Você está na página 1de 623

THE

PROFESSIONAL
PROTECTION
OFFICER
PRACTICAL SECURITY
STRATEGIES AND EMERGING
TRENDS

INTERNATIONAL FOUNDATION FOR


PROTECTION OFFICERS

AMSTERDAM • BOSTON • HEIDELBERG • LONDON


NEW YORK • OXFORD • PARIS • SAN DIEGO
SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO
Butterworth-Heinemann is an imprint of Elsevier
Butterworth-Heinemann is an imprint of Elsevier
30 Corporate Drive, Suite 400, Burlington, MA 01803, USA
The Boulevard, Langford Lane, Kidlington, Oxford, OX5 1GB, UK

© 2010 Elsevier Inc. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or any information storage and retrieval system, without
permission in writing from the publisher. Details on how to seek permission, further information about the
Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance
Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.

This book and the individual contributions contained in it are protected under copyright by the Publisher
(other than as may be noted herein).

Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden
our understanding, changes in research methods, professional practices, or medical treatment may become
necessary.

Practitioners and researchers must always rely on their own experience and knowledge in evaluating and
using any information, methods, compounds, or experiments described herein. In using such information or
methods they should be mindful of their own safety and the safety of others, including parties for whom they
have a professional responsibility.

To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any
liability for any injury and/or damage to persons or property as a matter of products liability, negligence
or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the
material herein.

Library of Congress Cataloging-in-Publication Data


Application submitted

British Library Cataloguing-in-Publication Data


A catalogue record for this book is available from the British Library.

ISBN: 978-1-85617-746-7

For information on all Butterworth-Heinemann publications,


visit our web site at www.elsevierdirect.com

Printed in United States of America

10 11 12 13 14 10 9 8 7 6 5 4 3 2 1
Contents

Foreword xiii Fire Protection 20


Contributors List xv Commerce 21
Economic and Marketing Trends and
Introduction xix Asset Protection 22
Code of Ethics xxv Demographics 23
Class Struggles and Terrorism 24
Labor Relations 27
Law 29
I History of Security Services 31
FOUNDATIONS The Path to Professionalism 33
Contemporary Careers in Asset Protection 34
References 38
1. Concepts and Theories of Resources 38
Asset Protection
JIM ELLIS AND CHRISTOPHER A. HERTIG
3. Role of the Professional
Protection Officer
Introduction 3 M.A. KEVIN PALACIOS AND
Asset Definition 3 CHRISTOPHER A. HERTIG
Asset Valuation 4
Risks 4 Introduction 41
Mitigation 4 Definition of a Protection Officer 41
Asset Protection 5 Levels of Protection Staff 42
Physical Security 6 Major Roles of Protection Officers 43
Crime Prevention Through Environmental Design 6 What It Means to be a Professional 45
Safety 7 Preventative Functions 48
Risk Management and Insurance 7 Mitigation Functions 48
Summary 10 Response Functions 48
References 10 Basic Protection Officer 48
Intermediate Protection Officer 48
Advanced Protection Officer 49
2. The Evolution of Asset Protection Summary 49
and Security References 51
CHRISTOPHER A. HERTIG AND Resources 51
JOHN CHRISTMAN
4. The Protection Officer
Introduction 13 as a Leader
The Cycle of History 14 FRANKLIN R. TIMMONS AND
Key Terms 15 SCOTT A. WATSON
The Wartime Growth of Security 16
History of Policing 17 Introduction 55
“Private Security” or “Public Police?” 18 Do You Really Want to be a Leader? 56

iii
iv CONTENTS

Team Member Skills: The Foundation of Leadership 57 7. Security Awareness


Expectations of Leaders 57 JAMES E. SELLERS
Three Critical Leadership Skills 57
Ten Steps to Becoming an Effective Leader 60 Introduction 83
The Leader as an Agent of Change 61 What is Security Awareness? 83
Pitfalls of Leadership 61 Expanding the Team Through Partnerships 84
Conclusion 62 Techniques for Reinforcing Policy and
References 62 Procedures to Increase Security
Resources 62 Awareness 84
Double Loop Learning 85
Tools 86
5. Career Planning for Protection Lessons Learned 87
Professionals Resources 87
CHRISTOPHER A. HERTIG AND References 88
CHRIS RICHARDSON

Importance of Career Planning 65 8. Central Alarm Stations and


Education 66 Dispatch Operations
Training 66
SEAN SMITH, JIM ELLIS, AND
Experience 67 RICH ABRAMS
Licensing/Certification 68
Networking 68 Introduction 89
Job Search 69 History of Central Alarm and Dispatch
Career Advancement 69 Centers 90
References 71 Types of Monitoring Systems 91
Resources 71 Types of Sensors 95
Transmission Media 98
Visitor Management Systems 99
Communications 100
II Conclusion 101
References 102
COMMUNICATIONS

6. Effective Communications
CHARLES T. THIBODEAU III
Effective Communications Defined 75 PROTECTION OFFICER
Due Diligence Based on Effective FUNCTIONS
Communications 75
Channels of Communications 76
The Six Essentials of Effective 9. Automation in Protection Operations
Communications 76 KEVIN E. PETERSON
Consider the Audience 76
Verifying Communications with Feedback 77 Historical Perspective 107
Myths and Misconceptions in Contemporary Security Environment 108
Communications 77 The Role of the Professional Protection Officer 112
Proper Use of Communications Devices 77 Summary 113
Summary 80 References 114
CONTENTS v

10. Patrol Principles Alcohol Serving Considerations 146


CHRISTOPHER A. VAIL
Reference 147
Resources 147
History of Patrol 117
Purpose of Patrol 119
Types of Patrol 121
Preparation for Patrol 122 IV
Techniques of Patrol 124
Factors that Influence Patrol Effectiveness 126
CRIME PREVENTION AND
Unethical/Unprofessional Practices 127 PHYSICAL SECURITY
Fixed Posts 127
Conclusion 128
References 129
13. Environmental Crime Control
GLEN KITTERINGHAM

11. Traffic Control Introduction 151


ARTHUR A. HOLM Environmental Crime Prevention Versus Social
Crime Prevention 152
Signs and Automatic Signals 131 Theories 152
Roadway Positions 132 Routine Activity Theory 156
Hand Signals 132 Crime Pattern Theory 156
The Whistle 133 Crime Prevention Through Environmental
Traffic Control 133 Design (CPTED) 156
Gate Duty 135 Second-Generation CPTED 157
Equipment 135 Defensible Space: Crime Prevention Through
General Rules for Traffic Direction 135 Urban Design 158
Practical Applications 158
Summary 158
12. Crowd Management and References 159
Special Event Planning Resources 159
PATRICK C. BISHOP,
TERENCE M. GIBBS, AND
JENNIFER LANTZ 14. Physical Security Concepts
and Applications
Introduction 137 KEVIN T. DOSS AND
Definitions 138 DENIS A. O’SULLIVAN
Formation of Crowds 138
Causes of Crowd Formations 138 Physical Security Planning 161
Psychological Factors 139 Security Lighting 166
Types of Crowds 140 Application Considerations 167
Crowd Actions and Suggested Countermeasures 140 Glazing 167
When Verbalization Doesn’t Work 142 Intrusion Detection 168
Security and Demonstrations 142 System Monitoring 170
Formation of a Mob 143 Card Access 170
Responsibility and Behavior of Protective Groups 143 Locking Hardware 171
Planning Considerations 143 Closed Circuit Television 173
Personal Behavior 144 Safes and Vaults 175
Riot Control Force Deployment Procedures 144 Underwriters Laboratories 177
Crowd Management Assessment 145 Fencing 177
vi CONTENTS

Convergence 179
Continuing Education 180
V
Physical Security Certification 180 SAFETY AND FIRE
References 181
Resources 181
PROTECTION

18. Fire Prevention, Detection,


15. Alarm System Fundamentals and Response
DOUG DURANT AND KEVIN POUND MICHAEL STROBERGER

Alarm Monitoring 184 Fire Basics 209


Operator Interface 185 Detection Methods 211
Alarm Sensors 186 Fire Types 211
Duress Alarms 187 Extinguishers 212
Nuisance Alarms 187 Permanent Extinguishing Hardware 213
Alarm Response 188 Containment 213
Fire Plans 214
Arson 214
16. Access Control Conclusion 215
COLIN BEST

Introduction 191 19. Occupational Safety and Health


Emergency Access Control 192 and the Protection
Examples of Access Control 192
Audit and Record Keeping 193
Officer
Access Authorization 193 KEVIN PALACIOS
Applying Physical Security in Access Control 194
Locks and Key Control 194 Introduction 217
Electronic Access Control Systems 195 Work and Health 218
Access System Database Management 196 Basic Elements of an Occupational Safety and
Biometric Technologies 196 Health (OSH) Program 218
Access Control in the Information Age 197 Occupational Risks 221
The role of the Protection Officer in
OSH Programs 222
17. Detection Technology Key Facts in Accidents 223
KEVIN T. DOSS‚
CHRISTOPHER A. HERTIG, AND
BETHANY J. REDMOND
20. An All Hazards Approach
Which Detection Equipment is the Best? 199 to Hazardous Materials
Metal Detection 200 ROBERT D. JAFFIN
X-Ray 200
Explosive Detection 201 Role of the Protection Officer 230
Canine Detection 202 Hazardous Material Incidents 231
Electronic Article Surveillance 202 Tools and Resources 232
Responding to Alarms 203 Response Models and Templates 233
Summary 204 The Initial Response 234
References 204 Resources 237
CONTENTS vii

VI Drugs of Abuse, Paraphernalia, and Definitions 277


Indicators and Common Signs of Abuse 278
INFORMATION PROTECTION Signs and Symptoms: Controlled Substances 278
Inhalants: Glue, Gasoline, Erasing Fluid 282
Protecting People and Assets 282
21. Information Security and References 285
Counterintelligence
KEVIN E. PETERSON 24. Workplace Violence
TIMOTHY A. PRITCHARD AND
Key Terminology 241 ROGER MASLEN
Threats to Information and Intangible Assets 243
How Technology is Changing the Threat 245 References 292
A Suite of Protective Measures 246
The Role of the Professional Protection Officer 249
Summary 250
25. Crisis Intervention
References 251 MICHAEL A. HANNIGAN AND
CHRISTOPHER A. HERTIG

Introduction 295
VII Causes of Disruptive Behavior 296
Stages of Management of Disruptive
DEVIANCE CRIME AND Behavior 296
VIOLENCE Crisis Development Behavior Modules 297
Protection Officer Guidelines 298
Verbal and Physical Disruptive Behavior 298
22. Workplace Crime and Deviance Empathic Listening 299
NORMAN R. BOTTOM AND Nonverbal Communications 299
WHITNEY D. GUNTER Controlling Disruptive or Violent Behavior 299
Team Intervention 300
Theories of Workplace Crime 255 Positive Factors Resulting from Team
Theft Prevention 258 Approach 300
Response to Theft 262 Leadership in the Team Approach 301
Summary 264 Safety Considerations in Crisis
References 266 Intervention 301
Resources 266 Conclusion 301
Resources 302
23. Substance Abuse
FRANCIS J. ELLIOTT, 26. Strikes, Lockouts, and
GLEN KITTERINGHAM, AND
TERENCE M. GIBBS Labor Relations
DAVID J. DELONG
Impact on Business and Industry 270
Substance Abuse: What is the Motivation? 271 Strikes 305
How Problematic Behavior and Dependence Searches 308
Develop? 272 Employee Misconduct and Dishonesty 309
How is Substance Abuse Perpetuated? 273 Employee Discipline 309
Conditions Adversely Affecting the Types of Discipline 309
Workplace 274 Arbitration 310
How Must Industry Respond? 274 Summary 310
viii CONTENTS

VIII What They Look Like: From Individuals to


Organizations 354
RISK AND THREAT Target Selection and Attacks 356
Security Preparations and Defensive Measures 357
MANAGEMENT References 359

27. Security Risk Management 30. Antiterrorism and VIP Protection


KEVIN E. PETERSON
CHRISTOPHER A. HERTIG AND
TED WADE
The Historical Basis for Risk Management 315
What is Security Risk Management? 316 Terrorist Actions and Activities 363
Two Key Elements: Assessment and Mitigation 316 Antiterrorist Strategy 365
Taking a Strategic Risk Management Approach 317 Terrorism Defensive Strategies 366
The Risk Management Process 317 Antiterrorist Techniques by Organizations/
Likelihood Versus Consequence Scatter Charting 321 Facilities 366
The Foundation of a Mitigation Strategy 322 Specific Techniques for Antiterrorist Security 367
The Five Avenues to Address Risk 323 Professional Development for Personal Protection
“The Four D’s” 325 Specialists 370
Layered Security (Defense in Depth) 325 Personal Protection Specialists (PPS) 371
Mitigation Measures 326 Protecting the Principal 372
Tailoring the Program to the Setting and Hostage Situations 373
Environment 326 Hostage Threat Receipt 373
The Role of the Professional Protection Officer 326 If Taken Hostage 374
Summary 328 Managing the Hostage Incident 374
References 329 Negotiation 375
The Stockholm Syndrome 375
Suicide Attacks 375
28. Emergency Planning
References 377
ERNEST G. VENDRELL AND SCOTT A. WATSON
Resources 377

Introduction 331
Types of Potential Emergencies 332
Scope of the Problem 335 IX
Emergency Planning Considerations 336
Vulnerability Analysis 338 INVESTIGATIONS
Developing the Emergency Response Plan 342
Reviewing and Integrating The Emergency
31. Investigation: Concepts and Practices
Response Plan 343
Conclusion 346 for Security Professionals
References 346 CHRISTOPHER A. HERTIG
Resource 347
Investigative Logic 383
History of Investigation 384
29. Terrorism Preliminary Investigation 385
ROBERT METSCHER Follow-up Investigation 385
Intelligence 386
What is Terrorism: A Definition Dilemma 349 Liaison 387
Why Violence? Why They Do What They Do 352 Notes and Reports 388
The Reason for the Action 353 Auditing 389
CONTENTS ix
Interviews 390 Overt Personal Surveillance 422
Investigative or Focused Interviews 391 Covert Electronic Surveillance 422
Informants 393 Overt Electronic Surveillance 423
Undercover Investigations 394 Equipment Requirements 423
Shopping Services 395 Privacy Issues 423
Surveillance 395 Recording and Retention 424
Behavior/Condition Analysis 396
Testifying in Legal and Quasi-Legal Proceedings 397
Managing Investigations 398
35. Report Writing and Field Notes
Conclusion 399 RAV-ZURIDAN YISRAEL
References 401
Resources 401 Introduction 427
Importance of Report Writing 427
Field Notes 428
32. Crime and Incident Scene Reports Should be Written 428
Procedures What Should be Reported 429
DENNIS SHEPP Qualities of Good Reports 429
References 431
What is an Incident? 403
The Scene 404
Hazards to an Incident Scene 404
Determining Boundaries 405 X
Protect and Preserve the Scene 405
Evidence 406
LEGAL ASPECTS OF
Making Detailed and Accurate Notes 408 SECURITY
Working with Law Enforcement and
Investigators 409
Conclusion 410
36. Legal Aspects of Security
References 410 DAVID L. RAY

Introduction 435
33. Interviewing and Statements The Development of Our Laws 436
DENNIS SHEPP Types of Laws—Criminal and Civil 437
Conclusion 446
Introduction 413
What is Interviewing? 413
The Power of Communication 414
The Interview Process 416 XI
Deception 417
Concluding the Interview 418 OFFICER SAFETY AND
Conclusion 418 USE OF FORCE
References 419
Resources 419
37. Use of Force
CHARLES T. THIBODEAU AND
34. Foundations for Surveillance CHRISTOPHER A. HERTIG
MICHAEL STROBERGER
Use of Force 449
General Types 421 Use of Force in General 450
Covert Personal Surveillance 422 Justifying the Use of Force 451
x CONTENTS

Retreat 452 Self-Protection 491


Force Alternatives Defined 452 References 494
Excessive Force Liability 453
Injuries to Officers are Avoidable 453 40. Apprehension and Detention
Arrest and Detention Search and Seizure 453
Procedures
A Formula for Self-Control 454
RICHARD P. FIEMS
Conflict Resolution Formats 455
Response to Aggressive Behavior 455
Officer Safety Issues 460 Developing a Working Model 498
Optimal Distance 460 What Constitutes an Arrest? 499
Defanging the Snake 461 The Importance of Reasonableness 499
Elements of Aggression 462 What Gets Security Officers in
Dealing with Aggression 462 Trouble? 500
Verbal Deescalation 463 Detention and Apprehension Methodology 501
Applying Verbal De-escalation to Aggressive The Use of Force 503
Situations 463 Dealing with the Aftermath 503
Lethal and Less-than-Lethal Weapons Conclusion 504
Management 464
Report Writing in Use-of-Force Cases 466
References 468 XII
Resources 468
RELATIONS WITH OTHERS
38. Defensive Tactics and Officer Safety
INGE SEBYAN BLACK
41. Human Relations in a Global
The Professional Security Officer’s Role 471 Environment
Avoiding Potential Situations 472 CHRISTOPHER A. HERTIG AND
Know Your Limitations 472 DARRIEN DAVENPORT
Focus on Prevention 473
Threat Assessments 473 Human Relations 509
Defensive Tactics and Weapons 474 Advice from the Master 510
Post Orders 475 Diversity 510
Special Circumstances 475 Globalization 513
Use of Force 475 Women in Protection 514
All Force Beyond this Point Requires Training Beyond Sexual Harassment 514
the Introductory Officer Level 478 Effective Communication 515
Training for Success 479 Ethical Behavior 515
Focus on Prevention 480 Customer Service Leadership 516
Conclusion 480 Summary 517
References 518
Resources 518
39. Industrial Hazards, Safety, and the
Security Patrol Officer 42. Public Relations
BRIAN D. BAKER
CHARLES T. THIBODEAU,
CHRISTOPHER A. HERTIG, AND
Definition of Industrial Hazards 484 GEORGE A. BARNETT
Industrial Hazards, Accidents, Injury, and Illness 485
Risk Assessment 488 Public Relations Defined 521
Self-Assessment 488 Public Relations Planning 522
CONTENTS xi
Promoting Effective Customer Relations Within the Third Scenario: Special Event 560
Security Force 524 Fourth Scenario: Seaport Operations 561
Handling Customer Complaints 526 Fifth Scenario: Installing a Central
Service That Can Make the Difference 527 Station 563
Training 527 Professional Organizations and
The Media: Good Dream/Bad Dream 528 Training 563
Access Control at the Scene of a Critical Incident 529 Industry Regulation by Government 564
Disruption of Business 529 Conclusion 566
Plant Emergency Organization Control 529 References 566
Contract Security Contingent Access Control 529
Conclusion 530
References 531 45. Ethics and Professionalism
CHRISTOPHER A. HERTIG
43. Community Relations: Making
the Strategy Come Alive Key Terms and Concepts 570
Ethical Decision Making 572
MARK E. PUETZ AND K. C. POULIN
Ethical Issues in Protection 572
Why Unethical Behavior Occurs 573
Introduction 535
Conclusion 574
Security and the Experience Economy 536
Resources 575
Cost of Quality 541
From Strategy to Brand to Officer 544
Building a Community of Substance 547
Index 577
The Transformation 554
References 555

44. Networking and the Liaison


Function
BRION P. GILBRIDE

First Scenario: Fire 558


Second Scenario: Vehicle Break-in 559
This page intentionally left blank
Foreword

The security world is constantly changing, constant attention; as one famous terrorist agency
both in the context in which it has to operate, once remarked, “We only have to succeed once.”
and in terms of what it can offer as a response Being on our guard, benefiting from research
to a wide range of threats. This is true across the findings, and following good practice are cru-
world. Indeed, globalization and the impact of cial. Books like this one are designed to help.
technology are just two trends that have seen The coverage of this book is broad, covering
to that. As a consequence, security has become domains such as communication, protection
more complicated; or, at least, the breadth of officer functions, crime prevention, safety, infor-
knowledge that a good security operative, at any mation security, workplace violence, risk man-
level, needs to draw upon has been stretched. agement, investigations, private security law,
One of the positive signs of the march of and the use of force. The book provides proven
security professionalism is that there is now knowledge to protection officers to enable them
more research being gathered on security- to take on the arduous tasks of asset protection
related issues. Scholars in universities, research and loss prevention.
institutes, companies, and professional bod- This book strives to provide a foundation for
ies have helped to develop a global knowledge improving the skill level and efficiency of pro-
base. The good thing about security is that tection officers. As a basic text for achieving the
knowledge from around the world has rele- Certified Protection Officer certification, this
vance to a broad range of circumstances. After book will be studied over and over by opera-
all, threats are often the same. Terrorist attacks tives across continents. It will also serve as a
take place globally, and the sorts of responses research resource for those looking to develop
needed are often similar, if not the same. The insight into an array of security topics. The edi-
principles of security apply across the board, tors are to be commended for ensuring that this
though the contexts differ, and how the prin- edition builds positively on previous ones.
ciples are applied needs to be adapted to meet
Professor Martin Gill
local needs. This is where skill comes in. Skills
Director
are needed from those who assess risks and
Perpetuity Research & Consultancy
those who manage them, from senior executives
International (PRCI) Ltd
to street-level protection officers.
148 Upper New Walk
It is a sad fact that offenders often move faster
Leicester LE1 7QA, UK
than response agencies. We know that many of
those who commit crime adapt quickly; they share Dr. Ona Ekhomu, CFE, CPP
knowledge and experiences; doing so often gives Chairman
them an edge. Just as people move themselves and School of Management and Security
their assets around the world with ease, offenders 10 Turton St.
have tried to do so as well. Stopping them requires Lafiaji, Lagos, Nigeria

xiii
This page intentionally left blank
Contributors List

Sandi J. Davies began her career in contract a chapter relating to crime prevention in Canada
security in 1980 with a primary focus on person- in the Handbook of Loss Prevention and Crime
nel administration. She became deeply involved Prevention (Butterworth-Heinemann). In 1995,
in training and was instrumental in developing again in a cooperative effort, Ms. Davies and Mr.
security officer training programs for a major Minion had published a book entitled The Security
national security guard company. Her interest Supervisor Training Manual with Butterworth-
in security training grew, and in 1988 she joined Heinemann. In 2008, the third edition of this text,
the newly formed International Foundation for coedited by Chris Hertig, was released entitled
Protection Officers (IFPO) as a program admin- Security Supervision and Management: Theory
istrative assistant. In 1991, she was elected exec- and Practices of Asset Protection, again published
utive director of IFPO and has been a driving by the leader in Security Trade Publications,
force in the Foundation’s program development Butterworth-Heinemann. Sandi was the editor of
and administration. Sandi became a member of Protection Officer News published by IFPO for 13
ASIS International in 1985 and served in execu- years until it went into an electronic format.
tive positions at the chapter level. Chris Hertig, CCP, CPOI, is a member of the
In addition, Sandi was also a member of the Behavioral Sciences Department at York College
Advisory Board for the Northwest Territories of Pennsylvania where he teaches courses in secu-
Security Officer Certification Committee. In 1994, rity planning and supervision, crime prevention
Sandi was the chairperson for the Asset Protection and physical security, legal standards of security
Advisory Board for Mount Royal College in and asset protection, ethical issues in criminal
Calgary, Alberta, Canada. In 1999, Sandi agreed to justice and criminal investigation. In addition to
serve on the Advisory Board of the International his regular teaching assignment, he has taught
Foundation for Cultural Property Protection. Ms. self-defense and martial arts for the education
Davies is also a member of the Technical Advisory department. Prof. Hertig has also given noncredit
Board for the Canadian General Standards Board courses in report writing, crowd management,
on Security Officer Training Standards. Most officer survival, and public relations.
recently, Sandi was chairperson for the Private Prior to York College, Mr. Hertig spent three
Security Services Council of ASIS International. years as a nuclear security training administrator,
Ms. Davies has had numerous articles pub- developing and teaching a wide range of instruc-
lished in security publications, such as Security tional topics for security personnel in accordance
Management and SECURITY magazine, relating with U.S. Nuclear Regulatory Commission
to certification and training of security personnel. requirements. A Certified Protection Officer
In the early 1990s, Ms. Davies, in a cooperative Instructor (CPOI) through the International
effort with the IFPO Founding Director Ronald Foundation for Protection Officers (IFPO),
R. Minion, coedited the Protection Officer Training Prof. Hertig has given presentations to numerous
Manual (Butterworth-Heinemann). That text is professional and civic organizations. He has also
now in its eighth edition. In 1994, she contributed consulted with instructional program providers.

xv
xvi CONTRIBUTORS LIST

Prof. Hertig has published several hundred arti- Prof. Hertig began his career while in col-
cles, reviews, and chapters on various topics. He lege as a student aide to the Campus Security
has been a featured columnist in several security Department. He was a member of the U.S.
industry publications and assisted in establishing Army ROTC and served an internship with
IFPO’s Article Archives, an online collection of the Columbia County Juvenile Probation
research papers for students and practitioners. Department. After graduation, he worked for
Chris served as coeditor of Security Supervision and several security services firms as a security offi-
Management: Theory and Practice of Asset Protection cer, investigator, and supervisor. He also spent
(Butterworth-Heinemann) with Sandi J. Davies, a summer as a member of the Park Police in
the Foundation’s executive director. Mechanicsburg, PA.
Chris has been a longtime member of Prof. Hertig holds a master ’s in arts
ASIS International, serving on the Academic (Criminology) from Indiana University of
Programs Council as well as the Academic– Pennsylvania, a bachelor ’s (Sociology) from
Practitioner Symposium Group. He is a charter Bloomsburg University of Pennsylvania, and an
member and past president of the Pennsylvania associate (Commercial Security) from Harrisburg
Association of Criminal Justice Educators Area Community College. He has also com-
and an active member of the International pleted graduate courses in adult education from
Association of Law Enforcement Educators Penn State University, has been board certified
and Trainers. He was also a member of the in security management by ASIS International,
International Association of Campus Law and holds the designation of Certified Protection
Enforcement Administrators for many years. Professional (CPP).

