Escolar Documentos
Profissional Documentos
Cultura Documentos
PROFESSIONAL
PROTECTION
OFFICER
PRACTICAL SECURITY
STRATEGIES AND EMERGING
TRENDS
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or any information storage and retrieval system, without
permission in writing from the publisher. Details on how to seek permission, further information about the
Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance
Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher
(other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden
our understanding, changes in research methods, professional practices, or medical treatment may become
necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and
using any information, methods, compounds, or experiments described herein. In using such information or
methods they should be mindful of their own safety and the safety of others, including parties for whom they
have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any
liability for any injury and/or damage to persons or property as a matter of products liability, negligence
or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the
material herein.
ISBN: 978-1-85617-746-7
10 11 12 13 14 10 9 8 7 6 5 4 3 2 1
Contents
iii
iv CONTENTS
6. Effective Communications
CHARLES T. THIBODEAU III
Effective Communications Defined 75 PROTECTION OFFICER
Due Diligence Based on Effective FUNCTIONS
Communications 75
Channels of Communications 76
The Six Essentials of Effective 9. Automation in Protection Operations
Communications 76 KEVIN E. PETERSON
Consider the Audience 76
Verifying Communications with Feedback 77 Historical Perspective 107
Myths and Misconceptions in Contemporary Security Environment 108
Communications 77 The Role of the Professional Protection Officer 112
Proper Use of Communications Devices 77 Summary 113
Summary 80 References 114
CONTENTS v
Convergence 179
Continuing Education 180
V
Physical Security Certification 180 SAFETY AND FIRE
References 181
Resources 181
PROTECTION
Introduction 295
VII Causes of Disruptive Behavior 296
Stages of Management of Disruptive
DEVIANCE CRIME AND Behavior 296
VIOLENCE Crisis Development Behavior Modules 297
Protection Officer Guidelines 298
Verbal and Physical Disruptive Behavior 298
22. Workplace Crime and Deviance Empathic Listening 299
NORMAN R. BOTTOM AND Nonverbal Communications 299
WHITNEY D. GUNTER Controlling Disruptive or Violent Behavior 299
Team Intervention 300
Theories of Workplace Crime 255 Positive Factors Resulting from Team
Theft Prevention 258 Approach 300
Response to Theft 262 Leadership in the Team Approach 301
Summary 264 Safety Considerations in Crisis
References 266 Intervention 301
Resources 266 Conclusion 301
Resources 302
23. Substance Abuse
FRANCIS J. ELLIOTT, 26. Strikes, Lockouts, and
GLEN KITTERINGHAM, AND
TERENCE M. GIBBS Labor Relations
DAVID J. DELONG
Impact on Business and Industry 270
Substance Abuse: What is the Motivation? 271 Strikes 305
How Problematic Behavior and Dependence Searches 308
Develop? 272 Employee Misconduct and Dishonesty 309
How is Substance Abuse Perpetuated? 273 Employee Discipline 309
Conditions Adversely Affecting the Types of Discipline 309
Workplace 274 Arbitration 310
How Must Industry Respond? 274 Summary 310
viii CONTENTS
Introduction 331
Types of Potential Emergencies 332
Scope of the Problem 335 IX
Emergency Planning Considerations 336
Vulnerability Analysis 338 INVESTIGATIONS
Developing the Emergency Response Plan 342
Reviewing and Integrating The Emergency
31. Investigation: Concepts and Practices
Response Plan 343
Conclusion 346 for Security Professionals
References 346 CHRISTOPHER A. HERTIG
Resource 347
Investigative Logic 383
History of Investigation 384
29. Terrorism Preliminary Investigation 385
ROBERT METSCHER Follow-up Investigation 385
Intelligence 386
What is Terrorism: A Definition Dilemma 349 Liaison 387
Why Violence? Why They Do What They Do 352 Notes and Reports 388
The Reason for the Action 353 Auditing 389
CONTENTS ix
Interviews 390 Overt Personal Surveillance 422
Investigative or Focused Interviews 391 Covert Electronic Surveillance 422
Informants 393 Overt Electronic Surveillance 423
Undercover Investigations 394 Equipment Requirements 423
Shopping Services 395 Privacy Issues 423
Surveillance 395 Recording and Retention 424
Behavior/Condition Analysis 396
Testifying in Legal and Quasi-Legal Proceedings 397
Managing Investigations 398
35. Report Writing and Field Notes
Conclusion 399 RAV-ZURIDAN YISRAEL
References 401
Resources 401 Introduction 427
Importance of Report Writing 427
Field Notes 428
32. Crime and Incident Scene Reports Should be Written 428
Procedures What Should be Reported 429
DENNIS SHEPP Qualities of Good Reports 429
References 431
What is an Incident? 403
The Scene 404
Hazards to an Incident Scene 404
Determining Boundaries 405 X
Protect and Preserve the Scene 405
Evidence 406
LEGAL ASPECTS OF
Making Detailed and Accurate Notes 408 SECURITY
Working with Law Enforcement and
Investigators 409
Conclusion 410
36. Legal Aspects of Security
References 410 DAVID L. RAY
Introduction 435
33. Interviewing and Statements The Development of Our Laws 436
DENNIS SHEPP Types of Laws—Criminal and Civil 437
Conclusion 446
Introduction 413
What is Interviewing? 413
The Power of Communication 414
The Interview Process 416 XI
Deception 417
Concluding the Interview 418 OFFICER SAFETY AND
Conclusion 418 USE OF FORCE
References 419
Resources 419
37. Use of Force
CHARLES T. THIBODEAU AND
34. Foundations for Surveillance CHRISTOPHER A. HERTIG
MICHAEL STROBERGER
Use of Force 449
General Types 421 Use of Force in General 450
Covert Personal Surveillance 422 Justifying the Use of Force 451
x CONTENTS
The security world is constantly changing, constant attention; as one famous terrorist agency
both in the context in which it has to operate, once remarked, “We only have to succeed once.”
and in terms of what it can offer as a response Being on our guard, benefiting from research
to a wide range of threats. This is true across the findings, and following good practice are cru-
world. Indeed, globalization and the impact of cial. Books like this one are designed to help.
technology are just two trends that have seen The coverage of this book is broad, covering
to that. As a consequence, security has become domains such as communication, protection
more complicated; or, at least, the breadth of officer functions, crime prevention, safety, infor-
knowledge that a good security operative, at any mation security, workplace violence, risk man-
level, needs to draw upon has been stretched. agement, investigations, private security law,
One of the positive signs of the march of and the use of force. The book provides proven
security professionalism is that there is now knowledge to protection officers to enable them
more research being gathered on security- to take on the arduous tasks of asset protection
related issues. Scholars in universities, research and loss prevention.
institutes, companies, and professional bod- This book strives to provide a foundation for
ies have helped to develop a global knowledge improving the skill level and efficiency of pro-
base. The good thing about security is that tection officers. As a basic text for achieving the
knowledge from around the world has rele- Certified Protection Officer certification, this
vance to a broad range of circumstances. After book will be studied over and over by opera-
all, threats are often the same. Terrorist attacks tives across continents. It will also serve as a
take place globally, and the sorts of responses research resource for those looking to develop
needed are often similar, if not the same. The insight into an array of security topics. The edi-
principles of security apply across the board, tors are to be commended for ensuring that this
though the contexts differ, and how the prin- edition builds positively on previous ones.
ciples are applied needs to be adapted to meet
Professor Martin Gill
local needs. This is where skill comes in. Skills
Director
are needed from those who assess risks and
Perpetuity Research & Consultancy
those who manage them, from senior executives
International (PRCI) Ltd
to street-level protection officers.
148 Upper New Walk
It is a sad fact that offenders often move faster
Leicester LE1 7QA, UK
than response agencies. We know that many of
those who commit crime adapt quickly; they share Dr. Ona Ekhomu, CFE, CPP
knowledge and experiences; doing so often gives Chairman
them an edge. Just as people move themselves and School of Management and Security
their assets around the world with ease, offenders 10 Turton St.
have tried to do so as well. Stopping them requires Lafiaji, Lagos, Nigeria
xiii
This page intentionally left blank
Contributors List
Sandi J. Davies began her career in contract a chapter relating to crime prevention in Canada
security in 1980 with a primary focus on person- in the Handbook of Loss Prevention and Crime
nel administration. She became deeply involved Prevention (Butterworth-Heinemann). In 1995,
in training and was instrumental in developing again in a cooperative effort, Ms. Davies and Mr.
security officer training programs for a major Minion had published a book entitled The Security
national security guard company. Her interest Supervisor Training Manual with Butterworth-
in security training grew, and in 1988 she joined Heinemann. In 2008, the third edition of this text,
the newly formed International Foundation for coedited by Chris Hertig, was released entitled
Protection Officers (IFPO) as a program admin- Security Supervision and Management: Theory
istrative assistant. In 1991, she was elected exec- and Practices of Asset Protection, again published
utive director of IFPO and has been a driving by the leader in Security Trade Publications,
force in the Foundation’s program development Butterworth-Heinemann. Sandi was the editor of
and administration. Sandi became a member of Protection Officer News published by IFPO for 13
ASIS International in 1985 and served in execu- years until it went into an electronic format.
tive positions at the chapter level. Chris Hertig, CCP, CPOI, is a member of the
In addition, Sandi was also a member of the Behavioral Sciences Department at York College
Advisory Board for the Northwest Territories of Pennsylvania where he teaches courses in secu-
Security Officer Certification Committee. In 1994, rity planning and supervision, crime prevention
Sandi was the chairperson for the Asset Protection and physical security, legal standards of security
Advisory Board for Mount Royal College in and asset protection, ethical issues in criminal
Calgary, Alberta, Canada. In 1999, Sandi agreed to justice and criminal investigation. In addition to
serve on the Advisory Board of the International his regular teaching assignment, he has taught
Foundation for Cultural Property Protection. Ms. self-defense and martial arts for the education
Davies is also a member of the Technical Advisory department. Prof. Hertig has also given noncredit
Board for the Canadian General Standards Board courses in report writing, crowd management,
on Security Officer Training Standards. Most officer survival, and public relations.
recently, Sandi was chairperson for the Private Prior to York College, Mr. Hertig spent three
Security Services Council of ASIS International. years as a nuclear security training administrator,
Ms. Davies has had numerous articles pub- developing and teaching a wide range of instruc-
lished in security publications, such as Security tional topics for security personnel in accordance
Management and SECURITY magazine, relating with U.S. Nuclear Regulatory Commission
to certification and training of security personnel. requirements. A Certified Protection Officer
In the early 1990s, Ms. Davies, in a cooperative Instructor (CPOI) through the International
effort with the IFPO Founding Director Ronald Foundation for Protection Officers (IFPO),
R. Minion, coedited the Protection Officer Training Prof. Hertig has given presentations to numerous
Manual (Butterworth-Heinemann). That text is professional and civic organizations. He has also
now in its eighth edition. In 1994, she contributed consulted with instructional program providers.
xv
xvi CONTRIBUTORS LIST
Prof. Hertig has published several hundred arti- Prof. Hertig began his career while in col-
cles, reviews, and chapters on various topics. He lege as a student aide to the Campus Security
has been a featured columnist in several security Department. He was a member of the U.S.
industry publications and assisted in establishing Army ROTC and served an internship with
IFPO’s Article Archives, an online collection of the Columbia County Juvenile Probation
research papers for students and practitioners. Department. After graduation, he worked for
Chris served as coeditor of Security Supervision and several security services firms as a security offi-
Management: Theory and Practice of Asset Protection cer, investigator, and supervisor. He also spent
(Butterworth-Heinemann) with Sandi J. Davies, a summer as a member of the Park Police in
the Foundation’s executive director. Mechanicsburg, PA.
Chris has been a longtime member of Prof. Hertig holds a master ’s in arts
ASIS International, serving on the Academic (Criminology) from Indiana University of
Programs Council as well as the Academic– Pennsylvania, a bachelor ’s (Sociology) from
Practitioner Symposium Group. He is a charter Bloomsburg University of Pennsylvania, and an
member and past president of the Pennsylvania associate (Commercial Security) from Harrisburg
Association of Criminal Justice Educators Area Community College. He has also com-
and an active member of the International pleted graduate courses in adult education from
Association of Law Enforcement Educators Penn State University, has been board certified
and Trainers. He was also a member of the in security management by ASIS International,
International Association of Campus Law and holds the designation of Certified Protection
Enforcement Administrators for many years. Professional (CPP).
xix
xx INTRODUCTION
universe is in constant flux, and the only con- aware of the danger of data loss, and numerous
stant is change; little could he have imagined laws govern what must be done if data is com-
the pace of that change in the 21st century. promised. Cyberterrorism not only puts data
Advances in medicine, science, and tech- at risk, it can put essential services and infra-
nology are happening at a dizzying pace, and structure at risk. Guarding against this type of
news travels the globe in the blink of an eye. threat requires continuing education about the
Information of all sorts is available with just a ever-evolving risks, deterrents, prevention, and
few keystrokes, and people can stay in constant laws. Unlike the night watchman, who only
touch via electronic media. Journeys that once worried about physical security with its fences,
took weeks, months, or even years now take gates, and access points, today’s protection
mere hours. It is a small world these days, and officer must also guard against an enemy that
economic problems and social unrest in one moves at the speed of light. The protection offi-
nation can be felt in many others. cer must not only protect the physical premises
Where once the term “security” might have and equipment, but must also guard against an
referred to the lone night watchman whose great- enemy that moves silently to disrupt services,
est adversary was a burglar hoping to pick a lock, incapacitate infrastructure, and steal data.
those days are long gone. The night watchman’s The National Fire Protection Association’s
role was viewed as merely a job that did not gar- (NFPA) “Guide for Premises Security” and
ner much respect in the community. “Standard for the Installation of Electronic
Today’s private security professionals are Premises Security Systems” have both caused
finding their roles greatly expanded in numer- changes that may not make news headlines, but
ous arenas worldwide, due, in part, to a much will certainly impact the industry. The former
greater global threat and a reduction in public will not affect the general public, but fire protec-
law enforcement protection. The current eco- tion, security consultants, facility managers, and
nomic situation has caused an increase in some insurance companies will be forced to deal with
types of crimes. At the same time, those eco- it. ASIS has already begun setting standards
nomic realties have also forced local municipal- that have impacted the industry. The latter more
ities to reduce public law enforcement efforts or less cements the impact of the former.
through layoffs or hiring freezes, even though While the quest for mutual respect and seam-
the need for more protection is growing. less cooperation between public and private
The threat of terrorism was spotlighted for security has improved over the years, it must
the United States and the world on 9/11, and it remain an ongoing goal for both the private and
is still an ever-present threat worldwide. It has public sectors. Mutual respect and cooperation
and will continue to impact the industry, partic- between public law enforcement and private
ularly in the areas of research and risk manage- security is essential to ensuring that security
ment methodologies. needs are met effectively.
In recent years, cyberterrorism, which Increasingly, security functions have been
threatens infrastructure and services by attack- contracted out to private security firms to fill
ing computer networks via the Internet, has the gap between what government can do and
become a very serious threat. It can and has what is needed. Private security firms are even
resulted in the loss of billions of dollars of pro- stepping in to fill the roles that military person-
prietary information, and compromised data at nel once filled on military installations and even
a broad range of institutions, from government war zones. A new type of protection officer is
agencies to banks, credit card companies, and increasingly stepping forward to fill the need,
business firms. Company executives are acutely ready to deal with new situations and challenges
INTRODUCTION xxiii
as they come along, thanks to ongoing educa- ● Successfully complete a midterm
tion and training. examination.
Currently, corporations that once relied on ● Successfully complete a supervised final
that night watchman to patrol a fence as suffi- examination. (A proctor may be located
cient protection are increasingly instituting their within the candidate’s organization or
own in-house security departments. An inte- community.)
gral part of this overall protection process is the
professional security manager and supervisor, (Both examinations are based on the contents
complemented with a security staff capable of of this textbook.)
attending to ongoing protection needs. Generally,
corporations require their security managers
and supervisors to be well educated, trained, G. CERTIFIED PROTECTION
and experienced. Private security firms are also OFFICER (CPO) FINAL
demanding educated, trained professionals. CHALLENGE PROGRAM
The night watchman might have been able
to do his job with limited education, but in This textbook, The Professional Protection Officer:
today’s ever-changing, challenging security Practical Security Strategies and Emerging Trends, is
climate, professionals must be educated and also the text for the CPO Final Challenge Program,
well trained to fulfill their new, evolving, and which is the fast-track method of obtaining
demanding roles. This new breed of security the CPO certification. The Final Challenge
professional is winning respect by proving it option eliminates the course of study and goes
is skilled and very capable of carrying out the directly to the final exam, which is the same one
most sophisticated, demanding roles. They are that is part of the CPO program. Questions on
dedicated professionals with the credentials the final exam come from the material in the
needed to keep themselves, their employers, textbook.
and their employers’ assets from harm. Contact the International Foundation for
Protection Officers (IFPO) for more information
regarding the Certified Protection Officer and/
F. CERTIFIED PROTECTION or other programs.
OFFICER (CPO) PROGRAM
They can be employed as independent con- that teach; but the primary beneficiary is the
sultants, by a security services agency, by the student or working protection officer.
military, by a state government, by the federal The editors of the Professional Protection
government, and by other organizations. The Officer: Practical Security Strategies and
term “protection officer” is not easy to define. Emerging Trends are honored to work with so many
Titles vary, specific tasks vary, locations vary, academicians, researchers, and outstanding security
employers vary, but the one thing that all pro- professionals since the planning of the first edition.
tection officers have in common is that they are These talented and dedicated security profession-
willing to take risks and put into place preven- als have worked tirelessly in supporting, promoting,
tive measures to protect tangible assets, such as and contributing to the International Foundation
buildings, intangible assets, such as data, and for Protection Officers and all of its worthwhile pro-
of course, the public. They assume the risks so grams. “We could not have done it without you!”
that others can go about their business and not A special thanks goes to Alice Grime, Charles
have to worry about potential harm. Thibodeau, and Jamie Ingram for their techni-
This textbook is written as a useful reference cal support and assistance in the production and
for security supervisors, managers, and those development of this textbook.
Protection Officer
Code of Ethics
xxv
xxvi PROTECTION OFFICER CODE OF ETHICS
Conclusion
Strive to Learn
The job of protecting life and property
To become professionally competent, each offi- focuses much attention on the individual secu-
cer must constantly strive to be knowledgeable rity officer. Hence, it is essential to be aware of
about all aspects of his or her chosen career. How the need for professional conduct at all times.
to protect people, assets, and information must By strictly adhering to each section in this code
always be a learning priority for every officer. of ethics, it may be expected that we as indivi-
duals and the industry as a whole will enjoy
a good reputation and gain even more accep-
Develop Rapport
tance from the public as well as private and
It is necessary to be constantly aware of the government corporations. You as the individual
image that our profession projects. All officers officer must be a principal in this process.
U N I T I
FOUNDATIONS
1
Concepts and Theories
of Asset Protection
Jim Ellis and Christopher A. Hertig
3
4 1. CONCEPTS AND THEORIES OF ASSET PROTECTION
I. FOUNDATIONS
ASSET PROTECTION 5
mitigate the risk. All of the mitigation efforts and defense/response. Each piece of the layered
must be designed so as not to “substantially protection concept can work on its own. However,
interfere with the operation of profitability of the the most complete protection is afforded through
enterprise” (ASIS, 2003, p. 6). Mitigation efforts combining all of the layers.
that do substantially impact operations are much Deterrence is the practice of discouraging
less likely to see executive support regardless of an individual or group from even attempting
the level of risk, as they also substantially impact to attack the asset. This can be accomplished
the profitability of the company. through a number of means such as signage,
fencing, lighting, cameras, or people. Signage
at the perimeter of the enterprise property
Cost/Benefit would warn trespassers of the property line
A cost/benefit analysis must also be con- and the penalty for proceeding further. Further
ducted to help assist in evaluating the mitigation enhancements to the signage could include the
measures against the costs incurred. According addition of fencing, lights, and cameras. In a
to the ASIS International General Security Risk personal protection role, the deterrence would
Assessment Guideline, the cost benefit process appear to be provided by the ring of protection
“involves three steps: officers, or specialists around a high-profile
individual. In some rare circumstances, the illu-
● Identification of all direct and indirect
sion of additional layers of protection can be a
consequences of the expenditure.
better and more cost-effective deterrent.
● Assignment of a monetary value to all costs
Detection is the identification of a threat,
and benefits resulting from the expenditure.
preferably at the earliest possible opportunity.
● Discounting expected future costs and
Alarm sensors, cameras, and even protection
revenues accruing from the expenditure to
officers, are all means of detecting and identi-
express those costs and revenues in current
fying threats to the enterprise. A threat identi-
monetary values” (ASIS, p. 4).
fied earlier in the asset protection process gives
If the cost/benefit evaluation determines that the remaining layers of protection more time to
the cost of mitigating the risk is greater than the contribute to the overall protection of the asset.
cost of the asset, then other measures must be Delaying the attacker also gives the other
employed. layers of defense a chance to work together.
Sufficient layers of delay must be incorporated
so that the detection and defense/response
ASSET PROTECTION pieces of the asset protection continuum can
perform their roles. Delay can be accomplished
through an expansive perimeter that takes
Layered Protection
a while for the attacker to cross, fences that
Asset protection through risk mitigation take time to climb, strong doors that must be
typically involves a concept of layered protec- breached, and interior levels of protection such
tion, also known as defense in depth. In this as additional doors into rooms or a safe that
concept, the asset is considered to be in the takes even more time to enter.
center, surrounded by concentric layers of pro- A sufficiently delayed attacker allows for a
tection. Each layer contributes individually, defense to be mounted from within the site to
and as part of the whole, to the overall protec- repel the attacker, or for a sufficient response to
tion of the asset. The principles behind layered be put together and proceed to the site. However,
protection consist of deterrence, detection, delay, the layers of protection must delay the attacker
I. FOUNDATIONS
6 1. CONCEPTS AND THEORIES OF ASSET PROTECTION
long enough so as to be able to stop him on the traditionally used by military forces to scout out
way to the asset, or on his way out with the asset, the location and disposition of an opponent. They
but before he leaves the property with the asset. are used today by police and security forces.
While still endeavoring to locate hostile indi-
viduals (felons), modern police patrols are used
PHYSICAL SECURITY to assess community environments. In a con-
temporary asset protection scheme, patrols are
Physical security planning was originally not only concerned with criminal acts but also
based upon response to a military threat. A tra- with unauthorized activities, safety and fire pro-
ditional reference for physical security is FM tection issues, and the performance of auxiliary
19-30 Physical Security, published by the U.S. services. These can include delivering the com-
Army, while a modern reference is the Facilities pany mail, checking gauges, conducting light-
Physical Security Measures Guideline published ing surveys, assessing behavior, enforcing lease
by ASIS International. agreements, and assisting customers. Note that
The process used to plan physical security community policing or problem-oriented policing
measures is as follows: strategies that public police have adopted are
1. Identify assets. These generally include very similar to what security practitioners have
personnel, property, information, and image. been doing for decades.
2. Loss events are exposed. Risks are identified.
This involves research rather than “seat of the CRIME PREVENTION THROUGH
pants” reasoning! ENVIRONMENTAL DESIGN
3. Probability of the loss events occurring is
calculated. Crime Prevention Through Environmental
4. Impact of occurrence is assessed for each loss Design (CPTED) is a system whereby territo-
event. This means, the effect the loss event riality reinforcement is established via barri-
will have in terms of direct, indirect, and extra- ers, access control, and surveillance. Its genesis
expense costs. may have been in the construction of castles
5. Countermeasures are selected. There can and forts. The contemporary beginnings of it
be a vast array of interventions; generally were through the writings of Oscar Newman
physical security utilizes target hardening (Defensible Space) and C. Ray Jeffrey (Crime
techniques, such as patrols, access control, Prevention through Environmental Design). CPTED
lighting, intrusion detection, surveillance, theory consists of these various components:
weapons detection, and so on.
6. Countermeasures are implemented. Territoriality: Boundaries and property
7. Countermeasures are evaluated as to their lines are marked. This can be the placement
effectiveness. Traditionally, this step has been of barriers, shrubbery, and the use of
avoided by practitioners in physical security different colors of walkways to mark areas.
and crime prevention. Psychological deterrents to trespass are
erected to establish territoriality.
Note: See www.securitysolutions.com and Surveillance: Observing areas makes detection
www.securitymagazine.com for products and and deterrence of criminal behavior more
applications. likely. There are several types of deterrence:
Patrols are a key part of a physical security Natural—keeping areas open to
system. They serve as catalysts for the system, observation, such as by clearing bushes
bringing all parts together. Patrols have been near access points, having windows facing
I. FOUNDATIONS
RISK MANAGEMENT AND INSURANCE 7
out into a common courtyard, or placing E — Error in planning or execution, which
a picnic area near a basketball court. All of results in lost funds;
these make for easier observation of the area C — Crime that causes loss and/or injury;
to be protected. They facilitate detection of UP — Unethical/unprofessional practices,
criminal or unauthorized activity. such as misrepresentation, discrimination,
Electronic—technological aids are used, conflict of interest, and so on.
such as closed circuit television (CCTV)
Accidents cost extensive amounts of direct loss
and volumetric intrusion detection systems,
(cost of replacement and repair) as well as indi-
such as passive infrared (PIR) sensors.
rect loss (downtime, investigative costs, lowered
Organized—patrols by security personnel,
morale, legal fees, etc.) and extra-expense loss
police, or citizen crime watches.
(advertising, rental of new rooms or equipment).
Access control: Maintaining boundaries
Note that there are also extensive administrative
by restricting access to an area. Access is
law requirements under OSHA (Occupational
controlled via the use of locks, biometric
Safety and Health Administration) and state
systems, access cards, and other methods.
agencies (CALOSHA and Pennsylvania
Access control is a physical deterrent to trespass.
Department of Labor and Industry) with which
Positive activity support: In a significant
organizations must comply. Safety is a major
departure from physical security, CPTED
concern to organizations for all of these reasons.
uses activities that divert people in the
Many persons in charge of security are also in
environment from involvement in crime.
charge of safety. A Director of Safety and Security
This may take the form of recreation,
has become a common title in health care, on col-
entertainment, or volunteer efforts that help
lege campuses, and in hotel environments.
society (volunteer fire companies for youth).
Maintenance: The repair of “broken
windows.” An environment that is not
kept up properly may degenerate further.
RISK MANAGEMENT AND
People see broken windows and believe it is
INSURANCE
acceptable to break other windows.
“Risk management” is a term closely associ-
A “snowballing” or “rolling ball” effect
ated with the insurance industry. It is similar con-
occurs. Prompt repair and cleaning of damage
ceptually to the physical security planning process
or graffiti are essential parts of CPTED.
in its implementation, but it deals with risks other
than “security” threats caused by humans. It is
SAFETY not limited to “target hardening” (risk reduction)
approaches, such as the use of locks, barriers,
Safety ushers in the more contemporary intrusion alarms, and so on. Strategies for manag-
emphasis on asset protection and incorporates ing risk include the following:
the WAECUP Theory of Loss Control developed
Risk avoidance—such as completely avoiding
by Bottom and Kostanoski in Security and Loss
the risk of an earthquake by avoiding
Control (first published by Macmillan in 1983).
geographic areas where there are active fault
W — Waste of time, resources, man-hours, lines, staying out of countries that are known
space; to kidnap people for ransom, or not making
A — Accident that causes injury, downtime, dangerous products, such as explosives.
increased workers’ compensation costs, and Risk transfer—means transferring
so on; the financial impact of loss to another
I. FOUNDATIONS
8 1. CONCEPTS AND THEORIES OF ASSET PROTECTION
organization or entity. Insurance coverage is assets across some distance so that no one
the usual means of risk transfer. The insurance vulnerability can affect the entire enterprise
company takes on the cost of repairing or is another example.
replacing the asset at risk instead of the Risk reduction or risk mitigation—means
enterprise. Of course, this comes at some reducing the probability of a loss-causing
cost and some delay in repairing or replacing event through the adoption of preventive
an asset as the insurance company must measures. That is, taking methodical,
investigate and process the claim. Outsourcing appropriate steps to lessen the risk to the
hazardous operations to other organizations is organization or the frequency, probability,
another example of risk transfer. and impact of such risks and losses. Physical
Risk assumption, risk retention, or risk security and crime deterrence would be
acceptance—refers to accepting the risk, as it considered risk reduction. So, too, would the
has a very low probability of occurring; the use of safety equipment.
risk is extremely difficult to protect against;
or the cost of changing the risk to the assets is As you can see, risks can be reduced in a num-
so great or so low that any effort to change it ber of ways, but they are never truly eliminated.
would either be too expensive or the losses so Insurance can be thought of as the “last line
low as to be inconsequential. For instance, it is of defense” in a physical security system. It
extremely unlikely that an asteroid will strike; provides the policyholder with financial com-
it is also impractical to defend against it. It pensation from the insurance company after a
would likewise be impractical to purchase loss has occurred. According to Purpura (1991),
insurance for a machine that has exceeded its loss prevention originated within the insurance
useful shelf life and has no intrinsic value. industry. Note that while the term “loss preven-
Risk spreading—implies using redundant tion” is utilized primarily within the retail sec-
systems of communication, power, or tor, it is gradually being replaced with the more
information storage. The separation of representative term “asset protection.”
PRACTICAL EXERCISE
Pick some assets, such as vital information, terrorism, theft, and so on. In the column on the
that an organization needs to operate: peo- right, list a risk management approach, such
ple, works, art, and so on. Place these assets in as transfer, avoidance, or acceptance, which
the boxes to the left. Next, place the primary would be most appropriate for dealing with the
threats that may face those assets such as fire, threat.
I. FOUNDATIONS
RISK MANAGEMENT AND INSURANCE 9
Insurance policies provided by an insurance Liability insurance—to cover legal costs
company are driven by the probability of loss and compensatory damage awards (punitive
events occurring based on actuarial tables. The damages are not generally covered).
premiums and deductibles are adjusted accord- Attorney’s fees and associated costs can
ing to the loss event probability; so, too, is the become quite high during civil litigation
availability of insurance if insurance carriers regardless of whether the case is settled or
deem a risk to be too high and refuse to write goes before a court.
a policy. In these cases, organizations must self- Fire insurance—one of the first types of
insure or join an insurance pool of other organi- insurance developed; some policies mandate
zations that pool their funds in a liquid account that the insured conduct periodic patrols
that is set aside in the event of a loss. There are of various areas on the property—the use
also government insurance programs for crime of watch tour systems had developed as a
and floods on the federal level, and workers’ result of this.
compensation on the state level. Burglary insurance—for losses associated
Various types of insurance coverage have with unlawful intrusion. Burglary insurance
evolved, such as the following: policies generally require evidence of forced
entry.
Business Interruption—for losses incurred Robbery insurance—coverage for forcible
after a disaster, accident, or fire while a thefts committed in the presence of another.
business is not operating. Business interruption Theft insurance—policies cover losses from
insurance helps to control indirect losses theft; may include burglary and robbery losses.
stemming from lost productivity. Bonds—fidelity bonds require investigation
Kidnap and Ransom (K & R)—for firms that of the covered employee by the bonding
have had executives abducted by criminals company (the insurer); these bonds indemnify
or terrorists. This coverage became popular the holder against dishonest acts committed
in the early 1980s in response to left-wing by the employee. The holder of the bonds is
terrorist kidnappings in Latin America. The exempt from financial responsibility for the
film Proof of Life with Russell Crowe portrays dishonest acts of the employee.
K & R coverage. Employment Practices Liability (EPL)—
Worker ’s Compensation—required by state insures against legal costs due to unlawful
laws to compensate workers injured on the employment practices such as sexual
job from the results of work-related accidents harassment, discrimination, and so on.
and occupational diseases (Purpura, 1991, Contemporary liability exposure for ongoing
p. 265). Rates paid for premiums by employers illegal employment practices is substantial,
are based on job hazard, and in part on an with awards and settlements running into
employer’s record of accidents. the multimillions.
EMERGING TRENDS
An emerging new paradigm of asset protec- homicide/suicide bomber is an especially trou-
tion is the consideration that must be made for bling trend and is difficult to provide sufficient
an attacker who will enter a protected area with levels of protection against. The amount of time to
the goal of destroying an asset in place. The detect, delay, and defend is essentially reduced by
I. FOUNDATIONS
10 1. CONCEPTS AND THEORIES OF ASSET PROTECTION
half as the attacker does not have to add in time Specialization in the industry is the continu-
to flee. Depending on the asset to be protected ation of a long-standing trend that is gaining
and the preexisting environment in which the greater acceptance outside of the business. Both
protection officer must operate, strengthening the large and small security businesses are finding
ability to detect and delay the adversary must be specialties in which to focus and thrive. Some
given especially careful consideration. This may security officer companies are established as, or
include the addition of intelligence assets that can are establishing, separate divisions devoted to
overtly or covertly uncover the adversary’s plans. retail security in malls and protection of chemical
Cooperative information sharing with other enti- plants or nuclear power stations. Electronic secu-
ties such as law enforcement or in some areas, the rity companies may find specialization in surveil-
military, may be the best option for strengthening lance systems for casinos or integrating various
the detection aspect of asset protection. security, fire alarm, and building control sys-
Like the homicide/suicide bomber, improvised tems into a cohesive platform using the client’s
explosive devices (IEDs) are also an especially trou- computer network.
bling trend. Not limited to areas of conflict, domes- Professionalism is also the continuation of a
tic extremist organizations have used these devices long-standing trend that is finding favor by the
to intimidate, maim, and destroy. Special attention companies and clients that security profession-
and alternative plans must be carefully developed als work for and with. College degrees at the
for organizations that conduct work that may Bachelor’s and Master’s levels are an almost uni-
attract the attention of such groups, including spe- versal requirement for security managers at all
cialized protection plans for executives. In areas of levels, and for some security officers in special-
conflict where the threat of IEDs is real, options for ized sectors. Certification by industry organiza-
reducing the risk include, but are not limited to, tions such as the International Foundation for
traveling covertly, using decoy vehicles, or using Protection Officers and ASIS International is also
telephones, videos, and Internet conferencing. becoming a requisite for some companies.
I. FOUNDATIONS
SECURITY QUIZ 11
Fossum, J. (1982). Labor relations: Development, structure, pro- Johnson, T. (2002). Retail loss prevention management models
cess. Dallas, TX: Business Publications, Inc. Unpublished paper. York College of Pennsylvania.
Garcia, M. L. (2001). The design and evaluation of physical pro- Kuykendall, J. (1986). The municipal police detective: An
tection systems. Boston, MA: Butterworth-Heinemann. historical analysis. Criminology, 24(1).
Girard, C. M. (1989). Planning, management and evalua- Mackay, J. (1996). Allan Pinkerton: The first private eye.
tion, Chapter 31. In L. J. Fennelly (Ed.), Handbook of loss New York, NY: John Wiley & Sons.
prevention and crime prevention (2nd ed.). Boston, MA: Matthews, L. J. (1990). Pioneers and trailblazers: Adventures of
Butterworths. the old west. New York, NY: Derrydale.
Gilbride, B. P. (1999). Sexual harassment. In S. J. Davies & Nalla, M., & Newman, G. (1990). A primer in private security.
R. R. Minion (Eds.), Security supervision: Theory and Albany, NY: Harrow & Heston.
practice of asset protection. Woburn, MA: Butterworth- National Advisory Committee on Criminal Justice
Heinemann. Standards and Goals. (1976). Report of the task force on
Green, G., revised by Fischer, R. J. (1987). Introduction to private security. Washington, DC.
security (4th ed.). Boston, MA: Butterworths. Peak, K. J. (1997). Policing in America: Methods, issues, chal-
Hertig, C. A. (2002). Investigative concepts. Unpublished lenges. Upper Saddle River, NJ: Prentice-Hall.
paper. York College of Pennsylvania. Purpura, P. P. (1991). Security and loss prevention: An intro-
Hertig, C. A., Fennelly, L. J., & Tyska, L. A. (1998). Civil duction. Stoneham, MA: Butterworth-Heinemann.
liability for security personnel. Naples, FL: International Sennewald, C. A. (1985). Effective security management (2nd
Foundation for Protection Officers. ed.). Boston, MA: Butterworths.
I. FOUNDATIONS
This page intentionally left blank
C H A P T E R
2
The Evolution of Asset Protection
and Security
Christopher A. Hertig and John Christman
13
14 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
current legal prohibition against drugs is analo- demands different protective strategies and
gous to Prohibition. This is an arguable point: tactics. These change with technological
drugs are not as socially accepted as the drink- developments. Politics and economics are
ing of alcohol was in 1920s American society. also factors. In 2008 and 2009, piracy on
Nonetheless, the emergence of black markets the high seas became a major issue due to
due to extensive consumer demand for illegal large numbers of unemployed mariners.
goods or services is something that all students 4. Demographics—population size, density,
of asset protection should appreciate. age distribution—plays a key role in crime
control and safety. Large numbers of
recent immigrants who do not understand
THE CYCLE OF HISTORY
the language or customs of their newly
adopted country create safety and security
The security industry has a rich and varied
challenges. College students living in
background. “Security” implies protection: safety
dormitories create another set of challenges.
from attack, espionage, or sabotage. It means
High-rise office buildings with business
being able to live, work, or play free from harm,
tenants have different protection needs from
in a stable environment. Organizations must take
two-story apartment complexes for low-
measures to minimize disruption. These mea-
income families. Security measures must be
sures are dependent on a variety of factors, such
relevant to the environment in which they
as threat probability, criticality, culture of the
are implemented and every environment is
organization, financial resources available, and so
different.
on. The measures taken have changed over time.
5. Military forces and concepts are intimately
The historical development of “asset protec-
involved in protection. Foreign invaders,
tion” (the broader, more contemporary term
riots that have to be contained by soldiers,
encompassing safety and fire protection) and
and international terrorists are all addressed
“security” (the older term; more oriented to
by military forces. Contemporary pro-
crime/espionage/terrorism issues) reveals sev-
tective forces often operate on a military
eral trends. These trends appear to be cyclical
organizational structure. Police, security,
in nature.
and firefighting organizations have a
1. Private initiatives generally precede public. paramilitary chain-of-command with
In many cases, private protective measures sergeants, lieutenants, and captains. The
are started to fill a void in services offered military has clearly exerted an influence over
by governments. Private corporations are police, security, and fire departments.
more nimble and flexible than governments. 6. Security efforts generally are a step behind the
This enables them to start new programs, latest methods of criminal attack. The saying
protection or control forces, etc. “As one hole in the net is mended, the fish swim
2. Control forces may be involved in class toward another” seems particularly relevant.
struggles. Control forces—military, police, 7. Protective efforts are usually initiated
security—work to keep certain groups of after serious problems have occurred. The
citizens in line. September 11, 2001, attacks on the Pentagon
3. There is a strong relationship between and World Trade Center initiated substantial
commerce and protective needs. The amount reforms in the federal government, such as
and type of commerce (ships, trains, Internet, the Transportation Security Administration.
and so on) determines the threats or risks Wars and major natural disasters also create
posed to the commerce system. Each risk new protective organizations, laws, and so on.
I. FOUNDATIONS
KEY TERMS 15
8. Protective efforts often are spawned by Asset protection takes a broader view. It is
the need for mutual protection. Homeland also concerned with waste, errors and accidents,
Security is a current example: governmental natural disasters, labor shortages, equipment
units at all levels coming together in breakdowns, fires, and so on. Asset protection
partnership with private organizations to covers any loss an organization suffers that is
protect against terrorism. Another example is not related to marketing.
fire societies that were established in Boston Crime Prevention through Environmental
in 1718, where society members helped each Design, (CPTED), is a theory of crime deter-
other to salvage goods after a fire (Cote & rence based on environmental design. Facilities
Bugbee, 1988). are constructed—or arranged—in such a way
that criminals feel uncomfortable and refrain
from committing crimes.
KEY TERMS Physical security is a plan or design devel-
oped for the purpose of attempting to eliminate
“Assets” are tangibles or intangibles that or minimize the threats posed by potential loss
have value. If assets are stolen, lost, destroyed, event occurrences. It incorporates locks, bar-
or damaged, the entity (organization or individ- riers, access control systems, lighting, alarms,
ual) owning them suffers a loss. There are four and security officers. Physical security is a vast
basic classifications of assets: field of study. It can be said that it is the “heart”
of security. It encompasses CPTED as well as
1. People—employees, visitors, clients,
procedural controls.
patients, students, and so on.
Personnel security is designed to screen out
2. Property—real estate, buildings, raw
undesirable employees. It is done to protect
materials, equipment, merchandise, and
both the employer and other employees. The
so on.
screening, or vetting, of employees to prevent
3. Information—vital information that is
probes by foreign intelligence agents originated
necessary for an organization’s survival,
within the military-industrial complex of the
such as employee and vendor lists,
1950s to 1980s. The old term “industrial secu-
organizational plans, and other items
rity” (as in “American Society for Industrial
without which the organization could not
Security”) referred to Department of Defense
operate; confidential information such
(DOD) contractor firms. These companies made
as patient records, personnel or student
munitions, tanks, airplanes, and so on for mili-
records; proprietary information such as
tary usage. While espionage—in particular
trade secrets, customer lists, and marketing
economic espionage—is a major issue, contem-
plans; classified information that is essential
porary personnel security also deals with work-
to national defense.
place violence, internal theft, and terrorism. The
4. Image—the image cultivated through years
current emphasis on terrorism could be seen as
of public relations and advertising that an
a historical cycle repeating itself—the Cold War
organization or individual (celebrity) has
measures concerning spies bearing some simi-
established. Customer goodwill is an asset.
larity to the issues of terrorism. Each era was
So, too, is a positive image that will not attract
focused on persons infiltrating facilities and
the ire of extremist groups or individuals.
information sources and causing problems.
Security is concerned with those threats that Asset protection encompasses those threats
are posed by humans. Espionage, sabotage, posed by nature, accident, market, and economic
theft, and assault are examples. factors as well as those posed strictly by humans.
I. FOUNDATIONS
16 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
Asset protection incorporates fire protection, hired soldiers from the northern Viking regions.
HAZMAT, and safety within the discipline. The Varangian Guards operated for hundreds of
It seeks to identify and manage all risks posed years, serving as bodyguards, suppressing riots
to an organization and incorporates many con- and occasionally functioning as combat troops.
cepts of risk management. Asset protection is the In the American Revolution, Britain employed
approach used in addressing problems by many German mercenaries from the province of Hessia
organizations. It is perhaps similar to the “all (Hessians). It was not until the rise of Napoleon
hazards approach” used in emergency manage- that the use of standard full-time armies on
ment. In some cases, the term “loss prevention” active duty was typical. Privately hired soldiers
is used. This has been particularly common in and security personnel were the norm for most
the retail security sector. of history (Maggio, 2009). Today there are pri-
As threats change over time and involve dif- vate military companies who provide security,
ferent environments, asset protection is a truly intelligence, and logistical services to nations.
dynamic undertaking. The history of security/ Iraq and Afghanistan have seen expanding
asset protection is formulated in a variety of markets for these firms. Modern armies are too
areas. Security is influenced by commerce, war, small to do all that is asked of them. As a result,
natural disaster, economic and cultural changes. private companies have stepped in to handle
security and other functions that don’t abso-
lutely require soldiers.
THE WARTIME GROWTH OF A review of some events in history that cre-
SECURITY ated security problems is outlined here.
Military defense is often discussed in the July 1916—an explosion at Black Tom
literature on the history of security. Ortmeier Island, a munitions storage facility in New
(1999) reveals that in prehistoric times, cave Jersey, was set off by a German saboteur.
dwellers stacked rocks around perimeters in This increased War Department security
front of their caves to both mark this space and measures. German agents also set fires, filled
warn off intruders. The Praetorian Guard in fire extinguishers with gasoline, sold heroin
ancient Rome were military personnel. Military to soldiers to make them addicted, and even
threats employ military approaches. Such contaminated the milk supply at the Ft.
approaches often utilize military personnel and Leavenworth Cadet School with nitrogenous
incorporate military culture. germs. German agents also fomented
“Defense-in-depth” is a military concept strikes in key war industries to slow down
wherein assets are protected by successive lines production of war materials (Velke, 2004).
of defense. This includes clear zones, outer The potential for problems caused by
perimeters, inner perimeters, and soldiers or saboteurs, foreign intelligence agents (spies),
protection officers. This is a key element of and terrorists who are state-sponsored
physical security plans. Contemporary facility creates a need for increased security
models of defense-in-depth incorporate layers measures during all military conflicts. Note
of protection. Safes and vaults, alarm systems, that in most discussions of terrorism, foreign
and insurance coverage all comprise the layers agents are not included, although they can
of the protection plan. be a major problem.
Military threats and organizations have been World War II—U.S. Department of War
employed throughout history. The Byzantine established internal security division and
empire, which replaced the Roman empire, swore in 200,000 security officers as military
I. FOUNDATIONS
HISTORY OF POLICING 17
police auxiliary. State National Guard units system required every male over the age of 12
were also activated. In some cases, states to form into a group of 10 with his neighbors
had Home Guard organizations that enabled called a “tithing.” The tithing was sworn to
the National Guard to engage in combat or help protect fellow citizens and apprehend
combat support activities while the Home and deliver persons who committed crimes.
Guard maintained a domestic security posture. Ten tithings were grouped into hundreds who
Korean War—The “Cold War” era began with were directed by a constable. The constable was
heightened tensions between the United States appointed by a nobleman and was, in effect, the
and Russia. The Industrial Security Manual first police officer (Peak, 1997).
was published in 1952. This was considered Note that early Roman and English—and
the “Bible” of Department of Defense (DOD) later American—policing functions were depen-
contractor security procedures. It established dent on citizen involvement. This is still true
information protection, personnel security, today. Homeland Security requires citizens to
and physical security measures for DOD be vigilant for indications of terrorism. Major
contractors. Since the United States was in a disasters require government, corporate, and
wartime economy until about 1975, there was nonprofit volunteer organizations (Red Cross)
heavy activity in this sector. Many security to work together. The lesson is that the need for
personnel worked in “industrial security.” mutual assistance spawns protective efforts.
In the early nineteenth century, London con-
tinued to have a large population with crime
HISTORY OF POLICING and disorder problems. As few organiza-
tional models were available at this time, the
Police in Ancient Rome consisted of the military model was adopted for the London
Praetorian Guards, which was a military unit. Metropolitan Police (Ortmeier, 1999). What
There were also cohorts who kept peace. The Robert Peel established in 1829 in London
vigiles were civilian freemen who controlled served as an organizational model for police
fires and assisted in controlling crime and disor- and security departments. In America, cities
der. It is interesting to note that urban mob vio- began to develop uniformed police forces in the
lence was one reason why municipal police were mid-1800s. These forces were similar to what
formed in both England and the United States. we have today. Peel set forth a series of princi-
With the Norman Conquest of England in ples upon which a police force could be estab-
1066, there were several significant governmen- lished and administered. While his specific
tal developments: frame of reference was public law enforcement,
the principles are also adaptable to uniformed
1. The introduction of feudalism, a contractual
private protection forces:
relationship between lords of the manor,
and their tenants or vassals. Feudalism was
1. The police must be stable, efficient, and
a system in which the landholder provided
organized along military lines.
for the security of the tenant peasants in
2. The police must be under government control.
exchange for a portion of the harvest.
3. The absence of crime will best prove the
2. The centralization of government.
efficiency of police.
3. The reorganization of the church.
4. The distribution of crime news is absolutely
One protection development that was estab- essential.
lished was a community-based system of polic- 5. The deployment of police strength both by
ing called the frankpledge. The frankpledge time and by area is essential.
I. FOUNDATIONS
18 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
6. No quality is more indispensable to a police police forces are older in most cases. Private polic-
officer than a perfect command of temper; ing preceded public policing with merchant,
a quiet, determined manner has more effect parish, and dock police forces in England. Public
than violent action. and private were difficult to distinguish from
7. Good appearance commands respect. each other. Railroad Police were, and still are,
8. The securing and training of proper persons a privately employed police force with full law
are at the root of efficiency. enforcement authority. Many states in America
9. Public security demands that every police enacted legislation to establish railroad police
officer be given a number. forces. In many rural areas these were the only
10. Police headquarters should be centrally law enforcement agencies in existence. By 1914
located. there were 12,000 railroad police in America.
11. Police officers should be hired on a During World War I they were deputized by the
probationary basis. federal government (Purpura, 2002). The Coal and
12. Police records are necessary to the correct Iron Police in Pennsylvania were also privately
distribution of police strength. employed and had law enforcement powers.
Current policing in the United States was
In the mid-nineteenth century, major American
greatly influenced by the Omnibus Crime Control
cities began to develop police departments.
and Safe Streets Act of 1968. This created the Law
These forces evolved out of earlier night watch
Enforcement Assistance Administration (LEAA),
systems that utilized volunteers or civilians.
which funded training and education for police.
Some of these forces only operated at night, and
Police by the thousands began to acquire col-
they were no longer effective at controlling crime
lege educations. Criminal justice programs were
in burgeoning urban environments. Organized,
started at colleges across the country. While there
paid, full-time police operating under the prin-
were only five or so institutions offering degrees
ciples established by Robert Peel began to take
in criminal justice prior to 1968, today there are
shape.
thousands. The LEAA also provided grant mon-
State police forces also developed. The
ies for equipment and crime analysis by police
Pennsylvania State Police is generally regarded
departments. The LEAA also spent massive sums
as the first modern state police department.
on developing criminal justice.
While Texas and Massachusetts had state police
Fees were used to pay for early police ser-
forces, these were vastly different from the orga-
vices. The Parliamentary Reward System in
nizations we think of today as “state police.”
England paid a fee of 40 English pounds to
The Pennsylvania State Police have full law
private persons who captured felons. Both
enforcement authority. They also are respon-
Jonathan Wild and the Bow Street Runners were
sible for traffic control on state highways such
early private detectives who worked under the
as the Pennsylvania Turnpike. In some states,
Parliamentary Reward System. In the nineteenth
there are separate highway patrol forces that
century, there were private detectives who
specialize in traffic law enforcement (California
received rewards for recovering stolen prop-
Highway Patrol, Ohio Highway Patrol).
erty. Over time these private detectives were
replaced by public police, due to criticism of
“PRIVATE SECURITY” OR “PUBLIC their methods as well as the entry of insurance
POLICE”? companies. Once there were insurance policies
to compensate policyholders for their losses, the
Policing is both public and private. Public incentive to recover stolen property subsided
policing as we know it is relatively recent. Private (Kuykendall, 1986). This change was gradual;
I. FOUNDATIONS
“PRIVATE SECURITY” OR “PUBLIC POLICE”? 19
U.S. police often worked for rewards. One of the 4. Federal agencies such as the Secret Service
notable contributions of Allan Pinkerton was and U.S. Marshals are really more concerned
that he established a code of ethics and forbade with security than law enforcement
the acceptance of rewards by his men. functions. There is also the Federal Protective
There are still some examples of fee systems Service, National Security Agency, and
in use today, but these are rare. Constables in Customs and Border Protection. While the
Pennsylvania are private citizens with arrest officers who work for these organizations
powers who serve warrants and perform vari- have law enforcement authority, they are
ous court functions on a fee basis. The consta- first and foremost protection organizations.
ble system was imported from England and is 5. Government agencies often have either
an elected office in Pennsylvania. Note that an proprietary or contract security departments.
advantage of the fee system is that the govern- Housing bureaus, school systems, parks
ment is only paying for services rendered. There departments, reservoirs, and so on are
is no benefit package such as health insurance protected by security personnel. Some cities
and retirement. and counties have their own proprietary
Some other examples of “private secu- security departments.
rity” or “public law enforcement” include the 6. Military and federal installations have
following: security forces. These may be either
proprietary government employees or
1. Police in major cities may serve as private contract officers. The U.S. federal
“ambassadors” of the city. These officers government is a large user of contract
may be stationed in transportation centers or security services.
public facilities where people visiting the city 7. Shopping centers are private properties open
are likely to meet them. This is the same role to the public for business. They usually have
played by private protection officers in hotels, proprietary security forces. Some have police
resorts, casinos, and shopping centers. The substations within so that close cooperation
concept is the same: aid and assist visitors and between mall management, the security
preserve the quality of life for those visitors. department, and the police department is
2. Contract security personnel patrol apartment facilitated.
complexes, housing developments, and 8. Commissioned security officers are used
shopping centers in a form of “community- in some environments. These are privately
oriented policing.” Some firms specialize employed protection officers who have
in “weeding” out the criminal element via police commissions. This enables them to
surveillance and apprehension of drug make arrests under certain circumstances,
dealers and other criminals. This helps create for certain types of offenses and/or within
a safe environment for the contract officers to a specified area. Large hospitals and resorts
assume their “community-oriented” policing located in remote locations, and quite a few
role. They help neighborhood children, private colleges, use this model.
organize community activities, and so on.
3. College campuses often have campus The blending of police and security was great
police who conduct more asset protection in the nineteenth century and, it is probably
and security work than law enforcement safe to say, within the past 30 years or so. It
functions. Some colleges have both police will probably continue as our society becomes
and security divisions. Almost all have some increasingly complex and we more frequently
type of student patrols. utilize resources on a contractual/outsourcing
I. FOUNDATIONS
20 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
or task force basis. Computer crimes will neces- amounts of heat and oxygen, virtually anything can
sitate contracting out for investigative exper- become fuel for a fire.
tise by government agencies. So, too, will cost The threat of fire varies with the environment.
considerations as police are extremely expen- The perception of that threat also changes. Before
sive employees to maintain. Police require the Civil War, fire insurance executives gener-
extensive preemployment screening, training, ally viewed fire as good for business (Purpura,
equipment, and health and pension benefits. 1991). Fires were similar to airplane crashes in
As a result they will have to be used more judi- that they were relatively improbable events that
ciously. Functions that do not absolutely require created hysteria and spurred the purchase of
a sworn law enforcement officer can be per- insurance policies. Insurance companies made
formed by a civilian. This can be a municipal money on these policies until excessive fires—
proprietary or contract employee. in heavily populated areas where buildings
Additional factors in this blending are retire- were constructed of wood—caused enormous
ment plans and an aging population. Retired amounts of claims to be paid.
police do not make enough money to cease Here is a brief overview of some major
working. Employing them as security officers or events in the development of fire protection
investigators may utilize their skills in a mutually beginning in the 1600s:
beneficial manner to both employer and officer.
An area of concern is police “moonlighting” 1631: A disastrous fire in Boston resulted in
in security. This can create numerous problems, the first fire ordinance in the United States.
such as determining whether the off-duty police This ordinance prohibited wooden chimneys
officer is a police officer or security officer when and thatched roofs (Ortmeier, 1999). Wooden
making apprehensions, and so on. There may chimneys were banned in London in 1647
be a temptation to use official databases for (Cote & Bugbee, 1988). Wooden chimneys
the benefit of a private employer. Preferential were often used in American soldiers’ winter
treatment of the employer (store, mall, the- quarters and the cabins of slaves.
ater, restaurant, hotel, etc.) by the police may 1666: The Great Fire of London spread due
occur. Off-duty work may also begin to take to closely situated wooden buildings, wind,
precedence over the full-time job. The officer and dry weather. The fire initiated some
may spend too many hours working off-duty interest in fire prevention by insurance
and become tired. Officer survival concerns companies. A complete code of building
are greatly expanded with off-duty police. regulations was adopted but not made
Employers of off-duty police may also have a effective, since commissioners to enforce the
hard time controlling them. Terminating their regulations were not appointed until 1774
employment can create intense hostility from (Cote & Bugbee, 1988).
local police departments. 1667: Phoenix Fire Office—a private
firefighting service that suppressed fires
on subscribers’ property. Subscribers’ had
FIRE PROTECTION a crest on their buildings to mark them.
Other private fire companies also formed.
Fire protection is a major issue in asset pro- Today, some industrial complexes and other
tection. Fire can destroy almost anything. It is a facilities have their own proprietary or
chemical process whereby heat, fuel, and oxy- in-house fire brigades. Some of these are
gen combine in a chemical chain reaction to well equipped and can suppress small fires.
turn a solid or liquid into a gas. With adequate In most cases, fire departments are paid
I. FOUNDATIONS
COMMERCE 21
public professionals. Volunteer firemen Association. This resulted in the
are also used and play an important development of the National Building Code
role in providing firefighting services to for municipalities (Purpura, 1991).
many areas. Some fire departments are
a hybrid of paid and volunteer
firefighters. COMMERCE
1871: Peshtigo Fire—a logging community
in Wisconsin; Peshtigo had very dry weather Commerce has a tremendous relationship
and this aided the spread of a forest fire to asset protection. Professional security per-
that burned vast acres of land. A massive sonnel must understand the marketing of their
firestorm formed where the fire consumed employer’s goods and services in order to be
oxygen at such a rate that it created effective. A retail loss prevention agent must
significant draft. Firestorms occur where a understand that selling merchandise is the
fire is large enough to essentially create its reason for the existence of the store, not the
own mini-weather system. The Peshtigo apprehension of shoplifters. Marketing must
Fire was probably the worst fire in U.S. be balanced with security. They are “both different
history. It is relatively unknown because the sides of the same coin.” It can be said, in both a
Chicago Fire, which occurred a few days theoretical and practical sense, that “marketing
later, received more attention from the news is the ‘flip side’ of security.”
media. From the beginning of the nineteenth cen-
1871: Chicago Fire. As in the Great Fire of tury until the development of the railroads,
London, closely situated wooden buildings massive canal networks were constructed in
caught fire in dry weather. The wind the eastern United States. During their heyday,
whipped the fire through Chicago, and the canals had asset protection concerns with acci-
city was destroyed. We commemorate the dents and labor shortages. Workers were some-
Chicago Fire with Fire Prevention Week. times injured and barges and canals damaged.
Fire Prevention Week is held each year in Railroad expansion during the nineteenth
October. century was dramatic. Railroads were neces-
1894: Underwriter’s Laboratories (UL) sary to ship goods and raw materials in large
was formed. UL is an independent testing quantities. Railroads had, and still have, a vari-
laboratory. It subjects products to extensive ety of security and safety issues. Nineteenth-
tests to see if they work as they are supposed century American railroads faced attacks and
to and if they are safe. sabotage of tracks and telegraph lines by Native
1896: The National Fire Protection Americans, buffalo stampedes, wrecks, and
Administration development of standards labor difficulties. The labor problems included
for fire protection. These standards are used both shortages of workers and strikes. While
throughout the industry and are the basis for the railroads had their own police forces and
many municipal fire codes. contracted with the Pinkerton Agency, they also
1948: The National Burglar and Fire Alarm relied on an external control force—the Union
Association (NBFAA) was formed. NBFAA Army. The Army had nearly 5,000 soldiers
offers membership, publications, seminars, patrolling along and around the tracks in 1868
and professional certification programs for (Matthews, 1990). Human resource manage-
alarm installers. ment problems (recruitment of quality person-
1965: National Board of Fire Underwriters nel), safety issues, and external threats faced
was merged with the American Insurance by the railroads, parallel the challenges facing
I. FOUNDATIONS
22 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
contemporary asset protection managers. Today’s protection due to their vast wealth, as do cur-
manager is concerned with personnel recruitment rent celebrities such as rock stars, film stars, and
(hiring) and retention (keeping workers), OSHA corporate executives.
compliance, and external threats such as terrorist With the availability of retail store out-
attacks. lets and self-service shopping, shoplifting has
Air transport is vulnerable to theft, safety become a major issue. It is a low-tech crime
problems, terrorists, and “air rage” by emotion- that can be carried out by juveniles, drug
ally disturbed passengers. In 1969, numerous addicts, and so on. With the high value of some
airplane hijackings occurred, and in 1974, the store merchandise, sophisticated professional
Anti-Hijacking and Air Transportation Security thieves, and even terrorist groups engage in
Act was passed, establishing security programs retail theft. Organized Retail Theft (ORT) incor-
at airports. “Air rage” and the September 11 porates theft, repackaging, and distribution of
hijackings as well as the shoe bomb possessed the stolen product. It is a sophisticated opera-
by Richard Reid are more current issues. tion involving various entities and warehouses
Shipping on the high seas has historically to store the merchandise.
presented problems with piracy and labor/ Contemporary loss problems include the
human resource management (HRM) issues. counterfeiting of name brand items. Cigarettes
Contemporary cruise ships face issues such as are also a prime black market item because of
drunken, assaultive passengers and lawsuits their cost due to tax increases. Criminal enter-
due to cases of sexual harassment and rapes. prises that respond to these black markets are
The threat of terrorism is also very real, be it becoming more sophisticated. The theft of infor-
through the commandeering of a cruise ship, mation concerning the development of new
the smuggling of weapons of mass destruc- toys and drugs are major issues. “Competitive
tion aboard freighters, or attacks on ports such intelligence” and counterintelligence are key
as detonating an explosive-laden ship within asset protection functions today. Internet crimes
a harbor. Piracy—the robbery or hijacking of ranging from harassing e-mails to viruses,
ships—continues to be a problem in some areas. diversion of funds, denial of service attacks,
Telephone communication and Internet com- and espionage are also problems. The theft of
merce are the new fronts for security issues phone service and credit (identity theft or credit
relating to commerce. Disinformation (the delib- card theft) is also a major problem. Identity
erate dissemination of false information such as theft/fraud creates large amounts of indirect
“urban legends”), theft of communications ser- loss to the victim as investigating and clean-
vices, and so on are major concerns. ing up the problem takes enormous amounts
of time. Employers of identity theft victims are
also affected by a loss of productivity as the vic-
ECONOMIC AND MARKETING tim must take time to straighten out the finan-
TRENDS AND ASSET PROTECTION cial mess.
Criminal targets change as rapidly as eco-
The desirability of an asset has an effect on nomics and markets dictate. Understanding
the probability of its being stolen. A funda- markets is crucial to comprehending and
mental component of protection is to assign a subsequently planning protective measures.
monetary value to something. Historically, the Marketing is the “flip side” of security in more
“robber barons” of the late nineteenth century ways than one.
needed protection of their railroads, coal mines, Generally speaking, criminals outpace the
and steel mills. They also needed personal efforts of police and security professionals.
I. FOUNDATIONS
DEMOGRAPHICS 23
Historically, they have been able to create loss The Molly Maguires were an underground
by being one step ahead of protective measures. organization predominantly comprised of Irish
miners, who perpetrated assaults and homi-
cides against those they didn’t like. They also
DEMOGRAPHICS engaged in acts of sabotage against the rail-
roads. They were thugs in the eyes of Allan
Demographics play a major role in asset pro- Pinkerton, labor union activists according to
tection. Demographic theories of crime causation revisionist historians in the 1970s, and, per-
focus on the changing composition of the popu- haps, to a degree, terrorists. The “Mollies”
lation. Urbanization theories of crime causation were investigated by a Pinkerton operative in
focus on the changing of a society from rural to a three-year undercover operation. Many of the
urban, and cultural-difference theories focus on Molly Maguires were hanged in the mid-1870s.
cultural conflict within a society (Ortmeier, 1999). The Molly Maguires took their name from Irish
Population shifts in London during the activists/criminals who dressed as women and
Industrial Revolution brought in large numbers fought the landlords in Ireland (a class strug-
of shop workers who had previously worked in gle). See The Molly Maguires with Sean Connery
farming. There were cultural conflicts, drunken- and Richard Harris for a 1969—and perhaps
ness, overpopulation, and rampant crime. Riots “revisionist”—perspective on this.
were common and police action needed to be The Molly Maguires case was important
concerted and organized (along military lines). as it was probably the first use of a task force
American cities, such as New York during the (Pinkerton men teamed with Coal and Iron
1850s, experienced similar crime and social Police) as well as the first major undercover
problems. investigation.
Immigration has caused increases in crime Invariably there are criminals among immi-
due to cultural conflicts—for example, the rapid grant groups who exploit their fellow country-
expansion of Irish immigration in America dur- men. In most cases, organized crime activity
ing the period 1845 to 1852 in response to the dissipates after the immigrant group becomes
Potato Famine of 1847. Coleman (1969) cites assimilated into the dominant culture. Common
census statistics from 1870 as stating that there examples of this are slave trading, prostitution,
were 8,641 Irish immigrants to the United States gambling, narcotics, and smuggling. Extortion
in 1845, 29,540 in 1847, and 157,548 in 1852. As via protection rackets as well as criminal group
the coal mines provided, on their face, lucrative infiltration of organized labor also occurs. See
offers of employment, numerous Irish immi- the movies Goodfellas and Once Upon a Time in
grants became employed as coal miners. Irish America for some perspective on organized
miners who felt exploited struck back at the crime infiltration.
mine bosses and railroad owners through orga- Current immigrant criminal enterprises are
nized criminal activities. from Russian organized crime groups, South
PRACTICAL EXERCISE
List an ethnic group that is largely employed in a certain industry. Do their employers exploit that
group? How? What types of actions could they take to exact revenge on their employers?
I. FOUNDATIONS
24 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
Korean groups, and so on. With the breakup numerous other types. Note that not all terror-
of the Soviet Union, many of these immigrant ist activity is politically inspired. In the United
groups have turned to criminal enterprises. States many are the acts of mentally ill individ-
A new wrinkle is that some organized crime uals. Whatever the motivation behind it, each
today is transnational and crosses international terrorist threat requires both a proactive and a
borders. The more traditional organized crime reactive response to it.
groups have stayed within their own ethnic Terrorism can perhaps be understood by
group and preyed upon the members. looking at a few significant events.
Population density, culture, age, gender, 1848—Communist Manifesto was written
and other factors also play heavily in terms of by Karl Marx and Friedrich Engels. This
safety issues. Elder care requires certain aspects established the political theory of Marxism—
of asset protection. Government requirements often called “Communism.” The bourgeoisie
for long-term care facilities and patients suffer- (ruling class of capitalists) exploit the
ing from Alzheimer’s create daily challenges. proletariat (laborers). The proletariat should
Emergency planning for a population that is not rise up and overthrow the bourgeoisie and
ambulatory and has failing hearing and sight is establish a utopian society, a “dictatorship
also an issue. In school security, managers must of the proletariat” where everyone shares
focus on drug dealing, evacuation plans, active equally. Propaganda was used to educate the
shooters, parking, and crowd management at masses and inspire them to revolt. Marxism
special events. Hotel security must be concerned was born in 1848 and left-wing terrorist
with a transitory population. Issues include dis- groups throughout the world followed it.
orderly guests, dishonest employees, sexual 1886—The Haymarket Riot in Chicago
assault, and fire and guest services. Each popu- was instigated by anarchists during a rally
lation has unique safety and security needs. against McCormick Harvester. A bomb was
thrown and seven policemen were killed,
with another 60 injured. Six workers were
CLASS STRUGGLES AND also killed as police and workers exchanged
TERRORISM gunfire. Anarchists believed in the abolition
of governments. This movement utilized
A recurrent theme concerning the history of terror tactics such as assassination (William
security and that of policing is the presence of McKinley and six other heads of state) and
class struggles. Class struggles were apparent bombings. They were very active in France,
during the French Revolution and later with Russia, Italy, Spain, Germany, and the United
the development of terrorism as a significant States during the later nineteenth and early
security/law enforcement problem. It also twentieth centuries. There are still anarchists
relates, to some degree, to the problems encoun- in contemporary American society, but their
tered with the organized labor movement in violent activities have subsided greatly since
America. The following discussion on terrorism the 1880s to the 1920s. After the Haymarket
relates to left-wing and right-wing terrorism Affair, local industrialists donated land to
that is politically and economically inspired. the federal government so that troops could
Left-wing terrorists are usually anti-government be stationed nearby. Fort Sheridan was built
and have socialist leanings. Right-wing ter- for this purpose.
rorists are anti-government and highly con- 1969—There were numerous hijackings of
servative. These are two basic classifications airliners to Cuba by dissident individuals.
of political extremism. There are, however, There were also bombings of federal
I. FOUNDATIONS
CLASS STRUGGLES AND TERRORISM 25
buildings. In the Munich Massacre, Israeli government that raised their taxes and took
athletes at the Olympics were killed by away their gun ownership rights. Minority
Palestinian terrorists. The Munich Massacre groups were seen as taking their jobs. In
showed the world that terrorism was indeed urban areas, the Skinheads formed. American
a problem. It brought terrorism to the living Skinheads are based on a working-class move-
rooms of the world via television. ment in the United Kingdom during the early
1972—Patty Hearst and the Symbionese 1970s. The British Skinheads wore Doc Martens
Liberation Army (SLA)—a left-wing boots and close-cropped hair, and they targeted
antigovernment group. The granddaughter minority group members and immigrants for
of newspaper magnate William Randolph taking their jobs. The right-wing groups gain
Hearst was kidnapped by the SLA and later followers during economically depressed times.
joined them. She was “underground” for They are also inspired by government control
20 months, traveling across the country. over gun ownership and increased taxes.
The Patty Hearst case showed that fugitives In the 1990s and into the early twenty-first
could remain underground for extensive century, terrorism perpetrated by right-wing
periods of time in the United States. See the extremists was largely overshadowed by the
film The Patty Hearst Story for an excellent activities of radical Islamic fundamentalists.
treatment of how left-wing radicals operated A series of terrorist events within the late
in the United States during the early 1970s. 1990s and early twenty-first century include the
1973—Nyack Incident—several left-wing following:
terrorist groups thought to be long dormant
collaborated on a “fundraiser” (armored car
● The 1993 World Trade Center bombing by
robbery) in Nyack, New York. This showed Islamic fundamentalists who planted an
that groups thought to be long dormant were explosives-laden vehicle in the parking
still active. Note that the Vietnam War created garage and detonated it.
intense antigovernment feelings in the United
● The 1995 Oklahoma City Bombing by right-
States. After the U.S. involvement in Vietnam wing terrorists who used a massive truck
ended in 1973, much of the left-wing sentiment bomb to demolish the Alfred P. Murrah
faded. The Nyack Incident showed that there Federal Building.
were still some virulent left-wing terrorist
● The September 11, 2001, World Trade
groups operating. That is an important Center and Pentagon attacks by Islamic
lesson: that groups no longer “on the radar” fundamentalists associated with al-Qaeda.
can reemerge. Note that occasionally 1970s The attackers hijacked four airliners and
terrorists are still being caught. The Nyack crashed two of them into the World Trade
Incident also showed that left-wing groups Center and one into the Pentagon. One
were working in concert with one another. airliner was crashed in a field near Somerset,
This is a major concern with terrorism as “the Pennsylvania, after passengers overpowered
enemy of my enemy is my friend.” Alliances the hijackers. This alerted the United States
can easily and quickly form between groups. that it had a serious problem with some of the
more radical followers of Islam.
In the 1980s and 1990s, right-wing terror-
ism became more of an issue than left-wing, In Madrid on March 11, 2004, 192 peo-
Marxist-inspired terrorist activity. Economically ple were killed and 1,841 wounded when 10
disenfranchised males in rural America often bombs exploded on four commuter trains. The
believed that they were being subjugated eco- bombs exploded within minutes of each other.
nomically by Jewish bankers and a federal Seven of the key suspects, including the alleged
I. FOUNDATIONS
26 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
master mind, died in the explosion. A police- The 9/11 attacks in America, the 3/11 attacks
man was also killed. Twenty-one people were in Madrid, and the attack in Mumbai all illus-
arrested in connection with the attacks, most of trate the workings of organized, dedicated ter-
them Moroccan (http://news.bbc.co.uk/2/shared/ rorists. To better understand the forces driving
spl/hi/guides/457000/457031/html/. Retrieved radical Islamic fundamentalists, consider the
October 11, 2009). The choice of multiple targets following:
in a simultaneous coordinated attack is a key
feature of an operation by al-Qaeda. The attack Old vs. New—there is a “clash of cultures”
appears to have been designed to inflict the maxi- between traditional ideals and new, Western
mum number of civilian casualties. This is also values. There is also a power shift away from
consistent with previous al-Qaeda operations religious leaders who formerly had much
(http://news.bbc.co.uk/2/hi/europe/3582501 more control over their followers.
.stm. Retrieved October 11, 2009). Class struggles—large numbers of
In Mumbai, India, on November 28, 2008, 151 unemployed or underemployed persons
people were killed by terrorists using automatic living in poverty.
weapons and hand grenades. The 60 terrorists Demographics—undereducated or
were in nine different groups with some attacking miseducated Middle Eastern or Muslim
train stations and others taking hostages in a hotel young men who have been taught that the
(http://www.boston.com/bigpicture/2008/11/ United States is “The Great Satan.” These
mumbai_under_attack.html. Retrieved October impressionable young men can become an
11, 2009). Islamic fundamentalists based in army of destruction if the right conditions
Pakistan were behind the attack. are met.
PRACTICAL EXERCISE
Develop a list of specific threat actions posed by terrorists, such as bombings, assassinations, cyber
attacks, kidnapping, and so on. Next, list a proactive countermeasure to be used before the attack is
launched. Finally, list a reactive countermeasure to be employed as the attack is taking place or after
the attack has occurred.
I. FOUNDATIONS
LABOR RELATIONS 27
Culture of warfare—some areas of the of earlier labor issues. One must understand
world have experienced warfare for an the historical context of “labor relations” in
extended period of time. This warfare may American society to fully appreciate the devel-
be low, medium, or high intensity. In most opment of both labor unions and control forces.
cases it is low-intensity guerrilla warfare or “Labor relations” during “the mean years”
insurgency. In some cases, entire generations of 1866–1937 (Calder, 1985) consisted of some
of people have been immersed in wars. tactics employed by management that would
Afghanistan, Palestine, and Bosnia are be unacceptable by contemporary society.
examples of this. These included the intimidation of labor lead-
Religion—a perversion of Islam that ers, spies, and “agent provocateurs” (persons
emphasizes traditional values and who instigate illegal activity and then work to
demonizes the West has occurred. Religion have the participants arrested for violating the
is a powerful influence on people. law) in unions; assaults with machine guns;
People who are living in poverty or feel the importation of strike breakers (workers who
discriminated against may turn to religion replace those who are on strike); the subversion
as an answer to their problems. Religion of attempts by workers to organize by the pro-
also gives legitimacy to the exhortations motion of interethnic conflict; and the use of
of leaders. If a leader advocates deviant thugs to intimidate workers.
behavior—violence—it may be acceptable to Note: See Matewan with James Earl Jones,
his impressionable followers. Chris Cooper, and Mary MacDonald for an
Charismatic leaders—all dynamic groups excellent treatment of this topic based on the
have charismatic leaders. Extremist groups 1920 Matewan Massacre. The Matewan Massacre
thrive on them. A charismatic leader can was a gun battle waged between striking min-
exploit—as did Adolf Hitler—cultural, ers and the Baldwin-Felts Detective Agency in
social, and economic forces in a negative Matewan, West Virginia.
way. Charismatic leaders can create large These are some of the key events in the
numbers of youthful terrorists. struggle of organized labor within the United
States.
I. FOUNDATIONS
28 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
the plant so that they could not work. The Philadelphia City Cavalry after the Great
workers assumed that Frick would do this Anthracite Strike in 1903–1904.
and reopen the plant using strikebreakers 1933—National Industrial Recovery Act
(employees who replace striking workers). insured collective bargaining rights. Wagner
Three hundred Pinkerton detectives came Act (National Labor Relations Act) created
by barge up the Monongahela River and the National Labor Relations Board in 1935,
tried to secure the plant. A battle ensued giving a real enforcement function to the
which lasted all day. The workers used a National Industrial Recovery Act.
small cannon to try and sink the barges 1937—Battle of the Overpass. During a strike
and set them on fire by pouring oil into the against the Ford Motor Company, labor
river and lighting it. The Pinkertons were leader Walter Reuther and a companion were
defeated and had to surrender (Fossum, severely beaten by Ford Service security
1982). Nine strikers and seven Pinkertons officers while not doing anything illegal. This
were killed (Gage, 2009). The militia were beating was not unusual except that it was
called in by the governor. Interestingly photographed by newspaper reporters. The
enough, Frick was later shot by an anarchist American public was not sympathetic toward
who attacked him in his home. unions as they were regarded as “communist”
1894—Pullman Strike—the Pullman or “anarchist.” With the Battle of the
Palace Car Company laid off half of their Overpass, however, the public was outraged
employees and forced the rest to take a at the actions of Dearborn, Michigan, police
40% wage cut. Workers were required to and Bennett’s Ford Service men—the end of
live in company housing. After the wage “the mean years” of labor relations.
reductions, there was no reduction in the 1947—In 1946, there were a large number of
rent for the housing. The local strike became strikes; organized labor reached its zenith in
a sympathy strike as American Railway this period. Congress passed the Taft-Hartley
Union (ARU) members refused to handle Act. One of the provisions of the Act is that
trains with Pullman cars. Trains were the U.S. president, through the attorney
stopped and Pullman cars were uncoupled. general, can obtain an injunction against
The rail owners assembled trains so that a strike or lockout if a substantial area is
if Pullman cars were uncoupled, mail cars affected or national security is
would also be cut off. Interfering with the threatened.
mail was a federal offense. Eugene Debs, the
ARU leader was sent to jail for conspiring Today, there are specialized contract secu-
to obstruct the mail. President Grover rity firms that have strike security forces. These
Cleveland called out the Army so that the firms supply consulting and guard service to
mail could be delivered and the strike was companies having labor difficulties. They gen-
broken (Fossum, 1982). erally employ persons with a military back-
1900—Latimer Massacre—large numbers ground and provide their personnel with
of Serbian miners were killed by sheriffs’ training in labor law, crowd management, and
deputies during a strike in Latimer, so on. These specialized firms are able to man-
Pennsylvania. The United States offered an age volatile labor disputes with minimal harm
official apology to the government of Serbia to persons or property. Additionally, the collec-
after this incident. tive bargaining rights of workers are upheld.
1905—Pennsylvania State Police—first Strikes are handled in a much more professional
modern state police force. Formed from the manner than in the past.
I. FOUNDATIONS
LAW 29
PRACTICAL EXERCISE
It is 1920. The Great War is over and you are a military veteran with service in World War I. You
are out of work and have several children to feed. The best employment prospect is with a private
security firm that is doing strike security work. How do you feel about this?
I. FOUNDATIONS
30 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
2. Civil law relates to legal standards, which evidence and can’t be sold). The processes
govern the conduct between individuals. for forfeiture and civil recovery are not
Civil law relates to contracts that include the encumbered by constitutional protections
following. to the accused (as in criminal law) and the
a) Contract security service burden of proof is a preponderance (majority
b) Private investigative service such as 55%) of the evidence. In a criminal
c) Armored car service case, proof beyond a reasonable doubt (99%
d) Personal protection/executive protection certainty) is required. Civil laws are being
service used increasingly to combat criminal activity.
e) Alarm monitoring Civil law also covers torts or private
f) Alarm response wrongs committed against another, such
g) Employment contracts for management as defamation, invasion of privacy, assault,
and labor battery, and so on. Torts may be thought of
h) Nondisclosure pacts—agreements not to as the civil equivalent of crimes. It must be
disclose proprietary information, such as borne in mind, however, that the definitions
trade secrets are different.
i) Noncompetitive agreements or pacts— Negligence is a failure to exercise reasonable
agreements not to seek employment and due care (such as not following a
with competing firms within a specific recognized standard) by doing something
time frame and/or geographic area after dangerous or not doing something, which
termination of employment is necessary for safety. In order to prove
j) Leases between landlords and tenants— negligence, the plaintiff (party bringing
these can be individuals who rent the action or suit) may have to show the
apartments or businesses, such as in following:
shopping centers ● The existence of a duty
Civil law also involves asset forfeiture and ● A failure to perform that duty
civil demand or civil recovery. The former ● Injury or harm occurring to a party to whom
is a civil process used by law enforcement
the duty was owed
officials to obtain property used to commit ● The harm was reasonably foreseeable
crimes. Once a drug dealer or fence has ● The harm was caused by the failure of the
been arrested, their home, car, and any
defendant to perform the duty (Hertig,
other asset they have that has been used
Fennelly, & Tyska, 1998)
in the commission of the offense is taken.
This is a civil process before any criminal 3. Administrative or regulatory law is
conviction has occurred. Civil recovery is established to regulate technical aspects
used by merchants to obtain monetary fees of society. Administrative or regulatory
from shoplifters. Shoplifters are sent a civil agencies are created by the federal or
demand letter stating that if they do not pay state legislature. These agencies have the
a certain fee they will be sued. As a civil suit authority to create rules and regulations.
will ruin someone’s credit, many people They investigate and enforce compliance
simply pay the money, which is collected by with those regulations. They also adjudicate
a third party. This is much more effective for violations and mete out punishments. These
merchants, as they do not have to proceed agencies are very powerful. Complying with
with criminal prosecution, tying up time their regulations is extremely important; so,
and merchandise (this must be kept as too, is complying with them and remaining
I. FOUNDATIONS
HISTORY OF SECURITY SERVICES 31
in business. Federal administrative agencies National Labor Relations Board, and so
in the United States include the following: on) that regulate the employer-employee
a) Occupational Safety and Health relationship. Labor law also consists of
Administration contracts between employees and employers
b) National Labor Relations Board and privacy issues.
c) Environmental Protection Agency
d) Federal Aviation Administration
e) Nuclear Regulatory Commission HISTORY OF SECURITY SERVICES
f) Federal Communications Commission
g) Equal Employment Opportunity Security services or contract security agen-
Commission cies have played a large role in both public and
Agencies also exist on the state level, private protection. Outsourcing or contracting
such as CALOSHA or the Pennsylvania for security makes economic sense. Flat hourly
Department of Labor and Industry, Human rates are charged and clients do not have to
Relations Commission, Alcoholic Beverage worry about benefit costs and associated human
Commissions, Private Detective and Protective resource management issues. The client can
Agent Licensing Board, and so on. There hire as many personnel as desired for as long as
are also city or municipal boards of health, desired. This provides for flexibility in protection.
building inspection, zoning, and so on. These Additionally, contract service firms may have
regulate food handling in public kitchens, specialized expertise that the client does not.
fire escapes and fire detection equipment, the There are career opportunities here for
number of parking spaces required, setback those who are adept at sales, client relations,
rules from property lines, building permits, and HRM. Security services are growing and
and so on. For information on state security will continue to do so. In addition to standard
licensing, see the International Association of “guard service” there are alarm response, alarm
Security and Investigative Regulators (http:// monitoring, armored car, personal protection
www.iasir.org). specialists (PPS), and private investigation.
The 1990 Campus Security and Student There will always be a need to understand the
Right to Know Act passed in the United dynamics of the outsourcing process for both
States requires colleges to report all crimes contractors and clients.
committed on their campuses. They While contract security firms usually offer
must also publish crime statistics. The private investigative services, most firms spe-
Act is enforced by the U.S. Department cialize in one or the other. Early security service
of Education, which can levy monetary firms began by offering investigative services
penalties for noncompliance. Another and later transitioned into contract security. This
important regulatory law is the Bank happened because there were greater markets—
Protection Act of 1968. This law established and profits—in providing security service. In
security standards to be used in banks that some cases, this continues to occur, although
are insured by the Federal Deposit Insurance the growth in demand for private investigation
Corporation (FDIC). Portions of the Act are is robust enough to allow companies to be prof-
enforced by different federal agencies. itable while keeping investigation as their sole
4. Labor or employment law consists of service. Pinkerton, a Scottish immigrant, became
statutory laws, court decisions, and involved in investigation by accident. While
administrative agency regulations (Equal searching for wood to make barrels, the young
Employment Opportunity Commission, cooper discovered a gang of counterfeiters.
I. FOUNDATIONS
32 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
Pinkerton established the largest protective and monitors home alarm systems and has
investigative agency in the world with branch become a household name in the United
offices in many countries. By the mid-1990s, States.
Pinkerton had 250 offices worldwide with over 1909—William J. Burns—Burns was
50,000 employees (Mackay, 1996). Pinkerton had the original head of the “Bureau of
extensive centralized records and a code of eth- Investigation,” which later became the
ics, used undercover investigation, employed Federal Bureau of Investigation under
the first female detective (Kate Warne—60 years J. Edgar Hoover in 1932. William J. Burns
before the first female police officer), and used founded the William J. Burns Detective
wanted posters. Pinkerton is credited with Agency in 1909. He was virulently
being the first to start a security service; in actu- antianarchist and anticommunist, believing
ality there were other services started before that unions were being controlled by
him, but none has become as well known as subversives and that unions were fronts
his was. for anarchists and communists. Burns
was known for his ability to use evidence
1858—Edwin Holmes started the first collection at the scene of a crime to capture
“central office” (central station) for alarm suspects. In 1910, he apprehended the
monitoring and response. Today we use McNamara brothers, who were president
the term “central alarm station” or “central and secretary of the United Iron Worker’s
station.” Many central stations are contract, Union, for a bombing of the Los Angeles
off-premises facilities that monitor intrusion, Times building. He traced them from parts
fire and process (temperature or pressure of the unexploded bomb. The McNamaras
gauges), or duress (emergency medical or were supposedly avowed anarchists. In the
robbery) alarms. Customers pay for the 1970s and 1980s, Burns International Security
monitoring services. Holmes Protection Services, Inc. became one of the largest
provides monitoring and alarm response contract security firms in the world. It has
services. since been acquired by Securitas.
1874—American District Telegraph (ADT) 1954—George Wackenhut founded the
was founded. ADT became the largest alarm Wackenhut Corporation (wackenhut
company in the world. Their main product .com—see the job info on the Custom
was magnetic contact switches Protection Officer program). The firm
(the little gray boxes above doors and provided security services in over 55
windows in restaurants and stores). Today different countries backed by a staff of 70,000
they provide a wide variety of electronic employees. It also provided staffing for
security equipment. They also provide prisons on a contract basis. Wackenhut was
CCTV, access control systems, and fire acquired by the Danish firm Group4falck
protection systems. ADT bought Holmes in 2002. The parent firm is now known as
Protection in the late 1990s. ADT is now “G4S” and Wackenhut is “G4S Wackenhut.”
a unit of Tyco Fire and Security Services G4S Wackenhut provides access control
(Purpura, 2002). and perimeter security to the U.S. army in
1891—Brinks Armored became the largest various overseas locations (http://www.g4s
armored car company in the world. Founded .com/uk/uk-working_for_g4s/uk-join_us/
by Washington Perry Brinks, the firm trans- uk-vacancy-kosovo.htmTail. Retrieved
ports cash and other valuables. Brinks also October 10, 2009).
I. FOUNDATIONS
THE PATH TO PROFESSIONALISM 33
I. FOUNDATIONS
34 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
I. FOUNDATIONS
CONTEMPORARY CAREERS IN ASSET PROTECTION 35
as well as legal issues relating to privacy, search protection, such as those that detect vibration
and seizure, property rights, and the rights of on a chain link fence or beam-type systems,
employees (legal consultant role). Patrol officers such as microwave placed along a perimeter
must also be able to respond to problems that line), or area protection (volumetric intrusion
may occur, such as slippery walkways, blocked detection for an area such as passive infrared
emergency exits, hazardous materials spills, or PIR or ultrasonic).
fires, fights, or crimes in progress. Obviously, 2. Fire alarms that may be ionization detectors
patrol officers need a variety of skill sets. They (responding to the products of combustion
must be competent in many things. in the earliest phase of a fire).
Retail loss prevention agent: Positions that 3. Emergency, panic, or duress alarms, which
are available with many large firms. These jobs are activated by someone in distress.
offer persons the ability to learn valuable investi- 4. Process alarms that monitor equipment or
gative skills, such as surveillance and interroga- utilities (temperature, water pressure, air
tion. They are readily available and often accept pressure, power).
part-time employees. There are extensive oppor-
tunities for advancement within retail security! What began as a security office is now a cen-
Central alarm station operator/dispatcher: tral alarm station/dispatch center. Obviously,
Security officers in many environments will act facility managers must plan for the eventual
as dispatchers or central alarm station opera- expansion of their security offices. Serious
tors. They will monitor alarm panels, CCTV thought must be given to alarm response. If
screens, and electronic access control systems. alarms notify property managers of problems,
As technology expands, so does the job of the there must be a rapid, effective response to
central alarm station operator. These central resolving those problems. This is a key issue
alarm stations may be either proprietary or con- in protection that has traditionally been over-
tract. In a proprietary “in-house” setting, central looked. Contract alarm response or patrol car
alarm stations evolve over time. Many facilities service is one option: what Edwin Holmes
develop central alarm stations in an incremen- started in 1858 needs to be integrated into a
tal manner. They often start with a security contemporary asset protection system. Persons
office that has a desk, a telephone, and a radio. beginning careers in asset protection should
After a while, the organization will add addi- seek to understand the central alarm/dispatch
tional monitoring systems. First, there is a cam- operation. It is “the brain” of the security
era observing the lobby. Next, there is a camera operation, serving as a command, control, and
on the parking area. Then there may be intru- communications center.
sion detection systems in sensitive areas which Auditor/investigator: Auditors check on
annunciate (terminate) at the central office. Fire things such as financial records (financial
alarm panels may also be located there. Finally, audits) or procedures (procedural or opera-
an electronic access control system is added tional audits) to see if conditions are what they
which has a monitor in the central office. are supposed to be. Audits seek to uncover
There are access control systems and alarm deviations from procedure, errors, or criminal
systems. The reader must bear in mind today behavior (Purpura, 2002). A deviation from a
we have various types of alarms. procedure might be documenting something
that the writer did not verify occurred—taking
1. Intrusion alarms, which are point protection a “shortcut.” Audits may also uncover errors
(on a specific point, such as door or such as mistakes made in pricing merchandise
window), perimeter protection (fence or forgetting to record required information.
