Security Principles and Practices
History of Security: First codification of law occurred around
1800 BC with Hammurabi's code
Crime Prevention Officer (CPO)
A public servant with police powers
Activities requiring a human being (security officer)
Ability to discriminate among factors Ability to converse and make decisions Ability to use physical force Ability to use judgement in varying circumstances
What is a security post?
Any location or combination of activities for which a trained human being is necessary
Definition of Loss Prevention
Any method used to increase the likelihood of preventing and controlling loss
Report: Report forms that force positive statements
Are more useful than those that require a narrative of an event.
Security Officer: General Security Instruction should be provided
As soon as the officer reports for duty.
Asset Protection Program: The manager or executive in charge of the protection program should:
Asset Protection Program: * Apply modern management methods * Be familiar with protection problems and techniques * Implement the systems approach *Be a talented manager with broad-based skills
Asset Protection Program: A good loss report accomplishes the following tasks:
Asset Protection Program: * Provides a quick notifications of an actual or suspected dishonesty loss * Generates trend data * Provides actual and reliable loss estimates * Helps establish accountability for losses * Provides information for the assessment of account re-evaluation or budget * Acts as an executive management control device to compel management to assume responsibility for losses and reporting * Provides a basis for insurance claims or coverage adjustment.
Asset Protection Program: Combining asset protection functions within the company, like risk management, fire protection, and security accomplishes:
Asset Protection Program: * Use of the "systems" approach * More efficient use of personnel * Enhanced opportunities to hire highly qualified asset protection personnel.
Asset Protection Program: The protection program manager must:
Asset Protection Program: * Ensure protection operations are conducted in the least expensive way * Maintain the lowest cost consistent with required operational results * Ensure the amount of money spent generates the highest returns
Asset Protection Program: Benefits of a reporting loss system:
Asset Protection Program: * Identifies targeted items * Indicates periods of loss * Indicates effectiveness of countermeasures * Plots loss trends * Facilitates recovery
Asset Protection Program: Predictive Modeling: A loss reporting system should track the following:
Asset Protection Program: * Most vulnerable assets * Day/Hour of theft * Locations of losses * Countermeasures that were effective or ineffective * Value and frequency of the loss ratios
Asset Protection Program: Methods in which protection programs can generate revenue
Asset Protection Program: * Proof of loss in insurance claims * Recovery of property * Establishment of claims against others * Other recovery efforts, such as recovering revenue from bad checks.
Asset Protection Program: For an asset protection program to work, top management should:
Asset Protection Program: * Show interest * Support the program * Ensure all personnel are cooperating with the program
Asset Protection Program: The modern protection professional must be (II):
Asset Protection Program: (II) Must be able to relate security directly to the basic strategic and business objectives of the organization.
Asset Protection Program: Security officers are only:
Asset Protection Program: 1 element in a complete protection program.
Asset Protection Program: The modern protection professional must be:
Asset Protection Program: Able and comfortable to use current technology.
Asset Protection Program: Cost-effectiveness is the primary factor to executive management:
Asset Protection Program: In determining the size of the protection program.
Asset Protection Program: The protection of assets is an important:
Asset Protection Program: Management function
Asset Protection Program: An assets protection program must be:
Asset Protection Program: assessed economically, as well as, functionally.
Asset Protection Program: Reporting level of the protection program should be:
Asset Protection Program: high enough to prevent premature or improper termination of security activities that may be viewed as a threat by some middle manger.
Asset Protection Program: The primary objective is implementing a protection program within an organization:
Asset Protection Program: should be to motivate every employee to become part of the protection team.
Security Officers: Security Officer's functions
Control of Entrances and movement of pedestrian and vehicle traffic Patrol of building and Perimeters (Foot and Vehicle Patrols) Escort Materials and Personnel Inspections of security and fire exposures Special assignements
Crime Analysis: Four steps of crime analysis procedures are :
Crime Analysis: Data collection Analysis Dissemination-Accurate, timely and useful information to line personnel. Feedback
Crime Analysis: Data Collection - Crime Statistics
Crime Analysis: Must be gathered as a first step in the design of a prevention program. Provided ongoing perspective of program accomplishments during specified period Are key indicators to judge the overall success of the program.
