1. Trang chủ
  2. » Kinh Doanh - Tiếp Thị

The Professional Protection Officer: Practical Security Strategies and Emerging Trends ppt

623 1,7K 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 623
Dung lượng 2,72 MB

Nội dung

THE PROFESSIONAL PROTECTION OFFICER PRACTICAL SECURITY STRATEGIES AND EMERGING TRENDS INTERNATIONAL FOUNDATION FOR PROTECTION OFFICERS AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW

Trang 2

THE PROFESSIONAL PROTECTION

OFFICER

PRACTICAL SECURITY STRATEGIES AND EMERGING

TRENDS

INTERNATIONAL FOUNDATION FOR

PROTECTION OFFICERS

AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO

Butterworth-Heinemann is an imprint of Elsevier

Trang 3

Butterworth -Heinemann is an imprint of Elsevier

30 Corporate Drive, Suite 400, Burlington, MA 01803, USA

The Boulevard, Langford Lane, Kidlington, Oxford, OX5 1GB, UK

© 2010 Elsevier Inc All rights reserved

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein)

Notices

Knowledge and best practice in this fi eld are constantly changing As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary

Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility

To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence

or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein

Library of Congress Cataloging-in-Publication Data

Application submitted

British Library Cataloguing-in-Publication Data

A catalogue record for this book is available from the British Library

ISBN : 978-1-85617-746-7

For information on all Butterworth-Heinemann publications,

visit our web site at www.elsevierdirect.com

Printed in United States of America

10 11 12 13 14 10 9 8 7 6 5 4 3 2 1

Trang 4

The Cycle of History 14

Demographics 23 Class Struggles and Terrorism 24 Labor Relations 27

Law 29 History of Security Services 31 The Path to Professionalism 33 Contemporary Careers in Asset Protection 34 References 38

Defi nition of a Protection Offi cer 41 Levels of Protection Staff 42 Major Roles of Protection Offi cers 43 What It Means to be a Professional 45 Preventative Functions 48

Mitigation Functions 48 Response Functions 48 Basic Protection Offi cer 48 Intermediate Protection Offi cer 48 Advanced Protection Offi cer 49 Summary 49

References 51 Resources 51

4 The Protection Offi cer

as a Leader

FRANKLIN R TIMMONS AND SCOTT A WATSON Introduction 55

Do You Really Want to be a Leader? 56

Trang 5

iv

Team Member Skills: The Foundation of Leadership 57

Expectations of Leaders 57

Three Critical Leadership Skills 57

Ten Steps to Becoming an Effective Leader 60

The Leader as an Agent of Change 61

Effective Communications Defi ned 75

Due Diligence Based on Effective

Communications 75

Channels of Communications 76

The Six Essentials of Effective

Communications 76

Consider the Audience 76

Verifying Communications with Feedback 77

Myths and Misconceptions in

What is Security Awareness? 83 Expanding the Team Through Partnerships 84 Techniques for Reinforcing Policy and Procedures to Increase Security Awareness 84

Double Loop Learning 85 Tools 86

Lessons Learned 87 Resources 87 References 88

8 Central Alarm Stations and Dispatch Operations

SEAN SMITH, JIM ELLIS, AND RICH ABRAMS Introduction 89

History of Central Alarm and Dispatch Centers 90

Types of Monitoring Systems 91 Types of Sensors 95

Transmission Media 98 Visitor Management Systems 99 Communications 100

Conclusion 101 References 102

Contemporary Security Environment 108 The Role of the Professional Protection Offi cer 112 Summary 113

References 114

Trang 6

CONTENTS v

10 Patrol Principles

CHRISTOPHER A VAIL History of Patrol 117

General Rules for Traffi c Direction 135

12 Crowd Management and

Special Event Planning

PATRICK C BISHOP, TERENCE M GIBBS, AND

JENNIFER LANTZ Introduction 137

Crowd Actions and Suggested Countermeasures 140

When Verbalization Doesn’t Work 142

Security and Demonstrations 142

Formation of a Mob 143

Responsibility and Behavior of Protective Groups 143

Planning Considerations 143

Personal Behavior 144

Riot Control Force Deployment Procedures 144

Crowd Management Assessment 145

Alcohol Serving Considerations 146 Reference 147

Environmental Crime Prevention Versus Social Crime Prevention 152

Theories 152 Routine Activity Theory 156 Crime Pattern Theory 156 Crime Prevention Through Environmental Design (CPTED) 156

Second-Generation CPTED 157 Defensible Space: Crime Prevention Through Urban Design 158

Practical Applications 158 Summary 158

References 159 Resources 159

14 Physical Security Concepts and Applications

KEVIN T DOSS AND DENIS A O’SULLIVAN Physical Security Planning 161 Security Lighting 166

Application Considerations 167 Glazing 167

Intrusion Detection 168 System Monitoring 170 Card Access 170 Locking Hardware 171 Closed Circuit Television 173 Safes and Vaults 175 Underwriters Laboratories 177 Fencing 177

Trang 7

15 Alarm System Fundamentals

DOUG DURANT AND KEVIN POUND

Emergency Access Control 192

Examples of Access Control 192

Audit and Record Keeping 193

Access Authorization 193

Applying Physical Security in Access Control 194

Locks and Key Control 194

Electronic Access Control Systems 195

Access System Database Management 196

Detection Methods 211 Fire Types 211

Extinguishers 212 Permanent Extinguishing Hardware 213 Containment 213

Fire Plans 214 Arson 214 Conclusion 215

19 Occupational Safety and Health

and the Protection Offi cer

KEVIN PALACIOS Introduction 217

Work and Health 218 Basic Elements of an Occupational Safety and Health (OSH) Program 218

Occupational Risks 221 The role of the Protection Offi cer in OSH Programs 222

Key Facts in Accidents 223

20 An All Hazards Approach

to Hazardous Materials

ROBERT D JAFFIN Role of the Protection Offi cer 230 Hazardous Material Incidents 231 Tools and Resources 232 Response Models and Templates 233 The Initial Response 234

Resources 237

Trang 8

Threats to Information and Intangible Assets 243

How Technology is Changing the Threat 245

A Suite of Protective Measures 246

The Role of the Professional Protection Offi cer 249

22 Workplace Crime and Deviance

NORMAN R BOTTOM AND

WHITNEY D GUNTER Theories of Workplace Crime 255

TERENCE M GIBBS Impact on Business and Industry 270

Substance Abuse: What is the Motivation? 271

How Problematic Behavior and Dependence

Develop? 272

How is Substance Abuse Perpetuated? 273

Conditions Adversely Affecting the

Workplace 274

How Must Industry Respond? 274

Drugs of Abuse, Paraphernalia, and Defi nitions 277 Indicators and Common Signs of Abuse 278 Signs and Symptoms: Controlled Substances 278 Inhalants: Glue, Gasoline, Erasing Fluid 282 Protecting People and Assets 282

References 285

24 Workplace Violence

TIMOTHY A PRITCHARD AND ROGER MASLEN References 292

25 Crisis Intervention

MICHAEL A HANNIGAN AND CHRISTOPHER A HERTIG Introduction 295

Causes of Disruptive Behavior 296 Stages of Management of Disruptive Behavior 296

Crisis Development Behavior Modules 297 Protection Offi cer Guidelines 298 Verbal and Physical Disruptive Behavior 298 Empathic Listening 299

Nonverbal Communications 299 Controlling Disruptive or Violent Behavior 299 Team Intervention 300

Positive Factors Resulting from Team Approach 300

Leadership in the Team Approach 301 Safety Considerations in Crisis Intervention 301

Conclusion 301 Resources 302

26 Strikes, Lockouts, and Labor Relations

DAVID J DELONG Strikes 305

Searches 308 Employee Misconduct and Dishonesty 309 Employee Discipline 309

Types of Discipline 309 Arbitration 310 Summary 310

Trang 9

What is Security Risk Management? 316

Two Key Elements: Assessment and Mitigation 316

Taking a Strategic Risk Management Approach 317

The Risk Management Process 317

Likelihood Versus Consequence Scatter Charting 321

The Foundation of a Mitigation Strategy 322

The Five Avenues to Address Risk 323

Types of Potential Emergencies 332

Scope of the Problem 335

Emergency Planning Considerations 336

Vulnerability Analysis 338

Developing the Emergency Response Plan 342

Reviewing and Integrating The Emergency

Why Violence? Why They Do What They Do 352

The Reason for the Action 353

What They Look Like: From Individuals to Organizations 354

Target Selection and Attacks 356 Security Preparations and Defensive Measures 357 References 359