I. FOUNDATIONS
36 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
Criminal behavior may include falsifying graduate students. Winning papers are eligible
employee attendance records or removing raw for cash prizes.
materials from the workplace. Audits may start The International Foundation for Protection
investigations or investigations may launch Officers also features links to colleges on their
audits to see the scope of the problem. Audits Web site (http://www.ifpo.org). The foundation
may detect loss stemming from waste, error, has also provided scholarships to faculty who
crime or unethical/unprofessional practices. In teach security courses.
that sense they support the WAECUP Model of Networking is crucial to career success in
Loss Control. security or investigation, as not all good jobs
Private investigators: They work for com- are advertised publicly. Almost all are obtained
panies, individuals, or governments on a fee through personal contacts. There is an old
basis. They contract out to perform various saying:
types of investigative activity. Criminal inves- “If you don’t know nobody, nobody knows you.”
tigation done by private investigators includes This saying makes up for in accuracy what
undercover investigation of workplace theft, it lacks in English. Professional contacts can
sabotage, or drug abuse. Surveillance of sus- be gained through organizational member-
pected employees may also be conducted. Some ship, such as ASIS International, IFPO, or the
private investigators are forensic accountants, International Foundation for Cultural Property
trained to investigate fraudulent accounting Protection (http://www.ifcpp.org). Professional
and present a case in court. Fraud examination organizations usually have job placement ser-
is a large and growing concern of all types of vices and membership directories. They provide
organizations, not just insurance carriers. Visit members with the opportunity to meet oth-
the Association of Certified Fraud Examiners at ers in their field and discuss matters of mutual
http://www.acfe.com for more information on concern. Attendance at seminars sponsored
fraud examination. by professional organizations is another way
Specialized security functions such as K-9 to network. Management-level personnel can
handlers, crowd management specialists who participate in the International Association of
work concerts in arenas, strike security person- Healthcare Security & Safety (http://www.iahss
nel, and information technology (IT) specialists .org) or the International Association of Campus
also exist. These persons are specialists with Law Enforcement Administrators (http://www
unique skill sets. They have prior experience, .iaclea.org).
training, and education that qualify them for Professional development can be obtained
their positions. They have “paid their dues” through a variety of sources. Professional orga-
and evolved in their careers. nizations offer seminars and online programs.
Educational opportunities are available both Some offer certification programs such as the
online and in traditional college programs. International Foundation for Cultural Property
Persons wishing to move up the ranks of man- (http://www.ifcpp.org) that offers both the
agement will need higher education. The Web Certified Institutional Protection Specialist
site asisonline.org has information on careers (CIPS) and Certified Institutional Protection
and academic programs. There is an extensive Manager (CIPM) designations.
listing of colleges that offer academic course-
work in security. In addition, ASIS offers full- “Learning never ceases.”
time college students membership at greatly This chapter discussed the past and present.
reduced rates. There is also a Student Paper The future belongs to those who reach out
Competition for both undergraduate and and grasp it.
I. FOUNDATIONS
EMERGING TRENDS 37
EMERGING TRENDS
Security service firms are moving into new Threats to commerce/supply chain security
markets. Providing security at special events are necessitating more attention. Guarding drug
is one example. While contract security at con- shipments against hijacking or covert diversion
certs or sporting events has been going on for is an example. As fears of pandemics grow, as
a long time, now companies are hiring special- does the abuse of prescription drugs, pharma-
ized service firms for other types of events. The ceuticals have become targets for theft.
company Christmas party or picnic may be Piracy on the high seas is rampant. This is of
examples. Securing abandoned buildings is a concern, as approximately 90% of the world’s
new line of business where contract firms have cargo travels by sea. Consulting, kidnap and
partnered with exterminators to offer a complete ransom negotiation, and armed security officers
package of care for a vacant property. Recovering are services that can be offered to the shipping
assets in the wake of floods and other disasters is industry. Just as the Pinkerton National Detective
another new line. This goes with disaster recov- Agency provided protection for railroads in the
ery services where firms will take care of food, nineteenth century, so, too, will contract firms
clothing, lodging, and toilets after a disaster. offer services relating to goods in commerce.
Protection of government buildings and Supply chain security efforts are not only
transportation of inmates are other expanding contracted out; more and more organizations
lines of business for contract firms. The federal are taking steps to ensure the protection of their
government in the United States is probably the supply chains internally. And theft is only one
largest employer of contract security services. source of loss for an organization. Any disrup-
There are also more security services for tion of a supply chain, be it due to strikes, civil
governments and armed forces in hostile areas. unrest, terrorism, or natural disasters, costs an
These services include personal protection and organization money. An increasing number of
facility security. The clients may be govern- organizations will have personnel on board who
ment or military organizations. They may also will work on supply chain security. These indi-
be private companies. In war-torn areas of the viduals will perform risk assessments, monitor
world, such as Iraq and Afghanistan, contract various aspects of the supply chain, and investi-
security personnel provide personal protection gate problems as they occur.
for VIPs. They are also providing fixed site secu- Along with this is an increased emphasis
rity in unstable areas where there is exploration on international crime and loss problems. The
and development of natural resources. Oil, gas, International Foundation for Protection Officers
and minerals all require processing and they all has designated persons as Certified Protection
require protection. These resources are some- Officers in over 50 different countries. ASIS
times highly valuable (such as precious metals) International continues to expand with local
and can be stolen by criminal or terrorist gangs. chapters being formed in new areas of the
They may also be targets of insurgents and ter- world. There are more international security
rorists who wish to disrupt the flow of oil or gas. conferences with attendees from private compa-
As energy demands increase so, too, does the nies, nonprofit organizations, and governments
need to find new sources of fuel. Many of these attending.
sources are in remote areas where insurrection, Identity theft/fraud will continue to grow.
terrorism, or banditry can be a problem. New schemes and means of acquiring personal
I. FOUNDATIONS
38 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY
and financial data will evolve. As a result the require liaison between police and corporate
convergence of physical and IT security will security departments in banks and credit card
increase. A greater use of biometric access sys- companies as well as state and federal agen-
tems for entry into databases is occurring. So, cies. Identity theft/fraud is multijurisdictional.
too, are educational initiatives designed to pre- Perhaps a historical cycle is repeating itself; out-
vent the problems in the first place. Security laws in the American West committed crimes in
departments in all organizations will play a various jurisdictions, making it difficult to appre-
greater role in educating the workforce about hend them. Filling the void were the Pinkertons
various types of hazards. and other private investigative agencies. Later on,
Investigative efforts in the wake of identity governmental investigative agencies were formed
theft/fraud are also growing. These investigations to combat the problem.
I. FOUNDATIONS
SECURITY QUIZ 39
I. FOUNDATIONS
This page intentionally left blank
C H A P T E R
3
Role of the Professional
Protection Officer
M. A. Kevin Palacios and Christopher A. Hertig
41
42 3. ROLE OF THE PROFESSIONAL PROTECTION OFFICER
but the core of the job description remains the few off-duty police. Sometimes persons in the
same. A person who chooses a career path in military are assigned to security work temporar-
safety or security will never stop being a pro- ily within the armed forces. In other cases they
tection officer. They will never cease to protect work for a civilian employer as a security officer
people, information, assets, reputation, and the or retail loss prevention agent.
environment surrounding an organization. The key is that the person’s major focus is on pro-
The protection officer may be acting as the tection of others, tangible assets such as property, or
agent or representative of the landlord. They intangible assets such as information or reputation.
may not have any arrest authority beyond that Legal authority or job title is not the determinant of
of a regular citizen. In other cases they may what a “protection officer” is.
have some type of police commission with spe-
cific arrest authority: they may arrest for certain
offenses and/or within a specific area. They may
LEVELS OF PROTECTION STAFF
be members of a law enforcement organization
A general framework for the design of security
whose job assignment is protecting a public fig-
functions within an organization is as follows:
ure, coordinating crime prevention activities,
or guarding government buildings. Protection 1. Nonprotection employees. They need basic
officers may be civilian or military, sworn or information about self-protection and some
unsworn. Job titles vary considerably; a protec- method to report hazards and threats.
tion officer may be referred to in different ways. 2. Basic Level Protection Officer. Includes
While the more common titles are “security offi- everyone from the protection team who must
cer,” “security guard,” or “retail loss prevention follow simple orders, look after activities
agent,” some protection officers may have the carried out by nonprotection employees, and
title of “police officer,” “campus police officer,” work in a low- to mid-threat environment.
“special officer,” “crime prevention coordina- Basic level officers don’t need any previous
tor,” “loss prevention officer,” “deputy sheriff,” experience and might (or might not) need
“military policeman,” and so on. (In many states operational—basic level—specialized skills.
these titles are controlled by state law. The state This person needs a basic training, enough to
statutes should be reviewed in each state to cover foreseeable situations he or she might
determine the words you may or may not use.) encounter. Completion of state or provincial
This protection officer could have full-time, training, Officer Basic Training, Basic
part-time, or occasional employment. Part-time Protection Officer programs through AST
security work is very common in some areas. Corporation, Basic Security Officer Training
Many security service firms are largely staffed Series through the Professional Security
by part-time personnel. Amusement parks that Officer Training Network, 360 Training
are open during the summer may employ a large programs, and so on.
seasonal staff during the busy season. The secu-
Examples include uniformed guards, door-
rity department may be managed by a small core
men, patrol guards, and so on.
of permanent persons. It is not unusual for police
officers to work occasional security details. This 3. Intermediate Level Protection Officer. The
may be while they are on official police duty or Intermediate Level officer is related to the
it may be while off-duty for a private employer. CPO; it includes everyone who must follow
Security service firms that provide protection more complex orders, look after processes
during special events may use a combination of carried out by protection and non-protection
regular staff, part-time probation officers, and a employees, works in a mid- to high-threat
I. FOUNDATION
MAJOR ROLES OF PROTECTION OFFICERS 43
environment, and needs previous experience Management representative—the officer acts
and specialized skills. This person needs as an agent, a representative of management to
a complete understanding of the various employees, visitors, and others. This is where the
unexpected situations he might encounter. officer is concerned with representing the phi-
Therefore, training has to be very complete. losophies of management (employer or client). In
This is why they should complete both order to do this effectively, they must thoroughly
the Certified Protection Officer, (CPO) understand the mission statement of the organi-
certification and employer training. zation. They need to know what the policies are
Examples include group leaders, personal and the underlying philosophy behind them.
protection specialists, retail loss prevention The major emphasis in the management repre-
officers, radio operators, central alarm sentative role is on positive relations with the vari-
station monitors, contract security in high- ous publics with which security departments deal
threat zones, and so on. (employees, customers, visitors, patients, ven-
4. Advanced Level Supervisory and Managerial dors, local law enforcement officers, etc.). A solid
Protection Officers. This level correlates background in public and customer relations is a
with the educational and experience level necessity. So, too, is diplomacy when dealing with
of individuals who have been designated other departments, external agencies, and so on.
Certified in Security Supervision and Another aspect of this role is educational.
Management (CSSM). It includes everyone Security officers may be very active in educating
who must give orders and make decisions employees, visitors, students, guests, patients,
regarding personnel. This person must have and so on about safe practices. As the officers
an understanding of how the full entity grow professionally, they may become increas-
(organization) works, people management, ingly involved in educational efforts. As the
leadership, and motivation. This is a line security industry becomes more complex, requir-
supervision or entry-level management ing the protection of more intangible assets, this
position. This individual must have met all educational role will become more common.
CPO certification requirements in addition Intelligence agent—in this role the officer
to supervisory and management courses. collects information for management. The offi-
Completion of the Foundation’s Security cer must have an understanding of what infor-
Supervision and Management Program is mation is pertinent. They cannot pry into areas
recommended. that are not managerial concerns related to loss.
At the same time, they must be effective at gain-
Examples include shift leaders, security super-
ing critical loss-related information.
visors, asset protection team leaders, and so on.
While application of the Waste, Accident,
Error, Crime, and Unethical Practices (WAECUP)
model is useful, another point to remember is
MAJOR ROLES OF PROTECTION
that large problems start as small ones. Issues
OFFICERS
such as terrorism, crimes, safety hazards, envi-
ronmental hazards, data loss, major embarrass-
There are several major roles that protection
ments, and so on generally begin as unusual or
officers fulfill.
out-of-the-ordinary situations. From there, they
1. Management representative mushroom into serious problems.
2. Intelligence agent An old safety concept is that there is often “a
3. Compliance or enforcement agent leak before a break.” That is, a major problem
4. Legal consultant starts out as a small issue. A crack in a wall or
I. FOUNDATION
44 3. ROLE OF THE PROFESSIONAL PROTECTION OFFICER
floor may mean significant structural damage. or “mental rehearsal.” It is simply a process
It may also indicate extensive erosion of soil where officers construct scenarios and
underneath the building. It is a small crack, but review how they would be handled. These
it may indicate much larger problems. could be crime, terrorism, emergency or
When investigating crime or misconduct, the crisis management concerns, and so on.
principle of expansive significance is important Safety issues may include slip and falls,
to remember. “Minor is major.” Minor criminal structural collapse, persons tripping, or the
issues often turn out to be of major significance onset of medical problems (diabetic shock,
once they are fully investigated. Major crime heat stroke, seizures, heart attacks, etc.).
problems are resolved through combating
minor criminal behavior. The same is true of Playing the “What-If? Game” helps prepare
employee misconduct; it often turns out to be the officer for response to the event as if they have
more extensive than it initially appeared. seen it before. It also aids in uncovering unforeseen
loss events/scenarios. This is part of the ongoing
In short, professional protection officers must risk assessment that protection staff perform on
collect intelligence on changes in the environment,
unusual situations, or suspicious persons.
a daily basis. Note that significant issues should
be documented. Preferably this documentation is
Most, but by no means all, of the intelligence reinforced by personal communication with the
agent’s role is performed while the officer is on appropriate supervisory personnel.
patrol. Officers on patrol should always do the Obviously, proficiency in human and public
following: relations is important to fulfilling the role effec-
1. Look up—see if there are any pipes leaking tively. Most information comes from people.
or water coming from another floor. Check Officers who are approachable learn more about
for items improperly stacked. Look for what is going on in the environment they are pro-
problems with the ceiling or roof. tecting. Officers must be approachable but they
2. Look down—look for problems in footing. cannot use the workplace as their social network.
Look for spills on the floor from soft drinks, They must exhibit interest in people and processes
bottles of liquid detergent, liquid from pipes without getting personally, romantically, or finan-
or storage tanks. Look for ice or snow. Look cially involved. Professional protection officers
for carpet that is not properly fastened engage in short, productive interactions with peo-
down. Look for tripping hazards such as ple. They make every conversation an interview.
items left on the floor. Enforcement or compliance agent—this is
3. Look around—check for equipment and where the officer enforces the rules of the envi-
machinery that are not turned on or off when ronment. He or she gains compliance with the
they are supposed to be. Verify that all trash rules. The officer must know the rules to be
collection points are properly maintained. enforced. He or she must be thoroughly conver-
Trash can become a safety or fire hazard. It sant with them. The officer modifies and man-
may also indicate attempts at theft where an ages human behavior so that the rules established
employee discards something for later retrieval. by management are followed.
It may also indicate things being thrown out Sometimes the term “enforcement agent” is too
that should not be. Trash collection points may strong, too law enforcement-oriented to work in
relate to any or all parts of the WAECUP model. a security setting such as a hotel, resort, or office
4. Whether on patrol or on post, officers should complex. Protection officers must be acutely aware
always play the “What-If? Game.” This is of the cultural expectations of their work environ-
also known as “constructive daydreaming” ment. They must understand the “territory.”
I. FOUNDATION
WHAT IT MEANS TO BE A PROFESSIONAL 45
In some cases they will have to be very direc- first step but understanding how to interpret it
tive; in most they will be more like “compliance and apply it to a specific environment is what is
ambassadors.” Most people simply need to be really needed. Personnel knowledgeable about
reminded about what the rules are. Diplomacy this are in demand. Those who wish to move up
and tact are the most frequently used tools of into leadership roles will jump at every opportu-
professional protection officers. nity to learn about the interpretation and appli-
There are two major aspects to enforcement: cation of regulations, standards, and guidelines.
1. Procedural—the “what” of enforcement.
The officer must know what to enforce.
This includes all rules and procedures. The WHAT IT MEANS TO BE A
officer must know what the rules are and PROFESSIONAL
review them regularly. Job knowledge in this
area is a prerequisite to success. Note that A professional protection officer distin-
in many instances the confidence displayed guishes him- or herself by dedication and com-
by a knowledgeable officer goes a long way mitment. They are not simply performing a
toward convincing people to listen to them. job in order to receive compensation. They are
2. Interpersonal—the “how” of enforcement. instead dedicated to serving their employers,
This entails interpersonal skills and clients, and the community as a whole. Because
communications. Using the proper words, of their commitment, they stand out from oth-
articulating clearly, and speaking at the ers who may share their same job title and pay
proper volume and tone are crucial to grade. They have achieved professional status,
effective communication. The remainder a few aspects of which are discussed below:
of human communication—about two- ● Follows a code of ethics. The International
thirds—is nonverbal. Posture, appearance,
Foundation for Protection Officer’s code
and gestures come into play here.
of ethics is presented in this book. Each
Legal consultant—In this role the officer item in the Code contains a key aspect of
knows the relevant legal standard and applies professionalism.
it. The officer makes legal assessments. These ● Shares a common history with his
assessments relate to a variety of issues: privacy, colleagues. A glimpse of the professional
search and seizure, property rights, and compli- history shared with other protection officers
ance with administrative laws, and so on. is displayed in various chapters throughout
A related compliance concern is making sure this text. A common history creates a bond
that all organizational rules are being enforced. between officers.
These rules often originate from professional ● Supports and works with colleagues. A
standards or guidelines. They may also be in professional protection officer respects and
place due to insurance company requirements. works with others. Officers analyze various
Contemporary protection officers are fac- problems and help each other address
ing increased demands in this area. The role of them. Effecting and maintaining productive
“legal consultant” is becoming more important. relationships with colleagues is very
It is also becoming increasingly complex. important.
Astute security professionals will learn all ● Owns a common body of knowledge. The
that they can about laws, standards, and guide- different chapters of this book cover the
lines. They will keep abreast of them and be varied aspects that a contemporary protection
able to apply them: knowing a regulation is the officer must master in order to succeed in an
I. FOUNDATION
46 3. ROLE OF THE PROFESSIONAL PROTECTION OFFICER
I. FOUNDATION
WHAT IT MEANS TO BE A PROFESSIONAL 47
Of course, while fulfilling ever broader Cycle (Brown & Blackmon, 2001); the protection
duties, the protection officer must always process is no exception:
prioritize his attention to the most critical ● PLAN—Preventative Functions. The cycle
resources to be protected. These are (in order
begins by planning protective measures
of priority):
BEFORE they are performed.
● PEOPLE. Employees, agents, third-party
● DO—Mitigation Functions. All protective
workers, customers, visitors measures performed DURING daily
● INFORMATION. Physical and digital operations.
records, proprietary info, other information
● CHECK—Loss Event. Verification of
to maintain confidentiality, integrity, and protective systems takes place during loss
availability events, but the effectiveness of a system
● ASSETS. Those that the organization could also be verified by a protection officer
owns, manages, maintains, controls, or is during audits and inspections.
responsible for (facilities, goods, assets of
● ACT—Response Functions. AFTER an
monetary value) emergency arises, the officer must respond
● REPUTATION. Hard-earned public image; accordingly, bring all operations back to
everything that contributes to the desired normal, and provide the cycle with the
positioning of the organization necessary feedback.
● ENVIRONMENT. Surrounding the
organization, natural, community,
stakeholders’ interests, social responsibility
P PREVENTATIVE
FUNCTIONS
MITIGATION
FUNCTIONS
D
Core Functions
The protection officer must become a valu-
able member of the organization; his partici-
pation in systems, processes, and activities
must always add value. The value added by a
protection officer ’s performance is measured in A RESPONSE
FUNCTIONS
EMERGENCY
C
the level of improvement that his work brings
into the organization’s protective process and
objectives:
● Vigilance of better practices and recommend Simply stated, in any given organization,
state-of-the-art standards (in addition the core function of the protection officer is to
to the organization’s regulator-specific ensure the continuity of the protective cycle;
requirements) to prevent all possible hazards from becoming
● Improving policies, procedures, job-specific threats, to mitigate threats in order to decrease
instructions (not just following them) the probability and potential consequences of
● Always reporting adequately and keeping its occurrence, but also to respond adequately
adequate records and timely to all types of loss events in order
to regain control of the situation while prevent-
It is widely accepted that every process of an ing future occurrences (beginning of a new-
organization must fulfill a Plan-Do-Check-Act improved cycle).
I. FOUNDATION
48 3. ROLE OF THE PROFESSIONAL PROTECTION OFFICER
I. FOUNDATION
SUMMARY 49
how to act, and when to report. At the same contracts to sell all empty containers of
time, the supervisor organizes a talk to hazardous materials to a recycling plant that
employees given by the local police about could treat them accordingly—this funds
crime awareness and the effects of crime in the whole campaign. The company revises
the organization (MITIGATION). its liability insurance to include this newly
● The supervisor then initiates an internal discovered risk while negotiating a premium
investigation while reporting this risk to reduction based on the calculated associated
management. She recommends changes value of potential loss (RESPONSE).
in procedures (employees will have to
exit the premises through the front door),
equipment (garbage containment area needs
to be fenced in), and people (recommends Around the Globe
changing the patrol procedures to include Financial austerity and competition among
a more thorough check of the trash area) organizations show the importance of loss pre-
(RESPONSE). vention efforts to all sizes of organizations
around the globe. This has also pushed com-
mercial organizations to seek new markets and
ADVANCED PROTECTION resources in different areas of the world. Some
OFFICER organizations with high-risk appetites are ven-
turing into historically inhospitable environ-
ments. Protection officers at these firms are
● It has been reported to the Health, Safety, facing broader language and cultural challenges.
Security, and Environmental Quality Laws and regulations vary greatly in differ-
manager of a petrochemical facility that ent regions of the world. Nevertheless, huge
someone is stealing empty containers from efforts are taking place to standardize proce-
hazardous materials. He identifies this as dures, training, and risk management models
a health and environmental threat, since all over the world.
inhabitants of poor neighborhoods in the
surrounding area might be using them
to store water for washing and cooking
(PREVENTION). SUMMARY
● After assessing the risk, he sets up
an awareness campaign to train the A professional protection officer is dedicated
surrounding neighbors of the threat the to protecting people, information, physical
empty containers pose. The company gives assets, reputation and the environment sur-
away new containers to these people, rounding organizations. As a professional, the
while profiting from a positive Socially officer follows a code of ethics, shares a com-
Responsible Capital Campaign (goodwill mon history with his colleagues, and owns a
from the villagers) (MITIGATE). common body of knowledge.
● As part of the campaign, the firm arranges The titles and designations given to protec-
for doctors from the closest public hospital tion officers may be insufficient when we need
to measure levels of contamination among to express the tasks these dedicated men and
villagers and the nearby river. It also women perform.
I. FOUNDATION
50 3. ROLE OF THE PROFESSIONAL PROTECTION OFFICER
EMERGING TRENDS
Despite the fact that the basic role of all pro- the carrying of weapons. Contemporary protec-
tection officers remains the same, the duties tion officers are more likely to have some type of
performed by protection officers are becoming weaponry than in the past. This may not be fire-
increasingly specialized: health care protection, arms; it is usually pepper spray or some other
retail loss prevention, campus security, school secu- nonlethal weapon.
rity (elementary to secondary grades), shopping There are also heavily armed protection offi-
center security, high-rise building protection, bank- cers in areas of the world where civil strife and
ing security, and so on. These specialties, or verti- warfare prevail. Hence, there is a more military
cal markets, continue to evolve. Some of the major emphasis than ever before. This trend will con-
contract agencies have coursework tailored to par- tinue as energy exploration moves into danger-
ticular sectors: these providers know full well that ous areas and people’s demand for security
they must take every means possible of meeting (employees at these locations) increases.
their clients’ specific needs. The American Society There is also a greater need for effective liai-
for Industrial Security International also has a large son with police, fire, emergency medical, and
number of councils devoted to specialty areas. In military organizations. Regional disasters such as
addition, there are professional associations such massive snow storms, earthquakes, or hurricanes
as the International Association of Campus Law require close cooperation. So, too, does the pro-
Enforcement Administrators, the International vision of security at major public events: there
Foundation for Cultural Property Protection, and are 50 or more different organizations providing
the International Association of Healthcare Security security at the Super Bowl in the United States.
and Safety that cater to specific sectors. The issue of training continues to be a concern.
Convergence between physical and logical While on paper it may appear as though security
security is well advanced, and convergence with personnel are being trained, closer inspection
other risk management functions within the reveals that this is often not the case. Sometimes
organizations (health, environment, safety, and in contract security there is a major disconnect
quality) are quickly gaining momentum; this between the corporate policy on training and
and the increased use of technology have what actually happens in the field. Maggio (2009)
demanded a new breed of highly trained/highly cites a 2005 study in New York City in which it
educated protection officers (especially at the was found that most security personnel reported
supervisory and management levels). having less training than was required. Moreover,
Protection officers are moving into more of the training that was given failed to emphasize
a leadership/ambassadorial role. While many terrorism or working with police or firefighters.
are entry-level employees, they are also coordi- One possible solution to the training dilemma
nators. They design and develop programs in is state or provincial mandates. A state or prov-
safety and security. They are more like profes- ince may require security officers to have a
sionals in that they use discriminating judgment, certain amount of training and to be licensed.
determining their own course of action rather Unfortunately, it takes a long time to get legislation
than being told what to do by superiors. enacted. Once it is in place the training is generally
They continue to utilize additional technol- minimal. Also, the regulations rarely cover all pro-
ogy and this technological prowess is giving tection officers; most state/provincial laws only
them a more professional appearance. So, too, is cover contract security personnel.
I. FOUNDATION
REFERENCES 51
There are some positives to this, however. in selecting a security service provider. Should
In the United Kingdom, the Security Industry this occur, there may be both an increase in costs
Authority is improving regulations for door and a degradation of service.
supervisors and others. There are inspections University degrees and internationally recog-
being done to insure that protection officers in nized professional certifications, such as the ones
clubs are licensed. In California and Ontario, awarded by the International Foundation for
both contract and proprietary security personnel Protection Officers and ASIS International, are in
are regulated. As of this writing, the province of great demand among quality-conscious employ-
Alberta is also moving in that direction. ers all around the globe. This trend will continue
Outsourcing of police services to private con- as society places more emphasis on obtaining
tract firms continues. While public police may credentials.
espouse the principles of community policing, they While degrees and professional certifications
may not be able to practice it. The reality is that are key components of professionalism, so, too,
public police have budgetary concerns and lim- are guidelines and standards. Voluntary guide-
ited resources. There is a movement in some areas lines or compulsory standards developed by pro-
toward having private security personnel perform fessional associations are having a major impact
order maintenance and quality-of-life patrols. A on the practice of protection. At the present time,
security service firm may be better equipped to do standards and guidelines are being developed
this in large shopping centers, parks, or housing on an array of topics such as the Private Security
developments. The public police can then focus Officer Selection and Training Guideline by ASIS
more on investigations, drug enforcement, and the International. This guideline establishes mini-
response to felonious behavior. mum criteria for selecting and training security
This shift also triggers an evolution of the officers. It is of obvious use to employers and
protection officer from being a “private secu- contract agencies. It may also assist regulatory
rity” officer to becoming something of a public bodies in establishing state or provincial licens-
servant. Such a role may create confusion in the ing requirements. (http://www.asisonline.org/
mind of the officer. Only thorough education, guidelines/inprogress_published.htm. Retrieved
training, and highly structured socialization will October 13, 2009). In addition to employers,
prevent role confusion. contractors, and governmental agencies, insur-
Another driver of this trend is the growth of ance carriers can use standards and guidelines.
security service providers. Some of these compa- Policyholders may receive a premium reduction
nies are quite large and operate internationally. for meeting a guideline or standard.
Others are not as large or international but may Obviously, standards and guidelines will
have a major share of a local or regional mar- have a major impact on the practice of protection
ket. Either scenario may lead to monopolization. over time. And the professional protection officer
Once this happens, the client has limited choice is a key factor in compliance.
References
Resources
Brown, S., & Blackmon, K. (2001). Operations management: Training courses online can be obtained through AST
Policy, practice and performance improvement. Woburn, Corporation (http://www.astcorp.com). There are a wide
MA: Butterworth-Heinemann. variety of courses! Specialized topics can be studied to
Maggio, E. J. (2009). Private security in the 21st century: prepare for new assignments or jobs. These courses can
Concepts and applications. Sudbury, MA: Jones & Bartlett. be used to target individual career interests and earn
I. FOUNDATION
52 3. ROLE OF THE PROFESSIONAL PROTECTION OFFICER
I. FOUNDATION
SECURITY QUIZ 53
b. Always reporting adequately and keeping 10. One of the steps taken during response
adequate records functions performed by protection officers
c. Improving policies, procedures, is recovery. Which of the following is an
job-specific instructions example of it?
d. All of the above a. Assets not damaged during a fire are
9. All actions taken before active protection quickly moved into a secure location
measures are performed can be included b. A claim is filed with an insurance
in the preventative functions. Which of the company
following is not one of those actions? c. Video footage from a bank robbery is
a. Preventative investigations given to local police
b. Identification of hazards and risk factors d. All the above
c. Induction training
d. Separate physically or in time the
aggressor from the objective
I. FOUNDATION
This page intentionally left blank
C H A P T E R
4
The Protection Officer as a Leader
Franklin R. Timmons and
Scott A. Watson
55
56 4. THE PROTECTION OFFICER AS A LEADER
I. FOUNDATIONS
THREE CRITICAL LEADERSHIP SKILLS 57
the most reluctant to assume those roles (Hertig EXPECTATIONS OF LEADERS
et al., 2008; Johnson, 2005; Sennewald, 1985;
Watson, 2007). Now that we understand what it takes to be an
effective employee, let’s examine what additional
TEAM MEMBER SKILLS: THE expectations we have of leaders. Remember, as
FOUNDATION OF LEADERSHIP we previously stated, a leader is any individual
who influences the willing actions of others in sup-
If you make the decision that becoming a port of organizational goals and processes.
leader is a worthwhile goal, the hard work Additional traits that can characterize a leader
begins as a team member. As team members, we in any organization include:
all have certain understood and implied respon- 1. Encourages open communication.
sibilities. Much of what we do is grounded in the 2. Advocates teamwork, to eliminate error
roles and expectations set forth by the organiza- traps, and strengthen firewalls.
tion we serve, but other characteristics include 3. Seeks out and eliminates organizational
the values that we, as team members, possess. weaknesses that foster error traps.
You cannot be an effective leader until you have 4. Reinforces desired work behaviors.
first met the basic tenets of being an effective 5. Knows the importance of preventing error
team member. Some very important attributes of traps.
being an effective team member are: 6. Challenges atmospheres that support
complacency.
7. Works to clarify organizational and
1. Communicate effectively; in fact, over- individual employee issues.
communicate. 8. Champions “across the board” adherence to
2. Be aware of error traps in the workplace or the highest standards.
daily work processes. 9. Ensures all workers fully understand the
3. Ensure that firewalls or protection is in potential consequences of unsafe behavior.
place to address the error traps. 10. Minimizes unfamiliarity among members of
4. Be motivated to improve operations; always the team.
strive for excellence.
Leadership involves the ability to understand
5. Continuously identify ways to improve
the goals of the organization we serve. For the
human performance.
sake of our chapter, let’s refer to everyone out-
6. Advise management when problems exist
side our sphere of influence as our customer. Our
in performing work.
clients, our managers and supervisors, our peers
7. Have a questioning and supportive attitude
and our community, no matter who that may
as well as a willingness to be a proactive
be, are our customers. Once we understand the
problem solver.
goals and objectives of our customers, then we
8. Embrace and practice the STAR concept
can better serve their needs (Hertig et al., 2008;
(Stop, Think, Act, Review).
Johnson, 2005; Sennewald, 1985; Watson, 2007).
9. Strive for success but have a plan for failure.
Continually ask, “What if?”
10. Take the time required to do the job right THREE CRITICAL
the first time. LEADERSHIP SKILLS
(U.S. Department of Energy, 2009) The development of leadership skills is a
lifelong process, so a complete list and detailed
I. FOUNDATIONS
58 4. THE PROTECTION OFFICER AS A LEADER
explanation of all the skill sets required for cognizant, not only of what constitutes violations
effective leadership could fill several librar- of law and organizational policy but also what
ies. What follows is an overview of three broad appears to violate such laws and policies. Only by
categories of practice that all leaders should doing so can the protection officer avoid doing
study and strive to master. wrong, while engendering confidence in those
Practice 1: Ethics. This is the cornerstone of he or she serves (Department of the Army, 2006;
the protection field. The organizations we serve Hertig et al., 2008; Johnson, 2005; Sennewald,
entrust us to protect their most valuable assets. 1985; Watson, 2007).
As a professional protection officer, you are Practice 2: Mission Focus. Organizations
likely to have access to secure areas of the facility exist for a purpose. This purpose is the organi-
in which you work. You are also likely to have zation’s mission or reason for existence. The role
access to confidential information, knowledge of the security department is to provide profes-
of specific security vulnerabilities, and the trust sional protective services that allow the organi-
of individuals within the organization. As a zation to accomplish its mission. The role of the
result of this expanded access, knowledge, and protection officer is to ensure that the security
trust, we in the protection field are held to a department accomplishes its mission to serve
higher standard of behavior than the popula- the organization. Those who wish to be lead-
tion at large. ers in the protection field must be familiar with
the organization’s mission and how the security
department contributes to accomplishing it.
I. FOUNDATIONS
THREE CRITICAL LEADERSHIP SKILLS 59
Practice 3: Interpersonal Communication. communicating nonverbally. No matter how
Organizations consist of groups of people all you or another individual communicates
working together under a common structure for nonverbally, clarification is critical in
a common purpose. An ability to understand checking for understanding. A nonverbal
and relate to people is a key element in effec- message has meaning, just as a verbal
tive leadership because it enables the leader to one does. The content is more difficult to
influence others to accomplish organizational “read,” but it is just as important. Many
and departmental missions. actions are interpreted with specific feelings,
There are four basic communication skills whether or not those feelings were meant
needed of every leader: verbal, nonverbal, lis- to be conveyed by the sender. By asking for
tening, and writing (Figure 4-1). The optimal clarification, misunderstandings can be kept
way to communicate is face-to-face. This allows to a minimum.
both the sender and the receiver of informa- 3. Listening Skills: Listening is often-
tion to engage in real-time verbal and nonver- times the most overlooked aspect of
bal analysis. It also allows for clarification and communication. Although more than half of
immediate feedback. our communicating time is spent listening,
compared to other types of communication,
1. Verbal Communication: Verbal
we spend a small amount of time learning
communication is comprised of the spoken
how to listen effectively or actively. In
word. It is very important because it allows
order to improve your listening skills, listen
us to:
actively, devoting all of your concentration to
a. Express ourselves in words.
the task. In fact, to be a good leader, we must
b. Ask questions and clarify nonverbal
be a good listener. We must understand what
communication actions.
the expectations really are and we must align
c. Provide feedback to the listener.
our roles and responsibilities to meet those
2. Nonverbal Communication: Nonverbal
expectations. Comprehension is the primary
communication is just that; communicating
goal of listening. We need to understand the
with your body or emotions. Some experts
message being sent before we can process
say that we do the vast majority of our
the information, evaluate it, and provide a
response. NOTE: If at any time, during this
process, you get confusing information—ask
for clarification!
4. Writing Skills: Writing is another key
element in communication and a skill
developed over a lifetime. As a professional
Verbal Non-verbal protection officer you may find yourself
writing incident reports, daily logs, email
communications, proposals, training
programs, statements, security survey
Writing Listening
reports, and annual reports along with a host
of other correspondence. There are many
ways to enhance one’s writing capability
but the best teacher is direct experience and
professional feedback from peers, managers,
FIGURE 4-1 Four key areas of interpersonal communication. supervisors, and customers.
I. FOUNDATIONS
60 4. THE PROTECTION OFFICER AS A LEADER
Over time, writing tends to improve, so assessing your strengths, weaknesses, and
don’t be discouraged if this is a weak area motivations, as well as those of others
for you. around you.
4. Continually Assess the Situation: Life
The protection officer who strives to main-
moves quickly and situations can change
tain the highest standards of ethics, constantly
instantly. As a professional protection
remains aligned with departmental and organiza-
officer and a leader, you must prepare for
tional mission, develops solid interpersonal com-
whatever is coming next. This can only
munications skills, and will make steady progress
be accomplished by training yourself to
in developing leadership skills (U.S. Department
develop and maintain situational awareness.
of the Army, 2006; Elgin, 1980; Sennewald, 1985).
5. Remember What Is Truly Important: As
mentioned earlier, ethics is the cornerstone
of the protection field and an organization’s
TEN STEPS TO BECOMING AN mission is its reason for existence. Always
EFFECTIVE LEADER keep in mind that ethics is more important
than a specific job; your career is more
The following 10 steps or precepts are pro-
important than a specific position and the
vided as a guideline for the serious student of
mission is more important than pet projects or
leadership.
short-term gains. Remembering what is truly
1. Be the Leader You Would Want to Follow: important will help you keep perspective.
Remember our definition of leadership: any 6. Take Action: A leader must know when
individual who influences the willing actions to act and when to wait. Failure to act,
of others in support of organizational goals especially in the protection field, can be
and processes. Ask yourself, “What type of very costly.
leader would I be willing to follow?” Once 7. Position Yourself and Your Organization
you answer that question, strive to be that Well: A leader must position him- or
leader! herself to be ready to take advantage of
2. Accept That Conflict Is a Normal and opportunities when they arise. As you move
Healthy Part of Growth: Remember that forward in any situation always be aware of
conflict is inevitable in all areas of human potential opportunities and take the time to
endeavor. While some conflicts can have position yourself and your team so that you
negative effects, the absence of conflict can capitalize on them when they arise.
would mean that everything would always 8. Be Adaptable: It is easy to get hung up on
stay the same and improvement would ideas, but not all ideas are acceptable to the
never occur. When engaged in a conflict, ask organizations we serve, nor are all ideas
yourself, “What progress can be made by workable. Always be ready to adapt your
actively listening to another point of view?” plans to suit the needs of the organization.
3. Know Yourself and Know Others: A leader Doing so will allow you to overcome
has to be completely honest about his or obstacles quickly and be more effective in
her strengths and weaknesses as well as the long run.
the strengths and weaknesses of others. 9. Avoid Predictability: The protection field
Only by doing so can the leader make requires structure and accountability, but
significant progress toward accomplishing it also requires staying one step ahead of
both the departmental and organizational situations and those who would victimize
goals. Train yourself to be constantly the people or organizations we serve.
I. FOUNDATIONS
PITFALLS OF LEADERSHIP 61
10. Collect and Use Information: Information is and managers hired to protect the status quo.
the lifeblood of an organization and affects Change not only drives fear, it also drives the
the functioning of an effective protection fact that more effort is required to complete the
team. As a leader, it is important to collect change. This entire process means moving out-
and properly use information about the side the individuals’ comfort zone. Many peo-
organization, threats, vulnerabilities, and ple believe in the saying “don’t rock the boat.”
a host of other matters. By being mission- An important point to consider is that the boat
focused and honing the interpersonal skills is already rocking. The question is, do we steer
necessary to develop good relationships, the organization (boat) into the wave or do we
the professional protection officer will find allow the organization to be broadsided? A key
more sources of information and, in turn, be element to help any organization better deal
a more effective leader. with the effects of change is TRUST.
Trust can’t be purchased. It is a house that
These 10 steps or precepts, if worked on, will
must be built one brick at a time. It opens the
help the professional protection officer in devel-
door to the path for success. Trust is earned
oping solid leadership skills (Watson, 2007).
through the following simple steps:
● Honesty—Can an employee/customer
THE LEADER AS AN believe what you say?
AGENT OF CHANGE ● Integrity—Can an employee/customer
believe you will keep your promise?
As the last link between senior management ● Openness—Can employees/customers
and line employees or customers, it is the lead-
believe that you will share what you know?
er’s job to assist in the implementation of change.
To do this, certain obstacles must be overcome. (Hertig et al., 2008; Johnson, 2005)
There are several strategies for reducing resis-
tance to change. Much resistance to change
comes from lack of trust or people having to
PITFALLS OF LEADERSHIP
operate outside their comfort zone.
Resistance can sometimes be overcome or the
Oftentimes, people who see themselves as
impact lessened if the following are completed:
leaders think that others will follow them with-
1. Fully explain the upcoming changes. out question. Leaders must understand that
2. Make certain employees or customers fully leading is more about serving, negotiating,
understand the change. motivating, communicating, and actively listen-
3. When possible, discuss why the change is ing than the physical act of leading. Incorrectly
required. assessing a situation and trying to be overly
4. Identify and discuss the possible effects with persuasive or dominant can bring disaster to
employees or customers. a leader, especially one who has just assumed
5. Answer questions, or take the information that role.
and follow-up if you don’t know the answer. Some pitfalls that a leader should recognize
6. Build trust with your employees; they will and consider are as follows:
better accept the change.
1. Leading is more about achieving a shared
7. Be honest and be consistent.
goal, not managing or supervising people.
Change can potentially create fear in the orga- 2. A leader has to always display confidence,
nization and paranoia in the minds of executives trustworthiness, and truth. In other words,
I. FOUNDATIONS
62 4. THE PROTECTION OFFICER AS A LEADER
characteristics that make someone want to August 27, 2009, from http://www.hss.doe.gov/
follow them. nuclearsafety/ns/techstds/standard/hdbk1028/doe-
hdbk-1028-2009_volume2.pdf.
3. Many times, other employees/customers Watson, S. A. (2007). The art of war for security manag-
have the answers or at least some thoughts. ers; ten steps to enhance your organizational effectiveness.
Leaders need to be active listeners. Burlington, MA: Elsevier.
4. Make certain the elements of leadership are
aligned with corporate or customer goals
and desires. Resources
Bolton, R. B. (1979). People skills: How to assert yourself, lis-
(Hertig et al., 2008; Johnson, 2005; Sennewald, ten to others and resolve conflicts. New York, NY: Simon &
1985; Watson, 2007) Schuster.
Elgin, S. H. (1993). The gentle art of written verbal self defense:
How to write your way out of life’s delicate situations. Upper
Saddle River, NJ: Prentice Hall.
CONCLUSION Fujishin, R. (1993). Discovering the leader within; running small
groups successfully. San Francisco, CA: Acadia Books.
A leader is any individual who influences the Sawyer, R. D., & Tzu, S. (1994). The art of war. Boulder, CO:
willing actions of others in support of organizational Westview Press Inc.
goals and processes. While leadership roles can be
rewarding, they come at the high cost of con-
S E CURI TY QU I Z
sistent hard work and dedication, often with-
out a discernible return on investment. Those 1. Leaders and supervisors are not one and
who wish to assume leadership positions in the same. Our expectation is that every
the protection field must be prepared to put the supervisor is a leader but not every leader is
needs of the team above their own. They must necessarily a supervisor.
exercise the highest standards of ethics, remain a. True
mission-focused, and develop the solid interper- b. False
sonal skills necessary to motivate others (Hertig 2. The key for a supervisor to get anyone to do
et al., 2008; Johnson, 2005; Sennewald, 1985). anything is to:
a. Threaten them to do it
b. Get them to want to do it
References c. Bribe them to do it
d. None of the above
Elgin, S. H. (1980). The gentle art of verbal self defense. Upper
Saddle River, NJ: Prentice Hall. 3. Leadership is not about self-interest; it is
Hertig, C. A., McGough, M., & Smith, S. R. (2008). about being other-person-centered. Thus,
Leadership for protection professionals. In S. J. Davies & before embarking on a mission to become a
C. A. Hertig (Eds.), Security supervision and management leader, one should conduct a self-examination
(3rd ed.) (pp. 219–239). Burlington, MA: Elsevier.
in all the following ways, except to:
Johnson, B. R. (2005). Principles of security management.
Upper Saddle River, NJ: Prentice Hall. a. Assure that no one in the group will be
Sennewald, C. A. (1985). Effective security management (2nd able to pass you up and become your boss
ed.). Newton, MA: Butterworth-Heinemann. b. Make ethics more important than your
U.S. Department of the Army. (2006). FM 22 army lead- career
ership competent, confident, and agile. Retrieved
c. Have a deep desire to help others solve
August 27, 2009, from http://greerfoundation.org/
CouncilofPromisingLeaders.html. both work-related and personal problems
U.S. Department of Energy (2009). Human performance d. Find the potential in subordinates and
improvement handbook; Volume 2: Human performance tools push those subordinates to self-actualize
for individuals, work teams and management. Retrieved
I. FOUNDATIONS
SECURITY QUIZ 63
4. An effective team member will display the d. Reader-friendly written material, sending
following attributes: complete, clear, easily understood
a. Continuously identify ways to improve communications
human performance 8. The optimal way to communicate is written.
b. Advise upline management when a. True
problems exist in work performance b. False
c. Be motivated to improve operations and 9. Some experts say we conduct a vast amount
always strive for excellence of our communications nonverbally. No
d. All the above matter how we or others communicate
5. Traits that can characterize a leader in any nonverbally, we must always strive
organization include all the following, except: for clarification if we want to achieve
a. Advocate teamwork in the ranks understanding. Which of the following is
b. Encourage open communications true about nonverbal communications?
c. Support complacency in the ranks a. The content is more difficult to read than
d. None of the above verbal and written communications
6. There are numerous critical leadership skills. b. The message being sent is usually
A leader will display all of the following skill just as important as other forms of
sets, except: communication
a. High ethical beliefs and attitudes c. Asking for clarification will keep the
b. A high ability to communicate well while misunderstanding to a minimum
understanding and relating to all people d. All the above
c. Learning how the mission of the 10. Leaders are often called upon to institute
organization compares to the leader’s change in a department. Change is hard
career goals to accept by many subordinates because
d. Being aware of the organization’s mission of insecurities or lack of trust. Resistance
and being focused on accomplishing that can be overcome by all of the following
mission suggestions, except:
7. There are four communication skills needed a. When possible, discuss why the change is
for every leader. Which of the following is not required
one of them? b. Inform the employees that if they cannot
a. Never missing a chance to shut up accept the change you will help them find
(listening) work elsewhere
b. Top down as a priority communications c. Be honest and consistent
direction d. Answer questions, or take the information
c. Complete and concise face-to-face and follow-up if you don’t know the
communications answer
I. FOUNDATIONS
This page intentionally left blank
C H A P T E R
5
Career Planning for Protection
Professionals
Christopher A. Hertig and Chris Richardson
65
66 5. CAREER PLANNING FOR PROTECTION PROFESSIONALS
3. While it is usually easy to see why someone Persons with college degrees tend to obtain
has been successful in a career, it may not higher-paying jobs, yet this is not always easy
be evident why someone did not succeed. to see. The career ladder they follow is not sim-
“Nobody gives you a scorecard when it comes to ple. College graduates may not see the immedi-
a career.” ate benefit of having a degree. It may take them
several years and several jobs for the degree to
really help them advance. After all, there are rel-
EDUCATION atively few “requirements” but many “expecta-
tions,” meaning that while the degree may not
Education is the cornerstone of career place- be required, it is expected.
ment and advancement. There are rare excep- The jobless rate for college graduates is much
tions where advancement to the most senior lower than the rate for non-graduates. This
level has occurred without advanced degrees, holds true in both boom and bust economic
but for the most part, in today’s market, a climates. During good times and bad, degreed
degree is essential. There are over 100 colleges persons have significantly lower rates of unem-
and universities offering degrees or programs ployment. Earnings are also much greater for
in security management and over 1,600 that graduates. Graduating from high school creates
offer criminal justice degrees or programs. a wage jump of about 32%; some college experi-
Furthermore, many of these academic institu- ence without a degree increases wages approxi-
tions offer online programs, enabling access for mately 13%. Graduation from college increases
more “nontraditional” students. salaries around 77% (Leonard, 2009).
Additionally, education enables a broader
view of the industry and the various disciplines.
It helps people to see how their job functions, TRAINING
however exciting or mundane, contribute to a
larger mission. Education helps prepare stu- Training is a structured learning experience
dents to lead others and manage the mission. designed to enable one to perform a specific
Education is an essential career component. task. Employees who are trained can perform
Unfortunately, it is not always easy to deter- tasks more efficiently and more safely. Training
mine exactly where education helps one to aids employers by increasing the effectiveness
advance. Holding a degree or certificate may or of employees. Training also increases the com-
may not aid one in getting a job. Generally, the munication between employees and manage-
degree experience should help prepare one for ment. It helps to give the employees a better
the process of preparing a résumé, researching idea of management’s expectations.
employers, and being interviewed. Employers Training also reduces the fear and frustration
look favorably upon persons that have demon- employees face when confronted with problems
strated the commitment and personal organiza- on the job. Training prepares them for the job
tion necessary to obtain a degree. and thus they feel more confident. As a result,
But in many cases, having a degree does not training generally reduces employee turnover.
automatically open doors. There may be other Employees are more engaged when they have
qualifications that the employer seeks, such as received adequate training.
experience, licensing, or certification. A degreed Professional organizations such as the British
individual may become confused and discour- Security Industry Association, the International
aged when finding that their education does Foundation for Protection Officers, and the
not automatically get them a position. Electronic Security Association (formerly the
I. FOUNDATIONS
EXPERIENCE 67
National Burglar and Fire Alarm Association) be thought through beforehand. The costs and
support training efforts. The International benefits should be weighed. Finding out what
Association of Chiefs of Police (IACP) has been a employers think of the training is important.
staunch advocate of training. The IACP launched Lengthy, extensive training classes must be
various training initiatives such as the Training scrutinized before enrolling in them.
Keys: short instructional memos on specific There is a common mistake made by people
topics. These keys could be easily delivered to completing training at a police academy (which
classes of police officers by a supervisor. Finally, is several months in length and costs thou-
ASIS International launched a “Standard on sands of dollars) which is assuming they are
Security Officer Selection and Training” to ensure guaranteed employment. While this will help
that hiring standards were met and training one to get a police job, it does not guarantee it.
addresses all the areas that it needs to address. Additionally, state Police Officer Standards and
While professionals have supported training Training Commissions generally place a time
both within professional organizations and as limit on completing an academy and finding
individuals, there are many issues involved in employment. A police academy graduate may
providing training. have only 2 years to find a job or be decertified.
Training is expensive for employers to provide. The students must know themselves and the
Aside from the instructional costs, the employer employment market before going into debt.
is paying employees for their time yet not directly Another pitfall, which some young people fall
benefiting from it, as the employees are being victim to, is taking the wrong courses. Some peo-
paid for non-productive time while they are ple take all manner of martial arts and firearms
learning. This situation has helped to propel the training. While this is desirable in moderation,
growth in distance learning. Distance learning job seekers should beware of potential employ-
helps one avoid many of the costs associated with ers branding them as “Martial Arts Masters of
training as well as with scheduling problems. Mayhem” or “gun nuts.” In some employment
Distance learning also helps individuals to learn settings this is the “kiss of death” for job appli-
on their own; some contract security firms and cants. Martial skills should be bundled with
police departments have embraced this concept. other competencies such as first aid, firefighting,
These organizations provide motivated employ- customer service, writing, research, and so on.
ees with the option of professional growth. One solution to obtaining training is through
Anyone serious about pursuing a career volunteer work. Volunteer fire companies and
should seek out training on their own. Doing ambulance services provide training to their
so helps them to learn important skills. It also members. There are also occasions when agen-
makes them more attractive to employers. cies that offer services to crime victims or disaster
Trained individuals may save an employer relief will train volunteers. While the Red Cross
money on training costs. In some areas it is is well known, there may also be local organiza-
becoming increasingly common for people to tions that will offer training to volunteers.
send themselves through a police academy so
that they are more certain of landing a police
job. A person who has completed training on
their own also stands out as someone who is EXPERIENCE
motivated and employers generally wish to hire
only the most motivated of personnel. Experience in a particular field or in a posi-
As completing training costs time and tion is one of the most cited criteria or qualifi-
money, taking an instructional program should cations for employers. A quick search through
I. FOUNDATIONS
68 5. CAREER PLANNING FOR PROTECTION PROFESSIONALS
online job boards or job openings will reveal volunteer experience, something to put on their
that the majority of the positions requires a résumé, and references for future jobs.
“minimum” number of years of experience. If
experience is not required for a particular posi-
tion, there are often other qualifying criteria LICENSING/CERTIFICATION
such as education, certification, or skills listed
as a prerequisite. With some positions a license is required.
Internships are an excellent way for a student This may be at the state, provincial, or county
to gain experience in the security and/or crimi- level. In some cases, there are also cities that
nal justice industry. Employers are much more license security and police personnel.
inclined to hire an intern with no or limited expe- Research into career options must include
rience than a permanent employee with no or licensing requirements. There are almost always
limited experience. The significant differences are licenses required for armed security personnel. It
the internship has defined employment dates, is also common to license those who offer inves-
the intern is more closely supervised, and intern- tigative services on a contractual basis (private
ships are often unpaid. investigation). Some jurisdictions license alarm
Two new Web sites have been recently launched installers, security consultants, personal protec-
to connect employers and students with intern- tion specialists, door supervisors in clubs, and
ships. The Web site www.securityinternships.com locksmiths.
provides a listing of security internships listed by Certification is another valuable addition
employers with both a proprietary and contract to the résumé and skill set of security profes-
security staff. The Web site www.criminaljusticein- sionals. Almost every security discipline and
ternships.com provides a listing of criminal justice security society or organization has their own
internships with local, state, and federal agencies. certification and it is worthwhile to seek out
Both Web sites offer more than just a listing of and obtain the relevant certifications.
internships. They offer résumé templates, schol- There are more recognized certifications than
arship information, career news articles, and a others, but as with educational institutions, it is
listing of other valuable Web sites. important to vet the certifying body to ensure
There are times when career planning the validity of the certification.
involves a transition into another field or dis- To be a well-rounded professional, certifica-
cipline. For example, a security director may tions in areas other than security contribute to
want to transition into audit or compliance. success. For instance, a certification in public
While these two fields are loosely related, the speaking, finance, accounting, or computers
transition may be smoother if it occurs within can provide additional opportunities and salary
the same organization. It is more difficult to increases.
transition into another field or discipline at
another company or organization.
Volunteering is another approach to filling NETWORKING
the experience void in one’s résumé. Volunteer
work can sometimes be performed for non- Networking with security industry experts
profit organizations such as churches or civic can excel the progression of security profession-
organizations. It can also be offered by different als. Networking can begin at any career stage and
departments in one’s employing organization; is advantageous to both young and experienced
an employee may volunteer to perform work security managers and executives. Networking
outside of their department. This gives them can occur during industry conferences, through
I. FOUNDATIONS
CAREER ADVANCEMENT 69
social mediums such as LinkedIn, and through Search and Knock ’em Dead Resumes, both writ-
professional associations. It also occurs through ten by Martin Yate.
job experience, various job assignments, and The objective of the job search and résumé
meeting people through employment. is to provide an opportunity for an interview.
All too often, networking is considered a Arguably the most important process in land-
tool to find employment. Although it is advan- ing a position, the interview is where the final
tageous to network with industry peers and decision to hire the most qualified and best can-
colleagues to search for a security position, didate occurs. Nothing should be overlooked
networking has many other benefits beyond during this process.
finding the next job. It allows one to reach out Preparation for the interview should be thor-
to others for assistance with solving a complex ough and well thought out. It is important to
problem or to benchmark a process or proce- research the employer to ensure the applicant
dure. Networking also enables one to stay up- knows the history of the company and is up-
to-date on industry news and trends. In this to-date on any recent news such as mergers,
respect, networking aids in finding jobs. It also expansion, stock price, awards, and so on. In
helps in succeeding at those jobs. addition to researching the company, the appli-
cant should drive to the interview location the
day before to ensure that directions are accurate
JOB SEARCH and to notate the amount of travel time.
Social networking sites are being used more
Online job searching has surged in the past frequently by employers to screen applicants. It
decade. The Internet allows for an unprece- is imperative for an applicant to scour through
dented number of jobs to be listed by employers any social networking site they are members of
and searched by applicants. There are large com- to ensure any pictures or videos that could be
panies such as monster.com and careerbuilder deemed inappropriate are removed prior to the
.com that list job openings for every career and application process.
discipline available. There are also niche job sites
that focus on specific industries.
Before a job search can be started, a résumé CAREER ADVANCEMENT
must be constructed. A résumé is often the
first exposure an employer has to an applicant. Career progression goes beyond education
Furthermore, the employer or recruiter spends and experience. Security professionals have
less than 30 seconds reviewing a résumé. This attributed their successful climb up the pro-
signifies the importance of an impressive résumé verbial “ladder” to credibility, leadership, and
in getting an interview for a position. interpersonal skills. These qualities and skills
There are two formats for résumés: func- develop over time and require an investment
tional and chronological. A chronological résumé of time and energy devoted to a career path.
focuses on the time format of experience. It There are four approaches to reaching career
typically lists employment and other activities objectives: become a resident expert on a secu-
according to dates, with the most recent listed rity topic, develop a personal brand, culti-
first. A functional résumé doesn’t focus on dates; vate a mentorship, and establish a network of
rather, it focuses on a narrative style of skill sets colleagues.
and experience. Excel at one’s current job tasks. While the
A widely recognized resource for job search- knowledge, skills, and abilities required for
ing and résumé writing is Knock ’em Dead Job a supervisory position differ from those of a
I. FOUNDATIONS
70 5. CAREER PLANNING FOR PROTECTION PROFESSIONALS
subordinate, people who don’t “shine” will not Find a mentor. Mentors are important. They
be promoted. provide guidance and insight. They enable the
Being visible is important. Joining commit- person being mentored to grow on their own
tees and taking on additional projects is one into new levels of competency. They aid the pro-
way to do this. Mach (2009) states that it is tégé in gaining additional areas of competence.
advantageous to work across your organization. Sponsors are another means of helping one
Richardson (2009) states that there are four advance in their career. A sponsor is someone
strategies that can help security professionals who brings along a subordinate when they
advance on the job: becoming an expert in some themselves obtain a promotion. Sponsors may be
area; developing a personal brand; finding a chosen to head up a different division of an orga-
mentor; and networking. nization. Care must be taken in choosing a spon-
Become an expert in an area that is needed. sor. Sometimes sponsors fall out of favor within
A retail loss-prevention officer who masters an organization. A sponsor who is on the wrong
interviewing, a casino security professional side of politics is not a good sponsor to have. In a
who can design camera systems, or a protection similar vein, a sponsor who is not very ethical is
officer at a high security facility who becomes a a liability. Ethics is crucial in this regard.
software expert are all in demand. Becoming a In some cases, promotion within one’s
reliable source of information or expertise gets employment organization is simply not hap-
one noticed. It opens up opportunities to work pening. This may be due to a small number of
on special projects and meet new people. positions being available. It may also be the
Develop a brand. A brand is a unique style. case that the persons holding those positions
One person may project himself as an innovator. are not leaving them. In these situations, one
Another may be a researcher. Still another may either has to be satisfied staying where they are
excel at social relationships and politicking. or seek employment in another organization.
EMERGING TRENDS
Enrollment in colleges and universities is In addition, academia has noticed this trend and
at an all-time high. Employers are streamlin- consequently there are a growing number of col-
ing processes and asking employees to do more leges and universities that offer a degree or pro-
with less. When employers hire, they have gram in Crisis or Emergency Management.
the ability to be more selective and seek out the Job searching and applying for jobs are
most qualified candidate. A reduced workforce increasingly becoming online activities. It must
and an influx of applications for open positions be noted, however, that there is a major role
increase the competitiveness of the candidates. for interpersonal, face-to-face interaction. The
Experience and education are two of the most practices of investigation, asset protection, and
important areas that set candidates apart. so on, are interpersonal endeavors. They can-
Emergency management is closely related to not be completely performed electronically.
security and homeland security. Emergency or Additionally, the job search and acquisition pro-
crisis management has been a career field that cesses require in-person abilities. One will be
has rapidly expanded over the past several years. limited without a personal network. In addition,
There are many career opportunities available with job candidates who don’t do well in interviews
government, private, and nonprofit organizations. will not be hired.
I. FOUNDATIONS
SECURITY QUIZ 71
I. FOUNDATIONS
72 5. CAREER PLANNING FOR PROTECTION PROFESSIONALS
d. A job allows the student to earn money 8. Why do employers search social networking
while in school sites for applicant information?
5. On average, how many certifications should a. They want to find other candidates for
one obtain? other open positions
a. 8 b. Searching these sites provides a quick
b. 4 and efficient way to learn more about
c. 9 the candidate
d. None of the above c. To find a specific person’s résumé
6. What is the difference between a functional d. Employers do not search social
and a chronological résumé? networking sites on job applicants
a. A functional résumé lists the functions that 9. There are four strategies for developing a
you performed at a job career; choose the one that is not a strategy.
b. A functional résumé is a summary of a. Develop a personal brand
experience, whereas a chronological résumé b. Network
lists jobs or positions by dates of employment c. Find a mentor
c. There is no difference d. List one’s résumé on an online job board
d. A chronological résumé only lists 10. What is one of the fastest growing fields
education and certification related to security?
7. When interviewing for a job, what preparation a. Law enforcement
is necessary (choose the best answer)? b. Homeland security
a. Drive the route to the interview location c. Private detectives
the day before d. Contract security
b. Research the organization
c. Be prepared to answer standard interview
questions
d. All of the above
I. FOUNDATIONS
U N I T II
COMMUNICATIONS
6 Effective Communications
7 Security Awareness
8 Central Alarm Stations and Dispatch Operations
This page intentionally left blank
C H A P T E R
6
Effective Communications
Charles T. Thibodeau
75
76 6. EFFECTIVE COMMUNICATIONS
To comply with this mandate, businesses but if these six factors are present, communica-
must conduct perpetual risk analysis, vulner- tions will be extremely effective.
ability assessments, integrated countermea-
sure designs, security officer training, employee
security awareness training, and contingency
planning. However, without “effective” commu- CONSIDER THE AUDIENCE
nications, none of these practices and procedures
could exist. Thus, effective communications are Everyone communicates at different lev-
a key element in assisting businesses in meeting els. If you are communicating with someone
their mandate to provide proof of compliance who is many levels below your communica-
with required levels of due diligence. tion level, the message you are sending stands
a good chance of being misunderstood. In
addition, assuming that everyone speaks and
CHANNELS OF understands on your level is almost a guaran-
COMMUNICATIONS tee that you will be an ineffective communica-
tor. The midpoint between talking above your
There are four channels of communications audience and talking below your audience is
in any organization or company: top-down, currently the seventh-grade level. If you want
bottom-up, horizontal, and the grapevine. The perfect clarity in your communications, then
first three are essential for information to flow speak slowly, carefully choosing your words,
in every direction. These are the formal and using no more than five- or six-letter words,
official forms of communications. The fourth and choosing words that are commonly known.
form of communications found in most orga- In many cases, when asked to repeat a message,
nizations is the grapevine, which consists of an the receiving person uses different words. Thus,
outgrowth of informal and casual groupings of each time you are requested to repeat a mes-
employees. Effective communications in any sage, say it in different words.
security department requires all four of these The security officer’s communications must
forms. They provide maximum performance also accommodate the language difficulties
both during stable and predictable periods and of an ever-growing ESL (English as a Second
during times of stress. Language) population. Spanish and French
are common, second to English, and there
is an ever-growing Asian population whose
THE SIX ESSENTIALS OF languages include Korean, Laotian, Hmong,
EFFECTIVE COMMUNICATIONS Mandarin, and Vietnamese. The security officer
of the future may indeed need to be bilingual.
Effective communications must be: Another consideration is medically afflicted
people with communication impediments,
● Timely
although there may be nothing you can do to
● Complete
breach their communication difficulties. When
● Clear
dealing with the deaf, blind, or people afflicted
● Concise
with multiple sclerosis (MS), patience is your
● Factual
greatest asset, and a strong commitment to help
● Accurate
these people will get you through it. Just be
This is a bare bones list of requirements. Cer- persistent until you can find the way each one
tainly, the complete list includes other attributes, communicates.
II. COMMUNICATIONS
PROPER USE OF COMMUNICATIONS DEVICES 77
II. COMMUNICATIONS
78 6. EFFECTIVE COMMUNICATIONS
ringing sound from all the other phones in the directly to the mainframe of the local telephone
room. This phone will have no dial-out capabil- office and it will operate on its own power.
ity; in fact, the face of the phone will have no Therefore, this direct tie to the outside world
dialing keyboard. will be somewhat protected from numerous
The reason for having a separate red phone threats. The conduit-encased phone line would
for emergencies is that the security operator or almost assure an outside line during any power
dispatcher will at some point need to communi- outage or computer failure that could cripple the
cate over the regular phone lines to call for fire, facility’s PBX or electronic telephone system.
police, or emergency medical assistance and for In some facilities a fourth, black phone is
other assistance. If the emergency phone is tied physically identical to the red phone; it can-
into the 10-button phone, the emergency event not be dialed. This phone is dedicated to panic
caller at the scene of the emergency must be put alarm annunciation. If there is a threat on exec-
on hold while public assistance is being called. utive row, or a robbery in the credit union, cer-
Never hang up on the emergency event caller or tain designated employees are trained to use
put the emergency event caller on hold during the black phone for “duress code” messages.
an actual emergency. The caller under the stress The cell phone is the newest addition to the
of an emergency may hang up whenever they phone systems available for security officers. In
cannot hear the sound of your voice or noise in many locations, security departments are invest-
the control center. ing in cell phones that double as two-way radios.
In addition, each security station in the facil- At this point, for most security departments, these
ity should be equipped with a red phone as telephone-radio combination units are too costly.
well as a regular phone. When an emergency In other locations, cell phones are used as back-
call comes in, each red phone should be picked up units to the two-way radios for communica-
up with the remote stations just listening in to tions where two-way radio signals are blocked by
the conversation between the dispatcher and dead spots. Cell phones play an important part
emergency event caller. during patrol duties to allow emergency calls to
Then, before hanging up, each station will be made from the scene, back to the control cen-
confirm that they have received the message ter when the two-way radio is ineffective. The cell
heard over the red phone. The emergency tele- phone can also be used for calls directly to the 911
phone system is not a place to skimp on cost emergency response centers.
or design when so much depends on effective
communications during emergencies. In fact,
just in case you lose your connection with the
Two-Way Radios
emergency event caller, it is best to jot down The two-way radio is the primary mobile
that person’s name and phone number immedi- communications device that almost all security
ately at the outset of the call. officers use to communicate with the control
A third phone, a yellow phone, would be a center and between other officers, supervisors,
single analog line separate and apart from the and management. There are some problems
facility PBX or electronic telephone system. This with most two-way radio systems and that
phone will have a hardwired four-lead tele- trouble includes, but is not limited to, failure
phone cable inside of a conduit from the wall to operate in dead spots, being susceptible to
jack in the room where the phone is located to operator error, and having short battery life. In
the street-level mainframe. The conduit will addition, an adequate two-way radio system
lessen the threat of the line being cut or burned is expensive; the units are bulky and take up
through during an emergency. This line will tie space on a crowded utility belt. Some of these
II. COMMUNICATIONS
PROPER USE OF COMMUNICATIONS DEVICES 79
radios break down regularly and are costly to to allow for processing. If this is not done, your
maintain. However, all of these shortcomings message will be clipped at both ends. When
aside, we could not do the security job as well holding the transceiver up to talk, hold it to the
as we do without effective communications side of your mouth and speak across the micro-
devices like the two-way radios. phone. Do not speak directly into the micro-
Two-way radios are miniature radio stations phone or you may speak too loudly and cause
and as such, something called “ground-wave distortion of the transmitted message.
propagation” makes the difference between The frequency of the radio also has an impact
effective communications and either broken on effective communications. Most radios used
communications with static or no communica- by security are FM transceivers. They are either
tions at all. Ground-wave propagations are the VHF or UHF. Two-way radios that are called
scientific explanation that explains how a radio VHF transceivers work on what is known as
signal travels from the source antenna to the very high frequency. The UHF radios operate
receiving antenna. It also explains that if any- on ultrahigh frequency. The difference between
where along that path, there is an object that these two transmission levels is the lower the
is so well grounded, like an I-beam or other frequency, the longer the wavelength. That
metal object, the signal may be short-circuited means the VHF signal will travel a long way, but
and driven into the ground before the message a VHF signal is a relatively weak signal and does
reaches the receiver’s antenna. Because the trans- not work as well in tall buildings with lots of
mission antenna sends out many pear-shaped steel. By contrast, the UHF transceiver is a stron-
signals, not just one, to overcome this signal ger signal but has a much shorter wavelength.
interference problem, the officer needs only to That means that it packs a wallop and works
walk a few feet from where the transmission is well in tall buildings with lots of steel, but it
garbled and the signal may be reestablished. cannot travel too far. A UHF system with numer-
The two-way radio is most effective with the ous repeaters in line is possibly the most effec-
antenna 90 degrees perpendicular to the ground. tive two-way radio communications system.
The antenna should be pointing straight up
in the air during use. By tipping the antenna
Pagers
sideways or horizontal to the ground, the unit
becomes directional and the strongest transmis- The pager takes a telephone call to respond
sion will be along the line where the antenna is to unless it is a voice pager or a text pager that
pointing. If a two-way radio antenna is pointing displays messages. Pagers are nice because
away from the receiving antenna, then the radio they are small and work just about every-
is being used in a very ineffective manner. where. However, they do not allow the mes-
In many systems, signal strength gets a boost sage receiver to respond with a message and
by use of a repeater. A repeater is a great help but they do not allow for verification that the signal
the process by which it works makes it somewhat was received and understood. Pagers should be
user-unfriendly. The repeater receives the signal, used for back-up only. Two-way radios and cell
turns it around, and sends it back out as a more phones are the best communications devices for
powerful signal. That process takes time; thus, portable operations.
the two-way radio communicator must hold the
transmission switch down for two seconds before
talking in order to engage the repeater and then
Intercoms
the communicator must hold the switch down In a retail setting or a hospital setting emer-
for two seconds after the message is finished gency, codes are sent over the intercom. We all
II. COMMUNICATIONS
80 6. EFFECTIVE COMMUNICATIONS
know that “code blue” means cardiovascular signal exceeds maximum input peak-to-peak fre-
problems complicated by respiratory failure. quency. You do not have to speak loudly when
We know that “code red” means fire. In some announcing over an intercom, as they have
retail companies a call over the intercom such as built-in amplifiers to adjust the sound level.
“Mr. Jones, please come to the front of the store”
means that security is needed at the front of the
store. The intercom is useful when it is working, SUMMARY
but traditionally the intercom system is a weak
link in the communications systems of any facil- Effective communications do not exist when
ity. There are problems with volume and static, the speaker and the receiver are not “on the
and they seem to have more than their fair share same page.” That is the bottom line in many con-
of maintenance needs. If the intended receiver tract dispute cases where the seller and the buyer
of the message is out of the area where there are failed to reach a “mutual assent to the same
no speakers, the message will not be received. proposition.” This means that the buyer expected
In addition, there usually are no procedures to to receive something that the seller was not sell-
inform the communicator that the message was ing; thus the contract could be declared null and
received and understood. Despite the prob- void all because the buyer and seller were expe-
lems, however, intercoms are still needed. Extra riencing a lack of effective communications.
speakers should be placed in remote and hard- One of the situations that led to the death of
to-hear-in areas all over the facility to assure hundreds of firefighters in New York City dur-
emergency messages reach everyone. If you ing the 9/11 terrorist attacks in 2001 was the
work in a facility equipped with intercoms for fact that their two-way radio system failed.
communications and you even think that a mes- Poor communications turned deadly in that sit-
sage might have been transmitted over an inter- uation. We have to be continuously vigilant of
com, call dispatch and check out your suspicion. effective communications in our security work.
The mistake that a communicator can make Failure to communicate effectively, including
using the intercom is to speak too loudly into the failure to communicate at all, can very quickly
speaker. Many systems will distort if the input turn into serious injury or death.
EMERGING TRENDS
As states across this country continue to pass effective communications in the workplace. These
laws for mandatory security officer training, effec- supervisors should not hesitate to have a security
tive communications will be an important part of officer rewrite his or her report when that report
that training. A training curriculum authorized by fails the effective communications test. In addition,
a state licensing board will likely contain report poor report writing should be rewarded with man-
writing as a mandatory component. It will be a datory writing class refreshers taken repeatedly
supervisor’s prerogative to assure that the officers until effective communications improvement is
in his or her command are following the report observed. It is very possible that this turn around
writing training they receive. Therefore, it will trend in effective communications will emerge
take the state licensing board and the security offi- over the next decade as security departments
cer trainers and supervisors, both in contract and work toward ensuring that effective communica-
proprietary security, to enforce acceptable levels of tions exists throughout the security industry.
II. COMMUNICATIONS
SECURITY QUIZ 81
II. COMMUNICATIONS
This page intentionally left blank
C H A P T E R
7
Security Awareness
James E. Sellers
83
84 7. SECURITY AWARENESS
on security throughout the organization and to organization down, but should also flow
keep security in the forefront of every employee’s back up to the top. It is in this way that
mind during the day. It involves a sense of duty outdated procedures are discovered and
by those who could be affected to be aware of corrected.
security practices as they relate to daily activi- 2. Modern security techniques now involve
ties of the organization. Although the plan can more collaboration with external associates
be extensive, it does not require every employee such as customers, venders, contractors,
to know every aspect; many times it will apply insurance providers, security consultants,
to specialized or departmental duties. public safety officials, law enforcement, the
Security awareness provides a framework of fire department, government emergency
established policies and procedures that partici- management operators, and others. By
pants employ by reporting unsafe conditions, collaborating with associates a synergy is
suspicious activity, and noticing general safety developed that acts as a force multiplier.
breaches, merely as second nature. Value is added to the security plan by using
Team members are trained and polled regu- proven ideas from experienced external
larly to heighten their awareness about chang- contributors.
ing trends in practices and rapidly advancing
Security departments should liaise with local,
technology. In the past, the main concern has
state, and federal law enforcement officials.
been on physical site security issues; focusing
These officials can speak with management to
mostly on gates, doors, windows, and locks.
reinforce security and safety practices that the
Today, along with physical awareness, security
security department recommends including in
initiatives must include internal matters, like
company policies and procedures. The secu-
avoiding workplace violence, enhancing per-
rity manager should solicit the officials to offer
sonal safety, and being up-to-date on the latest
advice and feedback from their observations.
information technology, including safe Internet
The internal and external partners described
practices. Greater emphasis must now be placed
above become stakeholders through common
on these issues, more so than in the past.
interests and shared goals that help the organi-
zation succeed. Stakeholders may be directly or
indirectly related to an organization and may
EXPANDING THE TEAM offer input that reflects commitment to ongo-
THROUGH PARTNERSHIPS ing functions. As stakeholders, managers and
employees all benefit through financial or per-
To be effective, the security department sonal investment, employment, and so on. All
should instill “security awareness” among share the belief that it is in their best interest
members from all layers of the organization as to protect and promote the organization as if it
well as external partners. were their very own. See Figure 7-1.
1. Employees should be made to feel part of the
awareness team and should be solicited for
their ideas to improve security. Encourage TECHNIQUES FOR REINFORCING
employees to report security problems POLICY AND PROCEDURES TO
and correct safety potential issues when INCREASE SECURITY AWARENESS
observed. Use a double loop communication
model, which means that information To greatly increase security awareness, mem-
should not only flow from the top of the bers from all layers of the organization and
II. COMMUNICATIONS
DOUBLE LOOP LEARNING 85
Management
Security
All employees
department
External
partners
FIGURE 7-1 Security awareness with partner approach (stakeholder). Figure courtesy of J. E. Sellers, 2009.
external partners should be instilled with a ● Security awareness meetings should be held
sense of partnership through interactive activi- with all departments at least every quarter.
ties that include orientation sessions, training,
Technology such as Internet e-mail, Webcast
security updates via newsletters, e-mails, and
training, and electronic newsletters, now enable
informative signage.
security departments to easily and inexpensively
● All employees should be apprised of the communicate and distribute valuable security
organization’s policies and procedures and safety information throughout the organi-
upon entering the organization. Employee zation. The correspondence should focus on the
orientation should be documented and positive outcomes that can be achieved if the
signed to indicate the rules are understood. organization’s security procedures are followed.
● Organizational policies and procedures should See Figure 7-2.
be clear, concise, and written correctly. They
should also be reviewed and updated annually,
at a minimum. Print and electronic copies DOUBLE LOOP LEARNING
should be readily available to all employees.
● Repetition of the security awareness message Management should consider the Double
will lead to increased involvement. Loop Learning theory of Argyris and Schon
● Repetition can be accomplished by such (1978). In this theory the organization becomes a
methods as daily exposure through the use “learning organization” by detecting and correct-
of posters, weekly exposure via e-mails, ing errors through questioning and modification
and monthly or quarterly exposure through of existing norms, procedures, polices, and objec-
newsletters and handouts. tives. According to Fiol and Lyles (1985), learning
II. COMMUNICATIONS
86 7. SECURITY AWARENESS
Security Information
Suggestions Security Policy and
from Employees Procedure
to Management from Management
(ideas are considered to Security
to correct errors and Department
improve security)
Security Information
from
Security Management
to All Employees
FIGURE 7-3 Developing security awareness. Double loop learning security awareness communication model (J. E. Sellers, 2009).
Adapted from Argyris and Schon (1978).
II. COMMUNICATIONS
RESOURCES 87
in discussions on security policies, procedures, organization. This technique uses examples in
and other security programs. The groups con- which security awareness leads to a successful
sist of mostly “end users” who operate under outcome, resulting in an increase in safety or a
the policies. It is this group that often can offer reduction in crime. The “lessons learned” exam-
practical solutions for seemingly complicated ples show how security awareness fits into the
“problems.” Focus groups have brief scheduled organization’s culture or even contributes to creat-
meetings that have minimum interference with ing a security culture where one was nonexistent.
the company’s scheduled core activities. The “lessons learned” examples help employ-
Surveys: Short surveys on security aware- ees and partners understand why strong secu-
ness should be included in e-mails, newsletters, rity is important to them personally as well as
and Webcasts. The surveys can be evaluated to to the success of the organization.
identify what areas of the security awareness
program should be adjusted to keep it on track.
Information from the focus groups and sur- RESOURCES
veys should be available within the organiza-
tion to lend credence to the double loop security Security department managers should reach
awareness communication process and improve out to available resources provided by professional
the management/employee partnership. groups when setting policies and procedures. There
are a number of industry-specific organizations
that provide support by sharing information with
LESSONS LEARNED their members. There also are security organiza-
tions such as IFPO and ASIS that have established
The technique for obtaining greater involve- guidelines on security topics. These organizations
ment in security awareness should include a have Websites that offer security information and
collection of lessons learned from inside the provide links to other valuable sources.
EMERGING TRENDS
Ever-improving and changing technology pro- could result. These security breaches may include
vides business opportunities, yet at the same time computer viruses that can be introduced via the
creates security dilemmas for security managers. Internet. These viruses can attack the organiza-
Subjects, such as information technology (IT), tion’s computer system and result in lost pro-
now occupy much of the security department’s ductivity and expensive corrective action. It is
resources. Technology in the form of cellular imperative that all stakeholders know how they
phones, computers, digital cameras, copiers, and can be affected and be made aware of the dangers
facsimile machines, while increasing the speed of misusing information technology. They must
of conducting business, can also be a method be vigilant, use safe Internet practices, and report
for compromising valuable organizational or any suspicious computer activity. The security
personal information through theft or misuse. director should always seek better ways to pro-
Without safeguards, including rules regarding the vide employees with the knowledge necessary
use of electronic devices, severe security breaches for secure information technology use.
II. COMMUNICATIONS
88 7. SECURITY AWARENESS
II. COMMUNICATIONS
C H A P T E R
8
Central Alarm Stations and
Dispatch Operations
Sean Smith, Jim Ellis, and Rich Abrams
INTRODUCTION
CHAPTER OBJECTIVES
● Explain the history of central alarm In the modern world of safety and security,
stations and dispatch centers and how the necessity of a fully functional central alarm
they evolved into the technologically station and dispatch center must not be under-
advanced operations of today estimated. According to Abrams (2003), “The
control room is the nerve center of any safety
● Provide an overview of the various types
and security department.” Such an operation is
of alarm and control systems that may
capable of detecting nearly any emergency that
be monitored by a central station, as well
could occur, 24 hours a day, 7 days a week. Such
as computerized visitor management
situations may include fire, burglary, major facil-
systems
ity equipment failure, or certain natural disas-
● Introduce the numerous types of sensors ters. Equally as important is the responsibility of
incorporated into alarm and control a dispatcher to coordinate communications with
systems that transmit messages back to protection officers in the field, as well as assist
the central station agencies and the general public. Alarm systems
● Provide an overview of the transmission are powerful tools in the prevention of crime
media by which messages are and disaster, but the observations of the field
transmitted from alarm and control officer and the report from the customer on the
sensors to their systems’ central telephone are also vital. Dispatchers are trained
processors to obtain and record all the information neces-
● Introduce the reader to the sary to send an appropriate response to any sit-
communications equipment utilized by uation, ranging from a customer who is locked
dispatchers in a central station, with a out of his or her office to a field officer being
focus on radio and telephone systems assaulted by a suspect. Thanks to sophisticated
detection and communication equipment—and
89
90 8. CENTRAL ALARM STATIONS AND DISPATCH OPERATIONS
very quick thinking—dispatch and monitoring alarm systems, such as an attached clock that
staff are prepared to coordinate an immediate could activate and deactivate the system at cer-
response to all of the above and more. tain intervals, as well as a latching circuit that
required authorized personnel to manually
reset the system prior to deactivating the audi-
HISTORY OF CENTRAL ALARM ble alarm (Fischer, 2008b).
AND DISPATCH CENTERS Around the year 1877, Holmes installed the
first network of burglar alarm systems con-
In the past, humans acted as both alarm nected to a central station (Ellis, 2007). He sent
sensors and transmission media. In order his son to Boston to establish a second central
for a response to occur, an emergency situa- station there. While in Boston, Holmes Jr. dis-
tion had to be directly observed by a citizen, covered that alarm signals could be transmit-
who then rushed to police or fire headquar- ted to a central station via preexisting telephone
ters to notify the authorities in person wires, and vice versa. He set up a network of
(National Communications Institute [NCI], 700 telephones connected to the Boston central
2001). However, this process began to change office, and promptly informed Holmes Sr., who
when William Cooke and Charles Wheatstone set up a similar operation in New York City. In
invented the electrical telegraph in 1837 1878, Holmes Sr. expanded his telephone inter-
(Stewart, 1994). The telegraph was tailored ests by becoming president of the newly formed
to the public safety industry in 1852, when Bell Telephone Company. He sold his interest
William Channing invented the fire alarm tele- in the company 2 years later but retained the
graph (Fischer, 2008a), which allowed a citizen exclusive right to utilize Bell telephone wires
to activate a pull box, sending a signal with the for his alarm circuits (Fischer, 2008c).
location of that box to the local fire company. In 1871, Holmes was introduced to direct
In 1853, Augustus Russell Pope developed competition when Edward Callahan formed the
and patented the first modern burglar alarm in American District Telegraph company, which
Somerville, Massachusetts. It involved an open eventually became ADT. They utilized manual
electrical circuit that connected the doors and action call boxes connected to a central moni-
windows in a building; when a protected door toring station (Ellis, 2007). When the station
or window was opened, the circuit would close received an alarm, messenger boys were dis-
and activate an audible alarm. Pope only com- patched to the source and would immediately
pleted one installation, however. The patent report their findings to local police or fire offi-
was sold in 1858 to Edwin Holmes, who greatly cials via preexisting call boxes. By 1875, ADT
expanded the business (Fischer, 2008a). had expanded from New York City to Brooklyn,
Holmes installed his first burglar alarm sys- Baltimore, Philadelphia, and Chicago (Fischer,
tem in Boston in 1858 (Ellis, 2007). However, 2008d). At this time, the company offered
within 1 year, he chose to relocate to New York police, fire, and all-purpose messenger boy ser-
City, because at the time, it was perceived to be vices; however, within a few years, they began
where “all the country’s burglars made their to offer a contract security patrol service known
home” (Fischer, 2008b). By 1866, Holmes’s cli- as the “Night Watch.” Even so, messenger boy
ent base had grown to over 1200 residential cus- services initially accounted for over 70% of the
tomers. Around this time, he began marketing company’s revenue. However, use of this ser-
to business entities as well as private residences, vice declined rapidly with the development
with great success. The year 1868 brought sev- and proliferation of the telephone. In 1901,
eral technological advances to Holmes’s burglar R. C. Clowery, then owner of ADT, decided the
II. COMMUNICATIONS
TYPES OF MONITORING SYSTEMS 91
wisest course of action was to focus almost touch screens, enhanced caller ID, voice record-
exclusively on police, fire, and security services ing, and telecommunication devices for the deaf.
(Fischer, 2008d). Two-way radios have evolved into networks
In 1877, the city of Albany, New York, pur- including many advanced features, such as:
chased the world’s first police telephones ● touch screen interface
and installed them in the mayor’s office and ● voice recording
five city districts (Stewart, 1994). In 1883, the ● remote paging
Gamewell Company created a call box that ● remote activation and deactivation of
could be used by the police or the public. These
handheld units
call box systems were installed in Washington,
DC, Chicago, Detroit, and Boston within the Pencil-and-paper record-keeping systems
next several years. In the United Kingdom, gas have been replaced by computer-aided dis-
lights were installed on top of police call boxes, patch software, making it much easier to enter
which could be lit by police headquarters in new data and retrieve archived information.
order to notify the officer on foot patrol to con- These systems can be integrated with a variety
tact the nearest station (Stewart, 1994). of other programs, including report manage-
Radio communication for police would ment software, telephone or radio interfaces,
come many years later. The first police radios geographic mapping and tracking systems, and
in America were utilized by officers in Detroit, even alarm-monitoring software.
Michigan, in 1928. These were only capable of
transmitting from the base station to a mobile
radio. Bayonne, New Jersey, became the first TYPES OF MONITORING SYSTEMS
police department to utilize two-way radios
in 1933 (Institute of Electrical and Electronics A security officer might come into contact
Engineers, 2009). At that time, and for many with any number of monitoring systems when
years, a dispatch center was a relatively sim- staffing a console. Each system may control a
ple operation. A typical center would consist specific action or sequence of actions if so pro-
of a telephone system, a radio system, and a grammed. The most complex are integrated sys-
record-keeping interface. The telephone sys- tems that operate multiple individual operations
tem was basic, unlikely to incorporate features from one software application.
that were not found in residential or office tele-
phones, other than a manual switchboard used
to redirect calls. The radio system was a simple
Alarm Systems
desk microphone with a “push to talk” switch. At the basic, but most reliable, end of the
Records were kept by hand on a series of paper spectrum is an alarm system that monitors
forms (NCI, 2001). Such an operation may be areas of a facility. This would consist of sen-
staffed by a switchboard operator, or by a police sors placed around the facility and connected
or protection officer assigned to the desk. to a central console. In some systems, the con-
Currently, the core functions of a dispatch sole might include lights and a buzzer such
center remain the same: telephone communica- that a violation or alarm would cause both the
tion, radio communication, and recordkeeping. light and buzzer to activate. Toggle switches
However, the technology has changed drasti- connected in the circuit allow for areas to
cally over the years. Consumer-grade telephones be shunted, bypassed, or silenced until the
have been replaced with multi-line telephone alarm can be investigated. This also allows for
terminals accompanied by features such as a sensor with a fault on it to be silenced until
II. COMMUNICATIONS
92 8. CENTRAL ALARM STATIONS AND DISPATCH OPERATIONS
repaired. However, this generally leads to the something that is known, generally a personal
assumption that any alarm on that device is identification number; something that is car-
usually a false alarm. It is therefore imperative ried, such as a card or token; or something that
to repair any part of the system that is malfunc- the authorized person has, such as a fingerprint
tioning as soon as possible. Depending on the or iris (the colored part of the eye). The creden-
type of sensor that is malfunctioning, it may be tial is entered, swiped, presented, or scanned,
necessary to station an additional security offi- and, after some level of verification, access is
cer in that area or conduct additional patrols. granted or denied.
