THE PROFESSIONAL PROTECTION OFFICER PRACTICAL SECURITY STRATEGIES AND EMERGING TRENDS INTERNATIONAL FOUNDATION FOR PROTECTION OFFICERS AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW
Trang 2
THE PROFESSIONAL PROTECTION
OFFICER
PRACTICAL SECURITY STRATEGIES AND EMERGING
TRENDS
INTERNATIONAL FOUNDATION FOR
PROTECTION OFFICERS
AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO
Butterworth-Heinemann is an imprint of Elsevier
Trang 3Butterworth -Heinemann is an imprint of Elsevier
30 Corporate Drive, Suite 400, Burlington, MA 01803, USA
The Boulevard, Langford Lane, Kidlington, Oxford, OX5 1GB, UK
© 2010 Elsevier Inc All rights reserved
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein)
Notices
Knowledge and best practice in this fi eld are constantly changing As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence
or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein
Library of Congress Cataloging-in-Publication Data
Application submitted
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library
ISBN : 978-1-85617-746-7
For information on all Butterworth-Heinemann publications,
visit our web site at www.elsevierdirect.com
Printed in United States of America
10 11 12 13 14 10 9 8 7 6 5 4 3 2 1
Trang 4The Cycle of History 14
Demographics 23 Class Struggles and Terrorism 24 Labor Relations 27
Law 29 History of Security Services 31 The Path to Professionalism 33 Contemporary Careers in Asset Protection 34 References 38
Defi nition of a Protection Offi cer 41 Levels of Protection Staff 42 Major Roles of Protection Offi cers 43 What It Means to be a Professional 45 Preventative Functions 48
Mitigation Functions 48 Response Functions 48 Basic Protection Offi cer 48 Intermediate Protection Offi cer 48 Advanced Protection Offi cer 49 Summary 49
References 51 Resources 51
4 The Protection Offi cer
as a Leader
FRANKLIN R TIMMONS AND SCOTT A WATSON Introduction 55
Do You Really Want to be a Leader? 56
Trang 5iv
Team Member Skills: The Foundation of Leadership 57
Expectations of Leaders 57
Three Critical Leadership Skills 57
Ten Steps to Becoming an Effective Leader 60
The Leader as an Agent of Change 61
Effective Communications Defi ned 75
Due Diligence Based on Effective
Communications 75
Channels of Communications 76
The Six Essentials of Effective
Communications 76
Consider the Audience 76
Verifying Communications with Feedback 77
Myths and Misconceptions in
What is Security Awareness? 83 Expanding the Team Through Partnerships 84 Techniques for Reinforcing Policy and Procedures to Increase Security Awareness 84
Double Loop Learning 85 Tools 86
Lessons Learned 87 Resources 87 References 88
8 Central Alarm Stations and Dispatch Operations
SEAN SMITH, JIM ELLIS, AND RICH ABRAMS Introduction 89
History of Central Alarm and Dispatch Centers 90
Types of Monitoring Systems 91 Types of Sensors 95
Transmission Media 98 Visitor Management Systems 99 Communications 100
Conclusion 101 References 102
Contemporary Security Environment 108 The Role of the Professional Protection Offi cer 112 Summary 113
References 114
Trang 6CONTENTS v
10 Patrol Principles
CHRISTOPHER A VAIL History of Patrol 117
General Rules for Traffi c Direction 135
12 Crowd Management and
Special Event Planning
PATRICK C BISHOP, TERENCE M GIBBS, AND
JENNIFER LANTZ Introduction 137
Crowd Actions and Suggested Countermeasures 140
When Verbalization Doesn’t Work 142
Security and Demonstrations 142
Formation of a Mob 143
Responsibility and Behavior of Protective Groups 143
Planning Considerations 143
Personal Behavior 144
Riot Control Force Deployment Procedures 144
Crowd Management Assessment 145
Alcohol Serving Considerations 146 Reference 147
Environmental Crime Prevention Versus Social Crime Prevention 152
Theories 152 Routine Activity Theory 156 Crime Pattern Theory 156 Crime Prevention Through Environmental Design (CPTED) 156
Second-Generation CPTED 157 Defensible Space: Crime Prevention Through Urban Design 158
Practical Applications 158 Summary 158
References 159 Resources 159
14 Physical Security Concepts and Applications
KEVIN T DOSS AND DENIS A O’SULLIVAN Physical Security Planning 161 Security Lighting 166
Application Considerations 167 Glazing 167
Intrusion Detection 168 System Monitoring 170 Card Access 170 Locking Hardware 171 Closed Circuit Television 173 Safes and Vaults 175 Underwriters Laboratories 177 Fencing 177
Trang 715 Alarm System Fundamentals
DOUG DURANT AND KEVIN POUND
Emergency Access Control 192
Examples of Access Control 192
Audit and Record Keeping 193
Access Authorization 193
Applying Physical Security in Access Control 194
Locks and Key Control 194
Electronic Access Control Systems 195
Access System Database Management 196
Detection Methods 211 Fire Types 211
Extinguishers 212 Permanent Extinguishing Hardware 213 Containment 213
Fire Plans 214 Arson 214 Conclusion 215
19 Occupational Safety and Health
and the Protection Offi cer
KEVIN PALACIOS Introduction 217
Work and Health 218 Basic Elements of an Occupational Safety and Health (OSH) Program 218
Occupational Risks 221 The role of the Protection Offi cer in OSH Programs 222
Key Facts in Accidents 223
20 An All Hazards Approach
to Hazardous Materials
ROBERT D JAFFIN Role of the Protection Offi cer 230 Hazardous Material Incidents 231 Tools and Resources 232 Response Models and Templates 233 The Initial Response 234
Resources 237
Trang 8Threats to Information and Intangible Assets 243
How Technology is Changing the Threat 245
A Suite of Protective Measures 246
The Role of the Professional Protection Offi cer 249
22 Workplace Crime and Deviance
NORMAN R BOTTOM AND
WHITNEY D GUNTER Theories of Workplace Crime 255
TERENCE M GIBBS Impact on Business and Industry 270
Substance Abuse: What is the Motivation? 271
How Problematic Behavior and Dependence
Develop? 272
How is Substance Abuse Perpetuated? 273
Conditions Adversely Affecting the
Workplace 274
How Must Industry Respond? 274
Drugs of Abuse, Paraphernalia, and Defi nitions 277 Indicators and Common Signs of Abuse 278 Signs and Symptoms: Controlled Substances 278 Inhalants: Glue, Gasoline, Erasing Fluid 282 Protecting People and Assets 282
References 285
24 Workplace Violence
TIMOTHY A PRITCHARD AND ROGER MASLEN References 292
25 Crisis Intervention
MICHAEL A HANNIGAN AND CHRISTOPHER A HERTIG Introduction 295
Causes of Disruptive Behavior 296 Stages of Management of Disruptive Behavior 296
Crisis Development Behavior Modules 297 Protection Offi cer Guidelines 298 Verbal and Physical Disruptive Behavior 298 Empathic Listening 299
Nonverbal Communications 299 Controlling Disruptive or Violent Behavior 299 Team Intervention 300
Positive Factors Resulting from Team Approach 300
Leadership in the Team Approach 301 Safety Considerations in Crisis Intervention 301
Conclusion 301 Resources 302
26 Strikes, Lockouts, and Labor Relations
DAVID J DELONG Strikes 305
Searches 308 Employee Misconduct and Dishonesty 309 Employee Discipline 309
Types of Discipline 309 Arbitration 310 Summary 310
Trang 9What is Security Risk Management? 316
Two Key Elements: Assessment and Mitigation 316
Taking a Strategic Risk Management Approach 317
The Risk Management Process 317
Likelihood Versus Consequence Scatter Charting 321
The Foundation of a Mitigation Strategy 322
The Five Avenues to Address Risk 323
Types of Potential Emergencies 332
Scope of the Problem 335
Emergency Planning Considerations 336
Vulnerability Analysis 338
Developing the Emergency Response Plan 342
Reviewing and Integrating The Emergency
Why Violence? Why They Do What They Do 352
The Reason for the Action 353
What They Look Like: From Individuals to Organizations 354
Target Selection and Attacks 356 Security Preparations and Defensive Measures 357 References 359
30 Antiterrorism and VIP Protection
CHRISTOPHER A HERTIG AND
TED WADE Terrorist Actions and Activities 363 Antiterrorist Strategy 365
Terrorism Defensive Strategies 366 Antiterrorist Techniques by Organizations/
Facilities 366 Specifi c Techniques for Antiterrorist Security 367 Professional Development for Personal Protection Specialists 370
Personal Protection Specialists (PPS) 371 Protecting the Principal 372
Hostage Situations 373 Hostage Threat Receipt 373
If Taken Hostage 374 Managing the Hostage Incident 374 Negotiation 375
The Stockholm Syndrome 375 Suicide Attacks 375
References 377 Resources 377
IX
INVESTIGATIONS
31 Investigation: Concepts and Practices
for Security Professionals
CHRISTOPHER A HERTIG Investigative Logic 383
History of Investigation 384 Preliminary Investigation 385 Follow-up Investigation 385 Intelligence 386
Liaison 387 Notes and Reports 388 Auditing 389
Trang 10Making Detailed and Accurate Notes 408
Working with Law Enforcement and
What is Interviewing? 413
The Power of Communication 414
The Interview Process 416
Covert Personal Surveillance 422
Overt Personal Surveillance 422 Covert Electronic Surveillance 422 Overt Electronic Surveillance 423 Equipment Requirements 423 Privacy Issues 423
Recording and Retention 424
35 Report Writing and Field Notes
RAV-ZURIDAN YISRAEL Introduction 427
Importance of Report Writing 427 Field Notes 428
Reports Should be Written 428 What Should be Reported 429 Qualities of Good Reports 429 References 431