30 Antiterrorism and VIP Protection

CHRISTOPHER A HERTIG AND

TED WADE Terrorist Actions and Activities 363 Antiterrorist Strategy 365

Terrorism Defensive Strategies 366 Antiterrorist Techniques by Organizations/

Facilities 366 Specifi c Techniques for Antiterrorist Security 367 Professional Development for Personal Protection Specialists 370

Personal Protection Specialists (PPS) 371 Protecting the Principal 372

Hostage Situations 373 Hostage Threat Receipt 373

If Taken Hostage 374 Managing the Hostage Incident 374 Negotiation 375

The Stockholm Syndrome 375 Suicide Attacks 375

References 377 Resources 377

IX

INVESTIGATIONS

31 Investigation: Concepts and Practices

for Security Professionals

CHRISTOPHER A HERTIG Investigative Logic 383

History of Investigation 384 Preliminary Investigation 385 Follow-up Investigation 385 Intelligence 386

Liaison 387 Notes and Reports 388 Auditing 389

Trang 10

Making Detailed and Accurate Notes 408

Working with Law Enforcement and

What is Interviewing? 413

The Power of Communication 414

The Interview Process 416

Covert Personal Surveillance 422

Overt Personal Surveillance 422 Covert Electronic Surveillance 422 Overt Electronic Surveillance 423 Equipment Requirements 423 Privacy Issues 423

Recording and Retention 424

35 Report Writing and Field Notes

RAV-ZURIDAN YISRAEL Introduction 427

Importance of Report Writing 427 Field Notes 428

Reports Should be Written 428 What Should be Reported 429 Qualities of Good Reports 429 References 431

X

LEGAL ASPECTS OF SECURITY

36 Legal Aspects of Security

DAVID L RAY Introduction 435

The Development of Our Laws 436 Types of Laws—Criminal and Civil 437 Conclusion 446

Use of Force in General 450 Justifying the Use of Force 451

Trang 11

x

Retreat 452

Force Alternatives Defi ned 452

Excessive Force Liability 453

Injuries to Offi cers are Avoidable 453

Arrest and Detention Search and Seizure 453

A Formula for Self-Control 454

Confl ict Resolution Formats 455

Response to Aggressive Behavior 455

Offi cer Safety Issues 460

38 Defensive Tactics and Offi cer Safety

INGE SEBYAN BLACK The Professional Security Offi cer’s Role 471

Avoiding Potential Situations 472

Know Your Limitations 472

All Force Beyond this Point Requires Training Beyond

the Introductory Offi cer Level 478

Training for Success 479

Focus on Prevention 480

Conclusion 480

39 Industrial Hazards, Safety, and the

Security Patrol Offi cer

BRIAN D BAKER Defi nition of Industrial Hazards 484

Industrial Hazards, Accidents, Injury, and Illness 485

Risk Assessment 488

Self-Assessment 488

Self-Protection 491 References 494

40 Apprehension and Detention

Procedures

RICHARD P FIEMS Developing a Working Model 498 What Constitutes an Arrest? 499 The Importance of Reasonableness 499 What Gets Security Offi cers in

Trouble? 500 Detention and Apprehension Methodology 501 The Use of Force 503

Dealing with the Aftermath 503 Conclusion 504

XII

RELATIONS WITH OTHERS

41 Human Relations in a Global

Environment

CHRISTOPHER A HERTIG AND DARRIEN DAVENPORT Human Relations 509

Advice from the Master 510 Diversity 510

Globalization 513 Women in Protection 514 Sexual Harassment 514 Effective Communication 515 Ethical Behavior 515 Customer Service Leadership 516 Summary 517

References 518 Resources 518

42 Public Relations

CHARLES T THIBODEAU, CHRISTOPHER A HERTIG, AND GEORGE A BARNETT Public Relations Defi ned 521 Public Relations Planning 522

Trang 12

CONTENTS xi

Promoting Effective Customer Relations Within the

Security Force 524

Handling Customer Complaints 526

Service That Can Make the Difference 527

Training 527

The Media: Good Dream/Bad Dream 528

Access Control at the Scene of a Critical Incident 529

Disruption of Business 529

Plant Emergency Organization Control 529

Contract Security Contingent Access Control 529

Conclusion 530

References 531

43 Community Relations: Making

the Strategy Come Alive

MARK E PUETZ AND K C POULIN

Introduction 535

Security and the Experience Economy 536

Cost of Quality 541

From Strategy to Brand to Offi cer 544

Building a Community of Substance 547

Second Scenario: Vehicle Break-in 559

Third Scenario: Special Event 560 Fourth Scenario: Seaport Operations 561 Fifth Scenario: Installing a Central Station 563

Professional Organizations and Training 563

Industry Regulation by Government 564 Conclusion 566

References 566

45 Ethics and Professionalism

CHRISTOPHER A HERTIG Key Terms and Concepts 570

Ethical Decision Making 572 Ethical Issues in Protection 572 Why Unethical Behavior Occurs 573 Conclusion 574

Resources 575

Index 577

Trang 13

This page intentionally left blank

Trang 14

The security world is constantly changing,

both in the context in which it has to operate,

and in terms of what it can offer as a response

to a wide range of threats This is true across the

world Indeed, globalization and the impact of

technology are just two trends that have seen

to that As a consequence, security has become

more complicated; or, at least, the breadth of

knowledge that a good security operative, at any

level, needs to draw upon has been stretched

One of the positive signs of the march of

security professionalism is that there is now

more research being gathered on

security-related issues Scholars in universities, research

institutes, companies, and professional

bod-ies have helped to develop a global knowledge

base The good thing about security is that

knowledge from around the world has

rele-vance to a broad range of circumstances After

all, threats are often the same Terrorist attacks

take place globally, and the sorts of responses

needed are often similar, if not the same The

principles of security apply across the board,

though the contexts differ, and how the

prin-ciples are applied needs to be adapted to meet

local needs This is where skill comes in Skills

are needed from those who assess risks and

those who manage them, from senior executives

to street-level protection offi cers

It is a sad fact that offenders often move faster

than response agencies We know that many of

those who commit crime adapt quickly; they share

knowledge and experiences; doing so often gives

them an edge Just as people move themselves and

their assets around the world with ease, offenders

have tried to do so as well Stopping them requires

constant attention; as one famous terrorist agency once remarked, “ We only have to succeed once ” Being on our guard, benefi ting from research

fi ndings, and following good practice are cial Books like this one are designed to help The coverage of this book is broad, covering domains such as communication, protection offi cer functions, crime prevention, safety, infor-mation security, workplace violence, risk man-agement, investigations, private security law, and the use of force The book provides proven knowledge to protection offi cers to enable them

cru-to take on the arduous tasks of asset protection and loss prevention

This book strives to provide a foundation for improving the skill level and effi ciency of pro-tection offi cers As a basic text for achieving the

