good evening!

20
Good evening! Good evening! I’ll be right back… I’ll be right back… CJ180 will begin at 10pm ET/9pm CJ180 will begin at 10pm ET/9pm CT/8pm MT/7pm PT… CT/8pm MT/7pm PT…

Upload: zamora

Post on 07-Jan-2016

33 views

Category:

Documents


0 download

DESCRIPTION

Good evening!. I’ll be right back… CJ180 will begin at 10pm ET/9pm CT/8pm MT/7pm PT…. Unit 1 Assignments. Discussion 20 points 2 Discussion questions Seminar 20 points Quiz 20 points Did you get all 3 assignments completed ? - PowerPoint PPT Presentation

TRANSCRIPT

Good evening!Good evening!

I’ll be right back…I’ll be right back…

CJ180 will begin at 10pm ET/9pm CJ180 will begin at 10pm ET/9pm CT/8pm MT/7pm PT… CT/8pm MT/7pm PT…

Unit 1 AssignmentsUnit 1 Assignments

Discussion 20 pointsDiscussion 20 points 2 Discussion questions2 Discussion questions

Seminar 20 pointsSeminar 20 points Quiz 20 pointsQuiz 20 points

Did you get all 3 assignments completed?Did you get all 3 assignments completed?

If not, please do so ASAP-you can still If not, please do so ASAP-you can still submit them for credit.submit them for credit.

Unit 2 AssignmentsUnit 2 Assignments

Discussion 20 pointsDiscussion 20 points 2 discussion questions2 discussion questions

Seminar 20 pointsSeminar 20 points Learning Activity 120 pointsLearning Activity 120 points

Unit 2 Learning ActivityUnit 2 Learning Activity

Evolution of Private SecurityEvolution of Private Security Write a 2 to 3 page paper (excluding Write a 2 to 3 page paper (excluding

cover page) responding to the cover page) responding to the following:following:

Describe the evolution of private Describe the evolution of private security.security.

Address how World War II had a major Address how World War II had a major influence on the growth of the private influence on the growth of the private security industry. security industry.

Unit 2 Learning Activity, cont.Unit 2 Learning Activity, cont.

PLEASE NOTE: This essay may require outside research

The paper should contain a cover page and a list of references in APA format (reference page).

All internal citation of outside sources plus the listing of all references should also adhere to APA format.

All text pages should be double-spaced and in 12-point font (Arial, Times New Roman, Courier New).

History of securityHistory of security

English feudalism. . . English feudalism. . . What is it?What is it?

Statute of WinchesterStatute of Winchester Huh?Huh?

FeudalismFeudalism

Simplified:Simplified: Agreement whereby the king gives land Agreement whereby the king gives land

to subjects who agree to protect the to subjects who agree to protect the land (and country) if necessaryland (and country) if necessary

Statute of WinchesterStatute of Winchester Simplified:Simplified:

Each hundred (district) was responsible Each hundred (district) was responsible for unsolved crimes and each man was for unsolved crimes and each man was to keep arms to take part in the ‘hue to keep arms to take part in the ‘hue and cry’ when necessaryand cry’ when necessary

What is the ‘hue and cry’?What is the ‘hue and cry’? Process by which bystanders are Process by which bystanders are

summoned to assist in the apprehension summoned to assist in the apprehension of a criminal who has been witnessed in of a criminal who has been witnessed in the act of committing a crimethe act of committing a crime

Statute of Winchester, cont.Statute of Winchester, cont.

What does this part of the Statute of What does this part of the Statute of Winchester 1285 remind you of?Winchester 1285 remind you of? Moreover, it is commanded that every Moreover, it is commanded that every

man shall have in his house arms for man shall have in his house arms for keeping the peace according to the keeping the peace according to the ancient assizeancient assize

In America…In America…

Alan PinkertonAlan Pinkerton Who was he?Who was he? Why is he important?Why is he important?

9/11/019/11/01

What is the significance of the date What is the significance of the date 9/11/01?9/11/01?

What governmental What governmental department/cabinet position was department/cabinet position was created in response to 9/11?created in response to 9/11?

9/11/019/11/01

Significance: Terrorist attacks on Significance: Terrorist attacks on WTC, Pentagon and White House WTC, Pentagon and White House (potential)-plane taken down by (potential)-plane taken down by passengerspassengers

Department of Homeland Security Department of Homeland Security created in response to those attackscreated in response to those attacks

Department of Homeland Department of Homeland SecuritySecurity

Secretary Janet NapolitanoSecretary Janet Napolitano 33rdrd Secretary in history if DHS Secretary in history if DHS

11stst Tom Ridge Tom Ridge Acting James LoyActing James Loy 22ndnd Michael Chertoff Michael Chertoff

Where does the Secretary of Where does the Secretary of Homeland Security fall in the line of Homeland Security fall in the line of succession to the Presidency?succession to the Presidency?

Dept. of Homeland SecurityDept. of Homeland Security

Department Components (best known)Department Components (best known) Transportation Security Administration (TSA)Transportation Security Administration (TSA) Border Patrol (CBP)Border Patrol (CBP) Immigration and Customs Enforcement (ICE)Immigration and Customs Enforcement (ICE) United States Coast Guard (USCG)United States Coast Guard (USCG) Federal Emergency Management Agency Federal Emergency Management Agency

(FEMA)(FEMA) United States Secret Service (USSS)United States Secret Service (USSS)

Types of SecurityTypes of Security

What are the 3 types of security What are the 3 types of security services mentioned in Unit 2?services mentioned in Unit 2?

3 types of security services3 types of security services

ContractContract ProprietaryProprietary HybridHybrid

Contract SecurityContract Security

Those operations provided by a Those operations provided by a professional security company which professional security company which contracts its services to a company contracts its services to a company

Proprietary SecurityProprietary Security

Those that are “in-house” or Those that are “in-house” or controlled entirely by the company controlled entirely by the company establishing security for its establishing security for its operations operations

Hybrid SecurityHybrid Security

Although contract and proprietary Although contract and proprietary security operations will be around for security operations will be around for many years, the future rests in many years, the future rests in “outsourcing” some of the security “outsourcing” some of the security operations while maintaining operations while maintaining proprietary control over security proprietary control over security managementmanagement

That’s all folks…That’s all folks… Thanks for a great seminar, Thanks for a great seminar,

everyone!everyone! If you don’t have any questions, you If you don’t have any questions, you

are free to leave.are free to leave. I will stay online to answer questions I will stay online to answer questions

if you have any.if you have any. Have a great night, and great week!Have a great night, and great week! Good night!Good night!