Modern alarm systems have a keypad that Access control systems come with various
operates much in this same fashion, but with the means of operation and scope from a single
addition of a communicator that allows the sig- door to many thousands of doors or alarms
nals to be transmitted offsite to another console around the world. At the small end of the access
in a neighboring facility, an alarm central moni- control spectrum is the single door keypad at
toring station, or in rare cases, to the police. Some which a person enters a code that is mechani-
modern alarm systems will spell out the location cally or electronically verified. Most access con-
of the alarm in a textual format. As long as the trol systems use a card-based credential, which
naming convention is consistent across the sys- is swiped or presented to an electronic reader to
tem and all officers are trained in how to locate gain access. These systems can be used across
an alarm that is spelled out, this can be a very just a few doors to many thousands of doors
cost-effective method of monitoring a facility. and sensors connected via the company’s com-
Fixed graphical alarm panels will show an puter network. The most secure access control
outline of the facility and critical areas being systems utilize a biometric authentication pro-
monitored within. When an alarm is generated, cess. Biometrics entails using something that is
it is much easier to find and locate the alarm part of the person for verification of identity,
because the alarm is shown relative to the lay- such as fingerprints, hand geometry, vein pat-
out of the facility. Computer-based graphical tern recognition, voice print, and iris recogni-
alarm panels will also show the facility, but tion. Biometrics can be used as the sole means
can be modified as the facility or the system of verification, but are frequently used in con-
expands in scope and coverage. junction with a card reader.
Another main component of medium- to
large-sized access control systems is the distrib-
Access Control Systems uted processor, sometimes referred to as a field
Access control systems are based on the controller. This computer is installed between
premise that issuing keys to all employees the main computer and the card reader at the
who need them is generally not cost-effective. door and communicates back to the main com-
Another premise of an access control system is puter only when necessary, such as to request
that it would be cost prohibitive to rekey the updated information about card holders or
facility should a key be lost. Finally, an access when there is an alarm. The distributed proces-
control system can limit employee access; sor makes all of the decisions as to granting or
allowing them entry only to areas in which they denying access to a person who presents their
are authorized, or granting entry during certain card at the card reader, therefore taking the pro-
times of day. cessing load off the main computer and allow-
An access control system uses a means of ing the entire system to operate faster. The
verification, known as a credential, to allow a distributed processor also allows the system to
person to enter an area. The credential can be continue to operate if the connection back to the
II. COMMUNICATIONS
TYPES OF MONITORING SYSTEMS 93
main computer is interrupted. Typically, distrib- that allows the application to show building
uted processors control between 2 and 16 doors layout or to import floor plans from another
and allow for the connection of various sensors, application. Thus, all activity in the system is
just like a regular alarm system. Distributed presented on a single screen. Automatic actions
processors can communicate to the main com- for certain events can be programmed into such
puter via a communications protocol such as a system, such as calling up a particular camera
RS-232 or RS-485, although an increasing num- when a door goes into alarm.
ber of systems are now being connected to a
company’s internal computer network (intra-
net). Newer systems are taking the network
Fire Alarm Systems
connection all the way down to the card reader Of all the alarm systems, it is most critical for
at the door. Other systems use a Web-based security officers to understand the basic opera-
interface for programming the system and can tion and interaction of fire alarm systems. Fire
communicate down to the distributed proces- alarm systems are regulated by building and
sor via the network or through the wireless data fire alarm codes adopted by the municipality
network available from cell phone companies. in which the facility resides. Because different
The main computer in an access control municipalities may adopt different codes, how
system can be a simple desktop computer for a system operates or is installed at one location
small systems up to redundant mirrored serv- might be quite different at another location. As
ers for very large systems, or any combination fire alarm systems are so essential for the safety
in between. In smaller systems, the computer is of the employees and the well-being of the
used for entering cardholder information and facility, it is critical to have a thorough working
programming the system, whereas in larger knowledge of the operation of the system and
systems there may be multiple computers dedi- the security officer’s role in its successful use. It
cated to programming and photo badge cre- is also very important to understand the proper
ation or monitoring and controlling the various operation of the system and expectations of the
alarms and doors connected to the system. In fire department.
the largest systems the desktops communicate Fire alarm systems typically have a main
to a server, which is a high-speed computer able control panel with a display. If necessary, addi-
to perform several thousand operations per sec- tional displays can be installed in other areas.
ond: essential for controlling the flow of data Larger systems may incorporate a graphical
back and forth across a large access control sys- display of the facility and locations of the vari-
tem. In some cases, a secondary server is kept ous sensors therein. Where the alarm must be
on standby to act as a reserve to the primary monitored offsite, a communicator or dialer is
server should it fail or need periodic mainte- installed to allow the fire alarm to send alerts
nance. When this secondary server is receiving to an alarm company central station or, in some
the same updates at almost the same time as the rare cases, to the fire department.
primary server and can automatically take over Like intrusion alarm systems, fire alarms
the processing load, it is said to be redundant can be connected with a number of devices
or mirrored. on a zone. Newer, larger fire alarm systems
Access control systems can be used to moni- (and intrusion alarm systems as well) utilize
tor alarms, such as door alarms, duress buttons, a multiplex loop, where all of the devices are
or environmental situations (high or low tem- connected on the same loop, with each device
perature, sump pump, water level). The control having its own unique identifier or address.
systems typically contain a graphical interface This type of system is known as a multiplex or
II. COMMUNICATIONS
94 8. CENTRAL ALARM STATIONS AND DISPATCH OPERATIONS
addressable system. The largest fire alarm systems the central monitoring station, dispatchers can
integrate dozens or hundreds of control panels control these cameras at will, in order to focus on
across several facilities, with a dedicated main locations or individuals that require close obser-
computer in the company command center for vation at a given time. These cameras can also be
monitoring. set up to focus on a series of locations, one after
another, each for a preset length of time.
CCTV cameras generally incorporate a
Building Automation Systems (BAS) method of recording the images they monitor.
Building automation systems operate much This allows protection officers to revisit images
the same, and in a similar configuration, as to verify descriptions of individuals and events,
access control systems. Building automation and also to retain those images for use as evi-
systems control heating, ventilating and air con- dence. At particularly sensitive locations, video
ditioning (known collectively as HVAC), as well may be recorded on a continuous basis, but this
as lights. More expansive systems can assist in very quickly consumes a great deal of data stor-
controlling elevators, escalators, and irrigation age space. Cameras that are integrated with
systems. Building automation systems may other sensors—intrusion sensors, for example—
integrate with, or share the same software and can be set up to focus on a specific area and
hardware as, an access control system. begin recording when an alarm is received from
the associated sensor. A dispatcher typically has
the ability to begin and end a video recording
Closed-Circuit Television Systems (CCTV) at any time and to take a single snapshot image.
Closed-circuit television (CCTV) systems Images have typically been stored on video
allow dispatchers to watch over a large number cassettes, in either real time or time-lapse for-
of areas at once. They provide an excellent (and mat (Ruiz, 1999). However, the current trend
cost-effective) way to monitor high-sensitivity is for image files to be digitally stored onto
and high-risk locations at all times, without computer hard disk drives either using digital
needing to post a protection officer at those video recorders, (DVR), or with several drives
locations. The cameras used may be easily vis- together, or onto large capacity storage devices
ible to the public or they may be hidden to the known as network attached storage (NAS) or
point of near-invisibility, depending on the needs storage area networks (SANs). It is possible to
of the organization and the locations at which connect the hard disk drives into a configura-
they are stationed. tion known as a redundant array of indepen-
From the central monitoring station, a dis- dent disks, or RAID. Such a configuration has
patcher may be able to view up to 16 separate the capability of either manually or automati-
images in real time on a single monitor (Nelson, cally backing up drives so that the failure of
1999). Alternatively, he or she may view a single any one drive does not result in the loss of all
image at a time, and switch to other images on recorded data. Other options for exporting
demand or at preset intervals. The video images images include CD-ROM compact disks, digital
may be in color or black-and-white format. video disks, or even USB flash drives.
According to Nelson (1999), color images are
better for identification purposes, while black-
and-white images have better performance in
Integrated Systems
low light. Cameras may be stationary, but those As security and fire alarm systems become
with pan, tilt, and zoom capabilities can easily more expansive in scope and operation, it is
be installed wherever they are necessary. From sometimes necessary to link the systems together
II. COMMUNICATIONS
TYPES OF SENSORS 95
under one controlling piece of software or appli- ● Glass break sensors. When a pane of glass
cation. Other times it is necessary to link various breaks, it emits sound waves in a specific
systems together, such as human resources sys- frequency. Glass break sensors are able to
tems, parking applications, and payroll systems, pick up this frequency and generate an alarm
so that there is greater functionality and more in response. They are particularly useful
accurate information flowing automatically near windows and glass doors (J. Russell,
between those systems. Such systems are generi- personal communication, July 8, 2009).
cally referred to as “integrated systems.” ● Motion sensors. Microwave sensors send
waves of electromagnetic energy back and
forth within an area. If an intruder enters,
TYPES OF SENSORS the energy is interrupted, and the sensor
generates an alarm. Passive infrared sensors
All security, fire, and other alarm systems detect the body heat of an intruder and
incorporate a wide variety of sensors at vari- generate an alarm in response. Ideally, an
ous points throughout a protected facility. The area will be protected by dual-technology
basic purpose of a sensor is to detect a physi- sensors. These combine microwave and
cal change in the environment, interpret what infrared technology into one sensor,
event might be taking place, and transmit that increasing the reliability of the system and
information back to a central processor where it decreasing the number of false alarms
is translated into a format that can be read by transmitted to the monitoring station
the dispatchers in the central alarm station. (Morris, 2003).
● Electric eye. This type of sensor consists
of a transmitter, which generates infrared
Intrusion Sensors light in a straight line, and a receiver
directly opposite the transmitter. When
Intrusion sensors are meant to determine
the beam of light is broken by an intruder,
whether an unauthorized person has accessed,
an alarm is sent to the central processor.
or attempted to access, a protected area (Garcia,
Electric eyes have declined in popularity
1999). Various types of sensors can be placed
due to the availability of motion detectors
around the perimeter of a facility, around a
with greater reliability (J. Russell, personal
smaller area within the facility, or on a particu-
communication, July 8, 2009).
lar spot or item (Morris, 2003). They typically ● Seismic sensors. These are able to pick up
incorporate a short delay prior to generating an
vibrations on a surface and when a certain
alarm, in order to allow an authorized person
vibration threshold is reached, an alarm is
to deactivate the system without sending a false
generated. Seismic sensors may be placed on
alarm to the monitoring station. Types of intru-
floors in order to detect a walking intruder,
sion sensors include:
or on walls or doors, to detect an attempted
● Magnetic contact switches. These are placed break-in (J. Russell, personal communication,
on doors, windows, and other potential July 8, 2009).
access points. Typically, the first part of the ● Pressure sensors. These detect the weight
mechanism is placed on the frame and the of a person or object. If an intruder steps
second part is placed on the movable portion on a pressure mat, the change in surface
of the access point. When the access point is weight activates an alarm. Alternatively, a
opened, the magnetic signal is interrupted pressure switch may be placed underneath
and the sensor generates an alarm. an object at risk of theft or removal. Again, if
II. COMMUNICATIONS
96 8. CENTRAL ALARM STATIONS AND DISPATCH OPERATIONS
an intruder removes the object, the change in not be programmed to unlock the door, as
surface weight triggers an alarm. this allows the door to be unlocked from the
● Panic and duress alarms. These are switches outside without a key or card.
that must be manually activated by a staff ● Keypad locks. These devices require
member when he or she is threatened by an an employee to input a numeric code in
intruder or other emergency. Typically, they order to bypass the locking mechanism.
are utilized in high-risk or high-sensitivity Because codes can be easily transferred to
areas and are hidden from the general unauthorized persons, these locks are often
public. Alternatively, handheld wireless used in conjunction with other access control
panic alarm triggers may be issued directly measures.
to employees (Morris, 2003). ● Magnetic strip readers. An employee is
issued a card with a magnetic strip, which
is embedded with numerical data. The
Access Control Sensors employee swipes the card through the
reader, which uses that data to verify his
Access control sensors may be used to detect
or her authorization for access (J. Russell,
unauthorized access to a facility, and to gener-
personal communication, July 8, 2009).
ate security alarms in response. However, they ● Proximity card readers. Proximity cards are
may also be used to grant access to authorized
also embedded with a numeric identifier.
personnel when presented with the proper cre-
The staff member waves the card near the
dentials. Several types of access control sensors
reader, which utilizes radio frequencies to
are often used at a single entry point in order to
receive the data, which is sent to the field
provide multiple layers of security:
controller. The field controller verifies the
● Magnetic contact switches. These operate in card and grants or denies access accordingly
the same manner as they do when applied to (Best, 2003).
intrusion detection systems. These switches ● Wiegand card readers. A Wiegand card
are able to detect whether a door is open contains specially treated wires with a
or closed; if the door is opened without unique magnetic signature. A sensing coil
presentation of a proper credential, a forced inside the reader receives the data contained
door alarm will be generated (J. Russell, within the employee’s card (Best, 2003). The
personal communication, July 8, 2009). card can either be swiped or passed through,
● Request-to-exit devices. Also known as REX depending on the design of the reader.
switches, these are sometimes embedded ● Biometric readers. These detect the unique
into the crash bar or doorknob on the interior characteristics of parts of a person’s body in
of a door. A motion sensor may also be used order to verify his or her access privileges.
as a request-to-exit device when mounted Biometric readers include fingerprint scanners,
above the door, to sense a person traveling handprint scanners, retinal scanners, facial
toward the door to exit. When the door is recognition, and voice recognition.
opened properly in order to exit an area, the
REX switch is triggered and bypasses the
Fire Alarm Sensors
magnetic contact switch, avoiding a false
alarm. However, if the door is left open for The ability of fire to devastate lives and prop-
an extended period of time, a held door erty should never be underestimated. Fire alarm
alarm will be generated. Unless there is a sensors seek to prevent significant damage by
requirement to do so, REX devices should detecting fires in their earliest stages, allowing
II. COMMUNICATIONS
TYPES OF SENSORS 97
protection officers and fire officials ample time or combustion particles. They typically
to respond. Fire alarm sensors include (J. Russell, incorporate ultraviolet light sensors, infrared
personal communication, July 8, 2009): light sensors, or visible light sensors.
● Pull stations. These switches are
● Heat detectors. These measure changes strategically placed throughout a protected
in a room’s ambient temperature. They facility, and when a person observes fire or
are programmed to a certain baseline smoke, he or she is encouraged to manually
temperature and when the room’s pull the nearest switch, triggering a fire
temperature exceeds the baseline, a fire alarm and speeding evacuation of the
alarm is triggered. area. Unfortunately, pull stations are easily
● Photoelectric smoke detectors. This type of abused. To activate a pull station in order
detector contains an electric eye, generating to cause a false public alarm is a criminal
a beam of infrared light within its housing. offense in most jurisdictions; therefore,
When smoke enters the detector, it refracts protection officers responding to such
that infrared light, and an alarm is triggered alarms should be prepared to enforce their
in response. organization’s relevant policy or involve
● Ionization detectors. These devices contain local law enforcement as appropriate.
a tiny amount of radioactive material, which
creates radiation in an ionization chamber.
Any smoke that enters will absorb some of Building Automation Sensors
the radiation and change the electrical charge Building automation sensors are typically
within the chamber, prompting the device used to measure and adjust the heating, ven-
to send an alarm signal to the monitoring tilation, air conditioning, lighting, and other
station. environmental conditions in a protected facility.
● Air sampling detectors. These are often They include:
used to protect rooms filled with sensitive
equipment, such as computer servers. They ● Gas detectors. There are several different
continuously take in air from the room types of gas detectors, each of which will
and analyze the air samples for smoke or measure the levels of a particular type of
combustion particles. If a positive result is gas in the air (such as natural gas, carbon
received, the detector generates an alarm monoxide, carbon dioxide, and radon). If the
and in many cases, immediately causes a fire gas levels exceed a preset tolerance, an alarm
suppressant to be discharged within the room. is generated.
● Beam detectors. These utilize an electric ● Level indicators. These are often applied
eye, which extends a beam of infrared light to tanks that hold liquids or gases that are
across an entire room, rather than within critical to a facility’s operation. When the
the housing of a photoelectric detector. They amount of liquid or gas in the tanks drops
are most often used in rooms with very below a preprogrammed level, a notification
high ceilings, where it would be impractical can be sent to the central monitoring station
to install and maintain a smaller detector. or to personnel who will refill the tanks
Again, the beam of light will be refracted (J. Russell, personal communication, July 8,
by smoke in the room and an alarm will be 2009).
triggered. ● Temperature sensors. As the name suggests,
● Flame detectors. These are able to spot these measure the ambient temperature in a
actual flames, rather than sense smoke room. They are often utilized in rooms where
II. COMMUNICATIONS
98 8. CENTRAL ALARM STATIONS AND DISPATCH OPERATIONS
scientific experiments are being conducted ● Motion sensors or Video Motion Detection
and the temperature must be kept extremely (VMD). Certain types of motion sensors
hot, extremely cold, or within a specific can be incorporated directly into a CCTV
range. If the temperature falls out of the camera. These typically utilize a reference
pre-set range, an alarm is triggered. image, which is compared to the image
● Power failure sensors. These are integrated currently being picked up by the camera,
with the electrical system of a facility. When in order to detect whether the image has
a power failure occurs, a notification alarm changed significantly (J. Russell, personal
can be sent to the central monitoring station. communication, July 8, 2009).
At the same time, devices such as backup ● Facial recognition. This biometric technology,
generators and emergency lights can be when integrated with sophisticated CCTV
automatically activated. cameras, can identify potentially dangerous
● Integrated sensors. Some of the same individuals by comparing a face with wanted
devices used to detect intruders—magnetic person lists or terrorism watch lists. They
door switches and motion sensors, are most often utilized by law enforcement
for example—can be integrated with officials at immigrations checkpoints, such as
lighting systems. In this way, lights can be airports (Best, 2003).
programmed to turn on automatically when
a staff member enters a darkened room.
TRANSMISSION MEDIA
II. COMMUNICATIONS
VISITOR MANAGEMENT SYSTEMS 99
● Optical fiber. This type of material is number of visitors each day as part of their nor-
increasing in popularity at a rapid pace. It mal operations. Personnel at the front office or
was once far more expensive to install a fiber security office must fulfill two functions: first,
optic network than a copper one, but like they must determine whether or not to allow a
most technological innovations, fiber optics visitor access to the building. Second, they must
are dropping in price. Copper wire carries keep a log of all visitors who have arrived and
signals in the form of electricity; optical fiber departed.
carries signals in the form of light, which is less In the past, organizations typically relied
inherently dangerous. Additionally, optical on a paper sign-in sheet at the building’s main
fiber is able to carry larger amounts of data at a entrance. A visitor would write his or her name,
faster rate than copper wire. Both transmission time of arrival, specific destination within the
media can be cut or damaged, but like copper building, and purpose of the visit on the sign-in
wire, optical fiber is continuously monitored, sheet. Personnel at the desk would verify the
so the central monitoring station will be made visitor’s identity, ensure that he or she had per-
aware as soon as this occurs. mission to enter the building, and in most cases,
● Radio transmission. This method utilizes the issue a temporary identification badge for the
air as its transmission medium. Alarm signals visitor to wear while on the premises. The visitor
are sent via a certain radio frequency from would then be required to sign out when exiting
point A directly to point B. This solution can the building. This type of procedure is still in
cover a much longer distance than copper place at many organizations, especially smaller
wire or optical fiber. A drawback with some ones, due to its simplicity and low cost.
radio systems, however, is that the signal However, for many larger organizations,
is prone to interference from trees, other electronic visitor management systems prove
objects, or competing radio signals (J. Russell, safer and more cost-effective because staff mem-
personal communication, July 8, 2009). bers no longer need to spend time logging visi-
● Cellular transmission. Cellular signals are tors in and out, and personally clearing each
similar to radio signals; in fact, they operate one through applicable unwanted person data-
within the radio frequency spectrum. The bases (Savicki, 2007). Such solutions greatly
difference is that cellular signals are transmitted increased in popularity after September 11,
at a higher frequency within that spectrum. 2001. A typical electronic visitor management
Additionally, they utilize cell towers that are system consists of a kiosk at the building’s
capable of digitally processing, sending, and entrance, an attached printer, and software that
receiving the signals over a wider area than links the kiosk to the front office or security
traditional radio signals. Unfortunately, this office. A visitor approaches the kiosk and enters
transmission medium is not continuously his or her personal information or presents his
monitored; therefore, in fire alarm systems, it or her driver’s license for the machine to read.
can only be used as a backup method, rather The purpose of the visit must also be provided
than a first line of defense (J. Russell, personal (Moorhouse, 2008). The kiosk may check the
communication, July 8, 2009). individual through applicable state and national
databases—sex offender registries are typically
utilized in school settings—as well as organi-
VISITOR MANAGEMENT SYSTEMS zationally defined unwanted person databases.
If the visitor is not cleared, he or she is issued
Several organizations—large office build- a voided identification badge and appropriate
ings and schools, for example—receive a large staff members are notified automatically to take
II. COMMUNICATIONS
100 8. CENTRAL ALARM STATIONS AND DISPATCH OPERATIONS
further action (Savicki, 2007). If the visitor is switch between functions quickly and easily.
cleared, the kiosk prints an identification badge Typically, the operator will be equipped with a
for him or her to wear on the premises, which headset, in order to move about the station and
includes a facial photograph, the date, time, keep both hands free while communicating with
and purpose of the visit (Moorhouse, 2008). An a caller. The system may incorporate several
added benefit is the ability of staff members to incoming emergency lines and several incom-
easily search the software database for detailed ing nonemergency lines, which would likely be
information on previous visitors. shared by all telephone consoles at the station.
It is also possible to integrate a visitor man- Each console would also have access to its own
agement system with a building’s access con- line for outgoing calls. Alternatively, all emer-
trol system. For example, the card printed by gency calls may be routed to a dedicated “red
the kiosk may be programmed with certain phone” in the station, eliminating the need to
electronic credentials, which would allow the place an emergency caller on hold while brief-
bearer to enter authorized doors by swiping ing police, fire, or emergency medical services
the card or presenting it to an electronic reader. (Thibodeau, 2003). It is common for all tele-
Alternatively, frequent visitors may be issued a phone calls, incoming and outgoing, emergency
permanent card or tag, which can be presented and nonemergency, to be automatically recorded
to the kiosk when entering or exiting the build- and archived for supervisors to refer to later.
ing, without necessitating a new identification In agencies with very advanced technology,
card for each visit (Savicki, 2007). telephone systems may be integrated with a
variety of other systems in the central station.
For example, it is possible to connect certain
COMMUNICATIONS telephone software with certain computer-aided
dispatch software and geographic mapping
Communications equipment plays a huge role software. In these situations, the central station
in the successful resolution of alarms, criminal may receive an emergency call, and the location
and policy violations, emergency situations, and, provided by the caller ID may be automatically
of course, customer service. In a modern central highlighted on a computerized map. The loca-
monitoring and dispatch station, communication tion might then be automatically imported into
takes many forms. However, the vast majority of the computer-aided dispatch software when a
communication is performed verbally, through new event is created by the operator.
telephone lines and radio channels. Organizational policy varies with regard to the
A modern telephone system in a central usage of cellular phones by protection officers in
station will incorporate many technological the field. When they are permitted, they can be
advances available to the general public, such as very useful tools for relaying information back
caller ID, preset number dialers, and the ability and forth that is sensitive but nonemergency in
to place callers on hold or transfer them to other nature. At the very least, it is common for a patrol
lines. However, the system should also be tai- supervisor to be equipped with an organization-
lored for use by emergency service personnel. issued cellular phone for this purpose.
The system’s interface may be a series of Radio systems are equally as important as
physical keys on what looks like a very large telephone systems in both emergency and non-
telephone base, or it may be integrated with emergency situations. They are the most fre-
touchscreen software, to allow the operator to quently used method by which field officers
II. COMMUNICATIONS
CONCLUSION 101
communicate with their dispatchers and with messages—to be sent and received. Certain digital
each other. A modern radio system interface, radio systems can even be integrated with certain
like that of a modern telephone system, may computer-aided dispatch software, which can
consist of a set of keys or may incorporate a communicate via text with individual radio units.
touch screen for ease of use. The same headset
used by the operator for telephone communica-
tion will often be integrated with the station’s CONCLUSION
radio system as well. Additionally, the cen-
tral station should be equipped with software Remember: the most important component
enabling an operator to see the name or ID of of a central monitoring and dispatch operation
a handheld or mobile unit; to page, activate, or is you, the protection officer assigned to the sta-
deactivate an individual unit; to acknowledge tion. Cutting-edge technology is no substitute for
emergency signals received; and to perform an individual with good communication skills,
maintenance functions. sound judgment, knowledge of department pol-
The radio system will typically be capable of icy, and proper and up-to-date training.
monitoring and transmitting on a large number After completing the initial department-
of channels simultaneously. These may consist approved courses and on-the-job training, it
of the primary channel, an emergency channel, is important to continue growing as a profes-
a tactical channel, maintenance and custodial sional. This is achieved in part by studying
staff channels, and many more. Direct monitor- current departmental policy and seeking con-
ing and transmitting on local police, fire, and tinuous feedback from coworkers and super-
emergency medical channels is also possible. visors. However, in order to keep up with
A two-way radio operates in either simplex or industry developments and open up additional
duplex mode. In simplex mode, a radio transmits training opportunities, it is often wise to turn to
and receives messages on the same frequency a professional organization.
and communicates directly with other radios. In The International Foundation for Protection
duplex mode, a radio transmits and receives mes- Officers is an excellent starting point. Their
sages on two different frequencies. This mode Certified Protection Officer program is extremely
also incorporates a repeater. A repeater is sim- beneficial to officers both in the field and at the
ply a stationary device, attached to an antenna, central console. Several organizations exist, how-
which receives a radio message, amplifies it to ever, which provide more specialized opportuni-
increase its range, then retransmits the message ties for dispatchers and monitoring personnel.
to its destination. Duplex mode is far more com- The Association of Public Safety Communications
mon than simplex mode in this day and age. Officials (APCO) and the National Emergency
Radio equipment can be either analog or digi- Number Association (NENA) provide continu-
tal. Analog equipment has been in use for many ing education programs and advocacy for dis-
years. It tends to be less complicated than digital, patchers in the public and private sectors. The
and is therefore less expensive to purchase and National Burglar and Fire Alarm Association
maintain. It also tends to be more compatible (NBFAA), the Security Industry Association (SIA)
with existing radio systems. Digital equipment and Central Station Alarm Association (CSAA),
allows for a larger number of officers to talk provide similar services, but are geared toward
at once on the same channel. It also allows the life safety and security alarm monitoring end
for different types of data—for example, text of the spectrum.
II. COMMUNICATIONS
102 8. CENTRAL ALARM STATIONS AND DISPATCH OPERATIONS
EMERGING TRENDS
● As we have seen, many different types of organizations, analog systems provide
alarms can be integrated with each other to plenty of functionality at a greatly reduced
achieve optimal results. Likewise, telephone cost. While digital equipment is on the
and radio systems can be integrated with rise, analog equipment is far from
computer-aided dispatch software and a obsolete.
variety of other software packages. The ● Text-based communication has been
ability to integrate is highly valued, and as utilized among protection officers for
technology improves, the ability will continue years, incorporated into the mobile data
to become more widespread. terminals installed in many police and
● Plain language radio transmission is rapidly security vehicles. It has also been utilized
becoming the preferred protocol for many in telecommunications devices for the deaf,
organizations, rather than the use of 10-codes which allow the hearing-impaired to quickly
and other codes to denote certain types of call for emergency assistance. However,
events. This is because plain language makes very recently, a call center in Iowa became
it far easier to cooperate with other agencies the first in the nation to accept emergency
during emergency situations. text messages to 911 (Svensson, 2009). This
● Digital radio systems are becoming more capability is likely to be adopted by many
widespread, thanks to their enhanced more emergency call centers in the near
voice and data transmission capabilities, future. Whether or not similar technology
and the potential for integration with will become popular in the private sector
software applications. However, for many remains to be seen.
II. COMMUNICATIONS
SECURITY QUIZ 103
Ruiz, H. C. (1999). Security technologies. In S. J. Davies & from http://www.eee.strath.ac.uk/r.w.stewart/boxes
R. R. Minion (Eds.), Security supervision: Theory and prac- .pdf.
tice of asset protection (2nd ed.) (pp. 263–271). Burlington: Svensson, P. (August 5, 2009). Iowa 911 call center
Elsevier Science. becomes first to accept texts. ABC News. Retrieved from
Savicki, M. (April 26, 2007). School uses high-tech check- http://abcnews.go.com/Technology/wireStory?id
point for visitors. The Charlotte Observer. Retrieved from 8259735.
http://www.lobbyguard.com/news/charlotteobserver- Thibodeau, C. T. (2003). Effective communications. In
20070426.htm. Protection officer training manual (7th ed.) (pp. 166–170).
Stewart, R. W. (1994). The police signal box: A 100 year Burlington: Elsevier Science.
history (University of Strathclyde, 1994). Retrieved
II. COMMUNICATIONS
This page intentionally left blank
U N I T III
PROTECTION OFFICER
FUNCTIONS
9
Automation in Protection
Operations
Kevin E. Peterson
107
108 9. AUTOMATION IN PROTECTION OPERATIONS
services themselves remained largely low-tech, A number of studies in recent years have
focusing on armed guards and facility protec- projected massive expansion of electronic secu-
tion (Smith, 2003). rity systems employing advanced technologies,
The next major jump in security services but they also concluded that the human element
occurred as World War II approached and the (i.e., security officers) will not be predominantly
defense industrial complex emerged. The field replaced by technology (Webster University,
of “industrial security” was established to meet 2009). This conclusion is particularly interest-
the needs of the federal government in manag- ing, and profound, since some of those studies
ing security requirements for defense contrac- were funded by security systems vendors.
tors. The “industrial security” era resulted in Nonetheless, technology can and should be
a wide array of new security-related technolo- exploited by the security services industry—-
gies, concepts, and procedures—and an increase and this will require officers and supervisors
in the use of security officers. Existing security who are well rounded in technology applica-
providers opened specialized divisions and new tions. Some of these applications are discussed
providers were established to meet the need. in the remainder of this chapter, according to
Despite these innovations and forward-looking the primary functions they perform.
companies, many people viewed the security
industry as nothing more than night watch-
men, even up to and through the 1960s. Over CONTEMPORARY SECURITY
the next three decades, the use of security offi- ENVIRONMENT
cers became more prevalent. Ironically, one rea-
son for this may have been the development of Today, an increasing number and variety of
security technology such as electronic access technology applications support security func-
control and surveillance systems. For example, tions. The most relevant of these applications,
these technologies led to the establishment of from the perspective of the professional protec-
security operations centers (or command cen- tion officer, are listed below.
ters), which created a new function for protec-
tion professionals.
During these years, computer and commu-
Incident Management Systems
nications technologies developed rapidly and Few would argue that one of the most tedious
permeated virtually every type of business as tasks for the protection officer is report writing.
well as our personal lives. However, the secu- Originally, incident management systems simply
rity services industry is generally perceived as changed the task of writing a hardcopy report
having been slow to embrace technology in the into a computer-based function where officers
performance of their mission. would enter the same data into a computer using
The terrorist attacks of September 11, 2001, a word-processing-like program. One of the
brought new and intense attention to the secu- benefits of this change was that users of these
rity industry in both the public and private sec- reports no longer had to deal with issues such
tors. One of the benefits of this attention was the as poor handwriting and missing pages. Data
development and implementation of new and entry, however, was awkward, formats were
improved security technology applications. cumbersome, and it was difficult or impossible
Essentially, it gave a “shot in the arm” to secu- to include attachments, diagrams, and sketches.
rity budgets and made it easier for security pro- The functionality of incident management
fessionals to justify innovations in equipment, systems expanded rapidly and developed into
tactics, and techniques. more integrated tools such as IRIMS (Incident
There is no excuse today for using a hand- Near-term plans for CAP Index include
written sign-in log as a visitor management tool. “… an ‘ultimate dashboard’ that will merge
In addition to the inefficiencies and inability to crime forecasting with site surveys and risk
electronically store and access data, hardcopy assessment, event history and loss-related
visitor logs can represent a security vulnerability. alerts …” (Groussman, 2008, p. 63). Tools like
Visitors can generally view the log while they are this should be used for strategic security plan-
signing in and see who else (individual, company, ning, making a business case for new policies
etc.) was recently in the facility. In some environ- and programs, and conducting risk assessments.
ments, that may be very sensitive information— It is extremely useful to track crime data for a
or may at least represent a privacy issue. given location over time and also be able to
compare crime levels in surrounding areas.
Crime Mapping
Another category of automation that is Geospatial Information Systems (GIS)
increasingly important to the crime prevention
Closely related to crime mapping, GIS pro-
and security communities is that of crime map-
vides a graphic view of various situations by
ping. The most well-known and respected pro-
leveraging the capability to layer information
vider of crime mapping services is CAP Index.
from different databases or inputs over a map
They refer to their primary capabilities as crime
or image. This tool is generally used for exterior
forecasting and security risk analysis. This firm
spaces (e.g., a map of a city or neighborhood),
provides several products, all based on objec-
but can also be used with diagrams, campuses,
tive crime and incident data. Among the uses
or even building interiors. The objective may be
for this type of data are:
to review historical data (such as incidents or
● Site selection—used by organizations to aid a particular type), identify patterns of activity,
in determining where to locate new facilities display sensitive locations or areas that warrant
or where to expand existing facilities based special security attention, support an investi-
in part on local crime data gation, identify traffic patterns (vehicular, foot,
● Rank and compare—the ability to compare or product), or compare any type of data with
crime statistics at different locations other data sets by location.
● Security allocation—data to assist in One example of a GIS provider is ESRI, which
determining security force deployment, staff has supported a wide variety of homeland secu-
augmentation, and resource allocation rity, law enforcement, disaster management,
● Litigation defense—crime data can be used and public safety projects. They provide com-
to justify corporate policies and procedures mercial-off-the-shelf (COTS) software as well
that may be questioned during a security- as individualized consulting and project man-
related lawsuit or other legal action agement services. The ESRI Web site states that
● Loss prediction—products can be integrated “a geographic information system … integrates
with corporate data such as shrinkage figures hardware, software, and data for capturing,
to aid in predicting losses and setting risk managing, analyzing, and displaying all forms
tolerance (thresholds) for specific retail or of geographically referenced information. GIS
other sites allows us to view, understand, question, inter-
● Return on investment (RoI)—data can be pret, and visualize data in many ways that reveal
used to justify security expenditures and relationships, patterns, and trends in the form
projected budgets for specific sites or entire of maps, globes, reports and charts.” Regarding
enterprises force protection and security applications,
get side tracked and go off on tangents, focus- much that they more readily accept technol-
ing more on the online environment than on ogy in their workplace. Still, the effective use of
the investigative or security objectives. Second, automated security tools should be emphasized
there is a natural assumption that anything in officer training and education programs.
extracted from databases or online sources is Two graduate students in a Business and
credible. Users must remember to validate and Organizational Security Management program
corroborate all sources, including those that studied college curricula designed to pre-
originate in online databases or files (ASIS pare protection officers for a career in security.
International, 2006, p. 73). Among their findings was a distinct lack of
coursework addressing emerging technology
issues. They concluded that course content
THE ROLE OF THE should include orientation on automated tools
PROFESSIONAL such as incident and visitor management sys-
PROTECTION OFFICER tems as well as crime mapping and analysis.
According to their report, “Security officers
Protection professionals, whether operating lacking this knowledge would be placed at a
in a government or private sector environment, great disadvantage among peers …” (Bolyard &
are increasingly relying on technology and Powell, 2007, p. 4).
automated applications such as those described In addition to individual officers, security
in this chapter. Individuals who embrace tech- service providers might consider expanding
nology and leverage it as a tool in performing their service offerings to include items such as:
their duties—and in their own professional ● Conducting automation-assisted risk
development—are those who will excel. In fact,
assessments
the same applies to security services providers. ● Providing security technology training
As security business consultant Mark Gottlieb
services
puts it: ● Recommending security technology
Due to advances in security technology, computer solutions to clients
literate guards who understand “smart buildings” ● Including automated crime analysis or crime
and possess an understanding of the loss preven- mapping within security services
tion function will find their services in high demand.
... Technological improvements and innovation are
● Providing security services specific to IT
changing the role of the security guard. Security environments (e.g., data centers)
firms must keep abreast of these changes (Gottlieb, ● Providing IT security services
2006, p. 4).
As systems and procedures become more
Only a few years ago, administrators at a integrated and technology-dependent, we must
college offering an associate’s degree in crimi- also begin to consider the “security of security
nal justice and security management stated systems.” The Alliance for Enterprise Security
that their students—those employed as, or Risk Management began to address this issue in
aspiring to become, security officers—were a booklet entitled “Convergent Security Risks in
literally “afraid” of computers. For that rea- Physical Security Systems and IT Infrastructures.”
son, the college was extremely hesitant to add One of the many recommendations presented in
computer skills to their learning objectives and the booklet was:
curriculum. Connecting special systems and devices to orga-
Today, things have changed as people rou- nizations’ networks introduces new and usually seri-
tinely use technology in their personal lives so ous levels of risk. The trade-offs between connecting
and
We need to be careful to use technology as
… the amount and variety of security data flow- a tool rather than allow ourselves to be used
ing into their information systems is only going by technology. Nonetheless, professional pro-
to grow … as their corporations grow and as new tection officers should develop a technology-
technology-based security systems come online. The
corresponding need to store and organize this data
friendly mind-set, develop their skills, and
for meaningful use will thus become an even more incorporate high-tech thinking into their profes-
pressing issue … (McIlravey, 2009, p. 9). sional worldview.
EMERGING TRENDS
The driving force in today’s electronic secu- Electronic security systems are now routinely
rity systems is “integration.” Security systems capable of being controlled from remote sites
are increasingly integrated with fire and life via the Internet (over secure connections) and
safety systems, communications systems, and even using mobile devices such as a BlackBerry
even automated building controls. This allows or iPod (including activation/deactivation of
new capabilities such as “downstream controls” access cards, and dissemination of threat alerts
and “automatic lockdowns.” In other words, a to specific audiences). This trend is expected to
breach at an entrance turnstile might lock down continue and will require security professionals
the elevators or close selected interior doors. to keep up on these technologies (Belfor, 2008).
Building controls may include doors and locks, Somewhat related is the trend toward greater
elevators, lighting, HVAC, and communications functionality of incident management systems.
systems. Today, these controls can be integrated Data is being collected, analyzed, and utilized
with CCTV, intrusion detection, and electronic in unprecedented ways. Contemporary systems
access control systems. can provide valuable data for corporate inves-
Another important trend is toward remote tigations, level-of-trust decisions, on-site inci-
monitoring and control of security systems. dent management, evacuation management,
10
Patrol Principles
Christopher A. Vail
117
118 10. PATROL PRINCIPLES
Although they were nonmilitary, they were armed paid watchmen were those paid by merchants,
with staves and the traditional short swords. These parishioners, and householders. In 1737, the
patrolmen were also assigned to patrol geographi- Elizabethan Act of 1585 was enlarged to allow
cal precincts. cities to levy taxes to pay for the night watch.
As people moved north toward England In 1748, Henry Fielding suggested that polic-
and developed collective living arrangements ing was a municipal function and that some
(the precursors to towns), a form of individual form of mobile patrol was needed to protect
and group responsibility for policing began the highways. The Bow Street Runners were
to emerge through the concept of local self- formed, with a foot patrol to operate in the inner
government. Around A.D. 700, tithings (groups areas of London, and a horse patrol to operate in
of ten families) were formed for the purpose of the outer areas. In 1829, the Home Secretary, Sir
maintaining the peace and protecting the com- Robert Peel, introduced “An Act for Improving
munity. Tithingmen were elected by the group, the Police In and Near the Metropolis”—the
and their responsibilities included raising the Metropolitan Police Act. This legislation forms
hue and cry upon learning of a crime in the the basis for law enforcement organizational
group and dispensing punishment. Ten tith- structure in America. Setting the stage for orga-
ings were called a hundred and the head man nized patrol activity, 1 of the 12 fundamental
was called a reeve. Several hundreds within the principles of the Act stated that “the deploy-
same geographical area were collectively called ment of police strength by time and area is
a shire (the equivalent of our county) and the essential.” By the end of 1830, the metropolitan
chief law enforcement officer was called a shire- area of London was organized into 17 divisions
reeve (what we now call the sheriff). and superintendents were appointed. Patrol sec-
William, the duke of Normandy, introduced a tions were created, and each section was broken
highly repressive police system in A.D. 1066, in down into beat areas.
which collective security was deemed far more Basically, Peel replaced the patchwork of pri-
important than individual freedom in England. vate law enforcement systems then in existence
He divided England into 55 separate military with an organized and regular police structure
districts and appointed an officer of his choice that would serve the state and not local interests.
to be the shire-reeve in each shire, or military He believed that deterrence of criminal activ-
district. The state assumed the responsibility for ity should be accomplished by patrol officers
keeping the peace in this system. England lived trained to prevent crime by their presence in the
under this system until the Magna Carta (Great community. Hence, modern patrol was born.
Charter) was written in A.D. 1215, guarantee- Many English systems and beliefs became
ing civil and political rights to individuals and the basis for American social, political, legal, and
restoring local control to the communities. governmental systems. In New England, com-
In 1252 in England, the watch system was munities were formed around towns and villages,
established. People appointed to the duty of which relied on constables to provide protection
watchman had the responsibility for keeping and keep the peace by using the watch system.
the peace. They were unpaid and were often The South was more rural and agricultural, with
the dregs of society—the old, infirm, sick, and smaller communities. The county was the primary
criminally inclined. After 1285, some watches form of government, in which the sheriff system
grouped together for the purpose of safety, was the prominent form of law enforcement. As
forming a “marching watch,” which may be expansion moved westward, law enforcement
considered the first form of patrol organiza- organizations combined the functions and roles of
tion found in our present-day system. The only constable and sheriff.
5. Type of facility being protected, and the The officer should have a positive attitude
organizational image and culture of the facility when going to work—his or her mind should
6. The threat model and degree of vulnerability be focused on the job ahead. No personal prob-
of the facility lems, hobbies, or business should be carried to
work with the officer.
Depending on the size of the patrol area
There should be absolutely no ingestion of
and access to a car, or in some cases where golf
alcoholic beverages or other psychoactive sub-
carts are used, the officer can also carry patrol
stances at least 8 hours before going on duty.
dogs. Dogs enable the officer to search a large
The officer should have had ample rest before
and/or complex environment very quickly with
going to work, as he or she will need to be both
minimal manpower. In very large areas, aerial
mentally and physically alert on duty. Officers
patrols may be conducted by helicopter. In rug-
should have a positive attitude and an accom-
ged terrain, horses or ATVs may be used. Each
panying bearing that reflects courtesy, polite-
of these methods has some capacity to carry
ness, and a willingness to serve. These are basic
equipment.
qualities of professionalism, which instill confi-
dence in a department.
All personal and company equipment issued
PREPARATION FOR PATROL or used while on duty should be checked to
ensure that it is in working order. For exam-
Preparation for going on patrol duty is not ple, making sure a pen has ink for note-taking
only the physical act of putting on a uniform; it or a radio has working batteries, which can be
also requires mental and psychological prepara- life-saving if the officer needs to call for help.
tion. Security officers should act and look pro- Officers need to know all policies, rules, and
fessional not only while on duty, but also while regulations that pertain to the security of the
going to work. This not only produces a posi- facility, and particularly, the assigned patrol
tive impression on the people they serve, but it post. While proper procedures for performing
helps the officer to perform better. When they the job should be known, many officers have
look and act like professional security officers, their own procedures for accomplishing a task.
such demeanor demands more respect from If used, they should be in compliance with
others. This respect generates a positive attitude accepted practices of the security agency, the
in the officer, and he or she becomes more con- client, and certainly, the law.
fident and more competent in his or her work. It is important, when preparing to go on
While people should not “judge a book by its patrol, that the officer knows the property he or
cover,” the fact remains that people do judge pro- she is protecting “like the back of his/her hand.”
tection officers based on their first impression. The location and condition of emergency equip-
Clothes “do make the man,” so one’s personal ment, water shut-off valves, electrical controls,
appearance is important. The officer’s uniform fire alarms, and telephones should be known, as
should be properly tailored and in good con- the patrol officer may be the first responder to a
dition—neat, clean, and pressed. There should situation requiring their use. The location of any
be no holes, patches, or loose threads dangling hazardous materials, or places where hazard-
from it. Shoes and leather equipment should be ous materials are worked with, should be firmly
polished. Male officers should be clean shaven. implanted in the officer’s mind. All doors and
Hair and fingernails should be clean. No items windows, and the condition they’re normally
not authorized by the employing organization found in, should be well known. This includes
should be attached to the uniform. knowledge of existing scratches or other marks
any expected VIPs, vendors, contractors, and opportunity, the desire, and the tools. Patrol
so on. Determine if there are any communica- officers have a direct influence over the first one
tion “dead areas” and where they are. In other and some influence over the second. An effective
words, to be fully prepared to go on patrol, an patrol officer, by following accepted patrol proce-
officer must know what has happened, what is dures, can and will hinder the first element—the
happening, and what is likely to happen. opportunity to commit a criminal act. By ensur-
One area of preparation often overlooked by ing all doors and windows are properly closed
many officers and departments is that of con- and locked, ensuring there is adequate lighting
tinuing training and education. With the many in vulnerable areas such as where safes or valu-
and increased demands placed on security per- ables are kept and around the building(s) proper,
sonnel today, it is essential for the officer to stay and making access difficult to possible targets
abreast of the latest laws, equipment, products, for criminal activity, opportunities for the crim-
services, and procedures in security. This infor- inal are reduced or eliminated. This is the very
mation is gained only through education or essence of loss prevention.
training. Companies who contract out for their While the patrol officer may not be able to
security services, proprietary security depart- directly influence a person’s desire to commit
ments, and security companies themselves, a crime, that desire is greatly hampered by the
should provide basic and ongoing training for very presence of a security officer perform-
their security officers. Companies can estab- ing his or her patrol duties in a professional
lish internal training programs, send officers way. It is indeed a rare criminal who will com-
or require officers to attend local colleges that mit a crime in the presence of a patrol officer
have security educational programs, or have (although it has happened), especially one who
their officers take home-study courses. is visible, alert, and showing confidence. The
There are also private vendors who special- third element is not controllable by security
ize in conducting security training programs. personnel; however, security officers should
If a local police department has a “ride-along” know what tools are generally used by crimi-
program, this can provide excellent training for nals. Guns are obviously a tool, but some peo-
the security officer. Another way for an officer ple have the authority and permission to carry
to gain new information and knowledge is by weapons. Screwdrivers and pry bars are com-
reading security- and law enforcement–related mon everywhere, but in the hands of a criminal,
professional journals and magazines. Protection they become burglar tools. Information gather-
News, Security, Police and Security News, FBI Law ing equipment, such as photographic or record-
Enforcement Bulletin, and Security Management ing devices, may be used to steal information.
are all excellent sources of up-to-date profes- Radio transmitting or monitoring devices may
sional information. also be used by terrorists and sophisticated pro-
fessional criminals.
Patrol is never routine; anything is liable to
TECHNIQUES OF PATROL happen at any time. Therefore, there are two
major principles of patrol that guide the effec-
As stated earlier, patrol is defined as the act tive patrol officer. The first principle of patrol
of moving about an area to provide protection is that it should always be done in a random
and conduct observation. In the security world, fashion. Never patrol by driving or walking
the majority of patrol activity is focused on the in the same direction. Alter routes; change the
prevention of criminal behavior. A crime can- pace occasionally; walk or drive for a while and
not occur unless three elements are present: the then stop to look and listen. Sometimes, turn
known as creative daydreaming or mental flashlight. If there is a glare from lights, use it
rehearsal) is played as an officer patrols his or to your advantage if necessary! Use flashlights
her area by thinking of any possible incident, judiciously; don’t have them turned on more
remote as it might be, that could occur at any than necessary (although for walking safety
place or time. For instance, the officer could they should be used if other light sources are
think of what to do if someone came running not available). “See others before they see you.”
out of an office or building that is supposed to
be closed and locked, just as he or she gets there.
The officer could think about what actions to
take if he or she heard a loud explosion, or gun-
FACTORS THAT INFLUENCE
shots in the area. What would an officer do if he
PATROL EFFECTIVENESS
or she smelled smoke in the area or saw a fire in
As patrol is an expensive loss control tech-
progress? What would an officer do if he or she
nique, it only makes sense to have the officer
saw a chemical leak in progress? The list goes
detect the greatest number of loss-causing situ-
on and on. Doing this might uncover a potential
ations as possible. The WAECUP theory of loss
loss event that has occurred or is occurring. It
control is applicable here.
will also keep an officer up-to-date on company
rules, regulations, policies, and procedures. Waste—Patrol officers check scraps being
It is a form of self-training, as the officer can thrown away, look for lights, heat, and water
determine his or her own needs for improve- turned on needlessly.
ment and take the appropriate steps to correct Accident—Officers look for spills and other
any deficiencies in his or her professional life. slippery walking conditions. Always observe
Finally, it makes response to the event more effi- all around patrol points for fire hazards,
cient, should it occur. It may save the life of an materials stacked too high, and so on. “Look
officer or the life of another. up, down, and all around.”
Light and noise discipline should be prac- Error—Patrol officers should be thoroughly
ticed when on patrol. This means that patrolling briefed prior to their shift as to what
officers should avoid making any more noise activities are occurring in their patrol
than is necessary. They should keep the radio environment. They should check and
turned down somewhat, keep keys and equip- double-check schedules of building openings
ment from jangling, and so on. They should and shipments of personnel arrivals.
be able to “hear others before they hear you.” In many cases, the security department
Note that radio net discipline is also important; functions as “the grease in the machine,”
overuse of the radio ties up the net and depletes making things run smoothly between
the battery. Extended conversations should be different departments. In most organizations,
carried out by landline methods, such as tele- security makes sure that things don’t “fall
phones. Note, too, that backup means of com- through the cracks.” Patrol officers can play
munication should always be considered when a key role in alleviating problems caused by
on patrol or fixed post duty. Always have a con- simple human error.
tingency plan if the primary means of commu- Crime—Become familiar with criminal
nication doesn’t work. behaviors in the local area. Also, keep up-to-
Similarly, light discipline should be prac- date on criminal trends within the industry.
ticed. This means avoid being silhouetted. Speaking with local police and reading
Never sit with lights behind you or stay in a car industry-specific management literature are
with the dome light on. Use a clipboard light or good ways to maintain one’s professional
11
Traffic Control
Arthur A. Holm
131
132 11. TRAFFIC CONTROL
in order to keep traffic moving with a minimum must therefore assume a military bearing, with
of delay and maximum of safety. weight evenly distributed on both feet.
Since traffic control duty may require an offi- When not engaged in signaling motorists,
cer to remain at his post for hours in all kinds he/she must stand in the “at ease” position,
of weather, protective clothing must be readily facing traffic, and with hands at his/her sides.
available. Proper protection against the elements When directing traffic, shoulders must be in
is an important factor in maintaining efficient line with the flow of traffic and attention must
traffic control. It has been observed that a wet or be directed to the vehicular movement.
cold officer presents a hazard to himself as well
as to motorists.
Proper clothing should also include high- HAND SIGNALS
visibility material to increase the safety value
during nighttime assignments, whether the Prompt compliance to hand signals is depen-
intersection is well lit or not. dent on the officer’s ability to use uniform,
clearly defined, and understandable gestures.
Intersectional control does not call for compli-
ROADWAY POSITIONS cated choreography or wild arm movements.
Improper hand signals, although highly
The position selected to direct traffic entertaining to bystanders, cause confusion,
must be suited to the particular intersection hesitation, and lead to violations and accidents.
and expected traffic patterns. It must com- Unusual movements undermine the purpose of
mand a full view of the intersection and its traffic control and direction.
approaches. In turn, the officer must be com- Stopping traffic: Two clearly defined motions
pletely visible to the motorists and pedestrians. are required to stop traffic. First, select the
In many instances, noncompliance to gestures vehicle to be stopped. Look directly at the
or whistle signals is caused by the inability of driver, and point in his direction with the arm
the motorist to see the officer. Usually, officers fully extended. The position is held until you
assigned to traffic control will select a position are observed by the driver. Then raise your
in the center of the intersection or at one of the hand so that the palm is extended. The position
corners. is held until you are observed by the driver.
Then raise your hand so that the palm is toward
1. The center of the intersection: This position
the driver and the arm is slightly bent at the
affords the greatest visibility, but it is also
elbow.
the most hazardous. This location is usually
Maintain this position until the oncom-
selected when traffic signals are inoperative,
ing traffic has stopped. With the one arm still
traffic is not moving at a high rate of speed,
raised, turn your head and repeat the procedure
and where there is little pedestrian traffic.
with your other hand to stop the traffic moving
2. The corner position: Intersections having
in the other direction. The arms are now low-
heavy pedestrian or vehicular turns can
ered until all traffic has stopped (Figure 11-1).
be controlled by an officer standing a few
Starting traffic: To start vehicular movement
feet off the curb line at one of the corners
on the cross street, pivot a quarter turn to place
providing the greatest personal safety and
your shoulders parallel with the vehicles waiting
better pedestrian control.
to move. When the intersection is cleared, turn
Posture serves to communicate the fact that your head to one side facing the waiting traf-
the officer is in command of the situation. He/she fic. Attract attention by pointing to the lead car.
2 STOP 4 STOP
protection officer must exhibit sound judgment Vehicles should be allotted space by ensur-
in selecting his position. For example, when ing one section is filled in an orderly fashion
an extremely heavy flow of traffic is expected before rotating to another section. The signals
at a football game, a pregame plan should be to start and stop traffic are extremely important.
formulated. Practice them.
12
Crowd Management and Special
Event Planning
Patrick C. Bishop,
Terence M. Gibbs, and
Jennifer Lantz
137
138 12. CROWD MANAGEMENT AND SPECIAL EVENT PLANNING
normally held in restraint may be released crowd can quickly become unruly and very
in an emotional crowd. This temporary violent.
release of emotions is a strong incentive to an 4. Hostile—Crowds of this nature are generally
individual to participate in the activities of motivated by feelings of hate and fear to the
the crowd. It provides the opportunity to do extent they are prepared to fight for what they
things he or she has been inwardly desirous want. The most prominent types are strikes,
of doing but hitherto has not dared. political demonstrations, and hoodlums or
rival mobs. Hostile crowds may have leaders
who direct and maintain a high degree of
hostility in their followers, but not always.
TYPES OF CROWDS 5. Escape—An escape crowd is one that is
attempting to flee from something it fears. It
The behavior of crowds varies widely depend-
is leaderless and completely disorganized,
ing on its motivational interest. Crowds are clas-
but it is homogeneous in that each person
sified in accordance with their behavior patterns
is motivated by the same desire, which is to
and it is essential that any security measures
escape. Once an escape crowd reaches safety,
are based on recognition and understanding of
it will lose its homogeneity and its members
the type of crowd they must deal with. The fol-
must then be handled as refugees.
lowing outline is representative of most of the
crowd types that might be encountered in this
country.
CROWD ACTIONS AND
1. Acquisitive—The members of an acquisitive SUGGESTED COUNTERMEASURES
crowd are motivated by the desire to get
something. They are best illustrated by a The majority of crowds do not, as a rule,
crowd of shoppers seeking items in short resort to violence; however, any crowd is poten-
supply or at an auction sale. They have no tially dangerous or at the least, aggressive. The
leaders, little in common, and each member mood of a peaceful crowd—that is, acquisitive,
is concerned with his or her own interest. spectator, or expressive—may change quickly to
2. Expressive—In this type of crowd, the that of a hostile or “escape” crowd. Since most
members gather to express their feelings concern is caused by a hostile crowd, as opposed
such as at a convention or political rally. to the other types mentioned, a more thorough
The expressive crowd is usually well study should be made of it.
behaved; however, some persons in it may A hostile crowd is usually noisy and threat-
feel that slight disorders and unscheduled ening, and its individual members may harass
demonstrations should be condoned by security personnel. This kind of crowd will
the officials. When they are thwarted or hesitate to participate in planned lawlessness
restrained, resentment occurs and their because it generally lacks organization and
otherwise cheerful enthusiasm may be leadership in its early stages. However, it may
replaced by hostility. provide the seedbed for “mob” action when it
3. Spectator—This crowd gathers to watch is aroused by the more forceful persons who
out of interest, curiosity, instruction, or assume leadership. It may also be triggered into
entertainment. It is invariably well behaved violence by the undesirable actions of individ-
and good humored initially, but since ual protective personnel.
spectator sporting events, parades, and so on Aroused crowds will often vent their resent-
tend to stir the emotions rapidly, this kind of ment and hostility on those assigned to maintain
6. Using a recognized leader. An effective them pass through the ranks and then close
method of counteracting the developing rapidly behind them.
leadership in a crowd is by using someone
having greater appeal to the crowd. A
trusted labor leader, a member of the clergy, WHEN VERBALIZATION
a well-known sports figure, or a well-known DOESN’T WORK
civil rights leader can often successfully
plead for order and reason. Depending on When verbalization is not effective, there may
the origin and cause of the crowd formation, be a need to physically move crowd members.
an appropriate public figure or official may This should be done only as a last resort, and
greatly assist in calming the excitement and should include verbalization. It should be a
emotions of the crowd. planned action, only be done after professional
7. Preventing panic from developing in a instruction has been received on the proper
crowd. Panic is caused by fear and is most procedures. The following are some physical
often found in the “escape” crowd fleeing control techniques that are appropriate for the
from disaster or the threat of disaster or movement of people in crowds:
violence. The primary cause of panic is 1. “Heavy hands”—Assert your presence with
blockage of the escape route. Security actions your hands in front of you.
should aim at providing an escape route, 2. Be assertive! Do not take a backward step
directing and controlling the progress of when moving the crowd.
the crowd along the route, and at the same 3. Destabilize resistant persons by one or more
time dividing the crowd into small groups, of the following techniques:
if possible. The following control techniques a) Upper torso restraint.
might be implemented: b) Arm around waist with an escort hold.
a) Display a helpful, calm and confident c) Belt lift with an escort hold.
attitude. Loudspeakers should be used to d) Bracketing with an escort hold.
give directions and helpful information. e) Pressure point control as appropriate.
b) Use rational members of the crowd to f) Wristlocks, team control position, arm
assist in calming or isolating hysterical bars, etc. as appropriate.
persons.
c) Provide first aid and medical attention to
the injured and weak, particularly women SECURITY AND
and children. DEMONSTRATIONS
d) Use security to block off routes so as
to channel movement in the desired Security organizations assigned to supervise
direction. Care must be taken to ensure demonstrations have a twofold responsibility.
that the security forces do not panic a Regardless of individual convictions, they must
crowd by hasty action, arrogance, or first protect the peaceful demonstrators who are
thoughtlessness. exercising their right to protest.
8. Directing women and children. Crowds Spectators not in sympathy with the demon-
and demonstrators may resort to having stration constitute a potential threat of violence.
women or children wheeling baby carriages This is often aggravated by counterdemonstra-
at the head of their advance. If the marchers tion whether it is organized or spontaneous.
must be stopped, an attempt should be made Crowd control forces must also protect the
to divert the women and children or let general public from demonstrators who infringe
3. Communications (radio and telephone, PA 2. Take lawbreakers into custody and turn over
system) to the police for arrest.
4. First aid staff 3. Use reasonable force to enforce the law.
5. Ambulance or first aid rooms a) Do not overlook violations or defiance of
6. Doctors lawful orders.
7. Location of event b) The use of unreasonable force often incites
8. Fire procedures, equipment, personnel a crowd which normally would be passive
9. Communications center or curious.
10. Media observation area c) Charges of brutality are often made in
11. Entry and exit location for VIPs an attempt to discredit the security force;
12. Parking they will have no basis in fact if brutality
13. Lavatories is not used.
14. Food concessions 4. Remain on the fringe of the crowd. Do not
15. Disabled persons areas (wheelchairs) get too close or mix with a hostile crowd.
16. Entertainment before or after event Remain out of reach and observant of crowd
17. Signs and individual activities, pending the arrival
18. Timing schedule of reinforcements.
19. Number of security personnel and degree 5. Assist fellow officers who may be in
of expertise required trouble. If one of your associates situated
20. News releases and media precoverage near you is physically attacked, go to his
21. Time of year and type of environment or her immediate assistance. Arrest the
22. Alternate power sources assailant. To permit such a person to escape
23. Size of crowd expected will encourage others to assault or try to
24. Vehicles for movement of VIPs, and overpower individual security personnel.
so on 6. Refrain from participating in crowd activities.
a) An aggressive crowd will invariably
As you can see, when a large crowd control
throw a barrage of rocks, sticks, bottles,
event is known and sufficient time is avail-
and so on at opposing forces. DO NOT
able for preplanning, the event should be able
throw them back at the crowd! This will
to take place with minimal problems for both
only precipitate greater hostility and
security staff and participants alike.
supply the crowd with more missiles.
b) Withdraw to a safe distance until
dispersal operations can be commenced.
PERSONAL BEHAVIOR
a) ARROWHEAD
THIS IS USED TO STRIKE INTO AND SPLIT A CROWD OR MOB, TO PROVIDE AN
ESCORT FOR A PERSON (S) TO A GIVEN POINT THROUGH A FRIENDLY OR DIS-
ORGANIZED CROWD. THE USE OF AN ADDITIONAL INVERTED ARROWHEAD AT
REAR OF THE FORMATION WILL GIVE ALL-AROUND PROTECTION.
b) LEFT FLANKING AND RIGHT FLANKING
friendly or disorganized crowd. The use of 7. Are the security personnel properly briefed
an additional inverted arrowhead at rear of on the type of crowd?
the formation will give all-around protection. 8. Is the company providing security
2. Left flanking and right flanking—Used to properly licensed?
move a crowd or mob to the right or left, 9. Have all required permits been obtained?
or to turn a crowd away from the front of a 10. What is the seating?
building, fence, and so on. 11. What is the procedure for extracting
3. Line—Used to move a crowd or mob problem people from the crowd and
straight back up the street. ensuring that they leave the venue without
posing a threat to anyone inside or outside
the venue?
CROWD MANAGEMENT 12. Is supervision present and adequate?
ASSESSMENT 13. Are communications, including two-way
radios, adequate?
1. What is the officer-audience ratio? 14. Is alcohol being served at the event?
2. Are the security personnel deployed in a way If so, what are the procedures for
as to maximize surveillance of the crowd? controlling access to alcoholic
3. What type of performance is this? beverages?
4. Are the security personnel properly trained 15. What are the evacuation procedures in the
to handle the crowd? event of panic in the crowd?
5. Are the security personnel knowledgeable 16. In the event of a cancellation after the
in first aid? audience has been admitted to the venue,
6. Are the security personnel licensed and what procedures are in place to placate the
armed with any weapons? crowd?
EMERGING TRENDS
The first and foremost emerging trend is a greater are sworn in for the duration of the fair. Some of
awareness by organizational management of the the officers then joke that they are “suspended
problems and potential liabilities associated with without pay for 355 days” once the fair is over.
special events. Special events are complex under- In addition to the fair police, there are township
takings and many things can go wrong. Perhaps police, and some contract security personnel.
the best way to conceptualize this is the old saying York County Deputy Sheriffs perform security
“whatever else can go wrong, will go wrong.” at concerts held at the fair. Private investigative
It is clear that special event security is a firms conduct surveillance and make controlled
division of the security field that needs to be buys from vendors who sell counterfeit goods.
addressed. It is defined as a part of physical York County Probation Department person-
security, but it is not ongoing. It is occasional; nel search for probation violators and perform
only temporary. As such, it may not garner the security at concerts. This is an excellent means
attention that it deserves. of both apprehending probationers who are in
An interesting example of event security is violation as well as deterring troublemakers.
at the oldest fair in the United States, the York Deputy U.S. Marshalls sometimes conduct sting
County Fair, in York, Pennsylvania. Security operations for fugitives.
at the fair is difficult because of the number of Gang activity is prevalent, especially on stu-
people in such a small space. The fair takes place dent nights when students get in for free. Nearly
in September, so planning must begin in March. 100 police officers are required, and EMS needs
There must be adequate EMS (emergency medical to be prepared for possible mass casualty situ-
services), fire, and police in place. In fact, the fair ations. It is evident that there is a need for even
has its own police force, a group of officers who more officers, but monetarily it isn’t possible.
So the trend is to reach out to the private sector money depending on the size of the venue and if
and specialized service firms for security at these the event was set up correctly. INA also utilizes
types of special events. probation officers who take vacation days to
In addition to the example of the York Fair, man special events. The probation officers are all
we are seeing more varied and creative use of college graduates who have had some relevant
protection forces across the board. These include training and experience.
proprietary security, t-shirt security, contract Another trend is having more restrictions in
security, off-duty police, and so on, all working place as to what can be brought into an event, as
in contact with one another. INA, Inc., based out well as more restrictions on tailgating parties and
of Harrisburg, Pennsylvania, finds that using serving alcohol. There is also an increase in the
off-duty police officers saves a great deal of use of dogs and horses at some special events.
13
Environmental Crime Control
Glen Kitteringham
151
152 13. ENVIRONMENTAL CRIME CONTROL
Will it require a simple or a complicated fix? In follow-up measures and programs. While the
some cases, simple is usually cheaper and can intent of this chapter is not to argue the pros
be just as successful as more expensive security and cons of one theory over the other, one com-
measures. ment will be made. While all the programs
There is a danger in thinking that once secu- and money spent upon social crime control
rity measures have been implemented, there can be considered laudable, it would be a fool-
will never again be a crime or unwanted activ- ish security manager who donated his or her
ity in the same area. Crime may or may not security budget to a social crime control pro-
occur. Other factors may be at work, including gram regardless of how noble it may seem.
the effects of displacement and diffusion of ben- Government and big businesses have spent
efits (to be explained). This forces the security billions of dollars on this issue for many years,
practitioner to continually review the area from but physical security forces are required more
many different perspectives. Has new tech- than ever.
nology made the old security solutions moot? Environmental crime control has not been
Will an attack come from a different direc- relegated the same attention and respect as the
tion, during a different time of day? Will the social crime control model. Social crime con-
attacker be forced to try new methods or big- trol has been practiced in one form or another
ger or better tools, or will be there be a different for hundreds of years. In contrast, environmen-
attacker? Continual awareness and review are tal crime control grew from work completed at
necessary. the University of Chicago in the 1920s. It was
there that more attention was paid to the area
in which the crime was being committed than
ENVIRONMENTAL CRIME to the people who committed the criminal acts.
PREVENTION VERSUS SOCIAL The theory laid dormant for several decades,
CRIME PREVENTION but was given a rebirth by the influential writer
and social commentator, Jane Jacobs, when she
A simple explanation of environmental crime wrote The Death and Life of Great American Cities
prevention is that environmental crime prac- in 1961. Her work inspired both C. Ray Jeffery
titioners focus their attention and energies on and Oscar Newman, both of whom took off in
locations of potential criminal activity. These new directions: Jeffery, with his book, Crime
practitioners “look for crime patterns and seek Prevention through Environmental Design, and
to explain them in terms of environmental Newman, with his Defensible Space. In turn,
influences. From these explanations they derive both researchers inspired others, such as Paul
rules that enable predictions to be made about and Patricia Brantingham, Tim Crowe, Ronald
emerging crime problems, and that ultimately V. Clarke, and Marcus Felson. What follows is
inform the development of strategies that an overview of the various environmental crime
might be employed to prevent crime” (Wortley control theories.
& Mazerolle, 2008, p. 1). Locks, doors, and other
barriers, CCTV equipment, and patrolling secu-
rity officers are all examples of environmental
THEORIES
crime control measures. On the other side of the
coin is social crime prevention. This area focuses
Rational Choice Theory
upon social programs, education, employment
creation, welfare, unemployment insurance, Rational Choice Theory was first presented
police, corrections, and other after-the-fact by Ronald V. Clarke and Derek B. Cornish in
Increase the Effort Increase the Risks Reduce the Rewards Reduce Provocations Remove Excuses
1. Harden target (both premise 6. Extend guardianship 11. Conceal targets 16. Reduce frustrations and 21. Set rules
and laptop itself ) • Take routine precautions: • Off-street parking stress • Rental agreements
• Steering column locks go out in groups at night • Gender-neutral • Efficient queues and • Harassment codes
and immobilizers leave signs of occupancy phone directors polite service • Hotel registration
• Anti-robbery screens carry phone • Unmarked bullion • Expanded seating
• Tamper-proof packaging • “Cocoon” neighborhood trucks • Soothing music/muted
watch lights
2. Control access to facilities 7. Assist natural surveillance 12. Remove targets 17. Avoid disputes 22. Post instructions
IV. CRIME PREVENTION AND PHYSICAL SECURITY
• Entry phones • Improved street lighting • Removable car • Separate enclosures for • “No Parking”
• Electronic card access • Defensible Space design radio rival soccer fans • “Private Property”
• Baggage screening • Support whistleblowers • Women’s refuges • Reduce crowding in • “Extinguish camp
3. Screen exits 8. Reduce anonymity 13. Identify property 18. Reduce temptation 23. Alert conscience
• Ticket needed for exit • Taxi driver IDs • Property marking • Controls on violent • Roadside speed
• Export documents • “How’s my driving?” • Vehicle licensing pornography display boards
• Electronic merchandise decals and parts marking • Enforce good behavior • Signatures
tags • School uniforms • Cattle branding on soccer field for customs
• Prohibit racial slurs declarations
• “Shoplifting is
stealing”
4. Deflect offenders 9. Use place managers 14. Disrupt markets 19. Neutralize peer pressure 24. Assist compliance
• Street closures • CCTV for double-deck • Monitor pawn • “Idiots drink and • Easy library
• Separate bathrooms for buses shops drive” checkout
women • Two clerks for • Control classified • “It’s OK to say No” • Public lavatories
• Disperse pubs convenience stores ads • Disperse • Litter bins
• Reward vigilance • License street troublemakers at
vendors school
5. Control tools/ weapons 10. Strengthen formal surveillance 15. Deny benefits 20. Discourage imitation 25. Control drugs and
• “Smart” guns • Red light cameras • Ink merchandise • Rapid repair of alcohol
• Disable stolen cell • Burglar alarms tags vandalism • Breathalyzers in
phones • Security guards • Graffiti cleaning • V-chips in TVs pubs
• Restrict spray paint sales • Speed humps • Censor details of • Server intervention
to juveniles modus operandi • Alcohol-free events
2 What The type of If security measures An addict, failing to gain access to an office to steal
offense carried out prove to be adequate, laptops to trade for drugs, may instead conduct a street
consideration should robbery. An offender may switch from robbing banks
be given to the offender to writing bad checks. An offender may switch from
changing offenses. crimes of violence to Internet-based scams.
3 When The time in which Daytime, nighttime, The offender may change the time of their offense. If
the crime was morning, afternoon, they cannot tunnel into a bank vault at night, they may
committed evening, weekdays, rob the bank during the day. A laptop thief, if unable to
weekends, summer, defeat physical security after hours, may decide to talk
winter, etc. their way past a receptionist to gain access.
4 Where The location of the Moves on to another If an offender cannot gain access to one building, they
criminal act house, store, may attempt to go next door to gain access. Regardless,
neighborhood, city, state/ the expectation is that they will go elsewhere. They
province, or country, etc. may change locations because they have become too
well known in their present area.
5 Why The type of target Weaker, younger, older, There are a variety of reasons why the offender may
which is attacked less security, female, male, switch targets. If a location is attacked and the target
inability to overcome turns out to be removed, the offender may take other
current security measures, items. Retail thieves may enter a pharmacy intending
etc. to steal drugs, but if narcotics are not available and
cash is, they will switch targets.
6 How The method used Gun, knife, pen, computer, The offender may change their modus operandi. For
to complete the vehicle, etc. example, the terrorists who brought down the World
crime Trade Center towers originally used a vehicle bomb
in the underground parking garage. When that failed,
they used airplanes as cruise missiles.
reflects a real attempt to understand crime flux, but social group cohesiveness, or a host of other
because it serves as a convenient excuse for doing aspects. Acknowledging the complexity of the
nothing (‘Why bother? It will only get displaced’)”
(1997, p. 978).
theory, a crime prevention response cannot come
from one area alone. Instead, a multidisciplinary
A further, somewhat controversial point to approach must be taken, in which responses are
displacement is that there may be a benefit to tailored to the situation. One must consider the
displacing certain kinds of crimes. For example, criminal opportunity, the individual offender,
drug and prostitution control may be made eas- his or her readiness and willingness to commit
ier or more tolerable when it is away from resi- crime, and the combination of the previous three
dential neighborhoods or concentrated in one aspects as they impact the sociocultural, eco-
locale (Pease, 1997, p. 979). nomic, legal, and environmental cues. Granted,
this is not an easy theory to employ from a theo-
retical or a practical perspective. Some of the
components of this theory are certainly beyond
ROUTINE ACTIVITY THEORY the security practitioner’s reach to address, but
knowing that a detailed examination of the envi-
Routine activity theory, developed by Cohen ronment is required may enable practitioners to
and Felson, revolves around three things: a view the environment from a broader perspec-
“potential offender, a suitable target, and the tive. Knowing that decisions to conduct criminal
absence of a capable guardian” (Bottoms & Wiles, activity are often carried out for entirely differ-
1997, p. 320). All three must come together in ent reasons than previously suspected gives the
order for criminal activity to be realized. Routine security officer the opportunity to view criminal
activity theory relies on the same rational choice activity in a new light.
methodology as situational crime prevention
techniques. As in any theory, routine activity
theory has its criticisms. One of the primary criti- CRIME PREVENTION THROUGH
cisms is the assumption that criminals are rational ENVIRONMENTAL DESIGN
in their decision making. They may not use the (CPTED)
same rationale as the person implementing the
security measures. They may not even be aware CPTED, probably the most well known of
of the situational crime prevention techniques the environmental crime control theories, was
put into effect. They may be under the influence first discussed by Dr. C. Ray Jeffery in 1971. To
of drugs or alcohol or, for whatever reason, they quote Tim Crowe, a huge proponent, CPTED
may simply not care about the security measures. “expands upon the assumption that the proper
design and effective use of the built environ-
ment can lead to a reduction in the fear of crime
CRIME PATTERN THEORY and the incidence of crime, and to an improve-
ment in the quality of life” (Crowe, 1991, p. 1).
Crime pattern theory, developed by Paul and There are three key concepts specific to
Patricia Brantingham, is a rather complex amal- CPTED. These concepts are:
gamation of both rational choice and routine The use of natural surveillance. Natural sur-
activity theories, as well as a further introduc- veillance refers to increasing the ability of legiti-
tion of sociocultural, economic, legal, and physi- mate place users to see farther and wider, while
cal environmental cues. The premise is that decreasing the ability of illegitimate place users
crime does not occur randomly in time, place, to hide when waiting for the right time to carry
3. Community culture: positive social and occupants can easily adopt proprietary
cultural activities. attitudes;
4. Threshold capacity: positive community ● Those which improve the natural capability
resources that do not overwhelm the area, of residents to survey both the interior and
proper land density use and zoning, and a exterior of the residential space;
lack of crime generators. ● Those which enhance the safety of adjoining
Second-generation CPTED focuses on the phys- areas such as communal facilities;
ical and social aspects of communities to mini-
● Finally, through the judicious building
mize both criminals and criminal opportunities. materials to reduce the perception of
peculiarity such as vulnerability, isolation
and stigma of housing projects and their
DEFENSIBLE SPACE: CRIME residents (Newman, 1971).
PREVENTION THROUGH
URBAN DESIGN
PRACTICAL APPLICATIONS
This theory revolves around the public hous-
ing environment and seeks to reduce crime As one can see, there are some similarities
through the use of natural surveillance, natural between Defensible Space and CPTED applica-
access control, and territorial concern. tions. The important concept of legitimate users
History of Defensible Space. While Oscar versus illegitimate users, the proper and effec-
Newman has written many influential pieces on tive utilization of surveillance, both natural and
this important concept over the past 30 plus years, man-made, and creating safe havens for normal
two of his most important works are Architectural users are common to both. Knowing and under-
Design for Crime Prevention, published in 1971 standing who belongs in an area and who does
through the U.S. Department of Justice, and not (legitimate users versus illegitimate users of
Defensible Space, published in 1972. Additional space), the importance of various types of sur-
books, such as Creating Defensible Space from veillance, and encouraging legitimate users of
1996, published through the U.S. Department of space to use or reclaim areas for activities are
Housing and Urban Development, add to his sig- recommendations that security practitioners
nificant body of work. can understand and appreciate.
Concept and Strategies. While there will
not be a detailed analysis of all the concepts
that encompass the theory of Defensible Space,
SUMMARY
a general overview will be made. The writer
While this chapter has not detailed each and
encourages interested parties who seek a
every theory or practice of crime prevention, it
deeper understanding to access the aforemen-
has provided an overview of the main existing
tioned books for an in-depth analysis. Basically,
environmental crime theories. Readers are encour-
Defensible Space calls for proprietors and
aged to further examine the theories outlined
legitimate users of residential space to act as
here, as they are an important aspect of crime con-
guardians of their living areas. To quote from
trol. While certainly not the only theories, rational
Architectural Design (p. 2):
choice, routine activities, CPTED, Defensible Space,
Physical mechanisms for achieving Defen-
crime pattern theory, and situational crime preven-
sible Space are as follows:
tion techniques comprise an important basis for
● Those which serve to define spheres of explaining some of the root causes of why certain
influence of territorial influence which crimes may occur repeatedly in specific locations.
4. There are ______ aspects of displacement? c. Acting under the influence of drugs or
a. Three alcohol
b. Four d. The absence of a capable guardian
c. Five
d. Six ANSWER KEY
5. There are three key concepts specific to Manual Questions
CPTED. Which of the following is not one? 1. Environmental Crime Prevention and Social
a. Natural surveillance Crime Prevention
b. Defensible space 2. Environmental, location, criminal
c. Natural access control 3. potential, criminal
d. Territorial behavior 4. Displacement
6. There are _____ main categories of 5. Diffusion, security
Situational Crime Prevention Techniques. 6. Location
a. Three 7. Rational choice theory
b. Four 8. Rational choice theory
c. Five 9. Six
d. Six 10. Defensible space
7. Further, the categories have ___________
different sub-categories? Interim Questions
a. Three 1. Potential, target, capable
b. Five 2. Crime pattern, environmental clues
c. Seven 3. Residential, natural, natural, territorial
d. Nine 4. CPTED, increase
8. Defensible Space: Crime Prevention 5. Benefits, situational, techniques, decrease
Through Urban Design was created by: 6. Five
a. Oscar Newman 7. Five
b. Marcus Felson 8. Oscar Newman
c. Patricia Brantingham 9. Defensible Space
d. Ronald V. Clarke 10. Acting under the influence of drugs or alcohol
9. This revolves around public housing and
seeks to reduce crime through the use of Ten Final Questions
natural surveillance, natural access control 1. Defensible, guardians
and territorial concern. 2. Situational, crime, five
a. Crime Prevention Through 3. rational
Environmental Design (CPTED) 4. Environmental, Chicago, location
b. Crime Pattern Theory 5. Natural, illegitimate
c. Defensible Space 6. Location
d. Rational Choice Theory 7. Rational choice
10. Routine Activity Theory, developed by 8. Five
Cohen and Felson, revolves around three 9. Five
things: which of the following is not one of 10. Defensible Space
the three factors?
a. A potential offender
b. A suitable target
14
Physical Security Concepts and
Applications
Kevin T. Doss and
Denis A. O’Sullivan
161
162 14. PHYSICAL SECURITY CONCEPTS AND APPLICATIONS
added benefit of the security planning process according to their nature. All threats can be
is the potential for increased security awareness grouped under the following headings: indus-
throughout every level of the organization. trial disaster, natural disaster, civil disturbance,
The security planning process consists of the crime, and other risks.
following five steps: Industrial disasters—these should be easy
to identify, associated threats related to on-site
1. Assets are identified.
or adjacent activity. The following are typi-
2. Loss events are exposed.
cal industrial disasters that might affect most
3. Occurrence probability factors are assigned.
companies: explosions, fires, major accidents,
4. Impact of occurrence is assessed.
and structural collapse. To correctly assess the
5. Countermeasures are selected.
threat, you must intimately know the nature of
Let’s look at each of these steps. company activity, the nature of activity on adja-
cent properties, dangerous routes, flight paths,
1. Assets are identified
and the existence of nearby major oil or gas
At first glance, this step would appear easy;
pipelines.
however, this is not necessarily the case. Have
Natural disasters—the potential for a natu-
you ever attempted to take inventory of your
ral disaster largely rests with the geographic
personal property? The major problem seems
location of the company property. If the prop-
to be “how to;” that is, do we include every nut
erty is located in the southeast United States, it
and bolt? For the purpose of following the secu-
is reasonable to identify hurricanes as possible
rity process, this is not necessary. It should suf-
loss events. Similarly, if the property is located
fice to group assets according to category except
in California, it would be reasonable to plan for
where an item is especially attractive (from a
earthquakes. Other areas may suggest the need
thief’s viewpoint) and valuable. The following
to identify floods or tornados as threats.
categories should encompass the majority of
Civil disturbance—most companies can be
assets for most companies:
threatened either directly or indirectly by actions
– land – buildings that can be categorized as civil disturbances. If
– heavy machinery – production equipment your company is engaged in weapons technol-
– office equipment – office furniture
ogy, or indeed any activity that might be viewed
as threatening the environment, it is reasonable
– vehicles – cash or other negotiables
to expect that the company might become the
– goodwill – public image target of demonstrators. All labor disputes fall
– raw material – finished product under this heading.
Crime—it is relatively easy to identify crimes
Depending on the nature of the company’s
that might affect company operations. Any
activities, there may be other categories. In any
or all of the following will affect most compa-
event, there is one asset which has not been
nies: arson, assault, bomb threats, breaking and
mentioned primarily because it is controversial:
entering, theft, and vandalism. If a company is
employees. Employees are a company’s most
engaged in high-tech, it would be reasonable to
valuable asset, although some people do not
also include espionage, extortion, and sabotage
like to group them with all the other assets.
as likely threats.
2. Loss events are exposed Other risks—this is meant to be a catch-all
This step consists of exposing all possible for those threats that do not neatly fit the above
threats to the assets that were identified. Similar categories. Two examples are disturbed persons
to how we group assets, we group threats and loss of utilities.
accurate calculations can be made. In addition, Referring to our matrix, we can quickly see
one must document the process and keep accu- that the recommended level of protection is
rate written records of the recorded data. This “level IV,” the highest level possible. This would
allows for better-informed decisions regarding suggest using an effective detection system cou-
the selection and implementation of physical pled with an efficient suppression system.
security countermeasures. The large number and variety of assets and
There are several methods or processes avail- associated threats means that we will end up
able to the security practitioner when select- with a complex pattern of different levels of
ing countermeasures; however, the simplest protection. This is not as confusing as we might
method to ascertain the desired levels of pro- expect, particularly if we think in terms of
tection is a matrix as illustrated in Figure 14-1. security-in-depth.
For example, consider the threat of fire. The Security-in-depth, also known as layered
probability of a fire can be rated as “moderately protection, is a concept that means placing a
probable” for most types of businesses; from a series of progressively more difficult obstacles
criticality point of view, we must consider fire in the path of an aggressor. These obstacles are
as potentially “very serious.” often referred to as lines of defense.
Unimportant I I I I
Moderately
I II II II
Serious
Levels of Security
I Low
II Medium
III High
IV Very High
2. Design should allow for an acceptable level types of gaseous discharge lamps take 2 to 5
of redundancy, without any unnecessary minutes to reach maximum intensity. They are
duplication of effort. very effective in areas where fog is prevalent.
A word of caution in relation to gaseous dis-
A systems approach is often referred to as charge lamps is that they make color identifica-
“systems engineering.” tion unreliable.
The remainder of this chapter will concen- Metal halide lamps are also of a gaseous
trate on the physical components of a protec- type, but due to the excellent color rendition
tion program. While space will not permit great this lamp offers, it is recommended for many
detail, we will attempt to explain the major security applications. Metal halide lamps can be
points relative to security lighting, security glaz- used very effectively with color CCTV cameras
ing, alarm systems, card access systems, locks due to the light properties which imitate natu-
and keying, closed circuit television, safes and ral daylight. The downside of this lamp is that
vaults, and fencing. it is expensive to use.
Incandescent lamps are typically used in res-
idential homes for lighting. They are very ineffi-
SECURITY LIGHTING cient and have limited use for security purposes
due to the short lifecycle and expense of use.
Security lighting has three primary objectives: Quartz lamps emit a very bright white
light. Lighting may be classified as floodlights,
1. It must act as a deterrent to intruders.
searchlights, fresnels, and street lighting. The
2. It must make detection likely if an intrusion
difference between floodlights and searchlights
is attempted.
is that searchlights project a highly focused
3. It should not unnecessarily expose patrolling
beam of light, whereas floodlights project a
personnel.
concentrated beam. Fresnels produce a rectan-
Lighting systems are often referred to gular beam of light and are particularly suit-
as “continuous,” “standby,” and “movable” or able for illuminating the exterior of buildings.
“emergency.” Streetlights produce a diffused light and are
Continuous lighting is most commonly used. suitable for use in parking areas and driveways.
Lamps are mounted on fixed luminaries and are Certain lighting intensities are recommended
normally lit during the hours of darkness. for specific situations.
Standby lighting is different from continu-
ous lighting in that the lamps are only lit as Perimeter or property boundary 0.15 to 0.4 fc
required. Parking lots (open) 2.0 to 3.0 fc
Movable or emergency lighting is portable Parking garage (enclosed) 5.0 to 6.0 fc
lighting that may be used to supplement either Vehicle entrances 1.0 fc
continuous or standby lighting. Light sources Pedestrian entrances (active) 5.0 fc
may be incandescent, gaseous discharge, or
Exterior of buildings 1.0 fc
quartz lamps. The common lightbulb emits
incandescent light. Open yards 0.2 fc
Gaseous discharge lamps are street-type
lighting and may be either mercury vapor or The foregoing are suggested lighting inten-
sodium vapor lamps. Mercury vapor lamps sities only; specific circumstances may dictate
emit a strong light with a bluish cast. Sodium different intensities. To explain the suggested
vapor lamps emit a soft yellow light. Both intensities, “fc” means foot-candle and simply
for many cash-handling situations, such as those program. Intrusion sensors are typically inte-
which occur in banks. Polycarbonate, consisting grated with physical barriers, such as a door
of several sheets of plastic laminated together, is or window, and must take environmental
highly resistive to ballistics; however, visibility is conditions into consideration to be effective.
somewhat impaired. Selection of the appropriate detector, from the
Special purpose: Under this heading, we will numerous and varied options available, is often
look at transparent mirror glass, coated glass, a difficult task. The end user is well-advised
heated glass, and rough or patterned glass. to become familiar with the different types of
Transparent mirror glass may be installed in a detectors/sensors available and must evaluate
door or in a wall. From one side, it is functionally both the application and environmental con-
a mirror, and from the other, it permits an unob- ditions prior to implementation. If relying on
structed view through the mirror. The primary advice from a vendor for proper intrusion sen-
purpose of transparent glass is for surreptitious sor selection, it is essential that the end user
surveillance. Flow-on or cement-on plastic coat- describe their objectives and make the vendor
ing is available for application to existing installed contractually responsible for meeting those
glass. This material may serve well as an interim stated objectives.
measure until a more appropriate vandal-resistive In the following paragraphs, we will look at
material can be installed. Rough or patterned glass different types of detectors: magnetic switches,
is available with many different designs that make metallic foil, audio, vibration, ultrasonic, photo-
it range from practically opaque to practically electric, passive infrared, microwave, dual tech-
transparent. This type of glazing is most appropri- nology, and video motion.
ate where there is a conflict between the need for Magnetic switches: These are often referred
privacy and natural light. to as door contacts. They may be either sur-
face-mounted or recessed. The choice is largely
an aesthetic one; however, the recessed ones
INTRUSION DETECTION do afford more protection from tampering.
Switches are commonly “unbalanced,” which
Every intrusion detection system is meant to means that they may be defeated by substitu-
detect the following: tion of a secondary magnetic field to keep the
contacts in the open position while the detector
1. Unauthorized entry magnet is moved away from the housing con-
2. Unauthorized movement within taining the contacts.
3. Unauthorized access to controlled areas or For high-security applications, a “balanced”
objects switch is available. This switch is designed to
There are three components to an intrusion withstand defeat by creation of a secondary
detection system: magnetic field. Magnetic switches have many
potential uses in addition to their traditional
1. Detectors/sensors use on doors and windows. They may be used
2. System controls on desk or file cabinet drawers or to secure
3. Signal transmission equipment to a fixed position.
Metallic foil: This is a narrow strip of metal
foil designed to break if the surface to which
Detectors/Sensors
it is attached is attacked. It is mostly used as
The design and implementation of intrusion a glass breakage detector and is commonly
sensors are critical for any physical security seen on storefront windows and glass doors.
