermeasures to
reduce such losses Predicting long term consequences
7
![Page 8: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/8.jpg)
Risk Management Curtis & McBride suggest asking the
following questions What are the assets? How are these assets valuable? What are the threats to the assets? What is the probability that these
scenarios will occur?
8
![Page 9: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/9.jpg)
Risk Management Curtis & McBride suggest asking the
following questions What is our liability if such events
occur? What do we do to get back to
business or restore services if an event occurs?
What is the effect on our business and leadership reputation?
9
![Page 10: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/10.jpg)
Risk Management Curtis & McBride say that once the
major risks have been identified: Each risk must be ranked in terms of
probability that it could occur And then identify countermeasures to
deal with them
10
![Page 11: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/11.jpg)
Risk Analysis or Risk Assessment Risk Analysis is the major tool in the Risk
Management Process The process of identifying potential
areas of security problems and loss The development and implementation of
effective measures or countermeasures to deal with these problems
11
![Page 12: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/12.jpg)
Risk Analysis or Risk Assessment An effective “Risk Assessment”
Risk: What are the assets that can be subject to risk?
Vulnerability: How difficult is it to get to the high risk assets?
Probability: What are the chances that such a risk may occur?
Countermeasures: What can security do, given the resources available?
12
![Page 13: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/13.jpg)
Risk Analysis or Risk Assessment “Risk Assessment” allows management to
design countermeasures that are effective, but do not interfere with the operations of the business
“Risk Assessment” allows management to make decisions that balance the cost v. the level of protection desired
But, managers can’t always make decisions based solely on a cost-benefit analysis
13
![Page 14: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/14.jpg)
Risk Analysis or Risk Assessment The example of School Shootings
Metal detectors? Electronic video systems Security officers All of the above are not cost effective,
but when dealing with lives, you can’t put a price on a life!
14
![Page 15: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/15.jpg)
The Security Survey The “Security Survey” is a comprehensive
physical examination of a premise and a thorough inspection of all security systems and procedures
The object of the “Security Survey” is the analysis of a facility to determine the existing state of security, locate weaknesses in its defenses, determine the degree of protection needed and recommendations for establishing a total security program
15
![Page 16: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/16.jpg)
The Security Survey The “Security Survey” may be conducted
by “In House” personnel or contracted out to a security consulting firm
The “Security Survey” includes: A physical inspection of the facilities Examination of police and internal
reports Interview of all personnel familiar with
any aspects of the organization Organizational procedures
16
![Page 17: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/17.jpg)
Proprietary and Contract Services “Proprietary Security Services” are “in
house” services performed by people employed directly by the organization for which they provide these services
“Proprietary Security Personnel” are regular employees of the firm and are paid by the firm
Fortune 1000 companies usually have their own “Proprietary Security”
17
![Page 18: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/18.jpg)
Proprietary and Contract Services “Contract Security Services” are provided
by other agencies and private practitioners for a fee
“Contract Security Services” lease or rent their services to the agency
The officers and other security personnel are paid by the contract agency
Malls, sporting events or other organizations employ ‘Contract Security Services” (Wackenhut…)
18
![Page 19: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/19.jpg)
Proprietary and Contract Services Proprietary officers receive benefits from
the company and are seen as “Company Men” and are therefore are more trustworthy than Contract officers
Proprietary officers have less turnover, can be used at important posts, executive escorts, supervise “contract officers”, more caring, better appearance…
19
![Page 20: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/20.jpg)
Proprietary and Contract Services Managers must also be concerned with
“Liability Issues” Inappropriate or unlawful actions of a
contract officer can be a liability for the contract company and the employing organization
Managers can find “Contract Services” online by the use of “Reverse Auctions” where Contract Security Services bid on services (services must be stated in advance)
20
![Page 21: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/21.jpg)
Overt and Covert Security “Overt Security” is using observable
methods to provide security Visual patrols designed to provide
protective and loss prevention “Covert Security” is using undercover
methods to provide security Undercover surveillance to detect
lawbreakers, prevent espionage, protection of trade secrets
21
![Page 22: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/22.jpg)
The Command or Control Center Large organizations establish a formal
“Command Centers” to monitor all security operations, including alarms, electronic video surveillance and security officer operations
Automated systems can reduce personnel costs, improve response times and improve operations from the “Command Center”
22
![Page 23: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/23.jpg)
Crisis Management Teams Large, well managed organizations have
policies and procedures in place for dealing with any crisis or disaster that might arise from crimes or environmental disasters (floods, storms, hurricanes…) Y2K, FEMA, Department of Homeland
Security The “Crisis Management Team” coordinates
all activities with organizational, emergency and governmental personnel
23
![Page 24: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/24.jpg)
Security Officers The first concept of a security officer may
have been when people posted members of their clan to protect them from other humans and animals
One of the earliest forms of contract officer security service was the use of the Swiss Guard at the Vatican (Michelangelo designed their uniforms)
Look at the numbers employed on Exhibits 3.2 and 3.2, page 66
24
![Page 25: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/25.jpg)
Security Officers The concept of managing security officers
is called “Guard Force Management” Effective “Officer Management” supports
all the technical security that a company uses in its security operations
25
![Page 26: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/26.jpg)
Security Officers A 2003 article in USA Today reported that
most of the nation’s 1 million plus security officers are unlicensed, untrained, not subject to background checks and that this $12 billion a year industry is marked by high turnover, low pay, few benefits and little oversight
Review Exhibit 3.3, Security Guard Company Information, page 67
26
![Page 27: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/27.jpg)
Security Officers Armed or Unarmed?
The most important is whether or not the protective value of guns is greater than the dangers they can pose to innocent parties and whether firearms intimidate customers and employees
Officers should be armed in financial institution, around moneys and places like nuclear power plants
27
![Page 28: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/28.jpg)
Security Officers Armed or Unarmed?