X
LEGAL ASPECTS OF SECURITY
36 Legal Aspects of Security
DAVID L RAY Introduction 435
The Development of Our Laws 436 Types of Laws—Criminal and Civil 437 Conclusion 446
Use of Force in General 450 Justifying the Use of Force 451
Trang 11x
Retreat 452
Force Alternatives Defi ned 452
Excessive Force Liability 453
Injuries to Offi cers are Avoidable 453
Arrest and Detention Search and Seizure 453
A Formula for Self-Control 454
Confl ict Resolution Formats 455
Response to Aggressive Behavior 455
Offi cer Safety Issues 460
38 Defensive Tactics and Offi cer Safety
INGE SEBYAN BLACK The Professional Security Offi cer’s Role 471
Avoiding Potential Situations 472
Know Your Limitations 472
All Force Beyond this Point Requires Training Beyond
the Introductory Offi cer Level 478
Training for Success 479
Focus on Prevention 480
Conclusion 480
39 Industrial Hazards, Safety, and the
Security Patrol Offi cer
BRIAN D BAKER Defi nition of Industrial Hazards 484
Industrial Hazards, Accidents, Injury, and Illness 485
Risk Assessment 488
Self-Assessment 488
Self-Protection 491 References 494
40 Apprehension and Detention
Procedures
RICHARD P FIEMS Developing a Working Model 498 What Constitutes an Arrest? 499 The Importance of Reasonableness 499 What Gets Security Offi cers in
Trouble? 500 Detention and Apprehension Methodology 501 The Use of Force 503
Dealing with the Aftermath 503 Conclusion 504
XII
RELATIONS WITH OTHERS
41 Human Relations in a Global
Environment
CHRISTOPHER A HERTIG AND DARRIEN DAVENPORT Human Relations 509
Advice from the Master 510 Diversity 510
Globalization 513 Women in Protection 514 Sexual Harassment 514 Effective Communication 515 Ethical Behavior 515 Customer Service Leadership 516 Summary 517
References 518 Resources 518
42 Public Relations
CHARLES T THIBODEAU, CHRISTOPHER A HERTIG, AND GEORGE A BARNETT Public Relations Defi ned 521 Public Relations Planning 522
Trang 12CONTENTS xi
Promoting Effective Customer Relations Within the
Security Force 524
Handling Customer Complaints 526
Service That Can Make the Difference 527
Training 527
The Media: Good Dream/Bad Dream 528
Access Control at the Scene of a Critical Incident 529
Disruption of Business 529
Plant Emergency Organization Control 529
Contract Security Contingent Access Control 529
Conclusion 530
References 531
43 Community Relations: Making
the Strategy Come Alive
MARK E PUETZ AND K C POULIN
Introduction 535
Security and the Experience Economy 536
Cost of Quality 541
From Strategy to Brand to Offi cer 544
Building a Community of Substance 547
Second Scenario: Vehicle Break-in 559
Third Scenario: Special Event 560 Fourth Scenario: Seaport Operations 561 Fifth Scenario: Installing a Central Station 563
Professional Organizations and Training 563
Industry Regulation by Government 564 Conclusion 566
References 566
45 Ethics and Professionalism
CHRISTOPHER A HERTIG Key Terms and Concepts 570
Ethical Decision Making 572 Ethical Issues in Protection 572 Why Unethical Behavior Occurs 573 Conclusion 574
Resources 575
Index 577
Trang 13This page intentionally left blank
Trang 14The security world is constantly changing,
both in the context in which it has to operate,
and in terms of what it can offer as a response
to a wide range of threats This is true across the
world Indeed, globalization and the impact of
technology are just two trends that have seen
to that As a consequence, security has become
more complicated; or, at least, the breadth of
knowledge that a good security operative, at any
level, needs to draw upon has been stretched
One of the positive signs of the march of
security professionalism is that there is now
more research being gathered on
security-related issues Scholars in universities, research
institutes, companies, and professional
bod-ies have helped to develop a global knowledge
base The good thing about security is that
knowledge from around the world has
rele-vance to a broad range of circumstances After
all, threats are often the same Terrorist attacks
take place globally, and the sorts of responses
needed are often similar, if not the same The
principles of security apply across the board,
though the contexts differ, and how the
prin-ciples are applied needs to be adapted to meet
local needs This is where skill comes in Skills
are needed from those who assess risks and
those who manage them, from senior executives
to street-level protection offi cers
It is a sad fact that offenders often move faster
than response agencies We know that many of
those who commit crime adapt quickly; they share
knowledge and experiences; doing so often gives
them an edge Just as people move themselves and
their assets around the world with ease, offenders
have tried to do so as well Stopping them requires
constant attention; as one famous terrorist agency once remarked, “ We only have to succeed once ” Being on our guard, benefi ting from research
fi ndings, and following good practice are cial Books like this one are designed to help The coverage of this book is broad, covering domains such as communication, protection offi cer functions, crime prevention, safety, infor-mation security, workplace violence, risk man-agement, investigations, private security law, and the use of force The book provides proven knowledge to protection offi cers to enable them
cru-to take on the arduous tasks of asset protection and loss prevention
This book strives to provide a foundation for improving the skill level and effi ciency of pro-tection offi cers As a basic text for achieving the
Certifi ed Protection Offi cer certifi cation, this
book will be studied over and over by tives across continents It will also serve as a research resource for those looking to develop insight into an array of security topics The edi-tors are to be commended for ensuring that this edition builds positively on previous ones Professor Martin Gill
opera-Director Perpetuity Research & Consultancy International (PRCI) Ltd
148 Upper New Walk Leicester LE1 7QA, UK
Dr Ona Ekhomu, CFE, CPP Chairman
School of Management and Security
10 Turton St
Lafi aji, Lagos, Nigeria Foreword
Trang 15
This page intentionally left blank
Trang 16Contributors List
Sandi J Davies began her career in contract
security in 1980 with a primary focus on
person-nel administration She became deeply involved
in training and was instrumental in developing
security offi cer training programs for a major
national security guard company Her interest
in security training grew, and in 1988 she joined
the newly formed International Foundation for
Protection Offi cers (IFPO) as a program
admin-istrative assistant In 1991, she was elected
exec-utive director of IFPO and has been a driving
force in the Foundation’s program development
and administration Sandi became a member of
ASIS International in 1985 and served in
execu-tive positions at the chapter level
In addition, Sandi was also a member of the
Advisory Board for the Northwest Territories
Security Offi cer Certifi cation Committee In 1994,
Sandi was the chairperson for the Asset Protection
Advisory Board for Mount Royal College in
Calgary, Alberta, Canada In 1999, Sandi agreed to
serve on the Advisory Board of the International
Foundation for Cultural Property Protection Ms
Davies is also a member of the Technical Advisory
Board for the Canadian General Standards Board
on Security Offi cer Training Standards Most
recently, Sandi was chairperson for the Private
Security Services Council of ASIS International
Ms Davies has had numerous articles
pub-lished in security publications, such as Security
Management and SECURITY magazine, relating
to certifi cation and training of security personnel
In the early 1990s, Ms Davies, in a cooperative
effort with the IFPO Founding Director Ronald
R Minion, coedited the Protection Offi cer Training
Manual (Butterworth-Heinemann) That text is
now in its eighth edition In 1994, she contributed
a chapter relating to crime prevention in Canada
Prevention (Butterworth-Heinemann) In 1995, again in a cooperative effort, Ms Davies and Mr
Minion had published a book entitled The Security
Supervisor Training Manual with Heinemann In 2008, the third edition of this text, coedited by Chris Hertig, was released entitled
Security Supervision and Management: Theory
and Practices of Asset Protection , again published
by the leader in Security Trade Publications, Butterworth-Heinemann Sandi was the editor of
Protection Offi cer News published by IFPO for 13
years until it went into an electronic format
Chris Hertig, CCP, CPOI , is a member of the
Behavioral Sciences Department at York College
of Pennsylvania where he teaches courses in rity planning and supervision, crime prevention and physical security, legal standards of security and asset protection, ethical issues in criminal justice and criminal investigation In addition to his regular teaching assignment, he has taught self-defense and martial arts for the education department Prof Hertig has also given noncredit courses in report writing, crowd management, offi cer survival, and public relations