Certifi ed Protection Offi cer certifi cation, this

book will be studied over and over by tives across continents It will also serve as a research resource for those looking to develop insight into an array of security topics The edi-tors are to be commended for ensuring that this edition builds positively on previous ones Professor Martin Gill

opera-Director Perpetuity Research & Consultancy International (PRCI) Ltd

148 Upper New Walk Leicester LE1 7QA, UK

Dr Ona Ekhomu, CFE, CPP Chairman

School of Management and Security

10 Turton St

Lafi aji, Lagos, Nigeria Foreword

Trang 15

This page intentionally left blank

Trang 16

Contributors List

Sandi J Davies began her career in contract

security in 1980 with a primary focus on

person-nel administration She became deeply involved

in training and was instrumental in developing

security offi cer training programs for a major

national security guard company Her interest

in security training grew, and in 1988 she joined

the newly formed International Foundation for

Protection Offi cers (IFPO) as a program

admin-istrative assistant In 1991, she was elected

exec-utive director of IFPO and has been a driving

force in the Foundation’s program development

and administration Sandi became a member of

ASIS International in 1985 and served in

execu-tive positions at the chapter level

In addition, Sandi was also a member of the

Advisory Board for the Northwest Territories

Security Offi cer Certifi cation Committee In 1994,

Sandi was the chairperson for the Asset Protection

Advisory Board for Mount Royal College in

Calgary, Alberta, Canada In 1999, Sandi agreed to

serve on the Advisory Board of the International

Foundation for Cultural Property Protection Ms

Davies is also a member of the Technical Advisory

Board for the Canadian General Standards Board

on Security Offi cer Training Standards Most

recently, Sandi was chairperson for the Private

Security Services Council of ASIS International

Ms Davies has had numerous articles

pub-lished in security publications, such as Security

Management and SECURITY magazine, relating

to certifi cation and training of security personnel

In the early 1990s, Ms Davies, in a cooperative

effort with the IFPO Founding Director Ronald

R Minion, coedited the Protection Offi cer Training

Manual (Butterworth-Heinemann) That text is

now in its eighth edition In 1994, she contributed

a chapter relating to crime prevention in Canada

Prevention (Butterworth-Heinemann) In 1995, again in a cooperative effort, Ms Davies and Mr

Minion had published a book entitled The Security

Supervisor Training Manual with Heinemann In 2008, the third edition of this text, coedited by Chris Hertig, was released entitled

Security Supervision and Management: Theory

and Practices of Asset Protection , again published

by the leader in Security Trade Publications, Butterworth-Heinemann Sandi was the editor of

Protection Offi cer News published by IFPO for 13

years until it went into an electronic format

Chris Hertig, CCP, CPOI , is a member of the

Behavioral Sciences Department at York College

of Pennsylvania where he teaches courses in rity planning and supervision, crime prevention and physical security, legal standards of security and asset protection, ethical issues in criminal justice and criminal investigation In addition to his regular teaching assignment, he has taught self-defense and martial arts for the education department Prof Hertig has also given noncredit courses in report writing, crowd management, offi cer survival, and public relations

Prior to York College, Mr Hertig spent three years as a nuclear security training administrator, developing and teaching a wide range of instruc-tional topics for security personnel in accordance with U.S Nuclear Regulatory Commission

Instructor (CPOI) through the International Foundation for Protection Offi cers (IFPO), Prof Hertig has given presentations to numerous professional and civic organizations He has also consulted with instructional program providers

Trang 17

CONTRIBUTORS LIST

xvi

Rich Abrams , CEM

Brian D Baker , MA, CPP, CPO, CPOI

George A Barnett , CPO

Colin Best , CSSM

Patrick C Bishop , CPP, CFE, CPO

Inge Sebyan Black , CPP, CFE, CPO

Norman R Bottom , PhD, CPP, CFE, CPO, CST

Doug Durant , BA, CPP, CPO

Dr Ona Ekhomu, CPP, CFE

Francis J Elliott , CPP

Jim Ellis , MA, CPP, PSP, CSSM, CPO

Richard P Fiems , MA, CPO, CSSM, CPOI

Terence M Gibbs , MS, CPP, WSO-CSSD

Brion P Gilbride , MSI, CSSM, CPO

Professor Martin Gill

Prof Hertig has published several hundred

arti-cles, reviews, and chapters on various topics He

has been a featured columnist in several security

industry publications and assisted in establishing

IFPO’s Article Archives, an online collection of

research papers for students and practitioners

Chris served as coeditor of Security Supervision and

Management: Theory and Practice of Asset Protection

(Butterworth-Heinemann) with Sandi J Davies,

the Foundation’s executive director

Chris has been a longtime member of

ASIS International, serving on the Academic

Practitioner Symposium Group He is a charter

member and past president of the Pennsylvania

Association of Criminal Justice Educators

and an active member of the International

Association of Law Enforcement Educators

and Trainers He was also a member of the

International Association of Campus Law

Enforcement Administrators for many years

Prof Hertig began his career while in lege as a student aide to the Campus Security Department He was a member of the U.S Army ROTC and served an internship with the Columbia County Juvenile Probation Department After graduation, he worked for several security services fi rms as a security offi -cer, investigator, and supervisor He also spent

col-a summer col-as col-a member of the Pcol-ark Police in Mechanicsburg, PA

(Criminology) from Indiana University of

Bloomsburg University of Pennsylvania, and an associate (Commercial Security) from Harrisburg Area Community College He has also com-pleted graduate courses in adult education from Penn State University, has been board certifi ed

in security management by ASIS International, and holds the designation of Certifi ed Protection Professional (CPP)

Whitney D Gunter , PhD., CPO Michael A Hannigan , CPO Chris Hertig , CPP, CPOI Arthur A Holm , CPO Robert D Jaffi n , MBS, MTS Glen Kitteringham , M.Sc., CPP, F.Syl, CSSM, CPOI, CPO

Jenifer Lantz Roger Maslen , CPP, CFE Robert Metscher , CPP, CISSP, CFE, CPO, CSSM, BS, MBA

Denis A O’Sullivan , CPP, CPO Kevin Palacios , M.Sc., CPP, PSP, CPOI Kevin E Peterson , CPP, CPO, CPOI K.C Poulin , CPOI, CPS, CHS-III Kevin Pound

Timothy A Pritchard , CPP, CPOI Mark E Puetz , MBA

David L Ray , BA, JD, CFE Bethany J Redmond

Trang 18

CONTRIBUTORS LIST xvii

Chris Richardson , CPP

James E Sellers , CPP, MSA

Dennis Shepp , MBA, CPP, CFE, PCI, CPOI

Sean Smith , CPO

Michael Stroberger , CPO, CLSO, CSSM,

Trang 19

This page intentionally left blank

Trang 20

A PURPOSE

Offi cer: Practical Security Strategies and Emerging

Trends is to provide “ need-to-know ” information

for protection offi cers and students

through-out the security industry This resource serves

as the course text for the Certifi ed Protection

Offi cer (CPO) program Many security

profes-sionals also fi nd the contents of this textbook

helpful as a reference in their day-to-day

secu-rity management responsibilities

B HISTORY OF THE TEXTBOOK

Training Manual (POTM) originated with

the birth of the International Foundation for

Protection Offi cers (IFPO) in 1988 Twelve

dedi-cated security professionals from the United

States and Canada had a vision: to create an

organization that would provide meaningful

career opportunities for line security offi cers

throughout North America

The newly formed IFPO Board of Directors

needed, along with a professional training

textbook, to make that vision a reality Hence,

the fi rst edition of POTM was created to serve

as the course text for the Certifi ed Protection

Offi cer (CPO) program IFPO, the CPO

pro-gram, and POTM all proved to be vital

compo-nents in achieving the foundation’s objectives

Today , IFPO is the recognized catalyst in the development of professionalism throughout the private security industry Thousands of security offi cers who have earned the CPO accreditation have gained knowledge and professional career enhancement; they have unselfi shly provided encouragement and information to their col-leagues and employers Hence, a new dimen-sion of opportunities has spread throughout the security industry

The fi rst edition was simple, short, and ited in scope, but included enough information to help the security offi cer better understand his or her roles, duties, and responsibilities However, since that simple beginning, each subsequent edi-tion has brought new and enlightening informa-

lim-tion to the security professional The Professional

Protection Offi cer is the leading text for protection

offi cers and students It is also widely used by those teaching in Protective Services, Criminal Justice, Homeland Security or Emergency Management courses of study

Feedback has been the most signifi cant tor It has led to a standard of excellence for this new text We have received countless let-ters of appreciation for the depth and quality of the seventh edition, but these same enthusiasts have been liberal with their recommendations for changes and improvements, and we have listened Ongoing dialogue with security man-agers, supervisors, consultants, educators, and,

fac-of course, protection fac-offi cers, has enabled us to develop and maintain a training text that will serve future learning