Crime Analysis: Crime Data is used to:
Crime Analysis: Determine specific crimes have decreased Determine if the value of stolen items has decreased Increase in thwarted crimes Increase in return of stolen property
Crime Analysis: The definition of Crime Analysis
Crime Analysis: A systematic approach to studying crime problems.
Crime Analysis: The usefulness of crime analysis products is a basic measure of success on if:
Crime Analysis: The accuracy is important to its credibility.
Crime Prevention: Private sector reservations about public adjudication for economic crimes include:
Crime Prevention: Administrative delays in prosecutions Prosecutorial policy objectives Differing "Output goals" of business and Criminal Justice Policies on governmental release of information and rules of discovery Unsympathetic attitude of the courts to business losses
Crime Prevention: Economic Crimes are defined
Crime Prevention: As the illicit behavior having as its object the unjust enrichment of the perpetrator at the expense of the economic system as a whole.
Crime Prevention: What are the four "D's" of crime prevention?
Crime Prevention: Deter criminal attack Detect attacks that occur Delay attack to allow time for response by authorities Deny access to selected targets
Crime Prevention: What are indirect costs of economic crimes?
Crime Prevention: Effects on business Effects on government Effects on the public
Crime Prevention: What is the largest indirect cost of economic crime for the past 20 years?
Crime Prevention: Liability
Crime Prevention: Obstacles to the development of an ongoing reporting system:
Crime Prevention: No accepted definition of economic crime No data base to build on Businesses lack collection and reporting methods The reluctance to release loss information
Crime Prevention: How are economic crimes usually resolved?
Crime Prevention: Privately
Crime Prevention: The two major components of economic crime
Crime Prevention: are white collar and ordinary crime
Crime Prevention: Crime losses far exceeds the losses to business
Crime Prevention: caused by fire and industrial accidents
Why are fixed security post environments are often inadequate?
Design or structure obstructs observation or hearing Poor air circulation causes temperature problems Elevated temperatures that can cause a loss of vigilance and drowsiness Inactivity and isolation of a post that can cause drowsiness
Post Orders should be developed with the following criteria:
Each order deals with only one subject Each order is brief Each order is easy to understand Each order is indexed for quick reference
Factors that determine the number of security officers required to work
Facility physical complexity Number of employees Character of the work of the organization Number of entrances, and hours they are open Number of patrols required to protect the facility Number of escorts and special assignments to be performed
Additional Services beyond protection
Fire Protection Safety Risk and Insurance Management Internal Audit
Education services provided by security
General Security/ Supervisory Training/Employee Self Protection/Security awareness
Security Officers: Essential attributes for security officers
Good Character (Honest, discipline, alert, loyal) Proper Attitude and ability to handle people Neat Appearance Circumspect deportment Knowledge of the job Adequate training and ongoing education
Decision factors for arming officers
Greater danger to life safety without weapons Officer may be reasonably expected to use fatal force
History of Security: Modern Policing
Has its roots in England where Sir Robert Peel, in 1829, marked the beginning of a police role in crime prevention.
Internal Theft: Internal losses occur by several methods:
Internal Theft: Pilferage- Stealing in small quantities over a long period Embezzlement - Taking money/property entrusted in your care. Shrinkage - Loss of inventory through any means.
Internal Theft: Physical countermeasures to employee theft
Internal Theft: Access Control ID Systems Lock and key Alarms CCTV Safes and Vaults
Internal Theft: Management countermeasures to employee theft.
Internal Theft: Access Control designed to eliminate opportunity Effective pre-employment screening Internal Controls/Separations of responsibilities Accounting and auditing Management support Policy and procedures Thorough Investigations Confrontations with employees suspects Prosecution
Internal Theft: Danger Signs for employee Theft
Internal Theft: Counter productive behavior Conspicuous consumer who is visibly extravagant Those showing a pattern of financial irresponsibility Financially squeezed employees
Internal Theft: What is the cornerstone of attempts to eliminate internal problems?