Prior to York College, Mr Hertig spent three years as a nuclear security training administrator, developing and teaching a wide range of instruc-tional topics for security personnel in accordance with U.S Nuclear Regulatory Commission
Instructor (CPOI) through the International Foundation for Protection Offi cers (IFPO), Prof Hertig has given presentations to numerous professional and civic organizations He has also consulted with instructional program providers
Trang 17CONTRIBUTORS LIST
xvi
Rich Abrams , CEM
Brian D Baker , MA, CPP, CPO, CPOI
George A Barnett , CPO
Colin Best , CSSM
Patrick C Bishop , CPP, CFE, CPO
Inge Sebyan Black , CPP, CFE, CPO
Norman R Bottom , PhD, CPP, CFE, CPO, CST
Doug Durant , BA, CPP, CPO
Dr Ona Ekhomu, CPP, CFE
Francis J Elliott , CPP
Jim Ellis , MA, CPP, PSP, CSSM, CPO
Richard P Fiems , MA, CPO, CSSM, CPOI
Terence M Gibbs , MS, CPP, WSO-CSSD
Brion P Gilbride , MSI, CSSM, CPO
Professor Martin Gill
Prof Hertig has published several hundred
arti-cles, reviews, and chapters on various topics He
has been a featured columnist in several security
industry publications and assisted in establishing
IFPO’s Article Archives, an online collection of
research papers for students and practitioners
Chris served as coeditor of Security Supervision and
Management: Theory and Practice of Asset Protection
(Butterworth-Heinemann) with Sandi J Davies,
the Foundation’s executive director
Chris has been a longtime member of
ASIS International, serving on the Academic
Practitioner Symposium Group He is a charter
member and past president of the Pennsylvania
Association of Criminal Justice Educators
and an active member of the International
Association of Law Enforcement Educators
and Trainers He was also a member of the
International Association of Campus Law
Enforcement Administrators for many years
Prof Hertig began his career while in lege as a student aide to the Campus Security Department He was a member of the U.S Army ROTC and served an internship with the Columbia County Juvenile Probation Department After graduation, he worked for several security services fi rms as a security offi -cer, investigator, and supervisor He also spent
col-a summer col-as col-a member of the Pcol-ark Police in Mechanicsburg, PA
(Criminology) from Indiana University of
Bloomsburg University of Pennsylvania, and an associate (Commercial Security) from Harrisburg Area Community College He has also com-pleted graduate courses in adult education from Penn State University, has been board certifi ed
in security management by ASIS International, and holds the designation of Certifi ed Protection Professional (CPP)
Whitney D Gunter , PhD., CPO Michael A Hannigan , CPO Chris Hertig , CPP, CPOI Arthur A Holm , CPO Robert D Jaffi n , MBS, MTS Glen Kitteringham , M.Sc., CPP, F.Syl, CSSM, CPOI, CPO
Jenifer Lantz Roger Maslen , CPP, CFE Robert Metscher , CPP, CISSP, CFE, CPO, CSSM, BS, MBA
Denis A O’Sullivan , CPP, CPO Kevin Palacios , M.Sc., CPP, PSP, CPOI Kevin E Peterson , CPP, CPO, CPOI K.C Poulin , CPOI, CPS, CHS-III Kevin Pound
Timothy A Pritchard , CPP, CPOI Mark E Puetz , MBA
David L Ray , BA, JD, CFE Bethany J Redmond
Trang 18CONTRIBUTORS LIST xvii
Chris Richardson , CPP
James E Sellers , CPP, MSA
Dennis Shepp , MBA, CPP, CFE, PCI, CPOI
Sean Smith , CPO
Michael Stroberger , CPO, CLSO, CSSM,
Trang 19This page intentionally left blank
Trang 20A PURPOSE
Offi cer: Practical Security Strategies and Emerging
Trends is to provide “ need-to-know ” information
for protection offi cers and students
through-out the security industry This resource serves
as the course text for the Certifi ed Protection
Offi cer (CPO) program Many security
profes-sionals also fi nd the contents of this textbook
helpful as a reference in their day-to-day
secu-rity management responsibilities
B HISTORY OF THE TEXTBOOK
Training Manual (POTM) originated with
the birth of the International Foundation for
Protection Offi cers (IFPO) in 1988 Twelve
dedi-cated security professionals from the United
States and Canada had a vision: to create an
organization that would provide meaningful
career opportunities for line security offi cers
throughout North America
The newly formed IFPO Board of Directors
needed, along with a professional training
textbook, to make that vision a reality Hence,
the fi rst edition of POTM was created to serve
as the course text for the Certifi ed Protection
Offi cer (CPO) program IFPO, the CPO
pro-gram, and POTM all proved to be vital
compo-nents in achieving the foundation’s objectives
Today , IFPO is the recognized catalyst in the development of professionalism throughout the private security industry Thousands of security offi cers who have earned the CPO accreditation have gained knowledge and professional career enhancement; they have unselfi shly provided encouragement and information to their col-leagues and employers Hence, a new dimen-sion of opportunities has spread throughout the security industry
The fi rst edition was simple, short, and ited in scope, but included enough information to help the security offi cer better understand his or her roles, duties, and responsibilities However, since that simple beginning, each subsequent edi-tion has brought new and enlightening informa-
lim-tion to the security professional The Professional
Protection Offi cer is the leading text for protection
offi cers and students It is also widely used by those teaching in Protective Services, Criminal Justice, Homeland Security or Emergency Management courses of study
Feedback has been the most signifi cant tor It has led to a standard of excellence for this new text We have received countless let-ters of appreciation for the depth and quality of the seventh edition, but these same enthusiasts have been liberal with their recommendations for changes and improvements, and we have listened Ongoing dialogue with security man-agers, supervisors, consultants, educators, and,
fac-of course, protection fac-offi cers, has enabled us to develop and maintain a training text that will serve future learning
Introduction
Trang 21I fi rst met Dr Norman R Bottom when I was
a graduate student at Indiana University of
Pennsylvania He taught a course on executive
protection on Saturday mornings that was held
on the campus of Allegheny County Community
College in Monroeville, Pennsylvania Two other
classes were held there on Saturdays so that
peo-ple pursuing a Master’s degree could take nine
credits by going to class one day a week
The class was a unique arrangement; in those
days we didn’t have online learning Creative
scheduling like Dr Bottom had engineered was
not the norm The class offerings and schedule
concept were a fantastic way of meeting the
needs of the learner, the security industry, and
the university
It was way out in front
The Journal of Security Administration was
started by Norman Bottom It was the fi rst
scholarly refereed academic journal in the
secu-rity fi eld The journal was a major contribution
to the fl edgling discipline of asset protection
Norman edited it for many years, assisted by
his wife, Mari, who took care of book, seminar,
and video reviews Dr Bottom was also
instru-mental in founding the Academy of Security
Educators and Trainers (ASET) This
associa-tion included many leading trainers,
practitio-ners, and academicians in the security industry
Some of the networking initiated through the
academy is manifested in the pages of this text
Some of us met each other through ASET
In 1982, I applied to become a Certifi ed
Protection Professional (CPP) As Dr Bottom
was a CPP, he endorsed my application
Kostanoski wrote a book entitled Security and
Loss Prevention This was an excellent text that
presented the WAECUP model of loss control
This model stated that loss was attributable to
more than crime Loss to an organization came from waste, accident, error, crime, and unethi-cal/unprofessional practices This was a new and important concept Security was not just about the bad things that people do; it was much more than that The WAECUP model is part of this text It is part of what I teach It is part of what we do as protectors
Protection Offi cers was formed Leading cates of professional development helped with this organization under the direction of Ron Minion Norman Bottom was on the Board of Directors, at one point serving as Chairman
He was way out in front He was always way out in front
Now it’s up to us
Christopher A Hertig, CPP, CPOI Assistant Professor
York College of Pennsylvania October 15, 2009
Fallen Offi cers
This edition of the textbook is dedicated to the brave offi cers who lost their lives on 9/11,
as well as all of the other offi cers who have died
in the line of duty We remember and honor your sacrifi ce, and we salute your dedication Our hearts and sympathies go out to your fami-lies, friends, and coworkers
Ron Minion, CPP and IFPO Founder
Ron Minion (1938 – 2008) lost his battle with Lou Gehrig’s Disease in 2008 He was the man behind this book, one of the founders of the IFPO, a dedicated champion of the security industry, and a tireless advocate for protection offi cers His determination, and vision of pro-fessionalism through training for the industry, has resulted in a brighter future for scores of security professionals, and will continue to do