The data processing equipment basically station to a commercial station in the event of a
acts as a receiver and interpreter of signals holdup of the monitoring personnel.
from the sensors/detectors and reacts to these Commercial monitoring falls into two cate-
signals in accordance with preprogrammed gories: monitoring stations or answering ser-
instructions. vices. The answering services are useful for the
The signal transmission equipment is the economical monitoring of signals transmitted
means by which an alarm is raised. This equip- by telephone dialers; however, this is not for
ment may simply activate a local siren, or it high security systems. Commercial monitoring
may send a signal over telephone wires to a stations are either Underwriters Laboratories
remote monitoring location. The telephone (UL) approved or they are not. UL-approved is
wires may be either dedicated (the most secure the best guarantee of quality service.
system) or through the normal telephone net- Note: An initial step in planning an intrusion
work by use of a digital dialer that transmits to detection system is to identify zones of pro-
a special type of receiver/decoder. tection in the building that will create a series
The on/off and reset controls can be keys, of independent subsystems. Each subsystem
toggle switches, or digital keypads. The digital should (1) be compatible with normal opera-
keypad is recommended. The backup power tions, and (2) allow for prompt response to a
supply is essential in case the electrical power specific problem area.
supply fails or is sabotaged. When the functional requirements of a sys-
The LED (light-emitting diode) system sta- tem have been identified, the system engineer-
tus indicators use different colors to indicate ing should be left to experts.
whether the system is on or off, or if there is
trouble in the system. The usual colors are red
for system okay (but in the off mode), yellow
for trouble somewhere in the system, and green CARD ACCESS
for armed and properly functioning.
The decision to use, or not to use, a card
access system should be based on the perceived
need for accountability and the accompanying
SYSTEM MONITORING financial considerations. An objective statement
for a card access system might read: “To eco-
There are basically three options: nomically eliminate the inherent security weak-
1. Local nesses in key access systems by electronically
2. Proprietary supervising and documenting the activities or
3. Commercial persons authorized to access the property.”
To be useful, a card access system should
A local system is just that, a siren or bell on have the following minimum capabilities:
the outside of the protected premises. This sys-
tem is not recommended due to its reliance on a ● Restrict access by authorized persons
passerby to actually call the police. to certain times and/or days of the
The proprietary system is similar to a local week.
system in that the system is monitored on-site ● Allow controlled after-hours access to
or remotely by employees of the owner of the selected areas within.
protected premises. If this system is used, it is ● Control after-hours access to a
advisable to have a link from the proprietary parkade.
Badge
number
analyzed
Valid
Time zone Door opens
badge
allows access for seconds
number
Door
relocks
Electric locks are particularly suitable for the Note: It is essential that the fire department
following: be consulted prior to any final decision on the
locks of any door that may be considered an
● Remote control of the after-hours pedestrian
emergency exit. Get their decision in writing,
entrance door
and carefully consider it before compliance.
● Grade-level emergency exit doors
Emergency exit devices that are normally
● Exit doors from stairwells to grade level
used on emergency exit doors cause justifi-
● All stairwell doors
able security concern. If permitted, only qual-
Electric locks are available where the strike ity electric or electromagnetic locks should
is normally in the locked or unlocked position. be used. If electric or magnetic locks cannot be
Electromagnetic locks are particularly suitable for used, great care should be taken to ensure
use on emergency exit doors, as there are no mov- the emergency devices use such features as
ing parts that can accidentally become jammed. the following:
Several conditions must be met before this type
of lock can be used on an emergency exit door: ● Deadbolts
● A manual or automated egress device to ● Deadlocking latches
unlock door within close proximity. ● Vertical locking bars for pairs of doors
● When activated, the fire alarm system must
be able to automatically deactivate the Remember that emergency exit devices can
locking device. be connected to a proprietary or commercially
● Each location must have a fire pull station monitored alarm system. Loud local alarms
in its vicinity, and its activation must are also an effective way to protect emergency
automatically deactivate the lock. exits.
department. Each scene must stand on its own Housings—several types of housings are
merit and be identifiable during playback. available. They fall into two categories: aes-
Weather monitoring is another example of an thetic and environmental. Housings can also
application using a scene view. effectively disguise the existence of a camera.
Great care must be exercised in designing a Monitors—monitors are available in differ-
CCTV system to ensure that the objectives are ent sizes and in color, monochrome, or LCD.
achieved. Caution is also necessary to ensure When a quality image is required, it is neces-
that costs do not get out of hand. This is a com- sary to use a high-resolution screen.
mon problem when the system is not designed Sequential switches—it is not necessary, or
by a security expert. usually desirable, to have a monitor for every
The following are suggested practical appli- camera. By using a sequential switcher, the
cations for CCTV: image from two or more cameras can be rou-
tinely rotated for viewing on one monitor. When
● Parkade areas, entrances/exits, shuttle
required, an operator can lock on the image
elevator lobbies, stairwells, and elevators
from one particular camera for select viewing.
● Shipping/receiving areas
Motion detectors—cameras are available
● Main floor elevator lobbies
with built-in motion detection capability. If
● Cross-over floors
movement occurs within the field of view of the
● Cash handling areas
camera lens, an alarm will sound at the control
All CCTV systems are made up of several center, or a video recorder will be activated to
components that an end user should be, at the record the activity that caused the alarm. This
very least, familiar with. The following is a brief feature is very valuable when using a large
description of each component: number of monitors.
Cameras—a primary consideration in rela- Pan/tilt/zoom—the need to use several cam-
tion to camera selection is the available light eras to cover an area or activity can be avoided
coupled with required image quality. The two by carefully positioning one camera and pro-
most common cameras in use today are the viding pan/tilt/zoom features.
charge coupled device (CCD) and the comple- Controls—in addition to the normal televi-
mentary metal oxide semiconductor (CMOS). sion controls, controls will be required for what-
Both are relatively stable camera platforms that ever special features are built into the system.
outperform older camera technology. Consoles—the design of a control center
Lenses—there are three major types of lenses console that houses a CCTV system is definitely
available for cameras today. They are fixed lens, an engineering task. Care must be exercised to
varifocal lens, and zoom lens. The fixed lens only ensure operator comfort, particularly in relation
offers a single point of view and is best used on to viewing angles and ease of accessibility of
indoor applications due to the more consistent controls.
environment. The varifocal lens offers a range Video recorders—a CCTV system should be
of views and great flexibility in application, as considered incomplete if it does not have the
long as the range is within the lens capabilities, ability to selectively record events. Recording
and the lens does not need to be refocused. The can be done on VHS recorders; however, these
zoom lens, by contrast, is best for situations in are quickly being replaced by digital video
which the lens needs to be refocused, should recorders (DVRs) and by network video record-
one change the field of view. The focus on a ers (NVRs). In some cases, the recordings are
zoom lens is maintained either through manual sent directly to a computer server using a graph-
or motorized adjustments. ical user interface (GUI). The GUI eliminates
Camera
Burglary-Resistive Safes
Interiors
In addition to their actual construction,
burglary-resistive safes have a number of pro- Sufficient options are available in interior con-
tective features: figurations so that the need for customization can
be avoided. Available features include fixed or
● Locks adjustable shelving and enclosed compartments
● Interior design that may be either key or combination-locked.
● Depository Available options increase proportionately to the
● Time locks size and cost of the safe.
● Time delay locks
● Relocking device
Depository
● Extra weight
● Floor anchoring This feature permits the insertion of prop-
● Counterspy dials erty, most often cash, without allowing access
to the safe contents. The depository is usually structural reasons, is floor anchoring—provided
fitted with an antifish device to inhibit retrieval a concrete slab is available.
of deposited property.
Counterspy Dials
Time Locks
It is not uncommon for thieves to note the
Time locks prevent access to the safe con- combination of a safe while surreptitiously
tents for predetermined timeframes by persons viewing it being unlocked. A counterspy dial
normally authorized for access. For example, prohibits anyone other than the person imme-
when a bank safe is locked at the close of the diately in front of the dial to see the numbers,
business day, it cannot be opened again until and only one number is visible at a time.
the following morning. Should the bank man- Apart from the foregoing obvious security
ager be taken from his home forcibly, he cannot features, we can tell little about a safe by look-
be forced to open the safe. ing at it; nowhere can appearances be more
deceptive. For this reason, a purchaser has to
Time-Delay Locks rely on a particular vendor or on independent
This feature is designed to protect against a appraisal. Independent appraisal is available
holdup. Opening a safe equipped with this fea- from Underwriters Laboratories Inc. (UL). If
ture requires keying the lock, followed by a pre- a manufacturer submits a product sample to
determined waiting period, before the locking UL, they will conduct various tests and issue
mechanism will unlock. A safe with this feature authority to the manufacturer to affix a specific
label to the protected line. The following UL
is often used at late-night convenience stores or
labels are available:
24-hour gas stations.
UL Labels Resistant to Attack From
Relocking Devices T.L.-15 Ordinary household tools for
15 minutes
These devices are designed to act as a second-
ary locking feature if the normal one is attacked. T.L.-30 Ordinary household tools for
30 minutes
For example, if someone attacks the combina-
tion dial with a sledgehammer, the relocking T.R.T.L.-30 Oxyacetylene torch or ordinary
household tools for 30 minutes
device will activate. After this happens, only a
qualified safe expert can open the safe. T.R.T.L.-30 6 Torch and tools for 30 minutes,
six sides
X-60 Explosives for 60 minutes
Extra Weight
T.R.T.L.-60 Oxyacetylene torch for 60
To prevent thieves from simply walking minutes
away with a safe, it is recommended that a safe T.X.-60 Torch and explosives for 60
weigh a minimum of 340 kg or 750 lbs. Most minutes
large safes do weigh 340 kg, and smaller ones T.X.T.L.-60 Torch, explosives, and tools for
can be ordered with extra weight added. 60 minutes
and it was not uncommon for the complete a risk assessment. It is also necessary to gain
frontiers of kingdoms in China to be walled a thorough understanding of the enterprise’s
(origin of the Great Wall of China). Closer to operation. For the purpose of this article, we
home, the old city of Quebec remains the only will discuss the fencing requirements for a typi-
enclosed city in Canada and the United States. cal manufacturing plant located in an industrial
Modern acts of terrorism and civil distur- area of a large city. The objective of the fenc-
bance have resulted in innovations in the types ing program is twofold—to control movement
and usage of fencing. Barbed tape (razor rib- to and from the property, and to minimize the
bon), a modern version of barbed wire, is a very need for costly manpower at control points. The
effective (if not vicious) defensive, or should we latter is to be attained by keeping the number of
say, offensive material. Its use is rarely justified, perimeter openings to a minimum.
except where the highest standards of secu- While it is true that the industry is becoming
rity are necessary—for example, in a federal ever more security conscious, it is also true that
penitentiary. the owners of industrial facilities do not want
The use of barbed tape in industrial facili- their property to look like a prison compound
ties is not common in North America. Barbed or armed camp. With this in mind, the first
tape can be used in coils along the top of fences, objective is to define the boundary of the prop-
instead of the conventional barbed wire over- erty. Most often, this will require a combination
hang. In very high-risk situations, coils of of structural and psychological barriers.
barbed tape stacked in a pyramid configuration From a psychological point of view, we are
between a double conventional fence will pro- only concerned with defining the boundary—-
vide a very effective defense. mostly for legal reasons, prevention of trespass,
Another product of modern terrorism is and liability lawsuits. Property definition may
the freely rotating barbed wire fence topping be simply a change in landscaping, or indeed,
recently developed in Ireland. When a would-be anything that distinguishes the property from
intruder grabs the overhang in an attempt to its neighbor.
gain leverage, a second overhang simply rotates Somewhere between the property line and the
into place. This is more effective than the con- area of company activity, it will be necessary to
ventional overhang and much more acceptable install a structural barrier that will act as a phys-
for routine application than coils of barbed tape. ical deterrence to the would-be intruder. Usually,
Fencing as used in most applications is the this barrier is a chain-link fence, and it should be
common chain-link type with a barbed wire, topped with a barbed wire overhang. The fol-
outward facing overhang. A major weakness lowing are suggested minimum specifications:
with the chain-link fence is the ease with which
it can be climbed. To overcome this problem, 1. Minimum of 70 in height excluding top
the British developed the “welded mesh fence.” overhang.
Compared to the 2-square-inch opening in 2. Wire must be 9-gauge or heavier.
chain-link fence fabric, the welded mesh fence 3. Mesh openings must not be larger than 2
has openings of 1.5 square inches. The openings square inches.
are 3 ½ and run vertically. The narrowness 4. Fabric must be fastened securely to rigid
of the openings makes it almost impossible for a metal or reinforced concrete posts set in
climber to gain purchase. The width of the open- concrete.
ings also inhibits the use of wire or bolt cutters. 5. There should be no more than 2 inches
Prior to making any decision on the location between the bottom of the fence and the
and type of fencing, it is necessary to conduct ground.
mutual benefits within the entire organization. of exposure to concepts and theory in security
When an organization can integrate their video, management. If already employed in the secu-
intrusion, and access control systems into their rity industry, an advanced degree can lead to
information technology systems, there are effi- faster promotions or an increase in salary.
ciencies that can improve the entire organization. Work experience is also a critical component,
A basic example of convergence would be and when combined with the proper education,
using the access control system over the corpo- it can lead to opportunities not afforded to those
rate network to transfer data and integrate with without the benefit of continued education.
the employee time and attendance system. The Universities such as the University of
human resources department can then utilize Leicester in the United Kingdom specialize in
the access control database (a physical security the compilation and distance education deliv-
subsystem) to track and calculate employee ery of security-specific educational opportu-
attendance and hours worked. Although this is nities. A bit closer to home, schools such as
a very basic example of convergence, it shows American Military University, York College of
how security technology can drive business Pennsylvania, and Eastern Kentucky University
efficiency and lower operating costs through offer studies that can be tailored to one’s spe-
convergence. cific area of focus. A fairly comprehensive list
One of the greatest challenges with con- of universities and colleges that offer security-
vergence is due to many departments having related degree programs can be found online at
different reporting structures, and correspond- http://www.asisonline.org/education/univer-
ingly different missions, within the orga- sityPrograms/traditionalprograms.pdf/
nization. Budgetary funding and political
wrangling can often hinder a converged envi-
ronment. Some organizations have created a PHYSICAL SECURITY
Chief Security Officer (CSO) position to assist CERTIFICATION
in the convergence of information technology
and procedures into the physical security func- ASIS International offers the only board cer-
tion. The CSO position usually has some over- tification program for physical security profes-
sight and direct accountability to make sure sionals worldwide. The ASIS Board Certified
that multiple departments work together in a Physical Security Professional (PSP) designa-
converged environment for the betterment of tion focuses on one’s proficiency in three major
the organization. domains of knowledge:
1. Physical security assessment
2. Application, design, and integration of
CONTINUING EDUCATION physical security systems
3. Implementation of physical security
There are many benefits in continuing one’s
measures
education in the security field. Continued
education is part of the career planning phase The course reference materials are comprised
and should not be overlooked as a method of eight publications, offering a substantial look
of differentiating oneself in the job market. It at physical security-related topics designed to
is more important than ever today to continu- assist security professionals in their career field.
ally improve one’s knowledge and education. It is important to point out that the ASIS
Employers are searching for employees that are “Board-Certified” designation brings accredi-
dedicated to their field and have a wide range tation to the certification process, and thereby
EMERGING TRENDS
The physical security field is quickly develop- directly from the manufacturer. Surreptitious attack
ing futuristic technologies to meet developing methods on smart locks are difficult, if not impos-
threats. The industry is adopting automated tech- sible, to achieve, thus making such locking devices
nologies to assist in the detection and assessment more effective when protecting critical assets.
phases prior to a security force response. Visual Currently, security professionals are being
analytics, which is the science of computer-aided asked to do more, using fewer resources, which
assessment for surveillance systems, is becom- can make the task daunting, even for the best and
ing more accurate, which has led to deployments brightest. Recent terrorist attacks have hastened
around the world. These analytically driven solu- the technology curve in order to develop robust,
tions allow for rapid detection and assessment scalable, user-friendly physical security solutions
using facial recognition, psychology of motion, in the never-ending effort to prevent such acts.
path analysis, and much, much more. The need for new technologies will be critical to
Even “simplistic” devices such as locks are allow these practitioners to respond and mitigate
becoming “smart” through the use of computer the risk. It is evident that as the threats become
chips and RFID technology. These smart locks are more sophisticated, physical security technol-
almost impossible to pick and do not allow for cop- ogy must improve to meet those challenges, both
ies of the keys to be made, except when ordered now and in the future.
S E C URI T Y QU IZ a. True
b. False
1. Risks are usually categorized into three 6. Deadbolt locks should have a minimum of a
categories. (Select one that does not apply) ½ throw.
a. People a. True
b. Property b. False
c. Legal liability 7. Card access systems permit accountability.
d. Insurance a. True
2. Physical security planning is a recognized b. False
security process that, if followed, will result 8. The most commonly used security fencing
in the selection of physical countermeasures material is:
based on appropriateness. a. Barbed wire
a. True b. Barbed tape
b. False c. Chain-link
3. The security planning process consists of d. Welded wire mesh
following a selected number of steps. 9. The minimum height of a security fence
a. Three should be:
b. Four a. 7 feet
c. Five b. 6 feet
d. Six c. 8 feet
4. Security-in-depth is also known as: d. 9 feet
a. Layered protection 10. Which of the following types of lighting are
b. Concealed protection only lit on an as-required basis?
c. Altered protection a. Continuous
d. Necessary protection b. Standby
5. Microwave detectors use high-frequency c. Movable
sound waves to establish a protected area. d. Emergency
15
Alarm System Fundamentals
Doug Durant and
Kevin Pound
183
184 15. ALARM SYSTEM FUNDAMENTALS
and software elements that require considerable many cases, this will scare the criminal off before
skill and training of assigned security staff. the crime can be completed. However, in other
The most effective physical security is “lay- instances, a seasoned criminal may realize a
ered.” An alarm system should be designed to response is dependent on someone in the local
provide one or more layers of detection around area not only hearing the alarm, but also taking
an asset. Each layer is made up of a series of action to investigate it. In short, the criminal may
detection zones designed to isolate the pro- be well aware that he has a certain amount of time
tected property and to control the entry and exit to “work,” despite the activation of the alarm.
of authorized personnel and materials.
In more sophisticated systems, sensors are
interfaced with electronic entry-control devices, 2. Central Station Monitoring
Closed circuit television (CCTV), alarm report- This is the best and most popular method of
ing displays (both visual and audible), and alarm monitoring. It consists of a company that is
security lighting. As you can see, the alarm sys- paid to provide monitoring services for a variety
tem can serve as a crucial “layer” in any physi- of clients. Typically, these alarm companies charge
cal security plan. a one-time installation fee and then bill monthly
for monitoring services. Alternatively, many larger
businesses may have all of their alarm signals
ALARM MONITORING monitored by their own control centers and have
an in-house or proprietary security force respond.
Your involvement with an alarm system will When an alarm signal is received, an
depend largely on how it is monitored. There employee of the alarm company is responsible
are four methods of monitoring. for notifying the police so they can respond. In
most cases, a company’s security officers are
also notified so they can respond as well.
1. Local Monitoring
Despite its popularity, central station moni-
This is the simplest form of alarm monitor- toring is not without problems. There have been
ing. It consists of a bell or horn located near the several documented cases where the alarm com-
protected door or window. In the event of an pany failed to make the proper notifications.
attempted penetration, the resulting sound is Some alarm companies will provide their own
intended to alert nearby police, security person- security officers to respond to and investigate
nel, neighbors, or company employees. alarm conditions. In these instances, the alarm
A major drawback of this approach is the fact company’s employees must be given keys to
that many people will not bother to investigate the protected premises in order to investigate
a blaring alarm. Furthermore, manpower short- alarms. From a security and business viewpoint,
ages often make a security or police response this should be considered an additional risk.
impractical. Although relatively inexpensive to
install, this form of alarm monitoring does not
provide an adequate level of protection for most
3. Direct Fire or Police Monitoring
situations. Also, a potential criminal can disable This is no longer a common method of alarm
these alarms relatively easily. In many jurisdic- monitoring. However, in some rural or remote
tions, local municipal noise laws require the bells jurisdictions the local police or fire station will
or horns to stop after a required period of time. monitor alarms from their headquarters. When
When activated, the audible alert tells the used, this method tends to be a relatively reli-
intruder his activities have been noticed. In able way to monitor alarms.
system. The types of controls provided usually Area protection is also sometimes called
depends on the type of display the system uses. volumetric protection. The sensors used for this
For example, keypads consist of a numeric or purpose protect the interior spaces of a busi-
LCD display system that are generally pro- ness or residence. These devices provide cover-
vided with a 12-digit keypad and several func- age whether or not the perimeter is penetrated
tion keys. These allow the operator to perform and are especially useful in detecting the “stay-
such actions as to secure, access, acknowledge, behind” criminal. As a general rule, area sen-
and reset alarms. sors may be active or passive. Active sensors
(such as microwave) fill the protected area with
an energy pattern and recognize a disturbance
ALARM SENSORS in the pattern when anything moves within the
detection zone.
A basic alarm system is divided into three By contrast, active sensors generate their
layers: perimeter protection, area protection, own energy pattern to detect an intruder. Some
and spot protection. Perimeter protection is the sensors, known as dual-technology sensors, use
first line of defense to detect a potential intruder. a combination of two different technologies,
Alarm sensors on the perimeter are typically usually one active and one passive, within the
mounted on doors, windows, vents, and sky- same unit.
lights. Since a vast majority of burglaries are Sensors used for area protection include the
committed using such openings, it is important following:
that they be a priority for protection. Commonly Microwave motion sensors. With microwave
used perimeter sensors include the following: motion sensors, high-frequency electromagnetic
Glass-break sensors. These detect the break- energy is used to detect an intruder’s motion
ing of glass. The noise from breaking glass con- within the protected area.
sists of frequencies in both the audible and Passive infra-red (PIR). These motion sen-
ultrasonic range. Glass-breakage sensors use sors detect a change in the thermal energy pat-
microphone transducers to detect the glass break- tern caused by a moving intruder and initiate
age. The sensors are designed to respond to spe- an alarm when the change in energy satisfies
cific frequencies only, thus minimizing such false the detector’s alarm criteria. These sensors are
alarms as may be caused by banging on the glass. passive devices because they do not transmit
Balanced magnetic switch. Balanced mag- energy; they monitor the energy radiated by the
netic switches (BMSs) are typically used to surrounding environment.
detect the opening of a door, window, gate, Dual-technology sensors. To minimize the
vent, skylight, and so on. Usually, the BMS is generation of alarms caused by sources other than
mounted on the doorframe, and the actuating intruders, dual-technology sensors combine two
magnet is installed on the door. The BMS has different technologies in one unit. Ideally, this is
a three-position reed switch and an additional achieved by combining two sensors that, individ-
magnet (called the bias magnet) located adja- ually, have high reliability and do not respond to
cent to the switch. When the door is closed, the common sources of false alarms. Available dual-
reed switch is held in the balanced or center technology sensors combine an active ultrasonic
position by interacting magnetic fields. If the or microwave sensor with a PIR sensor.
door is opened or an external magnet is brought Spot protection is used to detect unautho-
near the sensor in an attempt to defeat it, the rized activity at a specific location. It serves as
switch becomes unbalanced and generates an the final protective layer of a typical alarm sys-
alarm. tem. Assets most commonly secured with spot
EMERGING TRENDS
Alarm systems have and will continue to situation and allow them to respond effectively.
form a part of a protection plan in the fore- This will continue to help lower the false alarm
seeable future. However, the technology and rates and will help organizations comply with
reporting mechanisms that form part of an local and regional false alarm legislation.
alarm system continue to broaden. As with any Sensor technology continues to change, allow-
technology, end users will continue to look for ing for larger and more complex facilities or
smarter, faster, and more economical solutions. structures to be protected, along with new ways
The use of video analytics, in combination with to send those signals. Methods of alarm notifi-
CCTV, along with voice verification, will help to cation continue to be explored with improved
provide verified alarms. Alarm signals that gen- ways to provide mass notification alerts to large
erate attached video or captured images of the employee or student populations. Instant mes-
location of the alarm will provide the end user saging, text alerts, and cellular messaging are
with a clearer picture and understanding of the some of the options being used and improved.
● Maintain radio contact with fellow officers ● Know your company’s policy for alarm
and your security control center. response. Use common sense and avoid
● Maintain sound discipline. Keep radio volume complacency that can lead to tragic
low. Secure noisy keys and other equipment. consequences.
● If upon arrival to the scene, you detect ● Know of or how to locate appropriate phone
broken glass or other indications of an numbers and passwords for your monitoring
intrusion, do NOT proceed into the building. station.
Call the police and assume a position from ● Keep emergency call lists, updated with
where you can be a “good witness.” appropriate call-out lists, as well as local
● Evaluate all alarm information. Has there authorities.
been just one alarm? Is there a series of
Any alarm system is only as good as the
alarms which might indicate someone is
people who operate, monitor, and respond to it.
actually moving around the interior of the
Protection officers must be properly trained to
building? The professional evaluation of all
respond to alarms. They must understand how
alarms can assist you in determining where
their system works and the need to treat every
the intruder is. Relay this information to
alarm seriously.
responding police units.
S E C URI T Y QU IZ c. Four
1. In many cases, ________________ d. Six
______________ form the backbone of a 6. Which of the following is not a type of alarm
facility’s physical protection program. monitoring?
a. Alarm systems a. Central station
b. Covert surveillance b. Direct fire and police
c. Report writing c. Satellite
d. Physical force d. Proprietary
2. The primary purpose of an alarm system is: 7. Logging devices are used for:
a. To conduct area surveillance a. Recording system activities and faults
b. To serve as a physical barrier b. Controlling CCTV cameras
c. To provide early warning of an intruder c. Recording time and attendance of security
d. To lower insurance rates staff
3. According to the text material, the most d. Access control to computer networks
effective security is provided with a: 8. Alarm printers are typically:
a. Technical approach a. Of the color laser type
b. Layered approach b. Of the high-speed, continuous-feed type
c. Large security force c. Black and white and medium speed
d. Key and lock program d. Extremely expensive
4. In more sophisticated alarm systems, sensors 9. A glass-break sensor is an example of:
are interfaced with electronic entry-control a. A perimeter sensor
devices, CCTV, alarm reporting displays b. A spot sensor
(both visual and audible), and _____________ c. An area sensor
_____________. d. A volumetric device
a. Police patrols 10. A duress alarm is also sometimes called:
b. Aerial units a. A reset button
c. Sniper teams b. A panic button
d. Security lighting c. Activation switch
5. How many different types of alarm d. A silent partner
monitoring were examined in the text?
a. Two
b. Three
16
Access Control
Colin Best
191
192 16. ACCESS CONTROL
those who are unauthorized. This form of aid- that it is within the legal rights of the protec-
ing access control is common in large apartment tion officer to perform the arrest. The addition
complexes. Recognition of regular occupants by of locks to alternate entrances to the facility or
the security officer is actually considered a very property will also control access. Other forms of
secure form of controlling access; however, this additional physical security, such as CCTV and
“soft” method of access control becomes less alarm systems, will further assist in the preven-
effective as the volume of traffic increases. tion of unauthorized access, although physical
Achieving the task of controlling access may be security must not interrupt safe egress from the
considered somewhat difficult if an officer were, property or site in the event of an emergency.
for example, assigned the task to control access
to a property consisting of acres of land with no
fences or physical boundaries. Access control
EMERGENCY ACCESS CONTROL
could only be achieved by frequent patrols of
One must be sure, when controlling access, that
the protected area, challenging those unfamiliar
egress in the event of an emergency is not sacri-
persons caught on the property. In this example,
ficed. Local and national fire codes often present
those challenges may be the accepted form of
challenges to controlling access to many facilities,
access control, with no further control necessary.
and it is imperative that there is no sacrifice to
However, most facilities require additional forms
the safety of the occupants of a facility in order to
of controlling access, such as waste sites, storage
achieve better security. In most instances, policies
yards, and other facilities.
are drastically altered for access in an emergency.
In some circumstances, large properties or
Where policy dictates, a fixed post may become
defensible spaces may require a softer form of
a roaming position for the officer to facilitate an
physical barrier. This may be achieved through
escort for emergency medical services or the fire
dense foliage or even through designated walk-
department. The opposite may be true when a
ways with paint around the area of protection
roaming officer will be called from a roaming
or defensible zone. This form of control merely
patrol to a fixed position at the entrance of the
implies that a certain area is off limits and offers a
protected facility to provide speedy access for dis-
convenient path around the area.
patched emergency services.
Many properties cannot depend on this “soft”
Generally, an emergency such as fire, medi-
form of physical security. It is for this reason
cal concern, hazardous spill, or gas release
that it usually becomes necessary to add forms
should result in the halt of all work in the facil-
of physical security to achieve suitable access
ity to help facilitate access. Elevators and other
control. Fences may be erected around a prop-
conveyances should immediately be surren-
erty to control access and to “force” or “funnel”
dered from casual use for use by the emergency
visitors or employees to a common entrance or
service personnel. Parking control at a facility
“checkpoint” manned by a protection officer.
entrance or loading dock can be considered an
Appropriate signage indicating a no trespass-
access control duty where entrances are kept
ing order will aid in controlling access through
clear to make way for emergency personnel.
the message that anyone trying to breach secu-
rity and access the forbidden area risks arrest
and trespassing charges. In situations where it EXAMPLES OF ACCESS CONTROL
is expected that the protection officer will arrest
anyone caught trespassing, it is crucial that sig- Now that a given facility or property has
nage is in accordance with the laws concerning been equipped with fences, locks, and other bar-
local trespass acts. It is also extremely important riers, access can be controlled at one focal point.
to those without proper credentials. The per- consist of executive offices, chemical rooms, file
son wishing to gain access may very well have rooms, and other areas that may require limit-
legitimate business on the protected property, ing or curtailing access. Rather than posting
and outright denial could create losses for the an officer at every area, access is controlled by
facility or property being protected. It is for this way of physical security barriers such as doors,
reason that facilities need a clear policy for the locks, CCTV, alarms, and electronic access con-
denial of access to individuals without proper trol. The effectiveness of physical security is
credentials. further enhanced by strict key control, effective
There are some facilities that may employ monitoring of CCTV and alarm systems by the
a strict “No Authorization, No Access” policy security officer, and accurate database manage-
that will dictate that the person requesting ment in electronic access control systems. Other
access without proper credentials be denied. important tools used to aid access control are
Many facilities will have a “backup” procedure intercom, telephone, and other voice commu-
to obtain the proper authorization for access. nications systems. Requests for access can be
One example may be that a facility manager made from remote points within the facility,
or supervisor could be called to provide verbal allowing an officer to be dispatched or to grant
authority for access. Another example may be access remotely from an electronic access sys-
to require a visitor requesting access to call an tem, given proper authorization.
authorized occupant in the facility to provide
an escort.
When the security officer is left with the LOCKS AND KEY CONTROL
decision of whether or not to allow access, it is
usually best that the officer act on the side of Locks and keys have been around for thou-
caution and deny access until a fair approval sands of years and are definitely the standard
or compromise is reached. Advising the person for controlling access in many areas. Since their
that he or she has to be denied access is an act invention, the durability and security of locks
best accomplished with diplomacy and respect. and keys have greatly increased along with their
The event of the denial should also be docu- use. Today, they help control access to almost
mented on a report suitable for the employer or every structure imaginable. Generally speaking,
client. Policies for granting and denying access a lock is a mechanical device that consists of a
should comprise part of the protection officer’s cylinder, springs, and several pins or “tumblers”
post orders or standard operating procedures. that prevent rotation of the lock cylinder or
plug without the insertion of a correctly cut key.
Higher security locks manufactured today make
APPLYING PHYSICAL SECURITY unauthorized replication virtually impossible.
IN ACCESS CONTROL Proprietary key blanks can have a restricted issue
to one distributor or end user. A restricted propri-
For many facilities, control of access at any etary keyway, combined with strict key control, is
one point may not be practical, particularly in an effective form of controlling access. Permanent
large facilities with many areas such as indus- keys should not be issued without signature or
trial and office buildings. Posting officers at receipt. Identical keys should each have unique
these various checkpoints to control access control numbers permanently stamped on the
might be an effective form of access control, key to identify issue. Temporary issue of keys
but in most circumstances, would not be a cost- should be accompanied by signature on a regis-
effective, long-term solution. These areas may ter or key sign-out form indicating a return time.
will usually have a numeric or binary code that Systems can be interfaced or integrated with
is verified by a computer host, ensuring validity. other systems such as building automation, fire
systems, and human resources computer data-
bases. This allows the access holder to gain
access and turn on lights or air conditioning to
his or her work area with the use of the access
RADIO FREQUENCY (RF) system. With the activation of a fire alarm, an
INNOVATIONS access card could be automatically validated for
Most modern access control systems utilize use by the fire department.
a contactless or radio frequency card that, when
merely presented near a card reader, will be read ACCESS SYSTEM DATABASE
by the system and either permit or deny access. MANAGEMENT
Recent innovations in access control technology
have led to the use of contactless “smart” cards. Controlling the access system should have
In addition to providing the required data for tra- similar strict procedures to those of the key sys-
ditional electronic access control, other informa- tems. Issue should be controlled by consistent
tion can be stored on the card, such as personal and appropriate documentation. Typically, infor-
identification numbers to allow access, or even a mation is kept in a cardholder’s file, along with
biometric template, matching the cardholder’s a history of changes and authorizations. These
thumbprint or retina information to the content files should remain easily accessible by autho-
of the card. Other uses for the card may involve rized personnel until a set time has elapsed since
building automation or cashless vending. termination of the cardholder’s access. This not
only assists in audits, but can also control costs,
as a card with picture identification can be kept
on file in the event that the cardholder returns to
work in the near future. Returned damaged or
Modern electronic access systems have many
defective cards should be destroyed and docu-
features to enhance the level of access control
mented in the system database so identical cards
to a facility, area, or room. Turnstiles, interlock-
can be reissued in the future. Equal attention
ing mantraps, and parkade gates are combined
should be paid to the management of electronic
with access readers to prevent passback and
databases. Spelling and pattern consistency are
“piggybacking” in parking garages and high-
vital to good database management. Frequent
security areas. Cards may only allow one badge
software backups may one day pay off in the
in and one badge out to track the time in and
event of host server failure.
out of the facility or area. Some systems have
enhancements, such as the addition of “mobil-
ity impaired” access, to allow the extended BIOMETRIC TECHNOLOGIES
opening time of a door. In the event of a stolen
card, the card can be “tagged” with an alarm Biometric technology is slowly becoming more
upon use, alerting the operator at the monitor- commonly used in airports and other immigra-
ing station to dispatch security personnel to the tion checkpoints. Facial recognition technology
location of the cardholder. Meanwhile, the card is integrated into CCTV systems to identify indi-
remains active and permits access, so as not to viduals who are either wanted by law enforce-
alert the holder of the card. ment or may not be permitted travel to a given
EMERGING TRENDS
In addition to those trends in information images produced by this technology for viewing
security, there are many new and emerging by security personnel are truly vivid nude ren-
trends and tools that relate to the function of derings of passengers. The industry insists that
access control. These include, but are not limited privacy is maintained, as there are no stored
to, optical high-speed turnstiles, handheld explo- images, and the facial images are censored.
sive and biohazard detection, and most recently, Use of these systems has not only been insti-
millimeter wave scanning. Millimeter wave scan- tuted at airports and embassies, but is becoming
ning is the latest trend in pre-board screening at common in nightclubs and even theaters. The
airport facilities. While it is an effective replace- role of performing and facilitating access control
ment for manually searching passengers, privacy continues to evolve, as does the technology that
advocates criticize the technology as unnecessar- supports it. It is a vital first line of defense in the
ily invasive and a threat to personal privacy. The protection of people, assets, and information.
17
Detection Technology
Kevin T. Doss‚
Christopher A. Hertig, and
Bethany J. Redmond
199
200 17. DETECTION TECHNOLOGY
explosives. CT technology uses X-ray scanners consistency and uniformity make it possible for
that provide 3D images of the potential explo- dogs and handlers to be interchangeable among
sives. The costs to operate CT technology are teams. This also allows for additional flexibility
comparably higher than other explosive detec- among handlers should someone be out on sick
tion technologies. leave or take vacation time.
Typically, canine olfaction is used to detect
explosives at military bases or airports, or dur-
CANINE DETECTION ing special events. What’s more, they are very
effective in tracking down illegal substances
Dogs can be very effective instruments of at border crossings, public schools, and cor-
detection and offer great portability in a vari- rectional institutions. Dogs are also effective
ety of security applications. Research indi- in detecting both live humans and/or dead
cates that a dog’s olfactory system is 10,000 to bodies during environmental disasters such as
10,000,000 times greater than that of a human. Hurricane Katrina.
A dog’s keen sense of smell can be developed Additionally, the presence of a detection
and used in a variety of detection and security dog can provide a deterrent value to individu-
applications: als considering entering the area with prohib-
ited items or dangerous articles. Dogs are also
● Explosives
of high value when used to disarm or distract
● Human concealment and tracking
dangerous subjects.
● Drugs
It is worth mentioning that improper beha-
● Patrol services
vior by the dog and handler can ruin the
● Chemical weapons of mass destruction
reputation of the company or organization.
● Dual-trained as detection and bite dogs
Management should consider the potential
● Defense and protection of the handler
reputation damage resulting from unprofes-
Dogs trained for detection purposes may be sional behavior by the handler or dog and must
more reliable than other methods of detection ensure compliance with any legislation pertain-
because they are not very susceptible to false ing to the use of guard dogs. Indemnity against
alarms. Dogs are reliable and selective when harm or damage arising from the use of guard
detecting sources of chemical vapors and are or detection dogs should be provided by the
able to distinguish between very similar chemi- contractor. Another downside to using dogs is
cal compounds. Machines used in detection are the lengthy initial training period required for
adjustable and can be altered by users to reduce both dog and handler. Such training equates to
the occurrence of false positives. However, if cost, and many organizations do not have the
the threshold of the detection equipment is patience or funding to support it.
changed too much, the equipment may no lon-
ger be effective in detecting these substances.
A well-trained dog and handler team can typi- ELECTRONIC ARTICLE
cally work effectively for 8–10 hours. However, SURVEILLANCE
there are other variables to take into account to
determine how long a dog can work, such as vol- Electronic article surveillance (EAS) is a
ume of work, temperature, and amount of rest. technology that typically uses magnetic, VHF/
Consistency must be established during the train- microwave, or barcode sensors to detect fraudu-
ing regimen, and every handler and dog should lent activity. An EAS system is a protection sys-
be trained under the same conditions. Such tem that uses electronic sensors and detectors
EMERGING TRENDS
S EC U RI T Y QU IZ b. X-ray
Detection Equipment c. Pulse-field detector
d. CT scan
1. How many suspect components of an
6. Which chemical compound does
explosive device are needed to warrant a
chemiluminescence technology detect?
possible threat?
a. Carbon dioxide
a. Five
b. Nitroglycerin
b. Three
c. Nitrogen dioxide
c. One
d. PETN
d. Two
7. The selection of detection equipment should
2. Which component is not considered a basic
be based on:
component of an explosive device?
a. Life-cycle cost of the equipment
a. Explosive material
b. Reliability of the equipment
b. Detonator
c. Type of threat
c. Connecting wires
d. All of the above
d. Projectile
8. Electronic article surveillance (EAS) systems
3. Which of the following is considered to be a
are used to detect:
downside to using detection dogs?
a. Electrodes
a. A dog’s keen sense of smell can be
b. Merchandise surplus
developed and used to detect drugs and
c. Fraudulent activity
explosives
d. Retail invoices
b. Unprofessional behavior by a dog and
9. When responding to an alarm, it is
its handler may ruin the company’s
important to:
reputation
a. Use physical force
c. An individual may be deterred by the
b. Remove the suspected article from
presence of a detection dog from entering a
the area
facility with a dangerous item
c. Control access to the detection
d. A detection dog may be an effective tool
equipment
for detecting lost or missing persons after
d. Abide by company policy and procedure
an environmental disaster
10. Which of the following is not a consideration
4. A magnetometer is a kind of metal detector
when using X-ray detection technologies?
that detects:
a. Taking necessary precautions to protect
a. Zinc
one’s personal privacy
b. Aluminum
b. Implementing shift rotation for security
c. Ferromagnetic material
personnel to mitigate operator fatigue
d. Nonferromagnetic material
c. Training new operators is lengthy and
5. Which of the following is not a metal
expensive
detection technology used prominently in
d. Implementing proper training and
security applications?
corrective measures to reduce mistakes
a. Continuous wave device
made in assessment interpretations
18
Fire Prevention, Detection,
and Response
Michael Stroberger
209
210 18. FIRE PREVENTION, DETECTION, AND RESPONSE
e
He
e)
sid
xid
tur
at
en
izin
era
sid
yg
ga
mp
Ox
ge
(Te
Ox
at
nt)
yg
He
en
Re
ac
ain tio
Ch n
Fuel side
Fuel
(Reducing agent)
safe distance in the process of evacuating the common extinguisher types and the class of
immediate area (Figure 18-2). fire they are intended to be used on are as
follows:
● Dry chemical—these utilize a powder that
EXTINGUISHERS is expelled from the nozzle in a stream
of pressurized, nonflammable gas. Dry
The most critical aspect of deciding if you are chemical extinguishers are usually classified
going to attempt to extinguish a fire is deter- as usable on Class A, B, and C fires, as
mining if you can do so without serious risk to they will be both effective and relatively
your own safety or the safety of others. Make no safe in those applications. Dry chemical
mistake: fighting a fire is dangerous. By its very extinguishers extinguish the fire by coating
nature, this activity requires that you intention- the fuel of the fire, making it unavailable for
ally remain within, or move within, close prox- combustion.
imity to a highly hazardous environment. Care ● Carbon dioxide—these units produce a
should be taken to ensure that the responding cloud of snow-like particles that quickly
person understands the dangers and the equip- evaporate into a carbon dioxide layer. This
ment to be used, as well as its limitations. The layer reduces the available oxygen and cools
purpose of fighting a fire is to save lives and the area, breaking the fire triangle. They
property, not to risk them needlessly. are commonly classified as B and C type
When working in an environment with extin- extinguishers.
guishers that you may not have used before, it ● Water-based—water is a good extinguishing
is recommended that a test unit be obtained, agent for Class A fires, but can aggravate
even in a group setting, so that the area of other types. If used on burning liquids
effect, limits of range, and duration of use can (Class B), it can spread the fuel, thus
be explored. enlarging the fire area. If used on electrical
When deciding if it is appropriate to attempt fires (Class C), it can cause serious harm to
to extinguish a fire, it is important that the the responder, as it may conduct an electrical
equipment you select matches the fire type. charge, causing an electrical shock to be
Mismatching the extinguisher and fire types delivered to the holder of the unit or others
may result in a marked increase in the level standing in the runoff from it.
of personal danger to which the responder is ● Halogenated units—these are referred to
exposed. With this in mind, some of the more as “clean agent” extinguishers because they
materials. Such items as fire-resistant doors, It is essential that senior management review
designed to resist the spread of a fire for certain this program and support it. It is also essential,
periods of time, aid greatly in the containment and in some areas required, that the fire mar-
of a fire. However, to be effective, they must be shal have a chance to review the fire plan and
in their proper position and working in accor- approve it prior to implementation.
dance with their original design. As part of As part of a formal plan, alarm systems
every officer’s patrol, confirming that fire doors should be regularly inspected and tested to
are in proper condition and not propped or ensure that the components are functioning
wedged open should be a constant component. properly. This should include activation of every
sensor through cooperation with a qualified/
certified inspector or installer and the presence
FIRE PLANS or approval of the fire marshal.
Above all, the response portion of a fire plan
Designing a fire plan, prior to an actual event,
must be realistic in its assignments and expec-
is the most effective step in any fire prevention,
tations. It should be written with the following
fire detection, and fire response program. It is
limitations in mind:
through this plan that all of these factors should
be addressed and given structure and detail. ● Assign duties only to people or positions
Developing such a plan must be done in coop- that will always be present. If you work
eration with those expected to execute the plan, in an area where the patrol officer is the
and they should be involved from the beginning. only position that is staffed at all times, the
Without this, it is possible that aspects of the response plan should assume that this will
final plan may be unrealistic, and could prevent be the only person present for its critical
an effective program from being implemented. aspects. It is easier to assign an extra person
The written plan should include the follow- to a new duty than it is to find an extra
ing as a basic guide: person for a vacant function.
● Write each phase with the protection of lives
● Emergency contact names and telephone
as the primary focus, and property concerns
numbers
as a secondary motivation.
● A formal chain of command ● Write the plan based on existing equipment
● Detailed explanations of the responsibilities
and supplies only. Do not count on having
of each person or department in prevention
time to obtain other items before the plan
aspects
must be put into action.
● Detailed explanations of the responsibilities of
each person or department in response aspects The most important point about fire plans is
● An explanation of the equipment available, that they must be put into effect! What good is a
the frequency of inspection, and the method plan that is exhaustively researched, designed
of documentation by a broadly scoped committee, approved by
● An explanation of the training that personnel every member of the team, and then put on a
receive, the frequency of retraining, and the shelf and never utilized?
specific responsibilities bestowed as a result
of this training ARSON
● Charts and diagrams of the property,
detailing equipment locations, routes of Fires are not always accidents or acts of nature.
egress, evacuation meeting locations, and An alarming number of cases are thought to be
similar fixed points fires that are intentionally set for any of a vast
19
Occupational Safety and Health
and the Protection Officer
Kevin Palacios
217
218 19. OCCUPATIONAL SAFETY AND HEALTH AND THE PROTECTION OFFICER
an accident. (Examples: normal wear and ● Document the safety violation and
tear, pipes corroding from within, ropes forward a report to appropriate
becoming rotted creating an unsafe/ management.
unhealthy condition, or lack of preventive ● The protection officer who observes an
maintenance). The source cause sets the unsafe condition, or a safety hazard should
stage for an accident; it makes the accident do the following:
possible. ● Correct the condition or report it to
4. Unsafe/unhealthy acts—Human behavior someone who can correct it.
action(s) by the worker that deviate from ● Mark off the condition as a hazard
the accepted safe work procedure that cause where immediate corrective action is not
or contribute to an accident. (Examples: possible.
horseplay or workers not wearing proper ● Document the unsafe hazard or condition
personal protective equipment.) Unsafe acts and the action taken, forwarding the
are often what trigger an accident. They may report for appropriate action.
complete the cycle so that the accident event Unfortunately, most health-related hazards
occurs. Personal factor causes often serve as and risk factors can’t be easily/directly observed.
the reason for unsafe/unhealthy behavior. The officers must be aware of the potential
Personal factor causes are any personal symptoms and consequences associated with
characteristic or conditions that may cause their workplace in order to report them for early
or influence a worker to act in an unsafe/ diagnosis.
unhealthy manner. Examples of personal
factor causes include physical or mental
conditions, extreme fatigue, intoxication,
Common Safety Hazards
poor attitude, and tense relationships in the There are numerous safety hazards that the
workplace. protection officer should be made aware. Some
of the frequently encountered safety hazards or
conditions include the following:
THE ROLE OF THE PROTECTION 1. Fire protection
OFFICER IN OSH PROGRAMS – violation of no smoking regulations
– unusual odors, especially smoke
The protection officer is trained to observe
– obstructed passageways and fire doors
and identify potential hazards. The majority
– inadequate exit signs
of large companies maintain a loss prevention
– obstructions in front of hydrants, alarm
department with protection officers on duty
boxes, extinguishers
24 hours a day, 7 days a week. The protection
– electrical heaters and coffee pots left
officer is in a position to report and correct
turned on
unsafe acts, unsafe conditions, and potential
– improper disposal of waste
hazards while conducting routine patrols.
– flammable gases and liquids which are
The protection officer who observes a
uncontrolled in areas where they may
safety violation by a worker should do the
pose a hazard
following:
– paint or painting areas poorly ventilated
● Record the worker’s name. and not properly secured
● Notify the worker’s supervisor, advising him – gas pumping areas close to operations
or her of the violation. where an open flame may be used
about an incident. This is done for the purposes mental, and emotional well-being of employees.
of identifying causes and making recommenda- These policies and programs strive to:
tions to prevent the incident from happening
again.
● Prevent harmful health effects because of the
Industrial Hygiene—A science that deals work environment
with the anticipation, recognition, evaluation,
● Protect employees from health hazards while
and control of hazards in the workplace. These on the job
hazards may cause sickness, harm to employee
● Place employees in work environments that
health, discomfort, and inefficient perfor- are suitable to their physical and mental
mance on the job. Also known as occupational make up
hygiene.
● Address other factors that may affect an
Job Design—The planning of a job and the employee’s health and well-being, such as:
establishment of procedures for performing that
● Ineffective organization of work
job so that the potential for injury and illness is
● Harassment and violence in the workplace
reduced or eliminated.
● The need to balance work and family
Job Enrichment—Adding one or more responsibilities (e.g., elder care, child care)
related tasks or functions to an existing job.
● Promote healthy lifestyles
These may include some managerial functions Occupational Illness—A harmful condition
(e.g., planning, organizing, controlling). or sickness that results from exposure in the
Loss Control—Measures taken to prevent workplace to a biological, chemical, or physical
and reduce loss. Loss may occur through injury agent or an ergonomic hazard.
and illness, property damage, poor work qual- Occupational Safety—The maintenance of a
ity, and so on. work environment that is relatively free from
Material Safety Data Sheet (MSDS)— actual or potential hazards that can injure
A form that contains detailed information about employees.
the possible health and safety hazards of a Personal Protective Equipment (PPE)—Any
product and how to safely store, use, and han- device worn by a worker to protect against haz-
dle the product. Under the federal Hazardous ards. Some examples are respirators, gloves,
Products Act, suppliers are required to provide ear plugs, hard hats, safety goggles, and safety
MSDSs for all hazardous materials as a condi- shoes.
tion of sale. Organizations that use hazardous Physical Agent—A source of energy (e.g.,
products are required to keep an MSDS onsite noise, radiation, vibration, heat) that affects the
for each product. This is a provision of the Right body, a part of the body, or any of its functions.
to Know Act. The effects may be beneficial or harmful.
Medical Surveillance—The systematic Preventive Maintenance—A system for
approach to monitoring health changes in work- preventing machinery and equipment failure
ers to identify and determine which effects may through:
be work-related.
Nature of Injury or Illness—The main phys- ● Scheduled regular maintenance
ical characteristics of a workplace injury or ill- ● Knowledge of reliability of parts
ness (e.g., burn, cut, sprain, dermatitis, hearing ● Maintenance of service records
loss). ● Scheduled replacement of parts
Occupational Health—The development, ● Maintenance of inventories of the least
promotion, and maintenance of workplace reliable parts and parts scheduled for
policies and programs that ensure the physical, replacement
EMERGING TRENDS
Despite the fact that the basic role of most security and safety risks by packaging them
protection officers is currently somewhat lim- together into a single program. Such an approach
ited to physical and logical security, many pro- may be particularly helpful with international
tection officers already perform several duties operations: going into a foreign country presents
in OSH programs. This will be more common in a whole new host of risks. Convergence with
the future as the need for loss control, financial other risk management functions within the
austerity, and competition among organizations organization (health, environment, safety, and
grows. quality) is quickly gaining momentum.
Enterprise Risk Management is the assess- Laws and regulations vary greatly in different
ment and management of all risks that an orga- regions of the world; nevertheless, major efforts
nization faces. Business risks such as profit and are taking place to standardize procedures, train-
loss are being managed along with traditional ing, and risk management models globally.
20
An All Hazards Approach
to Hazardous Materials
Robert D. Jaffin
229
230 20. AN ALL HAZARDS APPROACH TO HAZARDOUS MATERIALS
These movement estimates do not even take into occurring. That is the unglorious but real chal-
account pipelines, which distribute some of the lenge for the professional protection officer.
most hazardous, although not necessarily the Yet, in today’s world, where the “all hazards
deadliest, materials in use. From a practical stand- approach” has become the standard, weather-
point, it is important to understand the generally related incidents and hazardous materials inci-
accepted concepts and definitions for hazardous dents represent the majority of recurring serious
materials. The best, but extremely complex, defi- incidents in the workplace.
nition is in Federal Standard 313D of the Material Awareness of the evolving technologies and
Safety Data, Transportation Data and Disposal the inherent dangers of many new products is
Data for Hazardous Materials Furnished to an often overlooked part of this job. Today’s
Government Activities. That standard takes over products, including products carried and used
two pages to define a hazardous material and ref- by protection professionals, represent their own
erences multiple external documents. set of new and unique hazardous material chal-
On a practical level, hazardous materials lenges. Here are some examples of new, and in
have been internationally categorized into one some cases variations on older, products that
of nine hazard classes. Some of these classes are represent new and often times overlooked or
further divided into divisions. The most widely misunderstood hazards:
used and commonly understood classifica-
tion system includes 23 classes and divisions. 1. Ethanol-enhanced fuels. It requires a
Seven of these classes and divisions represent different kind of foam to fight an ethanol-
inherently hazardous materials that must be or alcohol-based fire than a gasoline- or
considered immediate and direct threats in petroleum-based fire. Knowing that ethanol
any quantity. Those include certain classes and is being moved may require a facility, and
divisions of explosives, mass explosion hazard, its protection force, to increase the type and
projection hazard, fire or incendiary hazard; number of both portable firefighting devices
dangerous when wet materials; toxic inhalation and fire suppression systems available.
hazards; and high-level radioactive materials. 2. Lithium ion batteries. These batteries are
one of the most dangerous products that
are used in everything from toys to oxygen-
ROLE OF THE PROTECTION generating vests, aircraft black boxes to
OFFICER computers and UPS backup power supplies.
These batteries present such a great risk
A proactive approach on the part of any in transportation, as distinct from their
business and every individual leads to minimi- individual use in consumer products, that
zation, if not elimination, of hazardous mate- the international community has assigned
rials incidents. Education and training that new identification numbers for them; and in
specifically include a full explanation of all the 2008 Emergency Response Guidebook
the materials that move through or are used (ERG), for the first time in over 12 years
within a facility is the first line of defense. the U.S. Department of Transportation (U.S.
Understanding the terminology and federally DOT) added a new guide number. That
mandated response framework is a critical is particularly significant because there
part of that training. The fact is, there is noth- are over five million different hazardous
ing heroic or exciting about maintaining good materials but there are only 66 guides in
and safe work practices, and proper site secu- the ERG. If lithium ion batteries are short-
rity, to eliminate the possibility of an incident circuited they will generate a tremendous
is much more critical than being a “hero.” those recommendations and codify them into
Nowhere is that more important than when their own regulations. While hazardous mate-
dealing with hazardous materials. Mitigation rials fall under the Occupational Safety and
of danger in a hazardous materials release situ- Health Administration (OSHA), Environmental
ation should be left to those with proper train- Protection Agency (EPA), and DOT, the most
ing and experience. For protection officers, the comprehensive information available on the
first step is to self-protection, the next is mate- majority of these hazards comes from the fed-
rial identification, the next is to evacuate as eral DOT guideline 49 CFR parts 100 to 180
necessary and activate the appropriate contin- which is known as the “Hazardous Materials
gency or response plans, and the last step in Regulations” or HMR. The HMR are standard-
most circumstances is to provide containment. ized and harmonized with the rest of the world.
That may be as simple as maintaining a physi- Portions of the EPA and OSHA regulations
cal security perimeter or as complex as break- contain language and definitions that are not
ing out absorbent materials, turning off entire universally accepted and may be unique to the
HVAC plants, and preserving “crime scene” United States or North America. The HMR is
integrity. also one of the most difficult federal regulations
to read and understand. A good practical tool to
use is the most current version of the Emergency
TOOLS AND RESOURCES Response Guide; at the time of this writing that
would be the 2008 ERG. This guide is pub-
While protection officers should know some lished by the U.S. DOT in conjunction with
basic firefighting techniques and basic emer- other North and South American governments,
gency medical techniques including CPR and and has been updated on a 4-year cycle since
first aid, most security professionals recognize 1996. The next version is likely to be the 2012
that they are neither paramedics nor firefight- ERG, with a new ERG published again in 2016.
ers. The same concept is true for hazardous Copies of the regulations, as well as handy
materials response, containment, and mitiga- pocket-sized copies of the ERG, are available
tion. Small releases of less deadly materials can from a number of sources and the leading pro-
be handled by anyone with the right formal viders of this material have been included at the
training, basic knowledge of hazardous materi- end of this section. The single most valuable site
als response, an understanding of the risks and for obtaining additional HAZMAT information
protocols, and access to the Material Safety Data (although not emergency response information
Sheets (MSDS) to properly identify risks associ- in the face of a specific incident) is http://www
ated with each specific incident or material. .phmsa.dot.gov/hazmat.
The most universally accepted method to iden- The Emergency Response Guide is a tool that
tify and classify hazardous materials comes from should accompany the professional whenever
the world of transportation. The original work on duty; this author keeps one in the glove
was developed by the United Nations Committee compartment of his private vehicle. Learning
of Experts, who developed the “Orange Book” how to use the ERG is a key to minimizing and
of recommendations that is the basis for the mitigating the impact of hazardous materials
initial classification and identification of haz- releases. There are going to be times when the
ardous materials throughout the world; these most appropriate action is to turn and run! The
are not regulations but a set of recommenda- ERG is a quick response tool to initiate both
tions. Individual nations, as well as interna- protective and response/containment actions.
tional governing authorities, must recognize To paraphrase standardized training materials,
To a limited degree this method worked for standard (29 CFR 1910–1200) and Hazardous
a while. The problem is that after diluting so Communications (49 CFR Part 172, subparts D,
many hazardous materials into the environment E, and F). In addition, the EPA’s 40 CFR specifi-
for so many years, the environment has become cally addresses use of transportation labeling
saturated and, as a result, traces of those same and identifications within workspaces. If mate-
substances are appearing in our food and water rial is being used or processed in a workspace
supplies today—to say nothing of the long-term those communication standards require easy
and short-term health hazards faced by unpro- access to the MSDS. Assuming compliance with
tected response personnel, using no or minimal those requirements, between the information on
Personal Protective Equipment (PPE). an MSDS and the information contained within
Today, government and industry agree that the ERG, specifically the information provided
just as firefighting requires specialized train- for each guide number, professional protection
ing, response to hazardous materials requires officers can identify spilled materials and begin
specialized knowledge, training protocols, and to take mitigating or corrective actions.
protective equipment to ensure minimal risk to
the workplace, the environment, and all indi-
Determine the Quantity
viduals. Today there are firms that specialize
of the Released Substance
in enhanced material incident response and
cleanup and both public and private safety and After identifying the substance, it is important
security organizations create and train their to determine how much of it has been released.
specialized HAZMAT response teams. The uncontrolled release of 8 oz. (1 cup) of ace-
tone, while requiring caution in cleanup, does not
necessitate response from a HAZMAT team. The
THE INITIAL RESPONSE same quantity of cyanide or an explosive would
require extraordinary measures to be taken.
Whether or not a facility has a HAZMAT Quickly determining what substance has been
response team in place, there are some basic released allows more time for the HAZMAT
steps that must be followed. team to decide what course of action they must
take.
If the release is a liquid or solid and has
Identify the Substance Released occurred in a more or less open area, it may
There are several ways to safely determine be possible to see where the substance is leak-
what has been released. But the most important ing from. Never go near the area unless prop-
thing to remember is the basic instruction pro- erly trained in the required level of PPE; this
vided in the ERG: always stay upwind, uphill, prevents the professional from inadvertently
and/or upstream of any hazardous materials becoming another victim of the incident.
release until able to identify it. One way to iden- It may be possible to read the placard on a
tify material at the workplace is to ask the person transport vehicle or a larger shipment, or the
who was using it. This may not always be pos- label which should appear on smaller packag-
sible, since the employee in question may have ing, from a safe distance with or without the
been injured. However, there are several other use of binoculars. The identifying labels or plac-
safe ways to determine what a released sub- ards may have a class, such as “Poison Gas,”
stance is. In the United States, under 29 CFR and and should have the class or division number
49 CFR, the OSHA and DOT regulations, there is or, on placards of large enough quantities, the
both a requirement for a hazard communication specific universally recognized “UN number.”
and force rescue workers to jeopardize their own must be treated. This last concern increases
safety to save them. During the initial phases of the workload of response personnel who may
an incident, the risks of unauthorized personnel be overextended and understaffed initially.
interfering with or, worse, distracting response Another problem with the media intrusion is
personnel are very high. It is important to that their entry into restricted areas encour-
remember that initially the first protection pro- ages curiosity seekers to follow and go beyond
fessional on scene is the incident commander. safety barricades.
The media will take risks that most normal People like to watch others dealing with
citizens would never dream of. Reporters have problems. On a crowded highway, during rush
been known to cross barricades and sneak past hour, drivers will always slow down to take a
security to get a close shot of the incident area. closer look at any incident along their route,
This poses several problems: they interfere with even when that incident is on the other side of
the HAZMAT team’s operation by attempting the roadway. An accident, even on a divided
to talk to them and generally get in their way; highway, inevitably has the effect of drastically
they typically fail to follow safety precautions reducing traffic flow in both directions. That
and risk becoming exposed themselves; and same human curiosity draws onlookers to the
when they do become unintended victims, they scene of a hazardous materials incident.
EMERGING TRENDS
Hazardous materials will continue to evolve 9/11 attacks on the World Trade Center what jet
over time. As new chemicals, medicines, and fuel can add to the equation.
foodstuffs are manufactured, the potential for The Department of Homeland Security, as
dangerous concoctions escalates. Adding to the well as several state agencies, has placed regula-
danger is an increasingly crowded transporta- tions on chemical manufacturing plants. These
tion infrastructure. As highways and bridges are plants are being required to have security plans
more heavily traveled, the potential consequences and dedicated individuals in charge of the pro-
of a HAZMAT incident increase. A spill or release tection function. Such regulation is likely to
will affect more people in the future than at expand; new jobs and duties will evolve for pro-
present. tection officers at chemical facilities.
Hazardous materials management is a key Along with a more robust regulatory environ-
component of an anti-terrorism campaign. ment, the current concern with environmental pro-
Understanding the scope and nature of danger tection will undoubtedly play a role in hazardous
that surrounds different substances is a neces- materials manufacture and use. Organizations will
sary first step in protecting against terrorism. need to continually assess their risk of hazardous
Protection officers must appreciate the risks materials incidents in light of potential negative
associated with hazardous materials in and near publicity. They will also have to mount compre-
their work environment. Security measures must hensive media campaigns before, during, and
be enacted so that terrorists cannot divert or det- after a HAZMAT incident, likely making them
onate existing materials. We have seen with the more careful in hazardous material precautions.
INFORMATION PROTECTION
21
Information Security and
Counterintelligence
Kevin E. Peterson
241
242 21. INFORMATION SECURITY AND COUNTERINTELLIGENCE
LEGAL SECURITY
PROTECTIONS PROTECTIONS
3. Implement a definable plan for safeguarding back up the ones that were unsuccessful. As
trade secrets. Winkler puts it, when we apply defense in depth,
4. Secure physical trade secrets and limit access “security [isn’t] perfect, but it [is] prepared”
to trade secrets. (Winkler, 2005, p. 305). Examples of some of those
5. Confine intellectual knowledge. “layers” might be strong password protection,
6. Provide ongoing security training to encryption, biometric authentication, physical
employee security measures, personnel screening, attended
facility access (security officers), employee train-
(Federal Bureau of Investigation, 2009).
ing, and password-protected screensavers.
As indicated, it is important—in any private
or public sector setting—to find the proper bal-
ance between legal protections and security THE ROLE OF THE PROFESSIONAL
protections. Figure 21-2 shows some consider- PROTECTION OFFICER
ations for each.
To achieve protection objectives and ensure The most effective protection officers are those
they are consistent with the business or orga- who know their customer (the organization they
nization’s strategic goals, these two “commu- serve) and tailor the way they provide security
nities” of protection measures should work services to the customer’s mission and culture.
together to develop an integrated risk mitiga- In many organizations, information assets are
tion approach. Working in a vacuum can result absolutely crucial to the survival and success
in duplication of effort and significant waste as of the enterprise. Officers should recognize
well as poor results due to internal conflicts. this aspect of the organization and factor it into
Finally, according to well-respected consul- the performance of their protection duties. It
tant and author Ira Winkler, the best approach to should be noted that many contemporary com-
addressing risks to information assets is to apply panies are centered on information as their core
defense in depth (layered security) by incorporat- business function, hence our “information-based
ing both IT and traditional protection measures. society.” It is our responsibility to remember that
Even if one or a few layers fail, other layers will a key objective of information asset protection is
EMERGING TRENDS
Three emerging issues that are relevant to the and home settings. As such use and popularity
protection of information and intangible assets increases, systems and the data residing on them
are the increasingly interconnected global busi- become more attractive targets for a variety of
ness environment, the rapid advances in infor- adversaries.
mation technology, and the fact that we now These new technology tools can also be
have to consider—in a different way—the secu- exploited by adversaries to support their illicit
rity of security systems. These issues are dis- activities. The best examples at the moment are
cussed in this chapter, but need to be constantly the new cottage industry of information bro-
reviewed due to the unprecedented pace of kers and the use of sophisticated data-mining
change in today’s security environment. tools and techniques to target sensitive informa-
The advances in information technology tion. This trend will expand in the future and
have a number of implications. One is the new newly introduced business tools such as cloud
family of risks that are introduced by drasti- computing and wireless technologies will
cally increased use of information technol- likely be “abused” by bad actors for nefarious
ogy in business, organization, government, activities.
22
Workplace Crime and Deviance
Norman R. Bottom and
Whitney D. Gunter
255
256 22. WORKPLACE CRIME AND DEVIANCE
Denial of Injury It didn’t hurt anyone. I was just Not all internal (employee) theft is prevent-
borrowing it. able. This section will provide some ways to
Denial of Victim He deserved it. His kind minimize, moderate, and control this crimi-
deserve it. nal activity, but not stop it entirely. Protection
offers can have an impact by preventing, deter-
Condemnation of the The police are corrupt. That
Condemners teacher plays favorites anyway. ring, and displacing theft. When security is
He would have done it too. tight, thieves look for another place to steal.
Making theft so difficult and so much trouble
Appeals to Higher I was just following orders.
Loyalties I was doing God’s work. that the would-be thief will decide against it is
a reasonable goal for a loss prevention officer.
Preventing theft can save many jobs, and that
coworkers deserve whatever the crime costs includes one’s own.
them. Denial of injury is even easier to apply, as Opportunities for employee theft come about
it is not difficult for an individual to fail to rec- because of waste, accident, error, crime, and
ognize that their actions hurt a “faceless” corpo- unethical or unprofessional practices. The first
ration. This is especially true if they realize that letters of these opportunities (which are really
an insurance provider will cover losses. threats) come together to form the acronym
Note that other crimes, in addition to theft “WAECUP” (pronounced “wake up”). Below
may be neutralized by workplace criminals. is a list of WAECUP loss threats, with several
Condemnation of the condemners and appeals examples of each.
to higher loyalties may be used by those who
commit acts of sabotage or espionage. Labor A. Waste
union extremists, terrorists, and spies may 1. Protection officers who waste time create
focus on the employer, criticizing and blam- opportunity for employees to steal.
ing them for some perceived wrongdoing. 2. Waste containers are favorite stash places for
Terrorists involved in religiously based extrem- employees who steal.
ism may choose to believe that God has granted 3. Discarding usable items causes loss, as does
them the right to commit acts of sabotage. So, deliberately putting them in trash to be
too, may those who steal information and give stolen later on.
it to an adversary organization.
B. Accident
1. The confusion that surrounds an accident
Summary for Theories of
scene may be used to screen employee theft.
Workplace Crime
2. Arson has been used by employees to cover
These theories provide some ideas for how up theft. (What seems to be an accident can
criminological theories might be applied to actually be a crime.)
workplace crime and the prevention of such 3. Workman’s Compensation fraud may
crimes. Moving toward more specific strategies occur after an accident where the employee
and actions, the next section will provide an exaggerates the extent of the injury.
remember this, or your search will only cause is a second thing to remember. Get report results
trouble to you. Always check with a supervisor to the right individual(s). The right person or per-
before searching an employee or his property. sons will be able to take the necessary action.
Many companies have rules about what types So far, there are three main points to remem-
of items can be brought onto company property. ber. First, reporting must follow observation.
Know these rules. You may prevent a theft by Observation may involve sighting suspicious
advising an employee that the gunny sack in his activity by employees. Observation includes
hand cannot be brought in. threat potential, such as open doors. Or the pro-
Vehicle parking is another factor in conceal- tection officer may discover concealed company
ment. The personal vehicle of an employee property. First observe; then report.
should not be parked next to the storeroom The second main point is timely reporting. If
door, for example. In fact, employee parking you wait too long to report suspicious activity, the
should be at some distance from buildings and theft will take place. If you wait too long to report
doorways. Company policy establishes the a suspicious open door, stolen items will exit
parking rules, but you should point out parking through that door. If you wait too long to report a
hazards that make employee theft easier. concealed item, it will be removed by the thief.
Employee thieves may use their own car or The third main point is reporting to the right
truck. They may also use a company vehicle to person. The right person will react properly to
haul away the stolen merchandise. For example, a the threat you observed. The right person will
driver may load a few extra cases onto the truck, authorize or take corrective action in a timely
cases not listed on the manifest. These will be sold fashion. The right person will see that your work
for his personal profit and the company’s loss. is not wasted. Who is the right person(s)? Your
Some thieves are very bold. They will attempt supervisor, if available, is the right person. The
to walk out with stolen merchandise in their nonsecurity supervisor in the hazard area is
hands. Employees who attempt to remove com- another. Each company and each business will
pany property from the premises should have have a chain of command or leadership tree.
a pass or other authorizing document. Since Protection officers must know the responsibilities
pass forms may be stolen or counterfeited, it is of various managers. They must know how to
important to know and recognize authorized reach managers in case of an emergency, which
signatures. When in doubt, check with your can include a serious threat of employee theft.
supervisor. And make sure that the pass cov- Reports about employee theft should be both
ers each and every item. If the pass says “six” verbal and written. The need for verbal reporting
items, do not let the employee remove seven. often increases with rapidly unfolding events. The
need for written reports is twofold. First is clarity.
Verbal information often becomes distorted when
RESPONSE TO THEFT relayed from one person to another. Second is
record keeping. Written reports serve as the basis
for planning by the security and loss control staff.
Reporting
History tends to repeat itself, and hazards repeat
All observed suspicious activity, and espe- unless records are kept and used.
cially that involving employees, should be Written reports from protection officers are
immediately reported. Remember that all obser- sometimes hastily read by management, if read
vations and concealment findings are a waste of at all. This is especially true of shift reports. It is
time unless your results are promptly reported. hard to say why these reports are not properly
Along with the need for timely reporting, there used. Sometimes, it is the protection officer’s
supervisor. Routine searches should be done at know an area or the activities taking place as
different times, of course. If officers always check well as employees who work there. Changes
a trash container at 4:00 P.M., employee thieves in the workplace—for example, getting a ship-
will wait until 4:10 P.M. to stash the stolen goods. ment of new, valuable items, opening a formerly
Protection officers may not be allowed in sealed door, or hiring temporary help—can raise
some areas unless invited. Such areas often the potential for employee theft. New merchan-
include the research laboratory and executive dise represents something additional to observe.
offices. Barging into a research laboratory could Opening a previously sealed door means another
ruin experiments in progress. It is important access route to remove stolen merchandise.
to remember that company executives do not Temporary staff may themselves steal or be
want protection officers poking around when blamed as regular employees attempt theft.
important business is under way.
Public relations are the key to almost every-
thing the protection officer does. This is never SUMMARY
truer than in searching an employee’s bag,
briefcase, or vehicle. Your attitude during a This chapter presented some lessons about
search must be professional and nonthreaten- controlling employee dishonesty. Employees at
ing. Remember that you must work tomorrow all levels may steal from their employers. Most
with the same employees you search today. An employees steal what is immediately available
overbearing or nasty attitude will make ene- to them. Opportunities for theft come about
mies you cannot afford. because of WAECUP. Protection officers cannot
prevent all employee theft, but they can have a
positive impact. Theft prevention is a good idea
Employee Liaison at any time. Today, it is especially important
No protection officer can be successful with- because of the economic climate.
out help. Help will come from the protection Practical methods to prevent theft have been
staff, of course, but you can also get help from provided. These include tips on what to look
nonsecurity employees. It is necessary to cul- for, what to report, and what actions to take. As
tivate the respect of those employees who can a general rule, always look for the unusual and
assist you to estimate employee theft threats. out of place, but be prudent in taking action. An
Morale is a good indicator of theft potential. employee may have permission to take com-
When overall morale is high, there tends to be pany property off premises.
less employee theft. When moral is low, theft Protection officers can reduce theft of vis-
is more likely. The protection officer needs to ible items, but it is best to reduce opportunity
keep his or her finger on the pulse of employee for theft. Theft reduction requires knowledge
morale. This can best be done through contacts of company property, how it is marked, and its
in the workplace. value. Make a property list to aid one’s memory.
Often, nonsecurity employees will witness Concealment often comes before removal of
an employee theft, but fail to report it. This company property by the employee thief. Trash,
can continue for a long time. A protection offi- garbage containers, and garbage bags are favor-
cer who has the respect of key employees may ite hiding places. The thief may conceal valu-
receive valuable hints about the deviant activi- able merchandise behind less valuable items.
ties of employees. Everything should be in its place. Look behind
Liaison with nonsecurity employees has other shelved merchandise; examine storage rooms
benefits. A roving protection officer will never and broom closets.
EMERGING TRENDS
Losses caused by employees have been a con- loyalty and commitment to the employer are also
cern throughout history. At one time, employ- critical if theft, sabotage, espionage, and so on are
ers in England and the United States forbade to be controlled.
employees to talk during working hours. This Workplace crime is not limited to theft; sabotage
was to ensure that there was no loss due to by employees can also occur. There are various
wasted time. A more contemporary approach types of sabotage, from total or near total destruc-
to this issue is the use of temporary employees. tion of equipment and facilities (planting explo-
Contract service firms provide employees to cli- sives or incendiaries), to damaging equipment,
ent organizations on an as-needed basis. to deliberate work slowdowns. Sabotage may be
Such an approach cuts waste, but may create motivated by a variety of reasons. In construction
the potential for theft, espionage, and other crimes. and other industries, sabotage may be conducted
Obviously, all employees with access to assets must to prolong the work; damage slows completion of
be properly screened and supervised. Employee the project and keeps hourly workers employed.
Conversely, acts of sabotage may be motivated by to address the crime problem. Intelligence ana-
labor unrest during contract negotiations or strikes. lysts help to spot and track the activity of orga-
Sabotage may be committed by those advancing nized crime groups, terrorists, and embezzlers.
political or social agendas (terrorism), or it may The effective use of intelligence analysts helps to
be the work of foreign agents during times of war. detect crime or loss problems that are forming.
Regardless of the motivation, sabotage is a type of Intelligence analysts can also direct investigation
workplace crime. The control of sabotage is similar into crime or loss situations. Exception reporting
to the control of theft in most cases. systems, which spot deviations from the norm,
Organized crime has been involved in some such as an unusual amount of voided sales at a
workplaces for many years. Infiltration of busi- cash register, are part of a theft intelligence sys-
nesses, with the goal of exploiting their assets, is tem. Simply put, intelligence directs internal theft
a common occurrence. Organized crime groups investigations. It tells us where to start looking.
are now becoming involved with identity theft/ The individual protection officer plays a key
fraud. Exploitation of an insider who provides role in reducing workplace crime and deviance.
confidential customer or employee information Unfortunately, many organizations do not fully rec-
is a key concern. As information becomes a more ognize this, relying instead on accountants, audi-
valuable and accessible asset, such scenarios will tors, and human resources personnel to manage
likely increase. internal losses. This perspective is most often seen
Intelligence and crime analysis positions are with uniformed security personnel; plainclothes
becoming more common. In public sector organi- personnel, such as retail loss prevention officers,
zations, there are often crime analysts employed by tend to be more involved in internal loss problems.
police departments. Intelligence analysts may be In retail, loss prevention agents do various forms
employed within law enforcement or investigative of auditing, interviewing, and surveillance. In
organizations. Major corporations are also using many cases, retail loss prevention officers also are
the services of those who can conduct applied involved in educational programs for employees.
research on an organization’s loss problems. Crime Coordinating and delivering awareness programs
analysts help pinpoint where crime is occurring on internal loss, organized retail crime (ORC),
by day, time, and location. They aid in more effec- safety, and related topics are functions that are
tively deploying personnel and other resources often performed below the managerial level.
23
Substance Abuse
Francis J. Elliott, Glen Kitteringham, and
Terence M. Gibbs
269
270 23. SUBSTANCE ABUSE
and the employer, and the methods by which Green, 2008) and 90% of alcoholics are
to prevent or confront these risks. As a security employed in the workplace. Many of these
professional, you must be prepared to deal with employees are poly-drug abusers. That is,
substance abuse on the job and effectively com- they abuse more than one drug in the course
municate your observations and information of their drug-taking behavior. Employees with
to your supervisor. Because of your daily inter- alcohol and other drug problems represent
action with employees and others who visit 10–20% of any given workforce. Within this
your workplace, you must be able to recognize workforce, the highest concentration of abus-
conditions that may point to a security risk or ers is within the 18- to 25-year-old age group.
vulnerability A 2007 U.S. Department of Health and Human
For the purposes of this chapter, the phrase Services study shows that 20% of work-
“substance abuse” refers to the use, usually ers age 18 to 25 use drugs on the job, while
self-administered, of any psychoactive drug, the rate for 27- to 34-year-olds is 10%, 35- to
in a manner that deviates from the approved 49-year-olds is 7%, and 50- to 64-year-olds is
legal, medical, or social patterns within a given 2.6% (Larson, Eyerman, Foster, & Gfroerer,
culture. A drug is defined as any substance 2007). The Canadian Centre for Occupational
that by its chemical nature alters the structure Health and Safety put the 2002 economic cost
or function of the living organism. A psycho- of substance abuse to the Canadian workplace
active drug is one which alters the structure or at $39.8 billion (www.ccohs.ca/oshanswers/
function of the brain. Psychoactive drugs alter psychosocial/substance.html). U.S. government
mood, perception, or consciousness. Examples data suggests that the economic cost of the
include nicotine, alcohol, marijuana, cocaine, United States’ extensive involvement with mind-
amphetamines, and LSD. altering drugs and alcohol may be close to $400
Because our focus is on drugs that directly billion annually to the American business
affect performance and behavior on the job, community (U.S. Department of Health and
nicotine will not be a focus of this chapter. Human Services, 2009). The annual cost for a
However, it is important to note that nicotine single employee with a substance abuse prob-
consumption produces classic drug depen- lem is reported to be between 5% and 15% of
dence characteristics. Along with alcohol, it is a company’s health care budget (Fischer et al.,
considered a gateway drug for those who ulti- 2008). The European Monitoring Centre for
mately use other dependence-producing drugs, Drugs and Drug Addiction (2009) estimates
such as marijuana and cocaine. Finally, nicotine that at least 100 million Europeans, or 32% of
has been clearly identified as an insidious sub- the population, have a lifetime prevalence for
stance responsible for approximately 5.4 million using such drugs as cannabis, cocaine, ecstasy,
deaths worldwide and is referred to the big- amphetamines, and opioids. It is safe to assume
gest “killer in the world” by the World Health that their workforce is also directly impacted
Organization (United Nations Press Briefings/ by substance abuse. Aside from the substance
Tobacco). abuser population, there exist an unspecified
number of employees who are codependent.
These employees do not abuse drugs. However,
IMPACT ON BUSINESS AND they share a common thread. They are the
INDUSTRY spouses, children, and significant others who
arrive for work each day preoccupied with the
In the United States, recent studies reveal that physical and emotional condition of their loved
75% of illicit drug users (Fischer, Halibozek, & ones.
How each substance abuser will land is unpre- person. We also know that there are not enough
dictable, and is often guided by circumstance of these programs to meet the needs of the
beyond anyone’s control. afflicted. According to the U.S. government,
the cost offset is tremendous. For every $1.00
spent on treatment, $7.00 is saved on crime and
HOW PROBLEMATIC BEHAVIOR criminal justice costs. When factoring in health
AND DEPENDENCE DEVELOP care savings, a total of $12.00 is saved (U.S.
Department of Health and Human Services,
Today, drug dependency is viewed as a dis- 2009). In spite of the various programs and mod-
ease with identifiable causes, signs, and symp- els, we know that recidivism rates are high. So,
toms. As such, in many jurisdictions people for all that is known, the experts still have much
with addiction issues are protected by human to learn and continue to do so each day. There is,
rights councils. Dependency follows a predict- however, a solid body of evidence pertaining to
able course and outcome, and it is treatable. the stages of dependency and associated behav-
The disease of drug dependence can be the iors which the protection officer should know.
following: An understanding of the process is critical to
prevention and rehabilitation efforts.
● Primary—it is not simply the symptom
Drug dependence follows a predictable
of some other problem(s); it is in itself the
course of action which, most often, begins with
problem.
experimentation. This may be the result of curi-
● Contagious—it attracts others who are
osity, peer pressure, or a variety of other vari-
vulnerable.
ables or combination of variables. Everyone
● A family disease—it affects entire families,
is susceptible to the abuse of drugs and some
not just the individual abuser.
more so than others due to a host of social, envi-
● Chronic—it is difficult to control, is quite
ronmental, psychological, and biological issues
often recurring, and although treatable, it is
or, in some cases, heredity. What is significant is
incurable.
that each incidence of use makes the user more
● Fatal—it takes hundreds of thousands of
susceptible to continued use, up to and includ-
lives annually.
ing dependence. Further, the earlier drug use
Drug dependence may be physical or psy- begins, the more likely it is to progress to abuse
chological, and it represents an individual’s loss and dependence.
of control. Physical dependence occurs when a Another facet of dependence is recovery. The
person cannot function normally without the individual user has a greater opportunity for a
repeated use of a drug. If drug use is abruptly full recovery if treatment begins before depen-
discontinued, the person experiences severe dence sets in. The longer one uses a drug(s),
physical and psychic disturbance, known as the more complex the physical and psychologi-
withdrawal. Psychological dependence pro- cal symptoms become. As a result, recovery for
vides a strong psychological desire to continue the dependent person, or daily user, is a greater
the self-administration of drugs for a sense of challenge in most instances than recovery from
improved well-being. occasional use or experimentation. This is why
A great number of programs and treatment early intervention is significant.
approaches exist for the treatment of drug Whether an intervention occurs at home,
dependencies. What we do know about these work, school, or in the community, it is certain
various programs is that no single approach or that the earlier the intervention takes place the
program is effective for every drug dependent greater the opportunity is for recovery.
resources to establish sound drug-free work- by the layperson. These signs include the
place programs that will meet this challenge. following:
1. Observation of drugs and/or drug
paraphernalia in the workplace.
CONDITIONS ADVERSELY 2. Observation of suspicious activity, especially
AFFECTING THE WORKPLACE in secluded areas of the facility or parking
lots. Whenever suspicious activity is
As substance abusers arrive for work each
observed, you should immediately contact
day, they generally fit into one or more of these
your supervisor and request backup before
categories that present threatening conditions
approaching. However, immediate action
for employees and their employer:
may be necessary if a threat to personal
1. Appear for work under the influence of safety exists.
drugs and will be openly and obviously 3. Scent of chemical odors not commonly
impaired, or intoxicated and unfit for duty. present in the workplace.
2. Possess and use drugs on the job. Although 4. Observation of abnormal behavior, including
they are impaired, it will not be evident. the signs of intoxication. Keep in mind that
3. Sell or otherwise distribute, or transfer not all abnormal behavior is an indication
illegal drugs or legal drugs illegally, while of substance abuse. Some employees may
on the job. have legitimate medical problems that can
4. Display impairment due to the residual result in behavior similar to intoxication.
effects of drugs taken hours or even days Regardless of the cause, immediate action is
prior to coming to work. These effects may required to protect the employee, coworkers,
include emotional outbursts, personality and the company’s property and interest.
changes, irritability, combativeness, memory
problems, and the inability to complete
assignments.
5. Have codependent loved ones working at
HOW MUST INDUSTRY
jobs where they will be less productive.
RESPOND?
Keeping in mind that the protection officer The workplace plays an integral part in the
is not a diagnostician, recognizing impairment fight against substance abuse. When continued
due to sustained low dosages and residual employment is conditional upon being drug-
effects, or codependence, will be unlikely unless free, then employment becomes a powerful
he/she is informed of this by a third party. If incentive in support of a drug-free workplace.
third-party information is received, then the When a company demonstrates commitment
protection officer should bring this intelligence to a comprehensive program in support of a
to his/her supervisors immediately. These con- drug-free workplace, then the opportunity to
ditions are best left to supervisors and manag- affect attitudes, behavior, and the lifestyles of
ers who can evaluate these issues as a matter employees is significant. Through the influ-
of job performance and make the necessary ence of these programs, employees are likely
referrals, or take disciplinary action when per- to make healthier choices. Employees who are
formance is considered to be deteriorating. educated and committed to a drug-free life-
However, the protection officer should be alert style convey this attitude to their families and
for the outward signs of drug possession, use, friends. In effect, the employee not only serves
and distribution, which are often overlooked to reduce substance abuse at work, but he/she
strategy. However, these components cannot drugs can effectively supplement their income
address all situations. Sometimes a security by removing valuable equipment or money
response is required. This is true when reck- from the employer or other employees.
less and wanton behavior places the safety To counteract the activities of drug dealers,
of employees and the interest of the com- the company’s security department or inde-
pany at great risk. Protection officers should pendent contractor may have to employ certain
clearly understand why and when the security investigative techniques. For the most part, these
response is necessary. techniques include interviews with employees,
There is a small percentage of substance undercover operations, covert surveillance, or
abusing employees, perhaps 4–10%, who will searches conducted by drug-sniffing dogs or
not accept or benefit from an offer of assis- chemical process.
tance in the way of treatment or counseling. Interviews are conducted for the purpose of
These individuals include drug dealers who gathering intelligence that may dictate future
may or may not use drugs on the job, and users action, such as policy changes or the selection
who are not interested in or ready for recovery of an investigative technique. Employees quite
because they are in denial. Employees who deal often possess critical information, but may not
drugs are engaged in criminal activity that can- recognize its significance unless questioned by
not be tolerated. They make available the sup- a trained investigator.
plies on which troubled employees depend and An undercover operation is a specialized
they establish new opportunities for other types investigative technique. It is employed for the
of criminal activity such as gambling, pros- purpose of covertly infiltrating a workforce in
titution, and theft. A survey conducted with order to identify violations of company policies
substance abusing employees revealed that or law. These investigations are usually initiated
44% had sold drugs on the job. They sell their when there is a suspicion or clear knowledge
drugs in bathrooms, parking lots, vehicles, and that drug dealing is taking place, but the source
secluded areas. and the degree are unknown. Even if a source
In some cases, major drug trafficking orga- was identified, in many instances an undercover
nizations have directed dealers to secure jobs operation may be necessary to gather the evi-
in industry and to develop a clientele. Why? dence required for disciplinary or legal action.
Because (1) there is low police visibility, (2) Covert surveillance or hidden cameras are
security forces are well known and predictable, used when the activity in question is confined
and (3) there is a ready-made clientele. These to an individual or specific location. When this
types of employees create morale and safety is the case, a special surveillance camera can
problems and, in many cases, create a great be covertly secreted inside a ceiling, wall, fix-
deal of intimidation for employees and manag- ture, or a variety of other areas restricted only
ers alike. by one’s imagination. The greatest advantage to
Theft is a major problem for both employers the hidden camera is the undisputed nature of
and employees. Employees who use drugs on the evidence, a picture of the event, and those
or off the job need to support that use. In many responsible.
cases the cost of drugs is very high, costing The act of searching a work area or entire
thousands of dollars a month. To support this workplace is not a common practice in most
need, employees have been guilty of the theft industries. When a search is performed it is
of valuables such as equipment, money, and usually carried out by drug-sniffing dogs or by
trade secrets. By contrast, a person who spends chemical analysis. Most employers reject searches
$20.00–40.00 a week for marijuana and/or other by dogs, based on the perceived negative impact
(Black Beauties), Dexedrine (Dexies), and Ben- drugs. This not only creates an image problem,
zedrine (Pink Hearts). Ritalin and Preludin but also a safety problem, because many of the
are amphetamine-like substances that are also necessary precursor chemicals are highly flam-
popular. mable and/or explosive.
Amphetamines are taken orally as tablets
or capsules that vary in color, shape, and size.
Some, like methamphetamine or methcathinone Depressants: Alcohol, Barbiturates,
(CAT), are available in powder form and are Tranquilizers, Rohypnol
injected, snorted, or taken orally.