Rich Abrams, CEM Whitney D. Gunter, PhD., CPO


Brian D. Baker, MA, CPP, CPO, CPOI Michael A. Hannigan, CPO
George A. Barnett, CPO Chris Hertig, CPP, CPOI
Colin Best, CSSM Arthur A. Holm, CPO
Patrick C. Bishop, CPP, CFE, CPO Robert D. Jaffin, MBS, MTS
Inge Sebyan Black, CPP, CFE, CPO Glen Kitteringham, M.Sc., CPP, F.Syl,
Norman R. Bottom, PhD, CPP, CFE, CPO, CST CSSM, CPOI, CPO
John Christman, CPP Jenifer Lantz
Darrien Davenport, MS Roger Maslen, CPP, CFE
Sandi J. Davies Robert Metscher, CPP, CISSP, CFE, CPO,
David J. DeLong, CPP CSSM, BS, MBA
Kevin T. Doss, M.Sc., CPP, PSP Denis A. O’Sullivan, CPP, CPO
Doug Durant, BA, CPP, CPO Kevin Palacios, M.Sc., CPP, PSP, CPOI
Dr. Ona Ekhomu, CPP, CFE Kevin E. Peterson, CPP, CPO, CPOI
Francis J. Elliott, CPP K.C. Poulin, CPOI, CPS, CHS-III
Jim Ellis, MA, CPP, PSP, CSSM, CPO Kevin Pound
Richard P. Fiems, MA, CPO, CSSM, CPOI Timothy A. Pritchard, CPP, CPOI
Terence M. Gibbs, MS, CPP, WSO-CSSD Mark E. Puetz, MBA
Brion P. Gilbride, MSI, CSSM, CPO David L. Ray, BA, JD, CFE
Professor Martin Gill Bethany J. Redmond
CONTRIBUTORS LIST xvii
Chris Richardson, CPP Franklin R. Timmons, CPP, CPOI
James E. Sellers, CPP, MSA Christopher A. Vail, MS
Dennis Shepp, MBA, CPP, CFE, PCI, CPOI Ernest G. Vendrell, PhD., CPP, CEM, CPO
Sean Smith, CPO Ted Wade
Michael Stroberger, CPO, CLSO, CSSM, Scott A. Watson, MCJ, M.Ed., CFE
CPOI, CLSD, CPP Rav-Zuridan Yisrael, MA, CPP, CPO,
Charles T. Thibodeau, M.Ed, CPP, CSSM, CPOI, CHS-III
CPO, CPOI
This page intentionally left blank
Introduction

A. PURPOSE Today, IFPO is the recognized catalyst in the


development of professionalism throughout the
The purpose of The Professional Protection private security industry. Thousands of security
Officer: Practical Security Strategies and Emerging officers who have earned the CPO accreditation
Trends is to provide “need-to-know” information have gained knowledge and professional career
for protection officers and students through- enhancement; they have unselfishly provided
out the security industry. This resource serves encouragement and information to their col-
as the course text for the Certified Protection leagues and employers. Hence, a new dimen-
Officer (CPO) program. Many security profes- sion of opportunities has spread throughout the
sionals also find the contents of this textbook security industry.
helpful as a reference in their day-to-day secu- The first edition was simple, short, and lim-
rity management responsibilities. ited in scope, but included enough information to
help the security officer better understand his or
her roles, duties, and responsibilities. However,
B. HISTORY OF THE TEXTBOOK since that simple beginning, each subsequent edi-
tion has brought new and enlightening informa-
The first edition of the Protection Officer tion to the security professional. The Professional
Training Manual (POTM) originated with Protection Officer is the leading text for protection
the birth of the International Foundation for officers and students. It is also widely used by
Protection Officers (IFPO) in 1988. Twelve dedi- those teaching in Protective Services, Criminal
cated security professionals from the United Justice, Homeland Security or Emergency
States and Canada had a vision: to create an Management courses of study.
organization that would provide meaningful Feedback has been the most significant fac-
career opportunities for line security officers tor. It has led to a standard of excellence for
throughout North America. this new text. We have received countless let-
The newly formed IFPO Board of Directors ters of appreciation for the depth and quality of
realized that a certification program was the seventh edition, but these same enthusiasts
needed, along with a professional training have been liberal with their recommendations
textbook, to make that vision a reality. Hence, for changes and improvements, and we have
the first edition of POTM was created to serve listened. Ongoing dialogue with security man-
as the course text for the Certified Protection agers, supervisors, consultants, educators, and,
Officer (CPO) program. IFPO, the CPO pro- of course, protection officers, has enabled us to
gram, and POTM all proved to be vital compo- develop and maintain a training text that will
nents in achieving the foundation’s objectives. serve future learning.

xix
xx INTRODUCTION

C. THE EIGHTH EDITION more than crime. Loss to an organization came


DEDICATIONS from waste, accident, error, crime, and unethi-
cal/unprofessional practices. This was a new
Norman Bottom and important concept. Security was not just
about the bad things that people do; it was
I first met Dr. Norman R. Bottom when I was much more than that. The WAECUP model is
a graduate student at Indiana University of part of this text. It is part of what I teach. It is
Pennsylvania. He taught a course on executive part of what we do as protectors.
protection on Saturday mornings that was held In 1988, the International Foundation for
on the campus of Allegheny County Community Protection Officers was formed. Leading advo-
College in Monroeville, Pennsylvania. Two other cates of professional development helped with
classes were held there on Saturdays so that peo- this organization under the direction of Ron
ple pursuing a Master’s degree could take nine Minion. Norman Bottom was on the Board of
credits by going to class one day a week. Directors, at one point serving as Chairman.
The class was a unique arrangement; in those He was way out in front. He was always way
days we didn’t have online learning. Creative out in front.
scheduling like Dr. Bottom had engineered was Now it’s up to us.
not the norm. The class offerings and schedule
concept were a fantastic way of meeting the Christopher A. Hertig, CPP, CPOI
needs of the learner, the security industry, and Assistant Professor
the university. York College of Pennsylvania
It was way out in front. October 15, 2009
The Journal of Security Administration was
started by Norman Bottom. It was the first
scholarly refereed academic journal in the secu- Fallen Officers
rity field. The journal was a major contribution This edition of the textbook is dedicated to
to the fledgling discipline of asset protection. the brave officers who lost their lives on 9/11,
Norman edited it for many years, assisted by as well as all of the other officers who have died
his wife, Mari, who took care of book, seminar, in the line of duty. We remember and honor
and video reviews. Dr. Bottom was also instru- your sacrifice, and we salute your dedication.
mental in founding the Academy of Security Our hearts and sympathies go out to your fami-
Educators and Trainers (ASET). This associa- lies, friends, and coworkers.
tion included many leading trainers, practitio-
ners, and academicians in the security industry.
Some of the networking initiated through the
Ron Minion, CPP and IFPO Founder
academy is manifested in the pages of this text. Ron Minion (1938–2008) lost his battle with
Some of us met each other through ASET. Lou Gehrig’s Disease in 2008. He was the man
In 1982, I applied to become a Certified behind this book, one of the founders of the
Protection Professional (CPP). As Dr. Bottom IFPO, a dedicated champion of the security
was a CPP, he endorsed my application. industry, and a tireless advocate for protection
In 1983, Norman and Professor John officers. His determination, and vision of pro-
Kostanoski wrote a book entitled Security and fessionalism through training for the industry,
Loss Prevention. This was an excellent text that has resulted in a brighter future for scores of
presented the WAECUP model of loss control. security professionals, and will continue to do
This model stated that loss was attributable to so in the future.
INTRODUCTION xxi
Ron was the first examined Certified Protec- her tenure with the IFPO as a part-time employee
tion Professional in Canada. He was a found- in 2002, and quickly worked her way into a very
ing member of the Calgary Chapter of the ASIS valuable full-time Program Coordinator position.
International, where he was a chapter chair Her friendly, caring nature assisted literally
and regional vice president. As regional vice thousands of candidates through their desired
president, he earned the president’s “award of certifications. She took pride and joy in attend-
merit” for establishing ASIS chapters through- ing to the IFPO students’ and clients’ needs.
out Canada. In 2006, Security Magazine named Her strengths were many, and her radiant smile
Ron one of the 25 Most Influential Executives. and personality will be forever missed within
Ron’s legacy includes the thousands of line our offices. She leaves behind her precious
security officers he employed and mentored daughter, Haylee.
over the years. He knew the industry from the
ground floor up, and never lost his vision of
providing affordable training for security offi- D. EIGHTH EDITION CONTENTS
cers to help them turn their mere jobs into via-
ble careers with brighter futures. The eighth edition has 12 units and 45 chapters.
Ron, our friend, mentor, industry advocate, The contributors to the eighth edition are among
and trusted colleague, will be greatly missed. the best writers, academics, and practitioners in
the security community. This talented group of
Lee Minion, CPO professionals has generously provided readers of
this superior textbook with unique opportunities
Lee Minion, son of Sandi Davies and Ron to acquire current asset protection and life safety
Minion, served his country in Iraq and is now information. These writers are outstanding indi-
embarking on a career in law enforcement. viduals who deserve recognition and appreciation
He is indeed a chip off the old block. At the for their service to the security community.
Foundation, we are so very proud of him. The contents of this textbook are sometimes
quite basic. However, every security supervi-
IFPO Team sor and manager should fully understand all
The International Foundation for Protection of the information contained herein to provide
Officers is supported by a team of security better leadership and interpretation of officer
professionals throughout the world who, year responsibilities.
after year, work diligently on behalf of the The material contained in each unit is
Foundation and what it stands for. Because of arranged to provide the reader with a smooth
these men and women who are committed to flow of related security information.
excellence and remain steadfast in their obliga- At the conclusion of each chapter, there are
tion to high standards of service, IFPO contin- 10 multiple choice and true/false questions. It
ues to be successful. We thank you. is important to be able to answer each question
correctly before proceeding to the next chapter.
Louise Gringas
A victim of a tragic accident, our coworker, E. GLOBAL CHALLENGES, NEW
team member, and friend, Louise Gingras, ROLES, AND RESPONSIBILITIES
brought sunshine to the IFPO Corporate
Headquarters for seven years. She was taken In the late sixth century, when the Greek phi-
from us far too soon, in June 2009. Louise started losopher Heraclitus first commented that the
xxii INTRODUCTION

universe is in constant flux, and the only con- aware of the danger of data loss, and numerous
stant is change; little could he have imagined laws govern what must be done if data is com-
the pace of that change in the 21st century. promised. Cyberterrorism not only puts data
Advances in medicine, science, and tech- at risk, it can put essential services and infra-
nology are happening at a dizzying pace, and structure at risk. Guarding against this type of
news travels the globe in the blink of an eye. threat requires continuing education about the
Information of all sorts is available with just a ever-evolving risks, deterrents, prevention, and
few keystrokes, and people can stay in constant laws. Unlike the night watchman, who only
touch via electronic media. Journeys that once worried about physical security with its fences,
took weeks, months, or even years now take gates, and access points, today’s protection
mere hours. It is a small world these days, and officer must also guard against an enemy that
economic problems and social unrest in one moves at the speed of light. The protection offi-
nation can be felt in many others. cer must not only protect the physical premises
Where once the term “security” might have and equipment, but must also guard against an
referred to the lone night watchman whose great- enemy that moves silently to disrupt services,
est adversary was a burglar hoping to pick a lock, incapacitate infrastructure, and steal data.
those days are long gone. The night watchman’s The National Fire Protection Association’s
role was viewed as merely a job that did not gar- (NFPA) “Guide for Premises Security” and
ner much respect in the community. “Standard for the Installation of Electronic
Today’s private security professionals are Premises Security Systems” have both caused
finding their roles greatly expanded in numer- changes that may not make news headlines, but
ous arenas worldwide, due, in part, to a much will certainly impact the industry. The former
greater global threat and a reduction in public will not affect the general public, but fire protec-
law enforcement protection. The current eco- tion, security consultants, facility managers, and
nomic situation has caused an increase in some insurance companies will be forced to deal with
types of crimes. At the same time, those eco- it. ASIS has already begun setting standards
nomic realties have also forced local municipal- that have impacted the industry. The latter more
ities to reduce public law enforcement efforts or less cements the impact of the former.
through layoffs or hiring freezes, even though While the quest for mutual respect and seam-
the need for more protection is growing. less cooperation between public and private
The threat of terrorism was spotlighted for security has improved over the years, it must
the United States and the world on 9/11, and it remain an ongoing goal for both the private and
is still an ever-present threat worldwide. It has public sectors. Mutual respect and cooperation
and will continue to impact the industry, partic- between public law enforcement and private
ularly in the areas of research and risk manage- security is essential to ensuring that security
ment methodologies. needs are met effectively.
In recent years, cyberterrorism, which Increasingly, security functions have been
threatens infrastructure and services by attack- contracted out to private security firms to fill
ing computer networks via the Internet, has the gap between what government can do and
become a very serious threat. It can and has what is needed. Private security firms are even
resulted in the loss of billions of dollars of pro- stepping in to fill the roles that military person-
prietary information, and compromised data at nel once filled on military installations and even
a broad range of institutions, from government war zones. A new type of protection officer is
agencies to banks, credit card companies, and increasingly stepping forward to fill the need,
business firms. Company executives are acutely ready to deal with new situations and challenges
INTRODUCTION xxiii
as they come along, thanks to ongoing educa- ● Successfully complete a midterm
tion and training. examination.
Currently, corporations that once relied on ● Successfully complete a supervised final
that night watchman to patrol a fence as suffi- examination. (A proctor may be located
cient protection are increasingly instituting their within the candidate’s organization or
own in-house security departments. An inte- community.)
gral part of this overall protection process is the
professional security manager and supervisor, (Both examinations are based on the contents
complemented with a security staff capable of of this textbook.)
attending to ongoing protection needs. Generally,
corporations require their security managers
and supervisors to be well educated, trained, G. CERTIFIED PROTECTION
and experienced. Private security firms are also OFFICER (CPO) FINAL
demanding educated, trained professionals. CHALLENGE PROGRAM
The night watchman might have been able
to do his job with limited education, but in This textbook, The Professional Protection Officer:
today’s ever-changing, challenging security Practical Security Strategies and Emerging Trends, is
climate, professionals must be educated and also the text for the CPO Final Challenge Program,
well trained to fulfill their new, evolving, and which is the fast-track method of obtaining
demanding roles. This new breed of security the CPO certification. The Final Challenge
professional is winning respect by proving it option eliminates the course of study and goes
is skilled and very capable of carrying out the directly to the final exam, which is the same one
most sophisticated, demanding roles. They are that is part of the CPO program. Questions on
dedicated professionals with the credentials the final exam come from the material in the
needed to keep themselves, their employers, textbook.
and their employers’ assets from harm. Contact the International Foundation for
Protection Officers (IFPO) for more information
regarding the Certified Protection Officer and/
F. CERTIFIED PROTECTION or other programs.
OFFICER (CPO) PROGRAM

Professional Protection Officer: Practical Security


Strategies and Emerging Trends is the course text for H. CONCLUSION
the Certified Protection Officer (CPO) program,
an internationally recognized certification for pro- The term protection officer frequently appears
tection officers. in this textbook. What is a protection officer?
The CPO designation is a professional accre- Protection officers have many titles: secu-
ditation that can be earned by completing a self- rity guard, security officer, campus police, loss
paced course based on this textbook. prevention officer, crime prevention officer,
In addition to having security experience or retail loss prevention agent, military police, and
the equivalent, a candidate must complete the several others. They can work part time or full
following stages of progression to earn the CPO time. They can be assigned to protect a person, a
designation: group of people, an office building, a network, a
store or factory, and many other assets in many
● Submit application for enrollment. locations. Some are armed; some are unarmed.
xxiv INTRODUCTION

They can be employed as independent con- that teach; but the primary beneficiary is the
sultants, by a security services agency, by the student or working protection officer.
military, by a state government, by the federal The editors of the Professional Protection
government, and by other organizations. The Officer: Practical Security Strategies and
term “protection officer” is not easy to define. Emerging Trends are honored to work with so many
Titles vary, specific tasks vary, locations vary, academicians, researchers, and outstanding security
employers vary, but the one thing that all pro- professionals since the planning of the first edition.
tection officers have in common is that they are These talented and dedicated security profession-
willing to take risks and put into place preven- als have worked tirelessly in supporting, promoting,
tive measures to protect tangible assets, such as and contributing to the International Foundation
buildings, intangible assets, such as data, and for Protection Officers and all of its worthwhile pro-
of course, the public. They assume the risks so grams. “We could not have done it without you!”
that others can go about their business and not A special thanks goes to Alice Grime, Charles
have to worry about potential harm. Thibodeau, and Jamie Ingram for their techni-
This textbook is written as a useful reference cal support and assistance in the production and
for security supervisors, managers, and those development of this textbook.
Protection Officer
Code of Ethics

The Protection Officer Shall


I Respond to employer’s professional needs
II Exhibit exemplary conduct
III Protect confidential information
IV Maintain a safe & secure workplace
V Dress to create professionalism
VI Enforce all lawful rules & regulations
VII Encourage liaison with public officers
VIII Develop good rapport within the profession
IX Strive to attain professional competence
X Encourage high standards of officer ethics
PROTECTION OFFICER CODE OF Loyalty
ETHICS To the employer, the client, and the public.
Today business and the public expect a great The officer must have a complete and thorough
deal from the uniformed security officer. In the understanding of all of the regulations and pro-
past there has been far too little attention paid cedures that are necessary to protect people and
to the ethical aspects of the profession. There assets on or in relation to the facility assigned to
have to be solid guidelines that each officer protect.
knows and understands. More importantly, it
is essential that each manager and supervisor
performs his or her duties in a manner that will
reflect honesty, integrity, and professionalism.
Exemplary Conduct
Every training program should address the The officer is under constant scrutiny by
need for professional conduct on and off duty. everyone in work and public places. Hence, it is
Line officers must exhibit a willingness to gain essential that he or she exhibit exemplary con-
professional competency and adhere to a strict duct at all times. Maturity and professionalism
code of ethics that must include the following. are the key words to guide all officers.

xxv
xxvi PROTECTION OFFICER CODE OF ETHICS

Confidentiality can enhance the image of the industry, their


employer, and themselves. Recognize and
Each officer is charged with the responsibility respect peers and security leaders throughout
of working in the interests of his or her employer. the industry.
Providing protection means that the officer will
encounter confidential information that must be
carefully guarded and never compromised. Honesty
By virtue of the duties and responsibilities
Safety and Security of all officers, honest behavior is absolutely
The foremost responsibility of all officers is essential at all times. Each officer occupies
to ensure that the facility that must be protected a position of trust that must not be violated.
is safe and secure for all persons with lawful Dishonesty can never be tolerated by the secu-
access. The officer must fully understand all nec- rity profession.
essary procedures to eliminate or control secu-
rity and safety risks. Prejudice
The job of protecting means that the offi-
Deportment
cer must impose restrictions upon people that
Each officer must dress in an immaculate frequent the security workplace. All human
manner. Crisp, sharp, clean, and polished are beings must be treated equally, with dignity
the indicators that point to a professional officer and respect, regardless of color, race, religion,
who will execute his or her protection obliga- or political beliefs.
tions in a proficient manner and will be a credit
to the profession.
Self-Discipline
Law Enforcement Liaison With the position of trust comes the respon-
sibility to diligently protect life and property.
It is the responsibility of each officer to make These duties can only be discharged effectively
every effort to encourage and enhance positive when the officer understands the gravity of his
relations with members of public law enforce- or her position. Self-discipline means trying
ment. Seek assistance when a genuine need harder and caring more.
exists and offer assistance whenever possible.

Conclusion
Strive to Learn
The job of protecting life and property
To become professionally competent, each offi- focuses much attention on the individual secu-
cer must constantly strive to be knowledgeable rity officer. Hence, it is essential to be aware of
about all aspects of his or her chosen career. How the need for professional conduct at all times.
to protect people, assets, and information must By strictly adhering to each section in this code
always be a learning priority for every officer. of ethics, it may be expected that we as indivi-
duals and the industry as a whole will enjoy
a good reputation and gain even more accep-
Develop Rapport
tance from the public as well as private and
It is necessary to be constantly aware of the government corporations. You as the individual
image that our profession projects. All officers officer must be a principal in this process.
U N I T I

FOUNDATIONS

Concepts and Theories of Asset Protection


1
2 The Evolution of Asset Protection and Security
3 Role of the Professional Protection Officer
4 The Protection Officer as a Leader
5 Career Planning for Protection Professionals
This page intentionally left blank
C H A P T E R

1
Concepts and Theories
of Asset Protection
Jim Ellis and Christopher A. Hertig

placing valuables into a modern safe. The most


CHAPTER OBJECTIVES visible and easily recognizable form of asset
● Define and explain valuation of an asset protection was the medieval castle. The castle
● Provide an overall introduction to the was built to protect an asset, be it the king or
concept of asset protection ruler, a precious metal such as gold, or as a point
from which to help protect the empire. Castles
● Discuss risks and risk management and initially were quite basic, but as the risks esca-
insurance lated, they came to employ additional layers of
● Explore strategies to mitigate risk protection such as a moat, drawbridge, or defen-
● Explore physical security measures sive positions.
related to asset protection
● Explain the system of Crime Prevention
through Environmental Design (CPTED) ASSET DEFINITION

Asset protection begins with defining what the


asset is. There may be one asset or many assets. An
INTRODUCTION asset can be a person or people; a physical entity
such as a building or plant; an object such as a
Asset protection is the basis for everything painting or a gold bar; or a concept such as a for-
that a protection officer does. It is the core mula or design. The ASIS International General
function of the protection officer’s job. Asset Security Risk Assessment Guideline defines an
protection can have different meanings and asset as “Any real or personal property, tangible
functions depending on the approach to pro- or intangible, that a company or individual owns
tecting the asset, its location, and even the type that can be given or assigned a monetary value.
of asset. Asset protection has been practiced for Intangible property includes things such as good-
millennia, whether it was protecting the Roman will, proprietary information, and related prop-
city with night sentries patrolling the streets, to erty. People are included as assets.”

3
4 1. CONCEPTS AND THEORIES OF ASSET PROTECTION

ASSET VALUATION contents, materials, suppliers, and contractors,


especially anything that by use or omission
The asset must have some type of value. The would damage, harm, or cause loss to the com-
value of the asset could be a real value, such as pany or its personnel.
a gold bar being worth a set amount of money
based on the weight of the bar and the cur- Frequency
rent price of gold. The value of the asset could
The frequency of losses must then be deter-
be based on what it would cost the company to
mined through an examination of the types of
replace it. This is sometimes difficult to calculate
crimes and incidents in and around the facility,
when discussing specialty items such as the for-
with special emphasis on the dates on which
mula or recipe for a soft drink, or the patented
they occurred. A ranking of the events should be
design for a product, the loss of which could
made using a consistent scale (annually, monthly,
mean the end of a company. The most intan-
daily, or hourly) for all such loss events.
gible valuation of an asset would be in what is
referred to as “reputational damage”—the loss of
the image of a company or consumer confidence Probability
in a company. Reputational damage can occur Through an analysis of this information, trends
through major theft of customer information, a may emerge which point to an escalation in activi-
senior executive being injured or killed, or the ties that may precede a more serious crime against
brand name of a company being tainted through the company. This will help to establish the prob-
inferior “knock-off” products. The loss of reputa- ability of such an event occurring in the future,
tion is difficult to calculate because things such assuming all other processes and operations at the
as unrealized sales are nearly impossible to facility remain the same. Once there is a change in
determine. While it is not necessary to have the the assets, the probability of loss will also change.
actual value of an asset on hand at any one time,
the value of the asset must be known prior to the Impact
implementation of any protection program and
reevaluated periodically thereafter. Finally, a ranking of the impact of any loss
on the company must be made. Impact is an
accounting of the tangible (real) and intangible
RISKS (unrealized) costs associated with such events. All
such tangible losses should be considered, from
the mundane, such as the loss of power or water
Criticality
service, up to and including the loss of the facility
Once the asset and its value are defined, it is including its contents and a substantial portion of
necessary to determine what risks there are to the employees. Intangible losses such as the loss
the asset. According to the ASIS International of current or future sales or customers should also
General Security Risk Assessment Guideline, be accounted for, to the extent that this is possible.
“risks or threats are those incidents likely to occur
at a site, either due to a history of such events or
circumstances in the local environment” (2003, MITIGATION
p. 6). It is therefore important to have data on
crime and incidents occurring in and around the Only after all of the factors of risk or loss have
site. A vulnerability assessment will include a been compiled and examined can the protection
thorough examination of the facility, personnel, officer assist with developing strategies to help

I. FOUNDATIONS
ASSET PROTECTION 5
mitigate the risk. All of the mitigation efforts and defense/response. Each piece of the layered
must be designed so as not to “substantially protection concept can work on its own. However,
interfere with the operation of profitability of the the most complete protection is afforded through
enterprise” (ASIS, 2003, p. 6). Mitigation efforts combining all of the layers.
that do substantially impact operations are much Deterrence is the practice of discouraging
less likely to see executive support regardless of an individual or group from even attempting
the level of risk, as they also substantially impact to attack the asset. This can be accomplished
the profitability of the company. through a number of means such as signage,
fencing, lighting, cameras, or people. Signage
at the perimeter of the enterprise property
Cost/Benefit would warn trespassers of the property line
A cost/benefit analysis must also be con- and the penalty for proceeding further. Further
ducted to help assist in evaluating the mitigation enhancements to the signage could include the
measures against the costs incurred. According addition of fencing, lights, and cameras. In a
to the ASIS International General Security Risk personal protection role, the deterrence would
Assessment Guideline, the cost benefit process appear to be provided by the ring of protection
“involves three steps: officers, or specialists around a high-profile
individual. In some rare circumstances, the illu-
● Identification of all direct and indirect
sion of additional layers of protection can be a
consequences of the expenditure.
better and more cost-effective deterrent.
● Assignment of a monetary value to all costs
Detection is the identification of a threat,
and benefits resulting from the expenditure.
preferably at the earliest possible opportunity.
● Discounting expected future costs and
Alarm sensors, cameras, and even protection
revenues accruing from the expenditure to
officers, are all means of detecting and identi-
express those costs and revenues in current
fying threats to the enterprise. A threat identi-
monetary values” (ASIS, p. 4).
fied earlier in the asset protection process gives
If the cost/benefit evaluation determines that the remaining layers of protection more time to
the cost of mitigating the risk is greater than the contribute to the overall protection of the asset.
cost of the asset, then other measures must be Delaying the attacker also gives the other
employed. layers of defense a chance to work together.
Sufficient layers of delay must be incorporated
so that the detection and defense/response
ASSET PROTECTION pieces of the asset protection continuum can
perform their roles. Delay can be accomplished
through an expansive perimeter that takes
Layered Protection
a while for the attacker to cross, fences that
Asset protection through risk mitigation take time to climb, strong doors that must be
typically involves a concept of layered protec- breached, and interior levels of protection such
tion, also known as defense in depth. In this as additional doors into rooms or a safe that
concept, the asset is considered to be in the takes even more time to enter.
center, surrounded by concentric layers of pro- A sufficiently delayed attacker allows for a
tection. Each layer contributes individually, defense to be mounted from within the site to
and as part of the whole, to the overall protec- repel the attacker, or for a sufficient response to
tion of the asset. The principles behind layered be put together and proceed to the site. However,
protection consist of deterrence, detection, delay, the layers of protection must delay the attacker

I. FOUNDATIONS
6 1. CONCEPTS AND THEORIES OF ASSET PROTECTION

long enough so as to be able to stop him on the traditionally used by military forces to scout out
way to the asset, or on his way out with the asset, the location and disposition of an opponent. They
but before he leaves the property with the asset. are used today by police and security forces.
While still endeavoring to locate hostile indi-
viduals (felons), modern police patrols are used
PHYSICAL SECURITY to assess community environments. In a con-
temporary asset protection scheme, patrols are
Physical security planning was originally not only concerned with criminal acts but also
based upon response to a military threat. A tra- with unauthorized activities, safety and fire pro-
ditional reference for physical security is FM tection issues, and the performance of auxiliary
19-30 Physical Security, published by the U.S. services. These can include delivering the com-
Army, while a modern reference is the Facilities pany mail, checking gauges, conducting light-
Physical Security Measures Guideline published ing surveys, assessing behavior, enforcing lease
by ASIS International. agreements, and assisting customers. Note that
The process used to plan physical security community policing or problem-oriented policing
measures is as follows: strategies that public police have adopted are
1. Identify assets. These generally include very similar to what security practitioners have
personnel, property, information, and image. been doing for decades.
2. Loss events are exposed. Risks are identified.
This involves research rather than “seat of the CRIME PREVENTION THROUGH
pants” reasoning! ENVIRONMENTAL DESIGN
3. Probability of the loss events occurring is
calculated. Crime Prevention Through Environmental
4. Impact of occurrence is assessed for each loss Design (CPTED) is a system whereby territo-
event. This means, the effect the loss event riality reinforcement is established via barri-
will have in terms of direct, indirect, and extra- ers, access control, and surveillance. Its genesis
expense costs. may have been in the construction of castles
5. Countermeasures are selected. There can and forts. The contemporary beginnings of it
be a vast array of interventions; generally were through the writings of Oscar Newman
physical security utilizes target hardening (Defensible Space) and C. Ray Jeffrey (Crime
techniques, such as patrols, access control, Prevention through Environmental Design). CPTED
lighting, intrusion detection, surveillance, theory consists of these various components:
weapons detection, and so on.
6. Countermeasures are implemented. Territoriality: Boundaries and property
7. Countermeasures are evaluated as to their lines are marked. This can be the placement
effectiveness. Traditionally, this step has been of barriers, shrubbery, and the use of
avoided by practitioners in physical security different colors of walkways to mark areas.
and crime prevention. Psychological deterrents to trespass are
erected to establish territoriality.
Note: See www.securitysolutions.com and Surveillance: Observing areas makes detection
www.securitymagazine.com for products and and deterrence of criminal behavior more
applications. likely. There are several types of deterrence:
Patrols are a key part of a physical security Natural—keeping areas open to
system. They serve as catalysts for the system, observation, such as by clearing bushes
bringing all parts together. Patrols have been near access points, having windows facing

I. FOUNDATIONS
RISK MANAGEMENT AND INSURANCE 7
out into a common courtyard, or placing E — Error in planning or execution, which
a picnic area near a basketball court. All of results in lost funds;
these make for easier observation of the area C — Crime that causes loss and/or injury;
to be protected. They facilitate detection of UP — Unethical/unprofessional practices,
criminal or unauthorized activity. such as misrepresentation, discrimination,
Electronic—technological aids are used, conflict of interest, and so on.
such as closed circuit television (CCTV)
Accidents cost extensive amounts of direct loss
and volumetric intrusion detection systems,
(cost of replacement and repair) as well as indi-
such as passive infrared (PIR) sensors.
rect loss (downtime, investigative costs, lowered
Organized—patrols by security personnel,
morale, legal fees, etc.) and extra-expense loss
police, or citizen crime watches.
(advertising, rental of new rooms or equipment).
Access control: Maintaining boundaries
Note that there are also extensive administrative
by restricting access to an area. Access is
law requirements under OSHA (Occupational
controlled via the use of locks, biometric
Safety and Health Administration) and state
systems, access cards, and other methods.
agencies (CALOSHA and Pennsylvania
Access control is a physical deterrent to trespass.
Department of Labor and Industry) with which
Positive activity support: In a significant
organizations must comply. Safety is a major
departure from physical security, CPTED
concern to organizations for all of these reasons.
uses activities that divert people in the
Many persons in charge of security are also in
environment from involvement in crime.
charge of safety. A Director of Safety and Security
This may take the form of recreation,
has become a common title in health care, on col-
entertainment, or volunteer efforts that help
lege campuses, and in hotel environments.
society (volunteer fire companies for youth).
Maintenance: The repair of “broken
windows.” An environment that is not
kept up properly may degenerate further.
RISK MANAGEMENT AND
People see broken windows and believe it is
INSURANCE
acceptable to break other windows.
“Risk management” is a term closely associ-
A “snowballing” or “rolling ball” effect
ated with the insurance industry. It is similar con-
occurs. Prompt repair and cleaning of damage
ceptually to the physical security planning process
or graffiti are essential parts of CPTED.
in its implementation, but it deals with risks other
than “security” threats caused by humans. It is
SAFETY not limited to “target hardening” (risk reduction)
approaches, such as the use of locks, barriers,
Safety ushers in the more contemporary intrusion alarms, and so on. Strategies for manag-
emphasis on asset protection and incorporates ing risk include the following:
the WAECUP Theory of Loss Control developed
Risk avoidance—such as completely avoiding
by Bottom and Kostanoski in Security and Loss
the risk of an earthquake by avoiding
Control (first published by Macmillan in 1983).
geographic areas where there are active fault
W — Waste of time, resources, man-hours, lines, staying out of countries that are known
space; to kidnap people for ransom, or not making
A — Accident that causes injury, downtime, dangerous products, such as explosives.
increased workers’ compensation costs, and Risk transfer—means transferring
so on; the financial impact of loss to another

I. FOUNDATIONS
8 1. CONCEPTS AND THEORIES OF ASSET PROTECTION

organization or entity. Insurance coverage is assets across some distance so that no one
the usual means of risk transfer. The insurance vulnerability can affect the entire enterprise
company takes on the cost of repairing or is another example.
replacing the asset at risk instead of the Risk reduction or risk mitigation—means
enterprise. Of course, this comes at some reducing the probability of a loss-causing
cost and some delay in repairing or replacing event through the adoption of preventive
an asset as the insurance company must measures. That is, taking methodical,
investigate and process the claim. Outsourcing appropriate steps to lessen the risk to the
hazardous operations to other organizations is organization or the frequency, probability,
another example of risk transfer. and impact of such risks and losses. Physical
Risk assumption, risk retention, or risk security and crime deterrence would be
acceptance—refers to accepting the risk, as it considered risk reduction. So, too, would the
has a very low probability of occurring; the use of safety equipment.
risk is extremely difficult to protect against;
or the cost of changing the risk to the assets is As you can see, risks can be reduced in a num-
so great or so low that any effort to change it ber of ways, but they are never truly eliminated.
would either be too expensive or the losses so Insurance can be thought of as the “last line
low as to be inconsequential. For instance, it is of defense” in a physical security system. It
extremely unlikely that an asteroid will strike; provides the policyholder with financial com-
it is also impractical to defend against it. It pensation from the insurance company after a
would likewise be impractical to purchase loss has occurred. According to Purpura (1991),
insurance for a machine that has exceeded its loss prevention originated within the insurance
useful shelf life and has no intrinsic value. industry. Note that while the term “loss preven-
Risk spreading—implies using redundant tion” is utilized primarily within the retail sec-
systems of communication, power, or tor, it is gradually being replaced with the more
information storage. The separation of representative term “asset protection.”