Internal Theft: Effective Pre-Employment Screening
Internal Theft: Shrinkage attributed to employee theft
Internal Theft: Is very difficult to obtain accurate statistics.
Internal Theft: The Theft Triangle consist of what three elements?
Internal Theft: Motivation (Need) Opportunity Rationalization or desire
Internal Theft: Why do employees steal?
Internal Theft: Personal Problems Environmental Influences Rationalization
Internal Theft: Internal Theft
Internal Theft: The greatest ongoing threat to business
Internal Theft: What is the most important deterrent to internal theft?
Internal Theft: fear of discovery
Internal Theft: The most frequently involved person regarding internal theft
Internal Theft: is a dissatisfied employee
Internal Theft: The most frequently investigated crime by private security
Internal Theft: is internal theft
Security Training: Competency of training instructors can be judge by two things:
Knowledge of the subject Ability to communicate knowledge
Security Training: Instructor Training includes
Learning Theory Instructional Strategies and Methods Learning Aids Lesson Plan Writing Development of practice exercises
Security Officer: General Training Topics
Legal aspects of the job Operational duties Firearms Administrative responsibilities Electronic Countermeasures Use of Force
Liaison: Law enforcement executives oppose police moonlighting:
Liaison: * Contract agencies feel it is unfair competition * Conflict of interest situations. * Liability issues * 87% of departments permit moonlighting * 150,000 law enforcement officers regularly engaged in off duty private security jobs. * Preparedness for duty problems with officers working long hours off duty
Liaison: What are the four main factors for the increase growth of private security and the limited growth of public law enforcement?
Liaison: * Increasing workplace crime * Increasing fear of crime * Decrease in government spending * Increasing awareness and use of private security products and services as cost-effective protective measures.
Liaison: Contract security managers, police, and propriety security managers rated private security firms "Poor" in:
Liaison: * Quality of personnel * Pre-employment background checks *Training *Supervision *Familiarity with legal powers.
Liaison: Private security relies upon both _______________ and ______________ for intelligence gathering and crisis management planning.
Liaison: Commercial security service Government Agencies
Liaison: How do you improve public and private sector relations?
Liaison: * Closer cooperation * Management Meetings * Understand respective roles * Information Exchanges * Improving communication
Liaison: Both public and private police suggested improving private security quality with:
Liaison: * Improved training * Mandated training * Improved personnel selections methods * High wages * Establishing and improving licensing regulations
Liaison: The increasing growth of private security and the limited growth of public law enforcement are due to four main factors:
Liaison: * Increasing workplace crime * Increasing fear of crime * Decrease in government spending * Increasing awareness and use of private security products and services as cost-effective protective measure.
Liaison: Private security occasionally assists law enforcement investigations by providing:
Liaison: * Investigators * Undercover Operative * Photographic, CCTV, or surveillance equipment * Money for rewards, buy, overtime * Information (Most frequently exchanged item)
Liaison: Law enforcement gave private security ya fair-to-poor rating in most areas, with the highest rating in...
Liaison: * Reporting criminal incidents * Responding to alarms * Reasonable use of force * Proper use of weapons
Liaison: Law enforcement administrators are interested in transferring responsibility to the private sector for:
Liaison: * Response to burglar alarm * Completing incidents reports when victim declines prosecution or flies for insurance.
Liaison: The major research questions addressed by Hallcrest studies were:
Liaison: * Roles, functions, and contributions of private security and public law enforcement to crime prevention and control. * The mutual expectations/perceptions of private security and law enforcement. * Communication/cooperation between private security and law enforcement * Competition and conflict between private security and law enforcment. * Characteristics and standards of the labor and technological resources of both. * Identification of emerging issues
Liaison: What are the common methods to hire off-duty police officers?
Liaison: *Direct hire * Department contracts with firms * Through unions or associations
Liaison: As a general rule, local law enforcement has very little effect on many crime except for:
Liaison: Burglaries Robberies Arson
Liaison: What percentage of law enforcement at field study sites were satisfied with the way security personnel handled incidents in which they were involved?