Introduction

Trang 21

I fi rst met Dr Norman R Bottom when I was

a graduate student at Indiana University of

Pennsylvania He taught a course on executive

protection on Saturday mornings that was held

on the campus of Allegheny County Community

College in Monroeville, Pennsylvania Two other

classes were held there on Saturdays so that

peo-ple pursuing a Master’s degree could take nine

credits by going to class one day a week

The class was a unique arrangement; in those

days we didn’t have online learning Creative

scheduling like Dr Bottom had engineered was

not the norm The class offerings and schedule

concept were a fantastic way of meeting the

needs of the learner, the security industry, and

the university

It was way out in front

The Journal of Security Administration was

started by Norman Bottom It was the fi rst

scholarly refereed academic journal in the

secu-rity fi eld The journal was a major contribution

to the fl edgling discipline of asset protection

Norman edited it for many years, assisted by

his wife, Mari, who took care of book, seminar,

and video reviews Dr Bottom was also

instru-mental in founding the Academy of Security

Educators and Trainers (ASET) This

associa-tion included many leading trainers,

practitio-ners, and academicians in the security industry

Some of the networking initiated through the

academy is manifested in the pages of this text

Some of us met each other through ASET

In 1982, I applied to become a Certifi ed

Protection Professional (CPP) As Dr Bottom

was a CPP, he endorsed my application

Kostanoski wrote a book entitled Security and

Loss Prevention This was an excellent text that

presented the WAECUP model of loss control

This model stated that loss was attributable to

more than crime Loss to an organization came from waste, accident, error, crime, and unethi-cal/unprofessional practices This was a new and important concept Security was not just about the bad things that people do; it was much more than that The WAECUP model is part of this text It is part of what I teach It is part of what we do as protectors

Protection Offi cers was formed Leading cates of professional development helped with this organization under the direction of Ron Minion Norman Bottom was on the Board of Directors, at one point serving as Chairman

He was way out in front He was always way out in front

Now it’s up to us

Christopher A Hertig, CPP, CPOI Assistant Professor

York College of Pennsylvania October 15, 2009

Fallen Offi cers

This edition of the textbook is dedicated to the brave offi cers who lost their lives on 9/11,

as well as all of the other offi cers who have died

in the line of duty We remember and honor your sacrifi ce, and we salute your dedication Our hearts and sympathies go out to your fami-lies, friends, and coworkers

Ron Minion, CPP and IFPO Founder

Ron Minion (1938 – 2008) lost his battle with Lou Gehrig’s Disease in 2008 He was the man behind this book, one of the founders of the IFPO, a dedicated champion of the security industry, and a tireless advocate for protection offi cers His determination, and vision of pro-fessionalism through training for the industry, has resulted in a brighter future for scores of security professionals, and will continue to do

so in the future

Trang 22

INTRODUCTION xxi

Ron was the fi rst examined Certifi ed

Protec-tion Professional in Canada He was a

found-ing member of the Calgary Chapter of the ASIS

International, where he was a chapter chair

and regional vice president As regional vice

president, he earned the president’s “ award of

merit ” for establishing ASIS chapters

through-out Canada In 2006, Security Magazine named

Ron one of the 25 Most Infl uential Executives

Ron ’s legacy includes the thousands of line

security offi cers he employed and mentored

over the years He knew the industry from the

ground fl oor up, and never lost his vision of

providing affordable training for security offi

-cers to help them turn their mere jobs into

via-ble careers with brighter futures

Ron , our friend, mentor, industry advocate,

and trusted colleague, will be greatly missed

Lee Minion, CPO

Lee Minion, son of Sandi Davies and Ron

Minion, served his country in Iraq and is now

embarking on a career in law enforcement

He is indeed a chip off the old block At the

Foundation, we are so very proud of him

IFPO Team

The International Foundation for Protection

Offi cers is supported by a team of security

professionals throughout the world who, year

after year, work diligently on behalf of the

Foundation and what it stands for Because of

these men and women who are committed to

excellence and remain steadfast in their

obliga-tion to high standards of service, IFPO

contin-ues to be successful We thank you

Louise Gringas

A victim of a tragic accident, our coworker,

team member, and friend, Louise Gingras,

brought sunshine to the IFPO Corporate

Headquarters for seven years She was taken

from us far too soon, in June 2009 Louise started

her tenure with the IFPO as a part-time employee

in 2002, and quickly worked her way into a very valuable full-time Program Coordinator position Her friendly, caring nature assisted literally thousands of candidates through their desired certifi cations She took pride and joy in attend-ing to the IFPO students ’ and clients ’ needs Her strengths were many, and her radiant smile and personality will be forever missed within our offi ces She leaves behind her precious daughter, Haylee

D EIGHTH EDITION CONTENTS

The eighth edition has 12 units and 45 chapters

The contributors to the eighth edition are among the best writers, academics, and practitioners in the security community This talented group of professionals has generously provided readers of this superior textbook with unique opportunities

to acquire current asset protection and life safety information These writers are outstanding indi-viduals who deserve recognition and appreciation for their service to the security community

The contents of this textbook are sometimes quite basic However, every security supervi-sor and manager should fully understand all

of the information contained herein to provide better leadership and interpretation of offi cer responsibilities

The material contained in each unit is arranged to provide the reader with a smooth

fl ow of related security information

At the conclusion of each chapter, there are

10 multiple choice and true/false questions It

is important to be able to answer each question correctly before proceeding to the next chapter

E GLOBAL CHALLENGES, NEW ROLES, AND RESPONSIBILITIES

In the late sixth century, when the Greek losopher Heraclitus fi rst commented that the

Trang 23

xxii

universe is in constant fl ux, and the only

con-stant is change; little could he have imagined

the pace of that change in the 21st century

Advances in medicine, science, and

tech-nology are happening at a dizzying pace, and

news travels the globe in the blink of an eye

Information of all sorts is available with just a

few keystrokes, and people can stay in constant

touch via electronic media Journeys that once

took weeks, months, or even years now take

mere hours It is a small world these days, and

economic problems and social unrest in one

nation can be felt in many others

Where once the term “ security ” might have

referred to the lone night watchman whose

great-est adversary was a burglar hoping to pick a lock,

those days are long gone The night watchman’s

role was viewed as merely a job that did not

gar-ner much respect in the community

Today ’s private security professionals are

fi nding their roles greatly expanded in

numer-ous arenas worldwide, due, in part, to a much

greater global threat and a reduction in public

law enforcement protection The current

eco-nomic situation has caused an increase in some

types of crimes At the same time, those

eco-nomic realties have also forced local

municipal-ities to reduce public law enforcement efforts

through layoffs or hiring freezes, even though

the need for more protection is growing

The threat of terrorism was spotlighted for

the United States and the world on 9/11, and it

is still an ever-present threat worldwide It has

and will continue to impact the industry,

partic-ularly in the areas of research and risk

manage-ment methodologies

threatens infrastructure and services by

attack-ing computer networks via the Internet, has

become a very serious threat It can and has

resulted in the loss of billions of dollars of

pro-prietary information, and compromised data at

a broad range of institutions, from government

agencies to banks, credit card companies, and

business fi rms Company executives are acutely

aware of the danger of data loss, and numerous laws govern what must be done if data is com-promised Cyberterrorism not only puts data

at risk, it can put essential services and structure at risk Guarding against this type of threat requires continuing education about the ever-evolving risks, deterrents, prevention, and laws Unlike the night watchman, who only worried about physical security with its fences, gates, and access points, today’s protection offi cer must also guard against an enemy that moves at the speed of light The protection offi -cer must not only protect the physical premises and equipment, but must also guard against an enemy that moves silently to disrupt services, incapacitate infrastructure, and steal data The National Fire Protection Association’s

“ Standard for the Installation of Electronic Premises Security Systems ” have both caused changes that may not make news headlines, but will certainly impact the industry The former will not affect the general public, but fi re protec-tion, security consultants, facility managers, and insurance companies will be forced to deal with

it ASIS has already begun setting standards that have impacted the industry The latter more

or less cements the impact of the former

While the quest for mutual respect and less cooperation between public and private security has improved over the years, it must remain an ongoing goal for both the private and public sectors Mutual respect and cooperation between public law enforcement and private security is essential to ensuring that security needs are met effectively