1. Behavior like that of alcohol intoxication, but
In addition to the drugs listed above, a whole
without the odor of alcohol on the breath
new class of substances referred to as “looka-
2. Staggering, stumbling, or decreased reaction
like” drugs have become problematic. Initially
time
utilized by truck drivers and students, these
3. Falling asleep while at work
substances have now infiltrated the workplace
4. Slurred speech
and are taking their toll. These substances can
5. Constricted pupils
be distributed legally. They consist of capsules,
6. Difficulty concentrating and impaired
tablets, and powders that contain legal, OTC
thinking
stimulants such as caffeine and ephedrine. They
7. Limited attention span
are marketed as “stay awake” and “stay alert”
drugs. However, their use can cause irritabil- These drugs, with the exception of alcohol,
ity and fatigue that in turn has contributed to are produced and obtained in the same manner
morale problems within the workforce. as amphetamines.
The use of stimulants, often referred to as The most commonly abused drugs in this
“uppers” or “speed,” on the job poses three group, aside from alcohol, are the barbiturates,
serious problems. First, being under the influ- such as Secondal (Red Devils), Tuinal (Rainbows),
ence of these drugs gives one a false sense and Nembutal (Yellow Jackets), and the benzodi-
that they are capable of achieving any task or azepines, such as Valium and Librium. Another
conquering any challenge. In this condition, popular drug in this classification is Rohypnol.
employees may use poor judgment or attempt The depressants possess two important char-
tasks that are beyond their training and knowl- acteristics that bear mentioning. First, as stated
edge, resulting in wasted time, property or per- in the definitions at the beginning of this sec-
sonal damage, safety infractions, and accidents. tion, they are potentiating when combined with
Second, in a stimulated, talkative, and hyperac- other depressant drugs. Second, withdrawal
tive condition, users often disrupt coworkers, from alcohol and other depressants is life-
thereby creating employee morale problems. threatening, and should always be done under
Finally, stimulant users tend to repeat tasks. medically supervised conditions.
This reduces productivity and quality control, Valium and Librium are the most widely pre-
and can affect morale in an environment depen- scribed and abused tranquilizers. They are also
dent upon a team effort. potentiating when combined with alcohol, bar-
Note: Many precursor chemicals necessary biturates, or other tranquilizers.
to manufacture illegal drugs are legitimately “Lookalike” substances containing antihis-
used in private industry. To avoid theft of tamines and analgesics like acetaminophen are
these chemicals by drug traffickers, a company also available as described for the stimulants.
should establish safeguards. Also, the work- Rohypnol is one of the latest fad drugs of the
place has been used to manufacture illegal 1990s, and is becoming increasingly popular
1. Odor of substance inhaled on breath and The role of any protection officer is that of
clothes protecting people and assets. The protection offi-
2. Excessive nasal secretions and watering of cer accomplishes this responsibility by observing
the eyes and reporting incidents or situations which pre-
3. Poor muscular control sent a threat to the people and assets he or she
4. Drowsiness or unconsciousness has a duty to protect. Substance abuse is one such
H
a LSD Acid, Microdot None None Degree Unknown Yes 8 to 12 Oral
l
l
u Mescaline and Peyote Mescal, Buttons, Mesc None None Degree Unknown Yes 8 to 12 Oral
c Illusions and hallucinations (with Longer and more intense “trip”
Withdrawal symptoms not
i MDA STP, Ecstasy, exception of MDA); poor episodes, psychosis, possible
Amphetamine Variants Yes Variable reported
COM, MDMA None Degree Unknown Degree Unknown Oral, Injected perception of time and distance death
n
o
Oral, Smoked,
g Phencyclidine PCP, Hog, Angel Dust None Degree Unknown High Yes Days Injected
e
n Oral, Injected,
s Other Hallucinogens DMT, DET, Psilocybin None None Degree Unknown Possible Variable Smoked, Snorted
C
a Pot, Frass, Sinsemilla,
n Thai Sticks, Marinol Marijuana - None,
Marijuana, THC Degree Unknown Moderate Yes 2 to 4 Oral, Smoked Euphoria, relaxed inhibitions,
n (Synthetic THC) THC - Antiemetic Fatigue, paranoia, possible Insomnia, nervousness, and
increased appetite, depth and
a psychosis decreased appetite
time perception distorted
b
i
s Hashish and Hashish Oil Hash, Hash Oil Hashish - None Degree Unknown Moderate Yes 2 to 4 Oral, Smoked
S Depo-Testosterone,
t Testosterone Delatestryl Hypogonadism Degree Unknown Degree Unknown Degree Unknown 14 to 28 days Injected
e Virilization, acne, edema,
r Anemia, Breast aggressive behavior, testicular Unknown Possible depression
o Nandrolone Nortestosterone, DECA Cancer Degree Unknown Degree Unknown Degree Unknown 14 to 21 days Injected atrphy, gynecomastia
i
d
s Oxymetholone Adadrol - 50 Anemia Degree Unknown Degree Unknown Degree Unknown 24 Oral
FIGURE 23-1 Controlled substances: Uses and effects. (Source: National Drug Institute.)
283
284 23. SUBSTANCE ABUSE
threat, and the protection officer represents a crit- Finally, every protection officer should com-
ical component in a company’s effort to combat municate his/her knowledge about the causes
this threat and maintain a drug-free workplace. and effects of substance abuse beyond the con-
By understanding the scope and nature of this fines of the workplace. By sharing this vital
problem, along with the specific security-related information about the perils of abuse, the pro-
concerns, the protection officer will be prepared tection officer can influence his/her family and
to recognize and report substance abuse situa- community in a most positive way.
tions that undermine safety and security.
EMERGING TRENDS
As we have seen in this chapter, substance prescription painkillers is safer than abusing
abuse is nothing new in our society. In recent “street” drugs (www.usdoj.gov/dea/
years, however, a new face of this menace emerged concern/prescription_drug_fact_sheet.html.
on the scene, presenting an immediate and future Retrieved on October 5, 2009).
threat to our well-being. It is the face of pre-
The ready accessibility of prescription drugs
scription drug abuse. Even children are abusing
subject to abuse and the misperception that they
prescription drugs.
are safer than street drugs must be addressed
Prescription drug diversion and abuse are
and corrected. The Substance Abuse and Mental
rapidly growing phenomena in our population.
Health Services Administration (SAMHSA),
The U.S. Drug Enforcement Administration’s
in its 2006 National Survey on Drug Use and
“Fact Sheet: Prescription Drug Abuse—a DEA
Health (September 2007), reports that 70% of
Focus,” presents sobering data regarding this
pain relievers, both prescription and OTC drugs,
emerging trend, including:
are obtained from friends or relatives (www
● The number of Americans abusing .usdoj.gov/dea/concern/prescription_drug_
prescription drugs increased from 3.8 million fact_sheet.html. Retrieved on October 5, 2009).
in 2000 to nearly 7 million in 2006, a startling The implications of this growing trend are
increase of 80%, more than the number who of great concern to security professionals. The
are abusing cocaine, heroin, hallucinogens, teenagers of today who are abusing prescription
Ecstasy, and inhalants combined. drugs are the adults of tomorrow who may very
● Prescription pain relievers are new drug well continue that abuse. Entering the work-
users’ drug of choice, vs. marijuana or place, they will bring with them the yoke of drug
cocaine, with hydrocodone being the most abuse and addiction that can lead to numerous
commonly diverted and abused controlled security threats, including employee theft and
pharmaceutical in the United States. workplace injury and violence.
● Opioid painkillers now cause more drug To rise up and effectively defeat this challeng-
overdose deaths than cocaine and heroin ing trend, we must develop and deliver to all
combined. stakeholders in our society a competent training
● Nearly 1 in 10 high school seniors admits to program that will raise their awareness level and
abusing powerful prescription painkillers. enable them to promptly and adequately iden-
A shocking 40% of teens and an almost tify the telltale signs of prescription drug abuse.
equal number of their parents think abusing This training must include the requisite steps
to be taken to restrict teen access to these drugs to grow and develop into healthy adults who
and encourage them in their lawful, proper, and will contribute to communal safety and security
responsible use, thereby enabling our children rather than threaten and undermine it.
8. Psychoactive drugs affect which of the 10. The protection officer is to take which of the
following: following actions in reference to substance
a. Brain abuse behavior in the workplace:
b. Blood a. Set up an undercover operation
c. Lungs b. Arrest the perpetrators
d. None of above c. Observe and report to your up line
9. Nicotine and marijuana are referred to as d. None of the above
which of the following:
a. Equal in terms of habit forming drugs
b. A harmless recreational drug
c. The most dangerous drug
d. Gateway drugs
24
Workplace Violence
Timothy A. Pritchard and Roger Maslen
287
288 24. WORKPLACE VIOLENCE
● Sabotages equipment and steals property for revenge However it manifests itself, “workplace vio-
● Verbalizes wishes to hurt coworkers and/or lence is a growing concern for employers and
management employees nationwide” (OSHA, 2002). While
● Sends sexual or violent notes to coworkers and/or we intuitively know that workplace violence has
management occurred in organizations for as long as organi-
● Sees self as victimized by management (me against zations have existed, only in recent decades has
them) the U.S. government measured and statistically
Level 3—Highly Injurious reported on the topic. One of the first work-
● Physical attacks and assaults shops held on the topic was on occupational
● Psychological trauma homicide prevention in 1990 in Washington,
● Anger-related accidents DC. This workshop, which was sponsored by
● Rape, arson, murder the National Institute for Occupational Safety
and Health (NIOSH), concluded, in part, that “it
is clear from the available data that workplace
Once you understand the types of work- violence is a public health problem of signifi-
place violence, you must also understand their cant proportion” (Bell & Jenkins, 1992). In that
sources. There are generally four sources of report, which covered the years 1980–1985, it
workplace violence: was reported that homicide was the third larg-
Criminal acts. A perpetrator has no relation- est cause of occupational injury death in the
ship to the business and commits a violent act at workplace. The statistics gathered in this study
a worksite in the course of committing another speak specifically to homicides. Today’s work-
crime. For instance, a homicide or assault occur- place violence analysis has a much better view
ring in the course of a robbery. of the problem.
Customer/client/patient violence. The per- In a 2006 survey conducted by the Bureau of
petrator is not an employee, but has a relation- Labor Statistics, U.S. Department of Labor, for the
ship with the business as a customer, client, or National Institute for Occupational Safety and
patient, and becomes violent while receiving Health, Centers for Disease Control, for the per-
services, or for reasons engendered by the busi- iod from September 2004 to June 2006, shows a
ness relationship. For instance, when a psychiat- broader and more detailed outlook of the perva-
ric patient assaults a physician, or a disgruntled siveness of workplace violence. From that survey,
client or customer threatens a company or one we learn that nearly 5% of the 7.1 million private
of its employees. industry businesses in the United States had a
Worker-on-worker violence. Stems from an workplace violence incident in the 12 months
employment relationship; this includes inci- prior to the survey. The survey found for employ-
dents in which a current or former employee ers with over 1000 employees:
(or independent contractor) harms or threatens
to harm another employee.
Workplace Violence Experience
Violence stemming from a personal relation-
ship. They occur in the workplace, but arise from Have Had an Incident 49.9%
a personal, or intimate, relationship between Criminal 17.2%
the perpetrator and victim. Someone may be
harassed, threatened, or harmed at their work- Customer/Client 28.3%
place by an abusive partner. This may occur in Co-worker 34.1%
instances where the abused partner, the abuser, or Domestic Violence 24.1%
both are employed at the workplace in question.
very real. Costs for losses could also be incurred officers will likely be among the first on the
over and above any insurance the organization scene if an incident occurs. Thus, it is essen-
may have. tial that security officers possess the personal
Loss of productivity. Employees placed in demeanor and professional skills necessary to
stressful situations and faced with traumatic respond to and successfully manage a work-
events of varying levels will quite probably place violence incident. Security personnel can
experience a reduction in productivity. For com- provide valuable assistance to law enforcement
panies already doing more with less, as a result officers who respond to a threat or violent inci-
of current financial realities, this could have sig- dent. A good, positive relationship with local
nificant impact on projects and core business. police agencies should expedite police response
Repair or replacement of equipment and to an incident. Each sector of our workforce
facilities. Vandalism, theft, damages caused by requires different skills from the security officer
an event of any level, could incur unnecessary (i.e., a security officer working at an industrial
costs to the corporation. site requires different skills from one working
Therefore, it is incumbent on the organiza- at a mall or hospital). However, the following
tional leadership to do all they can, at all lev- skills and attributes can considerably add to the
els, to prevent a workplace violence incident individual’s ability to have a positive impact on
from occurring. All individuals in the security the workplace violence prevention plan:
department, including all security officers, must ● Sound powers of observation
be an integral part of this prevention process to ● Vigilance of the activities in the workplace
achieve the maximum level of success. ● Ability to identify signs of potential violence
A successful workplace violence preven-
and effectively communicate them
tion program requires participation of several ● Strong skills in dealing with difficult people
departments inside an organization, including ● Ability to respond in a crisis
security, human resources, risk management, ● Verbal communication skills
and trade unions. This list is only an example; ● Clear understanding of the policies,
each organization may include or exclude cer-
procedures, and plans
tain departments as makes sense for their busi-
ness. The key is that the plan requires active Preparation for a likely incident, especially
participation by many. The plan consists of sev- one involving an external threat, is much easier
eral components, including: than preparing for any eventuality involving
an internal incident. Of all the workplace vio-
● A general workplace violence policy which
lence threats, there is little question that internal
is supported by the highest level of the
workplace violence threats cause organizational
organization and clearly supports a zero-
leaders the most significant level of anxiety.
tolerance position
This is due to the uncertainty of when and how
● Identification of organizational risks
a threat can emerge within the organization.
● A prevention plan
Upon investigation of incidents after they
● A response plan to workplace violence
occurred, it became apparent that people who
incidents (including testing of the plan)
perpetrated workplace violence displayed warn-
● An employee communication and awareness
ing signs prior to the incident. The good news is
program, which includes training for all
that only a very small percentage of employees
levels of staff and plan-active participants
who have violent propensities will actually per-
The security department is a key component form a violent crime. Employees who commit-
of the workplace violence plan, and security ted workplace violence often started out at the
EMERGING TRENDS
In recent years, the Internet has had an effect There is also more legislation, both in place
on workplace violence. There is much informa- and being written, to reduce the risk of work-
tion on the Internet about weapons, bomb mak- place violence. In some jurisdictions, Working
ing, and other strategies, and yet, there is also Alone Legislation either prevents employees
a lot of information on workplace violence and from working alone, or ensures that if they are
how to prevent it. Naturally, this has lead to working alone, they must be checked on at regu-
more public awareness of the issue. lar intervals.
that an organization can take to prevent a work- fact, the opposite is true. Every organization
place violence incident from occurring, and to has its inherent risks, and those risks must be
better prepare the security officer to recognize identified and mitigated by the organization’s
a potential threat and take appropriate preven- leadership. The security team should be a sig-
tive action, or properly react to an incident as it nificant part of this planning and mitigation
occurs. There is not one response plan or pro- effort. If an organization fails to plan, then it is
gram that fits the needs of all organizations. In planning to fail.
References
Bell, C. A., & Jenkins, E. L. (1992). Homicide in U.S. work-
S E CURI TY QU I Z
places: A strategy for prevention and research. Morgantown, 1. Workplace violence is broadly defined as the
WV: United States Department of Health and Human use of violence against workers.
Services.
a. True
Duhart, D. T. (2001). Violence in the workplace 1993–99. NCJ
Publication No. 190076. Washington, DC: United States b. False
Department of Justice. 2. Workplace violence can be categorized into
Occupational Safety and Health Administration. (2002). three levels. Fill in the blank for each level, and
Workplace violence fact sheet. United States Department of cross reference with the examples of each level.
Labor.
___________ Injurious (A)______ Argues with
United States Office of Personnel Management. (1998).
Dealing with workplace violence (OWR-09). customers
Sygnatur, E. F., & Toscano, G. A. (2000). Work-related homi- ______ Swears at others
cides: The facts. United States Bureau of Justice Statistics. ___________ Injurious (B)______ Physical
Bureau of Labor Statistics, U.S. Department of Labor, for the attacks
National Institute for Occupational Safety and Health,
______ Pranks
Centers for Disease Control. (2006). Survey of workplace
violence prevention, 2005. http://www.bls.gov/iif/oshwc/ ___________ Injurious (C)______ Verbalizes
osnr0026.txt . desire to hurt coworkers
ASIS International. (2005). Workplace violence prevention and ______ Causes psychological trauma
response guideline. ASIS International.
3. Workplace violence can occur in almost 7. Although the 2006 survey discussed in this
every workplace: small businesses, large section indicated that 51.4% of respondents
companies, government facilities. reported that workplace violence events had
a. True no effect on their workplace, 29.7% reported
b. False that this effect was observed:
4. An employee who exhibits rude manners a. Absenteeism
toward his or her fellow workers is a definite b. Turnover
workplace violence threat. c. Fear levels
a. True d. Productivity
b. False e. Morale
5. In a 2006 survey conducted by the Bureau of 8. Examples of workplace violence
Labor Statistics, U.S. Department of Labor, for situations are
the National Institute for Occupational Safety a. One worker’s aggression toward his or
and Health, Centers for Disease Control, what her fellow employees in the workplace
percentage of workplace violence events were b. An armed robbery of a taxicab driver
perpetrated by coworkers? c. Criminal activity involving personal
a. 22.7% injury to a worker
b. 34.1% d. All of the above
c. 24.1% 9. According to this chapter, the generally
d. 12.5% recognized primary objective of a security
6. There are many effects of workplace violence program is the protection of:
on an organization. Find the most correct a. Property and the organization’s
group of effects below. employees
a. Interruption to sales, Increased wages, b. People, property, and information
Loss of management, Repair/replacement c. Fire, property, and information
of equipment/facilities d. People, property, and money
b. Interruption to business, Increased 10. According to this chapter, a very small
legal/wages, Loss of machines, Repair/ percentage of employees who have violent
replacement of equipment/facilities propensities will actually perform a violent
c. Interruption to business, Increased legal/ crime.
medical fees, Loss of productivity, Repair/ a. True
replacement of equipment/facilities b. False
d. Complete organizational failure
25
Crisis Intervention
Michael A. Hannigan and
Christopher A. Hertig
295
296 25. CRISIS INTERVENTION
2. Directive: Set limits, suggest expected reassuring. Identify the amount of space needed
outcomes to develop a calming effect.
3. Nonviolent crisis intervention: Safe, prudent How to react, and how quickly to react, will
control and restraint techniques depend on the nature of the disturbance and
4. Therapeutic rapport: Communication with whether there is an immediate threat constitut-
individual during reduction ing a safety hazard. If you do not perceive such
a threat, use the time to calm the subject and
to continue your evaluation of the situation. If
PROTECTION OFFICER you have an audience, move them or move the
GUIDELINES situation. Only people who could provide prob-
able support should be allowed to remain in the
Written policy and procedures will vary from area—not spectators.
one organization to another, but there are three It is important to know how and why the
basic guidelines that are applicable for any situation started and always make sure help is
situation. available.
● Remain calm—move a little slower and
speak a little lower. Remember that “calmness
VERBAL AND PHYSICAL
is contagious,” and lead by example.
DISRUPTIVE BEHAVIOR
● Act appropriately—be serious but human.
● Be objective.
When a person is verbally acting out, they
Do not allow the subject to anger the officer(s) may or may not be fully aware of what they are
or to make him or her act inappropriately. saying or doing. They may express anxiety or
Losing one’s composure will most certainly defensiveness, make demands or threats, or use
intensify the situation. Remember that “when abusive language. This is especially true when
you lose your temper; someone else has control over the subject is in insulin shock, having severe
you.” Don’t become complacent and take any- breathing difficulties (lack of oxygen to the brain),
thing for granted. Always be alert. In terms of or has suffered a head injury. These individuals
personal protection, never stand directly in are not usually able to control their actions and
front of the individual; this could make them may suffer memory loss.
feel threatened. Stand just off to the side, at an Subjects who are physically violent and
angle; this is considered a non-threatening posi- require preventive measures can be easily
tion. Use the person’s name, treating him or her detected by the protection officer. Typically,
with respect. Keep a minimum of 3 feet distance they throw objects or use them as weapons,
between officer and subject. This serves two kick, or attempt to grab or strike other individu-
purposes: first, it will preserve the individual’s als. These physically out-of-control people may
personal space; and second, it will provide time even try to barricade themselves in a room or a
to react if the individual begins to physically particular area.
act out. Remember, the amount of personal Protection officers need to be aware of the
space may vary according to the individual indistinct signs of physical acting out (violence).
and the situation. For example, if the person is Certain signs are likely to precede more com-
highly agitated, he or she may need more room bative behavior. Watch for indicators such as
and coming closer may intensify the crisis. By gritting teeth, closing and opening hands, and
contrast, a troubled person may want to have tensing. These are strong indicators of a possi-
other people closer; their presence may feel ble outbreak of physical aggression.
EMERGING TRENDS
Crisis intervention is becoming increasingly number of angry people in their environment.
important as we deal with an aging population They can blend customer service skills with cri-
and the widespread abuse of prescription medi- sis intervention. Such an approach is certainly
cine. There are also greater expectations for safe, cost-effective. It is also in keeping with an orga-
efficient, and effective management of aggressive nization’s mission and values. If each and every
behavior. Protection staff at health care facilities, employee is thoroughly indoctrinated with cus-
schools, treatment centers, and special events tomer service skills and attitudes, they will have
need to be particularly adept at handling a crisis. gone a long way toward managing crisis.
This requires practice, experience, and hands-on Another trend is a greater recognition of the
instruction. But such instruction can be preceded adverse effects that crisis may have on people.
by and reinforced by distance education. Reading Victims, witnesses, and protection staff are all
and observing video reenactments of crisis man- impacted emotionally by crisis. Post-traumatic
agement situations, as well as taking exams, is part stress disorder is a concern. So too are staff
of distance learning. Distance delivery is playing a depression and burnout due to continual expo-
key role in crisis intervention training. sure to crisis. Critical incident stress debriefing
One means of managing crisis and work- may be appropriate for the aftermath of a crisis.
place violence is to emphasize customer ser- Rotation of personnel away from constant expo-
vice. Organizations that do this can reduce the sure to violent people may be necessary.
employees, will have a stabilizing effect on the Discussing the matter with other team members
workplace. will help. Above all, avoid being discouraged
In a post-crisis intervention situation, the and maintain a positive attitude.
protection officer may experience anger, fear, Remember, when crisis intervention is
or frustration; this is a natural reaction that required, stay calm, be objective, and act appro-
must be controlled. It is not uncommon for priately. Let common sense prevail. Remember
the officer to feel that he/she has been the vic- the plan for success: EVALUATE, IMPLEMENT,
tim. This can result from a real or perceived DOCUMENT, and REVIEW.
lack of management support during and after
the crisis or being exposed to the crisis for a
prolonged period of time. Do everything pos- Resource
sible to resolve the crisis in an expeditious man- For more information, visit the Crisis Prevention Institute
ner. Getting it over as quickly as possible will (CPI) at www.crisisprevention.com. CPI is an inter-
reduce team frustration and apprehension. national training organization that specializes in the safe
The officer must waste no time in committing management of disruptive and assaultive behavior. CPI
has been in existence since 1980 and has trained over 5.5
thoughts to paper. By promptly composing a
million persons. The Institute offers a variety of courses
well-written report, the writer can vividly recall and instructor certifications. These programs are offered
what exactly has happened. Documenting the around the world. The Institute also has various forms
report will provide a vehicle to vent frustration. of instructional materials such as videos and posters.
26
Strikes, Lockouts, and Labor
Relations
David J. DeLong
305
306 26. STRIKES, LOCKOUTS, AND LABOR RELATIONS
agreement, a strike may commence after a at all times. An employee may want access to the
strike vote has been taken. Wages or certain property for a variety of reasons (e.g., employee
aspects of the collective agreement, such as has quit and wants to remove tools). Any visitors
health and safety, may not be satisfactory to who have authorization to access the property
members of the union, resulting in a strike. should be escorted by a protection officer from
3. Lockout—this type of work stoppage takes the property line to their contact on the property,
place in accordance with applicable laws and escorted off the property once business has
and the collective agreement in existence. been conducted.
Lockout refers to management’s refusal to
allow members of the bargaining union onto
3. Chain of Command
company property. The purpose of a lockout
by management is to put economic pressure The protection officer should be fully con-
on members of the union to cause a behavior versant with the chain of command in existence
change that members of the union are not during a strike. Normally, the site security super-
willing to accept. visor or the security chief will be responsible for
all security and fire watch responsibilities.
The protection officer should be familiar
with the company strike plan and manual in
place. The strike plan will highlight and pro- 4. Police Assistance
vide guidelines for the protection officer to fol- The security department should notify the
low. Normally, the strike plan is designed and police of the labor situation ahead of time, should
updated to eliminate problems that occur dur- a strike appear inevitable. Arrangements should
ing a strike and provide guidance for security be made for the police to be present at the picket
and management. line during shift changes to avoid problems.
The protection officer should be aware of the
following security procedures during or prior
to a strike, whether they are covered in a strike 5. Communications
manual or not: The main security gatehouse is normally des-
ignated as the command post because of its rapid
1. Access Control response capabilities. This command post is
occupied 24 hours a day by a protection officer.
Will locks be changed on all gates surround-
ing the property? How will premise access be
handled? Normally, the majority of company 6. Prestrike Vandalism
vehicles are left within the plant main gate. The
fewer the number of company vehicles crossing Employees may attempt to sabotage opera-
the picket line, the better. Nonunion employ- tions just prior to the strike commencing,
ees who travel to work should travel in a fleet especially if they know the company intends
and cross the picket line at the same time. Other to continue production. The protection officer
than those nonunion people working, who else must be especially alert on patrol rounds for
may desire access to the property? any indications of sabotage.
least an hour-by-hour basis. The following vital to the protection of company assets, espe-
should be documented: cially during a strike.
EMPLOYEE MISCONDUCT
AND DISHONESTY TYPES OF DISCIPLINE
There are many types of dishonesty and
employee misconduct at the workplace that 1. Verbal. This type of discipline is given by an
the protection officer should be involved immediate supervisor where normally there
in. The protection officer should be aware is no documentation of the conversation.
of these types of dishonesty and employee 2. Written warning. A formal warning is given
misconduct: by the immediate supervisor and placed in
the employee’s file as a record of discipline.
1. Employee theft 3. Suspension. This type of discipline is
2. Employee fraud—falsification of normally the first step toward discharge.
employment records, falsification of The time off provides the employee an
time cards and employee rebates, or opportunity to think about the infraction(s)
falsification of worker ’s compensation committed and whether the employee wishes
insurance claims to pursue employment with the company.
3. Sabotage 4. Demotion. This type of discipline is used
4. Conflict of interest—kickbacks, selling infrequently. An employee may be removed
information from the job for discipline reasons or because
5. Fighting, assault of physical or emotional difficulties in
6. Alcohol and drug use performing the job.
7. Insubordination 5. Termination or discharge. This type
8. Sleeping on the job of discipline is the most severe. Before
9. Safety violations terminating an employee, a company must
10. Leaving work early consider the following factors:
11. Horseplay
● Age of the employee
All of the above may merit some form of dis- ● Company seniority
cipline. The protection officer should be aware ● Marital status of the employee
of the variety of disciplinary actions available ● Previous work record of the employee
to his/her employer. with the company
27
Security Risk Management
Kevin E. Peterson
315
316 27. SECURITY RISK MANAGEMENT
The same can be said of fields such as sci- mentioned in an article by Diana Thompson, a
entific research and development and the well-respected consultant in organizational risk
application of new technologies. Almost any management based in Australia:
program or project decision in these areas can
have significant implications for the future—- To most businesses, the concept of risk manage-
including security and asset protection issues. ment is confined to financial aspects … but the risk
game is fast changing … [now] covering everything
As an example, consider the selection among from a computer meltdown to a terrorist attack.…
various ballistic missile defense technologies (Thompson, 2003)
for the United States. This is clearly an issue of
technology risk when comparing such diverse Today, risk management is a central concept in
options as ground-based interceptors, space- the fields of security, asset protection, and crime/
based interceptors, the airborne laser and loss prevention. Risk management principles are
seaborne platforms. Besides the obvious fac- used to help us conserve our limited resources
tors of cost, schedule, and performance, each of (in terms of time, effort, manpower, and money),
these approaches also has security implications. apply the right solutions in the right places, and
Think of how to go about developing a secu- keep up with changes in our operational environ-
rity approach to protect the people, equipment, ment. Plus, as shown in the quote above, it keeps
communications, and information associated us attuned to the broad array of threats that we
with each of these options. This will probably face in any type of organization.
show quite different security challenges and
recommendations for each platform.
Finally, the insurance industry is almost
entirely focused on the concept of “risk.” In fact, TWO KEY ELEMENTS:
one of the earliest uses of the term “risk man- ASSESSMENT AND MITIGATION
ager” is attributed to companies that recognized
the increasingly clear relationship between busi- The practice of security risk management
ness practices and insurance costs in the 1950s (SRM) begins with a thorough and well-
(Thompson, 2003). The role of risk management in thought-out risk assessment. Why? Because
the insurance industry is further illustrated by the we cannot begin to answer questions until we
fact that in 1975, the American Society of Insurance know what the questions are—or solve prob-
Management changed its name to the Risk & lems until we know what the problems are.
Insurance Management Society (RIMS) (Hampton, A good assessment process naturally leads
2007). Essentially, the insurance providers are tak- directly into a risk mitigation strategy. These
ing on (or accepting) a portion of their policy two key elements will be discussed further
holders’ risk for a fee (their premiums). As we in this chapter and are mentioned at various
will discuss later, insurance is the most common points throughout this book with respect to spe-
example of “risk transfer,” one of the five avenues cific protection applications.
of addressing security/asset protection risks. Note: The following material is extracted from
“Primer on Security Risk Management” and is used
with permission.
WHAT IS SECURITY RISK Whether in the public or private sector,
MANAGEMENT? and whether dealing with traditional or cyber
security (or both), asset protection practice is
So how do we (protection professionals) increasingly based on the principle of risk man-
fit into the picture of risk management? As agement. The concept is a perfect fit for the field
1
With the establishment of the Department of Homeland Security (DHS) within the U.S. government, the responsibilities of
the NIPC were redistributed between the DHS Information Analysis and Infrastructure Protection (IAIP) Directorate and
the FBI’s Cyber Division.
Assets. The first step in risk assessment approaches. Each approach has inherent pros
is identification and valuation of assets. As and cons.
Gardner asserts, “the first step in establish-
Qualitative analysis is any approach which does
ing [any] effective [asset protection] program not use numbers or numeric values to describe the
involves identifying the businesses’ assets” risk components. Generally, comparative terms such
(Gardner, 1995). Although this is a step that is as “critical,” “high,” “medium,” “low,” and “negligi-
frequently overlooked, no effective security ble” may be used to gauge the asset value and levels
of risk components and risk itself.
program can be implemented without a thor-
ough understanding (on the part of both the Quantitative analysis is any approach which uses
asset owner and the security professional) of numeric measures to describe the value of assets
what is being protected—or should be protected. or the level (severity or probability) of threats, vul-
nerabilities, impact, or loss events. It can vary from
All three types of assets—tangible, intangible,
simple scale ratings (e.g., 1 to 5) to sophisticated sta-
and mixed—should be considered and incor- tistical methods and mathematical formulas.
porated into the risk assessment process. Too
often, asset owners and security professionals Many executive decision makers prefer infor-
focus exclusively on tangible assets or those mation to be summarized in charts and graphs
which appear on the accountant’s balance which can display a great deal of data in a concise
sheet. manner. (One example is shown in Figure 27-2.)
Each component of the risk management pro- This is the strongest argument for using a quanti-
cess must be evaluated (gauged or rated) and tative approach. The other major advantage is the
this can be done either qualitatively or quanti- ability to automatically manipulate the data using
tatively. The value of assets is often expressed computer programs and algorithms. Qualitative
in dollar amounts, but assigning such a number methods, by contrast, are generally simpler and
is not always possible, particularly in the case quicker to use, and often provide results that are
of intangible and mixed assets. just as meaningful as numeric calculations.
This provides a natural lead into the debate Among the factors to consider in determin-
over qualitative versus quantitative assessment ing asset value are immediate response and
(less conventional and more difficult to define) shutdowns, productivity disruptions, and envi-
nature of modern-day threats. ronmental effects (e.g., smoke, debris, water, or
In most cases, adversaries can be judged chemical runoff, etc.).
according to their capabilities to cause a loss Inadvertent threats are the most difficult to pre-
event (or attack) and their intentions to do so. dict and prepare for. Although, to some degree,
Among the sources of information on adver- the nature of the workforce, operations, or other
sary capabilities and intentions are past history, environmental factors can influence the level of
organization rhetoric, public pronouncements, the inadvertent threat, there is usually little or
other open sources, internal communications no historical data to use for planning purposes.
(newsletters, websites, etc.), law enforcement The best defenses are preparation, education and
reports, automated databases, and threat assess- awareness, and realization that the threat exists.
ment professionals. Vulnerability. The most common view of
Natural Threats—Rather than adversary “vulnerability” is a security weakness or prob-
capabilities and intentions, natural threats are lem. Although this can be the case, we must also
typically evaluated using historical trends and recognize that some vulnerabilities are simply
statistics. Long-term data is generally collected existing conditions or business practices which
on weather and other natural hazards for spe- support mission accomplishment. For example,
cific geographical areas, terrains, and environ- engaging in sales by e-commerce can be viewed
ments. In some cases, data has been assembled as a vulnerability, but it may also be an essen-
on natural hazard effects for particular industry tial way of conducting business for a particular
sectors or facility types. Although this data pro- company. One concise definition of “vulnerabil-
vides extremely useful planning information, ity” is “a weakness or organizational practice
assessors must recognize that the unexpected that may facilitate or allow a threat to be imple-
can, and usually does, occur. Therefore, compre- mented or increase the magnitude of a loss
hensive contingency planning and at least some event” (ASIS International, 2007, p. 8).
degree of all-hazard preparedness are strongly One important difference between a threat
recommended by most professionals. and a vulnerability is that a vulnerability is a
Inadvertent Threats—Perhaps the most characteristic of the organization or facility. As
overlooked or neglected threats are inadver- such, it is generally something over which the
tent threats. These include accidents, errors, organization can exercise at least some degree
and omissions. Security expert and author Ira of control. Threats, by contrast, are usually out-
Winkler put it best when he wrote that “… the side the control of the organization.
biggest threat to U.S. corporations is human Vulnerabilities can be evaluated in different
error” and “People make mistakes, and those ways, but one common approach is to measure
mistakes are the most likely things to hurt you” them in terms of observability and exploitability.
(Winkler, 1997, p. 39).
Another key consideration—which is a sub- ● Observability is the ability of an adversary to
set of the inadvertent threat—is that of periph- see and identify a vulnerability. For example,
eral threats—for example, a threat that is a hole in a chain-link perimeter fence is
targeted at a neighboring facility but that may likely observable by a potential adversary,
have a major impact on the post operation. The whereas an inoperable CCTV (Closed-Circuit
effects of peripheral threats can include utility Television) camera is not.
interruptions, required evacuations, closure of ● Exploitability is the ability of the adversary to
access routes to the facility, unwanted attention take advantage of the vulnerability once they
or traffic at the facility, full or partial operation become aware of it.
a “scatter chart.” Conceptually, any organiza- level, etc.) can easily move some risks from one
tion must consider the question of likelihood ver- quadrant to another. For this reason, security
sus consequence (impact) for their relevant risk and management officials must periodically
or potential loss events. Figure 27-3 illustrates review the risk posture as well as operational
this issue by way of four quadrants. and administrative changes that may influence
Logically, a risk (potential loss event) located the “likelihood versus consequence” equation.
in Quadrant 1 would require the most urgent The likelihood versus consequence scatter
attention and resource allocation. These risks chart technique may be used in combination
have a high likelihood of occurring and, if with a traditional risk analysis method. This
they do, will have significant consequences or often provides a more comprehensive and accu-
impact on the organization. The consequences rate picture of the risk environment (and con-
may be in the form of increased operating costs, tributing factors) than the use of one method
damage to reputation/public trust, decreased alone.
safety or efficiency, loss of personnel resources, Risk management is a cyclical process—one
loss of, or damage to, facilities/equipment, or that must regularly evaluate changes in assets,
loss of critical information. threats, vulnerabilities, and loss event impact.
The priority of addressing risks will gener- These factors are in constant flux and must be
ally decrease with each successive quadrant. deliberately and carefully monitored to ensure
Many organizations, however, neglect the fact that the asset protection strategy and its compo-
that Quadrant 2 warrants significant atten- nents remain both effective and efficient.
tion. Risks which lie in this quadrant have Following a thorough risk analysis, the
a low-to-moderate likelihood of occurrence, next step is to recommend a suite of solutions
but a high consequence of impact if they do or “mitigation measures” to address the risks
occur. Examples of risks that typically fall into that have been identified and prioritized. By
Quadrant 2 are dramatic workplace violence “suite,” we mean a series of measures that work
incidents and terrorist attacks. together and comprise elements of a deliberate
Risks that fall into Quadrants 3 and 4 should plan—or a “mitigation strategy.”
not be automatically discounted. Various events
(reorganization, expansion, adding new mis-
sions, change in neighbors, change in threat THE FOUNDATION OF A
MITIGATION STRATEGY
HIGH Taking a truly strategic approach helps avoid
major mistakes such as knee-jerk reactions to
2 1
incidents/events, introducing inefficiencies,
CONSEQUENCE OF over-relying on vendors or salespeople for solu-
A LOSS EVENT
tions, and serious resource misallocations. Any
risk mitigation strategy should consider three
4 3 underlying or foundational concepts: the five
avenues to address risk, the “Four D’s,” and lay-
LOW
ered security (defense in depth). The best and
LOW HIGH most effective protection programs are based
LIKELIHOOD OF A LOSS EVENT on strategies that integrate the philosophies
FIGURE 27-3 Likelihood versus consequence consi- embodied in all three of these foundational
derations. concepts.
Layered security
(Defense in depth)
DELAY
YES
RISK NO
AVOIDANCE RISK
NO
RISK TRANSFER
FIGURE 27-5 Five avenues to address risk. (© 2006 Innovative Protection Solutions LLC)
3
“Accreditation is a process whereby a Designated Approval Authority (DAA) or other authorizing management official
authorizes an IT system to operate for a specific purpose using a defined set of safeguards at an acceptable level of risk”
(National Institute of Standards and Technology, 2002, p. D-1).
In short, asset protection should involve a and organization being protected. There are
comprehensive strategy, not a combination of important factors that affect how protection
piecemeal elements (officers, CCTV, access con- measures will be implemented, how well they
trol systems, etc.). Developing such strategies, will be accepted, and how effective they will
particularly in today’s complex global environ- be. Even within subsets of industry sectors, fine
ment, requires both broad expertise and a very distinctions exist that can significantly impact
thorough thought process based on underlying the effectiveness of protection strategies and
concepts such as those described above. individual protection measures. For example,
there are very significant differences between a
worldwide intermodal cargo shipping firm and
MITIGATION MEASURES an urban subway system, even though both are
components of the transportation industry.
A comprehensive strategy incorporates all
Different industry sectors and subsectors
aspects of protective measures that are appro-
are subject to different risks in terms of the
priate to the environment based on its mission,
type, extent, and nature and may view the risks
nature, physical attributes, and risk assessment
themselves, as well as recommended mitigation
results. As mentioned, these should be viewed
strategies, very differently. In addition, factors
as part of a suite of solutions. Among the fami-
such as the type of people who are employed,
lies of measures to be considered are:
the nature of the work, working hours, type of
● Physical security (barriers, locks, access facility, location, and even management style
control, etc.) may affect the way protection measures work—
● Electronic security systems or even if they will work.
● Security officers In today’s global environment, we also need
● Policy and procedure/business practices to consider how the components of our mitiga-
● Employee training and awareness tion strategy will operate in countries around
● Layout, design, and architecture the world where our organization may have
● CPTED (Crime prevention through facilities, people, joint ventures, or partner firms.
environmental design) Laws, language, culture, treaties, and interna-
● Contracts and clauses tional agreements all impact relevant aspects of
● Legal and financial posturing the threat as well as the applicability of security
● Insurance measures and other risk management tools.
● Personnel security
● Technical security (IT and non-IT)
● Travel security THE ROLE OF THE PROFESSIONAL
● Liaison and relationships PROTECTION OFFICER
● Business continuity and crisis preparedness
According to Karim Vellani, a well-respected
(end of extract from “Primer on Security Risk
professional security consultant and author,
Management”)
“risk is the most significant factor that drives
the deployment and redeployment of security
TAILORING A PROGRAM TO THE forces” (Vellani, 2007, p. 234). This statement
SETTING AND ENVIRONMENT seems simple, but is very profound. It attests
to the extremely significant role of security risk
Any risk-mitigation strategy should be tai- management as well as its direct application
lored to the specific industry setting, location, to professional security services and security
EMERGING TRENDS
The practice of security risk management is previous work done primarily in Australia and
being increasingly formalized here and around the Great Britain.
world. Examples of this include various protocols Other standards being developed include an
established by the U.S. Department of Homeland All Hazards Risk Management Standard and a
Security (DHS) in the wake of the September first-ever ANSI (American National Standards
11, 2001, terrorist attacks, and additional work Institute) Standard on Organizational Resilience.
performed by the Department of Energy. These Although there is a lot of work going on
protocols have been expanded and adapted to around the world—and being applied to many
specific elements of our critical infrastructure such different environments, all of the guidelines, pro-
as chemical plants and water supplies. tocols and standards are closely aligned with the
On a global scale, international standards basic security risk management model presented
are focusing more and more on security prac- in this chapter. Risk management principles will
tices and taking a risk management approach. become even more important in the future as
One example is ISO 27005 (2008), an interna- the threats we face are increasingly ambiguous,
tional standard for Information Security Risk while at the same time security resources (such
Management. This standard is based largely on as budgets and manpower) continue to be tight.
risk mitigation strategy should be 10. Service providers should not base their
based? core business model on risk management
a. The five avenues to address risk principles.
b. The “Four D’s” a. True
c. Layered security b. False
d. Quantitative analysis
9. Risk management is a critical process that
touches every aspect of organizational
asset protection—and the activities of the
professional protection officer.
a. True
b. False
28
Emergency Planning
Ernest G. Vendrell and Scott A. Watson
331
332 28. EMERGENCY PLANNING
6. Power Outages: All organizations have taking place, they are typically the first person-
power necessities and all organizations nel to arrive on the scene. These first several
eventually experience a power outage. minutes constitute a critically important window
When the power goes out, lights, machinery, of opportunity. Professional, quick, and decisive
and HVAC systems all come to a halt. The action on the part of the protection officer can
professional protection officer must be contain the situation, ensure that people are safe,
prepared to deal with safety issues that and mitigate damage to organizational assets
arise as a result of a power outage. Many by taking required initial steps. Although often
organizations have emergency batteries unnoticed by the public, the actions of profes-
and generator back-ups. The professional sional protection officers save lives and property
protection officer should be familiar with on a regular basis. Here are just a few examples
how these systems operate.
7. Disasters: Disasters, whether natural
or technological, pose a threat to all
organizations. Natural disasters include 1. Active Shooter: On June 10, 2009, an 88-year-
such events such as a tornado, or hurricane, old white supremacist entered the Holocaust
blizzard, wildfire, earthquake, flood, tidal Memorial Museum, in Washington, DC, with a
wave, and a host of other naturally occurring .22-caliber rifle and immediately began firing.
phenomena. Technological disasters include One of the gunman’s rounds killed Security
such events as explosions, collapses, HAZMAT Officer Stephen T. Johns. Johns’s fellow
incidents, and industrial fires. The professional officers engaged and killed the gunman, thus
protection officer should be familiar with the preventing a mass shooting in a crowded
potential impacts of natural and technological museum. Such readiness can only be achieved
disasters and how those disasters may impact by thorough planning and a continual
the organization they serve. commitment to training (Stout, 2009).
8. Terrorist Actions: Terrorist acts can include 2. Natural Disaster: Hurricane Katrina’s high
bombings, armed assaults, kidnapping, winds and storm surge made landfall on
sabotage, hostage-taking, and a host of other August 29, 2005, overwhelming New Orleans
serious incidents. While the probability that an and much of the rest of the Gulf Coast.
act of terrorism will occur at a given site on any Homes and businesses were destroyed by the
given day is low, the impact of such actions can high winds and flooding, and power outages
have serious and long-lasting consequences on became widespread, leaving much of the
people, organizations, and communities. The area in darkness. In this chaotic environment,
professional protection officer should take the order broke down in many places as the
time to become familiar with terrorism and public authorities were stretched thin.
terrorist groups, their tactics, goals, and, most Protection officers from a wide variety of
important, preincident indicators (red flags) of organizations helped people impacted by the
potential terrorist actions. storm and its aftermath, protected property,
and assisted public authorities. The provision
for additional protective personnel is a key
Case Studies element in planning for emergencies. In the
The professional protection officer is in a case of Hurricane Katrina, the supply of
unique position to respond to emergency situ- these additional resources was outpaced by
ations. Since the protection officer is usually the demand (Washington Times, 2005).
stationed at the facility where the emergency is
3. Civil Disobedience: A financial firm was called for assistance over his radio and
targeted for a large-scale protest by an then proceeded to follow the emergency
environmental group. The environmental procedures outlined in the organization’s
group objected to investments the firm response protocols. The protection officer
made in a company that was engaged in took highly absorbent material from a
construction projects in an ecologically nearby crash cart and began to divert the
pristine area. The financial firm became water away from the computer room. In
aware of the date and time of the planned the interim, the command center officer
protests and quickly deployed additional dispatched additional help to the scene, sent
protective personnel. On the day of the out an emergency notice, set up a conference
protests, members of the environmental bridge for the crisis team, and contacted a
group attempted to enter one of the firm’s preselected vendor to respond to assist with
buildings and handcuff themselves to a the cleanup. As a result of these quick actions,
stationary object located just inside the main the computer room suffered minimal damage
entrance. Protection officers successfully kept and the organization was able to maintain its
the protesters from entering the building. operations without disruption.
Additional preplanning also allowed the
firm’s public relations personnel to have
statements already prepared for the media.
Had the protesters succeeded in handcuffing These and many other types of emergency sit-
themselves inside the building, operations uations can happen to any organization, at any
could have been impacted and the media time. The professional protection officer must
attention to the event would certainly have be prepared to respond to such events in accor-
been greater. dance with his or her organizational protocols,
4. Medical Emergency: Protection officers in training, and, most important, good judgment.
a large high-rise building were called to the
scene of a collapsed individual. Upon arrival,
SCOPE OF THE PROBLEM
the protection officers, who were trained
as emergency medical technicians, checked
Over the years, limited research has been con-
the scene to ensure that it was safe to enter
ducted with respect to emergency preparedness
and then began to assess the situation. The
in the private sector (Tierney, Lindell, & Perry,
patient was found to have stopped breathing
2001). The research that does exist indicates
and had no pulse. Utilizing an automatic
that many private sector organizations have
external defibrillator (AED), the protection
not been proactive in this critical arena (Tierney
officers were able to revive and stabilize the
et al., 2001). This is unfortunate, since not hav-
patient until emergency medical services
ing an effective plan in place can ultimately
personnel arrived on scene and transported
lead to a variety of negative consequences rang-
the patient to a nearby hospital.
ing from adverse publicity to significant operat-
5. Flood: A protection officer on routine patrol
ing losses, as well as loss of life. Viewed from a
at his facility discovered a major water
homeland security perspective, this is troubling,
leakage that was spilling into a hallway
considering that approximately 85% of the criti-
located just outside of a critical computer
cal infrastructure in the U.S. is owned by the
room. The protection officer immediately
private sector (Bennett, 2007; Bullock et al.,
2006; Purpura, 2007). Fortunately, the private
Hazard: A sure of danger that may or may not lead to an emergency or disaster
Impact: The consequences an event has on people, property, operations, and communities
Disaster: An event that demands substantial response capability beyond the scope of normal operations
FIGURE 28-3 Key terms and acronyms in emergency management. (Adapted from Haddow et al., 2008)
● Hazard Identification, Risk Assessment, resources and 5 indicating strong resources). Next,
and Impact Analysis you would total the score for each potential emer-
● Hazard Mitigation gency, taking into consideration that the lower the
● Mutual Aid score, the better. Although somewhat subjective,
● Planning the comparison will be of significant assistance
● Training in determining planning priorities. The following
● Logistics and Facilities example helps to illustrate the process (Table 28-1)
(FEMA, 2007):
Liaison Officer
Finance/
Operations Planning Logistics
Administration
● Safety Officer: Monitors operations and 11, 2001, and Hurricane Katrina in 2005, high-
advises the IC on all matters related to lighted the need for a comprehensive national
safety. approach to incident management. The National
● Liaison Officer: Is the IC’s point of Incident Management System (NIMS) provides
contact with representatives of other a systematic, proactive, all-hazards approach
organizations. that guides all levels of government, nongov-
● Operations: Responsible for directing and ernment organizations, and the private sector
coordinating all tactical operations to meet to work together to respond to, and manage,
incident objectives. incidents of all sizes and complexity. NIMS is
● Planning: Responsible for all incident- a template that works well with the National
related data (gathering and analyzing) as Response Framework (NRF), which provides
well as the status of all available resources. the structure for national-level policy for inci-
● Logistics: Responsible for providing the dent management (FEMA, 2005).
necessary support (facilities, services, and Clearly, as we have seen over the years,
materials) to meet all needs for the incident the private sector plays a vital role in incident
or situation. response. For this reason, the private sector
● Finance: Responsible for on-site financial should be incorporated into all facets of NIMS,
and administrative management, including and should prepare for all-hazards incidents
monitoring and documenting all costs that may affect their ability to operate. This is
related to the incident. This is especially particularly important for private sector organi-
important for reimbursement by the federal zations that are part of the critical infrastructure,
government when there is a Presidential or those that have a role in emergency response.
Disaster Declaration. Moreover, those private sector organizations that
play a role in emergency response are encour-
It is important for protection officers to under-
aged to become NIMS-compliant through vari-
stand how ICS works for several reasons. First,
ous training programs offered by FEMA (2005).
it is a relatively simple on-scene management
It should also be noted that ICS is an integral
tool that has proven effective in a variety of set-
part of NIMS. This is another reason why pri-
tings over the years, including the private sec-
vate sector organizations and protection officers
tor. Second, any time there is a serious incident
may wish to have a thorough understanding of
that requires public safety personnel from any
ICS and be able to apply the concepts readily in
level of government to respond, they will likely
the event of a serious incident that will require
be using ICS. Consequently, understanding ICS,
a multi-agency response.
and being able to seamlessly fit into this man-
agement system in an effort to solving problems,
would be advantageous for all of the entities
involved in the incident. Emergency Operations Centers
An Emergency Operations Center (EOC)
The National Incident Management serves as a centralized area for the management
of emergency operations. The EOC is where
System (NIMS)
decisions are made by the emergency manage-
In recent years, the United States has been ment team based on information provided by
impacted by a number of devastating disasters. emergency responders and other personnel
In particular, the terrorist attacks of September (FEMA, 2007).
usually this tactic raises additional questions in order to provide accurate and timely infor-
(Gardner, 1997). mation while safeguarding the reputation and
FEMA (2007, p. 41) provides a number of interests of the organization.
important considerations for dealing with the
media in an emergency:
DEVELOPING THE EMERGENCY
● Designate a trained spokesperson and an RESPONSE PLAN
alternate spokesperson
● Set up a media briefing area The development of a comprehensive emer-
● Establish security procedures gency management plan requires considerable
● Establish procedures for ensuring that time and effort, and sufficient time should be
information is complete, accurate, and provided for its completion. Representatives
approved for public release from key organizational units must be involved
● Determine an appropriate and useful way of from its inception, and upper management sup-
communicating technical information port is essential throughout the entire process.
● Prepare background information about the Typically, this can be readily accomplished by
facility having the chief executive officer or facility
manager issue a mission statement that intro-
FEMA (2007, p. 41) also provides the follow-
duces the emergency management plan, its
ing guidelines when providing information to
purpose and importance to the organization,
the media during an emergency:
and defines the structure and authority of the
Dos planning team. Additionally, it is important, in
the initial planning stages, to select an individ-
● Give all media access to the information ual within the organization to assume responsi-
● When appropriate, conduct press briefings bility for the plan and act as the planning team
and interviews. Give local and national leader or coordinator.
media equal time Ultimately, capabilities and hazards should be
● Try to observe media deadlines analyzed, specific roles and responsibilities should
● Escort media representative to ensure safety be carefully outlined, and critical company prod-
● Keep records of information released ucts and services should be identified in order to
● Provide press releases when possible ensure a coordinated and effective response when
a critical incident does occur. This will typically
Don’ts involve meeting with outside groups, and estab-
● Do not speculate about the incident lishing mutual aid agreements where appropriate.
● Do not permit unauthorized personnel to According to Canton (2007), resource management
release information under NFPA 1600 is broad in scope, enabling orga-
● Do not cover up facts or mislead the media nizations to establish a baseline and determine
● Do not put blame on the incident where they are deficient. Organizations can then
make plans to meet these shortfalls through pro-
It is quite evident that, although safety issues
curement or establishing mutual aid agreements
are always a top consideration, an organization
with outside groups or agencies.
cannot overlook the importance of having an
Some outside groups or agencies could
effective crisis media relations plan in place and
include (per FEMA, 2007):
training protection officers with respect to their
roles. This is critical, since the plan must be ● Local police department
implemented quickly during a critical incident ● Local fire department
EMERGING TRENDS
Conducting Exercises in Difficult In these challenging economic times, some
Economic Times or with the organizations have taken to developing board
Reluctant Organization games or other simple means of conducting a
table-top exercise. When designing an exercise,
The only way to truly tell if a plan is effec- it is important to keep in mind that adult learn-
tive is to either experience an actual incident or ers are generally focused on how they can read-
to conduct an exercise. While most organizations ily apply the information to their organizations.
understand the need to exercise plans, too few Therefore, interactivity and application should
actually take the time and money necessary to be the touchstones of any such exercise plan. The
accomplish this task. This tendency not to con- use of board games and other low-cost simula-
duct exercises is even more pronounced during tions can help organizations that would nor-
difficult economic periods and with organiza- mally not engage in an exercise to start thinking
tions that haven’t completely adopted resiliency seriously about the risk their organizations face
concepts into their corporate culture. and whether their plans are up to the task.
Resource
approach that can be used for all types of
Broder, J. F. (2006). Risk analysis and the security survey incidents regardless of size.
(3rd ed.). Burlington, MA: Butterworth-Heinemann.
a. True
b. False
6. The ICS structure is built around five major
management activities of functions. Which of
S EC U RI T Y QU IZ the following is not one of these functions:
1. Regardless of the type of crisis, there is a a. Operations
series of common requirements that must be b. Planning
taken into account for an organization to be c. Safety
successful when a critical incident occurs. d. Logistics
These include all the following except: 7. The National Incident Management System
a. Assessing threat (NIMS) provides a systematic, proactive,
b. Selecting crisis team personnel all-hazards approach that guides all levels of
c. Training crisis team personnel government, non-governmental organizations,
d. Being willing to spend lots of money on a and the private sector to work together to
solution respond to and manage incidents of all sizes.
2. Observing which of the following guidelines a. True
increases the chances that emergency plans b. False
will be more effective and efficient: 8. Effective crisis media communications steps
a. Promote multi-organization response that organizations should consider include
b. Allow resistance to the planning process all the following except:
c. Separate emergency response from a. Have a media plan
disaster recovery b. Build a relationship with media before a
d. None of the above crisis
3. The National Fire Protection Association c. Develop strict restrictions on what media
(NFPA) standard 1600 sets criteria for can do on your property
both developing and evaluating existing d. Train employees on communications with
emergency management programs. the media
a. True 9. An emergency response plan will work
b. False regardless of any realistic training prior to
4. The Incident Command System (ICS) the implementation in an actual emergency.
identified common concepts that form the a. True
basis for the control and management of b. False
emergencies. Which of the following is not 10. In addition to a yearly audit of the
one of those concepts: emergency plan, that plan should be
a. Control evaluated and modified, if necessary, at all of
b. Communications the following times except:
c. Concentricity a. When there has been a change in personnel
d. Cooperation b. When the layout or design of a facility
5. The National Response Framework (NRF) changes
established an on-scene management system c. When there is a change in policies and
that would help responding agencies work procedures
together using a coordinated and systematic d. None of the above
29
Terrorism
Robert Metscher
The world is experiencing a new era of Defining any term is essential to reach an
terrorism. We will likely hear similar words in objective understanding. Without a common def-
the decades to come as well. Terrorism is cer- inition, the term is defined by individual bias and
tainly not new, and even the techniques are opinion. Consider that there is no one common
not especially different. What has changed is definition of terrorism today. This creates consid-
the publicity, awareness, and the realization that erable difficulty in developing policies to manage
terrorism, international and domestic, affects a very real problem. Merriam-Webster defines
everyone. A determined foe, given sufficient “terror” as a state of intense fear. In turn, “fear”
resources, will find the weakness in any defense. is defined by Merriam-Webster as an unpleas-
The terrorist attacks of September 11, 2001, opened ant, often strong emotion caused by anticipation
an otherwise unaware population’s eyes to the or awareness of danger. It might appear that ter-
fallibility of their nation’s armor. This cycle has rorism is the cause of an unpleasant emotion
349
350 29. TERRORISM
anticipating danger. Clearly this is too broad in the pursuit of goals that are generally
and vague to be useful. Historically, the term political, religious, or ideological.
“terrorist” can be traced to 1795 and the treat-
Federal Bureau of Investigation (1999, p. i)
ment by the French revolutionary government
[T]he unlawful use of force and violence
of its own citizens (Williams & Head, 2006).
against persons or property to intimidate
Operational tactics, that we might consider ter-
or coerce a government, the civilian
rorism today, can be found much farther back
population, or any segment thereof,
with the Zealots as early as 30 BC. Zealots used
in furtherance of political or social
violence and intimidation to forward their
objectives.
agenda of resisting the Roman occupation of
Israel. U.S. State Department (2003, p. xii)
The term “terrorism”, however, has been [P]remeditated, politically motivated
defined in many ways over the decades. The violence perpetrated against
mere mention of the word terrorism today has noncombatant targets by subnational
the ability to affect the perception of nearly any groups or clandestine agents, usually
issue. The use, and overuse, of any term also intended to influence an audience.
tends to obscure its definition. The end result
is a term that everyone believes they under- Each of these definitions revolves around the
stand but no one agrees upon one definition. use of unlawful violence to forward an agenda.
To paraphrase Associate Justice Stewart of the As the term has gained more popular use, addi-
U.S. Supreme Court in his discussion of por- tional terms have been introduced. Other, newer,
nography, “I’ll know it when I see it,” may also activities that have been included under the
be the most accurate way to describe terrorism umbrella of terrorism do not require violence in
today. Unfortunately, such a subjective method the traditional sense of the term (that is, a defi-
of defining any issue allows for misinterpreta- nition of violence requiring the use of physical
tions, distortions, confusion, and finally a term force). Agro-terrorism attacks on the agricultural
with little value beyond emotional appeal. capabilities of a society could either poison a
Recognizing the disparate definitions that exist, population or significantly disrupt their ability
as well as popular public application of the to provide sufficient foodstuffs to the popula-
term, permits the security professional to avoid tion. Cyber-terrorism attacks disrupt the infor-
potential pitfalls while advising organizational mation technology infrastructure of a society
management. causing essential services to fail. Bio-terrorism
The dilemma of finding a common definition attacks introduce viruses or bacterial agents into
is conveniently illustrated by the U.S. govern- an unprepared population causing a widespread
ment. The United Nations has had tremendous health crisis. None of these attacks necessarily
difficulty in producing a definition of terrorism requires an overtly violent act to initiate them.
for fear of inadvertently excluding legitimate There can be little doubt that an action using
efforts at self-determination within nations. these “non-violent” techniques still inflict, and
Multiple agencies have each presented their are intended to inflict, significant harm on the
own definitions within their literature: target population.
In his 2002 article, “Terrorism: Notes Toward
U.S. Department of Defense (2001) a Definition,” published in Slate Magazine,
The calculated use of unlawful violence Christopher Hitchens simplified the definition of
to inculcate fear, intended to coerce or terrorism to “the tactic of demanding the impos-
to intimidate governments or societies sible, and demanding it at gunpoint.” And in
be of little importance whether an attack comes smaller group against a much larger group that
from a determined and skilled criminal or a is often entrenched in legitimacy, as a society or
terrorist organization. With the exception of a subset of a society. For instance, the Weather
any press coverage, identical attacks will cause Underground in the United States focused on
comparable losses. This is not to say that under- driving a socialist revolution and targeting insti-
standing terrorism is of no small significance. tutions of perceived oppression (FBI, 1976) –
A lack of understanding could result in failing American society as everyone knew it. In contrast,
to accurately identify and address all potential the Animal Liberation Front targets only those
threats against an organization. they perceive as exploiting animals (ALF, 2009) – a
Furthermore, the definition of a terrorist and subset of society. Instead of open warfare against
of what constitutes terrorism will likely change the military forces of a nation, a terrorist uses their
through time. ability to move among the target population to
create a situation in which confusion and uncer-
tainty will drive fearful action. It is this fearful
WHY VIOLENCE? WHY THEY action that ultimately accomplishes the terrorist’s
DO WHAT THEY DO goal. This goal is distrust in the security apparatus
of their government and a corresponding willing-
Why threats and acts of violence? What ness to acquiesce to the terrorist’s demands.
causes an individual or group to embrace these In its modern sense, terrorism has been argued
tactics? More than one reason exists to explain to have such root causes as poverty, social injus-
why any specific act of terrorism or a series tice, political exclusion, and violent oppression.
of actions may be undertaken. An individual Amy Zalman, PhD, a Middle East advisor and
act may be expected to bring about a specific consultant, sums up two causes for terrorism:
change, such as meeting a demand or making
a particular change in public behavior. This
● Social and political injustice: People choose
act may be in concert with other acts that have terrorism when they are trying to right
slightly different goals. Some goals of specific what they perceive to be a social, political,
terrorist actions within terrorism campaigns, or or historical wrong – when they have been
for entire campaigns, include: stripped of their land or rights, or denied these.
● The belief that violence or its threat will be
● Bringing publicity to a plight or cause. effective, and usher in change. Another way
● Inciting retaliation to justify further actions of saying this is the belief that violent means
or encourage popular support. justifies the ends. Many terrorists in history
● Moving the middle of acceptable behaviors. said sincerely that they chose violence after
● Changing public perception of acceptable long deliberation, because they felt they had
activities. no choice.
● Creating a gradual change in public view of
a cause. In his paper “Understanding and Combating
● Injuring the opponent (Keet, 2003). Terrorism,” Major S. M. Grass of the U.S. Marine
Corp refers to Ernest Evans, a research associate
The value of terrorism comes from the fear at the Brookings Institution, who suggests that
generated by the realization that nearly any there are five specific goals of terrorism. These
member of the target population could have goals are:
been a victim—and could be a victim in a subse-
quent attack. Terrorism is a form of asymmetric 1. To publicize a cause on a regional and
warfare, of guerilla warfare, in that it pits a international level.
or used across many targets. Greater resources Understanding the organizational structure
also enable the organizations to provide train- of a terrorist organization provides guidance
ing, conduct complex mass communication and on tactics for disrupting their operations. At the
marketing efforts, and coordinate the activities tactical level, such organizational aspects have
of multiple cells. Terrorist groups may be orga- less importance when attempting to identify
nized in many different ways, much like any or disrupt an attack. However, understand-
organization. Some may have a clear pyramid ing the wide range of organizational structures
with a strong centralized authority and multiple offers the security officer possible insight into
layers over a large base of supporters. Within the funding of a potential foe and ultimately
such a structure the central leadership would their ability to engage in complex and resource-
exercise strict authority over giving orders and intensive activities.
confirming logistical resources. Others, may
be structured as an umbrella with several self-
contained, and somewhat autonomous, groups
TARGET SELECTION
under an overarching organization. Each of
AND ATTACKS
these larger organizations is able to effectively
employ tactics that have planned losses, with-
With the knowledge that terrorism is a largely
out bringing an end to their cause. For instance,
theatrical activity to affect a wider audience, it is
a “suicide bomber,” where the individual car-
less difficult to recognize why specific targets are
ries or wears the bomb to the target and deto-
selected. Returning to the five goals of terrorism:
nates it intentionally, would bring a premature
publicity, harassment and intimidation, societal
end to the cause of a lone wolf. Such tactics
polarization, aggravating political relations, and
involving the sacrifice of individuals necessitate
freeing political prisoners/securing monetary
a larger organization to carry on the efforts after
ransoms, it is possible to ask important questions
the attackers die.
of potential targets. Consider whether an attack
With the easy communications offered by the
on the target, such as a person, place, event, or
Internet, it is possible to form virtual groups with
object, could further one or more of these goals.
members who never meet each other in the phys-
Further criteria and tools should also be used in
ical world. Such groups would most likely be
this evaluation process.
found involved in cyberspace attacks, but could
The CARVER model of target selection offers
certainly use cyberspace to coordinate attacks in
a useful tool for considering a target. While
the physical world. A demonstration of how such
CARVER methodology is just one tool, it offers
a cell might operate was offered by Dr. Dwight
value because the factors may be considered
Toavs at the 2008 Director of National Intelligence
from both an offensive and a defensive point
Open Source Conference in Washington, DC
of view. The components (presented from an
(Shachtman, 2008). In the presentation, he demon-
aggressor’s point of view) include:
strated a fictitious online conversation to coordi-
nate an attack on the White House using a World Criticality – How critical is this target to the
of Warcraft map as an overlay to the Washington, operations of the opponent?
DC map. These cyber worlds offer a convenient Accessibility – How easy or difficult is it to
medium for discussing, in “game code” no less, gain access to and egress from the target?
an upcoming operation. Consequently, it is now Recuperability (recovery of operations and
possible to coordinate an operation with complex response) – How quickly can the opponent
logistical needs and multiple cells with little fear recover from the attack? How quickly can
of detection. they mount an effective response?
when coping with terrorism. It is a somewhat identify new threats early, keep constituents and
dated concept to consider the property line as organizational leaders informed, as well as rec-
the first line of defense. While it is most likely ommend and implement sound countermeasures
the first place for which a security professional is to mitigate an attack.
able to establish protective tools, there is certainly The security professional must consider the
more that can be done. As noted above, there are threat environment surrounding their organiza-
at least two instances prior to an attack when tion. Who or what is likely to cause harm, inter-
surveillance is conducted. This typically involves rupt operations, or damage the organization’s
being within relatively close proximity to a facil- reputation? Monitoring known threats, and seek-
ity and likely accessing it as well. The purpose ing to identify new ones early, offers an advan-
for the reconnaissance is to determine suitability tage. Formal threat assessments are certainly
of the target—this offers yet another opportunity important; however, regular monitoring of the
for discouraging the attack. Furthermore, sig- environment offers the opportunity to identify
nificant attacks often cause damage to property potential problems earlier. Whether this involves
surrounding the target. Being located next to a automated online searches, active monitoring
government office, pharmaceutical company, or of Web sites and discussion groups, or walking
religious organization may seem harmless from around and speaking with the organization’s
one day to the next. This close proximity could neighbors, early detection is valuable. It is often
be the only reason for damage from an attack. after a successful attack that individuals come for-
Consequently, on many levels we share the same ward to report their observation of “odd behav-
threats as our neighbors. The daily role of a secu- ior.” Security professionals frequently argue the
rity professional managing the threat of terrorism importance and value of awareness programs.
requires awareness of the nature of the threat; This is an example of the professional heeding
vigilance toward the known threats, the desire to their own advice.
EMERGING TRENDS
infrastructure also creates vulnerabilities to elec-
“Emerging Trends—Terrorism”
tric grids, power generation stations, water sani-
Throughout history, terrorism has been an tation systems, bridge operations, and such. The
evolving concept. Some tactics are tried and largest difference between a physical and virtual
true and will likely be used well into the future. attack is the necessary location of the attacker. A
Newer tactics are evolving today using our physical attack requires the attacker to be pres-
improved communications networks and easier ent, but a virtual attack can be conducted from
access to other technologies. The deplorable potentially anywhere on a network. If that net-
events committed by Al-Qaeda in the past decade work is connected to the Internet, then the
show a desire to capitalize on greater casualties attacker can literally be anywhere in the world.
and more dramatic events. With the increased Attacks by nuclear means and radiological
availability of nuclear, biological, and chemical materials have the potential for casualties far
substances it is likely that these will be part of beyond the immediate attack location and to
future attack plans. The increase in networked deprive the opponent of the use of considerable
land area. Even if the unusable land area is some pesticides, are able to remain in an area
small, it is significant when that small area is a making it unusable for a considerable time.
vital transportation mode, commercial area, Network, or virtual, attacks are the newest
water source, or infrastructure feature. Dirty among emerging methods. Given the ability of
bombs are radiological devices that, rather than the attacker to reach around the world and the
initiating a nuclear explosion, use conventional difficulty in capturing the perpetrator makes it
explosives to scatter fine particles of radioac- an attractive tool. Network attacks offer a double
tive material. Small amounts of this material punch. First, the effects of the actual attack could be
can prove fatal over time, which makes areas incredible. Second, the trust that the target popula-
uninhabitable for long periods of time. There are tion loses in networked systems may not be quickly
other delivery methods besides explosives that repaired. Consider all the activities that require
permit the release of these materials. Biological these networks: traffic lights, air traffic control sys-
agents have the ability to cause severe illness. tems, power generation, and in some instances,
The anthrax attacks in the United States proved water sanitation, to name a few. It would not be
the validity of this concept. Mailroom processes difficult to lose faith in many of these essential ser-
throughout the country were affected by merely vices. The use of the Internet for coordinating ter-
a few attacks. Bio-agents released into the water rorist activities may increase as new, less detectable
supplies or sprayed over areas can have enor- methods are developed. These will then be coun-
mous effect. However, a highly infectious agent tered and newer ones developed over time.
could be distributed simply by infecting just Knowing that in many ways terrorism func-
a handful of individuals. The same holds true tions as a theatrical event indicates that the meth-
for chemical weapons. The attack on the Tokyo ods will change. Changes will be necessary to fit
subway proved this concept as well. Chemical new audiences with different beliefs. Identifying
agents operate to affect the body’s nervous sys- what these are in advance will be difficult, but
tem. Nerve agents prevent nerve impulses from not impossible. Continuously scanning the envi-
traveling through the body, causing the heart ronment and monitoring changes offers us a tool
and breathing to slow and possibly stop. Other to prepare for these changes. Using gathered
chemical agents have nasty effects such as caus- information to stay aware of the changing threat
ing mucous membranes to bleed or significant has proven elusive in the past. It is necessary to
blisters to form. Currently, chemical agents deliv- learn from our mistakes and develop methods
ered are usually not spread too much after that to adapt to new threats and effectively deploy
delivery. However, persistent agents, much like countermeasures.
6. The CARVER model of target selection offers 9. An example of a non-violent extremist might
a useful tool for considering a target. be an animal rights supporter that uses no
a. True animal products at all.
b. False a. True
7. A security professional need only concentrate on b. False
their own facility when coping with terrorism. 10. It is impossible to identify potential targets.
a. True a. True
b. False b. False
8. Formal threat assessments are certainly
important; however, regularly monitoring
of the environment offers the opportunity to
identify potential problems earlier.
a. True
b. False
30
Antiterrorism and VIP Protection
Christopher A. Hertig and
Ted Wade
363
364 30. ANTITERRORISM AND VIP PROTECTION
stations, airports, and so on, and North American 9. The terrorists may use diversionary tactics
terrorists may plant bombs, murder members such as sniping or detonating explosives.
of certain ethnic or professional groups (police, 10. They will try to intercept, delay, or
doctors at abortion clinics), and rob banks or destroy responding police forces so that
armored cars. security personnel cannot rely on local law
One cannot assume what terrorists will or enforcement assistance.
will not do, but antiterrorist security person- 11. They may use unaware personnel as part of
nel should be familiar with the groups in their an attack plan, such as duping truck drivers
particular area and those that may target their into carrying explosives.
industry. This will provide them with sufficient 12. Terrorists will take advantage of periods
indication from which a more accurate assess- when security performance is lowered such
ment of terrorist activities can be made. as adverse weather (rain, snow, fog) or
Task b, Element D in “Nuclear Security when there are workers on site.
Personnel for Power Plants: Content and 13. The terrorists will plan and rehearse the
Review Procedures for a Security Training and attack.
Qualification Program” (NUREG 0219) lists the 14. The attack will be planned to take the fire
following characteristics involved in the plan- objective in less than 3 minutes.
ning and execution phases of a terrorist attack. 15. Terrorists will not attack unless they are
100% confident that they will be successful.
1. Terrorists will learn as much as possible
beforehand about the engineering details of While the foregoing was written with nuclear
a facility. power plants in mind, the concepts are appli-
2. They will assess power plant security ahead cable to virtually any fixed site facility such as
of time by observing the plant, talking to a bank, airport, or residence. Attacks against
plant personnel, talking to an insider, and vehicles for the purpose of securing hostages
intercepting radio transmissions. also utilize the elements of surprise, speed,
3. They will attempt to recruit an accomplice diversion, and, ultimately, violence. What can
into the security force. be gleaned from this is as follows:
4. Terrorists will also try to recruit nonsecurity 1. Communications and computer security
employees as accomplices. is paramount. Communications security
5. They will consider kidnapping an employee, protects against the compromise of
or an employee’s family member, prior to an information to terrorist/adversary groups.
attack. It also plays a key role in maintaining
6. They may take hostages during the attack to an effective physical security posture.
force cooperation. Disgruntled employees/customers/terrorists
7. Terrorists will isolate the target site by cutting will undoubtedly target computer systems
off communications and power supplies. more in the coming decade than they have
8. The group will assemble the necessary previously.
weapons and equipment to use in the attack 2. Confidentiality of information is essential!
(this can include firearms, military issue The less a terrorist or other adversary can
shoulder weapons, SMG’s or Sub-Machine learn about an organization and its defenses,
Guns, antitank rockets, high explosives, the less likely that an attack will be planned.
radio jamming or monitoring devices, An organization’s information protection
power tools, construction equipment, and program can be the cornerstone of a
incapacitating agents). terrorism defense strategy.
TABLE 30-1 Terrorism Protection Strategies by TABLE 30-2 Governmental and Corporate
Countries and Corporations Partnership Activities
Diplomacy/projecting a Public and media relations/ Provide and share intelligence Provide and share
positive image to the world projecting a positive image in to the macro environment: the intelligence to the micro
community the operating environment city, state, or nation environment: the facility,
other branches
Intelligence efforts Intelligence efforts
Offer available seats in Offer general employees
Investigation of suspect Investigation of suspect
training classes to security available seats in corporate
activities activities
personnel training programs
Target hardening/physical Target hardening/physical
Provide consultation on Provide facilities for
security security
terrorism, threat response, conducting training such
Tactical/emergency Tactical/emergency HAZMAT, etc. as performing drills in
planning planning buildings that are closed
Provide instruction on Locate facilities for
terrorism, hostage negotiation, incident command when
various modifications to existing insurance cov-
WMD (Weapons of Mass a crisis arises
erage can be made. Destruction) response
them adequately and safely, and employ them Manners, deportment, and decorum will
in an emergency, security personnel must be in “make or break” a PPS more quickly than any-
excellent physical condition. Here are some tips thing else. Proper dining etiquette and the ability
on physical training: to understand such aspects of corporate proto-
col, such as the conduct of meetings, are every-
● Develop endurance and stamina through day issues that confront a PPS. In many cases,
running, swimming, or sports activities. persons with a criminal justice background have
● Develop explosive power by sprinting, lifting great difficulty adjusting to upper-class society.
light weights rapidly, lifting heavy weights, Anyone wishing to become involved in execu-
and maintaining flexibility. Plyometrics are tive protection must become adept at manners
often used by athletes and can certainly be and dress. A trip to the library or research over
adapted to emergency skill development. the Internet for information on this might be the
● Static strength, or the ability to apply force most important career investment that an aspir-
for an extended period of time, can be ing PPS can make.
developed by practicing holding weights up
or remaining in push-up or pull-up position
for a period of time.
PROTECTING THE PRINCIPAL
● Hand strength—which is important for
grabbing and using any type of weapon—can
The operational aspects of guarding execu-
be developed in any one of a number of ways.
tives, celebrities, political leaders—or witnesses—
Squeezing a rubber ball is the most effective.
encompass a wide range of tasks and duties.
Crumpling up newspaper pages with one
Personal protection is a specialty that requires
hand, doing fingertip push-ups, pull-ups, and
immense dedication. Here are a few things to
virtually any type of weightlifting involving a
bear in mind when acting as a security escort:
pulling type of motion are other approaches.
● Flexibility is important not only because speed
1. Never leave the protectee unguarded.
is increased, but because injuries are prevented
2. Always be alert and ready to respond to
and body tension caused by stress may be
emergencies.
reduced. Stretch first thing in the morning!
This “sets” your body’s range of motion for 3. Position yourself between the protectee and
the rest of the day. Stretching should be done possible threats.
after a warm-up that gets blood flowing to 4. Enter rooms first to make sure they are
the muscles. During all workouts, stretch and safe. Completely scan the room. Consider
contract muscles. Once the muscles have been closing the blinds to avoid being visible from
contracted, stretch them. Rhythmic stretching outside adversaries.
is a fast, effective method of stretching. It 5. When trouble starts, move the protectee to
involves ten repetitions of a stretch. Taking safety immediately. He or she is your first
care to stretch a little farther each time and only responsibility.
develops flexibility. At night to relax, static- 6. Carry items, such as briefcases, in the
passive stretching can be employed. Try holding nongun or nonweapon hand.
in a stretched position for at least 30 seconds. 7. Always watch the hands of potential assailants.
This will make the muscles grow longer and 8. Review the itinerary and prepare for the
help you relax. Ensure that the muscles are day’s activities well beforehand. Know it!
moved around after the static stretch or one At the same time be able to make necessary
will lose speed of movement. changes and adjustments.
of a bus or train car, explosive force is com- also involve getting control of the bomber’s
pressed and increased, and casualties are higher. hands so that they cannot detonate the device.
Suicide bombers are thwarted by security Some devices, however, are detonated by the
officers. Officers notice the bombers or their handler.
handlers and take action. Basic indications of a Obviously, protection officers in areas where
suicide bomber are bulky clothing in which to suicide bombings are a credible threat need
conceal the explosives, a briefcase, or knapsack. specialized training and procedures for deal-
Behavior includes disorientation, mumbling, ing with this threat. Employer and client policy
profuse sweating, and nervousness. The handler must be adhered to. Grabbing someone without
will be nearby and will have a cell phone. There just cause constitutes the tort of battery. Suicide
may also be a vehicle, perhaps a van, which is bombing attacks must be managed as any other
used to drop the bomber off near the target. risk. Suicide attacks must be carefully weighed
Note: stopping a suicide bomber may involve against the threat of civil and perhaps criminal
moving people out of the area—quickly! It may charges filed against the protection officer.
EMERGING TRENDS
In the late 1970s a branch manager for within the past few years. The professional
Burns International Security Services, Inc. literature must be on top of developments
was interviewed by a local newspaper. In the regarding terrorism and related threats.
interview the manager stated that executive 2. The development of theoretical and
protection would be the future of the contract practical aspects of conducting searches
security industry. This did not happen right is imperative so that training programs
away, but it is largely becoming a reality. can produce graduates who are truly
proficient and professional at the searching
Antiterrorism and VIP protection will con-
function. This must be studied and protocols
tinue to evolve with the threats that confront pro-
developed.
tection officers. In order to meet the challenges of
3. An emphasis on manners and deportment
the future—and be a part of that future—there must
by protection officers so that they can join
be a greater emphasis on the following:
the management team and have a voice
1. The study of various types of threat groups in the organization. As PPS develops as a
and individuals by individual protection more common job function—whether on a
officers. There must also be published regular or occasional basis—there is a greater
research on this in the professional literature. awareness of upper management manners by
It cannot be the exclusive domain of political protection staff.
science or the general news media. Security 4. More academic programs in security and
magazines and journals must feature loss control at colleges and universities are
recent, relevant articles on threat groups needed so that both theory and technology
and individuals. This is occurring but only can be studied. This will also aid in making
INVESTIGATIONS
31
Investigation: Concepts and
Practices for Security
Professionals
Christopher A. Hertig
forensic examination. An unfortunate reality
CHAPTER OBJECTIVES is that many people greatly underestimate the
● Define investigation and protection importance of investigation within the security
● Explore the scope of investigative activity field. Few texts on criminal investigation even
mention private investigation or security inves-
● Provide a brief history of investigation tigation. Save for the obligatory treatment of
● Explain the need for preliminary and Pinkerton, the texts are mute on the topic.
follow-up investigation There seems to be a feeling that investigation
● Identify the relevance of intelligence, is a highly specialized process that is performed
liaison, writing reports, auditing, and only by police or supervisors. The popular image
interviews to the investigatory process. of private detectives who wear trench coats with
● Explain undercover investigations and their collars turned up and have cigarettes dan-
surveillance gling from their lips has been created and rein-
forced by the entertainment media. However,
● Define behavior/condition analysis there needs to be a readjustment of attitudes by
● Identify 10 points to keep in mind the public, managers, academics who write texts,
when testifying in legal and quasi-legal and officers themselves. With the threat of ter-
proceedings rorism and the proliferation of organized crimi-
nal groups, security personnel must become
involved in the investigative process. And they
need to be recognized for their contributions.
Investigation comes from the Latin word The fact of the matter is that investigation
investigere, which means to track or trace is performed each and every day by entry
(Bennett & Hess, 2001). Investigation can take level protection officers as well as specialized
many forms—from the simple asking of a few investigators. The work of these persons rarely
questions and noting it in a report to a full-scale makes it onto the evening news, but it aids the
381
382 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS
Criminal—felonies, misdemeanors, summary offenses, or Police officers, protection officers, corporate investigators,
ordinance violations state or federal agents, private investigative firms
Accident—work stoppage mishaps involved in production; Police officers, security officers, private investigators,
slips and falls, vehicle accidents insurance investigators, regulatory agency investigators
(OSHA)
Personnel—violations of employer policy; may or may not Supervisory or managerial personnel, private investigators
be a crime or tort (civil offense) (undercover), corporate investigators, protection officers
Background—prior employment checks, criminal or credit Private investigative firms, human resources departments,
checks done for hiring or promotion to sensitive positions corporate investigators, federal or state agency
or for bonding investigators
IX. INVESTIGATIONS
INVESTIGATIVE LOGIC 383
for only a single licensed firm at a time, or to carry have indicators that they are about to take place.
an identification card, pay an annual registration After the unfortunate event has happened, it is
fee, recertify by periodically taking training, and often noted what all the indicators were present
so on. The Fair Credit Reporting Act in the United that should have been seen earlier. Perhaps better
States also places extensive requirements on third playing of the intelligence agent role is one means
parties who conduct background investigations. It of taking corrective action before tragedy strikes.
is important that persons working with investiga- In order to fulfill the intelligence agent role
tive firms as employees or clients fully understand effectively, protection personnel must also be able
the legal requirements of such arrangements. In to report what they observe in an articulate man-
North America, the International Association of ner. They must “get it right” on paper. And they
Security and Investigative Regulators lists state should always reinforce the written report with a
and provincial regulations on their Web site at verbal report to the appropriate personnel.
http://www.iasir.org. Investigation has nothing to do with stylish
clothes, gunfights, or flashy cars. It is not glam-
orous. Rather, it is tedious and exacting. It has
Investigation and Asset Protection Go
to do with fact-finding and research. Investigation
Hand-in-Hand
is simply an objective process used to discover
Uniformed protection officers on patrol or facts about a situation, person, or behavior. Once
plainclothes loss prevention agents must be inti- those facts are discovered, they are recorded
mately familiar with their patrol environments. in an appropriate manner. Investigation has a
They must be able to discern when something great deal to do with research; those who like to
isn’t right. In many cases, unusual or unex- do Web or library research may acclimate them-
plained situations indicate criminal activity. The selves to investigative activity better than those
investigating officer on patrol must be able to who disdain research. Investigation requires
first recognize things that aren’t quite right. This precision and attention to detail. It culminates
could be a vehicle parked in an unusual place, in writing reports about the known facts. These
persons taking photographs, unusual trash dis- reports are the product of the investigation.
posal procedures, graffiti, hand gestures, cloth- Investigation is important because without
ing or “colors” worn around the area, persons facts, management cannot make the correct
conversing with others in an unusual way, etc. decisions. As the security officer is a member
The list goes on and on. Each indicator could of the security management team, it may be
mean a variety of different things; terrorists or his/her responsibility to provide management
criminals conducting surveillance on a target, with information. Usually the security officer
theft of materials, gang activity, or drug dealing. will give investigative information to his or her
One lesson to be learned regarding investi- supervisor and they will provide it to manage-
gations is that major cases are solved via minor ment. He/she reports this information after
incidents. Murderers get caught parking ille- conducting some type of investigative activity
gally or shoplifting. While detectives and other (searching for something, talking with people,
investigative specialists may piece incidents observing something, etc.).
together, it is the patrol officer who takes note of
something and acts upon it that supplies the key
information. Small observations often yield big INVESTIGATIVE LOGIC
results: “Minor Is Major.”
Along a similar vein, a review of accidents, Investigation is a logical, systematic process.
terrorist attacks, or acts of workplace violence all Investigators use two types of logic: inductive
IX. INVESTIGATIONS
384 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS
reasoning and deductive reasoning. With inductive John Fielding published the Covent Garden
and deductive reasoning, a hypothesis is con- Journal, which described wanted persons.
structed about what has occurred. Facts are then Based on the ideas of Patrick Colquhoun, the
gathered that either support it or reject it. There Covent Garden Journal was similar to many loss
may be only a few pieces of the puzzle available prevention department newsletters, America’s
so that the investigator must try and search for Most Wanted television show, and the FBI’s
other pieces. The investigator must look at what tip line on the Internet. Pinkerton wrote about
is most likely to have occurred so that investiga- his detectives and in retirement wrote dime-
tive efforts are not wasted. Note that investigation store novels (these were popular forms of
often seeks to narrow the focus of the inquiry: instead entertainment, comparable to contemporary
of pursuing a vast array of possibilities, the inves- videos or DVDs). Pinkerton is credited with
tigator seeks to reduce them logically to a more coining the terms sleuth and private eye,
manageable number. Inductive and deductive which were popularized through his true
reasoning may aid in doing this. Inductive and life accounts of detective work as well as the
deductive reasoning is also more likely to be used fictionalized dime-store novels that he wrote.
in intelligence analysis. When assessing intel- 2. Advertising and media relations are
ligence information, it may be necessary to con- essential for continued investigative success.
struct a theory of the case. This seems to be true for public entities
In inductive and deductive reasoning, facts are as well as private investigative firms that
collected. Next, a theory about what occurred is depend on direct customers for fees. The
formulated. The pieces of the puzzle are obtained Fieldings published the Covent Garden Journal.
and put into place. The fictionalized Sherlock Pinkerton used posters to advertise, featuring
Holmes and the real-life Allan Pinkerton used a large eye and the saying “We Never Sleep.”
deduction. Investigation of crimes, accidents, or J. Edgar Hoover, who ran the FBI from 1924
work rule violations require the use of inductive until 1972, had a weekly radio show and
and deductive reasoning. hired a publicist. It would appear that what
Each form of reasoning has its place. An inves- the Fieldings started in terms of marketing/
tigative inquiry may begin with inductive rea- public relations was taken to new levels by
soning and then become deductive. Investigators Allan Pinkerton and J. Edgar Hoover.
must always make sure that they are logical and 3. Reward systems tend to breed corruption.
objective. Investigators must never let their preju- Jonathan Wild, a sort of prototype for
dices or preconceived notions interfere with their contemporary private investigators, worked
work. If exculpatory evidence—evidence that under the Parliamentary Reward System.
tends to disprove that the suspect committed the This system paid government rewards
offense—is discovered, it cannot be ignored! to those who captured felons. Under the
Parliamentary Reward System, the thief
taker could keep the felon’s property;
HISTORY OF INVESTIGATION
including his horse if he had one. Wild also
retrieved stolen property for his clients
History teaches some important lessons
and received a percentage of the value of
regarding investigation, including the following:
the property. He used the Parliamentary
1. Writing and investigation go hand-in-hand. Reward System to great effect: he would
Investigation has been popularized through have an associate steal the property,
works by Henry and John Fielding and collect the fee from the client for its return,
Allan Pinkerton, among others. Henry and and perhaps turn in the associate and get
IX. INVESTIGATIONS
FOLLOW-UP INVESTIGATION 385
the Parliamentary Reward. In America, preliminary investigation is the initial fact-finding
private detectives used criminal informants component of the investigative process. It is per-
extensively and collected rewards. They formed when the crime or incident is first discov-
were the predecessors of municipal police ered and is crucial to the success of the follow-up
detectives, who also collected rewards. Allan investigative effort. Preliminary investigation con-
Pinkerton forbade his agents from obtaining sists of several key steps:
rewards, even though in the mid- to latter
1. Attending to injured persons. This must be
19th century, municipal police detectives in
the first priority! First aid followed by care
the United States commonly did so. Present-
and concern are the order of the day when
day civil demand in retailing can be thought
dealing with victims.
of as a type of reward system. A civil demand
2. Detaining those who may have committed
letter is sent by a third party to apprehended
the crime. If possible, engage in conversation
shoplifters requiring them to pay a fee under
with any subjects who may be in or near the
fear of civil suit. This may create ethics issues:
scene. Some simple inquiry can go a long way
is the loss prevention department in existence
toward solving an investigative issue. This
to prevent loss or gain profit from the fees
must be done carefully and professionally.
collected from shoplifters?