so in the future
Trang 22INTRODUCTION xxi
Ron was the fi rst examined Certifi ed
Protec-tion Professional in Canada He was a
found-ing member of the Calgary Chapter of the ASIS
International, where he was a chapter chair
and regional vice president As regional vice
president, he earned the president’s “ award of
merit ” for establishing ASIS chapters
through-out Canada In 2006, Security Magazine named
Ron one of the 25 Most Infl uential Executives
Ron ’s legacy includes the thousands of line
security offi cers he employed and mentored
over the years He knew the industry from the
ground fl oor up, and never lost his vision of
providing affordable training for security offi
-cers to help them turn their mere jobs into
via-ble careers with brighter futures
Ron , our friend, mentor, industry advocate,
and trusted colleague, will be greatly missed
Lee Minion, CPO
Lee Minion, son of Sandi Davies and Ron
Minion, served his country in Iraq and is now
embarking on a career in law enforcement
He is indeed a chip off the old block At the
Foundation, we are so very proud of him
IFPO Team
The International Foundation for Protection
Offi cers is supported by a team of security
professionals throughout the world who, year
after year, work diligently on behalf of the
Foundation and what it stands for Because of
these men and women who are committed to
excellence and remain steadfast in their
obliga-tion to high standards of service, IFPO
contin-ues to be successful We thank you
Louise Gringas
A victim of a tragic accident, our coworker,
team member, and friend, Louise Gingras,
brought sunshine to the IFPO Corporate
Headquarters for seven years She was taken
from us far too soon, in June 2009 Louise started
her tenure with the IFPO as a part-time employee
in 2002, and quickly worked her way into a very valuable full-time Program Coordinator position Her friendly, caring nature assisted literally thousands of candidates through their desired certifi cations She took pride and joy in attend-ing to the IFPO students ’ and clients ’ needs Her strengths were many, and her radiant smile and personality will be forever missed within our offi ces She leaves behind her precious daughter, Haylee
D EIGHTH EDITION CONTENTS
The eighth edition has 12 units and 45 chapters
The contributors to the eighth edition are among the best writers, academics, and practitioners in the security community This talented group of professionals has generously provided readers of this superior textbook with unique opportunities
to acquire current asset protection and life safety information These writers are outstanding indi-viduals who deserve recognition and appreciation for their service to the security community
The contents of this textbook are sometimes quite basic However, every security supervi-sor and manager should fully understand all
of the information contained herein to provide better leadership and interpretation of offi cer responsibilities
The material contained in each unit is arranged to provide the reader with a smooth
fl ow of related security information
At the conclusion of each chapter, there are
10 multiple choice and true/false questions It
is important to be able to answer each question correctly before proceeding to the next chapter
E GLOBAL CHALLENGES, NEW ROLES, AND RESPONSIBILITIES
In the late sixth century, when the Greek losopher Heraclitus fi rst commented that the
Trang 23xxii
universe is in constant fl ux, and the only
con-stant is change; little could he have imagined
the pace of that change in the 21st century
Advances in medicine, science, and
tech-nology are happening at a dizzying pace, and
news travels the globe in the blink of an eye
Information of all sorts is available with just a
few keystrokes, and people can stay in constant
touch via electronic media Journeys that once
took weeks, months, or even years now take
mere hours It is a small world these days, and
economic problems and social unrest in one
nation can be felt in many others
Where once the term “ security ” might have
referred to the lone night watchman whose
great-est adversary was a burglar hoping to pick a lock,
those days are long gone The night watchman’s
role was viewed as merely a job that did not
gar-ner much respect in the community
Today ’s private security professionals are
fi nding their roles greatly expanded in
numer-ous arenas worldwide, due, in part, to a much
greater global threat and a reduction in public
law enforcement protection The current
eco-nomic situation has caused an increase in some
types of crimes At the same time, those
eco-nomic realties have also forced local
municipal-ities to reduce public law enforcement efforts
through layoffs or hiring freezes, even though
the need for more protection is growing
The threat of terrorism was spotlighted for
the United States and the world on 9/11, and it
is still an ever-present threat worldwide It has
and will continue to impact the industry,
partic-ularly in the areas of research and risk
manage-ment methodologies
threatens infrastructure and services by
attack-ing computer networks via the Internet, has
become a very serious threat It can and has
resulted in the loss of billions of dollars of
pro-prietary information, and compromised data at
a broad range of institutions, from government
agencies to banks, credit card companies, and
business fi rms Company executives are acutely
aware of the danger of data loss, and numerous laws govern what must be done if data is com-promised Cyberterrorism not only puts data
at risk, it can put essential services and structure at risk Guarding against this type of threat requires continuing education about the ever-evolving risks, deterrents, prevention, and laws Unlike the night watchman, who only worried about physical security with its fences, gates, and access points, today’s protection offi cer must also guard against an enemy that moves at the speed of light The protection offi -cer must not only protect the physical premises and equipment, but must also guard against an enemy that moves silently to disrupt services, incapacitate infrastructure, and steal data The National Fire Protection Association’s
“ Standard for the Installation of Electronic Premises Security Systems ” have both caused changes that may not make news headlines, but will certainly impact the industry The former will not affect the general public, but fi re protec-tion, security consultants, facility managers, and insurance companies will be forced to deal with
it ASIS has already begun setting standards that have impacted the industry The latter more
or less cements the impact of the former
While the quest for mutual respect and less cooperation between public and private security has improved over the years, it must remain an ongoing goal for both the private and public sectors Mutual respect and cooperation between public law enforcement and private security is essential to ensuring that security needs are met effectively
Increasingly , security functions have been contracted out to private security fi rms to fi ll the gap between what government can do and what is needed Private security fi rms are even stepping in to fi ll the roles that military person-nel once fi lled on military installations and even war zones A new type of protection offi cer is increasingly stepping forward to fi ll the need, ready to deal with new situations and challenges
Trang 24INTRODUCTION xxiii
as they come along, thanks to ongoing
educa-tion and training
Currently , corporations that once relied on
that night watchman to patrol a fence as suffi
-cient protection are increasingly instituting their
own in-house security departments An
inte-gral part of this overall protection process is the
complemented with a security staff capable of
attending to ongoing protection needs Generally,
corporations require their security managers
and supervisors to be well educated, trained,
and experienced Private security fi rms are also
demanding educated, trained professionals
The night watchman might have been able
to do his job with limited education, but in
today’s ever-changing, challenging security
climate, professionals must be educated and
well trained to fulfi ll their new, evolving, and
demanding roles This new breed of security
professional is winning respect by proving it
is skilled and very capable of carrying out the
most sophisticated, demanding roles They are
dedicated professionals with the credentials
needed to keep themselves, their employers,
and their employers’ assets from harm
F CERTIFIED PROTECTION
OFFICER (CPO) PROGRAM
Professional Protection Offi cer: Practical Security
Strategies and Emerging Trends is the course text for
the Certifi ed Protection Offi cer (CPO) program,
an internationally recognized certifi cation for
pro-tection offi cers
The CPO designation is a professional
accre-ditation that can be earned by completing a
self-paced course based on this textbook
In addition to having security experience or
the equivalent, a candidate must complete the
following stages of progression to earn the CPO
examination (A proctor may be located within the candidate’s organization or community.)