Increasingly , security functions have been contracted out to private security fi rms to fi ll the gap between what government can do and what is needed Private security fi rms are even stepping in to fi ll the roles that military person-nel once fi lled on military installations and even war zones A new type of protection offi cer is increasingly stepping forward to fi ll the need, ready to deal with new situations and challenges

Trang 24

INTRODUCTION xxiii

as they come along, thanks to ongoing

educa-tion and training

Currently , corporations that once relied on

that night watchman to patrol a fence as suffi

-cient protection are increasingly instituting their

own in-house security departments An

inte-gral part of this overall protection process is the

complemented with a security staff capable of

attending to ongoing protection needs Generally,

corporations require their security managers

and supervisors to be well educated, trained,

and experienced Private security fi rms are also

demanding educated, trained professionals

The night watchman might have been able

to do his job with limited education, but in

today’s ever-changing, challenging security

climate, professionals must be educated and

well trained to fulfi ll their new, evolving, and

demanding roles This new breed of security

professional is winning respect by proving it

is skilled and very capable of carrying out the

most sophisticated, demanding roles They are

dedicated professionals with the credentials

needed to keep themselves, their employers,

and their employers’ assets from harm

F CERTIFIED PROTECTION

OFFICER (CPO) PROGRAM

Professional Protection Offi cer: Practical Security

Strategies and Emerging Trends is the course text for

the Certifi ed Protection Offi cer (CPO) program,

an internationally recognized certifi cation for

pro-tection offi cers

The CPO designation is a professional

accre-ditation that can be earned by completing a

self-paced course based on this textbook

In addition to having security experience or

the equivalent, a candidate must complete the

following stages of progression to earn the CPO

examination (A proctor may be located within the candidate’s organization or community.)

(Both examinations are based on the contents

of this textbook.)

G CERTIFIED PROTECTION OFFICER (CPO) FINAL CHALLENGE PROGRAM

This textbook, The Professional Protection Offi cer:

Practical Security Strategies and Emerging Trends , is

also the text for the CPO Final Challenge Program, which is the fast-track method of obtaining the CPO certifi cation The Final Challenge option eliminates the course of study and goes directly to the fi nal exam, which is the same one that is part of the CPO program Questions on the fi nal exam come from the material in the textbook

Contact the International Foundation for Protection Offi cers (IFPO) for more information regarding the Certifi ed Protection Offi cer and/

or other programs

H CONCLUSION

The term protection offi cer frequently appears

in this textbook What is a protection offi cer? Protection offi cers have many titles: secu-rity guard, security offi cer, campus police, loss prevention offi cer, crime prevention offi cer, retail loss prevention agent, military police, and several others They can work part time or full time They can be assigned to protect a person, a group of people, an offi ce building, a network, a store or factory, and many other assets in many locations Some are armed; some are unarmed

Trang 25

xxiv

They can be employed as independent

con-sultants, by a security services agency, by the

military, by a state government, by the federal

government, and by other organizations The

term “ protection offi cer ” is not easy to defi ne

Titles vary, specifi c tasks vary, locations vary,

employers vary, but the one thing that all

pro-tection offi cers have in common is that they are

willing to take risks and put into place

preven-tive measures to protect tangible assets, such as

buildings, intangible assets, such as data, and

of course, the public They assume the risks so

that others can go about their business and not

have to worry about potential harm

This textbook is written as a useful reference

for security supervisors, managers, and those

that teach; but the primary benefi ciary is the student or working protection offi cer

Emerging Trends are honored to work with so many

academicians, researchers, and outstanding security professionals since the planning of the fi rst edition These talented and dedicated security profession- als have worked tirelessly in supporting, promoting, and contributing to the International Foundation for Protection Offi cers and all of its worthwhile pro- grams “ We could not have done it without you! ”

A special thanks goes to Alice Grime, Charles Thibodeau, and Jamie Ingram for their techni-cal support and assistance in the production and development of this textbook

Trang 26

The Protection Offi cer Shall

I Respond to employer’s professional needs

II Exhibit exemplary conduct

III Protect confi dential information

IV Maintain a safe & secure workplace

V Dress to create professionalism

VI Enforce all lawful rules & regulations

VII Encourage liaison with public offi cers

VIII Develop good rapport within the profession

IX Strive to attain professional competence

X Encourage high standards of offi cer ethics

Loyalty

To the employer, the client, and the public The offi cer must have a complete and thorough understanding of all of the regulations and pro-cedures that are necessary to protect people and assets on or in relation to the facility assigned to protect

Exemplary Conduct

The offi cer is under constant scrutiny by everyone in work and public places Hence, it is essential that he or she exhibit exemplary con-duct at all times Maturity and professionalism are the key words to guide all offi cers

Protection Offi cer Code of Ethics

PROTECTION OFFICER CODE OF

ETHICS

Today business and the public expect a great

deal from the uniformed security offi cer In the

past there has been far too little attention paid

to the ethical aspects of the profession There

have to be solid guidelines that each offi cer

knows and understands More importantly, it

is essential that each manager and supervisor

performs his or her duties in a manner that will

refl ect honesty, integrity, and professionalism

Every training program should address the

need for professional conduct on and off duty

Line offi cers must exhibit a willingness to gain

professional competency and adhere to a strict

code of ethics that must include the following

Trang 27

PROTECTION OFFICER CODE OF ETHICS

xxvi

Confi dentiality

Each offi cer is charged with the responsibility

of working in the interests of his or her employer

Providing protection means that the offi cer will

encounter confi dential information that must be

carefully guarded and never compromised

Safety and Security

The foremost responsibility of all offi cers is

to ensure that the facility that must be protected

is safe and secure for all persons with lawful

access The offi cer must fully understand all

nec-essary procedures to eliminate or control

secu-rity and safety risks

Deportment

Each offi cer must dress in an immaculate

manner Crisp, sharp, clean, and polished are

the indicators that point to a professional offi cer

who will execute his or her protection

obliga-tions in a profi cient manner and will be a credit

to the profession

Law Enforcement Liaison

It is the responsibility of each offi cer to make

every effort to encourage and enhance positive

relations with members of public law

exists and offer assistance whenever possible

Strive to Learn

To become professionally competent, each offi

-cer must constantly strive to be knowledgeable

about all aspects of his or her chosen career How

to protect people, assets, and information must

always be a learning priority for every offi cer

Develop Rapport

It is necessary to be constantly aware of the

image that our profession projects All offi cers

can enhance the image of the industry, their employer, and themselves Recognize and respect peers and security leaders throughout the industry

Honesty

By virtue of the duties and responsibilities

of all offi cers, honest behavior is absolutely essential at all times Each offi cer occupies

a position of trust that must not be violated Dishonesty can never be tolerated by the secu-rity profession

Prejudice

-cer must impose restrictions upon people that frequent the security workplace All human beings must be treated equally, with dignity and respect, regardless of color, race, religion,

or political beliefs

Self-Discipline

With the position of trust comes the sibility to diligently protect life and property These duties can only be discharged effectively when the offi cer understands the gravity of his

respon-or her position Self-discipline means trying harder and caring more

Conclusion

The job of protecting life and property focuses much attention on the individual secu-rity offi cer Hence, it is essential to be aware of the need for professional conduct at all times

By strictly adhering to each section in this code

of ethics, it may be expected that we as duals and the industry as a whole will enjoy

indivi-a good reputindivi-ation indivi-and gindivi-ain even more indivi-tance from the public as well as private and government corporations You as the individual offi cer must be a principal in this process