Liaison: 20%
Liaison: What is the percentage of detectives were satisfied with their private security interaction.
Liaison: 50%
Liaison: Definition of Liaison:
Liaison: A linking or connecting of the parts of a whole in order to bring about proper coordination of activities.
Liaison: Law enforcement officers regarded themselves as professional, but they view private security
Liaison: As non-professinals
Liaison: Hallcrest II
Liaison: In 1990, selected to update Hallcrest I profile growth and changes, identify emerging issues and present recommendations.
Liaison: Hallcrest 1
Liaison: Selected in 1980 to conduct three year study of roles, responsibilities and resources of private security and assess the relationship between law enforcement and private security.
Liaison: Both law enforcement and private security managers felt that private security was relatively effective in reducing the dollar loss of crime,:
Liaison: and relatively ineffective in apprehending criminals.
Liaison: Propriety managers rated their own operations as "good":
Liaison: but gave contract security personnel lower ratings in most performance categories.
Liaison: A significant minority of law enforcement had:
Liaison: infrequent contact with private security.
Liaison: Public entities appear to receive better training than:
Liaison: private entities.
Liaison: Private security and public law enforcement as their primary mission:
Liaison: the prevention of crime and protection of persons and property.
Liaison: Private security frequently avoids or bypasses police with regard:
Liaison: to white collar or economic crime.
Liaison: Private security managers felt that police cooperated with their investigations and were satisfied:
Liaison: with the speed of police response and the degree to which police supported the decisions they had made.
Loss Prevention: Key questions a Loss Prevention Manager must ask:
Loss Prevention: Do we have upper management support? Do we have an adequate budget? Are the appropriate levels of authority in place?
Loss Prevention: Role of a Loss Prevention Manager - reflects needs/objectives of upper management needs to:
Loss Prevention: Establish priorities Develop written policies Form integrated management teams
Loss Prevention: First order of Loss Prevention
Loss Prevention: Loss Prevention: Develop policies and procedures (cornerstone of any loss prevention program). Protect against internal and external theft Develop access control procedures Establish lock and key control procedures Design, supervise, and review installation of anti-intrusion and detection Establish a workplace violence program. Provide control over movement
Loss Prevention: Five tools that form the foundation of a loss prevention program:
Loss Prevention: Risk Analysis Planning Evaluation Research Standards
Loss Prevention: What acceptable are some ways to remedy untimely accidents?
Loss Prevention: Constant inspections Job safety analysis (JSA's) Early discovery of unsafe conditions (JSA's) Identifications and control hazards Investigation of all accidents and near misses ASAP
Loss Prevention: HAZMAT Program
Loss Prevention: Identify hazards that are present Know how to respond to an incident Set up necessary safeguards Employee training
Loss Prevention: Risk Analysis
Loss Prevention: Loss Prevention Survey- Physical examination of the location. Identifying Vulnerabilities - Isolating the vulnerabilities Determining probability/frequency/ costs for internal and external risks
Loss Prevention: Evaluation - Must be ongoing and continuous
Loss Prevention: Pre-test and Post-test design Experimental/Control Group Design
Loss Prevention: Research - Four basic steps
Loss Prevention: Statement of the problem Hypothesis Testing Conclusion
Loss Prevention: Planning -design for reaching objectives- must fulfill organizational goals - responding to:
Loss Prevention: What is the cost? Is it practical? Is it cost effective? Will management support strategy?
Loss Prevention: Unsafe conditions cause ____%
Loss Prevention: 15%
Loss Prevention: Unsafe Act causes _____% of all accidents.
Loss Prevention: 85%
Loss Prevention:Definition of Incident
Loss Prevention: Any unwanted or undesired event which degrades the efficiency of the business operation.
Loss Prevention: Definition of Accident
Loss Prevention: Is an undesired event resulting in physical harm to a person or damage property.
Loss Prevention: Standards
Loss Prevention: Promotes uniformity; e.g. UL, NFPA, OSHA, API, ASTM. Pupura is a proponent of standards to enable private security and the courts to foster uniformity.