(Both examinations are based on the contents
of this textbook.)
G CERTIFIED PROTECTION OFFICER (CPO) FINAL CHALLENGE PROGRAM
This textbook, The Professional Protection Offi cer:
Practical Security Strategies and Emerging Trends , is
also the text for the CPO Final Challenge Program, which is the fast-track method of obtaining the CPO certifi cation The Final Challenge option eliminates the course of study and goes directly to the fi nal exam, which is the same one that is part of the CPO program Questions on the fi nal exam come from the material in the textbook
Contact the International Foundation for Protection Offi cers (IFPO) for more information regarding the Certifi ed Protection Offi cer and/
or other programs
H CONCLUSION
The term protection offi cer frequently appears
in this textbook What is a protection offi cer? Protection offi cers have many titles: secu-rity guard, security offi cer, campus police, loss prevention offi cer, crime prevention offi cer, retail loss prevention agent, military police, and several others They can work part time or full time They can be assigned to protect a person, a group of people, an offi ce building, a network, a store or factory, and many other assets in many locations Some are armed; some are unarmed
Trang 25xxiv
They can be employed as independent
con-sultants, by a security services agency, by the
military, by a state government, by the federal
government, and by other organizations The
term “ protection offi cer ” is not easy to defi ne
Titles vary, specifi c tasks vary, locations vary,
employers vary, but the one thing that all
pro-tection offi cers have in common is that they are
willing to take risks and put into place
preven-tive measures to protect tangible assets, such as
buildings, intangible assets, such as data, and
of course, the public They assume the risks so
that others can go about their business and not
have to worry about potential harm
This textbook is written as a useful reference
for security supervisors, managers, and those
that teach; but the primary benefi ciary is the student or working protection offi cer
Emerging Trends are honored to work with so many
academicians, researchers, and outstanding security professionals since the planning of the fi rst edition These talented and dedicated security profession- als have worked tirelessly in supporting, promoting, and contributing to the International Foundation for Protection Offi cers and all of its worthwhile pro- grams “ We could not have done it without you! ”
A special thanks goes to Alice Grime, Charles Thibodeau, and Jamie Ingram for their techni-cal support and assistance in the production and development of this textbook
Trang 26The Protection Offi cer Shall
I Respond to employer’s professional needs
II Exhibit exemplary conduct
III Protect confi dential information
IV Maintain a safe & secure workplace
V Dress to create professionalism
VI Enforce all lawful rules & regulations
VII Encourage liaison with public offi cers
VIII Develop good rapport within the profession
IX Strive to attain professional competence
X Encourage high standards of offi cer ethics
Loyalty
To the employer, the client, and the public The offi cer must have a complete and thorough understanding of all of the regulations and pro-cedures that are necessary to protect people and assets on or in relation to the facility assigned to protect
Exemplary Conduct
The offi cer is under constant scrutiny by everyone in work and public places Hence, it is essential that he or she exhibit exemplary con-duct at all times Maturity and professionalism are the key words to guide all offi cers
Protection Offi cer Code of Ethics
PROTECTION OFFICER CODE OF
ETHICS
Today business and the public expect a great
deal from the uniformed security offi cer In the
past there has been far too little attention paid
to the ethical aspects of the profession There
have to be solid guidelines that each offi cer
knows and understands More importantly, it
is essential that each manager and supervisor
performs his or her duties in a manner that will
refl ect honesty, integrity, and professionalism
Every training program should address the
need for professional conduct on and off duty
Line offi cers must exhibit a willingness to gain
professional competency and adhere to a strict
code of ethics that must include the following
Trang 27PROTECTION OFFICER CODE OF ETHICS
xxvi
Confi dentiality
Each offi cer is charged with the responsibility
of working in the interests of his or her employer
Providing protection means that the offi cer will
encounter confi dential information that must be
carefully guarded and never compromised
Safety and Security
The foremost responsibility of all offi cers is
to ensure that the facility that must be protected
is safe and secure for all persons with lawful
access The offi cer must fully understand all
nec-essary procedures to eliminate or control
secu-rity and safety risks
Deportment
Each offi cer must dress in an immaculate
manner Crisp, sharp, clean, and polished are
the indicators that point to a professional offi cer
who will execute his or her protection
obliga-tions in a profi cient manner and will be a credit
to the profession
Law Enforcement Liaison
It is the responsibility of each offi cer to make
every effort to encourage and enhance positive
relations with members of public law
exists and offer assistance whenever possible
Strive to Learn
To become professionally competent, each offi
-cer must constantly strive to be knowledgeable
about all aspects of his or her chosen career How
to protect people, assets, and information must
always be a learning priority for every offi cer
Develop Rapport
It is necessary to be constantly aware of the
image that our profession projects All offi cers
can enhance the image of the industry, their employer, and themselves Recognize and respect peers and security leaders throughout the industry
Honesty
By virtue of the duties and responsibilities
of all offi cers, honest behavior is absolutely essential at all times Each offi cer occupies
a position of trust that must not be violated Dishonesty can never be tolerated by the secu-rity profession
Prejudice
-cer must impose restrictions upon people that frequent the security workplace All human beings must be treated equally, with dignity and respect, regardless of color, race, religion,
or political beliefs
Self-Discipline
With the position of trust comes the sibility to diligently protect life and property These duties can only be discharged effectively when the offi cer understands the gravity of his
respon-or her position Self-discipline means trying harder and caring more
Conclusion
The job of protecting life and property focuses much attention on the individual secu-rity offi cer Hence, it is essential to be aware of the need for professional conduct at all times
By strictly adhering to each section in this code
of ethics, it may be expected that we as duals and the industry as a whole will enjoy
indivi-a good reputindivi-ation indivi-and gindivi-ain even more indivi-tance from the public as well as private and government corporations You as the individual offi cer must be a principal in this process
Trang 28accep-U N I T I
FOUNDATIONS
1 Concepts and Theories of Asset Protection
2 The Evolution of Asset Protection and Security
3 Role of the Professional Protection Offi cer
4 The Protection Offi cer as a Leader
5 Career Planning for Protection Professionals
Trang 29This page intentionally left blank
Trang 30C H A P T E R
3
INTRODUCTION
Asset protection is the basis for everything
that a protection offi cer does It is the core
function of the protection offi cer’s job Asset
protection can have different meanings and
functions depending on the approach to
pro-tecting the asset, its location, and even the type
of asset Asset protection has been practiced for
millennia, whether it was protecting the Roman
city with night sentries patrolling the streets, to
placing valuables into a modern safe The most visible and easily recognizable form of asset protection was the medieval castle The castle was built to protect an asset, be it the king or ruler, a precious metal such as gold, or as a point from which to help protect the empire Castles initially were quite basic, but as the risks esca-lated, they came to employ additional layers of protection such as a moat, drawbridge, or defen-sive positions