Trang 28

accep-U N I T I

FOUNDATIONS

1 Concepts and Theories of Asset Protection

2 The Evolution of Asset Protection and Security

3 Role of the Professional Protection Offi cer

4 The Protection Offi cer as a Leader

5 Career Planning for Protection Professionals

Trang 29

This page intentionally left blank

Trang 30

C H A P T E R

3

INTRODUCTION

Asset protection is the basis for everything

that a protection offi cer does It is the core

function of the protection offi cer’s job Asset

protection can have different meanings and

functions depending on the approach to

pro-tecting the asset, its location, and even the type

of asset Asset protection has been practiced for

millennia, whether it was protecting the Roman

city with night sentries patrolling the streets, to

placing valuables into a modern safe The most visible and easily recognizable form of asset protection was the medieval castle The castle was built to protect an asset, be it the king or ruler, a precious metal such as gold, or as a point from which to help protect the empire Castles initially were quite basic, but as the risks esca-lated, they came to employ additional layers of protection such as a moat, drawbridge, or defen-sive positions

ASSET DEFINITION

Asset protection begins with defi ning what the asset is There may be one asset or many assets An asset can be a person or people; a physical entity such as a building or plant; an object such as a painting or a gold bar; or a concept such as a for-mula or design The ASIS International General Security Risk Assessment Guideline defi nes an asset as “ Any real or personal property, tangible

or intangible, that a company or individual owns that can be given or assigned a monetary value Intangible property includes things such as good-will, proprietary information, and related prop-erty People are included as assets ”

C H A P T E R O B J E C T I V E S

● Provide an overall introduction to the

concept of asset protection

related to asset protection

through Environmental Design (CPTED)

Concepts and Theories

of Asset Protection

Jim Ellis and Christopher A Hertig

1

Trang 31

1 CONCEPTS AND THEORIES OF ASSET PROTECTION

4

ASSET VALUATION

The asset must have some type of value The

value of the asset could be a real value, such as

a gold bar being worth a set amount of money

based on the weight of the bar and the

cur-rent price of gold The value of the asset could

be based on what it would cost the company to

replace it This is sometimes diffi cult to calculate

when discussing specialty items such as the

for-mula or recipe for a soft drink, or the patented

design for a product, the loss of which could

mean the end of a company The most

intan-gible valuation of an asset would be in what is

referred to as “ reputational damage ” — the loss of

the image of a company or consumer confi dence

in a company Reputational damage can occur

through major theft of customer information, a

senior executive being injured or killed, or the

brand name of a company being tainted through

inferior “ knock-off ” products The loss of

reputa-tion is diffi cult to calculate because things such

as unrealized sales are nearly impossible to

determine While it is not necessary to have the

actual value of an asset on hand at any one time,

the value of the asset must be known prior to the

implementation of any protection program and

reevaluated periodically thereafter

RISKS Criticality

Once the asset and its value are defi ned, it is

necessary to determine what risks there are to

the asset According to the ASIS International

“ risks or threats are those incidents likely to occur

at a site, either due to a history of such events or

circumstances in the local environment ” (2003,

p 6) It is therefore important to have data on

crime and incidents occurring in and around the

site A vulnerability assessment will include a

thorough examination of the facility, personnel,

contents, materials, suppliers, and contractors, especially anything that by use or omission would damage, harm, or cause loss to the com-pany or its personnel

Frequency

The frequency of losses must then be mined through an examination of the types of crimes and incidents in and around the facility, with special emphasis on the dates on which they occurred A ranking of the events should be made using a consistent scale (annually, monthly, daily, or hourly) for all such loss events

Probability

Through an analysis of this information, trends may emerge which point to an escalation in activi-ties that may precede a more serious crime against the company This will help to establish the prob-ability of such an event occurring in the future, assuming all other processes and operations at the facility remain the same Once there is a change in the assets, the probability of loss will also change

Impact

Finally , a ranking of the impact of any loss

on the company must be made Impact is an accounting of the tangible (real) and intangible (unrealized) costs associated with such events All such tangible losses should be considered, from the mundane, such as the loss of power or water service, up to and including the loss of the facility including its contents and a substantial portion of the employees Intangible losses such as the loss

of current or future sales or customers should also

be accounted for, to the extent that this is possible

MITIGATION

Only after all of the factors of risk or loss have been compiled and examined can the protection offi cer assist with developing strategies to help

Trang 32

ASSET PROTECTION 5

I FOUNDATIONS

mitigate the risk All of the mitigation efforts

interfere with the operation of profi tability of the

enterprise ” (ASIS, 2003, p 6) Mitigation efforts

that do substantially impact operations are much

less likely to see executive support regardless of

the level of risk, as they also substantially impact

the profi tability of the company

Cost/Benefi t

A cost/benefi t analysis must also be

con-ducted to help assist in evaluating the mitigation

measures against the costs incurred According

to the ASIS International General Security Risk

Assessment Guideline, the cost benefi t process

“ involves three steps:

consequences of the expenditure

and benefi ts resulting from the expenditure

revenues accruing from the expenditure to

express those costs and revenues in current

monetary values ” (ASIS, p 4)

If the cost/benefi t evaluation determines that

the cost of mitigating the risk is greater than the

cost of the asset, then other measures must be

employed

ASSET PROTECTION

Layered Protection

typically involves a concept of layered

protec-tion, also known as defense in depth In this

concept, the asset is considered to be in the

center, surrounded by concentric layers of

pro-tection Each layer contributes individually,

and as part of the whole, to the overall

protec-tion of the asset The principles behind layered

protection consist of deterrence, detection, delay,

and defense/response Each piece of the layered protection concept can work on its own However, the most complete protection is afforded through combining all of the layers

an individual or group from even attempting

to attack the asset This can be accomplished through a number of means such as signage, fencing, lighting, cameras, or people Signage

at the perimeter of the enterprise property would warn trespassers of the property line and the penalty for proceeding further Further enhancements to the signage could include the addition of fencing, lights, and cameras In a personal protection role, the deterrence would appear to be provided by the ring of protection offi cers, or specialists around a high-profi le individual In some rare circumstances, the illu-sion of additional layers of protection can be a better and more cost-effective deterrent

preferably at the earliest possible opportunity Alarm sensors, cameras, and even protection offi cers, are all means of detecting and identi-fying threats to the enterprise A threat identi-

fi ed earlier in the asset protection process gives the remaining layers of protection more time to contribute to the overall protection of the asset

layers of defense a chance to work together Suffi cient layers of delay must be incorporated

so that the detection and defense/response pieces of the asset protection continuum can perform their roles Delay can be accomplished through an expansive perimeter that takes

a while for the attacker to cross, fences that take time to climb, strong doors that must be breached, and interior levels of protection such

as additional doors into rooms or a safe that takes even more time to enter

A suffi ciently delayed attacker allows for a defense to be mounted from within the site to repel the attacker, or for a suffi cient response to

be put together and proceed to the site However, the layers of protection must delay the attacker

Trang 33

1 CONCEPTS AND THEORIES OF ASSET PROTECTION

6

long enough so as to be able to stop him on the

way to the asset, or on his way out with the asset,

but before he leaves the property with the asset

PHYSICAL SECURITY

Physical security planning was originally

based upon response to a military threat A

tra-ditional reference for physical security is FM

19-30 Physical Security , published by the U.S

Army, while a modern reference is the Facilities

Physical Security Measures Guideline published

by ASIS International

The process used to plan physical security

measures is as follows:

1 Identify assets These generally include

personnel , property , information, and image

2 Loss events are exposed Risks are identifi ed

This involves research rather than “ seat of the

pants ” reasoning!