PRACTICAL EXERCISE
Pick some assets, such as vital information, terrorism, theft, and so on. In the column on the
that an organization needs to operate: peo- right, list a risk management approach, such
ple, works, art, and so on. Place these assets in as transfer, avoidance, or acceptance, which
the boxes to the left. Next, place the primary would be most appropriate for dealing with the
threats that may face those assets such as fire, threat.

Asset Threat Risk strategy

I. FOUNDATIONS
RISK MANAGEMENT AND INSURANCE 9
Insurance policies provided by an insurance Liability insurance—to cover legal costs
company are driven by the probability of loss and compensatory damage awards (punitive
events occurring based on actuarial tables. The damages are not generally covered).
premiums and deductibles are adjusted accord- Attorney’s fees and associated costs can
ing to the loss event probability; so, too, is the become quite high during civil litigation
availability of insurance if insurance carriers regardless of whether the case is settled or
deem a risk to be too high and refuse to write goes before a court.
a policy. In these cases, organizations must self- Fire insurance—one of the first types of
insure or join an insurance pool of other organi- insurance developed; some policies mandate
zations that pool their funds in a liquid account that the insured conduct periodic patrols
that is set aside in the event of a loss. There are of various areas on the property—the use
also government insurance programs for crime of watch tour systems had developed as a
and floods on the federal level, and workers’ result of this.
compensation on the state level. Burglary insurance—for losses associated
Various types of insurance coverage have with unlawful intrusion. Burglary insurance
evolved, such as the following: policies generally require evidence of forced
entry.
Business Interruption—for losses incurred Robbery insurance—coverage for forcible
after a disaster, accident, or fire while a thefts committed in the presence of another.
business is not operating. Business interruption Theft insurance—policies cover losses from
insurance helps to control indirect losses theft; may include burglary and robbery losses.
stemming from lost productivity. Bonds—fidelity bonds require investigation
Kidnap and Ransom (K & R)—for firms that of the covered employee by the bonding
have had executives abducted by criminals company (the insurer); these bonds indemnify
or terrorists. This coverage became popular the holder against dishonest acts committed
in the early 1980s in response to left-wing by the employee. The holder of the bonds is
terrorist kidnappings in Latin America. The exempt from financial responsibility for the
film Proof of Life with Russell Crowe portrays dishonest acts of the employee.
K & R coverage. Employment Practices Liability (EPL)—
Worker ’s Compensation—required by state insures against legal costs due to unlawful
laws to compensate workers injured on the employment practices such as sexual
job from the results of work-related accidents harassment, discrimination, and so on.
and occupational diseases (Purpura, 1991, Contemporary liability exposure for ongoing
p. 265). Rates paid for premiums by employers illegal employment practices is substantial,
are based on job hazard, and in part on an with awards and settlements running into
employer’s record of accidents. the multimillions.

EMERGING TRENDS
An emerging new paradigm of asset protec- homicide/suicide bomber is an especially trou-
tion is the consideration that must be made for bling trend and is difficult to provide sufficient
an attacker who will enter a protected area with levels of protection against. The amount of time to
the goal of destroying an asset in place. The detect, delay, and defend is essentially reduced by

I. FOUNDATIONS
10 1. CONCEPTS AND THEORIES OF ASSET PROTECTION

half as the attacker does not have to add in time Specialization in the industry is the continu-
to flee. Depending on the asset to be protected ation of a long-standing trend that is gaining
and the preexisting environment in which the greater acceptance outside of the business. Both
protection officer must operate, strengthening the large and small security businesses are finding
ability to detect and delay the adversary must be specialties in which to focus and thrive. Some
given especially careful consideration. This may security officer companies are established as, or
include the addition of intelligence assets that can are establishing, separate divisions devoted to
overtly or covertly uncover the adversary’s plans. retail security in malls and protection of chemical
Cooperative information sharing with other enti- plants or nuclear power stations. Electronic secu-
ties such as law enforcement or in some areas, the rity companies may find specialization in surveil-
military, may be the best option for strengthening lance systems for casinos or integrating various
the detection aspect of asset protection. security, fire alarm, and building control sys-
Like the homicide/suicide bomber, improvised tems into a cohesive platform using the client’s
explosive devices (IEDs) are also an especially trou- computer network.
bling trend. Not limited to areas of conflict, domes- Professionalism is also the continuation of a
tic extremist organizations have used these devices long-standing trend that is finding favor by the
to intimidate, maim, and destroy. Special attention companies and clients that security profession-
and alternative plans must be carefully developed als work for and with. College degrees at the
for organizations that conduct work that may Bachelor’s and Master’s levels are an almost uni-
attract the attention of such groups, including spe- versal requirement for security managers at all
cialized protection plans for executives. In areas of levels, and for some security officers in special-
conflict where the threat of IEDs is real, options for ized sectors. Certification by industry organiza-
reducing the risk include, but are not limited to, tions such as the International Foundation for
traveling covertly, using decoy vehicles, or using Protection Officers and ASIS International is also
telephones, videos, and Internet conferencing. becoming a requisite for some companies.

SUMMARY Calder, J. D. (1985). Industrial guards in the nineteenth and


twentieth centuries: The mean years. Journal of Security
Administration, 8(2).
Being involved in the practice of asset pro-
Coleman, J. W. (1969). The Molly Maguire riots: Industrial con-
tection is the first step toward advancement in flict in the Pennsylvania coal region. New York, NY: Arno &
your field and acceptance in your enterprise. The New York Times.
The protection officer must be ready to volun- Constable, G. (Ed.). (1990). The old west. New York, NY:
teer and assist in learning this craft. Time-Life Books.
Cote, A., & Bugbee, P. (1988). Principles of fire pro-
tection. Quincy, MA: National Fire Protection
References Association.
Fennelly, L. J. (1989). Handbook of loss prevention and crime
General Security Risk Assessment Guideline. (2003). prevention (2nd ed.). Boston, MA: Butterworths.
Alexandria, VA: ASIS International. Fennelly, L. J. (1996). Handbook of loss prevention and crime
Biery, K. D., Jr., & Schaub, J. L. (1994). The ultimate security prevention (3rd ed.). Boston, MA: Butterworth-Heinemann.
survey. Boston, MA: Butterworth-Heinemann. Fiems, R., & Hertig, C. (2001). Protection officer guidebook.
Broder, J. F. (1984). Risk analysis and the security survey. Naples, FL: International Foundation for Protection
Boston, MA: Butterworth-Heinemann. Officers.

I. FOUNDATIONS
SECURITY QUIZ 11
Fossum, J. (1982). Labor relations: Development, structure, pro- Johnson, T. (2002). Retail loss prevention management models
cess. Dallas, TX: Business Publications, Inc. Unpublished paper. York College of Pennsylvania.
Garcia, M. L. (2001). The design and evaluation of physical pro- Kuykendall, J. (1986). The municipal police detective: An
tection systems. Boston, MA: Butterworth-Heinemann. historical analysis. Criminology, 24(1).
Girard, C. M. (1989). Planning, management and evalua- Mackay, J. (1996). Allan Pinkerton: The first private eye.
tion, Chapter 31. In L. J. Fennelly (Ed.), Handbook of loss New York, NY: John Wiley & Sons.
prevention and crime prevention (2nd ed.). Boston, MA: Matthews, L. J. (1990). Pioneers and trailblazers: Adventures of
Butterworths. the old west. New York, NY: Derrydale.
Gilbride, B. P. (1999). Sexual harassment. In S. J. Davies & Nalla, M., & Newman, G. (1990). A primer in private security.
R. R. Minion (Eds.), Security supervision: Theory and Albany, NY: Harrow & Heston.
practice of asset protection. Woburn, MA: Butterworth- National Advisory Committee on Criminal Justice
Heinemann. Standards and Goals. (1976). Report of the task force on
Green, G., revised by Fischer, R. J. (1987). Introduction to private security. Washington, DC.
security (4th ed.). Boston, MA: Butterworths. Peak, K. J. (1997). Policing in America: Methods, issues, chal-
Hertig, C. A. (2002). Investigative concepts. Unpublished lenges. Upper Saddle River, NJ: Prentice-Hall.
paper. York College of Pennsylvania. Purpura, P. P. (1991). Security and loss prevention: An intro-
Hertig, C. A., Fennelly, L. J., & Tyska, L. A. (1998). Civil duction. Stoneham, MA: Butterworth-Heinemann.
liability for security personnel. Naples, FL: International Sennewald, C. A. (1985). Effective security management (2nd
Foundation for Protection Officers. ed.). Boston, MA: Butterworths.

S EC U RI T Y QU IZ 6. Deterrence is the practice of discouraging an


1. The ASIS International General Security Risk individual or group from even attempting to
Assessment Guideline defines an asset as attack the asset.
“Any real or personal property, tangible or a. True
intangible, that a company or individual owns, b. False
that can be given or assigned a monetary value. 7. All risks can be reduced completely.
a. True a. True
b. False b. False
2. CPTED stands for Crime Prevention through 8. There is a theory of loss control developed by
Environmental Dedication. Bottom and Kostanoski in security and loss
a. True control. It is known as:
b. False a. WASTE
3. Physical security planning was originally b. WASTMGMT
based upon response to a military threat. c. WAECUP
a. True d. WHATSUP
b. False 9. The most intangible valuation of an asset
4. Risk Management is a term closely associated would be in what is referred to as:
with the insurance industry. a. Liquid asset
a. True b. Respectful damage
b. False c. Punitive damage
5. A vulnerability assessment will include a d. Reputational damage
thorough examination of the following: 10. Intangible property include things such
a. Facility and personnel as goodwill, proprietary information, and
b. Contents and material related property.
c. Suppliers and contractors a. True
d. All the above b. False

I. FOUNDATIONS
This page intentionally left blank
C H A P T E R

2
The Evolution of Asset Protection
and Security
Christopher A. Hertig and John Christman

CHAPTER OBJECTIVES INTRODUCTION


● Discuss the importance of looking at the History is illustrative for many reasons; there
cycle of history are trends and themes that run throughout the
● List and define key terms march of time and that repeat themselves—to a
● Explore the growth of the security degree. P. T. Barnum said, “All history is bunk,”
industry through wartime and policing and he was right—to a degree. History is a per-
units spective. In many cases, that perspective gets
distorted, or lost, over time.
● Compare and contrast private security Studying history is important as it gives us
and public police perspective on where things were, where they
● Explain how the fire protection industry are now, and where they may be in the future.
developed Historical analysis can provide insight into how
● Look at how commerce and economic certain issues were dealt with. This may give
and marketing trends are related to asset guidance in contemporary or future problem
protection solving.
● Explore how demographics, historical Finally, history provides a laboratory for the
class struggles, and labor relations testing of theory. Solutions that were developed
have all contributed to the protection in response to certain problems had positive
profession or negative effects in addressing those prob-
lems. An example is the Prohibition Era in the
● Provide avenues toward the PATH to United States, beginning in 1919. Alcoholic bev-
Professionalism erage manufacture or distribution was against
● Offer suggestions for pursuing the law. As a result, huge criminal enterprises
contemporary careers in asset protection sprang up in response to consumer demand. A
black market economy was formed with gang-
sters seeking to profit. Some people feel that the

13
14 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY

current legal prohibition against drugs is analo- demands different protective strategies and
gous to Prohibition. This is an arguable point: tactics. These change with technological
drugs are not as socially accepted as the drink- developments. Politics and economics are
ing of alcohol was in 1920s American society. also factors. In 2008 and 2009, piracy on
Nonetheless, the emergence of black markets the high seas became a major issue due to
due to extensive consumer demand for illegal large numbers of unemployed mariners.
goods or services is something that all students 4. Demographics—population size, density,
of asset protection should appreciate. age distribution—plays a key role in crime
control and safety. Large numbers of
recent immigrants who do not understand
THE CYCLE OF HISTORY
the language or customs of their newly
adopted country create safety and security
The security industry has a rich and varied
challenges. College students living in
background. “Security” implies protection: safety
dormitories create another set of challenges.
from attack, espionage, or sabotage. It means
High-rise office buildings with business
being able to live, work, or play free from harm,
tenants have different protection needs from
in a stable environment. Organizations must take
two-story apartment complexes for low-
measures to minimize disruption. These mea-
income families. Security measures must be
sures are dependent on a variety of factors, such
relevant to the environment in which they
as threat probability, criticality, culture of the
are implemented and every environment is
organization, financial resources available, and so
different.
on. The measures taken have changed over time.
5. Military forces and concepts are intimately
The historical development of “asset protec-
involved in protection. Foreign invaders,
tion” (the broader, more contemporary term
riots that have to be contained by soldiers,
encompassing safety and fire protection) and
and international terrorists are all addressed
“security” (the older term; more oriented to
by military forces. Contemporary pro-
crime/espionage/terrorism issues) reveals sev-
tective forces often operate on a military
eral trends. These trends appear to be cyclical
organizational structure. Police, security,
in nature.
and firefighting organizations have a
1. Private initiatives generally precede public. paramilitary chain-of-command with
In many cases, private protective measures sergeants, lieutenants, and captains. The
are started to fill a void in services offered military has clearly exerted an influence over
by governments. Private corporations are police, security, and fire departments.
more nimble and flexible than governments. 6. Security efforts generally are a step behind the
This enables them to start new programs, latest methods of criminal attack. The saying
protection or control forces, etc. “As one hole in the net is mended, the fish swim
2. Control forces may be involved in class toward another” seems particularly relevant.
struggles. Control forces—military, police, 7. Protective efforts are usually initiated
security—work to keep certain groups of after serious problems have occurred. The
citizens in line. September 11, 2001, attacks on the Pentagon
3. There is a strong relationship between and World Trade Center initiated substantial
commerce and protective needs. The amount reforms in the federal government, such as
and type of commerce (ships, trains, Internet, the Transportation Security Administration.
and so on) determines the threats or risks Wars and major natural disasters also create
posed to the commerce system. Each risk new protective organizations, laws, and so on.

I. FOUNDATIONS
KEY TERMS 15
8. Protective efforts often are spawned by Asset protection takes a broader view. It is
the need for mutual protection. Homeland also concerned with waste, errors and accidents,
Security is a current example: governmental natural disasters, labor shortages, equipment
units at all levels coming together in breakdowns, fires, and so on. Asset protection
partnership with private organizations to covers any loss an organization suffers that is
protect against terrorism. Another example is not related to marketing.
fire societies that were established in Boston Crime Prevention through Environmental
in 1718, where society members helped each Design, (CPTED), is a theory of crime deter-
other to salvage goods after a fire (Cote & rence based on environmental design. Facilities
Bugbee, 1988). are constructed—or arranged—in such a way
that criminals feel uncomfortable and refrain
from committing crimes.
KEY TERMS Physical security is a plan or design devel-
oped for the purpose of attempting to eliminate
“Assets” are tangibles or intangibles that or minimize the threats posed by potential loss
have value. If assets are stolen, lost, destroyed, event occurrences. It incorporates locks, bar-
or damaged, the entity (organization or individ- riers, access control systems, lighting, alarms,
ual) owning them suffers a loss. There are four and security officers. Physical security is a vast
basic classifications of assets: field of study. It can be said that it is the “heart”
of security. It encompasses CPTED as well as
1. People—employees, visitors, clients,
procedural controls.
patients, students, and so on.
Personnel security is designed to screen out
2. Property—real estate, buildings, raw
undesirable employees. It is done to protect
materials, equipment, merchandise, and
both the employer and other employees. The
so on.
screening, or vetting, of employees to prevent
3. Information—vital information that is
probes by foreign intelligence agents originated
necessary for an organization’s survival,
within the military-industrial complex of the
such as employee and vendor lists,
1950s to 1980s. The old term “industrial secu-
organizational plans, and other items
rity” (as in “American Society for Industrial
without which the organization could not
Security”) referred to Department of Defense
operate; confidential information such
(DOD) contractor firms. These companies made
as patient records, personnel or student
munitions, tanks, airplanes, and so on for mili-
records; proprietary information such as
tary usage. While espionage—in particular
trade secrets, customer lists, and marketing
economic espionage—is a major issue, contem-
plans; classified information that is essential
porary personnel security also deals with work-
to national defense.
place violence, internal theft, and terrorism. The
4. Image—the image cultivated through years
current emphasis on terrorism could be seen as
of public relations and advertising that an
a historical cycle repeating itself—the Cold War
organization or individual (celebrity) has
measures concerning spies bearing some simi-
established. Customer goodwill is an asset.
larity to the issues of terrorism. Each era was
So, too, is a positive image that will not attract
focused on persons infiltrating facilities and
the ire of extremist groups or individuals.
information sources and causing problems.
Security is concerned with those threats that Asset protection encompasses those threats
are posed by humans. Espionage, sabotage, posed by nature, accident, market, and economic
theft, and assault are examples. factors as well as those posed strictly by humans.

I. FOUNDATIONS
16 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY

Asset protection incorporates fire protection, hired soldiers from the northern Viking regions.
HAZMAT, and safety within the discipline. The Varangian Guards operated for hundreds of
It seeks to identify and manage all risks posed years, serving as bodyguards, suppressing riots
to an organization and incorporates many con- and occasionally functioning as combat troops.
cepts of risk management. Asset protection is the In the American Revolution, Britain employed
approach used in addressing problems by many German mercenaries from the province of Hessia
organizations. It is perhaps similar to the “all (Hessians). It was not until the rise of Napoleon
hazards approach” used in emergency manage- that the use of standard full-time armies on
ment. In some cases, the term “loss prevention” active duty was typical. Privately hired soldiers
is used. This has been particularly common in and security personnel were the norm for most
the retail security sector. of history (Maggio, 2009). Today there are pri-
As threats change over time and involve dif- vate military companies who provide security,
ferent environments, asset protection is a truly intelligence, and logistical services to nations.
dynamic undertaking. The history of security/ Iraq and Afghanistan have seen expanding
asset protection is formulated in a variety of markets for these firms. Modern armies are too
areas. Security is influenced by commerce, war, small to do all that is asked of them. As a result,
natural disaster, economic and cultural changes. private companies have stepped in to handle
security and other functions that don’t abso-
lutely require soldiers.
THE WARTIME GROWTH OF A review of some events in history that cre-
SECURITY ated security problems is outlined here.

Military defense is often discussed in the July 1916—an explosion at Black Tom
literature on the history of security. Ortmeier Island, a munitions storage facility in New
(1999) reveals that in prehistoric times, cave Jersey, was set off by a German saboteur.
dwellers stacked rocks around perimeters in This increased War Department security
front of their caves to both mark this space and measures. German agents also set fires, filled
warn off intruders. The Praetorian Guard in fire extinguishers with gasoline, sold heroin
ancient Rome were military personnel. Military to soldiers to make them addicted, and even
threats employ military approaches. Such contaminated the milk supply at the Ft.
approaches often utilize military personnel and Leavenworth Cadet School with nitrogenous
incorporate military culture. germs. German agents also fomented
“Defense-in-depth” is a military concept strikes in key war industries to slow down
wherein assets are protected by successive lines production of war materials (Velke, 2004).
of defense. This includes clear zones, outer The potential for problems caused by
perimeters, inner perimeters, and soldiers or saboteurs, foreign intelligence agents (spies),
protection officers. This is a key element of and terrorists who are state-sponsored
physical security plans. Contemporary facility creates a need for increased security
models of defense-in-depth incorporate layers measures during all military conflicts. Note
of protection. Safes and vaults, alarm systems, that in most discussions of terrorism, foreign
and insurance coverage all comprise the layers agents are not included, although they can
of the protection plan. be a major problem.
Military threats and organizations have been World War II—U.S. Department of War
employed throughout history. The Byzantine established internal security division and
empire, which replaced the Roman empire, swore in 200,000 security officers as military

I. FOUNDATIONS
HISTORY OF POLICING 17
police auxiliary. State National Guard units system required every male over the age of 12
were also activated. In some cases, states to form into a group of 10 with his neighbors
had Home Guard organizations that enabled called a “tithing.” The tithing was sworn to
the National Guard to engage in combat or help protect fellow citizens and apprehend
combat support activities while the Home and deliver persons who committed crimes.
Guard maintained a domestic security posture. Ten tithings were grouped into hundreds who
Korean War—The “Cold War” era began with were directed by a constable. The constable was
heightened tensions between the United States appointed by a nobleman and was, in effect, the
and Russia. The Industrial Security Manual first police officer (Peak, 1997).
was published in 1952. This was considered Note that early Roman and English—and
the “Bible” of Department of Defense (DOD) later American—policing functions were depen-
contractor security procedures. It established dent on citizen involvement. This is still true
information protection, personnel security, today. Homeland Security requires citizens to
and physical security measures for DOD be vigilant for indications of terrorism. Major
contractors. Since the United States was in a disasters require government, corporate, and
wartime economy until about 1975, there was nonprofit volunteer organizations (Red Cross)
heavy activity in this sector. Many security to work together. The lesson is that the need for
personnel worked in “industrial security.” mutual assistance spawns protective efforts.
In the early nineteenth century, London con-
tinued to have a large population with crime
HISTORY OF POLICING and disorder problems. As few organiza-
tional models were available at this time, the
Police in Ancient Rome consisted of the military model was adopted for the London
Praetorian Guards, which was a military unit. Metropolitan Police (Ortmeier, 1999). What
There were also cohorts who kept peace. The Robert Peel established in 1829 in London
vigiles were civilian freemen who controlled served as an organizational model for police
fires and assisted in controlling crime and disor- and security departments. In America, cities
der. It is interesting to note that urban mob vio- began to develop uniformed police forces in the
lence was one reason why municipal police were mid-1800s. These forces were similar to what
formed in both England and the United States. we have today. Peel set forth a series of princi-
With the Norman Conquest of England in ples upon which a police force could be estab-
1066, there were several significant governmen- lished and administered. While his specific
tal developments: frame of reference was public law enforcement,
the principles are also adaptable to uniformed
1. The introduction of feudalism, a contractual
private protection forces:
relationship between lords of the manor,
and their tenants or vassals. Feudalism was
1. The police must be stable, efficient, and
a system in which the landholder provided
organized along military lines.
for the security of the tenant peasants in
2. The police must be under government control.
exchange for a portion of the harvest.
3. The absence of crime will best prove the
2. The centralization of government.
efficiency of police.
3. The reorganization of the church.
4. The distribution of crime news is absolutely
One protection development that was estab- essential.
lished was a community-based system of polic- 5. The deployment of police strength both by
ing called the frankpledge. The frankpledge time and by area is essential.

I. FOUNDATIONS
18 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY

6. No quality is more indispensable to a police police forces are older in most cases. Private polic-
officer than a perfect command of temper; ing preceded public policing with merchant,
a quiet, determined manner has more effect parish, and dock police forces in England. Public
than violent action. and private were difficult to distinguish from
7. Good appearance commands respect. each other. Railroad Police were, and still are,
8. The securing and training of proper persons a privately employed police force with full law
are at the root of efficiency. enforcement authority. Many states in America
9. Public security demands that every police enacted legislation to establish railroad police
officer be given a number. forces. In many rural areas these were the only
10. Police headquarters should be centrally law enforcement agencies in existence. By 1914
located. there were 12,000 railroad police in America.
11. Police officers should be hired on a During World War I they were deputized by the
probationary basis. federal government (Purpura, 2002). The Coal and
12. Police records are necessary to the correct Iron Police in Pennsylvania were also privately
distribution of police strength. employed and had law enforcement powers.
Current policing in the United States was
In the mid-nineteenth century, major American
greatly influenced by the Omnibus Crime Control
cities began to develop police departments.
and Safe Streets Act of 1968. This created the Law
These forces evolved out of earlier night watch
Enforcement Assistance Administration (LEAA),
systems that utilized volunteers or civilians.
which funded training and education for police.
Some of these forces only operated at night, and
Police by the thousands began to acquire col-
they were no longer effective at controlling crime
lege educations. Criminal justice programs were
in burgeoning urban environments. Organized,
started at colleges across the country. While there
paid, full-time police operating under the prin-
were only five or so institutions offering degrees
ciples established by Robert Peel began to take
in criminal justice prior to 1968, today there are
shape.
thousands. The LEAA also provided grant mon-
State police forces also developed. The
ies for equipment and crime analysis by police
Pennsylvania State Police is generally regarded
departments. The LEAA also spent massive sums
as the first modern state police department.
on developing criminal justice.
While Texas and Massachusetts had state police
Fees were used to pay for early police ser-
forces, these were vastly different from the orga-
vices. The Parliamentary Reward System in
nizations we think of today as “state police.”
England paid a fee of 40 English pounds to
The Pennsylvania State Police have full law
private persons who captured felons. Both
enforcement authority. They also are respon-
Jonathan Wild and the Bow Street Runners were
sible for traffic control on state highways such
early private detectives who worked under the
as the Pennsylvania Turnpike. In some states,
Parliamentary Reward System. In the nineteenth
there are separate highway patrol forces that
century, there were private detectives who
specialize in traffic law enforcement (California
received rewards for recovering stolen prop-
Highway Patrol, Ohio Highway Patrol).
erty. Over time these private detectives were
replaced by public police, due to criticism of
“PRIVATE SECURITY” OR “PUBLIC their methods as well as the entry of insurance
POLICE”? companies. Once there were insurance policies
to compensate policyholders for their losses, the
Policing is both public and private. Public incentive to recover stolen property subsided
policing as we know it is relatively recent. Private (Kuykendall, 1986). This change was gradual;

I. FOUNDATIONS
“PRIVATE SECURITY” OR “PUBLIC POLICE”? 19
U.S. police often worked for rewards. One of the 4. Federal agencies such as the Secret Service
notable contributions of Allan Pinkerton was and U.S. Marshals are really more concerned
that he established a code of ethics and forbade with security than law enforcement
the acceptance of rewards by his men. functions. There is also the Federal Protective
There are still some examples of fee systems Service, National Security Agency, and
in use today, but these are rare. Constables in Customs and Border Protection. While the
Pennsylvania are private citizens with arrest officers who work for these organizations
powers who serve warrants and perform vari- have law enforcement authority, they are
ous court functions on a fee basis. The consta- first and foremost protection organizations.
ble system was imported from England and is 5. Government agencies often have either
an elected office in Pennsylvania. Note that an proprietary or contract security departments.
advantage of the fee system is that the govern- Housing bureaus, school systems, parks
ment is only paying for services rendered. There departments, reservoirs, and so on are
is no benefit package such as health insurance protected by security personnel. Some cities
and retirement. and counties have their own proprietary
Some other examples of “private secu- security departments.
rity” or “public law enforcement” include the 6. Military and federal installations have
following: security forces. These may be either
proprietary government employees or
1. Police in major cities may serve as private contract officers. The U.S. federal
“ambassadors” of the city. These officers government is a large user of contract
may be stationed in transportation centers or security services.
public facilities where people visiting the city 7. Shopping centers are private properties open
are likely to meet them. This is the same role to the public for business. They usually have
played by private protection officers in hotels, proprietary security forces. Some have police
resorts, casinos, and shopping centers. The substations within so that close cooperation
concept is the same: aid and assist visitors and between mall management, the security
preserve the quality of life for those visitors. department, and the police department is
2. Contract security personnel patrol apartment facilitated.
complexes, housing developments, and 8. Commissioned security officers are used
shopping centers in a form of “community- in some environments. These are privately
oriented policing.” Some firms specialize employed protection officers who have
in “weeding” out the criminal element via police commissions. This enables them to
surveillance and apprehension of drug make arrests under certain circumstances,
dealers and other criminals. This helps create for certain types of offenses and/or within
a safe environment for the contract officers to a specified area. Large hospitals and resorts
assume their “community-oriented” policing located in remote locations, and quite a few
role. They help neighborhood children, private colleges, use this model.
organize community activities, and so on.
3. College campuses often have campus The blending of police and security was great
police who conduct more asset protection in the nineteenth century and, it is probably
and security work than law enforcement safe to say, within the past 30 years or so. It
functions. Some colleges have both police will probably continue as our society becomes
and security divisions. Almost all have some increasingly complex and we more frequently
type of student patrols. utilize resources on a contractual/outsourcing