ASSET DEFINITION
Asset protection begins with defi ning what the asset is There may be one asset or many assets An asset can be a person or people; a physical entity such as a building or plant; an object such as a painting or a gold bar; or a concept such as a for-mula or design The ASIS International General Security Risk Assessment Guideline defi nes an asset as “ Any real or personal property, tangible
or intangible, that a company or individual owns that can be given or assigned a monetary value Intangible property includes things such as good-will, proprietary information, and related prop-erty People are included as assets ”
C H A P T E R O B J E C T I V E S
● Provide an overall introduction to the
concept of asset protection
related to asset protection
through Environmental Design (CPTED)
Concepts and Theories
of Asset Protection
Jim Ellis and Christopher A Hertig
1
Trang 311 CONCEPTS AND THEORIES OF ASSET PROTECTION
4
ASSET VALUATION
The asset must have some type of value The
value of the asset could be a real value, such as
a gold bar being worth a set amount of money
based on the weight of the bar and the
cur-rent price of gold The value of the asset could
be based on what it would cost the company to
replace it This is sometimes diffi cult to calculate
when discussing specialty items such as the
for-mula or recipe for a soft drink, or the patented
design for a product, the loss of which could
mean the end of a company The most
intan-gible valuation of an asset would be in what is
referred to as “ reputational damage ” — the loss of
the image of a company or consumer confi dence
in a company Reputational damage can occur
through major theft of customer information, a
senior executive being injured or killed, or the
brand name of a company being tainted through
inferior “ knock-off ” products The loss of
reputa-tion is diffi cult to calculate because things such
as unrealized sales are nearly impossible to
determine While it is not necessary to have the
actual value of an asset on hand at any one time,
the value of the asset must be known prior to the
implementation of any protection program and
reevaluated periodically thereafter
RISKS Criticality
Once the asset and its value are defi ned, it is
necessary to determine what risks there are to
the asset According to the ASIS International
“ risks or threats are those incidents likely to occur
at a site, either due to a history of such events or
circumstances in the local environment ” (2003,
p 6) It is therefore important to have data on
crime and incidents occurring in and around the
site A vulnerability assessment will include a
thorough examination of the facility, personnel,
contents, materials, suppliers, and contractors, especially anything that by use or omission would damage, harm, or cause loss to the com-pany or its personnel
Frequency
The frequency of losses must then be mined through an examination of the types of crimes and incidents in and around the facility, with special emphasis on the dates on which they occurred A ranking of the events should be made using a consistent scale (annually, monthly, daily, or hourly) for all such loss events
Probability
Through an analysis of this information, trends may emerge which point to an escalation in activi-ties that may precede a more serious crime against the company This will help to establish the prob-ability of such an event occurring in the future, assuming all other processes and operations at the facility remain the same Once there is a change in the assets, the probability of loss will also change
Impact
Finally , a ranking of the impact of any loss
on the company must be made Impact is an accounting of the tangible (real) and intangible (unrealized) costs associated with such events All such tangible losses should be considered, from the mundane, such as the loss of power or water service, up to and including the loss of the facility including its contents and a substantial portion of the employees Intangible losses such as the loss
of current or future sales or customers should also
be accounted for, to the extent that this is possible
MITIGATION
Only after all of the factors of risk or loss have been compiled and examined can the protection offi cer assist with developing strategies to help
Trang 32ASSET PROTECTION 5
I FOUNDATIONS
mitigate the risk All of the mitigation efforts
interfere with the operation of profi tability of the
enterprise ” (ASIS, 2003, p 6) Mitigation efforts
that do substantially impact operations are much
less likely to see executive support regardless of
the level of risk, as they also substantially impact
the profi tability of the company
Cost/Benefi t
A cost/benefi t analysis must also be
con-ducted to help assist in evaluating the mitigation
measures against the costs incurred According
to the ASIS International General Security Risk
Assessment Guideline, the cost benefi t process
“ involves three steps:
consequences of the expenditure
and benefi ts resulting from the expenditure
revenues accruing from the expenditure to
express those costs and revenues in current
monetary values ” (ASIS, p 4)
If the cost/benefi t evaluation determines that
the cost of mitigating the risk is greater than the
cost of the asset, then other measures must be
employed
ASSET PROTECTION
Layered Protection
typically involves a concept of layered
protec-tion, also known as defense in depth In this
concept, the asset is considered to be in the
center, surrounded by concentric layers of
pro-tection Each layer contributes individually,
and as part of the whole, to the overall
protec-tion of the asset The principles behind layered
protection consist of deterrence, detection, delay,
and defense/response Each piece of the layered protection concept can work on its own However, the most complete protection is afforded through combining all of the layers
an individual or group from even attempting
to attack the asset This can be accomplished through a number of means such as signage, fencing, lighting, cameras, or people Signage
at the perimeter of the enterprise property would warn trespassers of the property line and the penalty for proceeding further Further enhancements to the signage could include the addition of fencing, lights, and cameras In a personal protection role, the deterrence would appear to be provided by the ring of protection offi cers, or specialists around a high-profi le individual In some rare circumstances, the illu-sion of additional layers of protection can be a better and more cost-effective deterrent
preferably at the earliest possible opportunity Alarm sensors, cameras, and even protection offi cers, are all means of detecting and identi-fying threats to the enterprise A threat identi-
fi ed earlier in the asset protection process gives the remaining layers of protection more time to contribute to the overall protection of the asset
layers of defense a chance to work together Suffi cient layers of delay must be incorporated
so that the detection and defense/response pieces of the asset protection continuum can perform their roles Delay can be accomplished through an expansive perimeter that takes
a while for the attacker to cross, fences that take time to climb, strong doors that must be breached, and interior levels of protection such
as additional doors into rooms or a safe that takes even more time to enter
A suffi ciently delayed attacker allows for a defense to be mounted from within the site to repel the attacker, or for a suffi cient response to
be put together and proceed to the site However, the layers of protection must delay the attacker
Trang 331 CONCEPTS AND THEORIES OF ASSET PROTECTION
6
long enough so as to be able to stop him on the
way to the asset, or on his way out with the asset,
but before he leaves the property with the asset
PHYSICAL SECURITY
Physical security planning was originally
based upon response to a military threat A
tra-ditional reference for physical security is FM
19-30 Physical Security , published by the U.S
Army, while a modern reference is the Facilities
Physical Security Measures Guideline published
by ASIS International
The process used to plan physical security
measures is as follows:
1 Identify assets These generally include
personnel , property , information, and image
2 Loss events are exposed Risks are identifi ed
This involves research rather than “ seat of the
pants ” reasoning!