3 Probability of the loss events occurring is

calculated

4 Impact of occurrence is assessed for each loss

event This means, the effect the loss event

will have in terms of direct , indirect, and

extra-expense costs

5 Countermeasures are selected There can

be a vast array of interventions; generally

physical security utilizes target hardening

techniques, such as patrols, access control,

lighting, intrusion detection, surveillance,

weapons detection, and so on

6 Countermeasures are implemented

7 Countermeasures are evaluated as to their

effectiveness Traditionally, this step has been

avoided by practitioners in physical security

and crime prevention

Note : See www.securitysolutions.com and

www.securitymagazine.com for products and

applications

Patrols are a key part of a physical security

system They serve as catalysts for the system,

bringing all parts together Patrols have been

traditionally used by military forces to scout out the location and disposition of an opponent They are used today by police and security forces While still endeavoring to locate hostile indi-viduals (felons), modern police patrols are used

to assess community environments In a temporary asset protection scheme, patrols are not only concerned with criminal acts but also with unauthorized activities, safety and fi re pro-tection issues, and the performance of auxiliary services These can include delivering the com-pany mail, checking gauges, conducting light-ing surveys, assessing behavior, enforcing lease agreements, and assisting customers Note that

strategies that public police have adopted are very similar to what security practitioners have been doing for decades

CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN

Design (CPTED) is a system whereby riality reinforcement is established via barri-ers, access control, and surveillance Its genesis may have been in the construction of castles and forts The contemporary beginnings of it were through the writings of Oscar Newman

Prevention through Environmental Design ) CPTED

theory consists of these various components:

Territoriality: Boundaries and property

lines are marked This can be the placement

of barriers, shrubbery, and the use of different colors of walkways to mark areas

Psychological deterrents to trespass are

erected to establish territoriality

Surveillance: Observing areas makes detection

and deterrence of criminal behavior more likely There are several types of deterrence:

Natural — keeping areas open to

observation, such as by clearing bushes near access points, having windows facing

Trang 34

RISK MANAGEMENT AND INSURANCE 7

I FOUNDATIONS

out into a common courtyard, or placing

a picnic area near a basketball court All of

these make for easier observation of the area

to be protected They facilitate detection of

criminal or unauthorized activity

Electronic — technological aids are used,

such as closed circuit television (CCTV)

and volumetric intrusion detection systems,

such as passive infrared (PIR) sensors

Organized — patrols by security personnel,

police, or citizen crime watches

Access control: Maintaining boundaries

by restricting access to an area Access is

controlled via the use of locks, biometric

systems, access cards, and other methods

Access control is a physical deterrent to trespass

Positive activity support: In a signifi cant

departure from physical security, CPTED

uses activities that divert people in the

environment from involvement in crime

This may take the form of recreation,

entertainment, or volunteer efforts that help

society (volunteer fi re companies for youth)

Maintenance: The repair of “ broken

windows ” An environment that is not

kept up properly may degenerate further

People see broken windows and believe it is

acceptable to break other windows

A “ snowballing ” or “ rolling ball ” effect

occurs Prompt repair and cleaning of damage

or graffi ti are essential parts of CPTED

SAFETY

Safety ushers in the more contemporary

emphasis on asset protection and incorporates

the WAECUP Theory of Loss Control developed

by Bottom and Kostanoski in Security and Loss

Control (fi rst published by Macmillan in 1983)

W — Waste of time, resources, man-hours,

space;

A — Accident that causes injury, downtime,

increased workers’ compensation costs, and

so on;

E — Error in planning or execution, which

results in lost funds;

C — Crime that causes loss and/or injury;

UP — Unethical/unprofessional practices,

such as misrepresentation, discrimination, confl ict of interest, and so on

Accidents cost extensive amounts of direct loss

(cost of replacement and repair) as well as

indi-rect loss (downtime, investigative costs, lowered

(advertising, rental of new rooms or equipment) Note that there are also extensive administrative

Safety and Health Administration) and state agencies (CALOSHA and Pennsylvania Department of Labor and Industry) with which organizations must comply Safety is a major concern to organizations for all of these reasons Many persons in charge of security are also in charge of safety A Director of Safety and Security has become a common title in health care, on col-lege campuses, and in hotel environments

RISK MANAGEMENT AND

INSURANCE

“ Risk management ” is a term closely ated with the insurance industry It is similar con-ceptually to the physical security planning process

associ-in its implementation, but it deals with risks other than “ security ” threats caused by humans It is

not limited to “ target hardening ” ( risk reduction )

approaches, such as the use of locks, barriers, intrusion alarms, and so on Strategies for manag-ing risk include the following:

Risk avoidance — such as completely avoiding

the risk of an earthquake by avoiding geographic areas where there are active fault lines, staying out of countries that are known

to kidnap people for ransom, or not making dangerous products, such as explosives

Risk transfer — means transferring

the fi nancial impact of loss to another

Trang 35

1 CONCEPTS AND THEORIES OF ASSET PROTECTION

8

organization or entity Insurance coverage is

the usual means of risk transfer The insurance

company takes on the cost of repairing or

replacing the asset at risk instead of the

enterprise Of course, this comes at some

cost and some delay in repairing or replacing

an asset as the insurance company must

investigate and process the claim Outsourcing

hazardous operations to other organizations is

another example of risk transfer

Risk assumption, risk retention, or risk

acceptance — refers to accepting the risk, as it

has a very low probability of occurring; the

risk is extremely diffi cult to protect against;

or the cost of changing the risk to the assets is

so great or so low that any effort to change it

would either be too expensive or the losses so

low as to be inconsequential For instance, it is

extremely unlikely that an asteroid will strike;

it is also impractical to defend against it It

would likewise be impractical to purchase

insurance for a machine that has exceeded its

useful shelf life and has no intrinsic value

Risk spreading — implies using redundant

systems of communication, power, or

information storage The separation of

assets across some distance so that no one vulnerability can affect the entire enterprise

is another example

Risk reduction or risk mitigation — means

reducing the probability of a loss-causing event through the adoption of preventive measures That is, taking methodical, appropriate steps to lessen the risk to the organization or the frequency, probability, and impact of such risks and losses Physical security and crime deterrence would be considered risk reduction So, too, would the use of safety equipment

As you can see, risks can be reduced in a ber of ways, but they are never truly eliminated Insurance can be thought of as the “ last line

provides the policyholder with fi nancial pensation from the insurance company after a loss has occurred According to Purpura (1991) , loss prevention originated within the insurance industry Note that while the term “ loss preven-tion ” is utilized primarily within the retail sec-tor, it is gradually being replaced with the more representative term “ asset protection ”

Pick some assets, such as vital information,

that an organization needs to operate:

peo-ple, works, art, and so on Place these assets in

the boxes to the left Next, place the primary

threats that may face those assets such as fi re,

Trang 36

RISK MANAGEMENT AND INSURANCE 9

I FOUNDATIONS

Insurance policies provided by an insurance

company are driven by the probability of loss

events occurring based on actuarial tables The

premiums and deductibles are adjusted

accord-ing to the loss event probability; so, too, is the

availability of insurance if insurance carriers

deem a risk to be too high and refuse to write

a policy In these cases, organizations must

self-insure or join an insurance pool of other

organi-zations that pool their funds in a liquid account

that is set aside in the event of a loss There are

also government insurance programs for crime

and fl oods on the federal level, and workers’

compensation on the state level

evolved, such as the following:

Business Interruption — for losses incurred

after a disaster, accident, or fi re while a

business is not operating Business interruption

insurance helps to control indirect losses

stemming from lost productivity

Kidnap and Ransom (K & R) — for fi rms that

have had executives abducted by criminals

or terrorists This coverage became popular

in the early 1980s in response to left-wing

terrorist kidnappings in Latin America The

fi lm Proof of Life with Russell Crowe portrays

K & R coverage

Worker ’ s Compensation — required by state

laws to compensate workers injured on the

job from the results of work-related accidents

and occupational diseases ( Purpura, 1991,

p 265 ) Rates paid for premiums by employers

are based on job hazard, and in part on an

employer’s record of accidents

Liability insurance — to cover legal costs

and compensatory damage awards (punitive

damages are not generally covered)

Attorney’s fees and associated costs can become quite high during civil litigation regardless of whether the case is settled or goes before a court

Fire insurance — one of the fi rst types of

insurance developed; some policies mandate that the insured conduct periodic patrols

of various areas on the property — the use

of watch tour systems had developed as a result of this

Burglary insurance — for losses associated

with unlawful intrusion Burglary insurance policies generally require evidence of forced entry

Robbery insurance — coverage for forcible

thefts committed in the presence of another

Theft insurance — policies cover losses from

theft; may include burglary and robbery losses

Bonds — fi delity bonds require investigation

of the covered employee by the bonding company (the insurer); these bonds indemnify the holder against dishonest acts committed

by the employee The holder of the bonds is exempt from fi nancial responsibility for the dishonest acts of the employee

Employment Practices Liability (EPL) —

insures against legal costs due to unlawful employment practices such as sexual harassment, discrimination, and so on Contemporary liability exposure for ongoing illegal employment practices is substantial, with awards and settlements running into the multimillions