I. FOUNDATIONS
20 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY

or task force basis. Computer crimes will neces- amounts of heat and oxygen, virtually anything can
sitate contracting out for investigative exper- become fuel for a fire.
tise by government agencies. So, too, will cost The threat of fire varies with the environment.
considerations as police are extremely expen- The perception of that threat also changes. Before
sive employees to maintain. Police require the Civil War, fire insurance executives gener-
extensive preemployment screening, training, ally viewed fire as good for business (Purpura,
equipment, and health and pension benefits. 1991). Fires were similar to airplane crashes in
As a result they will have to be used more judi- that they were relatively improbable events that
ciously. Functions that do not absolutely require created hysteria and spurred the purchase of
a sworn law enforcement officer can be per- insurance policies. Insurance companies made
formed by a civilian. This can be a municipal money on these policies until excessive fires—
proprietary or contract employee. in heavily populated areas where buildings
Additional factors in this blending are retire- were constructed of wood—caused enormous
ment plans and an aging population. Retired amounts of claims to be paid.
police do not make enough money to cease Here is a brief overview of some major
working. Employing them as security officers or events in the development of fire protection
investigators may utilize their skills in a mutually beginning in the 1600s:
beneficial manner to both employer and officer.
An area of concern is police “moonlighting” 1631: A disastrous fire in Boston resulted in
in security. This can create numerous problems, the first fire ordinance in the United States.
such as determining whether the off-duty police This ordinance prohibited wooden chimneys
officer is a police officer or security officer when and thatched roofs (Ortmeier, 1999). Wooden
making apprehensions, and so on. There may chimneys were banned in London in 1647
be a temptation to use official databases for (Cote & Bugbee, 1988). Wooden chimneys
the benefit of a private employer. Preferential were often used in American soldiers’ winter
treatment of the employer (store, mall, the- quarters and the cabins of slaves.
ater, restaurant, hotel, etc.) by the police may 1666: The Great Fire of London spread due
occur. Off-duty work may also begin to take to closely situated wooden buildings, wind,
precedence over the full-time job. The officer and dry weather. The fire initiated some
may spend too many hours working off-duty interest in fire prevention by insurance
and become tired. Officer survival concerns companies. A complete code of building
are greatly expanded with off-duty police. regulations was adopted but not made
Employers of off-duty police may also have a effective, since commissioners to enforce the
hard time controlling them. Terminating their regulations were not appointed until 1774
employment can create intense hostility from (Cote & Bugbee, 1988).
local police departments. 1667: Phoenix Fire Office—a private
firefighting service that suppressed fires
on subscribers’ property. Subscribers’ had
FIRE PROTECTION a crest on their buildings to mark them.
Other private fire companies also formed.
Fire protection is a major issue in asset pro- Today, some industrial complexes and other
tection. Fire can destroy almost anything. It is a facilities have their own proprietary or
chemical process whereby heat, fuel, and oxy- in-house fire brigades. Some of these are
gen combine in a chemical chain reaction to well equipped and can suppress small fires.
turn a solid or liquid into a gas. With adequate In most cases, fire departments are paid

I. FOUNDATIONS
COMMERCE 21
public professionals. Volunteer firemen Association. This resulted in the
are also used and play an important development of the National Building Code
role in providing firefighting services to for municipalities (Purpura, 1991).
many areas. Some fire departments are
a hybrid of paid and volunteer
firefighters. COMMERCE
1871: Peshtigo Fire—a logging community
in Wisconsin; Peshtigo had very dry weather Commerce has a tremendous relationship
and this aided the spread of a forest fire to asset protection. Professional security per-
that burned vast acres of land. A massive sonnel must understand the marketing of their
firestorm formed where the fire consumed employer’s goods and services in order to be
oxygen at such a rate that it created effective. A retail loss prevention agent must
significant draft. Firestorms occur where a understand that selling merchandise is the
fire is large enough to essentially create its reason for the existence of the store, not the
own mini-weather system. The Peshtigo apprehension of shoplifters. Marketing must
Fire was probably the worst fire in U.S. be balanced with security. They are “both different
history. It is relatively unknown because the sides of the same coin.” It can be said, in both a
Chicago Fire, which occurred a few days theoretical and practical sense, that “marketing
later, received more attention from the news is the ‘flip side’ of security.”
media. From the beginning of the nineteenth cen-
1871: Chicago Fire. As in the Great Fire of tury until the development of the railroads,
London, closely situated wooden buildings massive canal networks were constructed in
caught fire in dry weather. The wind the eastern United States. During their heyday,
whipped the fire through Chicago, and the canals had asset protection concerns with acci-
city was destroyed. We commemorate the dents and labor shortages. Workers were some-
Chicago Fire with Fire Prevention Week. times injured and barges and canals damaged.
Fire Prevention Week is held each year in Railroad expansion during the nineteenth
October. century was dramatic. Railroads were neces-
1894: Underwriter’s Laboratories (UL) sary to ship goods and raw materials in large
was formed. UL is an independent testing quantities. Railroads had, and still have, a vari-
laboratory. It subjects products to extensive ety of security and safety issues. Nineteenth-
tests to see if they work as they are supposed century American railroads faced attacks and
to and if they are safe. sabotage of tracks and telegraph lines by Native
1896: The National Fire Protection Americans, buffalo stampedes, wrecks, and
Administration development of standards labor difficulties. The labor problems included
for fire protection. These standards are used both shortages of workers and strikes. While
throughout the industry and are the basis for the railroads had their own police forces and
many municipal fire codes. contracted with the Pinkerton Agency, they also
1948: The National Burglar and Fire Alarm relied on an external control force—the Union
Association (NBFAA) was formed. NBFAA Army. The Army had nearly 5,000 soldiers
offers membership, publications, seminars, patrolling along and around the tracks in 1868
and professional certification programs for (Matthews, 1990). Human resource manage-
alarm installers. ment problems (recruitment of quality person-
1965: National Board of Fire Underwriters nel), safety issues, and external threats faced
was merged with the American Insurance by the railroads, parallel the challenges facing

I. FOUNDATIONS
22 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY

contemporary asset protection managers. Today’s protection due to their vast wealth, as do cur-
manager is concerned with personnel recruitment rent celebrities such as rock stars, film stars, and
(hiring) and retention (keeping workers), OSHA corporate executives.
compliance, and external threats such as terrorist With the availability of retail store out-
attacks. lets and self-service shopping, shoplifting has
Air transport is vulnerable to theft, safety become a major issue. It is a low-tech crime
problems, terrorists, and “air rage” by emotion- that can be carried out by juveniles, drug
ally disturbed passengers. In 1969, numerous addicts, and so on. With the high value of some
airplane hijackings occurred, and in 1974, the store merchandise, sophisticated professional
Anti-Hijacking and Air Transportation Security thieves, and even terrorist groups engage in
Act was passed, establishing security programs retail theft. Organized Retail Theft (ORT) incor-
at airports. “Air rage” and the September 11 porates theft, repackaging, and distribution of
hijackings as well as the shoe bomb possessed the stolen product. It is a sophisticated opera-
by Richard Reid are more current issues. tion involving various entities and warehouses
Shipping on the high seas has historically to store the merchandise.
presented problems with piracy and labor/ Contemporary loss problems include the
human resource management (HRM) issues. counterfeiting of name brand items. Cigarettes
Contemporary cruise ships face issues such as are also a prime black market item because of
drunken, assaultive passengers and lawsuits their cost due to tax increases. Criminal enter-
due to cases of sexual harassment and rapes. prises that respond to these black markets are
The threat of terrorism is also very real, be it becoming more sophisticated. The theft of infor-
through the commandeering of a cruise ship, mation concerning the development of new
the smuggling of weapons of mass destruc- toys and drugs are major issues. “Competitive
tion aboard freighters, or attacks on ports such intelligence” and counterintelligence are key
as detonating an explosive-laden ship within asset protection functions today. Internet crimes
a harbor. Piracy—the robbery or hijacking of ranging from harassing e-mails to viruses,
ships—continues to be a problem in some areas. diversion of funds, denial of service attacks,
Telephone communication and Internet com- and espionage are also problems. The theft of
merce are the new fronts for security issues phone service and credit (identity theft or credit
relating to commerce. Disinformation (the delib- card theft) is also a major problem. Identity
erate dissemination of false information such as theft/fraud creates large amounts of indirect
“urban legends”), theft of communications ser- loss to the victim as investigating and clean-
vices, and so on are major concerns. ing up the problem takes enormous amounts
of time. Employers of identity theft victims are
also affected by a loss of productivity as the vic-
ECONOMIC AND MARKETING tim must take time to straighten out the finan-
TRENDS AND ASSET PROTECTION cial mess.
Criminal targets change as rapidly as eco-
The desirability of an asset has an effect on nomics and markets dictate. Understanding
the probability of its being stolen. A funda- markets is crucial to comprehending and
mental component of protection is to assign a subsequently planning protective measures.
monetary value to something. Historically, the Marketing is the “flip side” of security in more
“robber barons” of the late nineteenth century ways than one.
needed protection of their railroads, coal mines, Generally speaking, criminals outpace the
and steel mills. They also needed personal efforts of police and security professionals.

I. FOUNDATIONS
DEMOGRAPHICS 23
Historically, they have been able to create loss The Molly Maguires were an underground
by being one step ahead of protective measures. organization predominantly comprised of Irish
miners, who perpetrated assaults and homi-
cides against those they didn’t like. They also
DEMOGRAPHICS engaged in acts of sabotage against the rail-
roads. They were thugs in the eyes of Allan
Demographics play a major role in asset pro- Pinkerton, labor union activists according to
tection. Demographic theories of crime causation revisionist historians in the 1970s, and, per-
focus on the changing composition of the popu- haps, to a degree, terrorists. The “Mollies”
lation. Urbanization theories of crime causation were investigated by a Pinkerton operative in
focus on the changing of a society from rural to a three-year undercover operation. Many of the
urban, and cultural-difference theories focus on Molly Maguires were hanged in the mid-1870s.
cultural conflict within a society (Ortmeier, 1999). The Molly Maguires took their name from Irish
Population shifts in London during the activists/criminals who dressed as women and
Industrial Revolution brought in large numbers fought the landlords in Ireland (a class strug-
of shop workers who had previously worked in gle). See The Molly Maguires with Sean Connery
farming. There were cultural conflicts, drunken- and Richard Harris for a 1969—and perhaps
ness, overpopulation, and rampant crime. Riots “revisionist”—perspective on this.
were common and police action needed to be The Molly Maguires case was important
concerted and organized (along military lines). as it was probably the first use of a task force
American cities, such as New York during the (Pinkerton men teamed with Coal and Iron
1850s, experienced similar crime and social Police) as well as the first major undercover
problems. investigation.
Immigration has caused increases in crime Invariably there are criminals among immi-
due to cultural conflicts—for example, the rapid grant groups who exploit their fellow country-
expansion of Irish immigration in America dur- men. In most cases, organized crime activity
ing the period 1845 to 1852 in response to the dissipates after the immigrant group becomes
Potato Famine of 1847. Coleman (1969) cites assimilated into the dominant culture. Common
census statistics from 1870 as stating that there examples of this are slave trading, prostitution,
were 8,641 Irish immigrants to the United States gambling, narcotics, and smuggling. Extortion
in 1845, 29,540 in 1847, and 157,548 in 1852. As via protection rackets as well as criminal group
the coal mines provided, on their face, lucrative infiltration of organized labor also occurs. See
offers of employment, numerous Irish immi- the movies Goodfellas and Once Upon a Time in
grants became employed as coal miners. Irish America for some perspective on organized
miners who felt exploited struck back at the crime infiltration.
mine bosses and railroad owners through orga- Current immigrant criminal enterprises are
nized criminal activities. from Russian organized crime groups, South

PRACTICAL EXERCISE
List an ethnic group that is largely employed in a certain industry. Do their employers exploit that
group? How? What types of actions could they take to exact revenge on their employers?

I. FOUNDATIONS
24 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY

Korean groups, and so on. With the breakup numerous other types. Note that not all terror-
of the Soviet Union, many of these immigrant ist activity is politically inspired. In the United
groups have turned to criminal enterprises. States many are the acts of mentally ill individ-
A new wrinkle is that some organized crime uals. Whatever the motivation behind it, each
today is transnational and crosses international terrorist threat requires both a proactive and a
borders. The more traditional organized crime reactive response to it.
groups have stayed within their own ethnic Terrorism can perhaps be understood by
group and preyed upon the members. looking at a few significant events.
Population density, culture, age, gender, 1848—Communist Manifesto was written
and other factors also play heavily in terms of by Karl Marx and Friedrich Engels. This
safety issues. Elder care requires certain aspects established the political theory of Marxism—
of asset protection. Government requirements often called “Communism.” The bourgeoisie
for long-term care facilities and patients suffer- (ruling class of capitalists) exploit the
ing from Alzheimer’s create daily challenges. proletariat (laborers). The proletariat should
Emergency planning for a population that is not rise up and overthrow the bourgeoisie and
ambulatory and has failing hearing and sight is establish a utopian society, a “dictatorship
also an issue. In school security, managers must of the proletariat” where everyone shares
focus on drug dealing, evacuation plans, active equally. Propaganda was used to educate the
shooters, parking, and crowd management at masses and inspire them to revolt. Marxism
special events. Hotel security must be concerned was born in 1848 and left-wing terrorist
with a transitory population. Issues include dis- groups throughout the world followed it.
orderly guests, dishonest employees, sexual 1886—The Haymarket Riot in Chicago
assault, and fire and guest services. Each popu- was instigated by anarchists during a rally
lation has unique safety and security needs. against McCormick Harvester. A bomb was
thrown and seven policemen were killed,
with another 60 injured. Six workers were
CLASS STRUGGLES AND also killed as police and workers exchanged
TERRORISM gunfire. Anarchists believed in the abolition
of governments. This movement utilized
A recurrent theme concerning the history of terror tactics such as assassination (William
security and that of policing is the presence of McKinley and six other heads of state) and
class struggles. Class struggles were apparent bombings. They were very active in France,
during the French Revolution and later with Russia, Italy, Spain, Germany, and the United
the development of terrorism as a significant States during the later nineteenth and early
security/law enforcement problem. It also twentieth centuries. There are still anarchists
relates, to some degree, to the problems encoun- in contemporary American society, but their
tered with the organized labor movement in violent activities have subsided greatly since
America. The following discussion on terrorism the 1880s to the 1920s. After the Haymarket
relates to left-wing and right-wing terrorism Affair, local industrialists donated land to
that is politically and economically inspired. the federal government so that troops could
Left-wing terrorists are usually anti-government be stationed nearby. Fort Sheridan was built
and have socialist leanings. Right-wing ter- for this purpose.
rorists are anti-government and highly con- 1969—There were numerous hijackings of
servative. These are two basic classifications airliners to Cuba by dissident individuals.
of political extremism. There are, however, There were also bombings of federal

I. FOUNDATIONS
CLASS STRUGGLES AND TERRORISM 25
buildings. In the Munich Massacre, Israeli government that raised their taxes and took
athletes at the Olympics were killed by away their gun ownership rights. Minority
Palestinian terrorists. The Munich Massacre groups were seen as taking their jobs. In
showed the world that terrorism was indeed urban areas, the Skinheads formed. American
a problem. It brought terrorism to the living Skinheads are based on a working-class move-
rooms of the world via television. ment in the United Kingdom during the early
1972—Patty Hearst and the Symbionese 1970s. The British Skinheads wore Doc Martens
Liberation Army (SLA)—a left-wing boots and close-cropped hair, and they targeted
antigovernment group. The granddaughter minority group members and immigrants for
of newspaper magnate William Randolph taking their jobs. The right-wing groups gain
Hearst was kidnapped by the SLA and later followers during economically depressed times.
joined them. She was “underground” for They are also inspired by government control
20 months, traveling across the country. over gun ownership and increased taxes.
The Patty Hearst case showed that fugitives In the 1990s and into the early twenty-first
could remain underground for extensive century, terrorism perpetrated by right-wing
periods of time in the United States. See the extremists was largely overshadowed by the
film The Patty Hearst Story for an excellent activities of radical Islamic fundamentalists.
treatment of how left-wing radicals operated A series of terrorist events within the late
in the United States during the early 1970s. 1990s and early twenty-first century include the
1973—Nyack Incident—several left-wing following:
terrorist groups thought to be long dormant
collaborated on a “fundraiser” (armored car
● The 1993 World Trade Center bombing by
robbery) in Nyack, New York. This showed Islamic fundamentalists who planted an
that groups thought to be long dormant were explosives-laden vehicle in the parking
still active. Note that the Vietnam War created garage and detonated it.
intense antigovernment feelings in the United
● The 1995 Oklahoma City Bombing by right-
States. After the U.S. involvement in Vietnam wing terrorists who used a massive truck
ended in 1973, much of the left-wing sentiment bomb to demolish the Alfred P. Murrah
faded. The Nyack Incident showed that there Federal Building.
were still some virulent left-wing terrorist
● The September 11, 2001, World Trade
groups operating. That is an important Center and Pentagon attacks by Islamic
lesson: that groups no longer “on the radar” fundamentalists associated with al-Qaeda.
can reemerge. Note that occasionally 1970s The attackers hijacked four airliners and
terrorists are still being caught. The Nyack crashed two of them into the World Trade
Incident also showed that left-wing groups Center and one into the Pentagon. One
were working in concert with one another. airliner was crashed in a field near Somerset,
This is a major concern with terrorism as “the Pennsylvania, after passengers overpowered
enemy of my enemy is my friend.” Alliances the hijackers. This alerted the United States
can easily and quickly form between groups. that it had a serious problem with some of the
more radical followers of Islam.
In the 1980s and 1990s, right-wing terror-
ism became more of an issue than left-wing, In Madrid on March 11, 2004, 192 peo-
Marxist-inspired terrorist activity. Economically ple were killed and 1,841 wounded when 10
disenfranchised males in rural America often bombs exploded on four commuter trains. The
believed that they were being subjugated eco- bombs exploded within minutes of each other.
nomically by Jewish bankers and a federal Seven of the key suspects, including the alleged

I. FOUNDATIONS
26 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY

master mind, died in the explosion. A police- The 9/11 attacks in America, the 3/11 attacks
man was also killed. Twenty-one people were in Madrid, and the attack in Mumbai all illus-
arrested in connection with the attacks, most of trate the workings of organized, dedicated ter-
them Moroccan (http://news.bbc.co.uk/2/shared/ rorists. To better understand the forces driving
spl/hi/guides/457000/457031/html/. Retrieved radical Islamic fundamentalists, consider the
October 11, 2009). The choice of multiple targets following:
in a simultaneous coordinated attack is a key
feature of an operation by al-Qaeda. The attack Old vs. New—there is a “clash of cultures”
appears to have been designed to inflict the maxi- between traditional ideals and new, Western
mum number of civilian casualties. This is also values. There is also a power shift away from
consistent with previous al-Qaeda operations religious leaders who formerly had much
(http://news.bbc.co.uk/2/hi/europe/3582501 more control over their followers.
.stm. Retrieved October 11, 2009). Class struggles—large numbers of
In Mumbai, India, on November 28, 2008, 151 unemployed or underemployed persons
people were killed by terrorists using automatic living in poverty.
weapons and hand grenades. The 60 terrorists Demographics—undereducated or
were in nine different groups with some attacking miseducated Middle Eastern or Muslim
train stations and others taking hostages in a hotel young men who have been taught that the
(http://www.boston.com/bigpicture/2008/11/ United States is “The Great Satan.” These
mumbai_under_attack.html. Retrieved October impressionable young men can become an
11, 2009). Islamic fundamentalists based in army of destruction if the right conditions
Pakistan were behind the attack. are met.

PRACTICAL EXERCISE
Develop a list of specific threat actions posed by terrorists, such as bombings, assassinations, cyber
attacks, kidnapping, and so on. Next, list a proactive countermeasure to be used before the attack is
launched. Finally, list a reactive countermeasure to be employed as the attack is taking place or after
the attack has occurred.

Terrorist Threat Action Proactive Reactive

I. FOUNDATIONS
LABOR RELATIONS 27
Culture of warfare—some areas of the of earlier labor issues. One must understand
world have experienced warfare for an the historical context of “labor relations” in
extended period of time. This warfare may American society to fully appreciate the devel-
be low, medium, or high intensity. In most opment of both labor unions and control forces.
cases it is low-intensity guerrilla warfare or “Labor relations” during “the mean years”
insurgency. In some cases, entire generations of 1866–1937 (Calder, 1985) consisted of some
of people have been immersed in wars. tactics employed by management that would
Afghanistan, Palestine, and Bosnia are be unacceptable by contemporary society.
examples of this. These included the intimidation of labor lead-
Religion—a perversion of Islam that ers, spies, and “agent provocateurs” (persons
emphasizes traditional values and who instigate illegal activity and then work to
demonizes the West has occurred. Religion have the participants arrested for violating the
is a powerful influence on people. law) in unions; assaults with machine guns;
People who are living in poverty or feel the importation of strike breakers (workers who
discriminated against may turn to religion replace those who are on strike); the subversion
as an answer to their problems. Religion of attempts by workers to organize by the pro-
also gives legitimacy to the exhortations motion of interethnic conflict; and the use of
of leaders. If a leader advocates deviant thugs to intimidate workers.
behavior—violence—it may be acceptable to Note: See Matewan with James Earl Jones,
his impressionable followers. Chris Cooper, and Mary MacDonald for an
Charismatic leaders—all dynamic groups excellent treatment of this topic based on the
have charismatic leaders. Extremist groups 1920 Matewan Massacre. The Matewan Massacre
thrive on them. A charismatic leader can was a gun battle waged between striking min-
exploit—as did Adolf Hitler—cultural, ers and the Baldwin-Felts Detective Agency in
social, and economic forces in a negative Matewan, West Virginia.
way. Charismatic leaders can create large These are some of the key events in the
numbers of youthful terrorists. struggle of organized labor within the United
States.

LABOR RELATIONS 1866—National Labor Union was formed


in Baltimore—a national union was now in
Labor relations have played a very large role place rather than the previous groups.
in the history of both policing and security in These were local or trade-specific small
America. It is also important for understand- groups with little power. A national union
ing the development of society as a whole. could mobilize large numbers of workers.
Organized labor brought together people of dif- These workers could organize massive
ferent ethnic groups. It established numerous strikes and shut down factories, mines, and
changes in the workplace, such as benefit plans railroads.
for employees and the establishment of disci- 1892—Homestead Strike—a labor dispute
plinary procedures based on the concept of due between the Carnegie Steel Company and
process. the Amalgamated Association of Iron and
While union membership is declining at Steel workers resulted in a lockout. Henry
present, many of the contemporary approaches Clay Frick, Carnegie’s general manager,
to labor relations, physical security, contingency tried to get the workers to accept a wage
planning, and personnel security are a result cut. He then locked the workers out of

I. FOUNDATIONS
28 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY

the plant so that they could not work. The Philadelphia City Cavalry after the Great
workers assumed that Frick would do this Anthracite Strike in 1903–1904.
and reopen the plant using strikebreakers 1933—National Industrial Recovery Act
(employees who replace striking workers). insured collective bargaining rights. Wagner
Three hundred Pinkerton detectives came Act (National Labor Relations Act) created
by barge up the Monongahela River and the National Labor Relations Board in 1935,
tried to secure the plant. A battle ensued giving a real enforcement function to the
which lasted all day. The workers used a National Industrial Recovery Act.
small cannon to try and sink the barges 1937—Battle of the Overpass. During a strike
and set them on fire by pouring oil into the against the Ford Motor Company, labor
river and lighting it. The Pinkertons were leader Walter Reuther and a companion were
defeated and had to surrender (Fossum, severely beaten by Ford Service security
1982). Nine strikers and seven Pinkertons officers while not doing anything illegal. This
were killed (Gage, 2009). The militia were beating was not unusual except that it was
called in by the governor. Interestingly photographed by newspaper reporters. The
enough, Frick was later shot by an anarchist American public was not sympathetic toward
who attacked him in his home. unions as they were regarded as “communist”
1894—Pullman Strike—the Pullman or “anarchist.” With the Battle of the
Palace Car Company laid off half of their Overpass, however, the public was outraged
employees and forced the rest to take a at the actions of Dearborn, Michigan, police
40% wage cut. Workers were required to and Bennett’s Ford Service men—the end of
live in company housing. After the wage “the mean years” of labor relations.
reductions, there was no reduction in the 1947—In 1946, there were a large number of
rent for the housing. The local strike became strikes; organized labor reached its zenith in
a sympathy strike as American Railway this period. Congress passed the Taft-Hartley
Union (ARU) members refused to handle Act. One of the provisions of the Act is that
trains with Pullman cars. Trains were the U.S. president, through the attorney
stopped and Pullman cars were uncoupled. general, can obtain an injunction against
The rail owners assembled trains so that a strike or lockout if a substantial area is
if Pullman cars were uncoupled, mail cars affected or national security is
would also be cut off. Interfering with the threatened.
mail was a federal offense. Eugene Debs, the
ARU leader was sent to jail for conspiring Today, there are specialized contract secu-
to obstruct the mail. President Grover rity firms that have strike security forces. These
Cleveland called out the Army so that the firms supply consulting and guard service to
mail could be delivered and the strike was companies having labor difficulties. They gen-
broken (Fossum, 1982). erally employ persons with a military back-
1900—Latimer Massacre—large numbers ground and provide their personnel with
of Serbian miners were killed by sheriffs’ training in labor law, crowd management, and
deputies during a strike in Latimer, so on. These specialized firms are able to man-
Pennsylvania. The United States offered an age volatile labor disputes with minimal harm
official apology to the government of Serbia to persons or property. Additionally, the collec-
after this incident. tive bargaining rights of workers are upheld.
1905—Pennsylvania State Police—first Strikes are handled in a much more professional
modern state police force. Formed from the manner than in the past.

I. FOUNDATIONS
LAW 29

PRACTICAL EXERCISE
It is 1920. The Great War is over and you are a military veteran with service in World War I. You
are out of work and have several children to feed. The best employment prospect is with a private
security firm that is doing strike security work. How do you feel about this?

LAW heavily to asset protection. Protection profes-


sionals must be well versed in legal concepts.
The first codification of law in Western civi- In many cases, security managers, safety direc-
lization is generally attributed to Hammurabi tors, and consultants develop policies and pro-
who served as king of Babylon from 1792 B.C. cedures based on legal obligations. Protection
to 1750 B.C. The Code of Hammurabi specified managers are also occasionally asked to give
offenses and punishments for each. While the upper management advice on general legal
popular view is that the Code consisted of “an issues (specific legal concerns should only be
eye for an eye,” this may not be completely true. addressed by an attorney after careful research
There were differing punishments based on the of similar cases). Protection officers and inves-
social class standing of the victim and offender. tigators must also make legal determinations
More important, much of the Code deals with during the course of their duties. Protection
what we would refer to today as “civil law.” officers must be “legal consultants” well versed
There is discussion of the granting of receipts, in legal standards relating to privacy, property
husbandry, town planning, commerce, divorce, rights, and governmental mandates.
regulations for certain occupations, and slavery Laws are authored in response to social
(Bottero, 1973). changes, which apply political pressure. Areas
Another major legal development occurred of the law relating to asset protection/security
in 1215 with the Magna Carta (“Great Charter”) include the following:
in England. The document specified the respon-
sibilities of the state were to its subjects regard- 1. Criminal law with offenses such as
ing individual rights, privileges, and security. trespassing, various types of thefts (retail
The Magna Carta established the concept of theft, theft of trade secrets, and so on),
due process. This means that everyone should vandalism, assault, burglary, robbery,
be treated fairly and according to uniform rape, and so on. Criminal offenses that an
procedures. It is the basis for most law and environment is most likely to encounter
disciplinary procedures. Due process was incor- vary with that environment. Schools have
porated into the Fifth Amendment of the U.S. different legal challenges than shopping
Constitution: “no person shall be deprived of centers; manufacturing facilities face their
life, liberty or property without due process of own unique legal issues, as do hotels.
law.” Perhaps most important, the Magna Carta Protection officers should become familiar
implied that the king was not above the law. with the criminal laws that are most
Law can be divided into statutory law— commonly violated in the environment
established by legislative statute, case law— they are assigned to protect. Note: See www
established by a court decision, and common .looseleaflaw.com or www.gouldlaw.com for
law—passed down through tradition. All relate state criminal codes in the United States.