Two problems in police and security relationships which have the greatest intensity of feelings are:
Moonlighting by police officers in private security Police response to activated alarms which are largely false
Frequent cited measures for improving private security are:
More or better training Mandated training Improved Selection process Higher Wages Establishment or improvement of licensing and regulations.
Post Orders
Most important written instruction for the security force
Report:Security Logs are admissible in legal proceedings as "entries made in the regular course of business," and are not consider "hearsay."
Must be regularly maintained Must be maintained as part of regular duties Must record an event of which the author had personal knowledge or was reported to the author by an individual with personal knowledge and a duty to report the event.
Security Officers are the largest cost elements in most protection programs. To control cost you should do the following:
Officers are deployed only were required and most effective Deployment is efficiently scheduled and effectively controlled Qualifications for duties and posts are a major consideration Deployment is guided by rational and objective business criterion Scheduling and assignment are accomplished in a cost effective manner
Security Officers: Qualifications are based
On the job descriptions for the security positions to be filled
Security Training: Training must be
Ongoing and Continuous
Supervisors and managers when evaluating the post should check for the following:
Personal Appearance and condition of the officer Physical condition of the post Availability and condition of the equipment and documentation Officer response to training questions Officer response to actual situation on the post
Loss Prevention Officer (LPO)
Private sector individual deriving authority from an employer
In general, security officers should not be armed because:
Private security is not considered equivalent to law enforcement Typical facilities do not experience violent crimes Increased risk of death/injury, liability, and negative publicity
Armed officers generate the responsibility for:
Proper training of the officers to be armed Selection of appropriate type/size of firearms and ammunition Proper maintenance of firearms by a qualified gunsmith Maintenance records of these actions Adequate liability insurance
The Security Role in the Organization
Protective Services/Prevention (Special Services Executive Protection/home security surveys/investigative services/emergency services)
Report: How do you avoid low morale issue, with report writing?
Read reports and logs in a timely manner Acknowledge items of significance Take corrective action where appropriate
Security Officer Training: Basic Required Knowledge
Regulations of the security officer force Requirements of the particular assignment Rules of the enterprise Fire and Safety regulations Layout of facilities and offices Facility security procedures Fire Fighting procedures Location of vulnerable points and important items like emergency exits, key personnel, alarm panels, facility controls, etc.
Risk Mgmnt: What should be factored when assessing vulnerability and the response to risks?
Risk Mgmnt: 2 (PML) Factors must be considered: Possible Maximum Loss- Maximum loss if a target is destroyed or removed. Probable Maximum Loss - Loss a target is likely to sustain.
Risk Mgmnt: Pure Risk is:
Risk Mgmnt: A risk in which there is no potential of benefits to be derived (i.e. tornado)
Risk Mgmnt: Dynamic Risk is:
Risk Mgmnt: A risk that can produce gain or profit
Risk Mgmnt: Method for handling a risk
Risk Mgmnt: Accept Eliminate Reduce Transfer
Risk Mgmnt: What is one of the first tools to be applied to determine vulnerability?
Risk Mgmnt: Crime and incident analysis
Risk Mgmnt: The possibility and probability of a risk resulting in a loss:
Risk Mgmnt: Depends on the risk itself and the preventative measures taken
Risk Mgmnt: The two types of Fidelity Bonds are:
Risk Mgmnt: Employee is bonded by name or position Blanket bonds cover a category of employees
Risk Mgmnt: Fiduciary Bonds
Risk Mgmnt: Ensures persons appointed by the supervised property will be trustworthy.
Risk Mgmnt: Litigation Bonds
Risk Mgmnt: Ensures specific conduct by defendants and plantiffs
Risk Mgmnt: Two basic types of protection against crime
Risk Mgmnt: Fidelity (dishonesty) and surety bonds Burglary, robbery and theft insurance
Risk Mgmnt: Loss Event Profile (Assts vs. Threat)
Risk Mgmnt: Forecasting individual loss events that may occur is the first step in dealing with risk assessment. It requires clear ideas about the kind of risk, as well as about the condition, circumstances, objects, activities and the relationship that produces them.