3 Probability of the loss events occurring is
calculated
4 Impact of occurrence is assessed for each loss
event This means, the effect the loss event
will have in terms of direct , indirect, and
extra-expense costs
5 Countermeasures are selected There can
be a vast array of interventions; generally
physical security utilizes target hardening
techniques, such as patrols, access control,
lighting, intrusion detection, surveillance,
weapons detection, and so on
6 Countermeasures are implemented
7 Countermeasures are evaluated as to their
effectiveness Traditionally, this step has been
avoided by practitioners in physical security
and crime prevention
Note : See www.securitysolutions.com and
www.securitymagazine.com for products and
applications
Patrols are a key part of a physical security
system They serve as catalysts for the system,
bringing all parts together Patrols have been
traditionally used by military forces to scout out the location and disposition of an opponent They are used today by police and security forces While still endeavoring to locate hostile indi-viduals (felons), modern police patrols are used
to assess community environments In a temporary asset protection scheme, patrols are not only concerned with criminal acts but also with unauthorized activities, safety and fi re pro-tection issues, and the performance of auxiliary services These can include delivering the com-pany mail, checking gauges, conducting light-ing surveys, assessing behavior, enforcing lease agreements, and assisting customers Note that
strategies that public police have adopted are very similar to what security practitioners have been doing for decades
CRIME PREVENTION THROUGH ENVIRONMENTAL DESIGN
Design (CPTED) is a system whereby riality reinforcement is established via barri-ers, access control, and surveillance Its genesis may have been in the construction of castles and forts The contemporary beginnings of it were through the writings of Oscar Newman
Prevention through Environmental Design ) CPTED
theory consists of these various components:
Territoriality: Boundaries and property
lines are marked This can be the placement
of barriers, shrubbery, and the use of different colors of walkways to mark areas
Psychological deterrents to trespass are
erected to establish territoriality
Surveillance: Observing areas makes detection
and deterrence of criminal behavior more likely There are several types of deterrence:
Natural — keeping areas open to
observation, such as by clearing bushes near access points, having windows facing
Trang 34RISK MANAGEMENT AND INSURANCE 7
I FOUNDATIONS
out into a common courtyard, or placing
a picnic area near a basketball court All of
these make for easier observation of the area
to be protected They facilitate detection of
criminal or unauthorized activity
Electronic — technological aids are used,
such as closed circuit television (CCTV)
and volumetric intrusion detection systems,
such as passive infrared (PIR) sensors
Organized — patrols by security personnel,
police, or citizen crime watches
Access control: Maintaining boundaries
by restricting access to an area Access is
controlled via the use of locks, biometric
systems, access cards, and other methods
Access control is a physical deterrent to trespass
Positive activity support: In a signifi cant
departure from physical security, CPTED
uses activities that divert people in the
environment from involvement in crime
This may take the form of recreation,
entertainment, or volunteer efforts that help
society (volunteer fi re companies for youth)
Maintenance: The repair of “ broken
windows ” An environment that is not
kept up properly may degenerate further
People see broken windows and believe it is
acceptable to break other windows
A “ snowballing ” or “ rolling ball ” effect
occurs Prompt repair and cleaning of damage
or graffi ti are essential parts of CPTED
SAFETY
Safety ushers in the more contemporary
emphasis on asset protection and incorporates
the WAECUP Theory of Loss Control developed
by Bottom and Kostanoski in Security and Loss
Control (fi rst published by Macmillan in 1983)
W — Waste of time, resources, man-hours,
space;
A — Accident that causes injury, downtime,
increased workers’ compensation costs, and
so on;
E — Error in planning or execution, which
results in lost funds;
C — Crime that causes loss and/or injury;
UP — Unethical/unprofessional practices,
such as misrepresentation, discrimination, confl ict of interest, and so on
Accidents cost extensive amounts of direct loss
(cost of replacement and repair) as well as
indi-rect loss (downtime, investigative costs, lowered
(advertising, rental of new rooms or equipment) Note that there are also extensive administrative
Safety and Health Administration) and state agencies (CALOSHA and Pennsylvania Department of Labor and Industry) with which organizations must comply Safety is a major concern to organizations for all of these reasons Many persons in charge of security are also in charge of safety A Director of Safety and Security has become a common title in health care, on col-lege campuses, and in hotel environments
RISK MANAGEMENT AND
INSURANCE
“ Risk management ” is a term closely ated with the insurance industry It is similar con-ceptually to the physical security planning process
associ-in its implementation, but it deals with risks other than “ security ” threats caused by humans It is
not limited to “ target hardening ” ( risk reduction )
approaches, such as the use of locks, barriers, intrusion alarms, and so on Strategies for manag-ing risk include the following:
Risk avoidance — such as completely avoiding
the risk of an earthquake by avoiding geographic areas where there are active fault lines, staying out of countries that are known
to kidnap people for ransom, or not making dangerous products, such as explosives
Risk transfer — means transferring
the fi nancial impact of loss to another
Trang 351 CONCEPTS AND THEORIES OF ASSET PROTECTION
8
organization or entity Insurance coverage is
the usual means of risk transfer The insurance
company takes on the cost of repairing or
replacing the asset at risk instead of the
enterprise Of course, this comes at some
cost and some delay in repairing or replacing
an asset as the insurance company must
investigate and process the claim Outsourcing
hazardous operations to other organizations is
another example of risk transfer
Risk assumption, risk retention, or risk
acceptance — refers to accepting the risk, as it
has a very low probability of occurring; the
risk is extremely diffi cult to protect against;
or the cost of changing the risk to the assets is
so great or so low that any effort to change it
would either be too expensive or the losses so
low as to be inconsequential For instance, it is
extremely unlikely that an asteroid will strike;
it is also impractical to defend against it It
would likewise be impractical to purchase
insurance for a machine that has exceeded its
useful shelf life and has no intrinsic value
Risk spreading — implies using redundant
systems of communication, power, or
information storage The separation of
assets across some distance so that no one vulnerability can affect the entire enterprise
is another example
Risk reduction or risk mitigation — means
reducing the probability of a loss-causing event through the adoption of preventive measures That is, taking methodical, appropriate steps to lessen the risk to the organization or the frequency, probability, and impact of such risks and losses Physical security and crime deterrence would be considered risk reduction So, too, would the use of safety equipment
As you can see, risks can be reduced in a ber of ways, but they are never truly eliminated Insurance can be thought of as the “ last line
provides the policyholder with fi nancial pensation from the insurance company after a loss has occurred According to Purpura (1991) , loss prevention originated within the insurance industry Note that while the term “ loss preven-tion ” is utilized primarily within the retail sec-tor, it is gradually being replaced with the more representative term “ asset protection ”
Pick some assets, such as vital information,
that an organization needs to operate:
peo-ple, works, art, and so on Place these assets in
the boxes to the left Next, place the primary
threats that may face those assets such as fi re,
Trang 36RISK MANAGEMENT AND INSURANCE 9
I FOUNDATIONS
Insurance policies provided by an insurance
company are driven by the probability of loss
events occurring based on actuarial tables The
premiums and deductibles are adjusted
accord-ing to the loss event probability; so, too, is the
availability of insurance if insurance carriers
deem a risk to be too high and refuse to write
a policy In these cases, organizations must
self-insure or join an insurance pool of other
organi-zations that pool their funds in a liquid account
that is set aside in the event of a loss There are
also government insurance programs for crime
and fl oods on the federal level, and workers’
compensation on the state level
evolved, such as the following:
Business Interruption — for losses incurred
after a disaster, accident, or fi re while a
business is not operating Business interruption
insurance helps to control indirect losses
stemming from lost productivity
Kidnap and Ransom (K & R) — for fi rms that
have had executives abducted by criminals
or terrorists This coverage became popular
in the early 1980s in response to left-wing
terrorist kidnappings in Latin America The
fi lm Proof of Life with Russell Crowe portrays
K & R coverage
Worker ’ s Compensation — required by state
laws to compensate workers injured on the
job from the results of work-related accidents
and occupational diseases ( Purpura, 1991,
p 265 ) Rates paid for premiums by employers
are based on job hazard, and in part on an
employer’s record of accidents
Liability insurance — to cover legal costs