I. FOUNDATIONS
30 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY

2. Civil law relates to legal standards, which evidence and can’t be sold). The processes
govern the conduct between individuals. for forfeiture and civil recovery are not
Civil law relates to contracts that include the encumbered by constitutional protections
following. to the accused (as in criminal law) and the
a) Contract security service burden of proof is a preponderance (majority
b) Private investigative service such as 55%) of the evidence. In a criminal
c) Armored car service case, proof beyond a reasonable doubt (99%
d) Personal protection/executive protection certainty) is required. Civil laws are being
service used increasingly to combat criminal activity.
e) Alarm monitoring Civil law also covers torts or private
f) Alarm response wrongs committed against another, such
g) Employment contracts for management as defamation, invasion of privacy, assault,
and labor battery, and so on. Torts may be thought of
h) Nondisclosure pacts—agreements not to as the civil equivalent of crimes. It must be
disclose proprietary information, such as borne in mind, however, that the definitions
trade secrets are different.
i) Noncompetitive agreements or pacts— Negligence is a failure to exercise reasonable
agreements not to seek employment and due care (such as not following a
with competing firms within a specific recognized standard) by doing something
time frame and/or geographic area after dangerous or not doing something, which
termination of employment is necessary for safety. In order to prove
j) Leases between landlords and tenants— negligence, the plaintiff (party bringing
these can be individuals who rent the action or suit) may have to show the
apartments or businesses, such as in following:
shopping centers ● The existence of a duty
Civil law also involves asset forfeiture and ● A failure to perform that duty
civil demand or civil recovery. The former ● Injury or harm occurring to a party to whom
is a civil process used by law enforcement
the duty was owed
officials to obtain property used to commit ● The harm was reasonably foreseeable
crimes. Once a drug dealer or fence has ● The harm was caused by the failure of the
been arrested, their home, car, and any
defendant to perform the duty (Hertig,
other asset they have that has been used
Fennelly, & Tyska, 1998)
in the commission of the offense is taken.
This is a civil process before any criminal 3. Administrative or regulatory law is
conviction has occurred. Civil recovery is established to regulate technical aspects
used by merchants to obtain monetary fees of society. Administrative or regulatory
from shoplifters. Shoplifters are sent a civil agencies are created by the federal or
demand letter stating that if they do not pay state legislature. These agencies have the
a certain fee they will be sued. As a civil suit authority to create rules and regulations.
will ruin someone’s credit, many people They investigate and enforce compliance
simply pay the money, which is collected by with those regulations. They also adjudicate
a third party. This is much more effective for violations and mete out punishments. These
merchants, as they do not have to proceed agencies are very powerful. Complying with
with criminal prosecution, tying up time their regulations is extremely important; so,
and merchandise (this must be kept as too, is complying with them and remaining

I. FOUNDATIONS
HISTORY OF SECURITY SERVICES 31
in business. Federal administrative agencies National Labor Relations Board, and so
in the United States include the following: on) that regulate the employer-employee
a) Occupational Safety and Health relationship. Labor law also consists of
Administration contracts between employees and employers
b) National Labor Relations Board and privacy issues.
c) Environmental Protection Agency
d) Federal Aviation Administration
e) Nuclear Regulatory Commission HISTORY OF SECURITY SERVICES
f) Federal Communications Commission
g) Equal Employment Opportunity Security services or contract security agen-
Commission cies have played a large role in both public and
Agencies also exist on the state level, private protection. Outsourcing or contracting
such as CALOSHA or the Pennsylvania for security makes economic sense. Flat hourly
Department of Labor and Industry, Human rates are charged and clients do not have to
Relations Commission, Alcoholic Beverage worry about benefit costs and associated human
Commissions, Private Detective and Protective resource management issues. The client can
Agent Licensing Board, and so on. There hire as many personnel as desired for as long as
are also city or municipal boards of health, desired. This provides for flexibility in protection.
building inspection, zoning, and so on. These Additionally, contract service firms may have
regulate food handling in public kitchens, specialized expertise that the client does not.
fire escapes and fire detection equipment, the There are career opportunities here for
number of parking spaces required, setback those who are adept at sales, client relations,
rules from property lines, building permits, and HRM. Security services are growing and
and so on. For information on state security will continue to do so. In addition to standard
licensing, see the International Association of “guard service” there are alarm response, alarm
Security and Investigative Regulators (http:// monitoring, armored car, personal protection
www.iasir.org). specialists (PPS), and private investigation.
The 1990 Campus Security and Student There will always be a need to understand the
Right to Know Act passed in the United dynamics of the outsourcing process for both
States requires colleges to report all crimes contractors and clients.
committed on their campuses. They While contract security firms usually offer
must also publish crime statistics. The private investigative services, most firms spe-
Act is enforced by the U.S. Department cialize in one or the other. Early security service
of Education, which can levy monetary firms began by offering investigative services
penalties for noncompliance. Another and later transitioned into contract security. This
important regulatory law is the Bank happened because there were greater markets—
Protection Act of 1968. This law established and profits—in providing security service. In
security standards to be used in banks that some cases, this continues to occur, although
are insured by the Federal Deposit Insurance the growth in demand for private investigation
Corporation (FDIC). Portions of the Act are is robust enough to allow companies to be prof-
enforced by different federal agencies. itable while keeping investigation as their sole
4. Labor or employment law consists of service. Pinkerton, a Scottish immigrant, became
statutory laws, court decisions, and involved in investigation by accident. While
administrative agency regulations (Equal searching for wood to make barrels, the young
Employment Opportunity Commission, cooper discovered a gang of counterfeiters.

I. FOUNDATIONS
32 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY

Pinkerton established the largest protective and monitors home alarm systems and has
investigative agency in the world with branch become a household name in the United
offices in many countries. By the mid-1990s, States.
Pinkerton had 250 offices worldwide with over 1909—William J. Burns—Burns was
50,000 employees (Mackay, 1996). Pinkerton had the original head of the “Bureau of
extensive centralized records and a code of eth- Investigation,” which later became the
ics, used undercover investigation, employed Federal Bureau of Investigation under
the first female detective (Kate Warne—60 years J. Edgar Hoover in 1932. William J. Burns
before the first female police officer), and used founded the William J. Burns Detective
wanted posters. Pinkerton is credited with Agency in 1909. He was virulently
being the first to start a security service; in actu- antianarchist and anticommunist, believing
ality there were other services started before that unions were being controlled by
him, but none has become as well known as subversives and that unions were fronts
his was. for anarchists and communists. Burns
was known for his ability to use evidence
1858—Edwin Holmes started the first collection at the scene of a crime to capture
“central office” (central station) for alarm suspects. In 1910, he apprehended the
monitoring and response. Today we use McNamara brothers, who were president
the term “central alarm station” or “central and secretary of the United Iron Worker’s
station.” Many central stations are contract, Union, for a bombing of the Los Angeles
off-premises facilities that monitor intrusion, Times building. He traced them from parts
fire and process (temperature or pressure of the unexploded bomb. The McNamaras
gauges), or duress (emergency medical or were supposedly avowed anarchists. In the
robbery) alarms. Customers pay for the 1970s and 1980s, Burns International Security
monitoring services. Holmes Protection Services, Inc. became one of the largest
provides monitoring and alarm response contract security firms in the world. It has
services. since been acquired by Securitas.
1874—American District Telegraph (ADT) 1954—George Wackenhut founded the
was founded. ADT became the largest alarm Wackenhut Corporation (wackenhut
company in the world. Their main product .com—see the job info on the Custom
was magnetic contact switches Protection Officer program). The firm
(the little gray boxes above doors and provided security services in over 55
windows in restaurants and stores). Today different countries backed by a staff of 70,000
they provide a wide variety of electronic employees. It also provided staffing for
security equipment. They also provide prisons on a contract basis. Wackenhut was
CCTV, access control systems, and fire acquired by the Danish firm Group4falck
protection systems. ADT bought Holmes in 2002. The parent firm is now known as
Protection in the late 1990s. ADT is now “G4S” and Wackenhut is “G4S Wackenhut.”
a unit of Tyco Fire and Security Services G4S Wackenhut provides access control
(Purpura, 2002). and perimeter security to the U.S. army in
1891—Brinks Armored became the largest various overseas locations (http://www.g4s
armored car company in the world. Founded .com/uk/uk-working_for_g4s/uk-join_us/
by Washington Perry Brinks, the firm trans- uk-vacancy-kosovo.htmTail. Retrieved
ports cash and other valuables. Brinks also October 10, 2009).

I. FOUNDATIONS
THE PATH TO PROFESSIONALISM 33

THE PATH TO PROFESSIONALISM setting up mandated training and licensing


requirements.
There have been some significant develop- 1977—Certified Protection Professional
ments along the path toward professionalism (CPP) Program established by ASIS. First
for the Security Industry: envisioned during the 1950s, the CPP
program acknowledged that managers must
1955—The American Society for Industrial be competent in a variety of generic subjects
Security (ASIS) was formed in Washington, such as physical security, personnel security,
DC. ASIS consisted of security directors for legal aspects, management, investigations,
Department of Defense contractor firms. and so on. There have been thousands of
Over the passage of time, ASIS International persons designated as Certified Protection
has grown to over 37,000 members in over Professionals around the world. The CPP
200 chapters worldwide (http://www program has become an important credential
.asisonline.org/about/history/index.xml. for management level personnel. The
Retrieved October 11, 2009). Members have process takes approximately 10 years to
a diverse range of positions within private complete. Recertification is required through
industry, law enforcement, government and continuing education and contributions to
security service, and supply firms. ASIS has the industry every 3 years.
numerous councils on such topics as health 1985—The Private Security and Police in
care, retail, campus, banking, economic America: The Hallcrest Report was published.
crime, commercial real estate, gaming and This report was written by Hallcrest Systems
wagering protection, and so on. under funding from the Department of
1971—the Rand Report on Private Police in Justice. The report studied the contributions
America—this was a private research study of police and security to control crime as
by the Rand Corporation. It was important well as the relationship between the public
as the security industry had not been and private sector. The report also found that
studied. The Rand Report found that the the average security officer was younger and
security industry was large, growing, and better educated than the “aging white male”
unregulated. The average security officer in the Rand Report of 1971.
was an aging white male with a limited 1988—International Foundation for Protection
education who was usually untrained and Officers (IFPO)—formed to upgrade the
who worked many hours to make ends meet. professional status of public and private
The Rand Report was useful as a reference protection officers. The IFPO has membership,
point for the Report of the Task Force on Private publications, an Article Archives on their Web
Security in 1975. site, and several professional certification
1975—The Report of the Task Force on programs. Over 35,000 people worldwide
Private Security conducted by the National have become Certified Protection Officers.
Advisory Committee on Criminal Justice There is also a Certified Security Supervision
Standards and Goals was published in 1976. and Management (CSSM) designation. Over
The committee found a lack of training, 3,500 people have attained this designation.
regulation, and job descriptions within the In 2001, the Foundation launched the
security industry. The report advocated Certified Protection Officer Instructor
minimum training standards; these have (CPOI) designation for those individuals
been used as guides by some states in who may instruct the CPO Program in a

I. FOUNDATIONS
34 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY

traditional classroom environment. Certified in asset protection. Every organization employs


Protection Officer Instructors must be CPOs some types of protective measures. Many—if
with instructional qualifications. They must not most—have security personnel. A sampling
also have security industry and teaching of positions available and functions that per-
experience. In addition, they must have sons holding those positions perform is out-
professional memberships in organizations lined here. Note that information on careers in
such as IFPO, ASIS, the American Society for law, public safety, and security can be obtained
Training & Development, or the International by visiting http://www.careerclusters.org.
Association of Law Enforcement Educators Fixed posts: Many protection officers work at
and Trainers. fixed posts. These may include baggage screen-
1988—The Association of Certified Fraud ing at airports, vehicle gates at manufacturing
Examiners (ACFE) was started. Today, the facilities, emergency rooms in hospitals, access
ACFE has a membership in excess of 45,000 control points at concerts, in museums, or in
members, representing more than the lobbies of high-rise buildings. Generally,
50 countries (http://www.pacfe.org/home fixed post duties are more rudimentary and
.asp. Retrieved October 11, 2009). Certified are assigned to new officers. Once the officers
Fraud Examiners are employed by a host of master the post assignment, they may be given
public and private entities including District duties at other posts. Often, fixed post functions
Attorney’s offices, federal investigative are contracted out to security service firms, as
agencies, state police, corporate security it is cheaper to do so. Additionally, the contract
departments, private investigative firms, agencies can supply the required number of
and accounting firms. Fraud is a concern in personnel when manpower requirements fluc-
virtually all environments. CFEs must have tuate, such as at special events, emergencies,
experience in fraud investigation and pass an or when facilities close for the evening. College
exam on Criminology and Ethics, Fraudulent students, retirees, homemakers, or active duty
Financial Transactions, Fraud Investigation, military personnel may begin their careers per-
and Legal Elements of Fraud. Note that there forming fixed post duties. A key point in career
are also student memberships available in development is to master the fixed post duties.
the ACFE. Persons who have not done that will probably
not get additional duties assigned to them.
The 2008 Compensation Guide for Anti-Fraud
There are generally extensive opportunities for
Professionals found that CFEs earn nearly 22%
promotion available to those who are willing to
more than their noncertified colleagues (http://
work hard, grow, and develop professionally.
www.acfe.com/about/cfe-designation.asp .
Patrol officer: A patrol officer must be able
Retrieved on October 11, 2009). This is similar
to observe and report discrepancies in the pro-
to other professional certification programs.
tected environment. They must collect intel-
Studies continually find higher earnings for cer-
ligence on changes, unusual situations, or
tified individuals.
suspicious persons (intelligence agent role).
Patrol officers must be adept at interacting with
the public in the environment be that visitors,
CONTEMPORARY CAREERS IN employees, students, patients, or guests (man-
ASSET PROTECTION agement representative role). Patrol officers
must effectively maintain compliance with orga-
There are numerous career fields open to peo- nizational policies (enforcement agent role). In
ple seeking a challenging and rewarding career doing so, they must know the rules of the facility

I. FOUNDATIONS
CONTEMPORARY CAREERS IN ASSET PROTECTION 35
as well as legal issues relating to privacy, search protection, such as those that detect vibration
and seizure, property rights, and the rights of on a chain link fence or beam-type systems,
employees (legal consultant role). Patrol officers such as microwave placed along a perimeter
must also be able to respond to problems that line), or area protection (volumetric intrusion
may occur, such as slippery walkways, blocked detection for an area such as passive infrared
emergency exits, hazardous materials spills, or PIR or ultrasonic).
fires, fights, or crimes in progress. Obviously, 2. Fire alarms that may be ionization detectors
patrol officers need a variety of skill sets. They (responding to the products of combustion
must be competent in many things. in the earliest phase of a fire).
Retail loss prevention agent: Positions that 3. Emergency, panic, or duress alarms, which
are available with many large firms. These jobs are activated by someone in distress.
offer persons the ability to learn valuable investi- 4. Process alarms that monitor equipment or
gative skills, such as surveillance and interroga- utilities (temperature, water pressure, air
tion. They are readily available and often accept pressure, power).
part-time employees. There are extensive oppor-
tunities for advancement within retail security! What began as a security office is now a cen-
Central alarm station operator/dispatcher: tral alarm station/dispatch center. Obviously,
Security officers in many environments will act facility managers must plan for the eventual
as dispatchers or central alarm station opera- expansion of their security offices. Serious
tors. They will monitor alarm panels, CCTV thought must be given to alarm response. If
screens, and electronic access control systems. alarms notify property managers of problems,
As technology expands, so does the job of the there must be a rapid, effective response to
central alarm station operator. These central resolving those problems. This is a key issue
alarm stations may be either proprietary or con- in protection that has traditionally been over-
tract. In a proprietary “in-house” setting, central looked. Contract alarm response or patrol car
alarm stations evolve over time. Many facilities service is one option: what Edwin Holmes
develop central alarm stations in an incremen- started in 1858 needs to be integrated into a
tal manner. They often start with a security contemporary asset protection system. Persons
office that has a desk, a telephone, and a radio. beginning careers in asset protection should
After a while, the organization will add addi- seek to understand the central alarm/dispatch
tional monitoring systems. First, there is a cam- operation. It is “the brain” of the security
era observing the lobby. Next, there is a camera operation, serving as a command, control, and
on the parking area. Then there may be intru- communications center.
sion detection systems in sensitive areas which Auditor/investigator: Auditors check on
annunciate (terminate) at the central office. Fire things such as financial records (financial
alarm panels may also be located there. Finally, audits) or procedures (procedural or opera-
an electronic access control system is added tional audits) to see if conditions are what they
which has a monitor in the central office. are supposed to be. Audits seek to uncover
There are access control systems and alarm deviations from procedure, errors, or criminal
systems. The reader must bear in mind today behavior (Purpura, 2002). A deviation from a
we have various types of alarms. procedure might be documenting something
that the writer did not verify occurred—taking
1. Intrusion alarms, which are point protection a “shortcut.” Audits may also uncover errors
(on a specific point, such as door or such as mistakes made in pricing merchandise
window), perimeter protection (fence or forgetting to record required information.

I. FOUNDATIONS
36 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY

Criminal behavior may include falsifying graduate students. Winning papers are eligible
employee attendance records or removing raw for cash prizes.
materials from the workplace. Audits may start The International Foundation for Protection
investigations or investigations may launch Officers also features links to colleges on their
audits to see the scope of the problem. Audits Web site (http://www.ifpo.org). The foundation
may detect loss stemming from waste, error, has also provided scholarships to faculty who
crime or unethical/unprofessional practices. In teach security courses.
that sense they support the WAECUP Model of Networking is crucial to career success in
Loss Control. security or investigation, as not all good jobs
Private investigators: They work for com- are advertised publicly. Almost all are obtained
panies, individuals, or governments on a fee through personal contacts. There is an old
basis. They contract out to perform various saying:
types of investigative activity. Criminal inves- “If you don’t know nobody, nobody knows you.”
tigation done by private investigators includes This saying makes up for in accuracy what
undercover investigation of workplace theft, it lacks in English. Professional contacts can
sabotage, or drug abuse. Surveillance of sus- be gained through organizational member-
pected employees may also be conducted. Some ship, such as ASIS International, IFPO, or the
private investigators are forensic accountants, International Foundation for Cultural Property
trained to investigate fraudulent accounting Protection (http://www.ifcpp.org). Professional
and present a case in court. Fraud examination organizations usually have job placement ser-
is a large and growing concern of all types of vices and membership directories. They provide
organizations, not just insurance carriers. Visit members with the opportunity to meet oth-
the Association of Certified Fraud Examiners at ers in their field and discuss matters of mutual
http://www.acfe.com for more information on concern. Attendance at seminars sponsored
fraud examination. by professional organizations is another way
Specialized security functions such as K-9 to network. Management-level personnel can
handlers, crowd management specialists who participate in the International Association of
work concerts in arenas, strike security person- Healthcare Security & Safety (http://www.iahss
nel, and information technology (IT) specialists .org) or the International Association of Campus
also exist. These persons are specialists with Law Enforcement Administrators (http://www
unique skill sets. They have prior experience, .iaclea.org).
training, and education that qualify them for Professional development can be obtained
their positions. They have “paid their dues” through a variety of sources. Professional orga-
and evolved in their careers. nizations offer seminars and online programs.
Educational opportunities are available both Some offer certification programs such as the
online and in traditional college programs. International Foundation for Cultural Property
Persons wishing to move up the ranks of man- (http://www.ifcpp.org) that offers both the
agement will need higher education. The Web Certified Institutional Protection Specialist
site asisonline.org has information on careers (CIPS) and Certified Institutional Protection
and academic programs. There is an extensive Manager (CIPM) designations.
listing of colleges that offer academic course-
work in security. In addition, ASIS offers full- “Learning never ceases.”
time college students membership at greatly This chapter discussed the past and present.
reduced rates. There is also a Student Paper The future belongs to those who reach out
Competition for both undergraduate and and grasp it.

I. FOUNDATIONS
EMERGING TRENDS 37

EMERGING TRENDS
Security service firms are moving into new Threats to commerce/supply chain security
markets. Providing security at special events are necessitating more attention. Guarding drug
is one example. While contract security at con- shipments against hijacking or covert diversion
certs or sporting events has been going on for is an example. As fears of pandemics grow, as
a long time, now companies are hiring special- does the abuse of prescription drugs, pharma-
ized service firms for other types of events. The ceuticals have become targets for theft.
company Christmas party or picnic may be Piracy on the high seas is rampant. This is of
examples. Securing abandoned buildings is a concern, as approximately 90% of the world’s
new line of business where contract firms have cargo travels by sea. Consulting, kidnap and
partnered with exterminators to offer a complete ransom negotiation, and armed security officers
package of care for a vacant property. Recovering are services that can be offered to the shipping
assets in the wake of floods and other disasters is industry. Just as the Pinkerton National Detective
another new line. This goes with disaster recov- Agency provided protection for railroads in the
ery services where firms will take care of food, nineteenth century, so, too, will contract firms
clothing, lodging, and toilets after a disaster. offer services relating to goods in commerce.
Protection of government buildings and Supply chain security efforts are not only
transportation of inmates are other expanding contracted out; more and more organizations
lines of business for contract firms. The federal are taking steps to ensure the protection of their
government in the United States is probably the supply chains internally. And theft is only one
largest employer of contract security services. source of loss for an organization. Any disrup-
There are also more security services for tion of a supply chain, be it due to strikes, civil
governments and armed forces in hostile areas. unrest, terrorism, or natural disasters, costs an
These services include personal protection and organization money. An increasing number of
facility security. The clients may be govern- organizations will have personnel on board who
ment or military organizations. They may also will work on supply chain security. These indi-
be private companies. In war-torn areas of the viduals will perform risk assessments, monitor
world, such as Iraq and Afghanistan, contract various aspects of the supply chain, and investi-
security personnel provide personal protection gate problems as they occur.
for VIPs. They are also providing fixed site secu- Along with this is an increased emphasis
rity in unstable areas where there is exploration on international crime and loss problems. The
and development of natural resources. Oil, gas, International Foundation for Protection Officers
and minerals all require processing and they all has designated persons as Certified Protection
require protection. These resources are some- Officers in over 50 different countries. ASIS
times highly valuable (such as precious metals) International continues to expand with local
and can be stolen by criminal or terrorist gangs. chapters being formed in new areas of the
They may also be targets of insurgents and ter- world. There are more international security
rorists who wish to disrupt the flow of oil or gas. conferences with attendees from private compa-
As energy demands increase so, too, does the nies, nonprofit organizations, and governments
need to find new sources of fuel. Many of these attending.
sources are in remote areas where insurrection, Identity theft/fraud will continue to grow.
terrorism, or banditry can be a problem. New schemes and means of acquiring personal

I. FOUNDATIONS
38 2. THE EVOLUTION OF ASSET PROTECTION AND SECURITY

and financial data will evolve. As a result the require liaison between police and corporate
convergence of physical and IT security will security departments in banks and credit card
increase. A greater use of biometric access sys- companies as well as state and federal agen-
tems for entry into databases is occurring. So, cies. Identity theft/fraud is multijurisdictional.
too, are educational initiatives designed to pre- Perhaps a historical cycle is repeating itself; out-
vent the problems in the first place. Security laws in the American West committed crimes in
departments in all organizations will play a various jurisdictions, making it difficult to appre-
greater role in educating the workforce about hend them. Filling the void were the Pinkertons
various types of hazards. and other private investigative agencies. Later on,
Investigative efforts in the wake of identity governmental investigative agencies were formed
theft/fraud are also growing. These investigations to combat the problem.

References Peak, K. J. (1997). Policing in America: Methods, issues, chal-


lenges. Upper Saddle River, NJ: Prentice-Hall.
Bottero, J. (1973). The first law code. In S. G. F. Brandon Purpura, P. P. (2002). Security and loss prevention: An introduc-
(Ed.), Milestones of history: Ancient empires. New York, tion. Stoneham, MA: Butterworth-Heinemann.
NY: Newsweek Books. Velke, J. A. (2004). The true story of the Baldwin-Felts detective
Calder, J. D. (1985). Industrial guards in the nineteenth and agency. USA: John Velke.
twentieth centuries: The mean years. Journal of Security
Administration, 8(2).
Coleman, J. W. (1969). The Molly Maguire riots: Industrial con- Resources
flict in the Pennsylvania coal region. New York, NY: Arno
& The New York Times. The History Channel website has an array of information
Constable, G. (Ed.), (1990). The old west. New York, NY: regarding history. http://www.history.com/.
Time-Life Books. For career information. http://www.careerclusters.com/.
Cote, A., & Bugbee, P. (1988). Principles of fire protection. See the Career Cluster on Law, Public Safety, Corrections
Quincy, MA: National Fire Protection Association. and Security.
Fossum, J. (1982). Labor relations: Development, structure, pro- The International Foundation for Protection Officers also
cess. Dallas, TX: Business Publications, Inc. has career information on their Web site at http://www
Gage, B. (2009). The day Wall Street exploded: A story of .ifpo.org/. The Foundation offers a variety of instruc-
America in its first age of terror. New York, NY: Oxford tional courses, memberships, and other resources for
University Press. protective services professionals.
Hertig, C. A., Fennelly, L. J., & Tyska, L. A. (1998). Civil Additional career information for the retail sector can be
liability for security personnel. Naples, FL: International obtained by visiting http://www.lpjobs.com/.
Foundation for Protection Officers. For information on security service firms visit http://www
Kuykendall, J. (1986). The municipal police detective: An .g4s.com/ or http://www.securitas.com/en/. The National
historical analysis. Criminology, 24(1), 175–201. Association of Security Companies (http://www.nasco
Maggio, E. J. (2009). Private security in the 21st century: .org/) consists of a dozen or so of the largest contract
Concepts and applications. Sudbury, MA: Jones & Bartlett. security firms in the United States and Canada.
Mackay, J. (1996). Allan Pinkerton: The first private eye. New Training courses online can be obtained through AST
York, NY: John Wiley & Sons. Corporation (astcorp.com). Specialized topics can be
Matthews, L. J. (1990). Pioneers and trailblazers: Adventures of studied so that new assignments or jobs can be prepared
the old west. New York, NY: Derrydale. for. These courses can be used to target individual career
National Advisory Committee on Criminal Justice interests and earn recertification credits for Certified
Standards and Goals. (1976). Report of the task force on Protection Officer designates. Other courses are avail-
private security. Washington, DC. able through ASIS International (asisonline.org).
Ortmeier, P. J. (1999). Public safety and security administration. For more information on fire protection, visit the National
Woburn, Ma: Butterworth-Heinemann. Fire Protection Association at nfpa.org.

I. FOUNDATIONS
SECURITY QUIZ 39

S EC U RI T Y QU IZ b. This allowed the first labor union to be


1. Which of these is a type of control force used formed
in Ancient Rome? c. The U.S. president, via the attorney
a. Roman chariots general, can obtain an injunction against
b. Praetorian guards a strike or lockout if a substantial area is
c. Varangian guards affected or national security is threatened
d. Nubian mercenaries d. This act forced labor unions to temporarily
2. In what year and country did the Peshtigo disband until clearer regulations for labor
Fire occur? unions could be put into place
a. 1655, England 6. Intrusion alarms are point protection only.
b. 1655, America a. True
c. 1871, England b. False
d. 1871, America 7. Which of these are lessons that have been
3. Railroad police were, and still are, a learned by studying the history of security?
privately employed police force with full law a. The need for a chain of command
enforcement authority. b. An increase in professionalism
a. True c. The need for professional training
b. False d. Both B and C
4. Which of these are reasons that are driving 8. Allan Pinkerton was known for which of the
radical Islamic fundamentalism? following unique innovations?
a. Undereducated or miseducated young a. Arming officers with handguns
men who have learned that the United b. Extensive centralized records
States is “The Great Satan” c. A training camp for his employees
b. A large number of unemployed or d. The idea of making prisoners post bail
underemployed people living in poverty 9. The central alarm/dispatch operation is “the
c. Charismatic leaders brain” of a security operation, serving as
d. All of the above the command, control, and communications
5. What is the importance of the Taft-Hartley center.
Act? a. True
a. This act ensured collective bargaining rights b. False

I. FOUNDATIONS
This page intentionally left blank
C H A P T E R

3
Role of the Professional
Protection Officer
M. A. Kevin Palacios and Christopher A. Hertig

CHAPTER OBJECTIVES DEFINITION OF A PROTECTION


OFFICER
● Provide definition of a protection officer
● Explain levels of protection staff A professional protection officer is a person
● Look at the major roles of protection whose primary job function is the protection of
officers people and assets. The protection officer is dedi-
cated to protecting organizations, individuals, or
● Discuss the core functions of the various publics (customers, visitors, patients, the
protection officer general public, etc.). Protection officers work to
● Explore prevention, mitigation, and give everyone peace of mind. The officers focus
response functions on safety and security so that others may concen-
trate on their own primary concerns. Although
employees need to focus on their work, they
must also be concerned about safety hazards or
INTRODUCTION the actions of criminals. Students in a school are
there to learn. Visitors are to conduct whatever
Life is all about taking risks, and so is business. business they have in a facility (distribution cen-
If businesses were to decide not to take any risks, ter, library, park, etc.). Customers in a retail store
chances are that they would end up losing more are to have an enjoyable shopping experience. At
than what they wanted to protect in the first place. the same time each of these groups must have a
Speculative risks allow us to grow and—if in a healthy concern for their own safety and security.
profit-making organization—gain wealth. Inherent The professional career path of a protection
risks where there is no potential for gain (loss officer (PO) might take him through the opera-
events) must be managed. As we move forward in tional level (basic protection officer), supervisory
life (and business), the risks we have to take grow level (Certified Protection Officer), and strategic
bigger and bigger. Every organization needs peo- level (management). The change in level and job
ple to address those inevitable issues … risks. title represents the addition of responsibilities,