3. Finding and questioning witnesses. A
4. Ethics is crucial to success. Individuals and
neighborhood canvass of the area to seek out
organizations that don’t have good ethics
witnesses should be performed as soon as
may profit initially, but in the long run they
possible. Systematically find and interview
fail. The same is true of investigators and
those who may have seen or heard something.
investigative organizations. Allan Pinkerton’s
4. Preserving the crime/incident scene for
firm (which emphasized good ethics) became
evidentiary purposes. Protect, preserve,
the largest investigative and security firm in
make notes! Control access to the scene, take
the world and is still around after 150 years.
photographs, and note observations. The
5. New markets and new investigative services
scene must be in pristine condition.
must be explored. Whether the customer
5. Forwarding information about the incident
is internal, as with a proprietary security
to the dispatcher, central alarm station
department, or external, as with a private
(CAS), or the shift supervisor. Officers
investigative agency, it is essential to envision
should always keep the command post
the needs of end users. Currently, background
apprised of their current situation. The
investigations are being used by more and
command post must know where officers
more organizations. Certainly computer and
are, what they are doing, and what the
Internet crime are growing concerns; some
situation is at the officer’s location.
firms are moving into that market. The key
6. Completing a preliminary report so that
question is: “What investigative services could
follow-up investigators have adequate
our organization offer that it currently does not?”
information with which to proceed. Ideally,
a follow-up investigator should have the
case handed to them “on a silver platter.”
PRELIMINARY INVESTIGATION
IX. INVESTIGATIONS
386 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS
of examining the information provided by the It also includes ongoing professional develop-
preliminary report and proceeding to uncover ment such as knowing the signs and colors of
additional data until the case is solved and a local gangs, the types of drugs that are being
complete understanding of the event is attained. distributed, and the indications that extremist
Obviously, the success of the follow-up inves- groups who may resort to acts of terror are in
tigation is heavily dependent upon the pre- the area. These may include handbills, graffiti,
liminary investigative effort. Without adequate and the observation of extremists congregating.
records, evidence, or witnesses, little or nothing Educational sessions sponsored by local police
can be determined, even if the follow-up investi- are a good way of keeping up-to-date on these
gator is extraordinarily proficient. topics. So, too, is reading professional literature.
Follow-up investigations may be completed Proper reporting is essential. Good writing
by the officer who performed the preliminary skills are part of this. Proper management of
investigation, but in most cases they are han- the information within an intelligence system is
dled by investigative specialists, police detec- another key component.
tives, or supervisory personnel. For this reason, A structured, highly developed intelligence
close liaison must exist between those conduct- process consists of the following steps:
ing the preliminary investigation and those
with follow-up investigative duties. 1. A need to collect the information is
identified. No information should ever be
collected until a demonstrated need for it
INTELLIGENCE exists. There must be a clear connection
between collecting the information and
Intelligence is information. It is data or facts the protection of assets. There must also
regarding current, past, or future events or asso- be a management decision to begin the
ciations. Intelligence collection can be thought collection; there must be a policy regarding
of as a part of the follow-up phase of investi- it. In very simple terms, management
gation. However, in many cases, intelligence will instruct protection officers on what
is collected as an ongoing process, not after a type of information they are to collect as
specific event. One reason for collecting intelli- part of the intelligence agent role that they
gence is to be proactive, to be able to see prob- play.
lems developing rather than investigating them 2. The actual collection process. This is where
after they have occurred. Protection officers observations of protection officers and
play several key roles. One of them is the “intel- investigators come in. It is also where data
ligence agent” role. In order to perform this role searches are performed and information
effectively, officers must do the following: from other agencies is obtained. In order to
be effective, the collection process cannot
1. Be observant.
be impeded by having protection officers
2. Know what to observe.
involved in too many tasks. If they have
3. Report the information in an effective
too much to do, they won’t take the time
manner.
to notice things or the care to report them.
Being observant is self-explanatory. Alert, Officers must also receive positive feedback
attentive patrol officers will gather information. from managers regarding their observations.
Inattentive ones will not. An additional concern here is the liaison that
Knowing what to observe comes from being is conducted with other organizations. It
properly trained and socialized by management. must be positive and productive.
IX. INVESTIGATIONS
LIAISON 387
3. The information is evaluated and collated of the accident, there may be an investigation
or organized. The information is evaluated by an insurance company. Many investigations
to determine if it is worthwhile and correct. It involve more than one organization.
must be timely. It should be verified. It is filed In order to be effective, liaison with other
in an organized manner and collated so that it organizations must be developed and main-
can be compared with other information. The tained. During the development phase of liai-
establishment of files for cross referencing son, it is important to note the following:
is important. Without this step, information
1. Understand the role and purpose of
is not referenced with other bits of data and
each organization. This begins with
“the pieces of the puzzle” don’t get matched
the employing organization. Protection
together. The use of computerized data
officers or investigators who do not know
systems such as the PPM2000 report writing
their employer’s mission statements or
software aids this effort.
philosophies are in trouble to begin with!
4. The information is analyzed and
Once this is done, the external organization
interpreted. The meaning of the information
is studied. Employer, client firm, and
is determined. After collation of the data, a
external agency must all be studied.
professional intelligence officer will make a
2. Examine the capabilities of each organization.
hypothesis on what the data means.
With the flow of funding, these are in a
5. The information is disseminated. The
constant state of flux. Determine what
information is given to authorized users
specific services each is capable of offering
within the organization or to external
to the other, such as surveillance equipment,
agencies. This must be done in accordance
surveillance locations, vehicles, and software.
with policy and based on a need-to-know.
3. Meet with and get to know the key persons
6. The information is reevaluated. Intelligence
in other organizations. For a protection
and the process used to collect and analyze
officer, this may be the local police officers
it are reviewed. This is the “feedback loop”
and their sergeant. For an investigator, it
of the intelligence cycle. This enables the
may be his or her counterparts with different
process to be reviewed and improved upon.
organizations. For a manager, it would be
the agency heads. The point is to develop a
comfort level in working with people from
LIAISON
different organizations.
4. Consider meetings or joint training exercises.
In many—if not most—cases, investigative
Also consider hosting seminars that various
efforts are undertaken in cooperation with other
organizations can attend. In many cases,
organizations. A simple example is counterfeiting.
corporations have conference rooms and
The problem is discovered by a teller or cashier
other resources that can be used by external
who notices a suspect bill. The teller or cashier
entities. Informally “talking shop” is fostered
contacts a manager and/or the security depart-
at these face-to-face get-togethers. Informal
ment. Next, the local police and U.S. Secret Service
intelligence exchange occurs.
are brought in. Each plays a role; counterfeit cur-
rency is not simply the domain of the U.S. Secret Once a liaison is developed, it must be
Service. Another example would be an accident maintained. The need for a positive working
in a parking lot. Security and maintenance would relationship with an outside agency cannot be
be involved. If there are injuries, local emergency overstated. Such a relationship requires contin-
medical services and police are called. In the wake uous care to maintain.
IX. INVESTIGATIONS
388 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS
1. Be respectful. Ask how you can help. for working space, phone lines, and so on.
Oftentimes protection officers can perform A police department doing an interview or
simple tasks for outside investigators such interrogation may need to use a conference
as holding the end of a tape measure at an room. They may also need to review
accident scene. surveillance tapes or disks. There are also
2. Get to know people individually. equipment needs that can be met such as
Introducing oneself with local police loaning vehicles, surveillance equipment,
and other investigators is a start toward and so on, to police agencies.
building a trusting relationship. 10. Consider joining investigative
3. Know the law! One way of doing this is to organizations. Membership in a
ask police and government investigators professional or social organization that
questions. An investigator who works local police also belong to may be an
a specific area of investigation (identity effective way of forming a bond with them.
theft, auto theft, check fraud, etc.) becomes
intimately familiar with the legal aspects
of the offense. NOTES AND REPORTS
4. Know policy! Complying with employer
policy is necessary. Appreciating another Notes are the foundation of a report. It is
organization’s rules and values is also sometimes said that testifying—the last step
important. in the investigative process—begins with note-
5. Protect incident scenes effectively. taking. Without adequate notes on the crucial
Providing another agency with a safe, details, there can be no effective report, follow-
secure, sterile scene from which to carry on up investigation, or testimony. Reports are what
their inquiry is critical. make or break investigators. They are the sum-
6. Be proficient at preliminary investigation. mation of the investigator’s or protection offi-
If calling on local police detectives cer’s work. Here are some key points on note
to initiate a follow-up investigation, taking and report writing.
providing them with a quality, professional, ● Think of notes as aids in remembering key
starting point is a necessity. details. Don’t think of them as another chore
7. Be proficient at case presentation and to do.
testifying effectively. Being able to ● Headings should be placed at the beginning
present a case effectively is important as so that the notes are organized. The type of
it is the culmination of an investigation. incident, date, time, and place can be recorded
Deficiencies at this juncture can sour first at the top of the notes. This same principle
relations between cooperating agencies. applies to notes taken during classes.
8. Keep the other agency informed. Keep ● Start each set of notes on a new page. Also
them “in the loop.” Remember that make sure to skip a few lines after each entry
when you are working with government so that additional information can be added.
agencies in all likelihood you are acting This also applies to notes taken in classes!
under “color of law.” The Constitution of ● Always have a notebook available, even if
the United States may be involved here tape recorders or computers are being used;
and always be in a support services mode old-fashioned paper and pencil are needed
when working under “color of law.” as backup note-taking aids.
9. Provide external agencies with resources ● Periodically check notes. Summarize what
as appropriate. Accommodate their needs is written to witnesses giving statements
IX. INVESTIGATIONS
AUDITING 389
so that you are sure to get the information protection system or of safety procedures on
correctly recorded. This should always be a weekly/monthly/quarterly basis.
done at the conclusion of an interview; it can ● Security supervisors audit reports,
also be done at various junctures throughout procedures, personnel performance, and
the interview process. training/certification records of protection
● Use abbreviations judiciously. If they are officers to ensure that things are being done
commonly known abbreviations, use them. the way they are supposed to be.
Make certain that the abbreviation used is ● Both contract and proprietary security
correct and that anyone reading the notes managers audit policies, procedures, and
would understand it. “If there is any doubt, training records to see that services are being
spell it out.” properly given to client firms.
● Use rough sketches in notes to pictorially ● Increasingly, we will see managers and
represent incident scenes. Simple hand- supervisors auditing for compliance with
drawn figures can aid in making the notes standard-setting organizations, such as
useful later on. government agencies and insurance carriers.
● Treat notes as the part of the official record Also, professional organizations, such as
that they are. Start each set of notes on a new the Joint Commission on the Accreditation
page. Number each page. Write in ink and of Healthcare Organizations (JCAHO),
cross out and initial each correction that must International Association of Campus Law
be made. The best evidence rule requires that Enforcement Administrators, and others,
the original, best, and highest quality of proof will establish sets of standards. As the
must be used in legal proceedings. For this security industry professionalizes, such
reason, original notes should be maintained. developments are inevitable.
However, check with your company policy ● Accountants and/or fraud examiners perform
on notes. Many security departments insist financial audits of records such as payroll,
that all notes be destroyed immediately after accounts receivable, purchasing, or petty cash.
the incident report is completed and signed ● Forensic accountants may review individual
off by your supervisor or manager. points of sale in retail facilities, parking
garages, restaurants, or bars.
IX. INVESTIGATIONS
390 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS
help to make this determination. Additionally, has its strengths and weaknesses; each has its
they can be part of a corrective approach taken to time and place. Some that may be of use include:
remedy any problems that have been uncovered. 1. Document review by either systematic (every
When conducting an audit, there are several document in a set) or random selection (a
important points to remember. sample of documents in a set).
1. Compare what is being audited (job 2. Deliberate error technique in which an error
behavior, procedures, or conditions, is deliberately made to see if it is detected.
etc.) with clearly defined, measurable An example would be a mispriced item at a
standards. These can be written instructions, point of sale (POS) terminal.
procedures, post orders, and so on. The 3. Drills are good ways to evaluate the
analysis of the job behavior (e.g., not signing performance of both systems and
in visitors), procedure (price checks on personnel. These must be done safely and
merchandise), or condition (e.g., faulty in such a manner that they are not overly
alarms) must be objective. It cannot simply be disruptive. In most cases, drills can be
the auditor’s professional opinion. “compartmentalized” so that someone only
2. Communicate the purpose of audits to all needs to describe (orally or in writing) the
employees. Obtain the positive cooperation procedures to be followed. Another method
of those who have input into the audit is to have the scenario limited to a single
process. department or unit. Full-scale scenarios are
3. Conduct audits in a fair and uniform manner often not feasible—even though exercises
with a set standard that relates to everyone involving the entire protection operation
and is used to evaluate everyone. and outside agencies are the best “final
4. Utilize a variety of techniques. Each examination” possible for a security system.
technique gives the investigator a specific 4. Observation of job behavior or systems is a
type of information. Each provides the simple technique that can still provide useful
auditor with a different view. Each shows information. This can be with the unaided
a different “angle” or perspective. Use a eye or by reviewing videotape (openly
combination of techniques to see the whole taken) of someone performing job tasks.
picture. 5. Interviewing personnel is a method that may
5. Document the results of audits. Professional be used to investigate practices. In addition
reports are essential. to one-on-one interviews, survey forms can
6. Evaluate and review audits with relevant be used.
personnel. An exit briefing is one means of 6. A conference held with supervisors is
doing this. In an exit briefing, the auditor a technique often used by managers to
briefly discusses his or her findings with investigate workplace problems, practices,
management prior to the submission of a and procedures. This can be scheduled with
complete report. This gives management regular supervisor meetings or as a separate
rapid feedback upon which to make meeting prior to an external audit by a
necessary modifications. government agency or accrediting body.
7. Follow the chain of command, be tactful, and
make sure the information gets to the right
people, and only those people.
INTERVIEWS
As with any type of investigation, there are a The conducting of interviews is something
variety of approaches to auditing. Each approach that security officers do all the time. In many
IX. INVESTIGATIONS
INVESTIGATIVE OR FOCUSED INTERVIEWS 391
cases, these interviews are conducted informally. 7. Take notes in a manner that records the key
Whether formal or informal, an interview is a con- data but does not impede the interview.
versation with the objective of obtaining information. Don’t take notes if it makes the interviewee
Loss control practitioners who are adept at their uncomfortable. Oftentimes, note taking
jobs can collect information from every conversa- should take place after the incident has
tion. Here are some basic rules of interviewing. been related by the witness. Going over the
information again and taking notes on it often
1. Be pleasant, friendly, and helpful to the does not upset the interviewee’s comfort
interviewee. They are taking their time out to level.
help you! 8. Summarizing and then taking notes may
2. Thank people for their help and always end help. The interviewee may add information
an interview on a positive note. Providing that was previously overlooked. It is
them with a business card for future contact also a good way to make sure that all the
is a good policy. In some cases witnesses information is correct. It is, in effect, an audit
contact investigators later on about the same of the interview.
case. Sometimes they contact them about
other cases. Leaving the door open for future
communications is part of being an effective
interviewer.
INVESTIGATIVE OR FOCUSED
3. Ask open-ended questions that require an
INTERVIEWS
explanation rather than a simple yes or no
Investigative or focused interviews are dif-
answer. “Can you tell me what you saw?”
ferent from interviews with witnesses or vic-
“Can you tell me what happened?” or
tims in that the focus upon the person is as a
“Could you describe that?” are examples of
suspect. A focused interview is only conducted
open-ended questions.
after a substantial amount of information from
4. Use silence (“the long pause”) after the person
other sources indicates guilt of an individual.
has answered a question. Don’t say anything;
Focused interviews are conversations with the
let the interviewee continue the conversation.
purpose of acquiring information, but with
Most people will feel obligated to keep the
obtaining admission of guilt or a full confes-
conversation flowing and add more detail.
sion from the subject as the final objective. They
5. Interview in private—to the greatest extent
should not be conducted by inexperienced and
practical; a quiet, relaxed, private setting
untrained individuals! Investigative special-
will yield more information. The interviewee
ists should perform them. Unfortunately, there
must feel comfortable. They cannot be
are instances where a protection officer without
distracted by noise or activity.
extensive information may come upon someone
6. Be approachable and friendly. Pleasant
committing a crime or policy violation. In these
people are easy to talk to. Astute protection
cases, a brief focused interview is appropriate.
professionals are approachable and can
These are some interrogation techniques:
gain the trust of people. Put the person at
ease with a smile, joke, or off-the-subject 1. Be nonaccusatory. Do not blame or accuse
questions (sports, family, current events). the subject. If the facts are wrong and they
Also make the person comfortable; offer are not guilty, there is an obvious problem.
them a seat and sit next to them (picture Additionally, setting up a hostile relationship
the seating arrangements that TV talk show does no good. The investigator must “sell”
hosts use). This helps to establish rapport. the subject on telling the truth.
IX. INVESTIGATIONS
392 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS
2. Discuss the seriousness of the incident Under Weingarten, any time that an interview
with the person being interrogated. This is is held with an employee that could reasonably
helpful in those cases where the individual be expected to result in disciplinary action, the
falsely believes that they can act with employee is entitled to representation by a union
impunity, that it is “no big deal.” steward or another individual. This rule is lim-
3. Request that the subject tell the story ited to those employees who are represented
several tines. Inconsistencies can be better by a collective bargaining unit (members of a
noted in this way. labor union). Failure to comply will result in an
4. Appeal to the emotions of the subject. unfair labor practice charge being filed through
Let him/her know that everybody makes the National Labor Relations Board. Discipline
mistakes. Allow the subject to rationalize what imposed as a result of the illegal interview may be
they have done. Allow them to minimize the set aside in an arbitration hearing. Employees who
harm that has occurred. Allow them to project have been terminated may be reinstated and given
blame onto someone or something else. back pay for the time that they were off work!
5. Point out inconsistencies in the story to While unlike Miranda in that management is not
the subject. This is better done later in obligated to advise employees of this right, once an
the interview. Anything done to make the employee asks for a union representative (union
interviewee defensive should be used as a steward or co-worker) the interview must cease
last resort. until the union representative arrives—provided
6. Confront the subject with part of the the representative is reasonably available.
evidence. Be careful! Employees cannot ask for a specific representative
who is on vacation simply to avoid being inter-
There are various legal restrictions active
viewed. In these cases, the interview may proceed
during interrogation. Basically, these standards
without the representative present. Alternatively,
do not allow any use of force, threats, or intimi-
the interview may cease. Employees can be told
dation. The Miranda decision required all law
that management will take action with the facts
enforcement personnel in the United States to
that they have (Table 31-2). As a general rule, it is
advise suspects of their rights before asking
best not to force an interview with anyone!
them any questions which focus upon them as
the suspect and which are asked in a custodial TABLE 31-2
setting. Failure to follow these procedures will
result in all evidence obtained via illegal ques- Miranda Weingarten
tioning to be excluded from criminal proceed- Police interrogation of Employer questioning of
ings (the Exclusionary Rule). suspects in a custodial employees concerning
While in most states, private security person- setting. violations of employer rules.
nel are not bound to the Miranda decision, a few Warnings are required Warning is not required—the
courts have placed this obligation upon them. before questioning. employee must make the
All U.S. courts place Miranda standards on pri- request for the representative.
vate individuals who are acting at the direction, An attorney is the A union steward or
request of, or in close cooperation with public law representative of the interested co-worker is the
enforcement personnel. Obviously, the Miranda accused. representative, not an attorney.
rule applies if the security officer has any type of The Exclusionary Rule An unfair labor practice
police powers. Such officers are, in fact, agents of prohibits statements charge may be filed; this may
the government, and acting under “color of law.” made in violation of the result in the setting aside of
Another standard that the U.S. Supreme Court law from being used in a discipline.
criminal proceeding.
imposed upon employers is the Weingarten Rule.
IX. INVESTIGATIONS
INFORMANTS 393
There are legal obligations to caution persons 7. Have the subject sign each page of the
being interrogated. There are also other consid- statement and initial all corrections.
erations to be addressed within the legal arena. (There should be some corrections so that
Knowing the laws of your state regarding inter- the integrity of the document can be clearly
rogation is important. In Minnesota there is demonstrated in court.)
something called the “Tennessen Warning” 8. Have someone witness the statement.
given during administrative hearings. This 9. Use the statement as supporting evidence,
law states that the subject of the interview may not the entire case! Corroborate the
not remain silent, must give the information statement with other evidence. Back it up
requested, and anything they say can be and as much as possible.
will be used against them in any future crimi- 10. Make sure the statement is in the
nal or civil investigation or trial. This is just the subject’s own words and that it is dated
opposite of the Miranda Warning. We believe and signed.
this is a Minnesota State Law only. As a general
rule, the following procedures can save security
practitioners a considerable amount of trouble
in court:
INFORMANTS
IX. INVESTIGATIONS
394 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS
IX. INVESTIGATIONS
SURVEILLANCE 395
to ensure that the overall operation is effective. should be credible, it is always best to back
Controls need to be in place to reduce the risk of up one’s case.
danger and legal problems from arising.
In order to use undercover investigation to
the greatest advantage, the following consider- SHOPPING SERVICES
ations must be weighed:
Shopping services are a type of “short-term
1. The objectives of the investigation must be undercover” inquiry where the investigator
clearly defined. Management must know poses as a shopper. They are designed to achieve
exactly what information is required and for the following purposes:
what purpose the investigative effort will be 1. Uncover criminal or unauthorized activity.
initiated. Sometimes called “honesty shopping,”
2. The entire situation must be carefully this may involve making purchases and
weighed from all perspectives (legal, labor observing what the cashier/waitress/
relations, economic, operational). UC bartender does with the money. Attempts
investigations can easily cause more serious to under-ring a point-of-sale terminal,
problems than they rectify. Aside from civil pocket money, and so on are noted. Other
liability issues, there can be the threat of an investigations may audit how items are
irritated workforce. Obviously, that situation priced, how return merchandise is handled,
has potential for serious loss. And the losses or items without price tags are processed.
can last a long time. 2. Assess customer service and employee
3. Strict confidentiality on a need-to-know efficiency. This involves “shopping” a
basis must be maintained. Many operations location and seeing how attentive the sales
are compromised when the persons being personnel are to customers.
investigated find out about it.
4. The proper agent must be selected. They Shopping can be done by specialized inves-
must have the necessary job skills to fit in tigative firms or in some cases on a proprietary
with the work environment. They must be basis. In the latter instance, a manager from
sociable and dedicated enough to see things another store or branch of the business may
through when difficult decisions (turning in be used. This provides an expert view on how
friends, accompanying suspects during illegal things are supposed to be done. It also aids in
activities, staying on the job when illegal organizational development as the managers
activities are not occurring) must be made. participate in an audit process.
Simply “looking the part” is not enough.
5. Liaison with law enforcement agencies for
the purpose of gathering information or
SURVEILLANCE
prosecuting suspects must be done. This
Surveillance is an essential investigative activ-
can compromise the agent. It can also create
ity to loss control practitioners. It can be stationary
numerous other problems if not done properly.
(hidden cameras, “plant” or “stakeout”), mobile,
Always assess the goals and objectives of the
or contact ( rolling surveillance or invisible dyes).
organization a liaison is being affiliated with
Surveillance can accomplish various objectives:
so that conflicts are kept to a minimum.
6. Corroborate the agent’s testimony with 1. Identify suspects in a crime.
other evidence. Agents may not be credible 2. Record the movements and associations of
with arbitrators, judges, or juries. While they suspects.
IX. INVESTIGATIONS
396 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS
3. Identify patterns of criminal or unauthorized before wasting precious time and money. Special
activity. attention must be devoted to communications
4. Collect information for prosecution. and the response to incidents. Investigators must
5. Locate and apprehend suspects. decide what may occur and how they will react
6. Prevent crimes from being committed. This to it. With this in mind, personnel and equipment
can be done via overt or covert surveillance. needs can be addressed logically.
Recording of activity observed during sur-
Once objectives have been identified, the veillance must be done with care. The following
planning process can begin. The entire planning is a sample outline for a surveillance log:
process consists of the following steps: Location/objective (an introductory para-
1. Establish the objective of the surveillance. graph should be written)
Write a clear, concise sentence as to why the Date
investigator is doing the surveillance. What Time (all activity occurring at a specific point
is the purpose behind the investigation? in time is detailed)
2. Reconnaissance of the area where the Attachments (photographs, sketches, etc.)
surveillance will be conducted. Examine Summary (brief concluding comments on
it for avenues of entry and exit as well as observations)
vantage points from which to observe. There
should be several of these! BEHAVIOR/CONDITION ANALYSIS
3. Collect as much information as possible on
the background(s) of subject(s). The more Another tool that investigators can use is
known about the person being observed, the behavior/condition analysis. Whenever there is a
better. Having a firm idea of the person’s crime or accident, the behavior of the perpetrator
appearance is essential to ensuring that the and/or victim can be examined and analyzed, as
right person is being surveilled. Knowing can the conditions present. The behavior and con-
the person’s habits or potential for danger is ditions can be divided into three segments:
also critical.
4. Calculate the personnel requirements. 1. The behavior/conditions that existed
A minimum of two people will be needed before the incident. This view can provide
if the surveillance lasts for any appreciable valuable insight into the criminal method
period of time or if there is danger present. of operation and can also be used for
5. Establish communication. Cell phones, analyzing vulnerabilities. One can gain a
radios, and phone booths as a backup better understanding of what took place and
method can all be used. Security and develop more effective prevention efforts. An
continuity of communication are essential. example might be the approach/entry used
6. Calculate equipment needs. Equipment by a robber at the target. What protection
may consist of binoculars, videotape units, was given to the target? Who would know
log or report forms, possibly weapons, and what the target was? Who would be attracted
disguises such as hats, coats, and glasses. to that type of target (“score”)? What kind
of insurance coverage was held by the
If surveillance operations are planned properly, victim? When applied to crimes or accidents,
the chances for success are much higher. As the contributing factors to the event can be
costs of initiating surveillance activities are high, identified. What was the physical, mental,
it certainly behooves the loss control investigator and emotional condition of the accident
to carefully scrutinize all aspects of the operation victim? What was the lighting and noise level
IX. INVESTIGATIONS
TESTIFYING IN LEGAL AND QUASI-LEGAL PROCEEDINGS 397
at the time of the accident? Would anyone disciplinary hearing, or labor arbitration. Officers
gain by making a false report? What was the are also called upon to give depositions in civil
victim doing at the crime or accident scene? suits. In many cases, the officer will testify in
2. The actual incident itself. What actually took several different legal arenas; one never knows
place during the robbery? What did the robber precisely where an incident will be decided!
say and do? What did the burglar do when Each of these proceedings has a different for-
inside the premises (the burglar’s “prowl”)? mat and takes place in a different environment,
What happened during the accident? What but all require providing factual information in a
was the sequence of events in the accident professional manner. Each of these proceedings
(struck by, caught on, falling, etc.)? places the officer on the opposing side of the
3. The behavior immediately after the incident defendant or plaintiff. During these proceedings,
should be identified and examined. How the successful investigator does everything pos-
did the robber make his escape? Where did sible to appear credible and convincing.
the burglar exit from? How was the stolen Here are some things to bear in mind when
merchandise disposed of? How was the testifying in court:
accident handled? What did the victim or
perpetrator say? Who reported it? When and 1. Always be positive. Project a positive,
to whom was it reported? Who responded to affirmative image. Sell yourself to the judge,
the crime, fire or accident? magistrate, jury, etc.
2. Be neat, clean, and conservatively dressed, as
Once all the behaviors and conditions of an
if you were going on a job interview. Project
incident are identified, it becomes much eas-
a businesslike, professional image. Avoid
ier to analyze and understand that incident.
dressing or talking like a cop or a soldier.
Developing a list of questions for each phase of
3. Sit and stand erect with shoulders squared.
the event also helps to unfold lines of inquiry
Face and look at the jury and judge. Be
and perform a more complete investigation.
serious! This is a serious issue that must be
While this technique is commonly used to inves-
handled in a thoroughly professional manner.
tigate robbery, burglary, and homicide, there is
4. Project your voice to the jury or judge.
no reason to limit its application to these types
Maintain eye contact with them. Address
of cases. Embezzlement, passing bad checks,
them when you’re talking to them. Project
credit card fraud, accidents, bombings, fires,
your voice to the person farthest from you.
and chemical spills can all be dissected in this
This will ensure that you are heard by
manner. Behavioral/condition analysis aids in
everyone who needs to hear you.
understanding the human factors in a loss event.
5. Answer “yes” or “no” to questions posed
Key point: Keep the initial questions general
by counsel or the judge. Don’t clarify
rather than specific. Focus the inquiry by going
or elaborate on your answers unless it is
from general questions to more specific ones.
necessary to do so. If you must clarify a
Never start with highly specific lines of inquiry
point, choose your words carefully and
or the behavioral/condition analysis will fail.
know what you’re going to say before you
open your mouth. Prior to the proceeding,
TESTIFYING IN LEGAL AND consider what questions may be asked.
QUASI-LEGAL PROCEEDINGS 6. Have the case prepared before trial.
Any reports or evidence presented must
Once a case has been investigated, it be carefully prepared. Consult counsel
may become necessary to present it in a court, about the case beforehand to ensure that
IX. INVESTIGATIONS
398 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS
preparation is adequate. Go over the case, essential element within the investigative pro-
review evidence. Plan a strategy with the cess. If the investigative effort is not carefully
guidance of counsel. Review all notes and controlled, man-hours will be wasted, confiden-
reports before the proceeding starts. tiality may be compromised, and objectives will
7. Any notes or reports taken to the stand not be met.
may be examined by the opposing attorney. To begin with, the individual investigator
Be critical of and careful with notes for this must have personal management skills. He
reason. Don’t simply read from notes; consult or she must set objectives, make daily priori-
them only if necessary. Don’t take something ties, and manage time effectively. Proper filing
that could cause embarrassment and a loss and administration of records is important.
of credibility. Only professional information Critically evaluating one’s work is crucial.
should be in an officer’s notebook. In an organizational sense, investigations
8. Avoid any show of sarcasm, conceit, or must be managed by a series of procedures and
disgust with the defendant. Be objective controls. These are some techniques to consider
and unemotional. A professional is when supervising an investigation:
objective. Don’t be afraid to say something
positive about the defendant. 1. Selecting and assigning investigators
9. Never try to argue with the judge or properly. Only the most qualified and
attorney. Be polite and professional, efficient personnel should be entrusted
addressing them appropriately as “Sir,” with investigative duties. Individual cases
“Ma’am,” or “Your Honor.” Find out how should be assigned in accordance with the
to properly address them beforehand. individual expertise of the investigator.
10. If unsure as to what occurred, say so. Note that this does not necessarily mean the
Don’t be afraid to admit you don’t know investigator with the most seniority.
something or aren’t sure. If you are sure, 2. Investigators must be properly trained in the
state so in a positive, affirmative manner. basics of investigation (interviewing, report
Try to avoid saying “I think” or any other writing, surveillance, interrogations, etc.)
expression which displays uncertainty. before assuming investigative responsibilities.
11. If you don’t understand a question, ask They must also be trained in specialized areas
that it be repeated or say that you simply (narcotics, fraud, espionage, undercover,
don’t understand it. computer forensics, etc.) should they be
12. Don’t be afraid to admit that you’re wrong assigned these investigative duties. Training
and be honest in all matters. needs must be analyzed carefully. Periodic
13. Critique your performance in order to upgrading must be done in regard to legal
improve future testimony. Experience is a and technological development.
good “teacher” for giving testimony. Look at 3. All investigations should have clearly
every occasion as a learning experience. Don’t defined objectives. These objectives should be
be afraid to watch others testify or to ask for observable and measurable. The effectiveness
critiques from others on your testimony. of the investigative effort can be gauged by
assessing whether or not the objective was
met, how quickly it was met, and what the
MANAGING INVESTIGATIONS total cost was. This can be calculated in man-
hours expended and other expenses.
Just as investigation is an integral part 4. Case worksheets should be designed to meet
of management, so, too, is management an the needs of individual organizations. These
IX. INVESTIGATIONS
CONCLUSION 399
forms list dates, investigator’s names, case objectivity; it must be used in conjunction with
numbers, persons contacted, time invested, other evaluative methods.
expenses, and results of contacts. Their 3. Review of investigative reports. This gives
efficient design and utilization are musts the supervisor a “quick feel” for how the
for the investigative effort to be properly investigator is performing.
administered in a cost-effective manner.
5. Forms for efficiently reviewing reports can
also be used to great effect. These forms CONCLUSION
enable supervisors to objectively audit
reports submitted by security officers or Investigation and asset protection are inter-
investigators. Their use helps to streamline related functions. Neither can exist in any real
the investigative process while at the same sense without the other. The contemporary pro-
time ensuring that errors are caught early tection officer serves as an intelligence agent
enough to prevent disaster. for security management. As such, he or she is
6. Coordination of the investigation with tasked with collecting and reporting all manner
persons who have a “need to know” is of information on potential loss-causing condi-
important. Law enforcement agencies and tions. Information relating to crimes, accidents,
victims should be kept informed of the and unethical/unprofessional practices has
progress of the investigation. (Keep in mind traditionally been collected by protection offi-
your status with respect to “color of law” cers. Contemporary concerns with terrorism
discussed above. You don’t want to jeopardize mandate that intelligence relating to potential
the evidence in any way.) This is important terrorist activities be collected. Future officers
for maintaining supportive relationships will probably perform more auditing functions
and receiving additional information. designed to catch errors and minimize waste.
Special concern must be given to the victim. In most cases, protection officers are involved
Victims need emotional support and a clear in performing preliminary investigations. As the
explanation of judicial procedure if they are to preliminary investigation is the most important
feel comfortable following through with the phase of the investigative process, it is essential
prosecution process. that it be conducted properly. This ensures that
both security management and public police
Investigations can be supervised and evalu-
agencies can uncover facts necessary for the
ated through a number of techniques. As with
completion of their respective missions.
auditing, no single technique is adequate to
Proficiency and future growth and develop-
provide a complete assessment. Using several
ment in investigation depend on a mastery of
methods in concert with each other provides
the basic skills. Protective service professionals
the best results.
must master interviews (every conversation is an
1. Statistical analysis of numbers of interview), note taking (edit and review notes at
apprehensions, conviction rates, amounts of various stages of the investigation), and report
stolen property recovered, and numbers of writing. Efforts must also extend to testifying in
complaints against the investigator can also legal and quasi-legal proceedings. Effective oral
be used as an indicator of job performance. communication skills are a necessity if cases are
2. On-the-job visits can always be used as a to be presented effectively. They are also inte-
technique. Good supervisors are “coaches” to gral to the development of a professional image
their subordinates. However, as an assessment and more productive relations with manage-
method it is limited in effectiveness and lacks ment, police, clients, and the public at large.
IX. INVESTIGATIONS
400 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS
EMERGING TRENDS
As we deal with large scale disasters, arsons, or nurses, etc. Background checks are the fastest
terrorist bombings, our ability to move from the growing area of investigative activity. Most of
emergency response phase of the event to the inves- these investigations are being conducted by spe-
tigative phase is improving. Fire and EMS personnel cialized firms such as USIS. There has been an
are being taught crime scene preservation. Crime explosive growth in the number of private inves-
scenes must be more carefully processed than ever tigative firms specializing in employee back-
before. New scientific advances are enabling the ground investigations. There are hundreds of
collection of physical evidence such as DNA. such companies in the United States alone.
General loss interviewing is being done more Not all background investigations are per-
frequently. This is a general conversational inter- formed by investigative firms. Some are con-
view performed after an inventory has been ducted by governmental agencies such as the U.S.
conducted. It may also be performed after an Office of Personnel Management. In-house secu-
“Orientation to Loss Prevention” session. It is rity departments may also conduct backgrounds;
somewhat open and informal; interviewers do in other cases human resource departments do
this to uncover possible loss issues. Patrol officers them. HR departments may also conduct part of
also do this, as a general conversation with people the inquiry and contract out portions of it such as
encountered on patrol may lead to some indica- criminal records or credit checks.
tion of a problem. This initial information is then With increasing privatization, it is likely that
studied and further investigation conducted. The a greater proportion of investigative tasks will be
key is to make every conversation an interview, performed by private investigative agencies and
albeit in a subtle, easy, conversational manner. proprietary security departments. Driving forces
Interviewing is becoming a more structured, for privatization are decreased budgets for pub-
methodological undertaking. There is more plan- lic agencies and the need for specialized expertise.
ning before going into an investigative interview Public police agencies will probably contract out
and more time spent in building rapport. In law for various types of investigative services in the
enforcement, videotaping is being used more future more than at present. Investigative functions
often, whereas corporate interviews are using not currently envisioned will be carried out by both
a two-person team approach. At the conclusion proprietary and contract security organizations.
of the interview, the interviewer is debriefed by In many corporate settings investigative plans
another investigator. This debriefing session is are developed by investigative teams. These consist
done for both operational reasons (making the of human resources, legal, security, IT, and so on.
interview better) and as part of Critical Incident The results of the investigation are reviewed by top
Stress Debriefing (CISD). CISD is designed to management. Obviously, thoroughness and precise
help the interviewer deal with stressful situa- documentation are required in these situations.
tions. The latter may occur after a focused inter- There is a greater need for investigators to have
view where the interviewee gets very emotional computer skills. MS Office software is used exten-
and/or discusses a traumatic event. sively. Research and intelligence functions are
Background investigations are becoming performed online. Access control and surveillance
more commonplace. Increasingly, there is a legal logs are reviewed; the latter is becoming more
requirement to conduct a preemployment check important as video surveillance increases. Analytic
such as with schoolteachers, child care workers, video is becoming more common in both work
IX. INVESTIGATIONS
RESOURCES 401
environments and public streets. Once the infor- investigative process. Obviously it is unfair for
mation is collected, there is a need for some man- a retail loss prevention agent to suddenly give
ner of human review. The information may also be a police detective 30 bad check cases all at once.
moved into separate files for reporting purposes. Managing the investigative workload must be
Liaison between different investigative enti- given some thought. We cannot “dump on” our
ties is increasing and is taking place earlier in the investigative partners.
IX. INVESTIGATIONS
402 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS
IX. INVESTIGATIONS
C H A P T E R
32
Crime and Incident Scene
Procedures
Dennis Shepp
403
404 32. CRIME AND INCIDENT SCENE PROCEDURES
perimeter is a paramount responsibility of the Protecting the scene means the area must be
protection officer in charge of the scene. Unless preserved exactly as it was at the time of the inci-
a supervisor has taken responsibility for the dent. Nothing should be moved, removed, or
scene, the person responsible is typically the ini- altered in any way. Nothing should be introduced
tial responding officer. Ensure instructions are to the scene either (example: cigarette butts, gar-
clear when someone takes responsibility for the bage, foot- and fingerprints, or people). This
scene and make detailed notation of: includes touching anything at the scene (which
introduces fingerprints). In fact, the protection
1. The time and date
officer must not touch or walk in any area where
2. The name, rank, and authority of the person
evidence may be disturbed or inadvertently
who has taken responsibility
introduced to the scene. There are times, though,
Bystanders will need to be contained outside when the officer or a responder may need to
the perimeter while the protection officer is pro- move a person or object; here are some examples:
tecting the scene. Although there is a tendency
1. Remove a victim from a potential danger or
to have bystanders leave the area and carry on
hazard at the scene.
with their own business, the protection officer
2. Introduce a foreign substance (such as
does not want to dismiss potential witnesses to
chemicals) to a scene to extinguish a fire or
the incident. There is a delicate balance between
prevent an explosion from a fuel spill. For
having bystanders keep their distance from the
example, water or chemicals from a fire
perimeter yet remain in the area so they are
extinguisher.
accessible to the investigators for an interview.
3. Allow temporary access to the site to
Here are some recommendations:
evacuate bystanders or other victims because
1. To identify potential witnesses, ask if anyone it is the only path for an exit.
saw what happened.
When something like this happens, the protec-
2. Ask potential witnesses to remain in the area
tion officer needs to make detailed notes of what
to be interviewed by investigators.
was changed at the scene and how it was contam-
3. Make notes of contact details, including
inated. The protection officer must remember that
name, date of birth, address and phone
although protecting the scene is important, the
numbers of potential witnesses before
protection of life is paramount and takes priority.
allowing them to leave the scene.
Victims may need to be removed from the scene
The protection officer needs to be consider- so that no further harm comes upon them or the
ate with potential witnesses. People are typically responding protection officer.
busy and will not want to remain at the scene Eating, drinking, or smoking should never
and wait for investigators. It is a responsibility of be allowed at an incident scene (Schiro, n.d.), as
the protection officer to try to politely convince these activities provide other opportunities to
these people to wait. The protection officer has no contaminate the scene.
authority to detain a potential witness; therefore,
they may need to exercise discretion and be very
polite while attempting to convince a potential EVIDENCE
witness to wait until the investigators arrive. If the
circumstances permit, the officer may request the It is important to understand what could be
witness provide a written statement while they considered evidence. There are several types
wait. At the very least, the officer must obtain the of evidence, but for the purposes of protecting
name and contact details of the potential witness. the scene, the type of evidence most relevant is
● The new container or evidence should be of evidence could impact the outcome of a
marked with: criminal or civil trial, jeopardizing the appro-
● Protection officer’s name priate course of justice and/or costing the
● Date and time of possession organization additional losses or damages. The
● Reference number to incident best advice is to protect the scene and allow
● Prepare detailed notes outlining: the investigators to collect and handle the
● How you came in possession of the evidence.
evidence
● When you came in possession of the
evidence MAKING DETAILED AND
● Where you came in possession of the ACCURATE NOTES
evidence and where exactly it came from
at the scene The importance of detailed, neat, and com-
● Indicate who provided the evidence to you plete note taking and reporting cannot be
● Describe what the evidence is in detail emphasized enough. As already mentioned,
● Photograph the evidence the protection officer must keep detailed and
● Continuity of possession of the evidence accurate notes of everything that happens or
(chain of custody) is very important. that is observed at the scene. The notes may
Evidence needs to be stored in a proper take different forms, too. For example, draw-
manner and secured so that no one but the ing a sketch of the room or property layout can
protection officer who accepted the evidence help in a later description and report. Sketches
can access it. If the evidence needs to be also are a terrific way to refresh your memory
moved or changes possession, the change if you need to testify at a later time. Notes are
and chain of custody must be documented often also recorded using an audio recorder.
and continuity maintained. The portability of such devices has made the
● Maintain a detailed log of what happens to technology more convenient to use. Some cell
the evidence while it is in your possession. phones have a feature to record digitally using
● If possession changes, document in the log dictation. These notes can be saved and later
and your notes: transcribed into written form to be included in
● Time and date of change a report. The purpose of good notes is also to
● Who took possession of the evidence facilitate a good report. Reports are intended to
● The purpose of the change of custody inform the reader of the following essentials:
(transfer to police, laboratory for testing, ● Who
taken from evidence locker to court, etc.) ● What
● Where
The proper collection and preservation of evi- ● When
dence is a topic that should be further researched.
Additional resources can be found online at A reader should be able to read a report and
Crime and Clues: The Art and Science of Criminal develop a clear picture in their mind of exactly
Investigation: http://www.crimeandclues.com/ what the protection officer saw when at the
crimescene.htm. scene. Recreating the scene in written form will
It should be rather clear at this point that assist the investigators and make the protec-
the collection of evidence at a scene needs to tion officer a better witness. It is important to
be handled by professionals who are specially be a good “story teller,” but more important to
trained. The improper handling of a piece remember is that it is all about the facts. Reports
EMERGING TRENDS
Societies subjected to tougher economic responsibilities at crime and incident scenes. In
times and reduced public spending will expose particular, the private sector will be expected to
the security industry to increased responsibili- manage more of the investigation and reporting
ties that were traditionally reserved for public for incidents that could be considered minor.
law enforcement. Governmental budgets will The result of these trends will be the need for
undergo closer scrutiny by taxpayers, resulting in additional specific training for protection officers
reduced funding for police and government agen- to prepare them to better fulfill the nontradi-
cies. This reduction in available funds will impact tional roles and new responsibilities. These new
all resources, including personnel. Reduced man- quasi-governmental responsibilities will subject
power will mean security personnel and protec- protection officers to more regulation and scru-
tion officers will be required to undertake more tiny, holding them to a higher standard.
CONCLUSION
S E CURI TY QU I Z
The protection officer is an important 1. The security officer’s responsibilities when
resource when it is necessary to respond and arriving at a crime scene is which of the
protect a crime or incident scene. Often the out- following:
come of a crime or incident will not be imme- a. Establish a boundary
diately apparent when the officer arrives as the b. Protect the incident scene
initial responder. This means they have to act in c. Maintain detailed notes
a professional manner and practice the knowl- d. All the above
edge and skills gained in this chapter while 2. To track loss-event-occurrences, the
protecting a scene and preserving evidence. The organization needs to know all of the
final outcome of a criminal or civil court case following except?
could depend on how well the evidence was a. What was lost
protected, collected and managed. b. How long was it lost
c. When was it lost
d. Who lost it
References 3. Physical evidence found at the crime scene
Dicarlo, V. (2001). Summary of the rules of evidence, FindLaw; may explain what exactly happened and/
retrieved September 9, 2009, from http://library.findlaw or provide a list of suspects. Which of the
.com/2001/Jan/1/241488.html/.
following is not an item of physical evidence
Fawcett (2003)
Schiro, G. (n.d.). Protecting the crime scene, retrieved found at a crime scene?
September 9, 2009, from http://www.crime-scene-in- a. Blood
vestigator.net/evidenc1.html/. b. Fiber samples
c. Low levels of C02 in the soil samples
d. Fingerprints
33
Interviewing and Statements
Dennis Shepp
413
414 33. INTERVIEWING AND STATEMENTS
detailed explanation of types of evidence is statement. The interviewer speaks and the
not important at this stage, what is important interviewee responds, or vice versa. This seems
for the protection officer is to understand that simple; however, in many situations the inter-
when interviewing someone, even if it appears viewer seeks to obtain information from people
casual and unofficial, will produce a statement, who are reluctant to speak or cooperate. This is
either verbal or written, and this statement where some insight into human behavior and
could become important evidence. That is why psychology helps the interviewer.
it is important to understand the procedures Research has shown that people form their
that should be followed when interviewing basic impressions of one another during the
someone and obtaining their statement. first few minutes of an interview (Quinn and
What is the difference between an interview Zunin, 1972). Therefore, it is very important
and an interrogation? Typically, interviews for the interviewer to always think about how
involve witnesses or victims and an interroga- they are presenting themselves to the other
tion is an interview of a suspect. The goal of person. If the officer does not initially conduct
an interrogation is not only to seek the facts himself or herself in a professional manner,
of what happened but also obtain a confes- this may create a negative relationship with the
sion. It is not likely that a protection officer interviewee. A negative mood will be counter-
will be required to conduct an interrogation as productive in an interview. The interviewer
part of their duties and only trained investiga- needs to be an active listener or someone who
tors skilled in the techniques of interviewing the interviewee would want to talk with. To do
should conduct interrogations. Trained inter- this, the interviewer needs to develop rapport or
viewers and interrogators spend years learning a relationship with the interviewee. This means
and practicing to become skilled in this art and the interviewer will attempt to establish a bond
science. between them that is a connection where the
Understanding people is another impor- interviewee perceives the interviewer to be a
tant aspect of interviews and statements. Many caring, impartial, and concerned individual.
studies have been conducted on human behav- Here are some recommendations:
ior and crime. Investigators have learned from
1. Be empathetic—show the person you
the research about how to effectively interact
understand and care about how they feel.
with individuals to facilitate useful communi-
This helps the interviewee accept and feel
cations which in turn can produce valuable
comfortable with the interviewer and will
information for the investigation. The protec-
facilitate open and honest communication.
tion officer can also benefit from understanding
2. Eliminate your prejudices—try to detach
human behavior.
yourself from any personal prejudices or bias
you may have against the interviewees:
• Actions—detach yourself from what the
THE POWER OF COMMUNICATION
accused may have done, no matter how
bad it was.
Interviewing someone involves communica-
• Race—do not discriminate against the
tion in two ways:
person based on race or ancestry.
1. Verbally • History—show the person that you are
2. Nonverbally not prejudging based on past history.
Verbal communication is the most com- Try to be nonjudgmental and do not place
monly understood form of interview and immediate blame.
IX. INVESTIGATIONS
THE POWER OF COMMUNICATION 415
3. Be patient—show the person you can wait state of mind. For example, someone who shows
to listen and understand their story of what by their nervous voice tone, shaking hands, and
happened and why. This is a sign of a very darting eyes that they are anxious and afraid
good listener when they can show they are should be recognized by the interviewer so that
patient. This is a sign to the interviewee of they can try to calm the interviewee and make
tolerance, acceptance, and understanding. them feel more relaxed. This helps toward devel-
4. Reflect feedback—repeat back to the oping rapport between the interviewer and
interviewee statements, facts, and comments interviewee. Additionally, changes in behavior
they have related. The interviewer acts like and body movements can indicate stress. Stress
a “mirror,” reflecting back to the interviewee is an important indicator for an interviewer. This
their words, feelings, and attitudes, showing can be the stress of the interview itself or from a
to them you are listening and care about specific and directed question such as: “Did you
what they say (Nirenberg, 1988). take the money?” A guilty person may show signs
5. Do not interrupt—it is rude to interrupt, just of “flight or fight syndrome.” Fight or flight is an
like in any communication or conversation, instinctual phenomenon, based on when humans
so do not interrupt the interviewee when relied on this instinct to help them either run
they are relating their story to you. Allow from danger (flight) or face it (fight). It actually
them to finish what they are saying. is a manifestation of bodily reactions to stress
6. Concentrate—interviewing someone that humans will experience even nowadays
requires complete concentration on what when confronted with stress. Asking a question
they are saying and how they are saying it. that may compel the interviewee to lie will often
Concentration can best be equated to playing cause this type of stress. A well-trained inter-
a game of chess—the interviewer needs to viewer can act as a human polygraph (lie detec-
concentrate on what is currently being said, tor) when someone attempts to deceive by telling
but also must think ahead to expect what the a lie or not revealing information. Many of these
interviewee might (or should) say. telltale signals come from nonverbal and verbal
responses to stress and are evident in clusters
Why would concentration be important and of observed body movements and reactions. As
matter when the interviewee is telling the story mentioned, it can take many years of training and
and relating the facts as they know it? This is experience for a skilled interviewer to recognize
because the interviewee will sometimes not these signals of deception and further specialized
tell the truth and attempt to deceive the inter- training is recommended before anyone attempts
viewer, for a variety of reasons. This is why the to seek or analyze verbal and nonverbal behav-
interviewer needs to concentrate on what is ior in an interview. Nonetheless, here are some
said and follow the story and attempt to detect examples of verbal and nonverbal behavior when
deception. Detecting deception is explained in subjected to stress:
more detail later.
“Nonverbal communication” is a type of ● Changes in voice and speech patterns,
communication between persons that involves such as changes in the types of words
written statements (discussed later) and bodily used.
movements which are considered a form of ● Changes in the rate and volume of speech
communication. This is important for an inter- (louder, softer, faster, or slower). Tension will
viewer to understand because how a person (this often cause speech to become more rapid
includes the interviewer, too) projects themselves and stammered, sometimes two to three
can relate significant information about their times the normal speed.
IX. INVESTIGATIONS
416 33. INTERVIEWING AND STATEMENTS
● Burst of anger (threats to sue you, complaints showing the right attitude to conduct the
of how the interviewee has been handled, interview?
comments about your incompetence). • Are you mentally prepared? Can you
● Pausing, stalling, or delaying tactics (the focus on the interview? Do you appear
interviewee suddenly needs to leave for an confident and prepared?
appointment, long pauses to try to think of 2. If possible, try to use a suitable location for
an answer, changing the topic in an attempt the interview.
to delay the interview, suddenly wants a • There can be many distractions to
lawyer). interviewing someone, especially if
● Nervous or false laughter (this is a form the interview occurs at the scene of the
of energy release when someone is under incident.
stress). • Try to find a quiet and private place
● Sudden shifts in body movement not to conduct the interview, away from
normally displayed by the interviewee potential distractions.
during the interview (some examples: • Avoid interviewing anyone in the
shifting body position, pacing, jumping out presence of other witnesses—their
of chair, waving hands and arms, shaking, testimony or account of observations
kicking legs and feet, coughing, yawning). can be tainted if they listen to another
These are also forms of energy release when witness’s account.
someone is feeling stressed. 3. Ask open-ended questions.
• Avoid closed-ended questions that will
It is vital for the protection officer to under-
typically require a simple “yes” or “no”
stand that nonverbal indicators need to be ana-
response.
lyzed by a trained investigator and interviewer.
• Open-ended questions are the type that
It is important to understand as a protection
prompt longer answers and compel
officer (interviewer) you will outwardly dis-
the interviewee to provide a narrative
play your feelings by how you present yourself.
response. For example:
Therefore, be careful and aware about how you
may appear to the interviewee. ● “Please tell me everything that happened.”
● “In detail, can you please explain what
occurred here today?”
THE INTERVIEW PROCESS ● “Please describe everything you saw
regarding what happened here.”
When interviewing anyone, the interviewer 4. Record the interview.
needs to consider the following: • The most common method is to write
detailed notes of what the person says.
“Do to others as you would have them do upon you” • If possible and the local legal system
(Yeske, 2002).
permits, audio- or videotape the
interview—this is the best method of
Here are some steps to consider when pre-
maintaining an accurate account of what
paring to conduct an interview:
exactly is stated.
1. Prepare yourself, physically and mentally. • When taking a statement, the best method
• Examine your appearance—how do is to obtain a “pure version” statement.
you look to the interviewee? Are you • Pure version statements allow the
professional in appearance? Are you interviewee to provide their version of
IX. INVESTIGATIONS
DECEPTION 417
an account in a narrative format without ● Date, time, and location of the interview
any prompting from the interviewer other ● Indicate if the statement is voluntary
than a request, similar to: “Please write ● Signed by the interviewee
in detail everything that happened from the
Other guidelines for written statements (Sen-
time you left your house to the time the police
newald and Tsukayama, 2006):
arrived at the scene.”
• If the person responds with: “What 1. Use lined paper and write margin to margin.
exactly do you want me to say?” the 2. The text should flow into additional pages
protection officer’s response should be: (if necessary).
“Please explain in as much detail as possible 3. If corrections are required, draw a line
everything that happened from the time you through the sentence or word and sign your
left your house to the time the police arrived at initials on the change.
the scene.” 4. Sign your initials next to the last word on a
• The pure version statement remains the page and where the page number is written:
best method to obtain the interviewee’s (Example: “Page 1 of 3” INITIALS).
account of what happened. This statement 5. Ensure the interviewee understands what
becomes the basis for further questions is written (if the statement is written for
that can be asked by the investigator them)—have the interviewee read back what
to complete a detailed account of what is written.
occurred. 6. Include a sentence acknowledging the
• Be careful what questions you ask. It is statement is voluntary, without the influence
part of the psychology of interviewing of drugs or alcohol, and is the account of the
that an interviewer needs to consider the interviewee.
questions they ask an interviewee—
the famed investigator, Avinoam
Sapir, who discovered through his DECEPTION
extensive research the process known
as “Statement Analysis,” has aptly There may be times where the interviewee
said: “Specific questions are not designed may provide inaccurate information or may try
to obtain information. Specific questions to deceive the interviewer. Deception can take
are designed to detect deception. The most additional forms other than what some may
serious disadvantage of questions is that one immediately think is a lie or untruthful state-
can ask only about what is already known. ment. Sometimes deception is avoiding facts
What is not known would not be explored that are known by the interviewee or changing
and therefore would remain unknown.” It is the account of how something happened. It is
also from an interviewer’s questions that not only a suspect that may try to deceive; wit-
an interviewee can learn how much the nesses and victims may often avoid facts for
interviewer already knows (or doesn’t various reasons.
know) about the incident. Detecting deception from an interviewee
5. Remember the elements for useful and knowing how to react properly while con-
statements (Sennewald and Tsukayama, tinuing the interview requires an investiga-
2006): tor’s skill. These skills will have developed
● Identify who wrote the statement from training and experience. This is where the
(interviewee’s name and identification interviewer becomes a “human polygraph” and
information) is able to react in an appropriate manner. The
IX. INVESTIGATIONS
418 33. INTERVIEWING AND STATEMENTS
best practice for the protection officer facing a The protection officer should continue with
deceptive interviewee is to make detailed notes a professional demeanor when dealing with
of the statements made by the person and have witnesses, victims, and persons of interest.
them commit to the statement in writing and Notwithstanding the fact that an interviewee
under their signature. This written statement may have confessed to a crime or committing a
can be used quite effectively by a skilled inves- breach of organizational policy, they should still
tigator during a subsequent interview. be treated with respect and dignity. This behav-
ior will benefit the officer in the long term.
EMERGING TRENDS
Although the process of interviewing has communications. Humankind has not been
been around for centuries, the methods have and investing new gadgets or technology to do this,
will continue to evolve considerably. Statement it has been improving traditional methods such
analysis is a relatively new science as applied to as verbal interviews, nonverbal kinetics, and
investigations, but it illustrates that the process written statements.
of investigative interviews will constantly evolve We will continue to learn more about human
and improve. behavior and how to apply our understand-
What seems most interesting is the improve- ing toward seeking truth from communications.
ments mainly involve learning more about lin- Technology will also improve and will likely
guistics and human psychology and applying provide more tools to investigators in their pur-
refined or new techniques to better interpret suit of the facts.
IX. INVESTIGATIONS
SECURITY QUIZ 419
References Resources
ASIS International. (2006). Protection of assets manual, Gordon, N. J., & Fleisher, W. L. (2006). Effective interviewing:
Chapter 1, Part 1, p. 8. Interrogation techniques (2nd ed.). Academic Press.
Quinn, L., & Zunin, N. (1972). Contact: The first four minutes. Reid technique: Interviewing and interrogation. (2005).
New York, NY: Ballantine Books, Inc. 2-CD-ROM Training Collection, http://www.reid.com/
Nirenberg, J. (1988). Getting through to people. Prentice Hall. store2/detail.html?skucd-rtiivs/.
Yeske, C. (2002). The art of investigative interviewing (2nd ed.). Yeschke, C. (2002). The art of investigative interviewing (2nd
Butterworth-Heinemann. ed.). Butterworth-Heinemann.
Sennewald, C., & Tsukayama, J. (2006). The process of investi- Zulawski, D. E., & Wicklander, D. E. (2002). Practical
gation: Concepts and strategies for investigations in the work- aspects of interviewing and interrogation (2nd ed.).
place (3rd ed.). Elsevier/Butterworth-Heinemann. CRC Press.
IX. INVESTIGATIONS
This page intentionally left blank
C H A P T E R
34
Foundations for Surveillance
Michael Stroberger
421
422 34. FOUNDATIONS FOR SURVEILLANCE
other electronic information. Usually, the protection engage in this type of operation on
operators are well out of sight, even if the a regular basis without realizing that it falls
equipment is clearly visible. within this category. Overt personal surveil-
lance is the execution of visible and open
inspection, such as when on patrol. The act of
COVERT PERSONAL gathering information is shared in importance
SURVEILLANCE with the deterrent value of such an operation.
The person executing these duties may be
Covert personal surveillance is the act of looking for specific types of incidents or situa-
watching another from a location of conceal- tions. Through their presence, and the fact that
ment, or in a manner in which this act is not they are paying attention to their surround-
obviously being carried out. This is the main ings and the persons in those surroundings,
focus of the services of some investigators deal- this may cause those in the area to reconsider
ing with cases such as marital strife, insurance intentions of violating company policy or legal
fraud, and even law enforcement investigations. restrictions.
While this surveillance is personal rather than The performance of this type of operation is
electronic, it should be noted that some electron- most likely to alter the behaviors and responses
ics are usually involved, but this is often limited of persons in the observed environment due
to a camera, a voice recorder for the retention of to the fact that there is clearly a person paying
comments on the observations, and similar low- attention to those present.
end electronics. The primary advantage of this
method is that it provides for a human deci-
sion-making option as the situation evolves. By COVERT ELECTRONIC
being on the scene, the operative(s) can deter- SURVEILLANCE
mine how to refocus the operation to obtain
better results. The major drawback is that this is The use of hidden cameras, voice and elec-
extremely manpower intensive. In order to not tronic recording equipment, and similar devices
attract too much attention, it is best to randomly falls within this category. It is within this type
exchange operatives so that the same person is of operation that the surveillance agent must
not in the area for an extended period of time, pay the closest attention to privacy issues, as
drawing potential interest through being con- the unwelcome observation of persons, under
spicuous. When performing vehicle surveil- certain circumstances, may violate state or fed-
lance, this is even more of an issue, as specific eral restrictions on such actions. Care must be
vehicles are easily recognized if they continu- taken and counsel sought when designing such
ously pass into and out of view. operations, so that violation of such restrictions
These operations can yield interesting results does not occur.
stemming from the fact that, when properly Some equipment options might include pin-
executed, those observed are not aware that hole cameras; cameras concealed in sprinkler
others are paying attention to them. heads, clocks, books, and other nondescript
items; scanners tuned to permissible frequen-
cies; and even long-range audio amplifiers as
OVERT PERSONAL SURVEILLANCE permitted. The equipment selection, given the
right budget, can look very much like the prop-
This type of operation ranges widely in erty of a movie spy. The actual selection is often
its application. Most people in the field of limited only by the budget of the operation.
IX. INVESTIGATIONS
PRIVACY ISSUES 423
Much like personal covert operations, this as binoculars, a camera, a mini-recorder, and a
method often yields very interesting results. If notepad. The initial outlay might be as low as a
the operation is properly executed, those being few hundred dollars, and the equipment retained
watched are not aware that they are being over a period of many operations. In electronic
observed. As a result, they will act in a manner operations, the initial outlay may be thousands,
that is completely natural to them in the given or tens or hundreds of thousands, of dollars. This
environment. is based upon the scope and sophistication of the
intended operation. As an example, moderate
OVERT ELECTRONIC grade pan/tilt/zoom camera operations require
SURVEILLANCE not only the camera dome itself but also a con-
trol unit, video cabling, power sources and cable,
The classic example of overt electronic sur- and a method of recording the input. A single
veillance would be the pan/tilt/zoom camera PTZ (Pan/Tilt/Zoom) camera, in a stand-alone
domes found in most department stores. These system, could be thousands of dollars and would
provide a significant amount of information to still have to be manned at least occasionally.
a trained operator and are also a very visible The equipment must be appropriate to the
deterrent to certain types of crimes. Often, if nature and scope of the operation if it is to be of
the recordings of such a system are replayed, optimal effectiveness. Experience and common
persons can be seen behaving in one manner, sense will dictate the exact requirements.
looking up to find that a camera is in the area, Regardless of the nature and method of
and immediately altering the previous behav- the operation, the underlying goal of obtain-
ior to bring it more in line with the expectations ing information must also be addressed in the
of that environment. It is not that the devices equipment. If this information is to be used in
themselves have any potential to bring harm a truly effective manner, it must be recorded
to the individual. It is the concept that, absent in some way. Certainly, in cases of criminal
of a clear view of the operator of the system, and civil actions, the best possible method of
there is no way to know if the camera watch- recording the information should be sought.
ing that specific area is being paid attention to To appear in court without physical evidence
at the given moment. It is the fear of possibly would be of almost no use at all. In many cases,
being observed that provides the deterrent fac- simple still photographs can make a significant
tor in this case. It is because of this that CCTV impact. Videotape, made through camcorders
systems, in such setting as industrial locations or more complex systems, can often solve cer-
and employee-only areas of other types of busi- tain cases, such as insurance fraud.
nesses, should be placed in such a manner as
to make it plainly obvious that CCTV is in use, PRIVACY ISSUES
but without providing a view of the monitors
themselves. Those in the area should know that Although the pursuit of justice and the pro-
observation occurs but not be able to determine tection of personal or company property is
which area at any given time is being observed. highly important, it is also critical that the laws
protecting privacy be honored and protected. As
EQUIPMENT REQUIREMENTS such, it is essential to understand the basic con-
cepts and research laws that could have bearing
As previously stated, the equipment may on the specific operation to be undertaken. Do
vary widely. In the case of personal surveil- not ever assume that the privacy laws of one
lance, either covert or overt, it may be as simple area apply wholly to another area.
IX. INVESTIGATIONS
424 34. FOUNDATIONS FOR SURVEILLANCE
As an example, in some states, recording a or for the locally defined period of time that
telephone conversation may not be done with- those involved might be allowed to enter into
out the prior knowledge and consent of both a civil action, whichever is longer. In short, be
parties on that call. In other states, only one prepared to prove your case for however long
person must be aware that a recording is being it might be an issue, and be prepared to defend
made. In some cases, an employer may listen your operation against civil accusations. Some
in to employee telephone conversations, based companies have a policy that directs all closed
on legal permissions, specific content in the case materials to be destroyed after a certain
employee hiring agreement or employee hand- period of time, such as a 2-year retention policy.
book, or simply because the telephones are Research these directives before executing them.
owned by the employer and provided only for In some states, those involved are permitted up
the execution of work-related duties. Without a to 4 years to file civil suits. It would be in the
clear understanding of the laws and restrictions best interest of those involved that they have
that apply to the location in which you intend supporting evidence should this occur within
to perform a surveillance operation, it could be the allowed period of time. Again, research the
very easy to violate those laws. laws and restrictions that apply to not only your
Although there are many “rules of thumb” location, but also the specific location where the
on this issue, the fact is that local laws vary so operation takes place.
widely that the best guideline to follow is to Save everything if possible, especially in
research those that apply to your target area. retaining video and imagery evidence, as you
never know what might be seen in the secon-
dary areas of the image. Some cases have begun
RECORDING AND RETENTION and been proven based on the background
scene in video recordings. Even when the pri-
As already noted, it is best to make some
mary action, the focus of the video, did not
durable record of the surveillance operation’s
prove to be a violation as previously thought.
results. In some cases, this can prove a suspi-
Pay attention to your background, and review
cion; in others, it could be used to defend the
all materials with this in mind. If storage space
execution of practices of those involved in the
becomes an issue, it might be that noncritical
operation. The materials produced by such
materials have to be discarded. Review these
activities should be retained for a period of
materials prior to removal to ensure that there
time that is appropriate for the material and
is nothing of value in them.
actions identified through that investigation,
S E C URI T Y QU IZ
3. Equipment requirements vary depending
1. Covert operations are intended not to be on the location, nature, and goal of the
known or recognized. operation.
a. True a. True
b. False b. False
2. Personal operations are the least expensive in 4. A proper understanding of privacy issues is
the long run. only important if the case goes to court.
a. True a. True
b. False b. False
IX. INVESTIGATIONS
SECURITY QUIZ 425
IX. INVESTIGATIONS
This page intentionally left blank
C H A P T E R
35
Report Writing and Field Notes
Rav-Zuridan Yisrael
IMPORTANCE OF REPORT
CHAPTER OBJECTIVES WRITING
● Explain the basics of report writing
● Emphasize the usefulness of report One of the most important issues of report
writing writing has to do with liability. Proper report
writing may significantly reduce the poten-
● Explain the purpose of field notes tial liability faced by security officers or their
● Identify the essentials of good report employers. Reports can aid in documenting
writing potential loss that an organization may face and
the response that the organization takes to miti-
gate the risk of loss. Additionally, reports may
aid in determining who is accountable for an
INTRODUCTION incident.
For example, if a security officer is working
As in many other professions, reports are for a contract security company and he/she
essential to the security industry. In fact, report notices a torn carpet that presents a trip haz-
writing is one of the most essential functions ard, that security officer has a duty to report the
for security officers. Some security profes- hazard. If the hazard is not repaired and some-
sionals list the primary directives of a security one is injured, the fact that the officer reported
officer as detecting, deterring, and reporting. it reduces the liability of both the officer and the
Other professionals state that the main duties officer’s company. Once the officer submits the
of security officers are observing and reporting. written report, it is now primarily the respon-
However, in any instance, it is widely accepted sibility of the property owner or property man-
that report writing is of the utmost importance ager to develop an adequate safety or security
in the security industry. Many reasons exist that measure to remedy the situation (i.e., repairing
explain the importance of report writing within the carpet). However, if no measures are taken
the security industry. to remedy the hazard and someone is injured,
427
428 35. REPORT WRITING AND FIELD NOTES
the owner of the property can likely be held lia- ● Names of witnesses
ble and accountable for their inaction. Therefore, ● Notes from interviews of witnesses
it is evident that reports are important in deter- ● Descriptions of vehicles
mining liability as well as accountability. ● List of items stolen
● List of items broken
● Names and contact information of
FIELD NOTES victims
● Time of incident
It is imperative that reports be accurate and fac- ● Arrival times for emergency service
tual. To ensure that reports meet this requirement,
personnel
field notes should be written while conducting ● Nonworking lights (security hazard)
one’s duty as a security officer. Field notes should ● Torn carpets (trip hazard)
be written in an easy-to-carry pocket-sized note- ● Leaking pipes (trip hazard or damaged fire
book. While on patrol or responding to incidents,
suppression system) or any other detail or
field notes are taken as the initial step in reporting
event that will be needed for a report at
incidents, unsafe conditions, and breaches in secu-
another time
rity, violations of policy, or any unusual events.
Field notes are useful in many situations. For
example, if an incident arises that requires the
police department, fire department, or ambu-
REPORTS SHOULD BE WRITTEN
lance to arrive at a work location, it is much
Considering that reports are critical to ade-
simpler to write down the necessary facts while
quately perform one’s duties as a security offi-
handling the incident. Handling certain events
cer, it is necessary to discuss reports in better
can be stressful; however, it will be more stress-
detail. Security officers should write all reports;
ful to have to search for a piece of paper to write
even if a verbal report of an incident is given,
down important details. Additionally, record-
written reports are necessary. Written reports
ing the information as soon as possible after the
are more dependable than verbal communi-
occurrence of the incident helps to ensure the
cation. For example, do you remember what
accuracy of the incident report. For example, if
you were wearing on the 13th day of last month?
an officer observes a vehicle crash into a parked
What did you have for lunch that day? What
vehicle and then drive off rapidly, it is easier to
was the description of the first person that you
write down the make and model of the car and
saw that day at work? The average individual
its license plate number in the field notebook
does not remember such specific details of past
than it is to remember the information 20 min-
events. Additionally, even with the best of inten-
utes later while writing an incident report. Field
tions, either party can forget a verbal report. If
notes provide a means of recording the intricate
there is a conflict regarding whether a verbal
and specific details of an event or unusual or
report was submitted, the issue becomes a mat-
unsafe circumstance. Information to record in
ter of hearsay or a case of “he-said/she-said.”
field notes may include:
A written report is a means to recall the intricate
● Descriptions of suspects details of an event and to verify submission of
● Names and badge numbers of emergency the report. Verification of submission of a docu-
services personnel ment can be via a signature on a traditional
● Vehicle numbers of emergency service report or by printing a copy of a report that has
vehicles been inputted into a database. Not only should
IX. INVESTIGATIONS
QUALITIES OF GOOD REPORTS 429
the report be in written format, it should be usage is important to create a clear and precise
written as soon as possible after an incident and report that is useful to others. An example of a
notes should be taken during the incident if pos- statement that demonstrates poor word usage
sible. This will ensure the most accurate record is “the subject is a short, white male.” That sen-
of the details that took place. tence is very vague and leaves the height of the
suspect to the interpretation of the reader. Better
reporting of the suspect’s description is that
WHAT SHOULD BE REPORTED “the subject is approximately 5 feet and 5 inches
tall.” This makes the description more concrete,
Determining which incidents require reporting as opposed to a subjective description, such as
may seem complicated to novice security practi- short, which may vary from person to person.
tioners. A good rule to follow is: if it is an uncom- Finally, punctuation, grammar, and spelling are
mon event, then report it. It is far better to have important to report writing. If you are unsure
an incident report that is not needed than to need how to spell a word, refer to a pocket dictionary.
a report and not have it. When there is doubt Remember that a report is a reflection of your
on whether a report should be written, it is bet- professionalism.
ter to err on the side of writing the report. Some Concise—A good acronym to remember
examples of events to report include broken when it comes to writing reports is K.I.S.S.
equipment or property, illegal activities, trespass, (Keep It Short and Simple). Conciseness has to
activities against company policies, accidents, do with the brevity of the report. It is not nec-
injuries, hazardous situations, fires, breaches in essary to expound extensively on an incident.
security, and vandalism. However, it is necessary to include all relevant
information and to ensure that this information
is factual and accurate. Additionally, reports
QUALITIES OF GOOD REPORTS are to be objective and impartial; never add your
opinions or assumptions to a report. Your opinions
There are certain qualities that all effective can be shared with necessary parties as needed;
reports should have. A good way to remem- however, they have no place in a report. If your
ber the qualities of a well-written report is the opinion is a likely truth, an objective party is
“Three (3) C’s of report writing.” The 3 C’s of probably going to reach the same conclusion
report writing are a guideline to the character- or consider your conclusion by an objective
istics of a good report. Reports are to be clear, review of your report. However, it is important
concise, and complete. Each of the 3 C’s will be to ensure that the conciseness of a report does
discussed in further detail. not affect its completeness.
Clear—Refers to the readability and under- Complete—This means ensure that all of
standability of the report. A report should be the details are included in the report. One
written legibly or typed to ensure that others method to accomplish this is to consider the
can read it, as it has little value if not understood. “5 W’s and 1 H of report writing,” which is a
Clear also relates to the words used and the sen- guide to ensuring that a report is complete. It
tence structure. It is best to write a report in the requires that you answer the following ques-
simplest and clearest terms, again, to ensure it tions as they relate to the incident: Who, What,
is easily understood. Reread the report, or have Where, When, Why, and How? Obviously, each
others read it, to make certain the correct mes- question is not applicable to every incident;
sage is being conveyed. Additionally, word however, this is a very thorough starting point.
IX. INVESTIGATIONS
430 35. REPORT WRITING AND FIELD NOTES
EMERGING TRENDS
Many organizations are moving toward hav- nature of the incident. The ability to sort a year’s
ing their incident reports compiled and stored in worth of incidents with the click of a button is
a database. The database allows various manag- of great benefit to managers conducting risk
ers to view incident reports without having to assessments on the facility as well as determin-
hand-deliver a hard copy. Additionally, the data- ing trends with certain types of incidents.
base allows users to sort incidents based on the
IX. INVESTIGATIONS
SECURITY QUIZ 431
References
c. Clear, Concise, Compartmentalized
Hess, M. E., & Wrobleski, H. M. (1996). Introduction to pri- d. Concise, Clear, Clever
vate security (4th ed.). New York, NY: West Publishing
5. It is important to state your opinion
Company.
International Foundation of Protection Officers. (2003). in incident reports to ensure that
Protection officer training manual (7th ed.). New York, NY: management can figure out what really
Butterworth and Heinemann. occurred.
Security Guard Management. (2004). Report writing [Motion a. True
Picture]. http://www.sgmnow.com/pages/videos.htm.
b. False
State of New York Division of Criminal Justice Services.
(1995). Eight hour pre-assignment training course for 6. Incident reports must be treated as legal
security guards. documents.
a. True
b. False
7. Field notes are equivalent to incident
S E C UR I TY QU IZ reports.
1. Incidents must always be written in a a. True
way that shows the organization in a b. False
favorable manner. 8. Writing a report is one of the most
a. True important duties of a security
b. False professional.
2. Verbal reports are equally as reliable as a. True
written reports. b. False
a. True 9. A good rule to follow is: If it is an
b. False uncommon event, then report it.
3. There are six (6) questions that every a. True
report must attempt to answer and they b. False
include: Who, What, Where, When, Why. 10. A good acronym to remember when it
What is the additional question? comes to writing reports is H.U.G.
a. If a. True
b. Could b. False
c. How
d. Summary
4. The three (3) Cs of report writing are:
a. Clear, Complete and Concise
b. Complete, Competent, Clear
IX. INVESTIGATIONS
This page intentionally left blank
U N I T X
LEGAL ASPECTS
OF SECURITY
36
Legal Aspects of Security
David L. Ray
435
436 36. LEGAL ASPECTS OF SECURITY
officer may be required to arrest, detain, use there was no written record of the decision. In
force, seize property, and testify in court when fact, the decisions were far from consistent and
charges are laid. For all of these reasons, it is the feudal lords would often have difficulty
important that the protection officer under- resolving an issue and would order that the dis-
stand his or her duties and responsibilities and pute be settled by combat between the parties
the potential liabilities which could arise from (trial by combat). In other cases the feudal lord
them. Their role is complicated by the fact that would order that there be a trial by ordeal such
in some cases protection officers do not have the as drowning, under the assumption that the
same authority that law enforcement has, while decision would be made by a “higher power.”
in other cases they have more.
Protection officers may also be required, in
the course of their duties, to ensure that a per-
Case Law
son’s rights are protected under the U.S. Bill of After the establishment of the royal courts in
Rights or the Canadian Charter of Rights and England, judges would travel out to rural districts
Freedoms. For further information on author- to sit at trials and would return to meet at the Inns
ity in these areas refer to the chapters on Arrest of Court in London. They would discuss their
and Detention and Use of Force. recent decisions, which led to a greater degree of
consistency among them. Law students would
sit with the judges and would write reports of
the judges’ decisions and these became the first
THE DEVELOPMENT
instances of case law that are still used today.
OF OUR LAWS
Once cases were reported in books, it became
much easier to refer to those decisions and fol-
We tend to think of laws as being words
low universal principles. This “case law” is also
written in books and passed by a government
referred to as “precedent” or “the doctrine of stare
authority, but that is only one source of our
decisis.” The principle of case law is fairly simply
laws. There are actually three:
stated: A court must stand by previous decisions.
1. Common law and the civil code of France This case law provides influence in our pres-
2. Case law ent day courts and helps judges to interpret
3. Statutes statutes and arrive at decisions which are fair,
equitable, and consistent with previous court
decisions. Case law also provides defenses at
The Common Law criminal trials (e.g., self-defense) and proce-
The Common Law was developed in feu- dures that govern the police handling of search
dal England. At that time most people could and seizure processes.
not read or write and, therefore, written stat- The principle may sound fairly straight-
utes would not be of much benefit. In order to forward but the common law is still evolving
resolve issues between citizens they would go to adapt to changes within our society and, in
to the feudal lord with their disputes. There application, the doctrine can become extremely
was an expectation that the feudal lord would complex. The weight given to any previous
be consistent (or common) in resolving these decision of another court will depend on a
disputes from one issue to another. Citizens number of factors including whether the court
therefore believed that “laws” were common was within the same legal jurisdiction, the level
throughout the land, even though they were of the court where the decision was made, or
not written down as statutes and even though the similarity in the facts of the case.
and criminal proceedings and should understand imprisoned in a state institution. The prosecu-
the fundamental difference between the two. tor will act on behalf of the state, not on behalf
of the victim (although in some cases, there are
provisions for private prosecutions or compen-
Criminal Law sation for victims of crime).
Criminal laws appear to be established to Types of criminal offenses vary from jurisdic-
protect people, but they are actually passed tion to jurisdiction but they are generally divided
to ensure peace and good order in society. For into those that are more serious (felonies in the
example, it is an offense to assault someone United States and indictable offenses in Canada)
but criminal law treats assault as an offense and those that are less serious (misdemeanors
against society and it is the state which will ini- in the United States and summary conviction
tiate prosecution against the offender and will offenses in Canada). Table 36-1 details examples
impose the punishment. If a fine is imposed it of criminal offenses and Table 36-2 lists the differ-
will be paid to the state or the offender may be ent powers of police, security and prosecutors.
Crime Description
Murder Intentional and unlawful taking of the life of another and may include a death resulting
from the commission of another crime (felony murder)
Manslaughter Causing the death of another as a result of negligence or a reduced level of intent
Burglary Breaking into a premises with the intent to commit a criminal offense
Robbery Unlawfully obtaining the property of another through threats or infliction of bodily harm
Theft Unlawful taking of the property of another. There are also offenses for possession of
property obtained by crime
Computer crime There are a number of computer crimes related to the unlawful altering or deletion of data
or the unauthorized use or misuse of a computer
Police, security, and prosecutors have different powers under the criminal code. Table 36-2 details some of those powers.
*
Note that some criminal offenses may be called by different names; e.g., burglary may be called breaking and entry.
Investigate Investigate on behalf of private Investigate on behalf of public May have investigative authority
party
Seize Some seizure authority on behalf Criminal powers to seize or obtain May have some power to obtain
of private party search warrants search warrants
Arrest Citizen’s power of arrest Criminal law powers May have some powers of arrest
Indict Only when by private May lay charges May authorize or lay charges
prosecution
negligence (e.g., the failure to provide an appropri- Negligence may result in liability during the
ate level of security in an employee parking lot). performance of or failure to provide security
Many intentional torts are closely aligned to duties. Negligence is an actionable cause under
criminal offenses but Table 36-4 shows some common law so that someone who suffers dam-
others. ages as a result of the negligence of another may
Civil liability has caused increasing concern sue to recover their losses. Negligence may be
for the business community, and damages in due to failure to provide an appropriate level of
court actions have increased insurance pre- security, failure to have a contingency or evacu-
miums; hence, some types of liability insur- ation plans in place, or failure to warn someone
ance have become prohibitive to organizations. who is at risk as a result of a security exposure.
Executives and property owners have found Negligence can also be established through stat-
it necessary to defend against these crippling utes such as occupiers’ liability or occupational
costs by increasing security measures and health and safety legislation. Those statutes
through stringent screening and training. The require that the occupiers of premises provide a
protection officer has a strong role to play in safe work environment not only for employees,
protecting businesses against civil liabilities. but also visitors to the property and sometimes
even trespassers. It is the security officer’s duty
to assist the property owner in reducing risks
TABLE 36-3 Crime and Civil Law Comparisons
on the property and to recommend appropriate
Crime Civil Wrong methods of handling those risks. It is also the
security officer’s duty to ensure that emergency
Theft Conversion
procedures are properly followed, that training
Assault Assault or battery takes place to ensure those procedures work,
Trespass Nuisance and that everyone is familiar with them.
Purpose Protect the public good Compensate for damages Imposition and enforcement
of employment contracts
Responsibility for handling Public prosecutor Attorneys for the parties Management and union
Potential outcome Fine or incarceration Damages or court order Court or arbitration award
there was some evidence to believe an employ- while on the property and may refuse to comply
ment offense had taken place, and that the with the search when leaving. The protection
search would result in the discovery of further officer should not force the issue and should sim-
evidence. The company may also be required ply report the matter. Management then has the
to show that the policy is applied consistently opportunity to treat it as a disciplinary infraction
within the workforce or facility and that it does if it is an employee, or has the right to refuse fur-
not target specific individuals or groups. Courts ther entry if it is a contractor or visitor.
and arbitrators will try to strike a balance During the course of a consented search, the
between the rights of the employer or visitor protection officer has the right to seize items
and the right to privacy of the individual. They found, such as the following:
may also look at whether the company consid-
1. Property of the employer or property owner
ered all other reasonable investigative means
that the officer is required to protect and for
before embarking on search procedures. This is
which the subject has no obvious permission
especially true in cases where searches are con-
to possess
ducted on employees or their personal effects,
2. Evidence of the commission of a crime (i.e.,
as the company will be required to show that
company property, burglar tools, controlled
they established procedures to protect the pri-
substances, etc.)
vacy of its employees.
3. Weapons that could be used to injure the
The Private Security Advisory Council*
officer, an innocent third party, or the subject
advises that the following are instances where
4. Items that could help the subject escape
there may be legitimate grounds for a search:
detention
1. Where there is consent by the person being
If no consent exists, the protection officer
searched
has no right to conduct a search. Any items
2. Where there is implied consent as a
found as the result of an illegal search cannot
condition of employment
be seized and may not be accepted in judicial
3. Where it is incidental to a valid arrest
proceedings. However, any of the previously
(although some jurisdictions require
listed items that are in plain view may be
probable grounds for the conduct of the
seized because the seizure is not the result of
personal search)
a search. All authorized searches and seizures
4. Where it is incidental to valid conditions
must strictly comply with established proce-
(e.g., as a condition of boarding a commercial
dures developed by the employer or property
aircraft)
owner. Additionally, protection officers should
Many companies also have policies requiring be familiar with statutes for their jurisdic-
people to submit their vehicles or personal effects tion concerning search and seizure by private
to search on leaving the property. These are usu- persons. This will minimize the possibility of
ally in conjunction with a notice at the entrance criminal or civil actions against the officer and
indicating that these items may be subject to the employer or property owner. Familiarity
search. Even though an employee or visitor may with the local laws will also help assure that the
imply that they will allow their vehicle or per- employer’s or property owner’s policies and
sonal effects to be searched by entering the prop- procedures concerning search and seizure are
erty, they have the right to change their mind in compliance with the statutes. Searches are
*Private Security Advisory Council, Scope of Legal Authority of Private Security Personnel, Law Enforcement Assistance
Administration, U.S. Department of Justice, 3 (1979).
Another important exception to the hearsay investigation. A bad interview during the prelimi-
rule is the admissibility of confessions in court. A nary investigation can cause information obtained
protection officer would not normally be allowed during later interviews to be unusable. The pro-
to repeat (in court) a statement made by a suspect, tection officer should know what he or she legally
but if the statement is accepted as a confession, can and cannot do during interviews.
it may be admitted as long as it was voluntary. Under the Miranda rule in the United States
A confession cannot be admitted in court as and Charter of Rights requirements in Canada,
evidence if there were threats, intimidation, or the police are required to advise an accused of
promises that induced the accused to make the their right to counsel, that they are not required to
statement. A threat does not necessarily have to make a statement, and that the statement may
be a threat of violence. A threat to terminate some- be used at trial. There is no duty to “Mirandize”
one’s employment if they don’t tell the employer or Charter Caution the private individual
what happened may be enough to question who gives a confession. There have been some
whether the accused confessed because he really attempts to argue that private security may be in
did it or whether he confessed because he wanted a “position of authority” in conducting investiga-
to keep his job. Similarly, a simple promise that tions and interviews and therefore the U.S. Fifth
“things will go better for you if you tell us what Amendment or Canadian Charter rights apply.
happened” may be sufficient to question the reli- These challenges have been largely unsuccess-
ability and admissibility of a confession. ful, although in Canada it has been held that an
Usually the police will be involved in inter- employer in a governmental function (e.g., fed-
viewing an accused to receive a confession, but eral, provincial, or municipal government bodies)
there may be occasions where a statement made must follow Charter provisions in conducting
to a protection officer will amount to a confession investigations. Generally, the protection officer
and may later be used as evidence in court. A con- need only ensure that the confession was will-
fession is simply a written or oral statement made ingly given. A confession need not be a lengthy
by an accused. Even a denial by the accused may written statement; it may be a simple oral state-
amount to a confession if the prosecutor is able to ment such as “I shouldn’t have taken it.” The
prove that the accused lied in making the denial officer should accurately note any statements by
(e.g., an attempt to set up an alibi). The protection the accused so that there will be no confusion
officer should keep detailed notes of anything that later in court as to exactly what was said.
an accused says because it may later contradict a If the officer has occasion to interview a sus-
statement made to the police. For example, an pect, the following steps will help ensure the
accused may tell the protection officer that he admissibility of a confession:
wasn’t in the area when the offense was commit-
ted and he may later tell the police that he was in 1. The suspect must be offered a chance
the area but he didn’t do it. The two statements to contact counsel and should be given
constitute a lie and may be admissible in court as the opportunity to carry on a private
proof of guilt. conversation with counsel.
Interviewing witnesses and suspects requires 2. The object of the interview is to learn the truth,
techniques that not everyone can master to the not to induce a pattern of deceit or obtain
same degree. Generally, the protection officer will answers that the questioner wants to hear.
interview witnesses, victims, and/or suspects dur- 3. There should be no actual or implied threats
ing a preliminary investigation. More thorough or promises.
interviews may be done later by investigators or 4. The accused should be given the opportunity
law enforcement personnel during the follow-up to give a full explanation.