and compensatory damage awards (punitive
damages are not generally covered)
Attorney’s fees and associated costs can become quite high during civil litigation regardless of whether the case is settled or goes before a court
Fire insurance — one of the fi rst types of
insurance developed; some policies mandate that the insured conduct periodic patrols
of various areas on the property — the use
of watch tour systems had developed as a result of this
Burglary insurance — for losses associated
with unlawful intrusion Burglary insurance policies generally require evidence of forced entry
Robbery insurance — coverage for forcible
thefts committed in the presence of another
Theft insurance — policies cover losses from
theft; may include burglary and robbery losses
Bonds — fi delity bonds require investigation
of the covered employee by the bonding company (the insurer); these bonds indemnify the holder against dishonest acts committed
by the employee The holder of the bonds is exempt from fi nancial responsibility for the dishonest acts of the employee
Employment Practices Liability (EPL) —
insures against legal costs due to unlawful employment practices such as sexual harassment, discrimination, and so on Contemporary liability exposure for ongoing illegal employment practices is substantial, with awards and settlements running into the multimillions
E M E R G I N G T R E N D S
An emerging new paradigm of asset
protec-tion is the consideraprotec-tion that must be made for
an attacker who will enter a protected area with
the goal of destroying an asset in place The
homicide/suicide bomber is an especially bling trend and is diffi cult to provide suffi cient levels of protection against The amount of time to detect, delay, and defend is essentially reduced by
Trang 37trou-1 CONCEPTS AND THEORIES OF ASSET PROTECTION
10
SUMMARY
Being involved in the practice of asset
pro-tection is the fi rst step toward advancement in
your fi eld and acceptance in your enterprise
The protection offi cer must be ready to
References
General Security Risk Assessment Guideline (2003)
Alexandria, VA: ASIS International
Biery , K D , Jr , & Schaub , J L ( 1994 ) The ultimate security
survey Boston, MA : Butterworth-Heinemann
Broder , J F ( 1984 ) Risk analysis and the security survey
Boston, MA : Butterworth-Heinemann
Calder , J D ( 1985 ) Industrial guards in the nineteenth and
twentieth centuries: The mean years Journal of Security
Administration , 8 ( 2 )
Coleman , J W ( 1969 ) The Molly Maguire riots: Industrial
con-fl ict in the Pennsylvania coal region New York, NY : Arno &
The New York Times
Constable , G (Ed.) ( 1990 ) The old west New York, NY : Time-Life Books
Cote , A , & Bugbee , P ( 1988 ) Principles of fi re
pro-tection Quincy, MA : National Fire Protection Association
Fennelly , L J ( 1989 ) Handbook of loss prevention and crime
prevention ( 2nd ed ) Boston, MA : Butterworths
Fennelly , L J ( 1996 ) Handbook of loss prevention and crime
prevention ( 3rd ed ) Boston, MA : Butterworth-Heinemann
Fiems , R , & Hertig , C ( 2001 ) Protection offi cer guidebook
Naples, FL : International Foundation for Protection Offi cers
half as the attacker does not have to add in time
to fl ee Depending on the asset to be protected
and the preexisting environment in which the
protection offi cer must operate, strengthening the
ability to detect and delay the adversary must be
given especially careful consideration This may
include the addition of intelligence assets that can
overtly or covertly uncover the adversary’s plans
Cooperative information sharing with other
enti-ties such as law enforcement or in some areas, the
military, may be the best option for strengthening
the detection aspect of asset protection
Like the homicide/suicide bomber, improvised
explosive devices (IEDs) are also an especially
trou-bling trend Not limited to areas of confl ict,
domes-tic extremist organizations have used these devices
to intimidate, maim, and destroy Special attention
and alternative plans must be carefully developed
for organizations that conduct work that may
attract the attention of such groups, including
spe-cialized protection plans for executives In areas of
confl ict where the threat of IEDs is real, options for
reducing the risk include, but are not limited to,
traveling covertly, using decoy vehicles, or using
telephones, videos, and Internet conferencing
Specialization in the industry is the ation of a long-standing trend that is gaining greater acceptance outside of the business Both large and small security businesses are fi nding specialties in which to focus and thrive Some security offi cer companies are established as, or are establishing, separate divisions devoted to retail security in malls and protection of chemical plants or nuclear power stations Electronic secu- rity companies may fi nd specialization in surveil- lance systems for casinos or integrating various security, fi re alarm, and building control sys- tems into a cohesive platform using the client’s computer network
Professionalism is also the continuation of a long-standing trend that is fi nding favor by the companies and clients that security profession- als work for and with College degrees at the Bachelor’s and Master’s levels are an almost uni- versal requirement for security managers at all levels, and for some security offi cers in special- ized sectors Certifi cation by industry organiza- tions such as the International Foundation for Protection Offi cers and ASIS International is also becoming a requisite for some companies
Trang 38I FOUNDATIONS
SECURITY QUIZ
Fossum , J ( 1982 ) Labor relations: Development, structure,
pro-cess Dallas, TX : Business Publications, Inc
Garcia , M L ( 2001 ) The design and evaluation of physical
pro-tection systems Boston, MA : Butterworth-Heinemann
Girard , C M ( 1989 ) Planning, management and
evalua-tion, Chapter 31 In L J Fennelly (Ed.) , Handbook of loss
prevention and crime prevention ( 2nd ed ) Boston, MA :
Butterworths
Gilbride , B P ( 1999 ) Sexual harassment In S J Davies &
R R Minion (Eds.) , Security supervision: Theory and
practice of asset protection Woburn, MA :
Butterworth-Heinemann
Green, G., revised by Fischer, R J (1987) Introduction to
security (4th ed.) Boston, MA: Butterworths
Hertig , C A ( 2002 ) Investigative concepts Unpublished
paper York College of Pennsylvania
Hertig , C A , Fennelly , L J , & Tyska , L A ( 1998 ) Civil
liability for security personnel Naples, FL : International
Foundation for Protection Offi cers
Johnson , T ( 2002 ) Retail loss prevention management models
Unpublished paper York College of Pennsylvania Kuykendall , J ( 1986 ) The municipal police detective: An
historical analysis Criminology , 24 ( 1 ) Mackay , J ( 1996 ) Allan Pinkerton: The fi rst private eye New York, NY : John Wiley & Sons
Matthews , L J ( 1990 ) Pioneers and trailblazers: Adventures of
the old west New York, NY : Derrydale
Nalla , M , & Newman , G ( 1990 ) A primer in private security
Albany, NY : Harrow & Heston National Advisory Committee on Criminal Justice
Standards and Goals (1976) Report of the task force on
private security Washington, DC
Peak , K J ( 1997 ) Policing in America: Methods, issues,
chal-lenges Upper Saddle River, NJ : Prentice-Hall
Purpura , P P ( 1991 ) Security and loss prevention: An
intro-duction Stoneham, MA : Butterworth-Heinemann
Sennewald, C A (1985) Effective security management (2nd
ed.) Boston, MA: Butterworths
S E C U R I T Y QU I Z
1 The ASIS International General Security Risk
Assessment Guideline defi nes an asset as
“ Any real or personal property, tangible or
intangible, that a company or individual owns,
that can be given or assigned a monetary value
3 Physical security planning was originally
based upon response to a military threat
a True
b False
4 Risk Management is a term closely associated
with the insurance industry
a True
b False
5 A vulnerability assessment will include a
thorough examination of the following:
a Facility and personnel
b Contents and material
c Suppliers and contractors
d All the above
6 Deterrence is the practice of discouraging an
individual or group from even attempting to attack the asset
8 There is a theory of loss control developed by
Bottom and Kostanoski in security and loss control It is known as:
a WASTE
b WASTMGMT
c WAECUP
d WHATSUP
9 The most intangible valuation of an asset
would be in what is referred to as:
a Liquid asset
b Respectful damage
c Punitive damage
d Reputational damage
10 Intangible property include things such
as goodwill, proprietary information, and related property
a True
b False
Trang 39This page intentionally left blank
Trang 40and he was right — to a degree History is a
per-spective In many cases, that perper-spective gets
distorted, or lost, over time
Studying history is important as it gives us perspective on where things were, where they are now, and where they may be in the future Historical analysis can provide insight into how certain issues were dealt with This may give guidance in contemporary or future problem solving
Finally , history provides a laboratory for the testing of theory Solutions that were developed
in response to certain problems had positive
or negative effects in addressing those lems An example is the Prohibition Era in the United States, beginning in 1919 Alcoholic bev-erage manufacture or distribution was against the law As a result, huge criminal enterprises sprang up in response to consumer demand A black market economy was formed with gang-sters seeking to profi t Some people feel that the
● Explore the growth of the security
industry through wartime and policing
units
and public police
developed
and marketing trends are related to asset
protection
class struggles, and labor relations
have all contributed to the protection
● Offer suggestions for pursuing
contemporary careers in asset protection
The Evolution of Asset Protection
and Security
Christopher A Hertig and John Christman
2