41
42 3. ROLE OF THE PROFESSIONAL PROTECTION OFFICER

but the core of the job description remains the few off-duty police. Sometimes persons in the
same. A person who chooses a career path in military are assigned to security work temporar-
safety or security will never stop being a pro- ily within the armed forces. In other cases they
tection officer. They will never cease to protect work for a civilian employer as a security officer
people, information, assets, reputation, and the or retail loss prevention agent.
environment surrounding an organization. The key is that the person’s major focus is on pro-
The protection officer may be acting as the tection of others, tangible assets such as property, or
agent or representative of the landlord. They intangible assets such as information or reputation.
may not have any arrest authority beyond that Legal authority or job title is not the determinant of
of a regular citizen. In other cases they may what a “protection officer” is.
have some type of police commission with spe-
cific arrest authority: they may arrest for certain
offenses and/or within a specific area. They may
LEVELS OF PROTECTION STAFF
be members of a law enforcement organization
A general framework for the design of security
whose job assignment is protecting a public fig-
functions within an organization is as follows:
ure, coordinating crime prevention activities,
or guarding government buildings. Protection 1. Nonprotection employees. They need basic
officers may be civilian or military, sworn or information about self-protection and some
unsworn. Job titles vary considerably; a protec- method to report hazards and threats.
tion officer may be referred to in different ways. 2. Basic Level Protection Officer. Includes
While the more common titles are “security offi- everyone from the protection team who must
cer,” “security guard,” or “retail loss prevention follow simple orders, look after activities
agent,” some protection officers may have the carried out by nonprotection employees, and
title of “police officer,” “campus police officer,” work in a low- to mid-threat environment.
“special officer,” “crime prevention coordina- Basic level officers don’t need any previous
tor,” “loss prevention officer,” “deputy sheriff,” experience and might (or might not) need
“military policeman,” and so on. (In many states operational—basic level—specialized skills.
these titles are controlled by state law. The state This person needs a basic training, enough to
statutes should be reviewed in each state to cover foreseeable situations he or she might
determine the words you may or may not use.) encounter. Completion of state or provincial
This protection officer could have full-time, training, Officer Basic Training, Basic
part-time, or occasional employment. Part-time Protection Officer programs through AST
security work is very common in some areas. Corporation, Basic Security Officer Training
Many security service firms are largely staffed Series through the Professional Security
by part-time personnel. Amusement parks that Officer Training Network, 360 Training
are open during the summer may employ a large programs, and so on.
seasonal staff during the busy season. The secu-
Examples include uniformed guards, door-
rity department may be managed by a small core
men, patrol guards, and so on.
of permanent persons. It is not unusual for police
officers to work occasional security details. This 3. Intermediate Level Protection Officer. The
may be while they are on official police duty or Intermediate Level officer is related to the
it may be while off-duty for a private employer. CPO; it includes everyone who must follow
Security service firms that provide protection more complex orders, look after processes
during special events may use a combination of carried out by protection and non-protection
regular staff, part-time probation officers, and a employees, works in a mid- to high-threat

I. FOUNDATION
MAJOR ROLES OF PROTECTION OFFICERS 43
environment, and needs previous experience Management representative—the officer acts
and specialized skills. This person needs as an agent, a representative of management to
a complete understanding of the various employees, visitors, and others. This is where the
unexpected situations he might encounter. officer is concerned with representing the phi-
Therefore, training has to be very complete. losophies of management (employer or client). In
This is why they should complete both order to do this effectively, they must thoroughly
the Certified Protection Officer, (CPO) understand the mission statement of the organi-
certification and employer training. zation. They need to know what the policies are
Examples include group leaders, personal and the underlying philosophy behind them.
protection specialists, retail loss prevention The major emphasis in the management repre-
officers, radio operators, central alarm sentative role is on positive relations with the vari-
station monitors, contract security in high- ous publics with which security departments deal
threat zones, and so on. (employees, customers, visitors, patients, ven-
4. Advanced Level Supervisory and Managerial dors, local law enforcement officers, etc.). A solid
Protection Officers. This level correlates background in public and customer relations is a
with the educational and experience level necessity. So, too, is diplomacy when dealing with
of individuals who have been designated other departments, external agencies, and so on.
Certified in Security Supervision and Another aspect of this role is educational.
Management (CSSM). It includes everyone Security officers may be very active in educating
who must give orders and make decisions employees, visitors, students, guests, patients,
regarding personnel. This person must have and so on about safe practices. As the officers
an understanding of how the full entity grow professionally, they may become increas-
(organization) works, people management, ingly involved in educational efforts. As the
leadership, and motivation. This is a line security industry becomes more complex, requir-
supervision or entry-level management ing the protection of more intangible assets, this
position. This individual must have met all educational role will become more common.
CPO certification requirements in addition Intelligence agent—in this role the officer
to supervisory and management courses. collects information for management. The offi-
Completion of the Foundation’s Security cer must have an understanding of what infor-
Supervision and Management Program is mation is pertinent. They cannot pry into areas
recommended. that are not managerial concerns related to loss.
At the same time, they must be effective at gain-
Examples include shift leaders, security super-
ing critical loss-related information.
visors, asset protection team leaders, and so on.
While application of the Waste, Accident,
Error, Crime, and Unethical Practices (WAECUP)
model is useful, another point to remember is
MAJOR ROLES OF PROTECTION
that large problems start as small ones. Issues
OFFICERS
such as terrorism, crimes, safety hazards, envi-
ronmental hazards, data loss, major embarrass-
There are several major roles that protection
ments, and so on generally begin as unusual or
officers fulfill.
out-of-the-ordinary situations. From there, they
1. Management representative mushroom into serious problems.
2. Intelligence agent An old safety concept is that there is often “a
3. Compliance or enforcement agent leak before a break.” That is, a major problem
4. Legal consultant starts out as a small issue. A crack in a wall or

I. FOUNDATION
44 3. ROLE OF THE PROFESSIONAL PROTECTION OFFICER

floor may mean significant structural damage. or “mental rehearsal.” It is simply a process
It may also indicate extensive erosion of soil where officers construct scenarios and
underneath the building. It is a small crack, but review how they would be handled. These
it may indicate much larger problems. could be crime, terrorism, emergency or
When investigating crime or misconduct, the crisis management concerns, and so on.
principle of expansive significance is important Safety issues may include slip and falls,
to remember. “Minor is major.” Minor criminal structural collapse, persons tripping, or the
issues often turn out to be of major significance onset of medical problems (diabetic shock,
once they are fully investigated. Major crime heat stroke, seizures, heart attacks, etc.).
problems are resolved through combating
minor criminal behavior. The same is true of Playing the “What-If? Game” helps prepare
employee misconduct; it often turns out to be the officer for response to the event as if they have
more extensive than it initially appeared. seen it before. It also aids in uncovering unforeseen
loss events/scenarios. This is part of the ongoing
In short, professional protection officers must risk assessment that protection staff perform on
collect intelligence on changes in the environment,
unusual situations, or suspicious persons.
a daily basis. Note that significant issues should
be documented. Preferably this documentation is
Most, but by no means all, of the intelligence reinforced by personal communication with the
agent’s role is performed while the officer is on appropriate supervisory personnel.
patrol. Officers on patrol should always do the Obviously, proficiency in human and public
following: relations is important to fulfilling the role effec-
1. Look up—see if there are any pipes leaking tively. Most information comes from people.
or water coming from another floor. Check Officers who are approachable learn more about
for items improperly stacked. Look for what is going on in the environment they are pro-
problems with the ceiling or roof. tecting. Officers must be approachable but they
2. Look down—look for problems in footing. cannot use the workplace as their social network.
Look for spills on the floor from soft drinks, They must exhibit interest in people and processes
bottles of liquid detergent, liquid from pipes without getting personally, romantically, or finan-
or storage tanks. Look for ice or snow. Look cially involved. Professional protection officers
for carpet that is not properly fastened engage in short, productive interactions with peo-
down. Look for tripping hazards such as ple. They make every conversation an interview.
items left on the floor. Enforcement or compliance agent—this is
3. Look around—check for equipment and where the officer enforces the rules of the envi-
machinery that are not turned on or off when ronment. He or she gains compliance with the
they are supposed to be. Verify that all trash rules. The officer must know the rules to be
collection points are properly maintained. enforced. He or she must be thoroughly conver-
Trash can become a safety or fire hazard. It sant with them. The officer modifies and man-
may also indicate attempts at theft where an ages human behavior so that the rules established
employee discards something for later retrieval. by management are followed.
It may also indicate things being thrown out Sometimes the term “enforcement agent” is too
that should not be. Trash collection points may strong, too law enforcement-oriented to work in
relate to any or all parts of the WAECUP model. a security setting such as a hotel, resort, or office
4. Whether on patrol or on post, officers should complex. Protection officers must be acutely aware
always play the “What-If? Game.” This is of the cultural expectations of their work environ-
also known as “constructive daydreaming” ment. They must understand the “territory.”

I. FOUNDATION
WHAT IT MEANS TO BE A PROFESSIONAL 45
In some cases they will have to be very direc- first step but understanding how to interpret it
tive; in most they will be more like “compliance and apply it to a specific environment is what is
ambassadors.” Most people simply need to be really needed. Personnel knowledgeable about
reminded about what the rules are. Diplomacy this are in demand. Those who wish to move up
and tact are the most frequently used tools of into leadership roles will jump at every opportu-
professional protection officers. nity to learn about the interpretation and appli-
There are two major aspects to enforcement: cation of regulations, standards, and guidelines.
1. Procedural—the “what” of enforcement.
The officer must know what to enforce.
This includes all rules and procedures. The WHAT IT MEANS TO BE A
officer must know what the rules are and PROFESSIONAL
review them regularly. Job knowledge in this
area is a prerequisite to success. Note that A professional protection officer distin-
in many instances the confidence displayed guishes him- or herself by dedication and com-
by a knowledgeable officer goes a long way mitment. They are not simply performing a
toward convincing people to listen to them. job in order to receive compensation. They are
2. Interpersonal—the “how” of enforcement. instead dedicated to serving their employers,
This entails interpersonal skills and clients, and the community as a whole. Because
communications. Using the proper words, of their commitment, they stand out from oth-
articulating clearly, and speaking at the ers who may share their same job title and pay
proper volume and tone are crucial to grade. They have achieved professional status,
effective communication. The remainder a few aspects of which are discussed below:
of human communication—about two- ● Follows a code of ethics. The International
thirds—is nonverbal. Posture, appearance,
Foundation for Protection Officer’s code
and gestures come into play here.
of ethics is presented in this book. Each
Legal consultant—In this role the officer item in the Code contains a key aspect of
knows the relevant legal standard and applies professionalism.
it. The officer makes legal assessments. These ● Shares a common history with his
assessments relate to a variety of issues: privacy, colleagues. A glimpse of the professional
search and seizure, property rights, and compli- history shared with other protection officers
ance with administrative laws, and so on. is displayed in various chapters throughout
A related compliance concern is making sure this text. A common history creates a bond
that all organizational rules are being enforced. between officers.
These rules often originate from professional ● Supports and works with colleagues. A
standards or guidelines. They may also be in professional protection officer respects and
place due to insurance company requirements. works with others. Officers analyze various
Contemporary protection officers are fac- problems and help each other address
ing increased demands in this area. The role of them. Effecting and maintaining productive
“legal consultant” is becoming more important. relationships with colleagues is very
It is also becoming increasingly complex. important.
Astute security professionals will learn all ● Owns a common body of knowledge. The
that they can about laws, standards, and guide- different chapters of this book cover the
lines. They will keep abreast of them and be varied aspects that a contemporary protection
able to apply them: knowing a regulation is the officer must master in order to succeed in an

I. FOUNDATION
46 3. ROLE OF THE PROFESSIONAL PROTECTION OFFICER

ever-changing world. Professional protection


officers have a foundation of professional
knowledge in topics such as physical security,
investigation, crisis management, safety, and KNOWLEDGE
so on.
● Makes his or her own decisions. Uses
discretionary judgment to solve problems.
Figures out how to address certain situations
and takes the appropriate action. While an SKILLS
entry-level police or security officer must ATTITUDE
abide by their employer or client’s directions,
they do act independently.
● Is loss conscious. Professional protection
officers look for hazards—constantly. Officers
continually ponder the consequences of loss
events (fires, accidents, terrorist attacks,
errors, etc.). They think in terms of the
impact of occurrence. This separates them
Protection Officer as an Agent
from practitioners in other disciplines. Protection officers are the employees or
the agents of property owners and managers.
A professional can’t just be appointed. A pro-
These can be the employer of the officer or the
fessional is a person who has accepted his respon-
client of the officer’s employer in the case of a
sibility and embraces it with pride. Professionals
security service firm. As agents, officers act in
have a positive outlook. Professionals know their
the interest of the owners and managers. They
limits, but are always looking to expand them.
also represent owners and managers of their
They learn and grow from experience, training,
organizations in several different ways. Every
and education. Growth is an ongoing process; it
decision a protection officer makes reflects
never stops.
on the organization he represents. A common
One does not “be” a professional protection officer. example is that patrol officers are often the
One must “become” a professional protection officer. only people on the premises during evenings
and weekends. Some people have referred
In order to accomplish his duties, the protec- to this as the security officer being the “after-
tion officer must also be competent; this means hours Chairman of the Board.”
that the officer must have the proper balance In a managerial position, the protection offi-
of knowledge, skills, and attitude. Continuous cer might have a specific role in part of a secu-
professional development through education, rity process, or a much broader loss control role.
training, and experience is necessary to become The concept of loss control goes way beyond
competent. Education gives one knowledge; physical and logical security. A future trend is
training provides a means of developing skills. to expand loss control functions to coordinate
Experience expands upon and refines those skills enterprise-wide risk management identified as
and helps to develop one’s abilities. Attitude ties the health, safety, security, environment, and
knowledge, skills, and abilities together. quality process (HSSEQ).
A professional protection officer must also The role of the protection officer is to prevent,
demand the authority and tools needed to mitigate, and respond to intentionally created loss
accomplish his responsibilities. event occurrences as well as accidental incidents.

I. FOUNDATION
WHAT IT MEANS TO BE A PROFESSIONAL 47
Of course, while fulfilling ever broader Cycle (Brown & Blackmon, 2001); the protection
duties, the protection officer must always process is no exception:
prioritize his attention to the most critical ● PLAN—Preventative Functions. The cycle
resources to be protected. These are (in order
begins by planning protective measures
of priority):
BEFORE they are performed.
● PEOPLE. Employees, agents, third-party
● DO—Mitigation Functions. All protective
workers, customers, visitors measures performed DURING daily
● INFORMATION. Physical and digital operations.
records, proprietary info, other information
● CHECK—Loss Event. Verification of
to maintain confidentiality, integrity, and protective systems takes place during loss
availability events, but the effectiveness of a system
● ASSETS. Those that the organization could also be verified by a protection officer
owns, manages, maintains, controls, or is during audits and inspections.
responsible for (facilities, goods, assets of
● ACT—Response Functions. AFTER an
monetary value) emergency arises, the officer must respond
● REPUTATION. Hard-earned public image; accordingly, bring all operations back to
everything that contributes to the desired normal, and provide the cycle with the
positioning of the organization necessary feedback.
● ENVIRONMENT. Surrounding the
organization, natural, community,
stakeholders’ interests, social responsibility
P PREVENTATIVE
FUNCTIONS
MITIGATION
FUNCTIONS
D
Core Functions
The protection officer must become a valu-
able member of the organization; his partici-
pation in systems, processes, and activities
must always add value. The value added by a
protection officer ’s performance is measured in A RESPONSE
FUNCTIONS
EMERGENCY
C
the level of improvement that his work brings
into the organization’s protective process and
objectives:

● Vigilance of better practices and recommend Simply stated, in any given organization,
state-of-the-art standards (in addition the core function of the protection officer is to
to the organization’s regulator-specific ensure the continuity of the protective cycle;
requirements) to prevent all possible hazards from becoming
● Improving policies, procedures, job-specific threats, to mitigate threats in order to decrease
instructions (not just following them) the probability and potential consequences of
● Always reporting adequately and keeping its occurrence, but also to respond adequately
adequate records and timely to all types of loss events in order
to regain control of the situation while prevent-
It is widely accepted that every process of an ing future occurrences (beginning of a new-
organization must fulfill a Plan-Do-Check-Act improved cycle).

I. FOUNDATION
48 3. ROLE OF THE PROFESSIONAL PROTECTION OFFICER

PREVENTATIVE FUNCTIONS ● Reinitiate (Start operations with a view to


bringing them to the normal level)
Prevention includes (but is not limited to) all ● Recuperate (Wholly recuperate the operative
actions taken before active protection measures level and vaccinate from that risk)
are performed. These functions are easily remem- Examples of protection cycles performed by
bered with the four Is: the various levels of protection officers are out-
● Investigate (Preventative and reconstructive lined below.
investigations)
● Identify (Hazards and risk factors—assess
risks) BASIC PROTECTION OFFICER
● Induce (Communicate and train)
● Integrate (Countermeasures to treat risk) ● A patrol officer in a shopping center tours
the facility to create an “offender-hostile”
but “customer-friendly” environment.
MITIGATION FUNCTIONS During his tour he must identify hazards
and risk factors (using checklists or his own
During an actual protection task, an adequate judgment). While on patrol he sees some
mix of procedures, equipment, and people reduces liquid spilled on the floor and judges that
probability and consequences of risk. Mitigation this represents a fall risk (PREVENTION).
functions are remembered with the 4 Ds:
● He secures the area according to his training
and procedures, and stays on the spot until
● Dissuade (Potential aggressors) someone competent (i.e., general services)
● Detect (Hazards that are being activated) arrives to fix it (MITIGATION).
● Delay (Separate physically or delay the ● He reports all actions taken and recommends
aggressor from the objective) improvements in procedures to prevent
● Detain (Stop the hazard) future unsafe conditions (RESPONSE).

RESPONSE FUNCTIONS INTERMEDIATE PROTECTION


OFFICER
Ideally, risk has been mitigated before it cre-
ates loss. In cases where this has not happened, ● A security supervisor receives reports that
it is necessary to respond.
indicate some employees are suspiciously
After a loss event occurs, all efforts must
wandering around the company trash
focus not only on bringing the situation back
containers after working hours. The
to normal but to improving the previous situa-
containers are in the back of the building.
tion by vaccinating the organization from that,
The supervisor identifies this as a theft-
or a similar risk. Response functions are easy to
through-garbage risk (PREVENTION).
remember if we use the four Rs: ● Starting immediately, she assigns a guard
● React (Act immediately in accordance with to temporarily patrol that area and gives
established procedures) him specific orders, explaining the nature of
● Resume (Gain control of the situation) the risk and signs of the threat to identify,

I. FOUNDATION
SUMMARY 49
how to act, and when to report. At the same contracts to sell all empty containers of
time, the supervisor organizes a talk to hazardous materials to a recycling plant that
employees given by the local police about could treat them accordingly—this funds
crime awareness and the effects of crime in the whole campaign. The company revises
the organization (MITIGATION). its liability insurance to include this newly
● The supervisor then initiates an internal discovered risk while negotiating a premium
investigation while reporting this risk to reduction based on the calculated associated
management. She recommends changes value of potential loss (RESPONSE).
in procedures (employees will have to
exit the premises through the front door),
equipment (garbage containment area needs
to be fenced in), and people (recommends Around the Globe
changing the patrol procedures to include Financial austerity and competition among
a more thorough check of the trash area) organizations show the importance of loss pre-
(RESPONSE). vention efforts to all sizes of organizations
around the globe. This has also pushed com-
mercial organizations to seek new markets and
ADVANCED PROTECTION resources in different areas of the world. Some
OFFICER organizations with high-risk appetites are ven-
turing into historically inhospitable environ-
ments. Protection officers at these firms are
● It has been reported to the Health, Safety, facing broader language and cultural challenges.
Security, and Environmental Quality Laws and regulations vary greatly in differ-
manager of a petrochemical facility that ent regions of the world. Nevertheless, huge
someone is stealing empty containers from efforts are taking place to standardize proce-
hazardous materials. He identifies this as dures, training, and risk management models
a health and environmental threat, since all over the world.
inhabitants of poor neighborhoods in the
surrounding area might be using them
to store water for washing and cooking
(PREVENTION). SUMMARY
● After assessing the risk, he sets up
an awareness campaign to train the A professional protection officer is dedicated
surrounding neighbors of the threat the to protecting people, information, physical
empty containers pose. The company gives assets, reputation and the environment sur-
away new containers to these people, rounding organizations. As a professional, the
while profiting from a positive Socially officer follows a code of ethics, shares a com-
Responsible Capital Campaign (goodwill mon history with his colleagues, and owns a
from the villagers) (MITIGATE). common body of knowledge.
● As part of the campaign, the firm arranges The titles and designations given to protec-
for doctors from the closest public hospital tion officers may be insufficient when we need
to measure levels of contamination among to express the tasks these dedicated men and
villagers and the nearby river. It also women perform.

I. FOUNDATION
50 3. ROLE OF THE PROFESSIONAL PROTECTION OFFICER

EMERGING TRENDS
Despite the fact that the basic role of all pro- the carrying of weapons. Contemporary protec-
tection officers remains the same, the duties tion officers are more likely to have some type of
performed by protection officers are becoming weaponry than in the past. This may not be fire-
increasingly specialized: health care protection, arms; it is usually pepper spray or some other
retail loss prevention, campus security, school secu- nonlethal weapon.
rity (elementary to secondary grades), shopping There are also heavily armed protection offi-
center security, high-rise building protection, bank- cers in areas of the world where civil strife and
ing security, and so on. These specialties, or verti- warfare prevail. Hence, there is a more military
cal markets, continue to evolve. Some of the major emphasis than ever before. This trend will con-
contract agencies have coursework tailored to par- tinue as energy exploration moves into danger-
ticular sectors: these providers know full well that ous areas and people’s demand for security
they must take every means possible of meeting (employees at these locations) increases.
their clients’ specific needs. The American Society There is also a greater need for effective liai-
for Industrial Security International also has a large son with police, fire, emergency medical, and
number of councils devoted to specialty areas. In military organizations. Regional disasters such as
addition, there are professional associations such massive snow storms, earthquakes, or hurricanes
as the International Association of Campus Law require close cooperation. So, too, does the pro-
Enforcement Administrators, the International vision of security at major public events: there
Foundation for Cultural Property Protection, and are 50 or more different organizations providing
the International Association of Healthcare Security security at the Super Bowl in the United States.
and Safety that cater to specific sectors. The issue of training continues to be a concern.
Convergence between physical and logical While on paper it may appear as though security
security is well advanced, and convergence with personnel are being trained, closer inspection
other risk management functions within the reveals that this is often not the case. Sometimes
organizations (health, environment, safety, and in contract security there is a major disconnect
quality) are quickly gaining momentum; this between the corporate policy on training and
and the increased use of technology have what actually happens in the field. Maggio (2009)
demanded a new breed of highly trained/highly cites a 2005 study in New York City in which it
educated protection officers (especially at the was found that most security personnel reported
supervisory and management levels). having less training than was required. Moreover,
Protection officers are moving into more of the training that was given failed to emphasize
a leadership/ambassadorial role. While many terrorism or working with police or firefighters.
are entry-level employees, they are also coordi- One possible solution to the training dilemma
nators. They design and develop programs in is state or provincial mandates. A state or prov-
safety and security. They are more like profes- ince may require security officers to have a
sionals in that they use discriminating judgment, certain amount of training and to be licensed.
determining their own course of action rather Unfortunately, it takes a long time to get legislation
than being told what to do by superiors. enacted. Once it is in place the training is generally
They continue to utilize additional technol- minimal. Also, the regulations rarely cover all pro-
ogy and this technological prowess is giving tection officers; most state/provincial laws only
them a more professional appearance. So, too, is cover contract security personnel.

I. FOUNDATION
REFERENCES 51

There are some positives to this, however. in selecting a security service provider. Should
In the United Kingdom, the Security Industry this occur, there may be both an increase in costs
Authority is improving regulations for door and a degradation of service.
supervisors and others. There are inspections University degrees and internationally recog-
being done to insure that protection officers in nized professional certifications, such as the ones
clubs are licensed. In California and Ontario, awarded by the International Foundation for
both contract and proprietary security personnel Protection Officers and ASIS International, are in
are regulated. As of this writing, the province of great demand among quality-conscious employ-
Alberta is also moving in that direction. ers all around the globe. This trend will continue
Outsourcing of police services to private con- as society places more emphasis on obtaining
tract firms continues. While public police may credentials.
espouse the principles of community policing, they While degrees and professional certifications
may not be able to practice it. The reality is that are key components of professionalism, so, too,
public police have budgetary concerns and lim- are guidelines and standards. Voluntary guide-
ited resources. There is a movement in some areas lines or compulsory standards developed by pro-
toward having private security personnel perform fessional associations are having a major impact
order maintenance and quality-of-life patrols. A on the practice of protection. At the present time,
security service firm may be better equipped to do standards and guidelines are being developed
this in large shopping centers, parks, or housing on an array of topics such as the Private Security
developments. The public police can then focus Officer Selection and Training Guideline by ASIS
more on investigations, drug enforcement, and the International. This guideline establishes mini-
response to felonious behavior. mum criteria for selecting and training security
This shift also triggers an evolution of the officers. It is of obvious use to employers and
protection officer from being a “private secu- contract agencies. It may also assist regulatory
rity” officer to becoming something of a public bodies in establishing state or provincial licens-
servant. Such a role may create confusion in the ing requirements. (http://www.asisonline.org/
mind of the officer. Only thorough education, guidelines/inprogress_published.htm. Retrieved
training, and highly structured socialization will October 13, 2009). In addition to employers,
prevent role confusion. contractors, and governmental agencies, insur-
Another driver of this trend is the growth of ance carriers can use standards and guidelines.
security service providers. Some of these compa- Policyholders may receive a premium reduction
nies are quite large and operate internationally. for meeting a guideline or standard.
Others are not as large or international but may Obviously, standards and guidelines will
have a major share of a local or regional mar- have a major impact on the practice of protection
ket. Either scenario may lead to monopolization. over time. And the professional protection officer
Once this happens, the client has limited choice is a key factor in compliance.

References
Resources
Brown, S., & Blackmon, K. (2001). Operations management: Training courses online can be obtained through AST
Policy, practice and performance improvement. Woburn, Corporation (http://www.astcorp.com). There are a wide
MA: Butterworth-Heinemann. variety of courses! Specialized topics can be studied to
Maggio, E. J. (2009). Private security in the 21st century: prepare for new assignments or jobs. These courses can
Concepts and applications. Sudbury, MA: Jones & Bartlett. be used to target individual career interests and earn

I. FOUNDATION
52 3. ROLE OF THE PROFESSIONAL PROTECTION OFFICER

recertification credits for Certified Protection Officer


designates. 4. Competency can be demonstrated through
360 Training has a series of online instructional programs for professional certifications, and consists of
security personnel. 360 specializes in continuous learning an adequate balance of three characteristics.
and recertification. Visit http://www.360training.com/.
Which of the following is not one of those?
ASIS International publishes the Protection of Assets
Manual, a comprehensive online reference guide. The a. Attitude
POA is the primary text for the Certified Protection b. Skills
Professional designation. It contains several chapters c. Communication
relating to the role of the protection officer, includ-
d. Knowledge
ing Security Officer Training and Private Policing in
Public Environments. Go to http://www.asisonline.org 5. Every decision that a protection officer
or http://www.protectionofassets.com/PDFSamples/ makes reflects on the organization he or she
POA_TableByVolume_Oct2008.pdf. represents; for instance, patrol officers often
Butterworth-Heinemann is the premier publisher of security times are the only people on the premises
texts. There is a wide array of titles available on physical
(during night and weekends). Which of the
security, investigation, emergency management, and so
on. Visit http://www.elsevierdirect.com/index.jsp. following tasks is most unusual to a basic
protection officer?
a. Collect intelligence on changes, unusual
S E C URI T Y QU IZ situations, or suspicious persons
1. Which of the following best describes a b. Maintain compliance with organizational
protection officer? policies
a. A man or a woman hired to look after an c. Legal consultant role
entrance door d. Interacting with the public in the
b. A man or a woman who concentrates on environment
safety and security while others perform 6. The basic role of the protection officer is to
various tasks prevent, mitigate, and respond to:
c. A man or a woman in charge of welcoming a. Intentionally created risks (security)
visitors and providing them with b. Accidental and unintentional risks (safety,
information health, environment, and quality)
d. A man or a woman hired to dissuade c. Any and all risks in the WAECUP model
potential trespassers d. None of the above
2. The career path of a protection officer might 7. There are five types of critical resources to be
take him through: protected; which of the following is not one of
a. Operational level those?
b. Supervisory level a. Time
c. Management level b. Information
d. All the above c. People
3. The Professional Protection Officer has d. Reputation
some essential characteristics. Which of the 8. The value added by a protection officer ’s
following is not one of them? performance is measured in the level of
a. Follows a code of ethics improvement that his work brings into
b. Shares a common history the organization’s protective process and
c. Masters the use of lethal and non-lethal objectives. Examples of this can include:
weapons a. Vigilance of better practices and
d. Owns a common body of knowledge recommends state of the art standards

I. FOUNDATION
SECURITY QUIZ 53

b. Always reporting adequately and keeping 10. One of the steps taken during response
adequate records functions performed by protection officers
c. Improving policies, procedures, is recovery. Which of the following is an
job-specific instructions example of it?
d. All of the above a. Assets not damaged during a fire are
9. All actions taken before active protection quickly moved into a secure location
measures are performed can be included b. A claim is filed with an insurance
in the preventative functions. Which of the company
following is not one of those actions? c. Video footage from a bank robbery is
a. Preventative investigations given to local police
b. Identification of hazards and risk factors d. All the above
c. Induction training
d. Separate physically or in time the
aggressor from the objective

I. FOUNDATION
This page intentionally left blank
C H A P T E R

4
The Protection Officer as a Leader
Franklin R. Timmons and
Scott A. Watson

his or her power from the ability to inspire


CHAPTER OBJECTIVES others to willingly follow a process or recom-
● Compare and contrast the words mended course of action in support of organiza-
“management” and “leadership” tional goals and objectives. Since leaders are not
● List and explain 10 expectations of leaders necessarily charged and empowered with direct
authority, the “willingly” part of the definition
● Identify and explain three critical is of critical importance. In contrast, a manager
leadership skills or supervisor is charged and empowered with
● List four key interpersonal communication direct authority; however, without solid lead-
skills and explain their importance ership skills, the manager will be ineffective
in meeting organizational goals and objectives
(Hertig, McGough, & Smith, 2008; Johnson,
2005; Sennewald, 1985).
INTRODUCTION

In the course of this chapter, we will discuss


the basic principles, skills, and characteristics of
leadership. To understand leadership, we need Who should study and develop
to establish from the beginning that leaders and leadership skills?
supervisors/managers are not one and the same.
1. Managers and Supervisors: Those entrusted
Our expectation would be that every supervi-
with management and supervisory roles
sor/manager is a leader, but every leader is not
have, by virtue of their acceptance of their
necessarily tasked with direct line supervision.
position, a responsibility to study and
Simply stated, a leader is anyone who influ-
develop leadership skills.
ences the willing actions of others in support of
2. Team Members: Those who wish to take on
organizational goals and processes. Note the word
the added responsibility of influencing their
“influences” in this definition. A leader derives