E M E R G I N G T R E N D S

An emerging new paradigm of asset

protec-tion is the consideraprotec-tion that must be made for

an attacker who will enter a protected area with

the goal of destroying an asset in place The

homicide/suicide bomber is an especially bling trend and is diffi cult to provide suffi cient levels of protection against The amount of time to detect, delay, and defend is essentially reduced by

Trang 37

trou-1 CONCEPTS AND THEORIES OF ASSET PROTECTION

10

SUMMARY

Being involved in the practice of asset

pro-tection is the fi rst step toward advancement in

your fi eld and acceptance in your enterprise

The protection offi cer must be ready to

References

General Security Risk Assessment Guideline (2003)

Alexandria, VA: ASIS International

Biery , K D , Jr , & Schaub , J L ( 1994 ) The ultimate security

survey Boston, MA : Butterworth-Heinemann

Broder , J F ( 1984 ) Risk analysis and the security survey

Boston, MA : Butterworth-Heinemann

Calder , J D ( 1985 ) Industrial guards in the nineteenth and

twentieth centuries: The mean years Journal of Security

Administration , 8 ( 2 )

Coleman , J W ( 1969 ) The Molly Maguire riots: Industrial

con-fl ict in the Pennsylvania coal region New York, NY : Arno &

The New York Times

Constable , G (Ed.) ( 1990 ) The old west New York, NY : Time-Life Books

Cote , A , & Bugbee , P ( 1988 ) Principles of fi re

pro-tection Quincy, MA : National Fire Protection Association

Fennelly , L J ( 1989 ) Handbook of loss prevention and crime

prevention ( 2nd ed ) Boston, MA : Butterworths

Fennelly , L J ( 1996 ) Handbook of loss prevention and crime

prevention ( 3rd ed ) Boston, MA : Butterworth-Heinemann

Fiems , R , & Hertig , C ( 2001 ) Protection offi cer guidebook

Naples, FL : International Foundation for Protection Offi cers

half as the attacker does not have to add in time

to fl ee Depending on the asset to be protected

and the preexisting environment in which the

protection offi cer must operate, strengthening the

ability to detect and delay the adversary must be

given especially careful consideration This may

include the addition of intelligence assets that can

overtly or covertly uncover the adversary’s plans

Cooperative information sharing with other

enti-ties such as law enforcement or in some areas, the

military, may be the best option for strengthening

the detection aspect of asset protection

Like the homicide/suicide bomber, improvised

explosive devices (IEDs) are also an especially

trou-bling trend Not limited to areas of confl ict,

domes-tic extremist organizations have used these devices

to intimidate, maim, and destroy Special attention

and alternative plans must be carefully developed

for organizations that conduct work that may

attract the attention of such groups, including

spe-cialized protection plans for executives In areas of

confl ict where the threat of IEDs is real, options for

reducing the risk include, but are not limited to,

traveling covertly, using decoy vehicles, or using

telephones, videos, and Internet conferencing

Specialization in the industry is the ation of a long-standing trend that is gaining greater acceptance outside of the business Both large and small security businesses are fi nding specialties in which to focus and thrive Some security offi cer companies are established as, or are establishing, separate divisions devoted to retail security in malls and protection of chemical plants or nuclear power stations Electronic secu- rity companies may fi nd specialization in surveil- lance systems for casinos or integrating various security, fi re alarm, and building control sys- tems into a cohesive platform using the client’s computer network

Professionalism is also the continuation of a long-standing trend that is fi nding favor by the companies and clients that security profession- als work for and with College degrees at the Bachelor’s and Master’s levels are an almost uni- versal requirement for security managers at all levels, and for some security offi cers in special- ized sectors Certifi cation by industry organiza- tions such as the International Foundation for Protection Offi cers and ASIS International is also becoming a requisite for some companies

Trang 38

I FOUNDATIONS

SECURITY QUIZ

Fossum , J ( 1982 ) Labor relations: Development, structure,

pro-cess Dallas, TX : Business Publications, Inc

Garcia , M L ( 2001 ) The design and evaluation of physical

pro-tection systems Boston, MA : Butterworth-Heinemann

Girard , C M ( 1989 ) Planning, management and

evalua-tion, Chapter 31 In L J Fennelly (Ed.) , Handbook of loss

prevention and crime prevention ( 2nd ed ) Boston, MA :

Butterworths

Gilbride , B P ( 1999 ) Sexual harassment In S J Davies &

R R Minion (Eds.) , Security supervision: Theory and

practice of asset protection Woburn, MA :

Butterworth-Heinemann

Green, G., revised by Fischer, R J (1987) Introduction to

security (4th ed.) Boston, MA: Butterworths

Hertig , C A ( 2002 ) Investigative concepts Unpublished

paper York College of Pennsylvania

Hertig , C A , Fennelly , L J , & Tyska , L A ( 1998 ) Civil

liability for security personnel Naples, FL : International

Foundation for Protection Offi cers

Johnson , T ( 2002 ) Retail loss prevention management models

Unpublished paper York College of Pennsylvania Kuykendall , J ( 1986 ) The municipal police detective: An

historical analysis Criminology , 24 ( 1 ) Mackay , J ( 1996 ) Allan Pinkerton: The fi rst private eye New York, NY : John Wiley & Sons

Matthews , L J ( 1990 ) Pioneers and trailblazers: Adventures of

the old west New York, NY : Derrydale

Nalla , M , & Newman , G ( 1990 ) A primer in private security

Albany, NY : Harrow & Heston National Advisory Committee on Criminal Justice

Standards and Goals (1976) Report of the task force on

private security Washington, DC

Peak , K J ( 1997 ) Policing in America: Methods, issues,

chal-lenges Upper Saddle River, NJ : Prentice-Hall

Purpura , P P ( 1991 ) Security and loss prevention: An

intro-duction Stoneham, MA : Butterworth-Heinemann

Sennewald, C A (1985) Effective security management (2nd

ed.) Boston, MA: Butterworths

S E C U R I T Y QU I Z

1 The ASIS International General Security Risk

Assessment Guideline defi nes an asset as

“ Any real or personal property, tangible or

intangible, that a company or individual owns,

that can be given or assigned a monetary value

3 Physical security planning was originally

based upon response to a military threat

a True

b False

4 Risk Management is a term closely associated

with the insurance industry

a True

b False

5 A vulnerability assessment will include a

thorough examination of the following:

a Facility and personnel

b Contents and material

c Suppliers and contractors

d All the above

6 Deterrence is the practice of discouraging an

individual or group from even attempting to attack the asset

8 There is a theory of loss control developed by

Bottom and Kostanoski in security and loss control It is known as:

a WASTE

b WASTMGMT

c WAECUP

d WHATSUP

9 The most intangible valuation of an asset

would be in what is referred to as:

a Liquid asset

b Respectful damage

c Punitive damage

d Reputational damage

10 Intangible property include things such

as goodwill, proprietary information, and related property

a True

b False

Trang 39

This page intentionally left blank

Trang 40

and he was right — to a degree History is a

per-spective In many cases, that perper-spective gets

distorted, or lost, over time

Studying history is important as it gives us perspective on where things were, where they are now, and where they may be in the future Historical analysis can provide insight into how certain issues were dealt with This may give guidance in contemporary or future problem solving

Finally , history provides a laboratory for the testing of theory Solutions that were developed

in response to certain problems had positive

or negative effects in addressing those lems An example is the Prohibition Era in the United States, beginning in 1919 Alcoholic bev-erage manufacture or distribution was against the law As a result, huge criminal enterprises sprang up in response to consumer demand A black market economy was formed with gang-sters seeking to profi t Some people feel that the

● Explore the growth of the security

industry through wartime and policing

units

and public police

developed

and marketing trends are related to asset

protection

class struggles, and labor relations

have all contributed to the protection

● Offer suggestions for pursuing

contemporary careers in asset protection

The Evolution of Asset Protection

and Security

Christopher A Hertig and John Christman

2

Ngày đăng: 16/03/2014, 20:21

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w