37 Use of Force
38 Defensive Tactics and Officer Safety
39 Industrial Hazards, Safety, and the Security Patrol Officer
40 Apprehension and Detention Procedures
This page intentionally left blank
C H A P T E R
37
Use of Force
Charles T. Thibodeau and
Christopher A. Hertig
449
450 37. USE OF FORCE
will have an impact on the outcome of that case. necessarily connotes the use of verbal deescala-
Courts will consider the following issues: tion, removing persons from the “conflict zone,”
negotiating conflict resolution, maintaining a
1. Did the officer act under a reasonable belief?
noncombative atmosphere, and calling in public
2. Did the officer have a duty to retreat?
law enforcement. These are some of the many
3. Did the officer give the aggressor a request
alternatives that should be attempted before
or command to desist?
using force.
4. Did the officer follow department policy
and procedure?
1. Take time—slow down the action. Haste
5. Did the officer follow department training?
gets people hurt! Haste makes casualties.
6. Did the force used produce the desired
2. Awareness—recognize potential threats.
results?
Being alert is a key issue.
7. Did the officer place any third party in
3. Evaluate—get all the facts and pieces of
jeopardy?
evidence that are available. Understand the
8. Will the truth be relevant?
problem before acting to solve it.
9. Will the witnesses tell the truth?
4. Never respond in anger! Take a step back.
10. What or who will the jury believe?
Take a few deep breaths. Take your time.
11. What or who will the judge believe?
5. Be an actor—preclude (prevent) the problem
12. What or who will the public believe?
from escalating and erupting—not a reactor.
6. Maintain a safe distance.
RETREAT 7. Smile. Be as pleasant as appropriate under
the circumstances.
The basic rule is: “If you can retreat without 8. Be polite—show respect to everyone,
injury to yourself or others, you must retreat.” The including the aggressor.
word “retreat” does not mean to run away and 9. Really care about people! Caring is
go hide somewhere. It means to move to a safe projected in an officer’s demeanor.
place, remaining in view of the conflict zone, 10. Apply active listening techniques to show
but at a safe distance. It includes being behind interest in what another is saying.
cover (objects or materials that protect the offi- 11. Call for backup before acting, using force
cer) and calling for backup. including the police when necessary.
If, while under attack, the officer sees an 12. Recruit assistance from nearby persons if
opportunity to retreat, that officer must ter- necessary.
minate the use of force and retreat, but only if 13. Ask the perpetrator’s friends and relatives
he/she is not placing him/herself, or others, to speak to the perpetrator.
in jeopardy. In deadly force confrontations, the 14. Be slow to speak, slow to anger, quick to
officer has no alternative but to retreat if that listen.
option is available. 15. If all else fails, expect to be hit or grabbed.
16. Expect any hit to hurt, but brush it off. It is
not the end of the world.
FORCE ALTERNATIVES DEFINED 17. Engage in tactical retreat; when things get
hot, back off and get behind cover.
Alternatives to the use of force amount to any 18. Use loud assertive commands: “STOP!” and
method or tactic that can be used to deescalate “NO!” Hit him with your voice.
incidents without the use of defensive weap- 19. Use repeated commands: “DROP THE
ons, threats, or aggressive action. This definition KNIFE!” “DROP IT.” “DROP IT.” “DROP IT!”
will be filed, however, is for false arrest. All question is: “Who is the person we most earnestly
stops where the subject is not allowed to leave want to control?” Is it the drunk, the jealous
are by definition an arrest in a civil suit. spouse, the angry employee? No, it is us! In order
In addition, there is no room in the law on to maintain control of others, we first must find
arrest for cuffing someone for officer safety a way to control ourselves when under pressure.
like the police do, with the intent of uncuffing Remembering the formula set out below might
them and letting them go after the danger has help keep everything in perspective when faced
passed. Putting the cuffs on, no matter the rea- with high-stress, potentially aggressive situations.
son, implies the subject is under arrest. Taking
the cuffs off later and “unarresting” the person The Control Formula
will require a lot of explaining! In most cases a
citizen, who is not a sworn peace or police offi- C ⴝ I/E
cer, has no qualified immunity (protection from 1. CONTROL ⴝ INTELLECT over
suit under certain circumstances, such as hav- EMOTIONS
ing “reasonable suspicion” or “probable cause”) 2. Add a Problem: I/E ⴙ P ⴝ E/I
and is subject to suit. 3. Add Training: E/I ⴙ T ⴝ I/E
If you do not intend to follow through with 4. I/E ⴝ CONTROL
calling the police and having the subject taken to
jail, never put cuffs on him or her in the first place. Key:
The only reason to cuff a subject is to prevent C Control/I Intellect
them from escaping during your citizen’s arrest, E Emotion/P Problem
and for the protection of the officer and others T Training
while waiting for the police to come. Remember,
only the police can remove those handcuffs! If the The above formula means that control is
security officer removes the handcuffs for any equal to “I” (intellect) over “E” (emotions). Thus,
reason, other than a medical emergency, they are we are in control when our intellect rules our
becoming a “liability initiator.” emotions. When we introduce “P” (problem) to
During the arrest process, searches are the equation, it may have the effect of turning
allowed, but only weapons searches. These are the equation upside down. Thus, I/E P E/I.
searches of the outer clothing for hard items Emotions then are in control of our intellect!
which could reasonably be expected to be a When running on raw emotions, we can get
weapon. Generally speaking, security officers hurt or we lose control and hurt someone else.
should not be searching purses, backpacks, Without realizing it, we might use excessive
pockets, fanny packs, or any other part of the force, which might lead to getting sued.
person or property of the person during a citi- However, adding “T” (training) to the equa-
zen’s arrest. It is probably best to secure these tion tends to reverse the negative effects of “P.”
out of the reach of the arrestee and have the At this point the equation is E/I T I/E.
police search them when they arrive. In addition, as is pointed out above, I/E Control.
What all of this means is that by developing a
trained response to perceived use of force situa-
A FORMULA FOR SELF-CONTROL tions, emotions can be held in check. With the
intellect in charge, officers can more effectively
Use of force is all about control. Sometimes maintain control. That is why verbal deescalation,
pro-active preventive security plans break down, if practiced regularly, has proven to be an excellent
and force is required to maintain control. The nonlethal defensive weapon to use in aggressive
WARNING: Weapons should not be carried officer has reported the incident and taken a
or used without documented, professional safe position.
training.
2. Verbal de-escalation. After getting the
Step 8. The next level of escalation is the attention of the subjects involved in the
use of deadly force such as firearms, impact aggression, the officer commences a
weapon strikes to the head or neck, or communication with them. This verbal
empty-hand blows to the head, neck, throat, communication can be anything from a
and so forth. This level of force must be friendly greeting to a loud verbal command.
the absolute last resort. There is only one The officer should never be alone; one to
acceptable justification for the use of deadly three others should be with the officer for
force, and that is the protection of human life. safety when possible. Always bring one more
Use of deadly force to protect property will backup person than the number of people that
open the officer and their employer up to must be confronted. This may not be possible
both civil and potential criminal prosecution. in all cases but it does offer a safer approach
WARNING: Taking a human life or causing to a dangerous situation.
serious injury carries a heavy cost. It is an If the officer is within the grasp of the aggres-
act the officer will remember for the rest of sor, the officer should use force to break away,
his/her life and will most likely result in a give space, put something between the officer
civil suit. These drag on for years and cost and the aggressor, and then continue the dia-
massive amounts of money. Additionally, logue at a safer distance.
there may be criminal charges filed. The officer must ensure that the aggressor
Obviously, avoiding this is advisable. Retreat is not forcing him or her into a state of preclu-
if at all possible, always verbalize, and know sion, where maximum force will be necessary to
where cover is and get behind it. escape. At the same time, the officer must ensure
Escalation/Deescalation Continuum that the aggressor has a back door or escape
Applications route, and is not being backed into a corner. If
the aggressor escapes from the area, the security
To better understand the applications of the officer should not give chase but should secure
Escalation/Deescalation Continuum, the fol- the area and the individuals in that area. Note:
lowing scenarios have been prepared: Chasing suspects may be appropriate but it is
1. Uniform presence. The officer arrives on the filled with risks, including injuries to the offi-
scene, observes the situation, and makes his cer, the suspect, and most importantly, innocent
or her presence known to all those involved. bystanders. Employer policy must be followed
This is known as “uniform presence” and it regarding pursuit.
is a very powerful tactic, correcting 25% to
3. Soft empty-hand tactics. After the initial
50% of aggressive situations.
introduction of uniform presence, the
The officer radios for help if needed, iden- aggression may suddenly stall out for a
tifies escape routes, identifies items to use to short while. During verbal de-escalation
block aggression if needed, identifies weap- communications the officer should offer to
ons of opportunity that could be used against help the subjects, ask questions, and give
the officer, and evaluates each person in the advice. If the truce holds longer, the officer
immediate vicinity of the aggressor. The com- and support personnel attempts to remove
munication stage will commence as soon as the the aggressors one at a time by use of a
SAFETY TIP
Remember that when applying a soft, empty-hand tactic there is no pain compliance applied. The
touching is merely a gesture to get movement started in the direction the officer wants the subject to take.
In most cases, protection officers are not center of thought, feeling, and behavior, which
armed with firearms. There is not a lot of advice is consciously or unconsciously adjusting and
that can be given beyond verbal deescalation. relating the body to its social and physical envi-
Sometimes, using logic works when nothing else ronment. Some identifying characteristics of
will. If talking buys a few seconds of time and this phenomenon are the following:
seems to be working, keep it going. Hopefully, ● Rapid heartbeat
the aggressor will see the error of his or her ● Rapid mental processing
ways and drop the weapon or flee from the ● Sweating
conflict zone. ● Dilated pupils
Summary: Obviously, officer safety is job ● Tunnel vision
number one. Retreat tactics are essential when ● Auditory occlusion blocking out sound
experiencing imminent jeopardy. Avoiding ● Numbness and heaviness felt in extremities
physical confrontations at all costs is as essen- ● Loss of dexterity in fingers, arms, legs
tial as avoiding preclusion. In addition, the best ● Shortness of breath
nonlethal defensive weapon an officer carries ● Everything perceived in slow motion
(and they all carry this one) is their commu- ● Loss of bodily functions—stopping breathing,
nications skills. Verbal deescalation skills are
bladder release, passing out, or paralysis
of paramount importance. This is the essence of
defensive tactics. Assignments with a lot of vio- If this happens to the officer as he/she
lent, aggressive incidents should be manned approaches an aggressive person, there is no
by officers who are devoted students of hostile telling what might result. Either the officer will
communications mitigation. In this way, most be rendered defenseless or he/she may respond
uses of force can be averted. with excessive force. Those who feel this hap-
pening should make a tactical retreat until they
can regain their composure. Only deep relax-
OFFICER SAFETY ISSUES ation can counter this condition and alleviate
the symptoms. Unfortunately, in most critical
There are four individuals or groups who incident situations, there is not enough time to
the security officer is concerned with protect- retreat. The only way to prevent this condition
ing. They are the security officer him-/herself, is through training. An officer who is trained to
the apparent victim, the general public, and the handle critical incident situations and aggressive
perpetrator. It is critical to understand that the persons is not as prone to these symptoms. One
order of importance is as listed; officer safety is other helpful option is to call the police for assis-
primary, because if the officer is taken out, there tance if the officer is alone and/or the symptoms
may be no hope for the victim or anyone else. of tachypsychia appear. The symptoms could be
As pointed out above, self-control is the most a warning sign that the officer is overwhelmed
important factor when engaging in the use of by the incident and needs to retreat.
force. It is not unusual, when faced with an
aggressor, for the officer to become extremely
nervous, tense, and shaky. These signs are the OPTIMAL DISTANCE
body’s warnings that it is approaching a fearful
situation. Left unabated, this shaking and fear While approaching an aggressive subject, an
may escalate into something called tachypsy- officer can inadvertently set off an act of aggres-
chia. “Tachy” means rapid or accelerated and sion simply by getting too close to the aggres-
“psyche” means the mind, functioning as the sor. Entering the aggressor’s private space can
use hard verbals, clear bystanders, and remove 1. Recognize your own emotions. In itself,
dangerous items, but they should never attempt this causes the professional to calm down.
to separate people who are fighting. In most people, violence is reached in
stages—from anxiety, to defensive behavior,
ELEMENTS OF AGGRESSION to physically acting out violent behavior.
Cooling off the escalating violence-prone
An aggressive situation is usually more com- situation is best done by remaining calm
plex than a simple case of one person being and professional.
upset with another. There are usually highly 2. Remember that when a person is in a rage,
charged emotions driving the aggression. The options cannot be seen. As people grow
trick is to attend to the business of assisting, angrier, they fail to realize that they have
without getting dragged into one side or the several options. They usually only see their
other of the controversy. It is important to rec- options of fleeing or fighting. Other options,
ognize that aggression has two parts: the fuel such as discussing the problem and seeking a
of aggression and the means of aggression. The solution, may not be considered. Rage takes
fuel of aggression consists basically of the emo- over cognition. The formula for rage is clearly
tional side of the confrontation and may include C E/I (Control Emotion/Intellect).
any number of the following: 3. Avoid humiliating subjects. Some officers
create problems when speaking to a subject
● Perceptions/attitudes in a sensitive situation. When this happens,
● Belief systems the subject will shut down communication,
● Rebellion a condition that could become explosive.
● Mental/medical conditions The best policy is to play it low key. Say as
● Chemical abuse problems little as possible. Protect your space and be
● Revenge, jealousy, passion ready to execute self-defense plans at the
● Feelings of inadequacy first indication of aggression. Remember
The means of aggression consists basically that everybody—even the serene, little old
of the weapons of the confrontation and may lady—is potentially violent under the proper
include any number of the following: circumstances.
Slowing down the action, respecting the
● Hands, feet, elbows, and head subject’s personal space, and using empathic
● Nonlethal weapons (aerosol or chemical listening skills help to deescalate the
sprays) situation.
● Lethal weapons (knife, gun) 4. If the encounter becomes tough, get or give
● Vehicles space. As the aggression level escalates,
● Weapons of opportunity (things lying around) the best relaxant is space. Clear the conflict
zone! If two people are exchanging heated
DEALING WITH AGGRESSION words, both should take a walk—in
opposite directions. Immediate separation
Violence-prone situations can easily lead to of antagonists can prevent a confrontation;
injury of the officer or others. In addition, a law- they both should be “out of sight” and “out
suit could result. What can be done in violence- of sound” of each other. Get them turned
prone situations to reduce the risk of using around and as far away from each other as
excessive force? The following are a few ideas is practical. If possible, use walls to separate
on safely managing violence-prone encounters: the subjects.
the likelihood of injury is low, then the officer ● Keep hands on the preferred weapon, or
may wish to follow some of these deescalation have weapons drawn.
suggestions: ● Call for backup before entering the conflict.
● Respect the subject’s dignity. Be as polite as
● Give subject directives to reach a solution.
possible and never demean people.
● Keep talking and negotiating a solution.
● Do not shout commands.
● Listen intently to subject’s words.
● Be careful not to become part of the problem.
● Project empathy with subject’s cause.
● Assume officer safety distance (10 to 15 feet).
● Observe his hands and body language.
● Provide a pleasant greeting such as “May I
● When backup arrives conduct a search for
help you?” or “How can I help you?” weapons.
● Assume a noncombative attitude.
● Cuff and search for officer safety.
● Use nonthreatening questions, and avoid
● Continue dialogue with subject.
“Why?” These tend to put someone’s
● Listen to witnesses; take names, addresses,
reasoning process “on trial.” and phone numbers.
● Slow everything down. Speak a little slower
● Take notes of what witnesses say. Use quotes
and move a little slower. Just a little. from the witnesses.
● Be calm, as “calmness is contagious.”
● Make the decision to detain, arrest, or release.
● Keep hands chest-high and ready to react.
● Use deadly force only when a life is
● Attempt to move subject away from conflict threatened or serious bodily injury is
zone. imminent.
● Listen intently to subject’s words.
● Project empathy with subject’s cause.
● Observe subject’s hands and body language. LETHAL AND LESS-THAN-LETHAL
● Conduct a visual frisk; and check for WEAPONS MANAGEMENT
observable weapons.
● Look for weapons of opportunity. The employment of weapons is often grasped
● Listen to peripheral persons. They can be at by protection officers in the wake of a fright-
witnesses, “cheerleaders,” or assailants. ening experience. Fear is usually the primary
● Keep talking and negotiating a solution. motivator for protection officers asking man-
● Practice officer safety at all times. agement if they can be armed. Unfortunately,
● Make the decision to arrest or release. weapons do not solve the threat problem all by
themselves. They are tools that are necessary in
Procedures for dealing with a violence-prone certain circumstances. They require increased
individual differ somewhat from dealing with responsibility and skill to be employed in an
the average aggressive situation. If the likelihood acceptable manner. Handcuffing a resistant sub-
of injury is certain or extremely high, the officer ject is difficult, and must be done tactfully and
may wish to follow some of these suggestions. tactically. Spraying an assailant does not negate
● Subject’s dignity is not the main priority. the threat; it merely helps to control the person.
“Defanging the snake” is the priority! The officer must still step out of the way of the
● Try to respect the subject’s dignity even aggressor and take appropriate follow-up mea-
though this is not the main priority. sures. The same is true with impact weapons
● Respect officer safety distance. and even firearms. Protective movement out of
● Assume a self-defense attitude. the danger zone, employment of the weapon,
● Use loud, clear, directive commands for and proper follow-up must be done for any
officer safety. weapon.
b. Who made the decision? truthful facts of the case. Unfortunately, in our
c. What is the decision-making process litigious society, where cash-hungry lawyers
based on? and an aggressive media lie in waiting for the
• Independent research studies? next abuse of force case, the officer cannot be
• Medical research? carefree. The report must be written, taking
• Comparative bids? into consideration the technical requirements of
4. What type of initial training is required? criminal and civil liability, in both state and fed-
5. Who can provide this training? eral court.
6. What type of refresher training is given? Know the audience! Assume that the paper
7. Who can provide this training? about to be written will be in the hands of an
8. Can instructor qualifications be clearly opposing attorney, and that you, the officer, will
demonstrated to the satisfaction of a court? be in front of a judge in the near future. If the
9. Is training adequately documented? use of force required a firearm, drawdown, or
10. Is a continuous tactical review of the shooting, a pain compliance tactic, a chemical
weapon’s use in place, which shows how or electronic incapacitation device deployment,
it is actually being used? This must be as use of a baton, fists or feet confrontation, the
detailed as possible so that it is possible to report must be timely, thorough, concise, and
create effective procedures on the use of the accurate. Above all, the report must be true. The
weapon. facts are what is important to record.
11. What training have supervisors had in the While writing the report, the officer must
use of the weapons? cover the following:
a. Initial training?
b. Periodic training? 1. NECESSITY (What the subject did)
c. Training or education above and beyond a. Self-defense.
what line officers receive? b. Defense of others.
12. Are reasonable and enforceable policies c. Incident to arrest and escape prevention.
governing the use of the weapons in effect? d. Incident to ejection from the property.
13. Are weapons carried by, or accessible to, e. Protection of property.
officers who are off-duty? 2. REASONABLENESS (What the officer did)
14. Is weapon retention addressed? a. Followed department policy.
15. What is the skill level required for the use b. Followed department training.
of the weapon? c. Followed supervisor’s instructions.
16. Does the weapon fit in with other weapons d. Deployed each tactic with restrained,
used by the organization or other agencies measured, intentional and minimal force.
that the organization may interact with e. Assured no offensive moves were made
during an emergency? and that all tactics were defensive as
applied.
f. Provided medical follow-up (first aid,
REPORT WRITING IN USE-OF- 911 call, etc., as needed).
FORCE CASES
3. THE REPORT MUST BE BALANCED AND
What is involved in writing the report of COORDINATED
an incident where use of force was reasonable a. The report is clear, concise, and
and necessary? It should be enough to just sit complete.
down and write, in chronological order, the b. The report follows a chronology of events.
4. ______ means that officers must show that d. That the actions taken conformed to
they had no other alternative than to use employer policy and training
force. 9. The following are three recommendations
a. Jeopardy on how to safely manage violence-
b. Retreat prone encounters. There is also one
c. Preclusion recommendation that you should never
d. Manifest intent try. Which one is the recommendation you
5. Objects or materials that protect one from should never do?
bullets or other projectiles such as rocks that a. Recognize your own emotions
are thrown is: b. Remember that when a person is in a rage,
a. Concealment options cannot be seen by the aggressor
b. Cover c. Do not waste time evaluating the situation;
6. Control _______ /emotions. react immediately before anyone gets hurt
a. Training d. If the encounter becomes tough, get or
b. Experience give space
c. Problems 10. Report writing after a use of force is very
d. Intellect important. What the officer writes or fails
7. The security officer must use alternative to write can get that officer in trouble if the
use of force whenever possible. Which of subject decides to bring a lawsuit. Therefore,
the following is an alternative to the use of remember that you may be writing to the
force: lawyers, a judge, or a jury in a civil lawsuit.
a. Take time, be patient, and slow down the While writing the incident report, the officer
action must include all the following, except:
b. Evaluate the situation, gather facts a. Be sure to describe the facts in such a way
c. Call for backup before approaching as to support a case for NECESSITY
d. All of the above b. If the subject was injured, be sure to state
8. There are five primary justifications for using that you accidentally injured the subject;
force. Which of the following is not one of it was not intended
them? c. Be sure to explain how the officer
a. That the aggressor was known to be a followed training, policy, procedure, and
troublemaker supervision
b. That harm would come to the officer or a d. Be sure to describe the facts in such a way
third party if force was not used you can prove REASONABLENESS
c. That the actions taken were necessary
38
Defensive Tactics and Officer
Safety
Inge Sebyan Black
471
472 38. DEFENSIVE TACTICS AND OFFICER SAFETY
Every person’s primary goal is to avoid being lights, so that they illuminate the area of
injured. Secondary to that would be the protec- observation and not highlight the officer.
tion of others, and then protection of property or 4. The security officer should use all senses.
assets. Officers need to be aware of basic conflict Often, the sense of smell or hearing will give
resolution concepts and must be prepared to use away a potential threat long before it is seen.
them if the situation calls. While it is impossible
Of course, the underlying theme is that
to train for every given scenario, it is important
potential threats should be watched for and
to emphasize the necessity of training. Training
responded to accordingly. Do not rush into
is the single most important factor in preventing
potential conflicts, as this does not allow time
an officer from being injured or killed.
for consideration of additional threats, or a full
understanding of the incident itself. There are
AVOIDING POTENTIAL times that training will help in choosing the
SITUATIONS appropriate response if the officer or others are
in imminent danger.
In most cases, avoiding direct conflict is the
ideal tactic. Officers are often told to “observe
KNOW YOUR LIMITATIONS
and report,” yet they rush into conflict despite
this. The execution of duties can be achieved,
A thorough understanding of what can
in most cases, without being directly in harm’s
be done, and what is permitted to be done, is
way. Observing an intruder, while calling the
absolutely essential. Without this, any combat
incident in to dispatch or local law enforcement,
situation can result in extreme physical injury,
is the ideal response, and provides the relative
followed by emotionally painful litigation.
safety of distance from the subject. Trying to
The security officer should become famil-
apprehend an intruder can quickly escalate
iar with his or her own physical conditioning.
the situation.
Most people do not know how quickly they tire
Words are the most effective tool for over-
when faced with a prolonged combat encounter.
coming resistance and hostility; however, there
Certainly a fight which ends up on the ground in
are clearly situations when force appears to be
a grappling situation is extremely tiring. Regular
the only remedy. At those times, officers must
cardiovascular conditioning, within a physician-
be prepared to use some type of force, within
approved program, will not only benefit one’s
appropriate limits.
ability to endure such stressors, but will give a
While at a post, officers often encounter situ-
far better understanding of what the officer is
ations where circumstances require use of a
physically capable of sustaining.
defensive tactic. Surprisingly, one of best defen-
On the legal side, it is imperative to study
sive tactics is the avoidance of unnecessary con-
local laws and determine what is permitted
flicts. When performing protective duties, one
in the area with regard to responses to aggres-
should do the following:
sion, observed crimes, and similar situations.
1. Use caution at all times. Do not rush into One must act within these guidelines to reduce
areas that provide concealment for potential the likelihood of litigation. If a person is injured
aggressors. as a result of one’s actions, or an incident in
2. Call for assistance. which the security officer participated, chances
3. Use lighting to the best advantage. When are good that litigation will follow. If the officer
patrolling an area at night, a security officer has acted within the guidelines of that juris-
should walk behind any ground-mounted diction, the charge will be easier to defend. In
in various situations. Security guards can utilize kill or injure to fully understand defensive tactics.
this information at the beginning of their duty. Some of these are broken bottles, Molotov cock-
When a threat assessment is done, it may be tails, rocks, and miscellaneous projectiles. Also,
shared with the security force or the security an unplanned attack may result in the use of
guard may have to mentally perform his or weapons of opportunity, such as a pipe or board.
her own assessment. Some of the threats that If a security officer has at least some of the equip-
may be faced are listed below. To repeat, know- ment listed earlier in this chapter and has learned
ing what is being protected will help deter- to conduct a threat assessment, he or she has a
mine which of the threats are most likely to be much improved likelihood of a long and safe
encountered. The next step in a formal threat career in the security profession.
assessment is to examine the risks. This chap- The possession and use of a weapon are
ter will not go into great detail about this, but it typically controlled by the employer, client,
needs to be understood that once the threat has and local law enforcement. In many cases, pos-
been identified, it is imperative that a security session of a weapon is prohibited; in others,
officer understand the risks associated with that required. In any case, a thorough understanding
particular threat. of the policies and laws that apply to a specific
Simply put, a threat assessment is likely some- situation is critical.
thing every security officer does daily without One of the greatest liabilities an organiza-
realizing exactly what they are doing. It means tion can face involves issuing deadly weapons
knowing in detail what it is that is being pro- to security officers. This is true for both propri-
tected and what the value of that asset is to oth- etary and contract officers. Obtain and review
ers. This will help in identifying where threats all legal, company- or client-imposed regula-
may come from and the type of attack that may tions prior to carrying any form of weapon.
be encountered. Each post that is assigned will The expectations of all involved parties must
have its own unique challenges. For example, be clearly understood, if one is to follow them.
one might reasonably assume that an attack Once this is achieved, the regulations must
from organized crime might involve firearms, be followed at all times. They are typically
while the threat from a radical group might be designed to protect the weapon carrier from
bomb-related. Potential threats include: increased liability related to improper usage. If
any questions arise related to those regulations,
● Terrorists it is essential that proper explanation and clari-
● Organized crime fication are sought.
● Common criminals Once the security officer understands the reg-
● Disgruntled employees ulations in which a weapon will be carried and
● Radical groups (i.e., animal rights, anti- used, one must then be properly trained to do so.
abortion extremists) Just as training for unarmed techniques, the level
● Vandals of realism in weapons training must be high,
with numerous repetitions. Continued training,
to retain a skill level, is also critical. Having been
DEFENSIVE TACTICS considered an expert at one time does not guar-
AND WEAPONS antee that the skill will remain high over time.
Constant review and practice are required if one
Some of the weapons that might be faced in is to retain an achieved level of proficiency.
today’s world are guns and bombs. It is impor- It is also essential to know and understand
tant to be vigilant about other weapons that may the specific functions and abilities of any
Another valuable tool at an officer’s post is By definition, the purpose of force is to per-
post orders. Again, this chapter will not exam- suade, to seek compliance, to impede actions,
ine all the particulars about post orders; how- or to stop actions. When the purpose is any
ever, it is important to know that these orders, of these, the force to be used should be deter-
written by management, may give some insight mined by the perceived threat. Critical to the
understanding of how one responds to a threat level of force for which they represent. When
is the concept of a relative level of force. Levels following this progressive chart, one should
of resistance can be summarized as: note that the responses appearing at the top
are generally perceived to be less forceful than
● Psychological intimidation those that appear near the bottom. With this in
● Verbal threat and/or resistive dialogue mind, it is essential that any response to a situa-
● Passive resistance tion falls as close to the top of this chart as pos-
● Defensive resistance sible, while still allowing those responding to
● Active aggression protect themselves or others from great bodily
● Aggravated active aggression harm. In most cases, any response should start
The actions of the persons that is not comply- at the top of this progressive flow, and then
ing will determine the level of force used. move toward more forceful responses. If the
It is critical that company policies regard- current level of force is insufficient, this will
ing use of force are adhered to. Some compa- show that as the responder, there was no intent
nies require that before officers can physically to cause great harm and the less forceful options
restrain an individual, the subject must first be were first applied. Often, it is the attempt to do
placed under arrest by either the security officer less harm initially that convinces a court that an
or a certified peace officer. The only exception officer responded to an existing threat with only
to this is when an officer defensively uses phys- due care and required force. It is the officer that
ical force to create space between him-/herself immediately jumps to the bottom of the chart
and the subject, or when separating individuals when responding to a threat who more often
who are engaged in a verbal altercation. find himself/herself on the losing end of a civil
Other policies may limit the use of force, suit or facing criminal charges.
to the least amount reasonably necessary to In Table 38-1, you will note that the situation
accomplish the intended objective, to overcome and perceived level of force are indicated in the
any resistance encountered, and for protecting following ways:
the safety of others. In determining the amount Control of Cooperative Persons—
of force reasonably necessary, the following Individuals who do not carry out a lawful
guidelines should be considered: order but are not threatening or resistive
● Officers do not attempt to use types in their actions. They may require some
and degrees of force which appear to be convincing to do as they are ordered.
inadequate to accomplish the officer’s Control of Passive-Resistive Persons—
intended objective. People who refuse a lawful order and
● Officers do not become involved in attempt to pull away from being led in the
protracted struggles or protracted hand-to- right direction. These persons do not attempt
hand combat, which can frequently result to harm or manipulate the officer but refuse
in an increased risk of injury to the person to cooperate.
being arrested. The officer is encouraged to Control of Active-Resistive Persons—
use a type and degree of non-deadly force A situation in which the subject is not
which appears reasonably necessary to bring only refusing a lawful order, but is
the person under control quickly. intentionally pushing the officer away,
trying to manipulate the officer’s hands or
In Table 38-1, the various types of defensive arms in such a manner as to make low force
responses are ranked, based upon the relative options ineffective. These persons may make
Control of Active-Resistive Persons Medium Force Weapon-Assisted Pressure Point and Pain Controls
occasional aggressive movements or lash out The specific responses can be explained as
in a disorganized and relatively ineffective follows:
manner.
Verbal Persuasion—Describing the lawful
Control of Active-Aggressive Persons—
order to the subject without placing the
Subjects who, through their verbally or
officer’s body in their intended line of
physically expressed intentions, intend
movement, or in any manner intimidating
to inflict harm upon those attempting to
or directing them through physical motion
impose a lawful order upon them or others
or presence. In most cases, this is the first
who are nearby.
moment of contact with a subject. Often, if
Control of Active-Combative Persons—
handled properly, the level of force does not
Subjects who, through verbal or physical
need to progress beyond this point!
intentions, intend to inflict great harm,
Body Language and Positioning—Placing
including an attempt to kill, on those
an officer in a doorway that the subject is
attempting to impose a lawful order upon
attempting to enter. Position an outstretched
them, or to others who are nearby.
hand, palm forward, to indicate that entry
The perceived level of force would be an would be resisted if attempted. There is
indication of how the average reasonable per- absolutely no physical contact at this level of
son, upon witnessing the techniques performed, response!
might assess the aggressiveness of the officer’s Physical Contact Controls—By making
response. In general, it is better to respond with contact with the body of the subject, the
as low a level of force as possible, while still act- officer is now utilizing perceived force. This
ing to preserve the health and safety of all per- level of contact would include actions as
sons involved. simple as a hand on the arm to guide the
subject to the proper exit door. Any contact case the subject has an unusual reaction to the
made with the subject will fall into this, or a chemicals.
higher level, of force.
Weapon-Assisted Controls—Use of an
expandable baton, nightstick, or even a radio
ALL FORCE BEYOND THIS POINT to physically manipulate the subject falls into
REQUIRES TRAINING BEYOND this level of force or a higher level. Through
THE INTRODUCTORY the introduction of a weapon or tool, the
OFFICER LEVEL officer has increased the overall level of
force in the situation. This phase would
include not only directing a person with the
Joint Control Techniques—These techniques
use of a tool or weapon, but also the use of
rely on manipulation of limbs to entice
these to increase the effectiveness of joint
the subject to move in a desired direction,
manipulation techniques.
cease or initiate a desired action, or comply
Weapon-Assisted Pressure Point and Pain
with the wishes of the person executing the
Controls—Use of a weapon to increase the
technique. An example would be grasping
level of pain that a subject experiences, as a
the arm at the wrist and elbow and turning
result of applying it to critical points such
the arm in such a manner that the subject is
as nerve bundles. In many cases, observers
inclined to walk forward.
could perceive this type of response to be
Pressure Point/Pain Controls—Applying
excessive, unless the subject has clearly made
pressure to key parts of the body with the
a reasonable attempt to cause physical harm.
intent to cause pain. These are usually
Striking Techniques—Use of techniques,
nerve bundles or muscle and connective
without the assistance of any weapon or tool,
tissue locations, which cause an inordinate
to strike the subject on areas of the body that
amount of pain if manipulated properly. In
are not critical in nature. It is essential that
contrast to the previous level, where joints
these areas of the body are well understood.
are manipulated to produce the expectation
A strike to the head or neck will usually be
of pain, if the desired order is not complied
considered “deadly force” and would thus
with in this phase, the actual sensation of
be a higher level of force.
pain is the motivator.
Weapon-Striking Techniques—Use of
Chemical Controls—Use of such tools as
weapon- or tool-assisted striking techniques
chemical sprays or OC sprays, commonly
to strike the subject in areas of the body
referred to as “pepper spray,” which cause
which are not critical in nature. As with the
a great deal of pain and limit vision and the
“striking techniques” phase, targeting areas
ability to resist in a coordinated manner.
which could have life-threatening effects
These are the limit of what most observers will be considered a higher level of force. As
would call “low force” responses. In fact, some weapon-striking techniques tend to produce
observers might rank the chemical controls more impact energy, critical areas of the body
response higher in the use of force continuum are expanded to include the torso of the
when noting the extreme level of pain that the body. For example, a strike to the lower area
subject suffers. In most cases, these tools do of the ribcage with an expandable baton is
not result in permanent harm, although any likely to cause fragmentation of the floating
officer utilizing them should have some form ribs, and punctures to the internal organs
of decontaminating wash or spray available in as those fragments travel inward. Weapon,
EMERGING TRENDS
Society is becoming more complex and as it include focus on site-specific training, such as
changes the role of the security officer will also terrorism training for all nuclear sites and other
have to change. This will mean an increased utility locations. Security officers will surely
need for additional staffing and training. The need to increase their human interaction skills,
demand for increased professionalism, along as current economic limitations on public police
with the need to better trained officers in weap- forces are causing security personnel to take on
onry, report writing, communications, and legal more traditional policing roles.
issues, will grow in importance. The future will
39
Industrial Hazards, Safety, and the
Security Patrol Officer
Brian D. Baker
483
484 39. INDUSTRIAL HAZARDS, SAFETY, AND THE SECURITY PATROL OFFICER
not often seen as challenging, technologically create unique considerations for officers who
engaging, or even social or exciting. In fact, it is must complete their patrol and duties while
not too bold to refer to this duty post as less than preventing personal injury, avoiding short-term
glamorous. Yet, the need for an industrial security and long-term health problems, and reducing
patrol will always be present. Whether an indus- potential risks to the facility and other officers.
trial facility is in full operation, vacant, or tran- By observing certain practices, security officers
sitioning, the employment of a skilled security can safely enhance their performance and enjoy-
patrol person remains a necessity. The following ment of their duties at industrial hazard posts.
chapter is aimed at providing the industrial secu- To further expand on the distinction between
rity officer with information to perform indus- threats and hazards, a threat definition should
trial security duties safely while recognizing, and focus on the term “criminal,” as in criminal attack
avoiding potentially life-threatening hazards. or criminal event. Workplace violence as defined
above is a significant and common type of
threat, although the theme and emphasis of this
DEFINITION OF INDUSTRIAL chapter are that this is an overall rare occurrence.
HAZARDS Some common examples of workplace vio-
lence threats include:
The topic of security officer safety in the work- ● Domestic violence/ex-spouse or lover
place generally calls to mind the use of self-
violating a protection order
protection and defensive tactics. Any act of ● Terminated employee enacting revenge on a
violence or aggression against a security offi-
supervisor or manager
cer falls into the category of workplace vio- ● Drug dealing or gambling debts being
lence. The FBI Critical Incident Response Group
collected
(2004) categorized workplace violence into four ● Disgruntled worker sabotaging equipment
typologies:
to injure workers
1. Violent acts by criminals with no connection
Other types of criminal threats include:
to the workplace (such as robbery or other
crimes) ● Burglary of office areas
2. Violence directed at employees or others ● Theft of copper or other valuable metals
committed by clients or service consumers ● Car theft
3. Violence between employees, including ● Vandalism, trespassing, drug use, or
against supervisors or executives underage drinking
4. Violent acts against an employee by a
These events are termed “threats” because
nonemployee, particular to domestic or
they involve individuals on the facility property
relationship issues
committing acts that a security officer is most
While the threat and danger of criminal likely to detect, encounter, and provide response
attack (human threat) is present in every work- to. The threat of violence toward the officer
place, the industrial security officer will likely is present should the criminal decide to fight
also encounter hazards—those conditions existing instead of flee the scene or surrender coopera-
because of the physical and natural environment of tively to the lawful interventions of the officer.
the facility that may pose risk to the personal health The professional security officer should observe
and safety of those who come into contact with them. the event, position him- or herself safely, and
Industrial hazards are a form of risk that must make an immediate notification to police or
be managed by the security force. These hazards to a supervisor according to the post orders.
IX. INVESTIGATIONS
INDUSTRIAL HAZARDS, ACCIDENTS, INJURY, AND ILLNESS 485
Unfortunately, some criminals will respond to TABLE 39-1 Industrial Hazards
any form of detection with violence. Among
Oil Field Vehicle accidents caused by
the many theories for aggression include cogni- poor roads
tive links between authority figures and equip-
ment (such as a security officer with radio or Attack from wild animals
handcuffs) and discomfort caused by block- Slippery walking conditions
age of goals (such as escape or monetary gains from rain or oil spills
of a burglary). This linkage may cause certain Urban Parking Garage Speeding cars
people to act quickly on the basis of emotions
Loose handrails
and without deliberation or forethought; such
actions may result in violence (Bartol & Anne, Greasy or oil-coated surfaces
2008). Again, the Bureau of Labor Statistics Ski Resort Severe weather
reinforces that this is often a low probability for
Fire in lodges, cabins, or villas
industrial security officers yet it is a threat that
officers assume and must be trained to handle. Avalanche or ice storms
Threats may exist in remote oil fields, urban Logistic Center Heat exhaustion
parking garages, retail stores, or logistic centers.
Deteriorating building
One can’t automatically assume that a ware- construction
house in Guatemala or an electric sub-station in
Montana is less vulnerable to crime than a pipe- Falling boxes
line in Nigeria or a hospital in Washington, DC. Hospital Radiological waste
The volume of human contact and the value of Wet floors
assets are possible factors that raise or lower the
likelihood of criminal violence upon a security Poor lighting
officer; however, no site must be assumed to be
without threat. Certain crimes require certain
settings and the officer must recognize the pos- vigilant but not fearful of these hazards. The
sibilities for his or her specific location. officer must be respectful of the hazard and not
In the industrial setting, however, the risk of take further actions that increase his or her risk
serious personal injury to a security officer lies of injury. This respect not only applies to the
in the conditions existing by virtue of the indus- immediate steps taken on every foot patrol but
trial and natural environment. also to exposures and hazards that may affect
Table 39-1 outlines how the threats mentioned the officer’s long-term health. To achieve this,
above and other common types of security posts one must rely on the components that make an
can translate into industrial hazard examples. excellent security officer in the first place: five
Indeed, these nonspecific examples cover only senses, personal instinct, and understanding
a few areas of industrial hazards. The hazards one’s own health and fitness.
exist in the environment of the site—either man-
made conditions or natural conditions—but do
not directly involve criminal or violent actions INDUSTRIAL HAZARDS,
of humans upon the security officer. These ACCIDENTS, INJURY, AND ILLNESS
environmental risks, known as hazards, may
be managed through commonsense awareness, While factories, foundries, and heavy equip-
training, and officer self-evaluation. The profes- ment manufacturing are a few examples we
sional security officer must concentrate on being consider with the term “industrial,” the types
IX. INVESTIGATIONS
486 39. INDUSTRIAL HAZARDS, SAFETY, AND THE SECURITY PATROL OFFICER
of hazards present are not specific to only the complex. Without adequate sleep, he drank
typical assembly, production, or raw material several caffeine energy drinks to cope with
processing activities of these sites. Schools, hos- his exhaustion. Following a strenuous foot
pitals, logistic/distribution centers, high rises, patrol of a parking lot area he returned to the
shopping malls, chemical storage, energy facili- command center and suddenly collapsed.
ties, parking garages, office/commercial, and His head struck the floor, causing a severe
high-tech research facilities are all examples of concussion that immediately resulted in a
potentially hazardous environments. seizure. His body convulsed and his head
Hazards can result in obvious slips and falls, again struck the floor, causing lacerations
poisoning, blunt force trauma, burns, heat stroke, and significant blood loss. He was rescued
hypothermia, frostbite, and broken limbs. Aside by a fellow patrol officer and rushed to a
from potentially fatal injuries, especially when trauma center by ambulance.
an officer is working alone, industrial hazards 2. An experienced 60-year-old officer was
can result in long-term health problems such as working a mobile patrol post at a retail
hypertension and cancer. Disruption to an offi- complex in the late evening. He exited his
cer’s natural sleep habits and exhaustion are patrol truck briefly to check on an illegally
common problems with officers working night parked car. Upon returning to his vehicle, he
shift or a second job. Abuse of caffeine, stimu- slipped on grease leaked from a tractor-trailer
lants, and tobacco to cope with fatigue, will fur- that had been parked in the same spot for
ther detract from an officer’s health. Abuse of several days. The officer fell hard on his right
alcohol to counteract stimulants, or to help with side and then managed to crawl back into
sleep problems, can lead to even further physi- his patrol vehicle and return to the security
cal deterioration. The officer should always strive station. He was working alone at the time and
to achieve the right amount of sleep, relaxation, the management of the site had not provided
and exercise necessary to perform his or her the officer with a cell phone or radio. The
duties comfortably and safely. This is challeng- officer was in severe pain and went into shock
ing to manage in our busy world, but it is pos- from a fractured hip. His relief officer arrived
sible to establish a sleep schedule that can be an hour later and summoned an ambulance.
coupled with exercise and a healthy diet in order In addition to the officer working without any
to reduce blood pressure and other unhealthy communications, it was later determined that
effects. In the event that an officer cannot effec- he did not have a flashlight and was wearing
tively achieve the sleep necessary to perform the a hard-sole dress shoe with no tread.
duties at an industrial facility, he or she should 3. A healthy 40-year-old officer suffered lung
seek a change of assignment before being injured injuries while patrolling through an area
or possibly disciplined for poor performance. containing ammonia gas storage tanks. The
Consider some of the following scenarios of tanks had recently vented, and a warning
actual hazards and how the security officers alarm in the area had been disconnected for
could have prevented or mitigated the resulting repair. She was working alone inside the
injuries. With many facilities employing mul- facility and was away from her command
tiple officers per post, the teamwork and super- center, where a working alarm indicator
vision roles should not be ignored when also would have alerted her to the hazardous
protecting fellow security officers. condition. The security officer on the prior
shift had also failed to document the verbal
1. A healthy 30-year-old officer started on instructions from the maintenance director
a new night shift post at a 35-acre office that patrols in that area should be avoided
IX. INVESTIGATIONS
INDUSTRIAL HAZARDS, ACCIDENTS, INJURY, AND ILLNESS 487
due to safety issues. She was quickly rescued peer officers should have recognized that he
by cleaning personnel who recognized her was not rested and alert and assigned another
distressed breathing. Her injuries terminated officer to that patrol. The officer in the second
her ability to work. example was not provided with the necessary
4. An overweight and diabetic young contract basic communication tools and flashlight, and
security officer returned to the reception was not wearing the proper footwear. In the
post after completing a walking patrol third example, the officer entered an area that
and lockdown of three warehouse and should have had a warning sign posted and
production buildings. It was a hot summer her prior officer did not properly document
day and the officer began to experience chest and pass down the safety instructions. She was
pains. He was relatively new to the post and working alone inside a facility and was without
had difficulty locating the phone number for proper communications or monitoring. In the
the command center that he was required fourth example, the officer was unfit for duty at
to call if there were any emergencies. He this post and by not taking steps to pace himself
instead phoned his branch office, located an or drink enough water, he further exaggerated
hour away, and reported that he felt ill. He his health situation. The fact that he was poorly
was unable to transmit further information trained and also in distress, further hampered
and it took the office personnel nearly his ability to obtain assistance quickly.
twenty minutes until they could confirm his The cost to each officer was significant but
location and dispatch a patrol officer/EMT there was also a latent cost to the facility or
to assist him. It took the patrol officer nearly contract security company through worker’s
40 minutes to reach the site, and he soon compensation payments and overtime to fill
determined that neither the officer in distress the shifts left vacant from the injured officers.
nor the receptionist at the branch office had Consider these additional hazards that were
summoned an ambulance. Fortunately, a fire clearly recognized by the security officer and
station was less than half a mile away and therefore should have been avoided:
within 1 minute of calling 911, the patrol ● Officer bitten by ticks on two occasions while
officer and firefighters managed to stabilize
patrolling a perimeter fence line with heavy
the patient. His condition was directly
grass and vegetation
attributed to his health and the exertion of ● Officer injured her back while holding open
the post.
a heavy steel door at a bank
● Officer slipped on a tiled floor in an elevator
The above examples are only a few situations
because he had snow packed into the tread
of hazards that could impact a security officer.
on his boots
Additionally, all of these situations could have ● Officer suffered carbon monoxide poisoning
been prevented by a combination of proper
while using a kerosene heater inside a guard
training, equipment, and personal vigilance by
shack with poor ventilation
the officer and his or her peers. While none of ● Officer stepped on a loose metal floor plate
these incidents involved gruesome injury or
that tipped, causing the officer’s leg to
horrific death, the events all had a significant
plunge into a drainage channel, resulting in
life-changing impact on the officer. Again, these
ankle, knee, and back muscle injuries
incidents were preventable.
The officer in the first example should have An officer should not assume that the employer
prepared for the new shift by adjusting his or supervisor would clearly recognize all haz-
sleep cycle and reducing his caffeine intake. His ards. Events that result in injury will not always
IX. INVESTIGATIONS
488 39. INDUSTRIAL HAZARDS, SAFETY, AND THE SECURITY PATROL OFFICER
result in corrective action. Unfortunately this is known as a whole hazards approach, incorporat-
the nature of business and industry. However, ing crime along with the numerous other possible
the officer should utilize all legitimate means to events and risks beyond crime that can impact a
report new and potentially unrecognized hazards facility. Risk assessment should address any event
to his or her supervisor through the proper chain or condition that could create a loss to the facility.
of command. While some facilities do not allow Human life should always be considered the
security officers to take corrective action on safety most important asset at a facility. Secondary
or maintenance matters, the security officer must to human life, risk assessment should identify
recognize his or her responsibility to the protec- those assets that are critical to the operation of
tion of others, including fellow security officers. If the facility. Certain employees within the facil-
a loose floor plate can be safely repositioned, for ity, such as executives or plant engineers, may
example, the officer should take action. The officer be particularly valuable assets as well.
should also provide for his or her own safety and The whole hazards approach seeks to iden-
comfort through a minimal investment in comfort tify the negative things that can occur to the
or safety supplies. A good insect repellent could key assets as well as the likelihood that specific
prevent tick bites. A small pocket flashlight could events will occur to those assets. For example,
have helped the officer recognize the loose metal the assets listed above are all obviously critical
floor plate. The self-protection section of this chap- to the facility and post duties and instructions
ter will further discuss personal equipment for the in many ways refer to crime prevention and
security officer. crime detection priority for the patrol officer.
But assuming that industrial environmental
hazards are more likely than crime, consider
RISK ASSESSMENT some potential events that could cause a loss
aside from crime:
Risk assessment is a thorough, comprehen- ● Smoke and fire.
sive, and ongoing evaluation of the key assets, ● Water leaks and flooding.
threats, hazards, vulnerabilities, and procedures ● Vehicle accidents and vehicle fires.
in place to protect a facility from loss. While risk ● Medical emergencies.
assessment sounds like a huge task that should ● Structural failure and building collapse.
be undertaken by a security supervisor or direc- ● Fuel leaks.
tor, it is actually an important skill that should ● Dangerous debris, vegetation, tree limb
be developed and practiced by the industrial
hazards.
security patrol officer as well. Security manag- ● Weather-related conditions.
ers and consultants utilize customized checklists ● Smells from chemicals, solvents,
and formulate formal reports when conduct-
malfunctions.
ing a facility risk assessment. The patrol officer, ● Asbestos and airborne contaminants.
by direction of post orders and patrol duties, is ● Hydraulic leaks.
an extension of the risk assessment, particu- ● Appliance failures such as office,
larly in the ongoing evaluation stages (known as
refrigeration, or cooking equipment.
auditing).
Much of what is written about risk assessment
actually pertains to threat assessment and the SELF-ASSESSMENT
determination of crime probability, or likelihood
of criminal attack or events. The more accurate The professional security officer should recog-
definition of risk assessment takes on what is nize the value and process of the risk assessment
IX. INVESTIGATIONS
SELF-ASSESSMENT 489
and practice this daily while patrolling the facil- ● Overhead hazards such as ventilating gases
ity. When viewing the facility from a crime or falling pipes.
prevention angle, security officers should ask ● Unnecessary patrol through active areas not
themselves, “What are some things a thief might requiring security presence.
want to steal inside this facility? Where are some
places that I would hide if I were a burglar? If There is also a distinction between officer-
I wanted to bomb or sabotage this operation, created hazards—being in the wrong place
what target would I choose?” at the wrong time or just being in the wrong
But when viewing the facility from the broader place—and the officer’s hazardous behavior.
whole hazards vantage point, the questions an While the former assumes that the officer is
officer should ask are elemental: attempting to do his or her job thoroughly,
and may become inadvertently entangled or
● Where are the fire alarms and emergency exits?
exposed to a hazard, the latter engages in risky
● Do I have a flashlight and is there emergency
or consciously unsafe or foolish behavior.
lighting if the power goes off?
A significant number of workplace injuries
● Where is the safest place for me in a tornado?
result from unsafe acts, showing off, or other-
● Do I know how to shut off the water supply
wise blatant disregard for personal safety.
if a pipe bursts?
Among these is the hazard of driving a vehicle
● Can I get locked inside any rooms?
on patrol. Mechanical failures, accidents caused
● Who do I call if this machine malfunctions?
by the other driver, and that aside, we all have
● What labs should I avoid because of the
a tendency to sometimes push the abilities of a
chemicals?
vehicle. The definition of vehicle can vary from
● Where is it dangerous for me to walk?
a Segway to bicycle, to pickup truck to motor-
● Is it necessary to check the outside perimeter
boat. It is easy to forget, or ignore, basic safety
at night if there are video cameras?
equipment such as a helmet or seatbelt. The use
This self-assessment process assumes a higher of cell phones and text messaging devices is
order of thought and should be undertaken also another factor that contributes to accidents.
regularly once the officer is oriented to his or Speeding, choosing impractical routes, and lazi-
her site and knows the patrol routes and proce- ness are major causes of preventable accidents.
dures. Much of this becomes common sense and Other hazardous behavior includes oper-
second nature to the officer and within a few ating forklifts, cranes, or equipment without
months it may become subconscious. An impor- proper training or authorization. Officers must
tant aspect of the self-assessment must be for the overcome their curiosity about such equip-
officer to recognize what hazards exist by virtue ment in order to avoid injury. In a complex
of the officer’s presence in the facility. industrial setting, many machines may be linked
through one electrical system. The key or switch
● Rooftop patrols. that is used to start or activate a particular piece
● Climbing scaffolding. of equipment may not be the same key or switch
● Improper monitoring by command center. that turns the equipment off or shuts down the
● Lack of training regarding weak spots on process.
walkways or paths. Exploring electrical switching rooms or con-
● Traversing through active production areas fined and underground spaces is extremely haz-
or maintenance activity. ardous, as is climbing or descending ladders.
● Vulnerabilities from torches, demolition, or Another bad practice, with good intentions, is
vehicles. exercising while on patrol. Officers who jog,
IX. INVESTIGATIONS
490 39. INDUSTRIAL HAZARDS, SAFETY, AND THE SECURITY PATROL OFFICER
Smoking while on patrol is extremely unwise because it interferes with one’s ability to smell
smoke, gas, or other olfactory hazards.
use raw materials as free weights, or hang from ● Never enter or tamper with vehicles, storage
scaffolding to do pull-ups are at significant risk areas or tool cribs.
of injury. ● Be careful of stairs, catwalks, and
Just as the risk assessment process prepares scaffolding.
the officer for knowledge of key assets and ● Padlock controls are important tools for loss
potential hazards, the officer should also under- prevention but also to control access and
stand what could happen to the facility and oth- preserve housekeeping. Report all padlock
ers if he or she is injured or killed as the result issues immediately.
of a hazard. More important, the officer should ● Avoid confined spaces.
recognize the impact if he or she is unable to ● Avoid walking on uneven floor plate steel
perform the duties as a result of a hazard they decking or areas where the floor is concealed
created or from hazardous behavior. by wood or cardboard.
The following are generic suggestions for ● Always know the work area and location of
minimizing hazards and threats (this list is not emergency exits.
specific to any particular environment): ● Avoid dusty areas or enclosures where
known pollution cleanup work is being
● Use caution when approaching partly open performed.
doors or overhead loading doors. ● Avoid forklift traffic areas such as ramps and
● Do not eat or drink except in approved areas blind corners. Give the forklift the right of
to avoid risk of food poisoning. way unless the operator stops, makes eye
● Turn off coffee pots and appliances when contact, and motions you by.
empty or not in use. ● Observe foreign object debris (FOD) and
● Always use a handrail when ascending or make sure that the walkway is clean before
descending stairs. making access or others approach.
● Move slowly and carry a flashlight. ● Avoid treacherous walkways, bridges, or
● Watch out for open areas that may not be paths with no railings or over deep holes.
marked and areas that were closed or sealed ● Never cross or walk on bent or bowed
yesterday that could be open today. Avoid flooring.
falling into pits and drainage tunnels. ● Know what hazards exist to the exit
● Avoid the curiosity of patrolling in restricted doors. There may be machinery, FOD, and
or marked danger areas. protruding raw materials. Attempt to keep
● Stand clear of high-speed roll-up doors and exit pathways clear.
forklift traffic. ● Avoid overhead cranes, tilting loading
● Avoid greasy areas that are slip hazards. docks, or walking under elevated lift trucks
Also, avoid wearing greasy shoes into your and boom lifts.
home or vehicle. ● Don’t approach trenches and other areas
● Be aware that some work areas are where work is in progress.
abandoned when the shift ends as workers ● Be aware of doors that are welded closed,
will leave tools and parts lying on the floor, bolted shut, or temporarily barricaded with
posing a trip hazard. 2 4 boards.
IX. INVESTIGATIONS
SELF-PROTECTION 491
● Be cautious of steep ramps and pitted or The walking patrol is not an efficient method
uneven walkways. to cover a large amount of territory if there are
● Unexplained water may not be a concern, numerous duties such as meeting visitors or con-
but running water/flooding areas and tractors, or repetitively unlocking gates or storage
water running onto electrical panels could be areas. However, during off-production hours a
treacherous. walking patrol has fewer random demands and
● Be familiar with HAZMAT areas and also by walking through a facility, the security officer
with HAZMAT signs that no longer apply. can check for unlocked doors, listen and smell
This may be needed in case of an emergency for unusual conditions, and become comfortable
to guide the fire department. in the environment. This allows a thorough and
● Avoid entering work areas from narrow careful evaluation of the many types of industrial
hidden walkways. hazards previously discussed.
● Never walk through any liquid if it can be When walking at a moderate pace for several
avoided. hours, it is possible to cover many miles and
● Choose to walk over concrete flooring rather for the body to burn hundreds of calories. You
than temporary flooring or wood or metal should eat wisely to avoid food that is filling to
grates. the point of discomfort. Carbohydrates such as
● Be aware that diamond plate steel flooring is bread and grains are a good source of energy.
designed for traction but when it is wet, or Fruit and plenty of water or electrolyte drinks
coated with grease, it becomes very slick and are important in both hot and cold weather.
dangerous. Getting in shape for a walking post is not
● Be careful of patches in flooring, cracks in always possible but once walking becomes part
concrete, and areas of new construction of your job, you should consider walking and
where walkways may be unfinished. exercising during your days off as well. If you
have medical issues that impact your ability to
SELF-PROTECTION walk or your fitness for duty, discuss these with
your supervisor to see if accommodations are
In addition to awareness of site hazards and possible. Some industrial sites have an electric
the ongoing evaluation as described in the risk cart available to save the officer from fatigue. At
assessment section above, there are two areas other sites it is not possible to use a cart or other
where the professional industrial security offi- conveyance and walking is required.
cer must take personal responsibility: fitness for Remember that when on a foot patrol your
duty and personal safety equipment. primary responsibility is to protect the facil-
Fitness for duty refers to an officer’s personal ity from all types of losses. When encounter-
physical and mental ability to perform the duties ing workers, be pleasant and professional but
of the post. As mentioned in the beginning of not overly social. It is best not to develop close
this chapter, much of the patrol duties involve relationships with people outside of the secu-
walking. In fact, a patrol can involve significant rity department as this will allow you to act
amounts of walking at a slow and steady pace. objectively and appear fair and impartial. The
In large industrial facilities, the officer may use a relationship that employees have with secu-
combination of foot patrols inside buildings and rity officers varies by the culture of the facility
vehicle patrols between buildings. Some sites may and the size of the workforce. You will want to
require an officer to walk as many as 6 or 7 miles appear approachable should someone need your
per shift. This requires some stamina, especially if assistance but do not treat the workplace as your
the patrols require ascending stairs or hills. social network.
IX. INVESTIGATIONS
492 39. INDUSTRIAL HAZARDS, SAFETY, AND THE SECURITY PATROL OFFICER
As the first line of defense between the facil- contains details on exposure risks, health effects,
ity and the public, you should appear alert, well legal updates, and products and locations where
groomed, and physically capable. You are not a asbestos can be located. It is the employer’s
police officer, however, and if you wear a uni- responsibility to protect workers from expo-
form and a shield or ID badge, the purpose is to sure health risks, so the industrial security offi-
make you recognizable but not to intimidate or cer should pay attention to such information. It
project law enforcement authority. If there are is the officer’s duty, to himself or herself, to be
individuals on the property that do not appear vigilant and self-protective. If an environment
to belong, your confident presence and polite becomes harmful or the officer notices signifi-
request for identification according to the post cant unhealthy symptoms, they should consult
orders, should go a long way in preventing loss. their supervisor as well as a physician.
If you appear to be out of shape or intimidated, The final piece of advice for the comfort and
you will negate the effectiveness of the entire safety of every security patrol officer is regard-
security department and may also lead yourself ing footwear. As previously mentioned, an offi-
into a dangerous situation. cer is far more likely to be injured from a fall
In addition to the physical demands of foot than from a violent assault. Boots and shoes can
patrol, the industrial facility has significant dif- be an expensive investment for many officers.
ferences from other, more open, posts. These Discounts and copayments for footwear by the
include the presence of equipment, running employer or contractor should be considered,
air compressors that start and stop depending along with recommendations and on-site safety
on pressure or demand from other parts of the policies regarding foot protection. Steel toe and
plant, humming electrical transformers, random safety shoes can be heavy and uncomfortable
buzzers signaling break times, dead silence, if not properly fitted and broken in. In many
pigeons and rodents, and loud clanks and bangs cases, the ideal style may not be available in a
as metal buildings expand and contract. Several color that matches the officer’s uniform or in a
excellent and free health tips may be found on style that is personally preferable. Consider that
the Internet or via your local YMCA or private in an industrial setting, most boots will become
fitness center, but fitness for duty is a com- severely worn and blemished and that fashion-
mitment that can be achieved through a daily able appearance must be sacrificed for safety.
20-minute workout and a low-fat, vitamin- Law enforcement and military-style boots
charged diet. can cost over $100 but may not be durable in
Perhaps one of the most heavily broadcast some industrial settings. These boots should
industrial health hazards has been asbestos fit comfortably and provide a flexible tread
exposure. Asbestos cancer, known as mesothe- with reinforced shank protection. Most of these
lioma, is caused by a scarring of the deep lungs boots are waterproof, insulated and enhanced
or stomach due to asbestos exposure. Accor- with special vapor barriers and breathing mem-
ding to the Mesothelioma Center (http:www. branes. With proper care and careful walking,
mesotheliomacenter.org), not all exposures will the officer may be pleased with the investment
result in illness or cancer; nonetheless, once if he or she understands that exposure to grease,
a person believes they have been exposed to oil, dust, and metal will challenge the upkeep
asbestos, they should report this to their phy- and appearance.
sician for further monitoring. Asbestos is a Sneakers and dress shoes should be avoided
mineral product that has been used in mining, in an industrial setting. This includes the popu-
milling, foundry operations, and other manu- lar black tennis shoes often acceptable in uni-
facturing. The Mesothelioma Center’s website formed professions, including security posts in
IX. INVESTIGATIONS
SELF-PROTECTION 493
less hazardous settings. Tennis shoes typically a low- to mid-cost black leather boot with either
are comfortable for walking moderate distances a 6- or 8-inch ankle, typically found in discount
but do not afford the protection or support nec- retail stores. These boots are usually waterproof
essary for industrial settings. Uniform dress and insulated with 200 grams of Thinsulate. To
shoes may also be comfortable, but the soles compensate for the low-cost comfort, the boot
of these shoes are far less safe for industrial can be greatly improved with a full insole and
patrols. If a patrol officer spends over 7 hours arch insert, as well as a heavy-duty appropri-
behind a console, but must be prepared to leave ate length bootlace. Effectively, this inexpensive
that post for 1 hour to cover a patrol, escort, or boot can be transformed into the comfort, safety,
inspection elsewhere, the minimum choice for and performance necessary for the officer’s
footwear should be for the most hazardous pos- duties. When the boot is blemished or dam-
sibility. If the officer’s duties involve significant aged with oil or solvents, the insoles and boot-
walking, the boot or footwear selection must laces can be transferred to replacement boots.
provide sturdy comfort or the result will be If footwear damage and expense are concerns,
severe knee and back pain. the security officer may find this option to be a
Layering or doubling socks can help add minimum of three times more economical than
comfort and absorb perspiration. A frugal option investing in a law enforcement or military-style
that many officers choose involves purchasing boot.
EMERGING TRENDS
Security in the industrial and manufacturing such as notifying a security officer or sounding
setting relies on the same protection concepts as an alarm. For example, video analytics can detect
other locations, namely, deter, deny, delay, and motion along a remote fence line, but instead of
detect. Technology continues to help us with simply recording the activity, the software moni-
these objectives and if properly implemented, tors the activity and can detect if the subject
technology can accomplish these goals while is moving parallel to the fence or crossing the
decreasing the risk of harm to the security patrol fence as an intruder. Video analytics holds the
officer. Digital video analytics, computerized potential for detecting industrial accidents, for
guard tour matrixes, and unmanned or robotic instance, workers who may be unmoving and
patrols are just a few examples of future security injured on the floor, or detecting changes in the
technology that could be used to save lives and number of persons in a specific area, as in a fight
increase efficiency. or disturbance in a cafeteria. Video analytics
Among these, digital video analytics holds may even be programmed to detect the absence
the greatest potential to improve the detection of required personal protection equipment such
capabilities of the weakest link in the security as hard hats or safety lines, not only indicating a
program—the human security officer. Instead risk to workers but also the potential presence of
of a security officer walking through a hazard- an intruder.
ous industrial setting, the computer can detect Digital video analytics allows the security
changes or predesignated conditions within the officer to detect activity around high value assets
video camera field of view, interpret those condi- while also providing clear real-time images of
tions, and begin a preprogrammed response plan the activity that can be later retrieved for use in
IX. INVESTIGATIONS
494 39. INDUSTRIAL HAZARDS, SAFETY, AND THE SECURITY PATROL OFFICER
an investigation. The need for a security officer locks, signage, fences, and lighting will remain
to sit for long hours and view monitors with no important for facility protection, but the potential
activity is also eliminated, therefore freeing the of technology will help improve detection abilities
officer for other patrol functions, such as a visible for the industrial security officer while reducing
perimeter patrol that may serve as a deterrent. In his or her risk of harm or exposure to danger-
the event of an incident or alarm, the system can ous circumstances. More information on video
transmit information to a remote security officer analytics is available on the Internet or at http://
for his or her attention. Digital video analytics www.pelco.com/software/videoanalytics/
has the potential to monitor movement of people (offering no particular affiliation or bias regard-
and materials in specific directions, as well as in ing Pelco).
predetermined zones that are off-limits. Physical
IX. INVESTIGATIONS
SECURITY QUIZ 495
9. The most important asset that should be 10. Durable, safe, comfortable footwear is a key
protected within a facility is the security piece of personal safety equipment for the
command post. industrial security officer.
a. True a. True
b. False b. False
IX. INVESTIGATIONS
This page intentionally left blank
C H A P T E R
40
Apprehension and Detention
Procedures
Richard P. Fiems
497
498 40. APPREHENSION AND DETENTION PROCEDURES
never made to inconvenience someone, delay A “citizen’s arrest” is defined by Black’s Law
their departure, or as a way to get even for Dictionary as follows: “A private person as con-
some perceived wrong. If there was no intent trasted with a police officer may, under certain
to take them before a judge, the arrest is unlaw- circumstances, make an arrest, generally for a
ful. Black’s goes on to further define an arrest by felony or a misdemeanor amounting to a breach
saying, “Arrest involves the authority to arrest, of the peace.”
the assertion of that authority with the intent to Security officers generally fall into the cat-
effect an arrest, and the restraint of the person egory of private citizen. There may be certain
to be arrested.” instances, such as a local ordinance, that grants
What this means is that in order for an arrest certain police and/or arrest authority to a secu-
to be legal and binding, the person making the rity officer. Your obligation as a professional is
arrest and the person being arrested both must to find out what laws and ordinances apply in
know the following: the place where you are working.
1. The authority to arrest is real.
2. That authority is being intentionally used.
3. The person being arrested must be restrained DEVELOPING A
in some way. WORKING MODEL
So what does it mean to be restrained? Black’s
The law in most jurisdictions allows for a secu-
definition of an arrest goes on to say: “All that
rity officer to detain people when such a deten-
is required for an ‘arrest’ is some act by an offi-
tion is for a reason that falls within the security
cer indicating his intention to detain or take a
officer’s authorized duties. Authorization can
person into custody and thereby subject that
come from one or more of three basic places.
person to the actual control and will of the offi-
cer; no formal declaration of arrest is required.” 1. The law can outline the statutory authority
In other words, if someone who assumes the of a security officer within the arena that
authority to make an arrest indicates by words they are working. That can be a federal,
or by actions that they are taking another per- state, or local law. Look for phrases in the
son into custody, and that other person believes law like “special officer,” “auxiliary officer,”
that they are being taken into custody, an arrest “special police,” or “special deputy.” Be sure
has happened. to be very clear of the definition as stated in
This is why police officers are told to make the law. They can be very specific.
their intention to take someone into custody as 2. The security company that the officer works
clear as possible to the person being arrested. for can have a contractual agreement with
They are trained to tell the person that they are the client for the officers to exercise a certain
under arrest and then give them clear orders level or degree of authority on their property.
and commands about what they want them to The source of this authority then is the
do in order to submit to the custody. contract that exists between the client and
Since citizens are legally required to sub- the security company.
mit to an arrest by a police officer, this places 3. Authority can also come from a job description
the citizen in the position of facing charges for security personnel in a proprietary
for resisting if they don’t comply. But security department. The contract of a particular
officers are not police officers. Security officers company or the handbook from a human
have the same authority to make an arrest as a resources department might contain language
citizen, unless some special circumstances exist. that establishes the authority of the officer, too.
WHAT GETS SECURITY be reasonable for them to think that you were
OFFICERS IN TROUBLE? going to do what you said. You have the means
and the proximity. If you do not have cause to
When a security officer is placed in the posi- take them into custody, you could be looking at
tion of having to take control of another per- an assault charge.
son, a world of opportunity for trouble begins
to open up. It has to be stressed that the secu- Battery
rity officer who acts in a reckless or indefensible
Battery is the actual physical touching of
way will be in for a rough ride. This fact stresses
a person that is either hurtful or insulting in
the importance of documentation. Whenever
nature. A reasonable person would think that
physical contact is made with a citizen, for
being taken into custody, which involves being
any reason, the security officer should sit
stopped, searched, secured in some way, and
down as soon as possible after the event and
not permitted to leave, would be a hurtful or
write a detailed report about what happened
insulting set of circumstances. Once again, this
and why they felt that they had to do what
stresses the importance of being right in your
they did. Basically, the laws that can cause the
assessment of the situation and reasonable in
problems come from two directions: criminal
taking the actions that you take.
and civil.
False Arrest
Criminal laws that can get a security This involves taking someone into custody
officer in trouble without the legal authority to detain. Most juris-
dictions, and it is your responsibility to find out
Assault the law in the one where you work, will allow
Contrary to popular belief, at least in most for a citizen to take another citizen into custody
jurisdictions, you do not have to touch someone for an offense, other than a misdemeanor or an
to be charged with criminal assault. You only ordinance violation, that is committed in the
have to place another person in a reasonable fear arresting person’s presence. In other words, the
of being battered. Attempting to lay hands on violation must be a serious one and the person
someone and failing to do so can still be classi- who makes the arrest must have direct knowl-
fied as an assault. In many cases, all you have to edge of the commission of the violations. You
do is have the means at your disposal to commit cannot rely on hearsay or rumors. You can only
a battery and communicate to the other person act on firsthand knowledge.
that you intend to do just that. For example, if
you yell across a football field that you are going
Civil law violations that can get a
to put someone on the ground and handcuff
them, the court would probably not consider
security officer in trouble
that an assault. You were too far away to actu- (Note: A civil violation, also known as a
ally take control of the person and it would not tort, does not carry with it the same burden or
be reasonable for them to think that you could amount of proof necessary to establish responsi-
reach all the way across the field and grab them. bility in court. In criminal court, the State must
However, if you were standing right in front of prove its case “beyond a reasonable doubt.”
the person, with the handcuffs in your hand, In civil court, the plaintiff must prove their case
and you made the same statement, it would by a “preponderance of the evidence.” Stated
person. As with most things on the job, the first verse. Just be clear about what you saw them
rule of security work comes into play: Go home do and your intention to hold them there
healthy at the end of your shift! until the arrival of the police or a supervisor.
4. Give the person simple, direct commands.
1. Get some backup headed your way. The Do not yell or threaten. Use a calm and
Latin term non solis (never alone) should clear tone of voice and tell the person what
be the first thing that comes to your mind. you expect them to do. If you want them in
Often the presence of another security officer a chair, ask them to “Sit down, please.” If
will deter someone from resisting or causing you want them to move to another spot in
further problems. Some departments like to the room, point to the location and simply
use what is called a “swarming technique” say, “Over here, please.” If they start to
that involves getting as many officers there shout or become loud say, “Lower your
as they can to aid in the situation. At the very voice, please.” You have to maintain a cool
least you should be communicating with your and professional demeanor throughout
department and should also contact the local the entire process. The people who are
police as soon as possible. Remember, non solis. watching should be able to testify that you
2. Maintain a safe distance and good were not the problem, the other person was.
positioning. You should know what your In the interest of your safety, you should
reactionary gap is. That is the minimum not hesitate to say, “Keep your hands
amount of distance that you need to respond where I can see them, please.” if they start
to a threatening move made by someone to reach inside a coat or a pocket. There
else. Blade your body so that you are is not a requirement that I have ever seen
balanced and ready and hold your hands up that stipulates or even encourages you to
in front of you with your palms facing the do anything that would compromise your
person you are dealing with, about shoulder safety. So don’t.
high. This will allow you to protect yourself 5. Move in with extreme caution. If you
and deflect an object or a blow if you need make the determination that the person
to. Leave yourself a way out of the area if needs to be placed in handcuffs, you must
you can and try to avoid cornering the other proceed with a great deal of caution. The
person. You could be injured if they feel that closer you get to them, the more vulnerable
the only way out is through you. you are. Handcuffs should only be used
3. Communicate your intentions. Tell the when you are convinced that not using
person that they are under arrest or them poses a greater threat to your safety
apprehension, whichever is appropriate or someone else’s than letting them stand
for your jurisdiction. In many states, the there until the police arrive. In any event,
intention to arrest or detain someone must you must remember that handcuffs are
be communicated clearly to the person being temporary restraining devices. They in no
detained. It is also possible that they could way guarantee your safety once they are put
be held responsible for resisting the arrest on another person. Caution is still the rule.
if it is made clear to them exactly what the Have the person turn around and face away
situation is. If the person demands to know from you. Tell them to place their hands
why you are detaining them, tell them in behind their back with the backs of their
as few words as possible. It is not generally hands touching. Grasp their right hand with
necessary for you to be able to quote the your right hand and place the handcuff on
law they have violated to them chapter and their right wrist with your left hand. Then
1. Self-defense. There is no requirement under all right. Murphy’s Law has been around since
law that you have to allow yourself to be before laws were written. Be ready.
attacked. Under law everyone has the right
to defend themselves. Just be sure that when
you defend yourself, you don’t go too far
and become the aggressor.
2. Necessity. If you shove someone out of the S E CURI TY QU I Z
path of a speeding car you have committed 1. Black’s Law Dictionary defines an arrest as:
a battery. You had to in order to protect them “To deprive a person of his liberty by legal
from great harm or death. No court in the authority.”
world would hear a charge against you for a. True
that. b. False
3. Mistake of fact. If you are acting in good 2. In order for an arrest to be legal and binding,
faith and believe that you are doing the person making the arrest and the person
something legal and aboveboard, and it being arrested have to know:
turns out that you were misinformed, you a. The authority to arrest is real
have made a mistake of fact. Ignorance of the b. Specifically why the person is being arrested
law has never been an excuse for violating c. The person being arrested is not allowed
the law, but a good faith mistake defense to leave
can still protect you if the circumstances are d. All of the above
believable. 3. Security officers do not have the same
The defenses listed above have the effect of authority to make an arrest as a citizen unless
taking “intent” out of the equation. If you did not some special circumstances exist.
do something in a criminal state of mind you can a. True
defend yourself from a claim that you violated a b. False
law or committed a tort. The concept of reason- 4. Based on the circumstances a private
ableness still applies. person may make an arrest for which of the
following offenses:
a. Felonies
b. Misdemeanors
CONCLUSION c. Breech of the peace
d. All the above
No one really likes the thought of having to 5. Authorization to make an arrest will come
take someone else into custody. Hopefully, we from all the following places except:
can be proactive enough in the way that we a. Statutory authority
do our jobs and we will avoid having to deal b. The local Police Department
with this kind of situation. However, it is your c. The contract between the client and the
job to be prepared. Keep up with the changes guard company
in the law and be very conversant in the rules, d. The security officer’s job description
regulations, guidelines, and policies of your 6. Contrary to popular belief, at least in most
department when it comes to this subject. You jurisdictions, you do not have to touch
cannot go into one of these situations half pre- someone to be looking at a criminal assault
pared and expect that everything is going to be
charge. You only have to place another 9. Malicious prosecution happens when a
person in a reasonable fear of being battered. security officer detains someone with the
a. True full intention of bringing criminal charges
b. False against them, or filing criminal charges
7. Assault is the intentional touching of without probable cause.
someone in a non-consensual, non-privileged a. True
manner. b. False
a. True 10. Under law everyone has the right to defend
b. False themselves.
8. Guilt in civil court requires what percentage a. True
of proof? b. False
a. 99%
b. 75%
c. More than 51%
d. 100%
41
Human Relations in a Global
Environment
Christopher A. Hertig and
Darrien Davenport
509
510 41. HUMAN RELATIONS IN A GLOBAL ENVIRONMENT
officers must be the ones inspiring others. Principle 6. Make the other person feel
Overall, having a positive attitude and making important—and do it sincerely.
positive remarks will aid an officer.
Carnegie’s principles may be applied to
Greeting employees and others in the work-
virtually any human interaction. Certainly
place is generally a good policy. The slight-
interviewers will want to employ them to
est acknowledgment of others helps to form a
develop rapport with the interviewee.
bond with them and these are the people that
Additionally, developing a relationship with
officers must convince to follow the rules, obey
people in one’s work environment, where the
commands in emergencies, and provide infor-
people will feel comfortable talking to the offi-
mation when something is amiss.
cer, is very important. Such a relationship facili-
Part of good human relations involves think-
tates the employee, student, or guest informing
ing before speaking. Know what to say before
the officer about unusual conditions or situa-
saying anything. This is especially important
tions. Protection officers may find that when
when dealing with others who are in crisis,
employees talk about their job functions, they
when addressing a group of people (a crowd
provide valuable information. Principles 4, 5,
of some sort), or when enforcing rules. Also,
and 6 may all relate to discussion about job
avoid flaunting your background. Some people
functions. By understanding what occurs on
in the protection business have a tendency to
the job for employees, the officer is better able
boast or brag about their job qualifications. It
to see if something is out of the ordinary.
is not uncommon to hear people mentioning
their prior job experience in the military or law
enforcement while they are employed within
the security industry. DIVERSITY
background, rather than a general conflict due supervisors can play a role. So, too, can work-
to age and immaturity. ing long hours where one becomes tired and
Other groups within the work environ- irritable. Intense exposure to uncooperative
ment may be those established not due to race, persons is another. An obvious example of this
ethnicity, age, or gender, but, rather, their job would be a protection officer working at a dem-
status or function. Students, guests, contractor onstration or strike.
employees, visitors, and so on are all categories Another concern regarding the development
of facility/environment users that may be the of an “us versus them” workplace subculture is
subject of prejudice by security personnel. the abuse of force. When one does not under-
There are many negative behaviors that stand another and is frustrated, there may be a
may occur due to discrimination. A concern for temptation to use more force than is necessary.
American police and security forces is racial When one dislikes someone due to their mem-
profiling. This is the targeting of an individual bership in a particular group, there is a tendency
because of their race, skin color, religion, or to use force. And when one is afraid of someone
appearance. Police officers have been accused of because of what they do not understand, applied
stopping a disproportionate number of African force may be driven by fear of the unknown—not
American men for traffic violations, which has for any legitimate reason.
come to be known as the offense of “driving while All of these factors may magnify prejudice
Black.” Retail loss prevention agents have also the officer has. Without the presence of preju-
been known to focus on African American shop- dice in the first place, the factors may not be as
lifters. An old scheme used by some professional significant. Quite simply, the presence of preju-
shoplifters was the “salt and pepper” team. This dice is where the problem begins.
consisted of a white and a black shoplifter. The An individual must recognize that they have
African American shoplifter was watched by the prejudice concerning different groups of peo-
retail security personnel. This served as a diver- ple. Once they recognize their preconceived
sion and allowed the white team member to steal. notions, they can take the time to educate them-
Magill (2003) found that racial profiling by selves to break that mental barrier. We live in an
retail loss prevention staff was counterproductive age where knowledge and education are readily
for several reasons. One was that, if customers available to us, and for free! There is no excuse
from a certain demographic group felt as though for not knowing or understanding those who
they were discriminated against, they would may be different than we are, be they of differ-
avoid shopping in that store. Many good cus- ent races, religions, ages, or cultures.
tomers would be lost. Additionally, there is the An individual can prepare for encounter-
threat of a civil suit due to discrimination claims. ing another culture by doing homework on that
This can be a substantial loss, as the attendant culture. This will help the individual to become
legal costs and negative publicity may be quite comfortable with it and know what is or is not
extensive. Perhaps more importantly, focusing offensive. Cultural awareness is the key to good
on a particular ethnic group deprives the inves- human relations. Studying the history of other
tigator of professional objectivity. The reality is cultures is a good start. History helps to explain
that people from all cultures steal. Focusing on why a group of people think as they do, and
only one group takes the agent’s attention away why they have the customs they do. Holidays
from those who are actually stealing. and celebrations generally mark an event of his-
Obviously, prejudice against one group of torical significance. Knowing about the holidays
people is due to the convergence of many factors. and what they represent offers a clue to under-
Reinforcement of prejudice by coworkers and standing a culture.
indeed, pirates have historically been out-of-work detail. Females can also assume planning roles
mariners. With globalization, there will be eco- in executive/VIP protection. They can coordi-
nomic growing pains underwritten by cultural nate trips, do advance work, and so on.
differences. There are also the wounds inflicted Women have faced discrimination, but are
by industrialism and colonialism. Some devel- increasingly taking on leadership positions
oping countries have a bad taste in their mouths in protective service. There have been recent
from the days when they were exploited by movements to utilize women in protective
another power. We must study their history and roles. One of these is as door supervisors in
appreciate their perspective. nightclubs. While the traditional brawny male
is what most people expect, a woman can easily
check identification, greet customers, and con-
WOMEN IN PROTECTION trol access. In a similar vein, women can relate
to females better than men. The U.S. Army has
Women have played some significant roles in
developed a female unit in Afghanistan for this
policing and security over the years. They have
very purpose. The female unit can obtain bet-
also, however, faced a tremendous amount of
ter intelligence than a male unit would if they
prejudice. In policing, women were often given
attempted to converse with women. In 2009, the
jobs dealing with female prisoners or juveniles.
International Foundation for Protection Officers
In some security applications, they were used
trained the first female security officers in the
as receptionists. They have experienced “the
Kingdom of Saudi Arabia.
glass ceiling” in terms of promotion: failing to
rise in the ranks due to discrimination and lack
of access to male colleagues in personal social SEXUAL HARASSMENT
settings (the men’s room, the locker room, etc.).
Child care responsibilities have also impeded One type of discrimination that females face is
their progress, in some instances. sexual harassment. Sexual harassment in the
Fortunately, women have made tremen- workplace is nothing new. In years past, the
dous strides within society as a whole, assum- classic type of harassment, known as quid pro
ing leadership positions in both government quo, occurred quite often. It was where sexual
and corporate organizations. Nonprofit orga- favors were requested in exchange for a pro-
nizations often have women at the helm. The motion, pay raise, better assignment, improved
International Association of Chiefs of Police work resources, and so on.
has had a female president. Over the years, Obviously, this was and is wrong. What has
ASIS International has had several female transpired is that another, more common type of
presidents. sexual harassment, known as “hostile environ-
Allan Pinkerton, founder of the Pinkerton ment” has emerged. This occurs when someone
National Detective Agency, employed the first is subjected to offensive language, drawings,
female investigator in the Western world. Kate and so on. They may get offensive e-mails or see
Warne worked for the agency beginning in the pornographic Web sites being viewed by others
late 1850s. She was instrumental in solving in the workplace. Sometimes, a hostile environ-
many cases and was Pinkerton’s “right-hand ment takes the form of jokes and banter around
man,” so to speak. Pinkerton saw that women the workplace. In traditionally male-dominated
could play roles that men could not. He used workplaces, this is a common problem. People
women in surveillance and undercover opera- say things that are offensive, sometimes with the
tions. A woman can pose as a secretary or knowledge that they are doing so, and some-
administrative assistant in a protective service times unintentionally. In some cases, the creation
a reputation of being respected, both internally The customer does not always have to be right,
and externally. This does not mean that any given but the customer must always be protected.
outcome will always be positive in nature, but it There is a vast difference between an officer
does imply that the officer will take the appropri- who manages situations and an officer who leads
ate ethical steps to determine the outcome. through situations. Often, an officer who man-
Ethical behavior is also important to be suc- ages attempts to apply the same systematic
cessful in a multicultural workforce. A protection approach to each customer’s issue; an officer
officer will benefit by following the ethical code of who leads is able to assess a situation, explore
their organization, or cultivating their own beliefs, various options, and then come to a solution to
so long as they are in line with the value system of fit that particular issue.
their employer or client. They should be discour- The officer must listen well, assess the
aged from using a personal ethical code if those issue, and then find a path toward resolving it.
“ethics” will result in discrimination against a class They must lead the customer to a solution.
of people. Ethical behavior takes professional cour- Leadership, particularly when applied to cus-
age, self-accountability, and the ability to manage tomer service, is partnership. True leadership is
relationships on all levels. Ethical behavior does for the benefit of the followers, not that of the
not only mean self-governance; a protection officer leaders (Ortmeier, 1999).
may find him or herself in a situation where he or Solving a problem for some protection offi-
she has to account for a colleague’s ethical (or cers can be an issue in itself. If you find your-
unethical) actions. The ability to provide ethical self in a situation where your experience and/
sustenance to coworkers may also be a measure- or training still do not provide you with the
ment of an officer’s own ethical behavior. solution to an issue, find someone who can
One particular aspect of ethics and diversity help lead you to the solution. Part of being a
revolves around the “war on terror.” Persons leader means locating resources to make up for
suspected of terrorist activity, or of simply sym- one’s own deficiencies. By no means does this
pathizing with terrorists, may be mistreated. negate who the officer is, as a leader or protec-
Police and security personnel believe that they tion officer, but it demonstrates that they have
are involved in helping society at large, and gen- the wherewithal to provide their customer with
erally, they are. Unfortunately, they may use this the service that they committed to.
concept of the greater good to justify discrimi- Another key to customer service leadership is
natory, unethical, or illegal actions. At times, a availability. Due to silos, it can be difficult for a
dose of empathy can be applied to gain perspec- protection officer to meet the needs of his or her
tive. Putting oneself in the other person’s shoes customer. A silo is an intangible barrier created
may help provide some perspective of fairness. by an individual that prohibits them from being
exposed to new ideas or experiences. Silos can
create barriers in communication between indi-
CUSTOMER SERVICE LEADERSHIP viduals or departments, which can lead to impo-
tent and ineffective relationships. Often, silos
Countless individuals will rely on a protec- are created to protect traditional processes, pro-
tion officer to provide them with some form of cedures, or beliefs, but unbeknownst to the silo
protection. The greatest asset is the customer, as builder(s), they are stymieing their own develop-
they are the sole reason for an officer’s profes- ment. It is important to remember that silos can
sional existence. In a multicultural world, lead- lead to individuals or departments becoming
ership ability can determine if the officer has obsolete as they willingly reject what is necessary
the aptitude and capacity to protect that asset. for personal or professional preservation.
EMERGING TRENDS
More employers want a diverse workforce. one example of expanded legal consequences
This is evidenced by recruitment efforts, the for discriminatory behavior. After the assassina-
establishment of positions such as Diversity tion of Martin Luther King Jr. in 1968, laws were
Director, and so on. At the end of the day, most enacted in almost all states that increased penal-
of us will work in or with organizations that are ties for crimes committed as a result of hatred
more diverse than at present. against people based on ethnicity or religion.
Protection officers, particularly those employed U.S. President Barack Obama signed hate
by security service firms, are expected to be bet- crime legislation that extended coverage to peo-
ter at customer service. There is a greater appre- ple based on sexual orientation in October 2009.
ciation of the role that protection officers play This legislation expands federal hate crimes to
in dealing with the public, specifically diverse include those committed against people due to
groups of people. Immigration trends demand their gender, sexual orientation, gender identity,
that officers be able to work with groups from or disability.
other countries. Demographic trends mandate With the increasing demand for professional
that protection officers be able to relate to the officers in metropolitan settings, it is necessary
elderly and the disabled. for today’s protection officer to be well educated
Legal protection for members of certain and astute to the issues surrounding the audience
groups is expanding, and will likely continue to that they protect. To maximize their skills, officers
do so. This protection may take various forms, will have to acknowledge that “future policing in
such as recognizing a new minority as a pro- large part will depend on the type of society being
tected group. It may occur at the municipal policed—the social, economic, and political reali-
or state level, as well as the national or federal ties and, in more-developed countries, the techno-
level. A city may add gay persons as a protected logical sophistication of the populace” (Stephens,
group. A state human relations commission may 2005, p. 51). Awareness of this will help profes-
begin to recognize discrimination against those sional officers to better oversee populations that
with disabilities. Hate crime legislation is but they protect, especially those that are culturally
diverse. Education is the key and is an emerging have to envision, create, incorporate, and learn”
trend in today’s security society. The educational (Stephens, 2005, p. 51). This will be of importance
standard for professional officers is increasing, as protection officers identify trends and cultural
and more training is being provided to profes- similarities in order to protect the innocent. This
sional officers to prepare them for their roles in should, by no means, provide a protection officer
the community. This includes diversity training. with a “license” to culturally profile individu-
When it comes to emerging trends, some als; technology should be used as a tool to secure
experts focus specifically on growing technolo- those investing in the services of professional offi-
gies. The use of technology in a multicultural cers. The new tools must be used ethically.
world will impact many areas, whether used for Supply chain security is a rapidly growing
protecting the public, educating officers, or pre- area for both corporations and governments.
venting crime. According to law enforcement In a global economy, supply chains become lon-
professional Tom Cowper, “Technology will cre- ger and more complex. Security personnel work-
ate a rapidly changing social environment to ing in some aspect of supply chain protection are
which police will have to adapt. At the same likely to increase in number due to the effects
time, technology will permit radical new policing of terrorism, organized crime, piracy, political
methods, systems, and processes that police will upheaval, and natural disasters.