55
56 4. THE PROTECTION OFFICER AS A LEADER

become a leader, it is wise to answer the follow-


own team, and the greater organization they
ing ten questions about, and for, yourself:
serve, should study and develop leadership
skills.
3. High Potential: Those with high leadership
1. Do you have a sense of mission that is
potential should be encouraged to study the
greater than your own personal interests?
principles of leadership in order to make a
2. Are ethics more important to you than your
career decision about their long-term goals.
career?
3. Do you have a desire to help people solve
both work-related and personal problems?
4. Do you care about people enough to
constructively challenge them when they
It is also important to keep in mind that not
are engaged in activities that are hurtful to
everyone desires to be a leader, and that’s okay.
themselves, others, or the organization?
There are a great many people who are both
5. Do you readily accept responsibility for
content and effective in their roles as a team
your own mistakes?
member. Still, a manager or supervisor should
6. Are you willing to accept responsibility for
never assume that one is content; lines of com-
the mistakes of others who are following
munication need to remain open and the ques-
your lead?
tion needs to be asked (Watson, 2007).
7. Can you see potential in others?
8. Are you willing to develop potential in others?
9. Do you handle setbacks well?
DO YOU REALLY WANT TO 10. Are you patient?
BE A LEADER? 1. Yes: If you can answer “yes” to all of the
above questions, then you should consider
To some people, the idea of being a leader
developing leadership skills.
sounds glamorous because they immediately
2. I’m not sure: If you answered “I’m not
think of exerting influence over a team, being
sure,” then you owe it to the organization
consulted about important decisions, and being
you serve and yourself to study leadership
recognized as indispensible to the organization.
in order to fully answer those questions.
Indeed, leaders experience many of these ben-
3. No: If you answered “no” to most of the
efits, but they come at a high price.
questions, then, at this point in your life, you
The legendary football coach Vince Lombardi
probably wouldn’t be content or effective in
said, “Leaders aren’t born; they are made. And
a leadership role.
they are made just like anything else, through
hard work. And that’s the price we’ll have to
pay to achieve that goal, or any goal.” Coach Lombardi was right; leadership is
The decision to develop leadership skills and hard work!
assume a role of influence within an organiza- As previously stated, leadership isn’t for every-
tion should not be taken lightly. Leadership one and many people do not seek out leader-
involves long-term commitment and hard ship positions. Still, the seasons of a person’s life
work without an immediate payoff. Leadership change and with time, so, too, can one’s desire to
is not about position or privilege and often become a leader. Leaving oneself open to the pos-
involves putting one’s self-interest below that sibility of becoming a leader is a wise choice, as
of the team. Before embarking on the journey to some of the most effective leaders are sometimes

I. FOUNDATIONS
THREE CRITICAL LEADERSHIP SKILLS 57
the most reluctant to assume those roles (Hertig EXPECTATIONS OF LEADERS
et al., 2008; Johnson, 2005; Sennewald, 1985;
Watson, 2007). Now that we understand what it takes to be an
effective employee, let’s examine what additional
TEAM MEMBER SKILLS: THE expectations we have of leaders. Remember, as
FOUNDATION OF LEADERSHIP we previously stated, a leader is any individual
who influences the willing actions of others in sup-
If you make the decision that becoming a port of organizational goals and processes.
leader is a worthwhile goal, the hard work Additional traits that can characterize a leader
begins as a team member. As team members, we in any organization include:
all have certain understood and implied respon- 1. Encourages open communication.
sibilities. Much of what we do is grounded in the 2. Advocates teamwork, to eliminate error
roles and expectations set forth by the organiza- traps, and strengthen firewalls.
tion we serve, but other characteristics include 3. Seeks out and eliminates organizational
the values that we, as team members, possess. weaknesses that foster error traps.
You cannot be an effective leader until you have 4. Reinforces desired work behaviors.
first met the basic tenets of being an effective 5. Knows the importance of preventing error
team member. Some very important attributes of traps.
being an effective team member are: 6. Challenges atmospheres that support
complacency.
7. Works to clarify organizational and
1. Communicate effectively; in fact, over- individual employee issues.
communicate. 8. Champions “across the board” adherence to
2. Be aware of error traps in the workplace or the highest standards.
daily work processes. 9. Ensures all workers fully understand the
3. Ensure that firewalls or protection is in potential consequences of unsafe behavior.
place to address the error traps. 10. Minimizes unfamiliarity among members of
4. Be motivated to improve operations; always the team.
strive for excellence.
Leadership involves the ability to understand
5. Continuously identify ways to improve
the goals of the organization we serve. For the
human performance.
sake of our chapter, let’s refer to everyone out-
6. Advise management when problems exist
side our sphere of influence as our customer. Our
in performing work.
clients, our managers and supervisors, our peers
7. Have a questioning and supportive attitude
and our community, no matter who that may
as well as a willingness to be a proactive
be, are our customers. Once we understand the
problem solver.
goals and objectives of our customers, then we
8. Embrace and practice the STAR concept
can better serve their needs (Hertig et al., 2008;
(Stop, Think, Act, Review).
Johnson, 2005; Sennewald, 1985; Watson, 2007).
9. Strive for success but have a plan for failure.
Continually ask, “What if?”
10. Take the time required to do the job right THREE CRITICAL
the first time. LEADERSHIP SKILLS
(U.S. Department of Energy, 2009) The development of leadership skills is a
lifelong process, so a complete list and detailed

I. FOUNDATIONS
58 4. THE PROTECTION OFFICER AS A LEADER

explanation of all the skill sets required for cognizant, not only of what constitutes violations
effective leadership could fill several librar- of law and organizational policy but also what
ies. What follows is an overview of three broad appears to violate such laws and policies. Only by
categories of practice that all leaders should doing so can the protection officer avoid doing
study and strive to master. wrong, while engendering confidence in those
Practice 1: Ethics. This is the cornerstone of he or she serves (Department of the Army, 2006;
the protection field. The organizations we serve Hertig et al., 2008; Johnson, 2005; Sennewald,
entrust us to protect their most valuable assets. 1985; Watson, 2007).
As a professional protection officer, you are Practice 2: Mission Focus. Organizations
likely to have access to secure areas of the facility exist for a purpose. This purpose is the organi-
in which you work. You are also likely to have zation’s mission or reason for existence. The role
access to confidential information, knowledge of the security department is to provide profes-
of specific security vulnerabilities, and the trust sional protective services that allow the organi-
of individuals within the organization. As a zation to accomplish its mission. The role of the
result of this expanded access, knowledge, and protection officer is to ensure that the security
trust, we in the protection field are held to a department accomplishes its mission to serve
higher standard of behavior than the popula- the organization. Those who wish to be lead-
tion at large. ers in the protection field must be familiar with
the organization’s mission and how the security
department contributes to accomplishing it.

Ethics goes beyond the following


concepts: The Professional Protection Officer’s
1. Following Organizational Rules: It is not quest to be mission oriented should
enough for a protection officer to simply include an understanding of the
refrain from violating organizational rules; following:
everyone is supposed to follow the rules.
Since the professional protection officer is 1. The organization’s mission.
expected to enforce rules, following those 2. Who the organization serves.
same rules is expected as a matter of course. 3. The organization’s values.
2. Complying with Laws: It is not enough for 4. The history of the organization.
the protection officer to simply comply with 5. The organization’s structure.
laws. Laws are, after all, minimal standards 6. The geographic area and economic climate
of behavior expected by the society at large. in which the organization operates.
A protection officer should not only comply 7. The image of the organization.
with legal requirements but also 8. The security department’s role in the
should strive to go above and beyond the organization.
minimal standards provided by law. 9. The security department’s organizational
structure.
10. His or her own role in accomplishing the
mission.
Practically speaking then, ethics both encom-
pass and surpass the minimal standards of law (U.S. Department of the Army, 2006; Watson,
and the basic expectations of the organizations 2007)
we serve. A protection officer should always be

I. FOUNDATIONS
THREE CRITICAL LEADERSHIP SKILLS 59
Practice 3: Interpersonal Communication. communicating nonverbally. No matter how
Organizations consist of groups of people all you or another individual communicates
working together under a common structure for nonverbally, clarification is critical in
a common purpose. An ability to understand checking for understanding. A nonverbal
and relate to people is a key element in effec- message has meaning, just as a verbal
tive leadership because it enables the leader to one does. The content is more difficult to
influence others to accomplish organizational “read,” but it is just as important. Many
and departmental missions. actions are interpreted with specific feelings,
There are four basic communication skills whether or not those feelings were meant
needed of every leader: verbal, nonverbal, lis- to be conveyed by the sender. By asking for
tening, and writing (Figure 4-1). The optimal clarification, misunderstandings can be kept
way to communicate is face-to-face. This allows to a minimum.
both the sender and the receiver of informa- 3. Listening Skills: Listening is often-
tion to engage in real-time verbal and nonver- times the most overlooked aspect of
bal analysis. It also allows for clarification and communication. Although more than half of
immediate feedback. our communicating time is spent listening,
compared to other types of communication,
1. Verbal Communication: Verbal
we spend a small amount of time learning
communication is comprised of the spoken
how to listen effectively or actively. In
word. It is very important because it allows
order to improve your listening skills, listen
us to:
actively, devoting all of your concentration to
a. Express ourselves in words.
the task. In fact, to be a good leader, we must
b. Ask questions and clarify nonverbal
be a good listener. We must understand what
communication actions.
the expectations really are and we must align
c. Provide feedback to the listener.
our roles and responsibilities to meet those
2. Nonverbal Communication: Nonverbal
expectations. Comprehension is the primary
communication is just that; communicating
goal of listening. We need to understand the
with your body or emotions. Some experts
message being sent before we can process
say that we do the vast majority of our
the information, evaluate it, and provide a
response. NOTE: If at any time, during this
process, you get confusing information—ask
for clarification!
4. Writing Skills: Writing is another key
element in communication and a skill
developed over a lifetime. As a professional
Verbal Non-verbal protection officer you may find yourself
writing incident reports, daily logs, email
communications, proposals, training
programs, statements, security survey
Writing Listening
reports, and annual reports along with a host
of other correspondence. There are many
ways to enhance one’s writing capability
but the best teacher is direct experience and
professional feedback from peers, managers,
FIGURE 4-1 Four key areas of interpersonal communication. supervisors, and customers.

I. FOUNDATIONS
60 4. THE PROTECTION OFFICER AS A LEADER

Over time, writing tends to improve, so assessing your strengths, weaknesses, and
don’t be discouraged if this is a weak area motivations, as well as those of others
for you. around you.
4. Continually Assess the Situation: Life
The protection officer who strives to main-
moves quickly and situations can change
tain the highest standards of ethics, constantly
instantly. As a professional protection
remains aligned with departmental and organiza-
officer and a leader, you must prepare for
tional mission, develops solid interpersonal com-
whatever is coming next. This can only
munications skills, and will make steady progress
be accomplished by training yourself to
in developing leadership skills (U.S. Department
develop and maintain situational awareness.
of the Army, 2006; Elgin, 1980; Sennewald, 1985).
5. Remember What Is Truly Important: As
mentioned earlier, ethics is the cornerstone
of the protection field and an organization’s
TEN STEPS TO BECOMING AN mission is its reason for existence. Always
EFFECTIVE LEADER keep in mind that ethics is more important
than a specific job; your career is more
The following 10 steps or precepts are pro-
important than a specific position and the
vided as a guideline for the serious student of
mission is more important than pet projects or
leadership.
short-term gains. Remembering what is truly
1. Be the Leader You Would Want to Follow: important will help you keep perspective.
Remember our definition of leadership: any 6. Take Action: A leader must know when
individual who influences the willing actions to act and when to wait. Failure to act,
of others in support of organizational goals especially in the protection field, can be
and processes. Ask yourself, “What type of very costly.
leader would I be willing to follow?” Once 7. Position Yourself and Your Organization
you answer that question, strive to be that Well: A leader must position him- or
leader! herself to be ready to take advantage of
2. Accept That Conflict Is a Normal and opportunities when they arise. As you move
Healthy Part of Growth: Remember that forward in any situation always be aware of
conflict is inevitable in all areas of human potential opportunities and take the time to
endeavor. While some conflicts can have position yourself and your team so that you
negative effects, the absence of conflict can capitalize on them when they arise.
would mean that everything would always 8. Be Adaptable: It is easy to get hung up on
stay the same and improvement would ideas, but not all ideas are acceptable to the
never occur. When engaged in a conflict, ask organizations we serve, nor are all ideas
yourself, “What progress can be made by workable. Always be ready to adapt your
actively listening to another point of view?” plans to suit the needs of the organization.
3. Know Yourself and Know Others: A leader Doing so will allow you to overcome
has to be completely honest about his or obstacles quickly and be more effective in
her strengths and weaknesses as well as the long run.
the strengths and weaknesses of others. 9. Avoid Predictability: The protection field
Only by doing so can the leader make requires structure and accountability, but
significant progress toward accomplishing it also requires staying one step ahead of
both the departmental and organizational situations and those who would victimize
goals. Train yourself to be constantly the people or organizations we serve.

I. FOUNDATIONS
PITFALLS OF LEADERSHIP 61
10. Collect and Use Information: Information is and managers hired to protect the status quo.
the lifeblood of an organization and affects Change not only drives fear, it also drives the
the functioning of an effective protection fact that more effort is required to complete the
team. As a leader, it is important to collect change. This entire process means moving out-
and properly use information about the side the individuals’ comfort zone. Many peo-
organization, threats, vulnerabilities, and ple believe in the saying “don’t rock the boat.”
a host of other matters. By being mission- An important point to consider is that the boat
focused and honing the interpersonal skills is already rocking. The question is, do we steer
necessary to develop good relationships, the organization (boat) into the wave or do we
the professional protection officer will find allow the organization to be broadsided? A key
more sources of information and, in turn, be element to help any organization better deal
a more effective leader. with the effects of change is TRUST.
Trust can’t be purchased. It is a house that
These 10 steps or precepts, if worked on, will
must be built one brick at a time. It opens the
help the professional protection officer in devel-
door to the path for success. Trust is earned
oping solid leadership skills (Watson, 2007).
through the following simple steps:
● Honesty—Can an employee/customer
THE LEADER AS AN believe what you say?
AGENT OF CHANGE ● Integrity—Can an employee/customer
believe you will keep your promise?
As the last link between senior management ● Openness—Can employees/customers
and line employees or customers, it is the lead-
believe that you will share what you know?
er’s job to assist in the implementation of change.
To do this, certain obstacles must be overcome. (Hertig et al., 2008; Johnson, 2005)
There are several strategies for reducing resis-
tance to change. Much resistance to change
comes from lack of trust or people having to
PITFALLS OF LEADERSHIP
operate outside their comfort zone.
Resistance can sometimes be overcome or the
Oftentimes, people who see themselves as
impact lessened if the following are completed:
leaders think that others will follow them with-
1. Fully explain the upcoming changes. out question. Leaders must understand that
2. Make certain employees or customers fully leading is more about serving, negotiating,
understand the change. motivating, communicating, and actively listen-
3. When possible, discuss why the change is ing than the physical act of leading. Incorrectly
required. assessing a situation and trying to be overly
4. Identify and discuss the possible effects with persuasive or dominant can bring disaster to
employees or customers. a leader, especially one who has just assumed
5. Answer questions, or take the information that role.
and follow-up if you don’t know the answer. Some pitfalls that a leader should recognize
6. Build trust with your employees; they will and consider are as follows:
better accept the change.
1. Leading is more about achieving a shared
7. Be honest and be consistent.
goal, not managing or supervising people.
Change can potentially create fear in the orga- 2. A leader has to always display confidence,
nization and paranoia in the minds of executives trustworthiness, and truth. In other words,

I. FOUNDATIONS
62 4. THE PROTECTION OFFICER AS A LEADER

characteristics that make someone want to August 27, 2009, from http://www.hss.doe.gov/
follow them. nuclearsafety/ns/techstds/standard/hdbk1028/doe-
hdbk-1028-2009_volume2.pdf.
3. Many times, other employees/customers Watson, S. A. (2007). The art of war for security manag-
have the answers or at least some thoughts. ers; ten steps to enhance your organizational effectiveness.
Leaders need to be active listeners. Burlington, MA: Elsevier.
4. Make certain the elements of leadership are
aligned with corporate or customer goals
and desires. Resources
Bolton, R. B. (1979). People skills: How to assert yourself, lis-
(Hertig et al., 2008; Johnson, 2005; Sennewald, ten to others and resolve conflicts. New York, NY: Simon &
1985; Watson, 2007) Schuster.
Elgin, S. H. (1993). The gentle art of written verbal self defense:
How to write your way out of life’s delicate situations. Upper
Saddle River, NJ: Prentice Hall.
CONCLUSION Fujishin, R. (1993). Discovering the leader within; running small
groups successfully. San Francisco, CA: Acadia Books.
A leader is any individual who influences the Sawyer, R. D., & Tzu, S. (1994). The art of war. Boulder, CO:
willing actions of others in support of organizational Westview Press Inc.
goals and processes. While leadership roles can be
rewarding, they come at the high cost of con-
S E CURI TY QU I Z
sistent hard work and dedication, often with-
out a discernible return on investment. Those 1. Leaders and supervisors are not one and
who wish to assume leadership positions in the same. Our expectation is that every
the protection field must be prepared to put the supervisor is a leader but not every leader is
needs of the team above their own. They must necessarily a supervisor.
exercise the highest standards of ethics, remain a. True
mission-focused, and develop the solid interper- b. False
sonal skills necessary to motivate others (Hertig 2. The key for a supervisor to get anyone to do
et al., 2008; Johnson, 2005; Sennewald, 1985). anything is to:
a. Threaten them to do it
b. Get them to want to do it
References c. Bribe them to do it
d. None of the above
Elgin, S. H. (1980). The gentle art of verbal self defense. Upper
Saddle River, NJ: Prentice Hall. 3. Leadership is not about self-interest; it is
Hertig, C. A., McGough, M., & Smith, S. R. (2008). about being other-person-centered. Thus,
Leadership for protection professionals. In S. J. Davies & before embarking on a mission to become a
C. A. Hertig (Eds.), Security supervision and management leader, one should conduct a self-examination
(3rd ed.) (pp. 219–239). Burlington, MA: Elsevier.
in all the following ways, except to:
Johnson, B. R. (2005). Principles of security management.
Upper Saddle River, NJ: Prentice Hall. a. Assure that no one in the group will be
Sennewald, C. A. (1985). Effective security management (2nd able to pass you up and become your boss
ed.). Newton, MA: Butterworth-Heinemann. b. Make ethics more important than your
U.S. Department of the Army. (2006). FM 22 army lead- career
ership competent, confident, and agile. Retrieved
c. Have a deep desire to help others solve
August 27, 2009, from http://greerfoundation.org/
CouncilofPromisingLeaders.html. both work-related and personal problems
U.S. Department of Energy (2009). Human performance d. Find the potential in subordinates and
improvement handbook; Volume 2: Human performance tools push those subordinates to self-actualize
for individuals, work teams and management. Retrieved

I. FOUNDATIONS
SECURITY QUIZ 63

4. An effective team member will display the d. Reader-friendly written material, sending
following attributes: complete, clear, easily understood
a. Continuously identify ways to improve communications
human performance 8. The optimal way to communicate is written.
b. Advise upline management when a. True
problems exist in work performance b. False
c. Be motivated to improve operations and 9. Some experts say we conduct a vast amount
always strive for excellence of our communications nonverbally. No
d. All the above matter how we or others communicate
5. Traits that can characterize a leader in any nonverbally, we must always strive
organization include all the following, except: for clarification if we want to achieve
a. Advocate teamwork in the ranks understanding. Which of the following is
b. Encourage open communications true about nonverbal communications?
c. Support complacency in the ranks a. The content is more difficult to read than
d. None of the above verbal and written communications
6. There are numerous critical leadership skills. b. The message being sent is usually
A leader will display all of the following skill just as important as other forms of
sets, except: communication
a. High ethical beliefs and attitudes c. Asking for clarification will keep the
b. A high ability to communicate well while misunderstanding to a minimum
understanding and relating to all people d. All the above
c. Learning how the mission of the 10. Leaders are often called upon to institute
organization compares to the leader’s change in a department. Change is hard
career goals to accept by many subordinates because
d. Being aware of the organization’s mission of insecurities or lack of trust. Resistance
and being focused on accomplishing that can be overcome by all of the following
mission suggestions, except:
7. There are four communication skills needed a. When possible, discuss why the change is
for every leader. Which of the following is not required
one of them? b. Inform the employees that if they cannot
a. Never missing a chance to shut up accept the change you will help them find
(listening) work elsewhere
b. Top down as a priority communications c. Be honest and consistent
direction d. Answer questions, or take the information
c. Complete and concise face-to-face and follow-up if you don’t know the
communications answer

I. FOUNDATIONS
This page intentionally left blank
C H A P T E R

5
Career Planning for Protection
Professionals
Christopher A. Hertig and Chris Richardson

that are available in security. A great resource to


CHAPTER OBJECTIVES start with is the Career Opportunities in Security
● Review the importance of career planning booklet, published by ASIS International. It can
● Emphasize the significance of education be found at http://www.asisonline.org/career
and training center/careers2005.pdf
Another suggestion is to speak with a profes-
● List relevant resources for education, sional in a particular security field about their
training, career planning, internships, and job responsibilities and duties. A more in-depth
licensing/certification approach would be to job shadow the profes-
● Networking sional for a half or full day. This exposure will
● Job search allow a broad overview of a particular security
● Résumés discipline and give a “front-line” view of the
● Interviews specific career.
● Explore opportunities for career Career centers at colleges and universities
advancement can also be beneficial. They typically have valu-
able resources to assist in career planning and
developing a career path. Many of them have
an extensive network of contacts as well.
It is important to remember several key
IMPORTANCE OF CAREER
points about careers:
PLANNING
1. Career planning is a continual process that
Career planning is essential to becoming a suc- may change course a few times throughout a
cessful security professional. This is a multistep professional’s career.
process that evolves as experience is gained and 2. Careers are like recipes—they consist of
education is obtained. The first step in this pro- various ingredients—all in the proper
cess is exploring the numerous industry segments proportion.

65
66 5. CAREER PLANNING FOR PROTECTION PROFESSIONALS

3. While it is usually easy to see why someone Persons with college degrees tend to obtain
has been successful in a career, it may not higher-paying jobs, yet this is not always easy
be evident why someone did not succeed. to see. The career ladder they follow is not sim-
“Nobody gives you a scorecard when it comes to ple. College graduates may not see the immedi-
a career.” ate benefit of having a degree. It may take them
several years and several jobs for the degree to
really help them advance. After all, there are rel-
EDUCATION atively few “requirements” but many “expecta-
tions,” meaning that while the degree may not
Education is the cornerstone of career place- be required, it is expected.
ment and advancement. There are rare excep- The jobless rate for college graduates is much
tions where advancement to the most senior lower than the rate for non-graduates. This
level has occurred without advanced degrees, holds true in both boom and bust economic
but for the most part, in today’s market, a climates. During good times and bad, degreed
degree is essential. There are over 100 colleges persons have significantly lower rates of unem-
and universities offering degrees or programs ployment. Earnings are also much greater for
in security management and over 1,600 that graduates. Graduating from high school creates
offer criminal justice degrees or programs. a wage jump of about 32%; some college experi-
Furthermore, many of these academic institu- ence without a degree increases wages approxi-
tions offer online programs, enabling access for mately 13%. Graduation from college increases
more “nontraditional” students. salaries around 77% (Leonard, 2009).
Additionally, education enables a broader
view of the industry and the various disciplines.
It helps people to see how their job functions, TRAINING
however exciting or mundane, contribute to a
larger mission. Education helps prepare stu- Training is a structured learning experience
dents to lead others and manage the mission. designed to enable one to perform a specific
Education is an essential career component. task. Employees who are trained can perform
Unfortunately, it is not always easy to deter- tasks more efficiently and more safely. Training
mine exactly where education helps one to aids employers by increasing the effectiveness
advance. Holding a degree or certificate may or of employees. Training also increases the com-
may not aid one in getting a job. Generally, the munication between employees and manage-
degree experience should help prepare one for ment. It helps to give the employees a better
the process of preparing a résumé, researching idea of management’s expectations.
employers, and being interviewed. Employers Training also reduces the fear and frustration
look favorably upon persons that have demon- employees face when confronted with problems
strated the commitment and personal organiza- on the job. Training prepares them for the job
tion necessary to obtain a degree. and thus they feel more confident. As a result,
But in many cases, having a degree does not training generally reduces employee turnover.
automatically open doors. There may be other Employees are more engaged when they have
qualifications that the employer seeks, such as received adequate training.
experience, licensing, or certification. A degreed Professional organizations such as the British
individual may become confused and discour- Security Industry Association, the International
aged when finding that their education does Foundation for Protection Officers, and the
not automatically get them a position. Electronic Security Association (formerly the

I. FOUNDATIONS
EXPERIENCE 67
National Burglar and Fire Alarm Association) be thought through beforehand. The costs and
support training efforts. The International benefits should be weighed. Finding out what
Association of Chiefs of Police (IACP) has been a employers think of the training is important.
staunch advocate of training. The IACP launched Lengthy, extensive training classes must be
various training initiatives such as the Training scrutinized before enrolling in them.
Keys: short instructional memos on specific There is a common mistake made by people
topics. These keys could be easily delivered to completing training at a police academy (which
classes of police officers by a supervisor. Finally, is several months in length and costs thou-
ASIS International launched a “Standard on sands of dollars) which is assuming they are
Security Officer Selection and Training” to ensure guaranteed employment. While this will help
that hiring standards were met and training one to get a police job, it does not guarantee it.
addresses all the areas that it needs to address. Additionally, state Police Officer Standards and
While professionals have supported training Training Commissions generally place a time
both within professional organizations and as limit on completing an academy and finding
individuals, there are many issues involved in employment. A police academy graduate may
providing training. have only 2 years to find a job or be decertified.
Training is expensive for employers to provide. The students must know themselves and the
Aside from the instructional costs, the employer employment market before going into debt.
is paying employees for their time yet not directly Another pitfall, which some young people fall
benefiting from it, as the employees are being victim to, is taking the wrong courses. Some peo-
paid for non-productive time while they are ple take all manner of martial arts and firearms
learning. This situation has helped to propel the training. While this is desirable in moderation,
growth in distance learning. Distance learning job seekers should beware of potential employ-
helps one avoid many of the costs associated with ers branding them as “Martial Arts Masters of
training as well as with scheduling problems. Mayhem” or “gun nuts.” In some employment
Distance learning also helps individuals to learn settings this is the “kiss of death” for job appli-
on their own; some contract security firms and cants. Martial skills should be bundled with
police departments have embraced this concept. other competencies such as first aid, firefighting,
These organizations provide motivated employ- customer service, writing, research, and so on.
ees with the option of professional growth. One solution to obtaining training is through
Anyone serious about pursuing a career volunteer work. Volunteer fire companies and
should seek out training on their own. Doing ambulance services provide training to their
so helps them to learn important skills. It also members. There are also occasions when agen-
makes them more attractive to employers. cies that offer services to crime victims or disaster
Trained individuals may save an employer relief will train volunteers. While the Red Cross
money on training costs. In some areas it is is well known, there may also be local organiza-
becoming increasingly common for people to tions that will offer training to volunteers.
send themselves through a police academy so
that they are more certain of landing a police
job. A person who has completed training on
their own also stands out as someone who is EXPERIENCE
motivated and employers generally wish to hire
only the most motivated of personnel. Experience in a particular field or in a posi-
As completing training costs time and tion is one of the most cited criteria or qualifi-
money, taking an instructional program should cations for employers. A quick search through

I. FOUNDATIONS
68 5. CAREER PLANNING FOR PROTECTION PROFESSIONALS

online job boards or job openings will reveal volunteer experience, something to put on their
that the majority of the positions requires a résumé, and references for future jobs.
“minimum” number of years of experience. If
experience is not required for a particular posi-
tion, there are often other qualifying criteria LICENSING/CERTIFICATION
such as education, certification, or skills listed
as a prerequisite. With some positions a license is required.
Internships are an excellent way for a student This may be at the state, provincial, or county
to gain experience in the security and/or crimi- level. In some cases, there are also cities that
nal justice industry. Employers are much more license security and police personnel.
inclined to hire an intern with no or limited expe- Research into career options must include
rience than a permanent employee with no or licensing requirements. There are almost always
limited experience. The significant differences are licenses required for armed security personnel. It
the internship has defined employment dates, is also common to license those who offer inves-
the intern is more closely supervised, and intern- tigative services on a contractual basis (private
ships are often unpaid. investigation). Some jurisdictions license alarm
Two new Web sites have been recently launched installers, security consultants, personal protec-
to connect employers and students with intern- tion specialists, door supervisors in clubs, and
ships. The Web site www.securityinternships.com locksmiths.
provides a listing of security internships listed by Certification is another valuable addition
employers with both a proprietary and contract to the résumé and skill set of security profes-
security staff. The Web site www.criminaljusticein- sionals. Almost every security discipline and
ternships.com provides a listing of criminal justice security society or organization has their own
internships with local, state, and federal agencies. certification and it is worthwhile to seek out
Both Web sites offer more than just a listing of and obtain the relevant certifications.
internships. They offer résumé templates, schol- There are more recognized certifications than
arship information, career news articles, and a others, but as with educational institutions, it is
listing of other valuable Web sites. important to vet the certifying body to ensure
There are times when career planning the validity of the certification.
involves a transition into another field or dis- To be a well-rounded professional, certifica-
cipline. For example, a security director may tions in areas other than security contribute to
want to transition into audit or compliance. success. For instance, a certification in public
While these two fields are loosely related, the speaking, finance, accounting, or computers
transition may be smoother if it occurs within can provide additional opportunities and salary
the same organization. It is more difficult to increases.
transition into another field or discipline at
another company or organization.
Volunteering is another approach to filling NETWORKING
the experience void in one’s résumé. Volunteer
work can sometimes be performed for non- Networking with security industry experts
profit organizations such as churches or civic can excel the progression of security profession-
organizations. It can also be offered by different als. Networking can begin at any career stage and
departments in one’s employing organization; is advantageous to both young and experienced
an employee may volunteer to perform work security managers and executives. Networking
outside of their department. This gives them can occur during industry conferences, through