Officers should not be armed around people
Insurance companies are worried about liabilities
Armed officers should be more carefully screened, more rigorously trained, and better paid
The National Association for Convenience and Petroleum Retailing (NACS) recommends that convenience store employees not be armed
28
![Page 29: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/29.jpg)
Security Officers Turnover
Turnover occurs when an employee resigns, is involuntarily terminated or retires
Security officer turnover is estimated between 100 and 400% a year
This costs the company thousands of dollars per year in advertising, interviewing, background checks, new employee training, lost hours (overtime), productivity (knowledge)
29
![Page 30: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/30.jpg)
Security Officers Turnover
McNally advises that managers should determine and monitor their turnover rates and then conduct written, anonymous surveys to gather officers opinions on issues that they believe contribute to their retention or voluntary separation
Most of the research has revealed the top reason for dissatisfaction is compensation
Read over Exhibits 3.4 and 3.5, pages 69-70
30
![Page 31: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/31.jpg)
Security Officers Computerized Officer Tour Systems
Computerized Officer Tour Systems record the foot patrol activities of officers and the time and location of each visit they make
A mobile workforce management Global Positioning Tracking System (GPS) is installed in each officers cell phone and patrol vehicle
31
![Page 32: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/32.jpg)
Canine Security Bomb sniffing dogs are “Passive
Response” dogs (they back away from the identified substance, sit down and look at their handler) as opposed to “Aggressive Response” dogs, such as drug, arson, tracking and cadaver dogs that bark and scratch to signal an alert of positive response
32
![Page 33: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/33.jpg)
Canine Security Bomb sniffing dogs are expensive
$8,500 for a fully trained dog $125/hour
Dogs are used at sporting arenas and other entertainment facilities to create an added sense of security
But at the same time there are little if any government regulations
33
![Page 34: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/34.jpg)
Access Control “Access Control” is the use of qualifying
devices or identification methods at various points to control the passage of people and vehicles into or out of an area of structure
“Access Control” limits access to people who have authorization to enter through selected points
“Access Control” controls who goes where and when
34
![Page 35: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/35.jpg)
Access Control How is “Access Control” accomplished?
Security officers (slow and expensive) Mechanical locks Keys Turnstiles Barricades
35
![Page 36: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/36.jpg)
Access Control How is “Access Control” accomplished?
Electronic Access ControlCard readers, keypads, biometric devices…Digital memory can keep track of which doors are used, how frequently, and by whom
The ID database is tied into the Human Resources database (promotions, reassignments, terminations, deprogrammed)
36
![Page 37: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/37.jpg)
Access Control How is “Access Control” accomplished?
Biometric Access Control System“Biometric Identification Systems” automatically recognize individuals by physiological characteristics
The first “Biometric System” and the one most widely used is fingerprint identification
Others include, palm prints, hand prints, retinal scans, voice and facial recognition…
37
![Page 38: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/38.jpg)
Access Control How is “Access Control” accomplished?
Smart Cards“Smart Cards” are computerized identification cards with barcodes that enable the card to be used for numerous purposes, including photo ID, access entry and charging purchases
But “Smart Cards” can ensure that the person swiping the card is the person authorized assess
38
![Page 39: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/39.jpg)
Access Control How is “Access Control” accomplished?
Microprocessor Cards“Microprocessor Cards” include chips that are actually microcontrollers built into them
“Applets” are tiny programs, contained within the cards, that carry out individual applications
39
![Page 40: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/40.jpg)
Alarm Systems “Alarm Systems” are electronic warning or
intruder alert systems Motion detectors on fences, windows, doors
90% of today’s alarm systems rely on telephone lines as their method of signal transmission
40
![Page 41: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/41.jpg)
Alarm Systems The problem is that they can fail if the
signal to the central monitoring station is interrupted by nature or human tampering w/the telephone lines
Today, these systems can be backed up by a wireless transmission system that kicks in whenever the telephone lines are down
41
![Page 42: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/42.jpg)
Alarm Systems Attempts to protect against baby
abductions from maternity wards included uniform security officers, alarms, electronic video surveillance, electronic access control, automatic closing and locking door systems, ID bracelets worn by babies and parents, infant abduction response plan
42
![Page 43: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/43.jpg)
Alarm Systems Alarms are now being used to address the
problem of abduction of babies from hospital maternity wards
The latest technology also allows hospital maternity personnel to attach an alarm device to the umbilical cords of newborns that activates an alarm whenever a baby is brought near the doors of the maternity ward
43
![Page 44: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/44.jpg)
Alarm Systems The National Burglar and Fire Alarm
Association (NBFAA) is a professional association dedicated to representing, promoting and supporting the electronic life safety, security and systems industry
44
![Page 45: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/45.jpg)
Alarm Systems According to the NBFAA a major problem and
issue regarding alarms is the false alarm Too many false alarms places an unnecessary
drain on police resources The answer is a “Verified Response” system,
which requires alarm companies to confirm break ins or security breaches before officers will be deployed to the scene of a ringing alarm (panic, distress, or robbery alarms still have a response)
45
![Page 46: Chapter Three Private Security Concepts, Tools and Systems Convergence 1](https://reader036.vdocuments.us/reader036/viewer/2022062321/56649e005503460f94ae8d4f/html5/thumbnails/46.jpg)
Electronic Video Surveillance “Electronic Video Surveillance” systems allow
the recording of events, including surveillance and security cameras and closed circuit television systems
These systems can passively record or play back video at certain intervals, be actively monitored or be used in a combination of these methods
The use of electronic video surveillance has been consistently held by the Courts to be Constitutional and not a violation of privacy
46