Risk Mgmnt: Insurance Rates are dependent upon two variables
Risk Mgmnt: Frequency of claim and Cost of each claim
Risk Mgmnt: Loss Prevention practitioners are more interested:
Risk Mgmnt: In Crime, shrinkage, fire and accidents
Risk Mgmnt: Risk analysis
Risk Mgmnt: Is a management method used to minimize risks through applications of security measures commensurate with the threat.
Risk Mgmnt: The concept of Risk Management is derived
Risk Mgmnt: Is derived from business
Risk Mgmnt: The major resource required for a risk analysis is
Risk Mgmnt: Manpower.
Risk Mgmnt: Loss Event Probability
Risk Mgmnt: Probability can be formulated as the number of ways in which a particular event can result from a large number of experiments which could produce that event. P=f/n P= the probability that a given event will occur f= the number of actual occurrences of that event n= the total number of experiments seeking that event.
Risk Mgmnt: Surety Bonds
Risk Mgmnt: Provide compensation for failure to perform specified acts within a certain period of time, such as a contract bond that guarantees that construction will be completed by a given day.
Risk Mgmnt: The two type of risk are
Risk Mgmnt: Pure Risk and Dynamic Risk
Risk Mgmnt: What are the 5 principle crime risk management methods?
Risk Mgmnt: Risk Avoidance Risk Reduction Risk Spreading Risk Transfer Risk Acceptance
Risk Mgmnt: Fidelity Bonds require:
Risk Mgmnt: That an employee be investigated by the bonding company to limit the risk of dishonesty; if the employee violates the trust, the insurance company indemnifies the employer for the amount of the policy.
Risk Mgmnt: Security Survey
Risk Mgmnt: The cost of protection is measured in: Protection in depth Delay time
Risk Mgmnt: Definition of Insurance
Risk Mgmnt: The transfer of risk from one party to another in which the insurer is obligated to indemnify the insured for an economic loss caused by an unexpected event during a period of time covered by such insurance
Risk Mgmnt: Loss event Criticality
Risk Mgmnt: This is a trade term that is defiend as the impact of a loss as measured in dollars.
Risk Mgmnt: Risk Managers are more interested:
Risk Mgmnt: are generally have more of an interest in fire and safety issues.
Risk Mgmnt: The kind of event that are loss-only oriented and which involve "pure risk" include
Risk Mgmnt: crime, natural disasters, industrial catastrophe, civil disturbances, war or insurrection, terrorism, accidents, conflicts of interest, etc...
Risk Mgmnt: License and permit Bonds
Risk Mgmnt: guarantee the payment of taxes and fees
Risk Mgmnt: What are examples of risk?
Risk is exposure to possible loss, crime, fire, product obsolescence, shrinkage, and work stoppage.
Report: Central Security report document is the
Security Log
Report: Reasons why security officer reports are not provided to management
Security Personnel are not action-oriented, not word oriented Reports don't appear to be acknowledge or acted on Report process doesn't encourage careful fact processing.
History of Security: In 1980 the International Associations of Chiefs of Police adopted a resolution
That all police agencies should consider crime prevention as a standard police function and form specialized crime prevention Units
Definition of Security
The Use of Traditional methods (guards, fences, and alarms) to increase the likelihood of a crime controlled, tranquil environment (proactive and reactive).
Security Officer: Training is based on
The duties to be performed and the capabilities of the officer in training
Both private security and public law have, as their primary mission:
The prevention of crime and protection of persons and property.
Sennewald Statement
Value is better measured by what does not happen than by what does.
Security Training: The employee must know (POP)
What they are to do - Policy Why they are to do it - Objectives How they are to do it - Procedures
Security Training: A trained security officer generally makes
a poor trainer of other security personnel
Security Training: The ideal trainer should have
full responsibility for training
Well-trained and well-supervised security personnel
may be the best possible protection available to a company
Security Training: Training must meet
organizational goals
Security Training: Since documentation is a strong defense to a charge on negligent training
records must be kept of each aspect of every employee's training