42
Public Relations
Charles T. Thibodeau, Christopher A. Hertig, and
George A. Barnett
521
522 42. PUBLIC RELATIONS
There may be toxic smoke belching from the with a pleasant and polite voice inflection, and
factory, reducing air quality in the community. show respect. The officer must make the person
Either of these conditions would be of great being served feel like his or her needs are very
concern to those affected by the factory, and important, and that they are about to receive
would result in very poor public relations. superior service. Most importantly, the officer
The financial interest might be in form of a must come to the job equipped with the skills to
paycheck for employees who live in the com- deliver what is promised. All of these things are
munity, resale of the products made in the fac- part of a well-planned public relations program.
tory to members of the community, or sales of Alone, the security department cannot carry
raw materials to the factory by other businesses out a successful public relations program. The
in the community. This would have a positive entire parent or client organization must be
impact on the community, and therefore, would involved. However, the security contingent has
result in very good public relations. no control over the entire company, and is not
As for image, if a factory is making bombs responsible for what other departments in the
for the military, it projects a different image in company do. Security officers can only be respon-
a community than a factory that is making baby sible for their own conduct. In the area of public
formula or toys for children. The community relations, the security contingent must conduct
may become quite disturbed having a bomb themselves in a planned and organized fashion,
factory in their backyard, and they may revolt. sometimes with blinders on. It would be most
Thus, the venture of the business will have unfortunate if the security contingent followed
either a positive or negative image in the com- bad examples set by those in other departments.
munity that reflects directly on public relations. To accomplish the goal of projecting a
No matter what the business is involved in, positive image, the security contingent must
the security officer is many times the “out front” first have a quality program in place. Image
person for that company, frequently the first is meaningless if it is a false veneer. Once this
contact that anyone will have with the company, is done, the Ten Rules of Public Relations in
and therefore must pay particular attention to Private Security can be applied.
the topic of public relations. Based on the wide
variety of responses the general public may 1. “The customer is not always right or
have to your company, first contact could be wrong.”
anything from very friendly to very unfriendly. While you may disagree with this from a
Therefore, a sincere “How can I help you?” security perspective, the most important thing
must be permanently at the ready when making to remember is to never tell the person with
first contact. Being a helper, a pleaser, and a whom you are dealing that they are wrong. It is
“can-do” problem solver are the traits of a to the benefit of all concerned that the security
successful public relations-minded security officer work toward a position of mutual coop-
professional. eration and prevent all situations from escalat-
ing into a win-lose proposition. The person you
are dealing with must be skillfully redirected
PUBLIC RELATIONS PLANNING into appropriate behavior, not bullied. This per-
son must, as often as possible, leave a situation
In maintaining a good public image, the secu- feeling that they were well served by the advice
rity officer must not only look professional and and assistance they received from the attending
perform in a reasonable and necessary manner, officer. This is not to say that self-defense and
but must also appear truly concerned, speak defense of others will never be the case for the
adaptations taken from those suggestions ● Avoid giving the impression that your
(Fay, 1993): presence should be interpreted as a
● Officers should always remain polite, threat. Your demeanor should project
respectful, and sensitive to the needs of your concern and care for the needs of
the person being served. Use empathy, the person you are interacting with. A
not sympathy, in dealing with people. great opening statement is “How can I
Remember that you have no more help you?”
power than that of any other citizen; ● Even if the person you come in contact
you are not a police officer (even sworn with is being aggressive, avoid physical
officers must realize that power struggles contact if at all possible. Use verbal
are unproductive). Remain detached, deescalation whenever possible. If
and ignore personal insults. You are physical contact is necessary, be sure
only enforcing your employer’s policies that your physical response is in self-
and procedures; they are not your defense, reasonable, and necessary.
policies and procedures. The insults are Most of all, remember that your
actually directed at your employer or physical response may be witnessed by
the situation, not at you. the general public, and therefore, must
● Be businesslike at all times. Treat the look professional. It must appear that
person you are interacting with the you are in control.
way you would want to be treated ● You are under no obligation to disarm
under similar circumstances. Anger, an assailant with a knife or a gun, or
impatience, contempt, dislike, sarcasm, to chase down an assailant. Officer
and similar attitudes have no place in safety comes first. Instead of disarming
public relations. or capturing the bad guy, evacuate
● Treat each contact as a process, the area, create a safety zone, and
consisting of several phases, instead keep your distance until assistance
of a happening. Slow everything can arrive. This will look a lot more
down, and take time to evaluate the professional to the media and will keep
environment you are about to enter. everyone safe.
Size things up as accurately as possible
before making contact.
● Remember that although you intend HANDLING CUSTOMER
to deliver customer satisfaction with COMPLAINTS
each contact, be it conflict resolution, or
While constant practice of the principles of
simple assistance, it must be resolved
customer relations will preclude most com-
within the guidelines of civil law,
plaints from occurring, there are still times when
criminal law, administrative law, policy,
security officers must play the role of ambassa-
procedure, and ethics. Be sure not to
dor or diplomat. In some cases, they must even
stray outside these parameters.
act as “referees.” A few points to remember
● Avoid arguing at all times. Never back
about handling complaints are:
the person you are dealing with into a
corner. If the situation becomes heated, 1. Treat all complainants with respect.
give or get space, and continue to Every complaint or objection should be han-
use verbal deescalation to defuse the dled with respect for the complainant, no mat-
situation. ter how absurd it is. Always treat the person
TRAINING
Communication
● Administration of a central operator/voice- Training and educational services help to
mail system integrate the security department within the
organization and make it more visible. Here are unexciting, or lacks titillation, the media will fill
some options for providing training services: the gap. They are more than willing to create
● New employee orientation filler to make their stories more appealing to the
general public.
● Periodic safety/security training
If you have ever been quoted by the media,
● Nonviolent crisis intervention
you probably found that the words you said
● Employee college tuition reimbursement
during the interview and the words that were
programs for security officers
attributed to what you said, do not match
● Security officer cost reimbursement
exactly. Something has been deleted. Something
programs for attainment of certifications
has been added, and sometimes, the entire
● Employee tuition reimbursement for security
quote is a fabrication. You wonder how that can
officer CEU attainment
be since you spoke into a tape recorder during
the interview!
THE MEDIA: GOOD DREAM/BAD Now imagine that you have an incident at
DREAM your place of employment. The media shows
up, and they stop at the first person they see.
With respect to the media, it can be the Who would that be on most occasions? You!
thing you have been dreaming of, there to pro- The security officer. They want to interview you
mote the good work the security department is regarding the incident. Do you give them an
doing, or to send the message that your secu- interview or direct them to the public informa-
rity department is not soft on crime, or to help tion officer for the client company? The answer
at budget time to make your department look is that you have no choice; you cannot give
good, or to send any number of helpful mes- them an interview. However, you must refuse
sages. In today’s society, no organization can the interview in the right (professional, courte-
survive without positive media relations. ous) way. Here are some ideas of what to do:
If you save someone’s life, intervene in an
assault and arrest the bad guy, or drag some-
● Use your very best public relations skills, as
one from a burning vehicle at a crash scene just pointed out previously.
moments before the vehicle blows up, the media
● Be polite, and give the media the number to
wants to know. They will break their necks to reach the public information officer (PIO).
get to the scene and start looking for heroes to
● If they press you for a statement, be polite,
interview. They will usually arrive with the first and continue to refer them to the PIO.
responders because they are out there listening
● If the PIO is on site, direct them or take them
to the emergency scanner frequencies. to the PIO.
On the other side of the ledger, if you mess
● If they press you further, call in your
up, the media can be your worst nightmare. supervisor, who will repeat the above.
That negative story will hit the media with big-
● NEVER, NEVER, NEVER give an interview!
ger headlines, more repeat stories and sidebars,
● NEVER say, “No comment!”
than anything positive you can do. The negative
● NEVER be discourteous.
story will seem to last forever. From that day Other problems with the media that are of a
on, your security department will be known by security nature can be anticipated at the scene
the negative story line. Unfortunately, bad news of a critical incident. These include:
sells better than good news.
Regardless of the story the media finds a. Access control
when they arrive at the scene, if it is too bland, b. Disruption of business operations
ACCESS CONTROL AT THE SCENE is of such a nature, like a murder or rape or other
OF A CRITICAL INCIDENT crime, that the place of business is intact and con-
tinues to operate, the valuable security processes
Access control is an absolute priority at the must also remain intact. Patrols must be main-
scene of a critical incident. However, access con- tained, property must be protected, alarms must
trol can set up a power struggle between secu- be responded to, restricted traffic control within
rity and the media. Under most circumstances the business must be maintained, and so on. This
and for any number of reasons, mainly safety is true even if the business is shut down due to
and legal reasons, security must deny access a fire, explosion, or accident. What this means is
to anyone who is not a public assistance pro- that there must be a contingency plan to meet the
fessional: police, medical, or fire professionals. needs of all types of incidents. For this purpose,
This includes the media. the company has two alternatives:
The media will sometimes utilize devious ● Create a plant emergency organization (PEO).
means to attain a story. They may try to sneak in ● Call in a contract security contingent.
a back door or simply walk in when you are not
looking. They may even be involved with divert-
ing your attention to allow a reporter to scoot in PLANT EMERGENCY
the front door. They may overwhelm you with ORGANIZATION CONTROL
numerous reporters attempting to gain access at
the same time, on the theory that some will get The plant emergency organization (PEO) is
through the lines. Fortunately, in most cases, after a group of people who work in other depart-
meeting a modicum of resistance, the media will ments and are trained to respond to emergen-
back off and revert to other ways of getting the cies. Usually, a group of a dozen to two dozen
story. Once they have made contact with the PIO, individuals, scattered over all shifts, will make
the pressure is usually off the security department. up the PEO. During critical incidents, this group
The “feeding frenzy” of reporters at the criti- stops what they are doing and reports immedi-
cal incident scene relates back to what we pointed ately to a predetermined assignment or location.
out in the beginning of this unit. We told you that This immediately expands the private security
the public has a “right to know” because they capabilities so that both the critical incident and
have an interest in what businesses are doing in the critical security procedures continue to be
their community. The media are the keepers of serviced at the same time.
that public right to know, and they doggedly go These trained PEO members are under the
after the facts to get the story. The key for security direction of the security director, regardless of
is to know where to draw the line. However, you who they work for in the company. The best
cannot reduce perimeter access control to appease candidates for this detail are usually the mainte-
the media. That is why it is so important that the nance and facilities workers. However, anyone
public relations department of your company can be used in the PEO, and they sometimes
appoints a public information officer to take the take volunteers from all departments.
pressure off security during critical incidents.
CONTRACT SECURITY
DISRUPTION OF BUSINESS CONTINGENT ACCESS CONTROL
Disruption of business operations is another Your security department will want to iden-
area of concern for security. If the critical incident tify a local contract security company to be called
in during certain emergency situations. The con- special instructions to keep out of the public
tract security company will commit to a certain eye until the issues are resolved. Public disclo-
number of emergency staff, each hour, until the sure of information vital to the prosecution may
required number of personnel can be assembled. destroy the prosecutor’s case.
Special pricing will be established to ensure The preceding security measures are not
immediate response. For instance, during the exclusively set up to control the media. Relatives
first hour of the emergency, the contract security of injured parties, children, and other innocent
company will ensure that at least six security offi- parties may be placing themselves in danger
cers will respond. Another six officers will arrive by gaining access to an emergency scene under
within the next 2 hours, and the remainder of certain circumstances. Your job is to prevent
individuals required will arrive within the next that from happening. However, your primary
3 hours. At that point, three shift contingents will responsibility is to do your job while main-
be set up until the emergency is over. Flexibility taining good public relations, and that means
will be built into the plan, so that the security maintaining good relations with the media. The
director can control the number of individuals media must be accommodated—they need to
sent by the contract security company. do their job. They must also be managed so that
With these PEO and/or contract security they do not jeopardize that asset which is valu-
people available, they can block all the perim- able to every organization’s image.
eter doors and set up emergency access con-
trol to help control the media. In addition, the
security department will have large, special, CONCLUSION
color-coded tags for everyone to wear during
the emergency. If the employees are sent home, The overwhelming majority of the rule-
everyone who enters the building will have to keeping practices of security officers consists
enter through one door and receive their spe- of public relations. We are not bossy, disre-
cial tag at that door. These tags will signify spectful, or discourteous. We are the “goodwill
times and levels of access, and whether or not ambassadors” of the clients we serve. We are
escort is required. Large, brightly colored tags mostly hands-off practitioners. Verbal deescala-
with the word “MEDIA” printed on them are tion is our first and most successful tool. At the
reserved for use by the media, and these tags same time, when necessary, we can become the
should always require escort. defender of people and assets, capable of miti-
Anyone found without a tag, except public gating threats. Hopefully, this chapter will help
service personnel, should be required to report the reader understand how important public
to the main door and log in or leave the prop- relations is to security.
erty. If the employees are not sent home, then Performing public relations involves being
they should be required to show a badge for other-person-centered. We do not spend our
access, and should be asked to remain in the day finding ways to make our jobs easier for
building and avoid talking with the media. All ourselves at the expense of others. It is our duty
employees who are also witnesses to the events to spend our time designing ways of helping
surrounding the incident should be asked to others, even if the only way to accomplish that
go to a debriefing room set up by security, and goal causes us to work harder, longer hours, or
they should be asked to give statements of what to exert more energy. Providing superior cus-
they have witnessed. Public law enforcement tomer service is the best way to greatly improve
may want to be in that room under certain cir- public relations because the public truly values
cumstances. These witnesses should be given good customer service.
EMERGING TRENDS
With respect to public relations as a major part There is also a trend in the security industry to
of a security officer’s job description, the main emphasize public relations and customer service
emerging trend is to expect that standard oper- in mandatory training curriculums set up by state
ating procedures will, in the future, place a very licensing boards. In as much as there exists a cur-
high emphasis on public relations through effec- rent trend in the United States toward mandatory
tive customer service. It has been our experience pre-assignment and continuing training for secu-
that where we find good public relations and rity guards, a trend is developing for additional
good customer service, those two attributes are learning and practice in numerous prime topic
followed by a high level of safety and security. areas. One of these prime topic areas of study
That is, proactive prevention is operating through is public relations through providing top-notch
all that contact with the people the security offi- customer service. In the future, an even stronger
cers meet and serve every day. The security bond between these two concepts will continue;
officer’s presence announces to all who see it public relations through customer service will
that this facility is a hard target. Criminal activi- continue to be a primary, critical, proactive, pre-
ties should not be practiced in this hard target ventive safety and security strategy.
area, less the perpetrators are willing to experi-
ence harsh consequences.
3. To accomplish the goal of projecting a d. Assure that security officers are not
positive image, the security department “shafted” out of vacations and days off
must first have a quality program in place. 6. In addition to daily refresher training,
Once this is done, the Ten Rules of Public supervisors should make certain that the
Relations in Private Security can be applied. security officers in his or her command adopt
Which of the following is not one of these favorable work behaviors. Of the following
rules? work behaviors, which is not included in the
a. The Security Officer must select the text?
persons he or she will serve a. The security officer should be schooled in
b. The Security Officer must be attentive to money management so they will be able
the other person’s needs to live very comfortably on the wages they
c. The Security Officer must believe that receive from being a guard
image is a valuable asset b. The security officer should be encouraged
d. The Security Officer must have a “Can-Do” to belong to professional organizations that
attitude serve safety and security practitioners
4. In addition, the Ten Rules of Public Relations c. The security officer should wear the
in Private Security instruct the security picture ID in a conspicuous location on the
officers in the following ways. Which one of front of the uniform
the following rules is incorrect? d. The security officer should be instructed
a. When you see someone looking around to watch his or her breath, excluding garlic
like they are lost, approach them and ask if or onions before work to prevent offensive
you can help them smelling breath when talking to those
b. Realize that public relations is not about being served on the job
being right all the time; the customer is 7. Handling customer complaints is not always
sometimes wrong. However, being right or fun. In some cases, the security officer
wrong is not what is important. Service is. may wind up acting like a referee. Of the
c. When the person you are serving only wants following, which is a good recommendation
to be argumentative, you must cut them off for how to handle complaints?
cold and take over the conversation a. Treat all complainants with respect, and
d. When approached by someone for help, never allow yourself to be dragged into an
say “yes” even before they tell you argument
what they want. You work in the “Yes” b. Allow the complainant an opportunity to
department. YOU have a “Go-to attitude.” save face. Do not embarrass them in front
5. There are many actions that a security of others
supervisor can take to motivate their c. Give the complainant credit for their
subordinates to do a better job at public contribution, with a compliment like, “You
relations. Which of the following is not one of have a good point there. I can see how
those actions? others have made this same mistake.”
a. Brief each security officer on current events d. All of the above
within the work site daily 8. Security departments are service
b. Give each officer extended smoke breaks as departments. The personnel in security
a reward for a job well done departments can be found doing all kinds of
c. Conduct a personal inspection of each jobs to help their companies. Of the following
officer before the shift starts activities that security officers might be asked
to do, which is not likely a task they will c. Work site offices
follow? d. None of the above
a. Lining up catering services for the CEO’s 10. Whenever a facility has a critical fire, explosion,
annual vice presidents’ meeting and golf or other cataclysmic event, the media is sure to
outing be there. When they arrive, they will attempt to
b. Administering of a central operator/voice- interview the first person they see so they can
mail system get the story on the evening news. Many times,
c. Employee transport within the confines of that person is the security officer. Which of the
the facility following is a good idea of how the security
d. Training new recruits and providing officer should respond?
orientations for new hires a. Be very, very polite and direct the media
9. By performing a risk analysis, the security to the designated media liaison person
department is placing itself in a security b. If media presses you for a statement,
consulting relationship with the company. contact your supervisor, and let the
Risk analysis can also help with loss control supervisor deal with the media in that case
efforts. Which of the following is not a c. Just put your hand over the camera lens
setting where a risk analysis would be very and say: “No comment; you have to
helpful? leave now.”
a. New construction/renovation d. Never, never, never, under any
b. Executive/employee homes circumstances, give an interview.
43
Community Relations: Making
the Strategy Come Alive
Mark E. Puetz and K.C. Poulin
535
536 43. COMMUNITY RELATIONS: MAKING THE STRATEGY COME ALIVE
Two teenagers stand before a gumball machine at the they called an “experience economy” (Pine &
mall. They insert a coin and watch one of many colored Gilmore, 1999). From the earliest days until
gumballs fall through a dizzying array of chutes and slots
on its way to being dispensed at the bottom. The machine
fairly recently, most of our economic activity
lights up and plays music as the gumball makes its was designed to get the things we need directly
journey. Neither teenager takes any of the gumballs they from the earth through hunting and gathering
purchased. Instead, they just laugh and giggle. They seem or farming. Ours was an agrarian economy. In
simply to enjoy the show. the 19th century, we moved into an industrial
You purchase a new gadget from the local electronics
store. When you get home, you find out it does not work.
economy where most of our effort was dedi-
You call the store and they ask that you return it. When cated to making things. We used raw materials
you do, your defective gadget is exchanged for a brand pulled from the earth and mass-produced all
new one, no questions asked. manner of goods. As recently as the 1980s and
In July 1969, Neil Armstrong became the first man 1990s we started to see more businesses geared
to set foot on the moon. NASA folklore says President
Kennedy visited NASA sometime months before the
not toward making things, but in doing things
launch. He spoke with a number of people on his tour. At for others. In this service economy we saw com-
one stop he asked a janitor what his role was in the space panies built around personal assistants, dog
program. “Mr. President,” the janitor responded proudly, walkers, international shipping corporations,
“I am helping to put a man on the moon.” and so on. According to Pine and Gilmore, the
experience economy is evolving as the next step.
What do these short stories have in common? To be sure, there is still a significant amount of
How do they relate to what you do? If you are agrarian economic activity going on, and ser-
the suspicious type, you may think to watch vice businesses of one sort or another have
the teenagers more closely, or wonder if you existed for a very long time. However, overall,
are being watched for making a bad return as the notion that our economies have evolved or
part of a larger scam, or maybe you wonder if can be broken into categories is interesting and
the janitor was a plant. Indeed, a certain amount informative.
of suspicion is necessary to be successful in our The notion of the experience economy sug-
business. However, we are going to consider gests that people are buying not only because
these anecdotes a bit differently. We are going they need this or that, or they need something
to look at them from a larger, business perspec- done, but because they want a particular thrill.
tive, one of how you fit into ensuring busi- The teens putting money into the flashy gum-
ness success. As suggested above, how these ball machine wanted the “experience” of watch-
tales are interpreted is the difference between ing the gumballs fall through the maze and
a security officer and a practitioner, between listening to the music. We go to concerts or the
one who merely punches a clock and a true theater because we want the “experience” of
professional. the music or the show, something we cannot get
with just a CD or video. We go bungee jumping
or hang gliding or even skydiving because we
want the thrill of our stomachs in our throats,
SECURITY AND THE EXPERIENCE the adrenaline rush. Business leaders have
ECONOMY learned the lessons here. Look at advertising
today. How many car commercial messages, for
In the 1990s, B. Joseph Pine II and James H. example, are based on the qualities of the car
Gilmore took a close look at how businesses and itself and how many are based on a “feeling”
economies have evolved through human history you will get when you drive that particular car:
and suggested we were then moving into what the “experience”?
one of its officers or vehicles, there should be no accidental. They are designed to send those mes-
doubt as to who they are. The brand follows the sages to you. More often than not, they work!
strategy. A well-armed security officer wearing Your operation should develop a series of cues
a distinctive uniform with a clear logo on his that send positive messages, and reinforce the
truck or utility vehicle fits well as an antiterror- strategy and brand. Sticking with our antiterror-
ism officer, less so as the access control officer ism versus access control officer example, what
in the professional building. Conversely, a secu- cues can be seen between the two? The antiter-
rity officer wearing a blazer and tie or a crisp rorism officer, protecting critical infrastructure,
uniform does fit well in the professional envi- may carry an assault rifle, a very powerful cue.
ronment, and maybe not so much so in an anti- He might be dressed in a manner that appears
terrorism deployment. militaristic and combat ready, with helmet, tac-
You are part of that strategy and branding. tical vest, heavy boots, and so on. To the poten-
You should wear your uniform, whatever it tial attacker, he sends a very powerful message
may be, correctly. You should endeavor to look of “Do not come here!” which translates to a
sharp, according to your operation’s rules for positive set of cues for those in the community
uniform wear. The uniform is not an exercise in or environment he protects, “This security offi-
self-expression. It is designed, by definition, to cer is very well equipped to protect us.” The
make everyone wearing it appear “uniform.” It security officer working in the high-end pro-
is designed as part of a consistent theme. Part of fessional building might be dressed in pressed
this, too, is your demeanor and how you pre- trousers and shirt, with a conservative tie, a
sent yourself to your superiors, those you pro- classy looking blazer with a distinctive patch
tect, and other users. You should maintain an on the pocket. Or maybe he will wear a uniform
even temperament, be well reasoned, and think shirt and trousers reminiscent of law enforce-
clearly and critically. Your reports should be ment or military dress. The message he sends
thorough, yet concise. You should be an image of is that he is a professional and fully capable of
competence at being an antiterrorism officer, an interacting in this environment. If he wears a
access control officer, or whatever sort of security uniform, an added duty belt may send an addi-
officer fits your operation’s strategy and brand. tional message that, while professional, he has
When others in the community or environment tools available to support him when he needs to
see you, you are your operation’s brand! be stern (as in when denying access to those not
Layer the Theme with Positive Cues: When authorized to enter). Even the security officer at
you visit an amusement park you are teased that amusement park can send those positive
almost as soon as you enter the parking lots. cues. He may interact proactively and person-
Signs with images of the park’s characters ably with guests. While he is making the guests
direct you through traffic. As you get closer feel welcome, he is also letting them know he
to the front gate, you may hear the screams of is there and that he is watching out for them.
guests already inside as they fly by on one of This sort of “preventive interaction” can be very
the twists and turns of a rollercoaster. Once at powerful, as we will see later.
the gate, you hear theme music, you see cos- Positive cues sent by the security opera-
tumed characters walking around, and park tion may consist not only of the deliverable
employees are all “on stage” doing everything of regular reporting, but also of having a key
they can to make you feel welcome and want- manager or account representative contact the
ing more. Everywhere you turn you see or hear client or supervising executive and reinforcing
another “something” sending you the message whenever a positive security event occurs. This
that this is a fun place to be. These cues are not point of contact may or may not read all of the
powerful positive cue. The agency has negated, t-shirt? Have you ever eaten at a restaurant and
or managed, the negative cue in doing so. The left with a toy for the kids, a commemorative
security operation should be ahead of the point of glass, or some other such gift? Have you ever
contact wherever possible, too, in developing solu- gone anywhere and come back with a souve-
tions for any security worry he may have. When nir? These items are designed to trigger your
the business plans an expansion, for example, he memory every time you see them, to serve as
may have myriad other things on his mind, only “mementos” of the “experience” you had when
to find out later that he missed something impor- you first got them. They act as “positive cues”
tant. If the security operation knows about the long after the experience is over.
expansion and makes suggestions as to potential Many companies send birthday or holiday
security risks that can be addressed, the contact cards to clients. When personally signed, these
can see them as an operation interested in solving show a “human touch” and often are displayed
his problems before they become headaches. on the recipient’s desk or wall for a few days or
On the ground, day or night, you should through the season. A lot of companies also
adopt a similar approach. When issues or wor- offer pens or pads or mugs or any manner of
ries are identified, address them. Act within things with their logo emblazoned on them.
your scope of authority and do whatever you Military or law enforcement organizations may
can to solve the problem. When the solution is give certificates, special plaques, or even chal-
outside your scope of authority, refer it to the lenge coins. Offering a memento that is unique
appropriate party, whether your supervisor to the agency can go a long way in reminding
or a point of contact, depending on your own clients of the security operation even when its
operation’s rules for such things. Never let an personnel are not in front of them or reaching
issue fester unattended, though. They have a out to them to follow up on an issue or maintain
surprising knack for growing well beyond mere the relationship of the account.
headaches then, and tend to become cancers Where you, as the security officer, may be
that can seriously infect your operation and authorized by your operation to do so, pass out
those you protect. Your challenge, as a security mementos as appropriate. While some security
officer, is to educate yourself so you can iden- operations create related literature, brochures
tify what is or is not an issue. Some things are with security tips, for example, many of us on
easy; an unsecured external door after hours is the front lines do not have this available to us. If
likely a concern. Some things are not so easy; these are available, pass them out freely. If you
what do you do when a day shift employee have nothing like this available to you, you can
wants to get into the building on a weekend to offer compliments or affirmations, recognizing
get something from his desk so he can work on or encouraging those you contact in their efforts.
a project at home? Policies and procedures can What stays in the person’s mind is when you greet
offer valuable guidance, but they cannot predict everyone with something like a simple, “Good
every possible circumstance. At some point, morning, Mr. Jones, good to see you again,”
you must make a decision. When you address versus, “Good morning, Mr. Jones. I certainly
such issues fairly and responsibly, your super- appreciate having alert people like you around.
visors and the client contact or supervising It makes the whole place a lot safer when every-
executive see them being addressed—a positive one is paying attention.” If possible and appro-
cue—before those issues become real concerns priate in your environment, engage Mr. Jones in
for them—a negative cue. simple conversation when you see him. It may
Offer Memorabilia: Have you ever gone to sound trite, but Mr. Jones now feels welcomed
a concert or event and come home with a tour as part of the security effort and appreciated for
Create a Consistent ● Focus the strategy and all following ● Wear the agency uniform correctly and look
Theme actions. sharp.
● Create a powerful and consistent brand. ● Maintain an even temperament.
● Write all reports and communiqués
professionally.
Layer the Theme with ● Provide regular reporting. ● Interact professionally and personably with
Positive Cues ● Talk about the successes. everyone.
● Reach out often. ● Be proactive when faced with problems or
● Be accessible. challenges.
Eliminate/Manage ● Communicate openly about the bad (bad ● Do not let issues fester. Address them.
Negative Cues news must travel fast). ● Be liability conscious.
● Develop solutions for worries the client
or oversight authority may have.
Offer Memorabilia ● Remember key events (birthdays, ● Use affirmations and positive reinforcement in
holidays, etc.). all interactions.
● Offer agency mementos. ● Distribute agency-approved literature.
Consider All Five ● Sight: Ensure everything (uniforms, ● Sight: Ensure your uniforms, grooming, and
Senses materials and literature, vehicles, etc.) is bearing always appear professional and inspire
visually appealing. confidence.
● Sound: Keep all conversations ● Sound: Speak clearly and authoritatively.
professional, yet friendly.
● Smell: Pass the “smell test” with ● Smell: Keep yourself clean and well groomed,
all actions (contacts, reporting, with no offensive body or perfume odors.
investigations, etc.).
● Touch: Make every “touch point” a ● Touch: Use firm handshakes. Take excellent care
positive experience. of client equipment.
● Taste: Never leave a “bad taste in ● Taste: Never leave a “bad taste in the mouth” of
the mouth” of the client or oversight anyone.
authority.
more detailed procedures represented a cost. a cost. It was returned and sent back to be fixed
Even redesigning processes represented costs. or scrapped, costs. The only saving grace in this
It does not stop there. Remember that elec- example is that they made the exchange with
tronic gadget you purchased in the second no questions asked which, hopefully, meant for
example at the very beginning of the chapter? a positive experience and well-managed nega-
Imagine that as the widget. Now you have a tive cues for you.
defective widget. You took time out of your All of these costs are known as the “total
day to complain. That is time you could have quality costs.” Whole disciplines and count-
been doing something else, a cost to you. The less consultants have sprung up to help compa-
person who took your call probably had to be nies reduce these costs. Keep in mind that the
paid either way, but he could have been doing money spent in these areas is money that cannot
something else, too, another cost. You took be spent elsewhere, such as in business expan-
more time out of your day to return the widget, sion or on wages and benefits for you and your
as part of doing business. A security operation checklist, an appraisal cost, may be useful in
often incurs the additional cost of conducting a avoiding this, for example?
threat assessment or other security review prior External Failure Costs: Some failures occur
to taking on a new account or new responsi- after our services have already been delivered.
bility for just this reason. Similarly, they hold Just as with all the costs incurred when you
managers’ or supervisors’ meetings to ensure returned your defective widget in the opening
the regular flow of information and early iden- example above, complaints from any party and
tification of issues. Licensure, certification, and all that must be done to address their concerns
training may also be counted as prevention represent failure costs. Even though some can-
costs. As the security officer, you can ensure not be avoided, since mistakes do happen or
you are aware of the layout and security issues because some people seem simply to enjoy com-
of the facility or property you are assigned to plaining, our efforts to create a positive experi-
protect. You should also communicate regu- ence at the point of service delivery, when we
larly with your supervisors just as they do with are on our rounds and interacting with others,
theirs. Most important, you should be proac- can go a long way to minimize them.
tive in your patrols and duties, especially in
building relationships, thus creating a positive
experience for those who live and work in the FROM STRATEGY TO BRAND TO
environment you protect. OFFICER
Appraisal Costs: Appraisal costs, the costs
associated with checking up on ourselves, are At its most basic, business strategy is about
an important part of anything our agency does, who, what, when, where, why, and how. Who
or we do if we are serious about ensuring a are the buyers or primary users of our services
positive experience for those who use our ser- and who are the other users? What product or
vices. Reporting and statistics allow the secu- service do we provide for them? When do we
rity operation to identify concerns or trends and get it to them? Where do we compete, either
address them proactively. Inspections of secu- geographically or in the marketplace? Why
rity officers and sites do the same. Even security do we provide that product or service? What
drills and performance tests may be appraised. problem are we trying to solve? How does our
You should always be conscious of the quality product or service solve that problem? Another
of your patrols and inspections, to ensure you question that may be added is one of how we
have covered and considered everything for prepare for or deal with change (Davidson,
which you are responsible. 1996). Although far beyond the scope of this
Internal Failure Costs: Failure costs, those work, answering these questions in detail and
incurred as a result of some shortcoming on our exploring them fully can lead a business into
part, are to be avoided or minimized wherever developing a powerfully competitive strategy.
possible. Not doing a thorough threat assess- With some tweaking, even an in-house opera-
ment, and thus failing to consider a material tion will probably address these questions, con-
security risk or a security officer not making sidering everyone to whom it is accountable
complete rounds and missing an unsecured and what their concerns may be.
door, are incidents representing failure costs. For our purposes, though, let us consider
Even not connecting with the members of the these questions briefly, in a different order, in
community you patrol and missing something terms of three different hypothetical security
they could have told you about could be con- operations: one contract agency that provides
sidered a failure cost. Can you see where a electronic access control and camera monitoring
Who: Who are our customers? Our customers are private businesses or commercial
interests who need to provide controlled access to
restricted areas, and document who enters or exits those
areas.
Where: Where do we compete, or find our customers, either in We service customers in the greater metro area and up
terms of geography or the marketplace? to 25 miles outside the city limits. We service customers
who have office buildings or gate access to outside
areas. We do not service private homes or government
facilities.
Why: Why do we provide a product or service to them? What We allow our customers to keep unauthorized people
problem do we solve for them? out of restricted areas, and to track who does enter and
when.
What: What product or service do we offer? We offer electronic key card, biometric scans, and video
surveillance with internal monitoring. As an additional
offering, we provide external monitoring.
When: When do we provide this product or service to the Our products provide real-time monitoring and
customer? customizable reports with frequency and distribution
determined by the customer.
Change: How do we prepare for and deal with change? Executives attend trade shows. Executives, account
representatives, and senior supervisors subscribe to
trade magazines. Our board and executives consider
trends in our industry and threats at least annually.
Key clients are invited to participate in our strategy
board meeting.
Who: Who are our customers? Our customers are the owners and executives of the resort
chain.
Where: Where do we compete, or find our customers, We service the entire range of resort properties in our
either in terms of geography or the marketplace? company throughout the southeastern United States,
particularly along the coastlines. Our resorts serve exclusive,
high-profile clientele and boast five-star facilities.
Why: Why do we provide a product or service to them? Our resorts want their clientele to enjoy their vacations
What problem do we solve for them? without the hassle of outsiders, whether paparazzi or news
media.
What: What product or service do we offer? We offer highly professional, concierge-type security officers
who dress in casual resort attire so as not to offend guests,
but with distinctive uniforms to make their roles clear. We
also partner with a provider of CCTV and other technological
solutions to monitor perimeters and gates.
When: When do we provide this product or service to the Our security personnel are present 24/7 on all of our sites.
customer?
Change: How do we prepare for and deal with change? We coordinate closely with our executives and operating
managers and attend resort conventions to fully understand
our business and its many issues.
Who: Who are our customers? Our customers are factories, industrial complexes, and similar
businesses.
Where: Where do we compete, or find our customers, We service customers in the midwestern United States. Our
either in terms of geography or the marketplace? customers are manufacturers or raw material extractors.
Why: Why do we provide a product or service to Our customers are worried about safety conditions for their onsite
them? What problem do we solve for them? employees and monitoring of gauges and readouts after hours.
What: What product or service do we offer? Our security officers are highly trained in government regulations
about workplace safety, particularly in industrial or factory settings.
We check key readouts or indicators to ensure critical equipment
is operating within acceptable parameters. We also assist in
developing safety training programs.
When: When do we provide this product or service Our security personnel are available day and night for our clients.
to the customer?
Change: How do we prepare for and deal with Our senior staff regularly watches legislative changes and keeps
change? abreast of regulations about workplace safety issues that affect the
business of our clients.
that merely meets the customer’s needs at How can we build relationships with our pri-
any touch point is a “satisficer.” Whereas, any- mary users and others that go beyond the tradi-
thing we do that goes above and beyond the tional client/contractor or business/department
customer’s needs and makes his “experience” satisficer and into a partnership/community
that much more interesting and positive is a delighter? If all we want to do is sell hamburg-
“delighter.” ers or cars or museum tickets, we can probably
Most of the other chapters in this book are get away with rather superficial efforts like
about the various technical aspects of security: those already noted. But if we want to get peo-
how to patrol, current technologies available, ple involved in making their community safer,
risk or threat assessments, and so on. Mastery whether they are in an apartment complex,
of these is absolutely essential to success and a factory, a resort, or almost any other place
cannot be shortchanged if the operation or the where people gather, we need to be able to offer
officer is to be taken seriously. Without these, something much more substantive than com-
everything else is little more than illusion, memorative t-shirts and special club patches.
smoke and mirrors. That being said, the chal- How can we build an “experience” that leads
lenge of a security operation, or its officers, to “community” and really goes to the heart of
is to find ways to make these satisficers into security and making people feel safe? A deeper
delighters. By now it should be abundantly question might be, “How can we build a com-
clear that the key to this in our business likely munity with substance?”
lies in the “experience” perceived by those who Primary User Relations: We have already
benefit most from our services. In developing a hinted at some of the things we can do to bring
focused strategy, maintaining a strong brand, our primary user, the one who contracted with
and in creating positive experiences we move us or is responsible for allocating budget dollars
away from simply checking doors and rattling or issuing directives to our department, into
windows and into developing relationships the fold; a dedicated key manager or account
with our various users that serve to delight representative, proactive communication, or
them. We want them to become part of the secu- memorabilia, as examples. Ideally, the primary
rity effort, active participants. user always feels as though he has easy access
Aside from all of the examples we have to key personnel with the security operation for
already given about building an experience, any issues or concerns he may have. But how
how many other successful businesses use simi- can we really bring him in and make him more
lar tactics in building a strong sense of com- than just a “user”? How can we develop the
munity among those who use their products or client relationship into more of a partnership?
services? High-end car dealers offer rallies or Or, in the case of in-house operations, how can
car shows. Motorcycle manufacturers merchan- we “manage” the primary user so he sees us as
dise jackets, hats, t-shirts, and so on. Theme valuable contributors rather than another non-
parks and museums offer memberships and revenue-generating cost center?
special events for members only, so their cli- The partnership concept often begins at the
entele feel part of the “club.” If you think about very beginning. That is, we must impress upon
it, you can probably come up with even more the primary user, before he even becomes one,
examples. All of these create the “experience” that we are not merely to be contractors or just
and serve as delighters, inviting the client or another cost center, but partners in the security
parent business into a relationship that goes effort. The language of our contracts and any
well beyond that of simply being a buyer or related literature should express the responsi-
user of our services. bilities of both parties in this partnership. Our
preventive interaction or some combination of build very strong relationships with the parents
the two. Everything you learn in the other chap- in the community, which will assist greatly in
ters in this book are now brought to bear. managing the many juvenile issues that almost
Imagine your relationship-building process undoubtedly will arise.
in three phases: networking, anchoring, and Community Integration: As an extension of
community integration. anchoring, you take the next step and reach
Networking: Networking, at its core, is out to the community as a whole, rather than
about building positive relationships based on as separate parts. You become an active par-
trust. It is more than merely waving at or chat- ticipant in, or organizer of, community events
ting with residents and getting to know the specifically designed to further the community-
neighborhood, but also involves you introduc- building effort. These are often limited only by
ing the neighborhood to itself again. Ideally, your creativity and initiative, as well as your
you are the one who leads the charge in get- organizational talents, and may appear as trash
ting residents involved in their own community clean-up days, field days, cookouts, and so on.
through a variety of initiatives, such as par- The security operation for which you work may
ticipating in or organizing community events, even encourage you to coordinate such events
being a positive role model, playing with chil- and will ensure appropriate resources can be
dren so they and their parents can enjoy the allocated to assist or participate.
common areas and amenities, and encouraging Consider on your own how this paradigm
residents to interact positively with one another, for community building can be used in differ-
with you and your fellow officers, with local ent settings, different strategies. What sorts of
law enforcement, and with other community networking or anchoring might be fitting in an
resources. industrial setting? How can security personnel
At this stage, residents see you as a resource. be active participants in community integra-
You are friendly, supportive, and encouraging tion efforts in a professional building or luxury
in assisting them in addressing their challenges. resort? Do not underestimate the value of this
You are aggressive and tireless in driving away concept. Take some time and seriously consider
the negative influences that have impacted how this may be used in the environments
the community in the past. This phase tends to where you usually work (see Table 43-6).
see a lot of proactive intervention and preven- The community-building concepts of net-
tive interaction, with you displaying an agile working, anchoring, and community inte-
mind-set mastering both, as described above. gration can be applied to any setting, any
Can you grasp the power of this sort of “experi- environment. This table presents only a few
ence” for the various users of your services yet? ideas for the three environments sampled. How
Do you see the positive cues? can your operation or you apply these concepts
Anchoring: As the community recognizes its to the environment you serve?
own strengths and asserts itself positively in con- As you think through the tactics inside
trolling its own destiny, you work to “anchor” community relations, keep in mind the vari-
the community. More of your efforts are spent ous types of people you may encounter. Each
in preventive interaction as you assist the com- one, each type, has some interest or stake in
munity in building those skills necessary to the community. We refer to these as “stake-
maintain control. Relationships are built across holders.” Your primary user, the person who
the community to encourage long-term posi- contracted with you or who oversees your
tive growth. Indeed, many who employ these department certainly has an interest, and is thus
sorts of community building tactics work to a stakeholder. Executives or managers of the
Stakeholders (examples): ● Doctors, nurses, orderlies, and ● Upper management ● Store manager
Each stakeholder will other hospital staff ● Line or floor employees ● Store employees
have a different interest. ● EMS personnel ● Contractors and vendors ● Customers
● Patients ● EMS personnel ● Law enforcement
● Family members of patients responding to safety personnel responding to
incidents thefts
Proactive Intervention ● Keep the public areas clean and ● Seek out and resolve ● Be clear that thefts
uncluttered. safety issues. and shoplifting are
● Use layered access control ● Use layered access prosecuted; use signage
throughout the hospital. control throughout the and visible camera
● Manage the ER and other waiting facility. systems.
areas to prevent disturbances. ● Deploy loss prevention
personnel.
● Use visible security
personnel to show a
presence and remove
problem customers.
Preventative Interaction Build relationships and encourage Build relationships and Build relationships and
the staff and others to take an encourage the workers and encourage personnel,
interest in safety and security at the others to take an interest in customers, and others to
hospital. safety and security at the take an interest in safety
facility. and security at the store.
Networking Interact proactively and Interact proactively and Interact proactively and
professionally with staff and others. professionally with workers professionally with store
Ensure they see you as a resource. and others. Ensure they see personnel and others.
you as a resource. Ensure they see you as a
resource.
facility, or the employers or residents, have property or area you are there to protect. Your
interests. They are stakeholders too. Others efforts should be focused on creating a positive
may be visitors or vendors. Law enforcement or experience for each of these stakeholder groups,
emergency fire and medical personnel are stake- according to what they may need or expect
holders, as are any other legitimate user of the from your operation and you. The security
you present a crisp image and a commanding emergency? Are you required to call a supervi-
bearing, people will see you that way. sor, or are you empowered by your agency to
Similarly, how you speak to people and manage your part of the incident without them?
engage in conversation with them is an important Under what conditions should you request law
part of building rapport and relationship. Do enforcement or fire/EMS? Are you able to make
you speak in clear English or whatever language that request on your own, or must you defer to
is most common for your environment? Or do someone else?
you use slang terms and phrases? Do you treat Established protocols, written guidance as
other people with respect, or even deference if part of a policy manual, would be ideal for you
they are senior to you, or are you insulting or as you determine your role in contact protocols
degrading? It can be a considerable challenge and relationship building to support the over-
to be respectful to those who challenge you, be all security effort. You will know which client
they malefactors, criminals, or otherwise decent or business contacts you may approach directly
people who are being redirected for some policy and about what, and which should be reserved
issue you have to enforce. for your supervisors. You will know what sorts
Sensitivity to the needs or issues of oth- of issues are your responsibility to address and
ers in how we interact with them can be very which should be referred to someone else. You
important. Employees or residents, for example, will also have some guidance on what is accept-
generally have a right to be in the area doing able interaction with various stakeholders you
whatever they do. Even when redirecting them, may encounter. If you do not have written guid-
you should do so in a way that respects this. In ance and you encounter others with any fre-
some cases you will need to be very sensitive quency, ask your supervisors how they want
to race, gender, ethnic, political, or other issues. you to interact.
What you may say in one such setting may be Remember, despite any apparent informal-
wholly inappropriate in another. Even when ity in interacting with others in the environment
the policy remains the same and your job is to you protect, your role there is part of a greater
ensure the safety and security of those people strategy. Your job as a professional security
and assets you protect, how you interact with practitioner is to recognize this and conduct
one person or group of people in a given situa- yourself in a manner that supports that strategy.
tion may be very different from how you inter-
act with another person or group of people in
essentially the same scenario. We would like to
believe we treat everyone similarly. In terms of
holding them all to the standards of safety and
security, or whatever rules we are charged to
Media relations is addressed elsewhere in
enforce, we do. However, everyone is different.
this book. As a strategic tool, though, the media
Motivating different people to follow those rules
can be employed as powerful allies in com-
or comply with your directives may require an
munity building. In-house operations may be
awareness of those differences and considerable
able to use internal business media. Whether
people skills on your part. Protocols from your
external or internal, positive stories with lots
operation and guidance from your supervisors
of background video or pictures can build the
can support you here.
reputation of the security operation and
What should you do when law enforcement
its efforts in the minds of the stakeholders.
or fire/EMS personnel are on site for some
Whenever a new and interesting deployment
or event presents itself, the media should be
invited to attend. Having dedicated person- of the complaint into a very positive cue of lis-
nel available to respond to any media inquiries tening and relationship building.
not planned is a good idea too. Those person-
nel should have some media savvy and be able
to field tough questions with dignity and class. THE TRANSFORMATION
Imagine the positive cues sent to your stake-
holders when they see your agency presented So what happens when a focused strategy is
well on the evening news; for that new contract determined, the brand established, the systems
or deployment, as subject matter experts on are in place to ensure positive experiences and
personal security in the workplace, or respond- manage total quality costs, and there is a com-
ing to a significant event like true professionals! munity relations effort in place? What happens
Complaints: Despite our best efforts, some- when you, similar to the janitor at NASA, can
one somewhere will still complain. Aside from say, “I make sure people can sleep at night”?
what we have already mentioned about how With all of the techniques of modern secu-
complaints represent costs of quality, they rity in the mix, and you bringing in the com-
should also be considered for what they are. munity of stakeholders as well, the entire
Almost every complaint presents some opportu- process becomes unimaginably more power-
nity for improvement. Some complainants do so ful. When you bring them the tools, and peo-
because they express a genuine concern. Perhaps ple are taught how and encouraged to assume
the complaint is about a real security risk. responsibility for the safety of their own com-
Maybe a point of contact called because an offi- munities or workplaces, or at least to play a
cer did not notice a key area was left unsecured more active role, complete transformations can
the night before. That is an important matter be seen. Crime-ridden neighborhoods become
and should be addressed decisively. The com- places where children can play without worry,
plaint presents an opportunity for the operation because the residents look out for each other.
to review its systems and ensure they are built to Workplaces with lots of machines and safety
prevent such things. Remember appraisal costs? hazards around become safer because fellow
Complaints like this inform the security opera- employees pay more attention. High-security
tion of some liability exposure that needs to be areas become less vulnerable to attack because
managed. We should appreciate them as such. those who work in and around them are more
Many times complainants just want to be aware of threats and threat indicators.
heard. The substance of their complaint may not Interestingly, Pine and Gilmore (1999) sug-
be such that it contains a material risk or any gest the next type of economy, after the expe-
exposure. But it is important to them. As they rience economy, will be the “transformation
are part of the community, we should make economy.” People will buy because they want
every effort to “hear” their complaint. Even if to become something else. They want to better
there is no reasonable resolution to be offered, themselves. As a competitive security opera-
more often than not, simply listening to the tion, can you build a transformation strategy
complaint, letting the complainant know that into your offering? As a security officer, can you
his concerns are important to us, and taking the play a role in transforming the community into
time to talk with them and explain matters fully a safer place? If so, then welcome. You are the
can go a long way to turning the negative cue professional practitioner of the future!
EMERGING TRENDS
Over the past several years, businesses have as licensure and training requirements respec-
assumed more and more responsibility for the tively. The days of “observe and report” are fad-
safety and security of their facilities. Part of this ing away and being replaced with an expectation
shift may be attributed to perceptions of new to act, indeed even to be proactive.
threats from which assets must be defended, and As seductive as the technology is, however, it
the recognition that law enforcement agencies is significantly limited. Technology can be used
simply cannot do it all. Part may be a reaction well as a tool to supplement a security effort, but
to an increasingly complex legal environment it must never be used to replace the decision-
and an interest in mitigating liability exposures. making component that necessarily comes with
Governments have also made efforts to privatize operating a “people business.” A security officer
services where possible and have been reach- in the area, even when supported by technology,
ing out to private security agencies and service simply serves many environments better.
providers. Whatever the cause, we have seen our The private security officer is becoming less
industry grow quite a bit and it continues to do so. and less the “night watchman” rarely seen by
As more is being asked of us, we rise to the most of the public, or a figure behind a desk or
challenge to ensure the needs of our clients discreetly making rounds and barely noticed
or users are met. New technologies allow us by others in the area. The role is moving into a
to control access with greater certainty, moni- highly visible component of the security effort,
tor our areas of responsibility more efficiently, where the officer interacts with others and makes
or detect intrusions or variances more effec- decisions on the ground. As this continues, that
tively. Associations such as the International officer will have to understand his role within the
Foundation for Protection Officers and some reg- strategy of the agency or department for which
ulatory authorities continue to develop and pro- he works and he will have to develop a strong
mote professional standards or regulations such set of “people skills” in order to be successful.
References
S E CURI TY QU I Z
Campanella, J. (Ed.). (1999). Principles of quality costs, prin-
ciples, implementation and use (3rd ed.). Milwaukee, WI: 1. The society that wants to buy what they buy
ASQ Quality Press. based on the thrill derived from the item
Davidson, M. (1996). The transformation of management. purchased is an example of which of the
Boston, MA: Butterworth-Heinemann. following types of economy:
Pine, J. B., & Gilmore, J. H. (1999). The experience economy,
a. Agrarian economy
work is theater and every business is a stage. Boston, MA:
Harvard Business School Press. b. Service economy
c. Experience economy
d. Credit-based economy
2. Creating a positive experience involves being single place anyone has any contact
effective in which of the following: whatsoever with the operation.
a. The security officers must maintain an a. True
even temperament b. False
b. The security officers must be proactive 7. Our account representative, our executives,
when faced with problems or challenges even our officers should interact with our
c. The security officers must be liability client or overseeing executive as though:
conscious a. We know security
d. All the above b. We are in this together
3. Total quality costs include all the following c. We are in charge of the security effort
except: d. All the above
a. Prevention costs 8. Almost every complaint presents some:
b. High Federal tax cost a. Opportunity for improvement
c. Failure costs b. Issue that must be corrected
d. Appraisal costs c. Threat to the relationship with the client
4. In a service-related business, such as security, d. Evidence that someone is not doing the
total quality costs can be significantly job correctly
reduced by providing which of the following: e. Challenge that must be managed
a. A positive experience 9. The key to your success lies in your ability
b. A relaxation of rules and regulations to build which of the following with the
c. A self-inspection every five years communities in which you serve.
d. All the above (Choose the one best answer.)
5. The operation’s brand is a function of all a. A sense of profit for your company
of the experiences, as we explored above, b. A strong coalition of police and security
perceived by the various users of its services officers in the neighborhood
with whom the operation comes in contact. It c. Positive, meaningful relationships
is more than just a logo on a letterhead, it is between the company and the neighbors
also which of the following: d. Developing anti-crime strategies and
a. The uniform perimeter security for the company
b. The way the security officers present 10. The next type of economy, after the
themselves experience economy, will be the
c. The image of the operation at every transformation economy.
touch point a. True
d. All the above b. False
6. Branding is about the image of the operation
at every touch point, at every
44
Networking and the Liaison
Function
Brion P. Gilbride
557
558 44. NETWORKING AND THE LIAISON FUNCTION
information to the appropriate authorities or that combines access control, CCTV, fire control
even resolving the situation entirely. Through and suppression, and environmental monitor-
professional success, one proves the value of ing systems.
maintaining the security operation. In a tight
economy, this could mean the difference between
walking on patrol versus walking the unemploy- FIRST SCENARIO: FIRE
ment line.
Most important to the security professional A fire occurred at a manufacturing facility,
will be the opportunities that liaison relation- on the manufacturing floor. Some equipment
ships may bring. With the post-9/11 and post- was damaged when the sprinkler system was
Katrina emphasis on the Incident Command activated and two employees were treated for
System (FEMA, 2009) and the interchangeable smoke inhalation because it took several min-
roles involved, the security professional will utes to put the fire out. The responding security
likely be the first-on-scene presence at an inci- professionals did one or more of the follow-
dent, meaning that he/she will function at least ing: assisted in moving injured people to safety,
temporarily as Incident Commander as other extinguished the fire, cleared and secured the
assets are called up. That will bring the secu- area, or reported the incident to management.
rity practitioner into contact with police, fire, As a result, those security practitioners probably
EMS, local, state, and even federal officials as met with and assisted police, firefighters, and
the response is organized. Contacts made in EMTs. If the manufacturing operation involved
that situation could lead to proposing or even HAZMAT, the security practitioners may also
organizing a tabletop exercise among various have been in contact with the local HAZMAT
entities for future responses. Such a gathering unit or the company’s internal HAZMAT-trained
would likely be noticed by company manage- staff regarding possible dangers or containment
ment or possibly the local media, and in turn scenarios. They may have written a report on the
could lead to promotion, training opportunities, incident for presentation to the security manager
or a new position elsewhere. Although promo- or director. Because equipment was damaged
tion or new positions also heavily depend on and people were injured, a variety of entities will
a security professional’s performance, the net- take an interest in the report and will likely want
working possibilities and what they could offer to interview the security professionals regarding
are quite real. the events. The corporate insurance company’s
Many liaison contacts will be formal profes- representatives may be interested, as well as
sional relationships (i.e., those that are built corporate counsel, OSHA or its state-level coun-
through one organization interacting with the terpart, local fire department investigators, and
security team at a particular location). There are perhaps local code enforcement officials (see
a multitude of scenarios through which these Figure 44-1). That is a sizeable group to be faced
relationships could be built. For the purposes with as a security practitioner, especially over
of this chapter we will examine five scenarios one incident.
that could occur, irrespective of location or dis- Each one of these subsets is a potential contact,
cipline within the security profession. Three of even if it might not seem so at the outset. Local
these scenarios are incidents: a fire, a vehicle law enforcement, firefighters, and EMTs are good
break-in, and a special event such as a VIP fac- contacts because security professionals are likely
tory tour. The fourth scenario involves normal to see them more than once; accordingly they
security operations at a seaport facility. The fifth offer the best opportunity to form relationships.
scenario is the installation of a central station Their benefit to the security professional will be
Fire
Company EMS
department
investigation met and assisted
met and assisted
Insurance Fire
OSHA
company department
investigation
investigation investigation
one of familiarity—ideally the security practi- insurance or legal departments could mean
tioner will be recognized as competent and not increased responsibility; the manager might task
prone to frivolous use of emergency response the security professional with addressing such
services. In turn, emergency response services incidents in the future or drafting/revising the
personnel will recognize and pass on to their company’s Standard Operating Procedures for
coworkers that a call from the security profes- critical incidents. Such accomplishments might
sional is likely to be legitimate. Whether this is also lead to other opportunities within the com-
morally appropriate is debatable; however, the pany. Finally, contacts within OSHA could be
company/client’s interests are paramount here, valuable in terms of both potential training oppor-
and a quick and professional response from tunities and information-sharing capabilities.
emergency services is in the company/client’s Helping to address safety issues with knowledge
best interest. The HAZMAT specialists are valu- of OSHA requirements can be a career enhancer,
able resources for inquiries about specialized particularly if an inspection or audit is coming up.
training or for information on responding to haz- OSHA is a regulatory agency that seeks compli-
ardous material issues in their absence or before ance; therefore OSHA contacts can provide criti-
they can be mobilized. cal information or referrals to other contacts who
In a similar vein to the HAZMAT personnel, can answer questions or help resolve dilemmas.
valuable networking contacts may be encoun-
tered after the incident. Positive meetings with
internal company officials could lead to conside- SECOND SCENARIO: VEHICLE
ration for other career opportunities within the BREAK-IN
company. Doing well in front of those that make
promotional decisions is important. The favor- Consider another scenario that can occur
able opinion of representatives from the corporate at a large shopping mall with several parking
garages. The mall security officers receive a and in recent weeks has faced protests at every
report that a vehicle has been found with a public appearance. In this situation there are
smashed driver’s side window and items numerous entities and individuals that are
appear to be missing from the car. The vehi- potential networking contacts. Let’s begin with
cle owner wants to file a report with the local the smallest group and work outward.
police. The mall security officer will likely meet The governor will likely have a protective
the responding police officer and share infor- detail—in this case they will be state police
mation for both the police officer and mall troopers on assignment. That protective detail
security’s own internal report. The mall secu- will handle arrival and departure arrange-
rity officer may have secured the scene and ments for the governor. They will have advance
interviewed the vehicle owner and/or poten- staff coming before the event to assess the best
tial witnesses. As with the fire scenario, mall routes, the layout of the facility, entry and
security personnel are likely to encounter the egress points, and other issues. Contract secu-
responding police officer(s) on other occasions, rity guards may meet with these people, escort
hence forging positive relationships with them them throughout the facility, explain the secu-
will help the mall security officer to do his/ rity precautions normally in place, or assist in
her job. For this incident, investigators from the other ways. These individuals can be valuable
police department may follow up on the com- connections for a variety of reasons—their
plaint. Detectives might request surveillance experience in law enforcement, their experience
camera footage, time-stamps on the time the as protective details, and their proximity to a
vehicle entered the garage if it is a pay-to-park senior government official. Aside from the gov-
facility, information on other similar incidents ernor’s protective detail, there will be officials
in recent days that may not have generated from the local and/or state police jurisdiction
a police report, or something else. A relation- involved in a variety of functions—traffic con-
ship with local investigators might lead to trol, crowd control, vetting functions, counterin-
training opportunities or even participation in telligence, and K-9 operations. Law enforcement
multiple-agency operations related to auto theft officials have considerable training in these
and similar crimes. Depending on the situation, functions and have access to a wide spectrum
the National Insurance Crime Bureau (NICB, of information. Networking relationships here
2009) may also be involved in an investigation. could lead to potential training opportunities,
That entity deals with vehicle theft and fraud access to open-source information systems not
of all kinds, and contacts there could lead to previously utilized, and contacts within the var-
training opportunities or beneficial information ious disciplines. In addition, the fire department
regarding theft and fraud issues. will be involved with capacity issues, fire safety
and inspections, and other functions. Local
EMS units will also be involved to determine
THIRD SCENARIO: SPECIAL staging and/or triage locations, the number
EVENT of personnel necessary to cover the event, and
other functions. As with the fire scenario men-
The third scenario involves a state governor tioned earlier, working side-by-side with fire
giving a speech at a large multifunction sports and EMS officials provides perspective as well
facility staffed by contract security guards. At as ideas for future trainings or multiple-agency
the conclusion of opening remarks, the governor operations. Company management officials will
will give a 30-minute speech. The governor was be involved at all levels, providing support and
recently the subject of an ethics investigation guidance. The contract guard company may
Access control
Access roads
FIGURE 44-2 Elements of VIP security scenario. Regardless of your role, these four rings represent the major roles that
would be covered with regard to physical security in the event of a VIP visit at your location. Each of these rings represents
a different skill set and different types of personnel/agencies involved, all of whom could be potential liaison contacts.
supplement existing security staffing by hiring to mind first—the port security officer works
additional staff for various duties, such as park- directly for them. There are many networking
ing lot patrols, escort duties, access control at opportunities there; seaports are always being
the doors, or other functions. The liaison possi- toured or visited by the various agencies that
bilities in an event like this are tremendous (see work within it. There is usually a represen-
Figure 44-2). tative of the Port Authority involved during
these events. Performing duties professionally
when these representatives are in the area cre-
FOURTH SCENARIO: SEAPORT ates an opportunity for security personnel to be
OPERATIONS noticed. The Port Authority usually maintains
business offices, warehousing facilities, trans-
Even without an incident occurring, some portation equipment, and other infrastructure
security operations offer considerable net- involved in operating a seaport. The port secu-
working opportunities by their very nature. rity officer will deal with a variety of unique
Consider a port security officer working for a issues relating to warehouse security, container-
Port Authority. The port security officer’s job ized cargo, security seals, bonded warehouses,
is to provide security for the seaport and all of crew members detained on board their vessel,
the various facilities within it. How many dif- and other issues.
ferent entities could be encountered in a situ- Beyond the Port Authority officials, a variety
ation like that? Port Authority officials come of agencies in the United States, for example,
have jurisdiction over a seaport, particularly draw from regarding everything from naviga-
one receiving foreign-arriving vessels. With tion laws, security bolt seals, container safety,
regard to the vessels themselves, two agencies confined space and HAZMAT training, law
have jurisdiction: the U.S. Coast Guard and enforcement techniques, concealment methods,
U.S. Customs and Border Protection (CBP), document fraud, knowledge of immigration
both of whom are under the U.S. Department laws relating to crew members, and more.
of Homeland Security. Their duties differ some- It is likely that in a seaport environment the
what: the Coast Guard is more interested in port security official will encounter these state
vessel and port facility safety while CBP is more officials on a daily basis and will get to know
interested in the immigration and customs pro- them professionally. For those that are willing
cessing of the people and cargo onboard the to share, there will be much for the port security
vessel. CBP’s interest also covers the ware- officer and state official to learn from and teach
houses operated by the Port Authority that each other. The utility in this type of network-
receive the offloaded cargo. On the state level, ing is largely knowledge-based. It is doubtful
most states have a Division of Waterways or that these individuals impact hiring decisions;
Natural Resources or something similar. Those however, what they can share is knowledge of
agencies will have an interest in the port facili- the hiring processes, time frames, and qualifica-
ties as well as the vessel and its cargo. These tions involved should one seek a career change
agencies have a diverse array of experience to (see Figure 44-3).
Emergency Law
services: enforcement:
Firefighters Police
Medics Officers
HAZMAT Detectives
The
security
officer
Company or Federal
client enforcement:
management CBP
officials Coast Guard
have a variety of contacts throughout the profes- off-duty law enforcement officer, needs to be
sion. The IFPO has numerous training offerings, aware of the regulations pertaining to their
culminating in the Certified Protection Officer work as well as those of the agencies and indi-
(CPO) and Certified in Security Supervision viduals who enforce them.
and Management (CSSM) designations. The For example, in the United Kingdom the secu-
IFPO has instruction manuals for its programs rity industry is regulated by the Security Industry
that are written by authors from various disci- Authority (SIA). The SIA was established by the
plines throughout the security profession and Private Security Industry Act of 2001 (SIA, 2009)
are updated periodically to keep the material and has subsequently been amended several
fresh and to keep up with the tremendous tech- times. The SIA deals primarily with the licens-
nological advances of the past 10–15 years. The ing of security industry employees working in
IAHSS has regions and meetings as well as certi- the following job classifications: CCTV, close
fication programs geared toward guard and offi- protection, door supervision, event security, key
cer positions or management, such as Certified holding, private investigation, security consul-
Healthcare Security Officer (CHSO) and Certified tancy, security guarding, and vehicle immobi-
Advanced Healthcare Security Officer (CAHSO). lizing. In addition, companies hiring personnel
In addition to professional organizations, there for these activities are able to check the license
are a variety of educational institutions offering status of employees and/or job applicants. The
associate’s, bachelor’s, and even master’s degrees SIA maintains a registry of current, revoked,
in security-related disciplines. These degree pro- and suspended licenses. Companies may apply
grams, although considerably more expensive for accreditation by the SIA as “Approved
and time-consuming than a certification or train- Contractors” by meeting certain standards. They
ing program, also offer networking opportuni- must renew this designation periodically, are
ties. Many institutions employ instructors and subject to independent assessment annually, and
professors in the security discipline that have there exists a mechanism to report malpractice
had real-world experience in the field as security by an “Approved Contractor” (SIA, ACS, 2009).
professionals, law enforcement, or prior mili- Those regulated by the SIA are required to
tary personnel. Many students also have diverse provide documents or information relating
backgrounds that could provide networking pos- to any matter regulated by the SIA. Persons
sibilities. As with the professional organizations, who are regulated by the SIA include security
these individuals will have diverse contacts as contractors and their employees, managers and
well as capabilities of their own that may posi- supervisors of contract security providers, direc-
tively impact one’s career. tors of companies and partners even if they do
not carry out security functions themselves,
and vehicle immobilizers as well as employ-
INDUSTRY REGULATION BY ers or managers of them. It should be noted
GOVERNMENT that under the Private Security Act of 2001,
proprietary staff, even if supervising contract
In an increasing number of countries, the employees, are generally not subject to licen-
private security industry as a whole is sub- sure (SIA, License Requirements, 2009).
ject to regulation by governmental or quasi- South Africa has a similar arrangement.
governmental bodies. Accordingly, the security Their licensing apparatus is maintained by the
professional, whether a mall security officer, Private Security Industry Regulatory Authority
loss prevention agent, contract security guard, (PSIRA). The PSIRA’s mandate derives from
armored car driver, night watchman, or even the Private Security Industry Regulatory Act
should be completed properly and submitted in Author Unknown. International Foundation for Protection
a timely manner—it behooves the applicant to be Officers (Naples, FL: International Foundation for
Protection Officers). Available: http://www.ifpo.org.
sure everything is ready before submitting mate- Accessed June 30, 2009.
rials. All three examples of regulated security Author Unknown. American Society for Industrial Security
positions might be subject to an audit or a valida- (Alexandria, VA: American Society for Industrial
tion conducted by the licensing entity. A security Security). Available: http://www.asisonline.org.
officer could be tasked with assisting auditors, Accessed June 30, 2009.
Author Unknown. International Association of Healthcare
which provides potential networking opportu- Security & Safety (Glendale Heights, IL: International
nities. The security professional who has a good Association of Healthcare Security & Safety). Available:
working relationship with the auditing agency http://www.iahss.org. Accessed June 30, 2009.
or is knowledgeable about the process will be Author Unknown. Welcome to the SIA (London, UK: Security
noticed. Any audit that is completed without Industry Authority). Available: http://www.the-sia
.org.uk/home. Accessed July 1, 2009.
problems is a successful one. Author Unknown. License Requirements (London, UK:
Security Industry Authority). Available: http://www
.the-sia.org.uk/home/about_sia/legislation/psia_3-6.
CONCLUSION htm. Accessed July 1, 2009.
assistance arrives, what they find can bring may arrive asking for additional help
recognition for that first responding security providing even a further opportunity for
officer. Which of the following is one of those valuable contact development. Which of the
recognition tasks: following are ways to be of assistance:
a. Immediately move injured people to safety a. Providing surveillance camera footage to
regardless of injuries the investigators
b. Immediately commence using emergency b. Time-stamp information on garage parking
rescue equipment to reach victims c. Incident reports from the past that did not
c. Clear the area of all non-emergency generate a police report
persons, secure the incident scene d. All the above
providing an unobstructed work area, and 8. A relationship with police investigators might
report conditions to management lead to which of the following:
d. None of the above a. Participation in multi-agency operations
5. Which of the following are good contacts for b. Training opportunities
the security professional to make contact with c. Both a & b
because they offer the best opportunity to d. None of the above
form long lasting relationships with: 9. Professional development groups, like
a. Local firefighters the IFPO and ASIS International, can also
b. Local law enforcement introduce a wide variety of professionals with
c. Local EMTs whom a liaison-type relationship is beneficial.
d. All the above a. True
6. Networking relationships are valuable b. False
because they can lead to training 10. Every large company in the United States
opportunities. employs instructors in the security discipline
a. True that have had real-world experience. This
b. False provides future opportunities for security
7. As for fire emergencies, security personnel professionals with good networking
might be in a position to assist the responding capabilities.
police officers hence forging positive a. True
relationships with local law enforcement. b. False
Detectives from that same police department
45
Ethics and Professionalism
Christopher A. Hertig
569
570 45. ETHICS AND PROFESSIONALISM
EMERGING TRENDS
Protecting a society from the concerted have made this even more so. One answer to this is
actions of criminals and terrorists, as well as ethics and respect for privacy.
disasters, is a challenging undertaking. While Perhaps an adoption of an ethics of care philos-
respect for individual rights must be paramount ophy is appropriate for those who protect. Ethics
in a free society, the common good must also be of care means being concerned with the welfare
considered. Homeland security has ushered in of others. It means having empathy, participat-
an era of utilitarianism: we protect the greater ing in other’s feelings, and understanding how
good, even if individual rights are curtailed to a they view things. The ethics of care fits in with
degree. the community policing model to a significant
What is essential is that we respect individual degree. Care, concern, and partnering with a
rights and make every attempt to preserve them. community to solve its crime-related problems
As an information-based economy becomes more are what community policing is all about.
firmly established, so, too, do concerns with how that An ethics of care philosophy helps to prevent
information is handled. While adhering to the basic an “us versus them” syndrome from occurring.
principle of “need to know” affords some protection As protection officers become better educated,
against abuse, there is still an increasing potential for they are becoming more sensitive to their ethical
confidential and proprietary information to be dis- obligations. Ultimately, they will become more
closed. Recent advances in Internet communications professional.
Resource a. True
The National Institute of Ethics has been established to b. False
further integrity and ethics in America. The Institute 5. Professionals think in terms of their
offers a variety of seminars which can be customized
authority.
to specific organizational needs. There is also an array
of instructional materials available, as well as instructor a. True
certifications. Visit http://www.ethicsinstitute.com/. b. False
6. Using the _______ acronym can assist one in
dealing with ethical dilemmas.
a. PROFESSIONAL
S EC U RI T Y QU IZ b. DEPORTMENT
1. What is the greatest issue in public safety? c. ETHICS
a. Private investigation d. PORT
b. Policing 7. _____ may be established by statute, custom,
c. Private security or contract.
d. Animal control a. Rights
2. _________ are how one carries themselves, b. Duties
conduct, and one’s attitude of image. c. Choices
a. Manners d. Practices
b. Deportment 8. Taking shortcuts are one reason why
c. Ethics unethical behavior occurs.
d. Duty a. True
3. Where do most poor decisions emerge from? b. False
a. Lack of commitment 9. “Traditionalism” is ________ to change.
b. Misunderstanding of what is being asked a. Devotion
of you b. Willingness
c. Failure to explore all potential options c. Resistance
d. Exposure to unethical behavior 10. The world of asset protection is black and
4. There is substantial legal leeway concerning white. There is no gray area.
the amount of force that can be used to restrain a. True
a patient. This is an ethical issue in protection. b. False
577
578 INDEX
Evaluation stage, disruptive behavior Feedback Fitness for duty, and industrial
management, 296 in effective communications, 77 hazards, 491
Evidence security awareness, 86–87 Fixed duress devices, characteristics,
collection procedures, 407–408 FEMA, see Federal Emergency 187
crime/incident scene, 406–408 Management Agency (FEMA) Fixed lens, CCTV components, 174
legal issues, 443–445 Fencing Fixed posts
Excessive force, liability issues, as access control, 192 patrol principles, 127–128
453 as physical security, 177–179 as protection career, 34
Experience, protection professionals, Fidelity bond insurance, definition, 9 Flame detectors, fire alarm sensors, 97
67–68 Field controller, access control systems, Fleet safety, safety hazards, 223
Experience economy 92–93 Flood, emergency situation case study,
definition, 536 Fielding, Henry, 118 335
experience economy, positive Field notes Floor anchoring, safes, 176
experience, 537 characteristics, 428 Foaming agent extinguishers,
memorabilia, 540 overview, 427 characteristics, 213
negative cues, 539 Fight or flight syndrome, interviewing, Focused interviews, techniques, 391–393
overview, 536–541 415–416 Focus groups, security awareness
positive experience, 542t Financial interest, public relations, 522 feedback, 86–87
senses, 541 Fire Follow-up investigations, steps,
theme, 537 arson, 214–215 385–386
theme and cues, 538 components, 209–211 Foot patrols
Exploitability, vulnerabilities, 320 containment, 213–214 industrial hazards, 491
Explosives, detection equipment, detection methods, 211 overview, 121
201–202 as emergency situation, 332–333 Footwear, industrial hazards, 492
Expressive crowd, definition, 140 extinguishers, 212–213 “Four Ds” principle
External failure costs hazard areas, 210 antiterrorism techniques, 366–367
definition, 544 liaison function, 558–559, 559f security risk management, 325
total quality, 543t Occupational Safety and Health, 220 Frankpledge, definition, 17
Extinguishers overview, 209 Fraternization, patrol principles, 127
hazardous materials, 231 permanent extinguishing hardware, Fraud examiners, audits, 389
permanent hardware, 213 213 Frequency
types, 212–213 safety hazards, 222–223 patrol techniques, 125
Extra weight, safes, 176 types, 211–212, 212f risks, 4
Fire alarms Frick, Henry Clay, 27–28
basic function, 93–94 Frustration, and disruptive behavior,
F definition, 35 296
Facial recognition, CCTV, 98 integrated systems, 94–95
Fact-finding, investigations, 383 sensor types, 96–97
Failure costs, total quality, 543t Fire alarm telegraph, 90 G
False arrest, apprehension/detention Firearms, use of force techniques, 477t, Gang activity, crowd management
issues, 500 479 trends, 146–147
False imprisonment, detention issues, Fire insurance, definition, 9 Garbage containers, and theft
501 Fire plans, characteristics, 214 prevention, 261
Fatigue Fire protection, history, 20–21 Gas detectors, building automation
ethical issues, 571–572 Fire-resistive containers, as physical sensors, 97
patrol principles, 127 security, 177 Gaseous discharge lamps, security
Federal Bureau of Investigation (FBI) Fire safety, strike procedures, 306–307 lighting, 166
espionage protection steps, 248 Fire Triangle Gasoline, substance abuse, 282–284
information asset protection, 244 definition, 209–210, 210f Gate duty, traffic control, 135
terrorism definition, 350 fire types, 211 General deterrence theory, workplace
Federal Emergency Management First aid crime, 256
Agency (FEMA) accident definitions, 225 Geospatial information systems (GIS),
emergency planning procedures, Occupational Safety and Health, 221 protection automation, 110–111
337–338 First line of defense, physical security GIS, see Geospatial information
NIMS, 340 planning, 165 systems (GIS)
INDEX 585
Glass, as physical security, 167–168 common types, 222–223 customer service leadership,
Glass-break sensors, 95, 186 incident scene, 404–405 516–517
Glazing, as physical security, 167–168 industrial, see Industrial hazards diversity, 510–512
Globalization, and human relations, security risk management trends, 328 effective communication, 515
513–514 types, 333f emerging trends, 517–518
Glue, substance abuse, 282–284 HAZMAT Team ethical behavior, 515–516
Goodfellas, 23 fire scenario, 558–559 and globalization, 513–514
Gottlieb, Mark, 112 initial response, 234–236 overview, 509–510
Government regulation, security Health care, substance abuse costs, 271 sexual harassment, 514–515
industry, 564–566 Health interests, public relations, women in protection, 514
Graphical user interface (GUI), CCTV 521–522 Human resource management
video recorders, 174–175 Health and safety policy, definition, (HRM)
Guardianship, and workplace crime, 225 security services history, 31
257 Health and safety program, definition, shipping issues, 22
Guard station, as access control, 225 HVAC, see Heating-ventilating-air
191–192 Health-safety-security-environment- conditioning (HVAC)
GUI, see Graphical user interface (GUI) quality (HSSEQ), PO role, 46
Health surveys, Occupational Safety
and Health, 220 I
H Hearsay rule, evidence, 443 IACP, see International Association of
Hallucinogens, signs/symptoms, Heat detectors, fire alarm sensors, 97 Chiefs of Police (IACP)
281–282 Heated glass, as physical security, 168 IAP, see Information asset protection
Halogenated extinguisher units, Heating-ventilating-air conditioning (IAP)
characteristics, 212–213 (HVAC), BAS control, 94 IC, see Incident commander (IC)
Hammurabi, 117 Heroin, signs/symptoms, 281 ICS, see Incident Command System
Handcuffing techniques, 503, 572 HMR, see Hazardous Materials (ICS)
Hand signals, traffic control, 132–133 Regulations (HMR) Identification systems, access control,
Hands-off security, 455, 456 Hollerith badge, as physical security, 193
Hands-on security, 455, 456 171 Identity theft/fraud
“Harmless” theory, substance abuse Holmes, Edwin, 32, 90 as problems, 22
perpetuation, 273 Homeland Security, requirements, 17 security trends, 37–38
Hashish, signs/symptoms, 278–279 Homestead Strike, 27–28 IEDs, see Improvised explosive devices
Hashish oil, signs/symptoms, 278–279 Homicide/suicide bomber, asset (IEDs)
Hate crime legislation, human protection trends, 9–10 IFPO, see International Foundation for
relations trends, 517 Honesty, PO leadership skills, 297 Protection Officers (IFPO)
Hazardous materials Hospitals, theft prevention, 260 Illegal walkout, definition, 305
all hazards approach, 229 Hostage situations Illness
contingency plans, 235 handling, 373 accident definitions, 226
damage assessment, 235 incident management, 374–375 and disruptive behavior, 296
definition, 225 negotiation, 375 industrial hazards, 485–488
diamond designation, 233 security officer hostages, 374 Image
emerging trends, 236 Stockholm Syndrome, 375 as asset, 15
incidents, 231–232 Hostage threat receipt, procedures, 373 public relations rules, 523
initial incident response, 234–236 Hostile crowd Immigration, and asset protection, 23
PO role, 230–231 actions/countermeasures, 140 Impact, risks, 4
response models/templates, definition, 140 Implementation stage, disruptive
233–234 Hostile environment, sexual behavior management, 296
site security, 235–236 harassment, 514–515 Improvised explosive devices (IEDs),
substance identification, 234 Housekeeping, safety hazards, 223 asset protection trends, 10
substance quantity, 234–235 Housings, CCTV components, 174 Inadvertent threats, risk management,
tools and resources, 232–233 HRM, see Human resource 320
Hazardous Materials Regulations management (HRM) Incandescent lamps, security lighting,
(HMR), as resource, 232 Huffing, definition, 282 166
Hazards Human relations Incident commander (IC),
accident definitions, 225 Carnegie’s principles, 510 vulnerability analysis, 339–340
586 INDEX
Specialization, asset protection trends, stimulant signs, 279–280 central alarm station operator/
10 workplace effect, 274 dispatcher, 100
Specific deterrence theory, workplace Substances, hazardous materials devices for, 77–78
crime, 256 response, 234–235 security concerns, 22
Spectator crowd, definition, 140 Suicide attacks, and antiterrorism, TEMPbadge, 109
Spot protection, alarm systems, 186–187 375–377 Temperature sensors, building
SRM, see Security risk management Suitable target, workplace crime, automation sensors, 97–98
(SRM) 256–257 Tempered glass, as physical security,
Stakeholders, community relations, Supply chains, and globalization, 513, 167
550–553, 551t 518 Territoriality
Standby lighting, as physical security, Supportive stance, crisis intervention, CPTED, 6, 157
166 299 defensible space, 158
Stand pipes, characteristics, 213 Surveillance Terrorism, see also Antiterrorism
State Department, terrorism definition, basic goal, 421 actions/activities, 363–365
350 covert electronic, 422–423 asset protection history, 24–27
State police forces, security history, 18 covert personal, 422 cell, 354
Statutes in CPTED, 6–7 communications, 356
law development, 437 equipment, 423 defensive measures, 357–358
trespass, 445 investigations, 395–396 defensive strategies, 366
Statutory law, definition, 29 overt electronic, 423 definition, 349–352
Stimulants, signs/symptoms, 279–280 overt personal, 422 domestic, 354
Stockholm Syndrome, characteristics, picket lines, 307–308 as emergency situation, 334
375 privacy issues, 423–424 emerging trends, 358–359
Storage area networks (SANs), and recording/retention, 424 ethics and diversity, 516
CCTV, 94 substance abuse policies, 276 and fencing innovations, 178
Stress, and disruptive behavior, 296 types, 421–422 and globalization, 513–514
Strikes Surveys, security awareness feedback, hazardous materials trends, 236
crowd definitions, 138 87 individuals, 355
instances, 305–308 Survival, patrol techniques, 125 international, 353–354
security procedures, 306 Suspicious packages, as emergency leaderless resistance, 355
Striking techniques situations, 333 organizational structure, 354–356
critical targets, 479 System controls, as physical security, overview, 349
use of force, 478 169–170 practical exercise, 26
weapons, 478–479 System monitoring, physical security protection automation, 108
Subject identification, CCTV, 173 systems, 170 purpose, 353–354
Substance abuse security preparations, 357–358
associated definitions, 277 sleeper cells, 355
cannabis signs, 278–279 T target selection, 356–357
controlled substances lists, 283f Taft-Hartley Act, 28 and violence, 352–353
definition, 270 Target selection, terrorism, 356–357 Testifying, legal proceedings, 397–398
depressant signs, 280–281 Task, accident definitions, 227 Testimonial evidence
and disruptive behavior, 296 Task analysis, accident definitions, 227 definition, 443
drug dependency, 272 Team crisis intervention legal issues, 443
emerging trends, 284–285 leadership aspects, 301 Testing
hallucinogen signs, 281–282 overview, 300 emergency response plan, 343–344
indicators/signs, 278 positive factors, 300–301 substance abuse policies, 275
industry/business impact, 270–271 Team member skills Text-based communication, emerging
industry response, 274–277 PO leadership, 299 trends, 102
inhalants, 282–284 security awareness, 84 Theft, substance abuse issues, 271, 276
motivation, 271–272 Technical security, definition, 243 Theft insurance, definition, 9
narcotics signs, 281 Technical surveillance Theft prevention
overview, 269 countermeasures (TSCM), concealment examples, 260–261
people/asset protection, 282–284 definition, 243 concealment issues, 261
perpetuation, 273–274 Technological hazards, types, 333f employee dishonesty, 259–260
signs/symptoms, 278–282 Telephone communications first steps, 260
INDEX 595
markings, 260–261 Training, see also Education Urban design, and crime prevention,
objective, 259 customer relations, 524–526 158
overview, 258–259 defensive tactics, 479–480 Urbanization theories, and asset
WAECUP, 258 emergency response plan, 343–344 protection, 23
Theft response and IAP, 247 Use of force
employee liaison, 264 networking, 563–564 aggressive behavior response,
preventive actions, 263 Occupational Safety and Health, 220 455–460
reporting, 262–263 patrol preparation, 124 alternatives, 452–453
search policy, 263–264 public relations, 527–528 apprehension/detention, 503
Theme substance abuse policies, 275 arrest, 453–454
experience economy, 537, 542t use of force techniques, 478–479 continuum, 477t
and positive cues, 538 use of force trends, 467–468 control formula, 454–455
Third line of defense, physical security workplace violence, 291 dealing with aggression, 462–463
planning, 165 Tranquilizers, signs/symptoms, “defanging the snake”, 461–462
Third party agreements, and IAP, 248 280–281 defensive tactics, 475–478
Threat assessment, defensive tactics, Transformation economy, community definition, 450–451
473–474 relations, 554–555 detention, 453–454
Threatening phone calls, strike Transmission media, sensor systems, emerging trends, 467–468
procedures, 307 98–99 empty-hand control, 459
Threat level matrix, example, 164f Transparent mirror glass, as physical escalation/deescalation continuum,
Threats, risk management, 319 security, 168 455–460
Threshold capacity, second-generation Transportation, security service excessive force liability, 453
CPTED, 158 options, 527 justification, 451–452
Threshold limit value (TLV), Trash containers, and theft prevention, officer injury, 453
definition, 227 261 officer safety, 460
Time-delay locks, safes/vaults, 176 Trespass, legal issues, 445–446 optimal distance, 460–461
Time locks, safes/vaults, 176 Trust, PO leadership skills, 305 overview, 449–450
Timely reporting, theft response, 262 Two-way radios report writing, 466–468
Tithing central alarm station operator/ retreat, 452
definition, 17 dispatcher, 101 search and seizure, 453–454
patrol history, 118 as communication devices, 78–79 self-control, 454–455
TLV, see Threshold limit value (TLV) techniques, 478–479
Tolerance, drug definitions, 277 verbal deescalation, 463–464
Torts U weapons management, 464–466
apprehension/detention issues, UC, see Undercover (UC) “Us vs. them” syndrome
500–501 investigations and ethics, 572
civil law, 439–440 UHF transceivers, as communication human relations, 511
types, 440t devices, 79
Total quality costs Ultrasonic detectors, as physical
definition, 542–543 security, 169 V
examples, 543t Unauthorized activity, patrol purpose, Vandalism, strike procedures, 306
Trade secret 119–120 Varifocal lens, CCTV components, 174
definition, 243 Unbalanced switches, as physical Vaults, as physical security, 175–177
and IAP, 247–248 security, 168 Vehicles
Traditionalism, and bad behavior, Undercover (UC) investigations break-in, 559–560
572 characteristics, 394–395 safety hazards, 223
Traffic control substance abuse policies, 276 Verbal communication
equipment, 135 Underwriters Laboratories Inc. (UL) and crowd management, 142
gate duty, 135 physical security criteria, 177 disruptive behavior control, 300
hand signals, 132–133 safes, 176 interviewing, 414
responsibilities, 133–135 Uniform presence, escalation/ PO leadership skills, 305
roadway positions, 132 deescalation continuum, 455, 458 theft reporting, 262
signs/automatic signals, 131–132 Uniforms, patrol preparation, 122 use of force, 477
traffic direction rules, 135–136 United Kingdom, security industry Verbal deescalation
whistle, 133 regulation, 564 aggressive situations, 463–464
596 INDEX
Verbal deescalation (Continued) Incident Command System, 338–340 Working conditions, Occupational
escalation/deescalation continuum, media relations, 341–342 Safety and Health, 219
455–456, 458 National Incident Management Workplace, substance abuse effects,
use of force, 463 System, 340 274
Verbal disruptive behavior, Workplace crime
characteristics, 298 emerging trends, 265–266
VHF transceivers, as communication W general deterrence theory, 256
devices, 79 Wackenhut Corporation, 32 neutralization techniques, 257–258,
Vibration detectors, as physical WAECUP Theory 258t
security, 169 definition, 126–127 overview, 255
Video analytics, CCTV trends, 189 overview, 7 routine activity theory, 256–257
Video motion detection (VMD) theft prevention, 258 social learning theory, 257
CCTV, 98 Wagner Act, 28 theft response, 262–264
as physical security, 169 Warne, Kate, 514 theories, 255–258
Video recorders, CCTV components, Warranties, civil law, 439 Workplace inspection, definition, 227
174–175 Water-based extinguishers, Workplace violence
Vigiles, 117–118 characteristics, 212 business impact, 289
Violence Weapons crisis intervention trends, 302
behavior control, 299–300 assisted controls, 478 emerging trends, 292
and terrorism, 352–353 and defensive tactics, 474–475 examples, 484
use of force, 462–463 escalation/deescalation continuum, incident categories, 287–288
workplace, see Workplace violence 457 overview, 287
VIP protection management during use of force, pervasiveness, 288
emerging trends, 376–377 464–466 prevention programs, 290
liaison function, 561f pressure point/pain controls, 478 training, 291
overview, 363 striking techniques, 478–479 typologies, 484
PPS professional development, use of force trends, 468 warning signs, 291
370–371 Web sites, for protection professionals, World Health Organization (WHO),
PPS skills, 371–372 68 health definition, 218
principal protection, 372–373 Weight, safes, 176 Writing skills
Virtual attacks, terrorism trends, 359 Weingarten Rule, 392, 392t investigation history, 384
Visitor management systems, 99–100, “What if?” game, patrol techniques, investigations, 386
109–110 125–126 PO leadership, 305
Visual displays, alarm system Whistle, traffic control, 133 Written reports, theft response,
interfaces, 185 “Who-What-Where-When-Why-How,” 262–263
VMD, see Video motion detection good report writing, 429–430
(VMD) Wiegand card readers, 96, 171
Volumetric protection, alarm systems, Wild, Jonathan, 18–19 X
186 Wildcat strike, definition, 305 X-ray technology, 200–202
Volunteering, protection professionals, Wired glass, as physical security, 167
68 Wireless computing environments,
Vulnerability 246 Y
risk management, 320 Withdrawal, drug definitions, 277 Young offenders, legal issues, 441
risk reduction, 324 Women protection officers, 514–515
Vulnerability analysis Workers’ compensation, 9, 271
Emergency Operations Centers, Worker-on-worker violence, definition, Z
340–341 288 Zoom lens, CCTV components, 174
emergency planning, 338–342, 338t Working Alone Legislation, 292