I. FOUNDATIONS
CAREER ADVANCEMENT 69
social mediums such as LinkedIn, and through Search and Knock ’em Dead Resumes, both writ-
professional associations. It also occurs through ten by Martin Yate.
job experience, various job assignments, and The objective of the job search and résumé
meeting people through employment. is to provide an opportunity for an interview.
All too often, networking is considered a Arguably the most important process in land-
tool to find employment. Although it is advan- ing a position, the interview is where the final
tageous to network with industry peers and decision to hire the most qualified and best can-
colleagues to search for a security position, didate occurs. Nothing should be overlooked
networking has many other benefits beyond during this process.
finding the next job. It allows one to reach out Preparation for the interview should be thor-
to others for assistance with solving a complex ough and well thought out. It is important to
problem or to benchmark a process or proce- research the employer to ensure the applicant
dure. Networking also enables one to stay up- knows the history of the company and is up-
to-date on industry news and trends. In this to-date on any recent news such as mergers,
respect, networking aids in finding jobs. It also expansion, stock price, awards, and so on. In
helps in succeeding at those jobs. addition to researching the company, the appli-
cant should drive to the interview location the
day before to ensure that directions are accurate
JOB SEARCH and to notate the amount of travel time.
Social networking sites are being used more
Online job searching has surged in the past frequently by employers to screen applicants. It
decade. The Internet allows for an unprece- is imperative for an applicant to scour through
dented number of jobs to be listed by employers any social networking site they are members of
and searched by applicants. There are large com- to ensure any pictures or videos that could be
panies such as monster.com and careerbuilder deemed inappropriate are removed prior to the
.com that list job openings for every career and application process.
discipline available. There are also niche job sites
that focus on specific industries.
Before a job search can be started, a résumé CAREER ADVANCEMENT
must be constructed. A résumé is often the
first exposure an employer has to an applicant. Career progression goes beyond education
Furthermore, the employer or recruiter spends and experience. Security professionals have
less than 30 seconds reviewing a résumé. This attributed their successful climb up the pro-
signifies the importance of an impressive résumé verbial “ladder” to credibility, leadership, and
in getting an interview for a position. interpersonal skills. These qualities and skills
There are two formats for résumés: func- develop over time and require an investment
tional and chronological. A chronological résumé of time and energy devoted to a career path.
focuses on the time format of experience. It There are four approaches to reaching career
typically lists employment and other activities objectives: become a resident expert on a secu-
according to dates, with the most recent listed rity topic, develop a personal brand, culti-
first. A functional résumé doesn’t focus on dates; vate a mentorship, and establish a network of
rather, it focuses on a narrative style of skill sets colleagues.
and experience. Excel at one’s current job tasks. While the
A widely recognized resource for job search- knowledge, skills, and abilities required for
ing and résumé writing is Knock ’em Dead Job a supervisory position differ from those of a

I. FOUNDATIONS
70 5. CAREER PLANNING FOR PROTECTION PROFESSIONALS

subordinate, people who don’t “shine” will not Find a mentor. Mentors are important. They
be promoted. provide guidance and insight. They enable the
Being visible is important. Joining commit- person being mentored to grow on their own
tees and taking on additional projects is one into new levels of competency. They aid the pro-
way to do this. Mach (2009) states that it is tégé in gaining additional areas of competence.
advantageous to work across your organization. Sponsors are another means of helping one
Richardson (2009) states that there are four advance in their career. A sponsor is someone
strategies that can help security professionals who brings along a subordinate when they
advance on the job: becoming an expert in some themselves obtain a promotion. Sponsors may be
area; developing a personal brand; finding a chosen to head up a different division of an orga-
mentor; and networking. nization. Care must be taken in choosing a spon-
Become an expert in an area that is needed. sor. Sometimes sponsors fall out of favor within
A retail loss-prevention officer who masters an organization. A sponsor who is on the wrong
interviewing, a casino security professional side of politics is not a good sponsor to have. In a
who can design camera systems, or a protection similar vein, a sponsor who is not very ethical is
officer at a high security facility who becomes a a liability. Ethics is crucial in this regard.
software expert are all in demand. Becoming a In some cases, promotion within one’s
reliable source of information or expertise gets employment organization is simply not hap-
one noticed. It opens up opportunities to work pening. This may be due to a small number of
on special projects and meet new people. positions being available. It may also be the
Develop a brand. A brand is a unique style. case that the persons holding those positions
One person may project himself as an innovator. are not leaving them. In these situations, one
Another may be a researcher. Still another may either has to be satisfied staying where they are
excel at social relationships and politicking. or seek employment in another organization.

EMERGING TRENDS
Enrollment in colleges and universities is In addition, academia has noticed this trend and
at an all-time high. Employers are streamlin- consequently there are a growing number of col-
ing processes and asking employees to do more leges and universities that offer a degree or pro-
with less. When employers hire, they have gram in Crisis or Emergency Management.
the ability to be more selective and seek out the Job searching and applying for jobs are
most qualified candidate. A reduced workforce increasingly becoming online activities. It must
and an influx of applications for open positions be noted, however, that there is a major role
increase the competitiveness of the candidates. for interpersonal, face-to-face interaction. The
Experience and education are two of the most practices of investigation, asset protection, and
important areas that set candidates apart. so on, are interpersonal endeavors. They can-
Emergency management is closely related to not be completely performed electronically.
security and homeland security. Emergency or Additionally, the job search and acquisition pro-
crisis management has been a career field that cesses require in-person abilities. One will be
has rapidly expanded over the past several years. limited without a personal network. In addition,
There are many career opportunities available with job candidates who don’t do well in interviews
government, private, and nonprofit organizations. will not be hired.

I. FOUNDATIONS
SECURITY QUIZ 71

References recruitment, employment, training and retention sys-


tems.” The Partnership provides career information
Alexander, D. (2009). Achieving diversity: A battle for the sexes. to students and others. Additional information can be
http://www.info4security.com/story.asp?sectioncode accessed at www.careerclusters.org.
10&storycode4121598&c12 Retrieved 02.12.09. Internships in security can be found at www.securityintern
Bixler, S. (1992). Professional presence: The total program for gain- ships.com.
ing that extra edge in business by America’s top corporate image Internships in criminal justice can be found at www
consultant. New York, NY: Perigee. .criminaljusticeinternships.com.
Choi, C. (2009, February 1). Signing up for an online degree?
Know the costs. York Sunday News, 2E.
Cosgrove, S. (2007, January 28). Grades are great—but grads
need skills. York Sunday News. S E CURI TY QU I Z
Ford, W. (1999). The accelerated job search. Walnut Creek, CA:
Management Advantage. 1. Which of the following best describes the
Goulet, T. (2008). How to get credit for your ideas at work. importance of career planning?
 http://msn.careerbuilder.com /  Article/MSN-1692- a. Meet with parents and friends to
Workplace-Issues-What-Gets-You-Through-the-Workday/? determine which career is best
cbsid43d7d1cf28254e729bd0131b1fb8522a-280787170- b. Job shadow a professional currently in the
VI-4 & sc_extcmp  JS_1692_advice & cbRecursionCnt 
2 & SiteId  cbmsn41692 & ArticleID  1692 & gt1  23000
field of one’s potential career
Retrieved 11.23.08. c. Complete a self-evaluation study that can
Hopson, J. L., Hopson, E. H., & Hagen, T. (2009, March 15). be found on the Internet
Speak up to your supervisor. York Sunday News. d. None of the above
Jones, L. (1992). The encyclopedia of career change and work issues. 2. When earning an education what are the
Phoenix, AZ: Orynx.
Leonard, C. (2009, January 25). A degree still pays. York
most important considerations?
Sunday News. a. Determine if the college or university is
Mach, S. (2009). World-class customer service: The key to York accredited
College’s success. York, PA (January 13). b. Gain work experience through internships
Richardson, C. (2009, February 1) “Steps Toward Career or volunteer work
Success” Security Management Magazine, 53, 91–92.
Yena, D. (1987). Career directions. Homewood, IL: Career direc-
c. Maintain a satisfactory grade point
tions: A special edition of Johnson & Wales University. average
d. All of the above
Resources 3. On average, how much of a salary increase
do college graduates earn over noncollege
The Electronic Security Association (formerly the National
graduates?
Burglar & Fire Alarm Association; www.alarm.org) spon-
sors a variety of educational programs with the purpose a. 77%
of representing, promoting, and enhancing the growth b. 58%
and professional development of the electronic life safety, c. 84%
security, and integrated systems industry. In cooperation d. 35%
with a federation of state associations, ESA provides gov-
4. Why is experience such an important
ernment advocacy and delivers timely information and
professional development tools. There are various certi- component of your résumé (choose the best
fication programs for alarm installers, technicians, and answer)?
related electronics professionals. a. Experience provides exposure to scenarios
The National Partnership for Careers in Law, Public Safety, and interaction not available in the
Corrections and Security was initiated in 1999 with fund-
classroom
ing from the U.S. Department of Justice. The Partnership
exists “to build and support career development pro- b. Education is more important than
grams and systems that ensure seamless transitions by experience and it is not necessary
linking and integrating secondary and post-secondary c. It demonstrates a high level of motivation
education, professional certifications, and organizational

I. FOUNDATIONS
72 5. CAREER PLANNING FOR PROTECTION PROFESSIONALS

d. A job allows the student to earn money 8. Why do employers search social networking
while in school sites for applicant information?
5. On average, how many certifications should a. They want to find other candidates for
one obtain? other open positions
a. 8 b. Searching these sites provides a quick
b. 4 and efficient way to learn more about
c. 9 the candidate
d. None of the above c. To find a specific person’s résumé
6. What is the difference between a functional d. Employers do not search social
and a chronological résumé? networking sites on job applicants
a. A functional résumé lists the functions that 9. There are four strategies for developing a
you performed at a job career; choose the one that is not a strategy.
b. A functional résumé is a summary of a. Develop a personal brand
experience, whereas a chronological résumé b. Network
lists jobs or positions by dates of employment c. Find a mentor
c. There is no difference d. List one’s résumé on an online job board
d. A chronological résumé only lists 10. What is one of the fastest growing fields
education and certification related to security?
7. When interviewing for a job, what preparation a. Law enforcement
is necessary (choose the best answer)? b. Homeland security
a. Drive the route to the interview location c. Private detectives
the day before d. Contract security
b. Research the organization
c. Be prepared to answer standard interview
questions
d. All of the above

I. FOUNDATIONS
U N I T II

COMMUNICATIONS

6 Effective Communications
7 Security Awareness
8 Central Alarm Stations and Dispatch Operations
This page intentionally left blank
C H A P T E R

6
Effective Communications
Charles T. Thibodeau

means that whatever was contained in the com-


CHAPTER OBJECTIVES municator’s original message is both received
● Definition of effective communications and understood by the targeted receiver or
● Why effective communications is receiver group. The element of understanding
necessary the message is the central focus of this defini-
tion, for without that element, communications
● The six essentials of effective are blocked. Put another way, effective com-
communications munications simply are nonexistent without a
● How to address each audience effectively two-way, mutual understanding of the message
● Myths and misconceptions about being communicated.
communications
● Proper use of communication devices
DUE DILIGENCE BASED ON
EFFECTIVE COMMUNICATIONS

Businesses are required by law to establish and


EFFECTIVE COMMUNICATIONS maintain what is called “due diligence.” In lay-
DEFINED man’s terms, that means operating their affairs
by paying particular attention to the best welfare
“Effective communications” is the faith- and interest of their visitor’s safety and security
ful reproduction of a thought, idea, observa- needs. To meet this “due diligence” requirement,
tion, instruction, request, greeting, or warning, businesses must focus on foreseeable real and per-
expressed in a verbal, written, electronic alarm ceived threats. Next, the law expects businesses to
annunciation, or pictorial media, originated and warn people of danger and then avoid or mitigate
transmitted by a communicator or communicat- those threats that have a chance of materializing
ing device to a specifically targeted receiver or and causing a substantial loss of assets, damage
receiver group. The term “faithful reproduction” to property, and/or injury to people.

75
76 6. EFFECTIVE COMMUNICATIONS

To comply with this mandate, businesses but if these six factors are present, communica-
must conduct perpetual risk analysis, vulner- tions will be extremely effective.
ability assessments, integrated countermea-
sure designs, security officer training, employee
security awareness training, and contingency
planning. However, without “effective” commu- CONSIDER THE AUDIENCE
nications, none of these practices and procedures
could exist. Thus, effective communications are Everyone communicates at different lev-
a key element in assisting businesses in meeting els. If you are communicating with someone
their mandate to provide proof of compliance who is many levels below your communica-
with required levels of due diligence. tion level, the message you are sending stands
a good chance of being misunderstood. In
addition, assuming that everyone speaks and
CHANNELS OF understands on your level is almost a guaran-
COMMUNICATIONS tee that you will be an ineffective communica-
tor. The midpoint between talking above your
There are four channels of communications audience and talking below your audience is
in any organization or company: top-down, currently the seventh-grade level. If you want
bottom-up, horizontal, and the grapevine. The perfect clarity in your communications, then
first three are essential for information to flow speak slowly, carefully choosing your words,
in every direction. These are the formal and using no more than five- or six-letter words,
official forms of communications. The fourth and choosing words that are commonly known.
form of communications found in most orga- In many cases, when asked to repeat a message,
nizations is the grapevine, which consists of an the receiving person uses different words. Thus,
outgrowth of informal and casual groupings of each time you are requested to repeat a mes-
employees. Effective communications in any sage, say it in different words.
security department requires all four of these The security officer’s communications must
forms. They provide maximum performance also accommodate the language difficulties
both during stable and predictable periods and of an ever-growing ESL (English as a Second
during times of stress. Language) population. Spanish and French
are common, second to English, and there
is an ever-growing Asian population whose
THE SIX ESSENTIALS OF languages include Korean, Laotian, Hmong,
EFFECTIVE COMMUNICATIONS Mandarin, and Vietnamese. The security officer
of the future may indeed need to be bilingual.
Effective communications must be: Another consideration is medically afflicted
people with communication impediments,
● Timely
although there may be nothing you can do to
● Complete
breach their communication difficulties. When
● Clear
dealing with the deaf, blind, or people afflicted
● Concise
with multiple sclerosis (MS), patience is your
● Factual
greatest asset, and a strong commitment to help
● Accurate
these people will get you through it. Just be
This is a bare bones list of requirements. Cer- persistent until you can find the way each one
tainly, the complete list includes other attributes, communicates.

II. COMMUNICATIONS
PROPER USE OF COMMUNICATIONS DEVICES 77

VERIFYING COMMUNICATIONS your communications. A much better ques-


WITH FEEDBACK tion to ask, when finished preparing a message
is “Does this message have all six essentials of
It is of the utmost importance that the effective communications?” If not, fix it before
receiver of a message gives you some kind of the message is sent. If that fix extends the mes-
indication that he or she received the message sage length, it is better to violate the brevity rule
and the message received is the same one you than the need-to-decipher rule. Abbreviations are
sent. What I am alluding to here is the use of only valuable to the receiver who can decipher
feedback to confirm that the receiver did in fact them. Shorthand is usually only valuable to the
receive and understand the message. The initial sender of the message and in many cases cannot
communicator who sent the message is respon- be deciphered readily by the receiver of the mes-
sible for ensuring that the message was not only sage. If there is any absolute rule in effective mes-
received, but was the same message that was sage sending, it is this: No message other than a
sent. The communicator has a right to believe crypto-message should have to be deciphered by
the message was received and understood if a any receiver of the message.
confirmation message is returned. Acceptable
confirmation messages among peers would be
any of the following: “10-4,” “roger,” “good PROPER USE OF
copy,” or a very short verbal message repeating COMMUNICATIONS DEVICES
your message.
Telephone Systems
MYTHS AND MISCONCEPTIONS The telephone is one of the most important
IN COMMUNICATIONS tools that any security officer can have at his
or her disposal. At the same time, if the tele-
There is one misconception that causes more phone equipment is not properly designed for
errors than any other in the communications a security or emergency setting, it can be a great
field and that is something called brevity, or problem, hampering effective communications.
keeping each communication as brief as pos- The telephone equipment in a security program
sible. In an attempt to accomplish this one goal, must be simple to use with the least probability
the communicator uses abbreviations, personal of failing during an emergency.
shorthand, partial words or partial sentences, In modern cutting-edge security control cen-
poor grammar, and a message that requires ters, there will be a 10-button phone with caller
deciphering. ID on it for day-to-day business. It will be a part
Being brief many times is not an important of the facility PBX or electronic phone system,
goal of writing. Saying as few words as possi- and like all phones, it will have the ability to
ble and speaking in code is not always the best place calls outside the facility as well as within
choice of content for verbal communications. the facility. It will also be tied into a tape record-
The above list of six essentials must be present ing device to record all incoming and outgoing
to have a clear and concise message. calls.
The length of the message is important in Separate and apart from the 10-button phone,
many situations, such as sending duress codes or there will be a red phone used exclusively for
using a two-way radio. However, brevity is one emergencies with caller ID and tape recording
of the least important factors and most destruc- device on it as well. This red phone may have
tive factors to the attempt to be “effective” with a strobe light connected to it to distinguish the

II. COMMUNICATIONS
78 6. EFFECTIVE COMMUNICATIONS

ringing sound from all the other phones in the directly to the mainframe of the local telephone
room. This phone will have no dial-out capabil- office and it will operate on its own power.
ity; in fact, the face of the phone will have no Therefore, this direct tie to the outside world
dialing keyboard. will be somewhat protected from numerous
The reason for having a separate red phone threats. The conduit-encased phone line would
for emergencies is that the security operator or almost assure an outside line during any power
dispatcher will at some point need to communi- outage or computer failure that could cripple the
cate over the regular phone lines to call for fire, facility’s PBX or electronic telephone system.
police, or emergency medical assistance and for In some facilities a fourth, black phone is
other assistance. If the emergency phone is tied physically identical to the red phone; it can-
into the 10-button phone, the emergency event not be dialed. This phone is dedicated to panic
caller at the scene of the emergency must be put alarm annunciation. If there is a threat on exec-
on hold while public assistance is being called. utive row, or a robbery in the credit union, cer-
Never hang up on the emergency event caller or tain designated employees are trained to use
put the emergency event caller on hold during the black phone for “duress code” messages.
an actual emergency. The caller under the stress The cell phone is the newest addition to the
of an emergency may hang up whenever they phone systems available for security officers. In
cannot hear the sound of your voice or noise in many locations, security departments are invest-
the control center. ing in cell phones that double as two-way radios.
In addition, each security station in the facil- At this point, for most security departments, these
ity should be equipped with a red phone as telephone-radio combination units are too costly.
well as a regular phone. When an emergency In other locations, cell phones are used as back-
call comes in, each red phone should be picked up units to the two-way radios for communica-
up with the remote stations just listening in to tions where two-way radio signals are blocked by
the conversation between the dispatcher and dead spots. Cell phones play an important part
emergency event caller. during patrol duties to allow emergency calls to
Then, before hanging up, each station will be made from the scene, back to the control cen-
confirm that they have received the message ter when the two-way radio is ineffective. The cell
heard over the red phone. The emergency tele- phone can also be used for calls directly to the 911
phone system is not a place to skimp on cost emergency response centers.
or design when so much depends on effective
communications during emergencies. In fact,
just in case you lose your connection with the
Two-Way Radios
emergency event caller, it is best to jot down The two-way radio is the primary mobile
that person’s name and phone number immedi- communications device that almost all security
ately at the outset of the call. officers use to communicate with the control
A third phone, a yellow phone, would be a center and between other officers, supervisors,
single analog line separate and apart from the and management. There are some problems
facility PBX or electronic telephone system. This with most two-way radio systems and that
phone will have a hardwired four-lead tele- trouble includes, but is not limited to, failure
phone cable inside of a conduit from the wall to operate in dead spots, being susceptible to
jack in the room where the phone is located to operator error, and having short battery life. In
the street-level mainframe. The conduit will addition, an adequate two-way radio system
lessen the threat of the line being cut or burned is expensive; the units are bulky and take up
through during an emergency. This line will tie space on a crowded utility belt. Some of these

II. COMMUNICATIONS
PROPER USE OF COMMUNICATIONS DEVICES 79
radios break down regularly and are costly to to allow for processing. If this is not done, your
maintain. However, all of these shortcomings message will be clipped at both ends. When
aside, we could not do the security job as well holding the transceiver up to talk, hold it to the
as we do without effective communications side of your mouth and speak across the micro-
devices like the two-way radios. phone. Do not speak directly into the micro-
Two-way radios are miniature radio stations phone or you may speak too loudly and cause
and as such, something called “ground-wave distortion of the transmitted message.
propagation” makes the difference between The frequency of the radio also has an impact
effective communications and either broken on effective communications. Most radios used
communications with static or no communica- by security are FM transceivers. They are either
tions at all. Ground-wave propagations are the VHF or UHF. Two-way radios that are called
scientific explanation that explains how a radio VHF transceivers work on what is known as
signal travels from the source antenna to the very high frequency. The UHF radios operate
receiving antenna. It also explains that if any- on ultrahigh frequency. The difference between
where along that path, there is an object that these two transmission levels is the lower the
is so well grounded, like an I-beam or other frequency, the longer the wavelength. That
metal object, the signal may be short-circuited means the VHF signal will travel a long way, but
and driven into the ground before the message a VHF signal is a relatively weak signal and does
reaches the receiver’s antenna. Because the trans- not work as well in tall buildings with lots of
mission antenna sends out many pear-shaped steel. By contrast, the UHF transceiver is a stron-
signals, not just one, to overcome this signal ger signal but has a much shorter wavelength.
interference problem, the officer needs only to That means that it packs a wallop and works
walk a few feet from where the transmission is well in tall buildings with lots of steel, but it
garbled and the signal may be reestablished. cannot travel too far. A UHF system with numer-
The two-way radio is most effective with the ous repeaters in line is possibly the most effec-
antenna 90 degrees perpendicular to the ground. tive two-way radio communications system.
The antenna should be pointing straight up
in the air during use. By tipping the antenna
Pagers
sideways or horizontal to the ground, the unit
becomes directional and the strongest transmis- The pager takes a telephone call to respond
sion will be along the line where the antenna is to unless it is a voice pager or a text pager that
pointing. If a two-way radio antenna is pointing displays messages. Pagers are nice because
away from the receiving antenna, then the radio they are small and work just about every-
is being used in a very ineffective manner. where. However, they do not allow the mes-
In many systems, signal strength gets a boost sage receiver to respond with a message and
by use of a repeater. A repeater is a great help but they do not allow for verification that the signal
the process by which it works makes it somewhat was received and understood. Pagers should be
user-unfriendly. The repeater receives the signal, used for back-up only. Two-way radios and cell
turns it around, and sends it back out as a more phones are the best communications devices for
powerful signal. That process takes time; thus, portable operations.
the two-way radio communicator must hold the
transmission switch down for two seconds before
talking in order to engage the repeater and then
Intercoms
the communicator must hold the switch down In a retail setting or a hospital setting emer-
for two seconds after the message is finished gency, codes are sent over the intercom. We all

II. COMMUNICATIONS
80 6. EFFECTIVE COMMUNICATIONS

know that “code blue” means cardiovascular signal exceeds maximum input peak-to-peak fre-
problems complicated by respiratory failure. quency. You do not have to speak loudly when
We know that “code red” means fire. In some announcing over an intercom, as they have
retail companies a call over the intercom such as built-in amplifiers to adjust the sound level.
“Mr. Jones, please come to the front of the store”
means that security is needed at the front of the
store. The intercom is useful when it is working, SUMMARY
but traditionally the intercom system is a weak
link in the communications systems of any facil- Effective communications do not exist when
ity. There are problems with volume and static, the speaker and the receiver are not “on the
and they seem to have more than their fair share same page.” That is the bottom line in many con-
of maintenance needs. If the intended receiver tract dispute cases where the seller and the buyer
of the message is out of the area where there are failed to reach a “mutual assent to the same
no speakers, the message will not be received. proposition.” This means that the buyer expected
In addition, there usually are no procedures to to receive something that the seller was not sell-
inform the communicator that the message was ing; thus the contract could be declared null and
received and understood. Despite the prob- void all because the buyer and seller were expe-
lems, however, intercoms are still needed. Extra riencing a lack of effective communications.
speakers should be placed in remote and hard- One of the situations that led to the death of
to-hear-in areas all over the facility to assure hundreds of firefighters in New York City dur-
emergency messages reach everyone. If you ing the 9/11 terrorist attacks in 2001 was the
work in a facility equipped with intercoms for fact that their two-way radio system failed.
communications and you even think that a mes- Poor communications turned deadly in that sit-
sage might have been transmitted over an inter- uation. We have to be continuously vigilant of
com, call dispatch and check out your suspicion. effective communications in our security work.
The mistake that a communicator can make Failure to communicate effectively, including
using the intercom is to speak too loudly into the failure to communicate at all, can very quickly
speaker. Many systems will distort if the input turn into serious injury or death.

EMERGING TRENDS
As states across this country continue to pass effective communications in the workplace. These
laws for mandatory security officer training, effec- supervisors should not hesitate to have a security
tive communications will be an important part of officer rewrite his or her report when that report
that training. A training curriculum authorized by fails the effective communications test. In addition,
a state licensing board will likely contain report poor report writing should be rewarded with man-
writing as a mandatory component. It will be a datory writing class refreshers taken repeatedly
supervisor’s prerogative to assure that the officers until effective communications improvement is
in his or her command are following the report observed. It is very possible that this turn around
writing training they receive. Therefore, it will trend in effective communications will emerge
take the state licensing board and the security offi- over the next decade as security departments
cer trainers and supervisors, both in contract and work toward ensuring that effective communica-
proprietary security, to enforce acceptable levels of tions exists throughout the security industry.

II. COMMUNICATIONS
SECURITY QUIZ 81

S EC U RI T Y QU IZ must be able to tell which of the following?


Choose the best answer.
1. Which of the following best describes
a. That the communications were necessary
effective communications?
b. That the communications were timely
a. A faithful reproduction of a message
c. That the message was received
sent to a receiver clearly understood and
d. That the message has been received and
confirmed by the receiver
understood
b. A message sent by a communicator who
7. The one misconception that causes
expects the receiver to understand it
more errors than any other in effective
c. A message that is sent to a person with
communications is:
hope that it will be understood by all
a. Every message must be brief
d. All of the above
b. Every message requires some
2. Tort law expects every business to actively
interpretation
pursue the following:
c. Every message must be clear and concise
a. employee background checks
d. None of the above
b. due diligence regarding safety and security
8. The telephone equipment in a security
c. adequate training of all employees
program must be which of the following?
d. employee benefits
Choose the best answer.
3. There are four channels of communications in
a. It must be technologically rugged and
most companies; which of the following is not capable of working under severe conditions
a channel? b. It must be simple to use with the least
a. Top-down communications probability of failing during an emergency
b. Bottom-up communications c. It must be available on a 24/7 basis
c. Grapevine communications d. None of the above
d. Reverse-horizontal communications 9. In the security office, separate and apart from
4. There are six essentials of effective the general use telephone, there will be a red
communications; which of the following is phone used exclusively for emergencies. That
not one of those essentials? phone will have the following attachments
a. The communications must be complete to make it more effective. Which of the
b. The communications must be clear following is not one of those attachments?
c. The communications must be consistent a. Ringer
d. The communications must be concise b. Strobe
5. Effective communications has built-in flexibility c. Tape recording device
to facilitate the needs of the receiver or receiver d. Beeping sound every 3 seconds
groups. Which of the following characteristic is 10. During some emergency situations, the
important to take into consideration? phone system will be destroyed, especially
a. Communications grade level remembering when there is a building collapse. What can
the seventh-grade midpoint rule we do to protect that phone line?
b. English as a Second Language (ESL), a. Use a separate single-cable phone line not
people with poor understanding of English part of the building’s main phone system
c. Medical condition such as speech b. Place the telephone cable inside of a metal
impediment, hearing loss, or poor sight conduit
d. All of the above c. Have the cable enter/exit the building at
6. A very important part of effective the lowest level of the building
communications is that the communicator d. All of the above

II. COMMUNICATIONS
This page intentionally left blank
C H A P T E R

7
Security Awareness
James E. Sellers

corporate environment, and it should include


CHAPTER OBJECTIVES everyone connected to corporate functions.
● Explore the importance of security Managers should formulate a plan that
awareness to the overall success of an emphasizes enlisting every employee to form
organization partnerships with critical external acquain-
tances to build a diverse team. When properly
● Explain how a stakeholder approach is launched and actively reinforced, an effective
used to create a partnership, which helps security awareness team encompasses various
achieve a safe and secure environment entities to achieve basic protective goals, which
● Explore examples of “lessons learned” that help deter unwanted activities that threaten
by an organization to help partners the organization.
understand why security awareness is Although the basic roles, skills, and knowl-
important personally and for the success edge of team members will vary, each should
of the organization understand that he/she is an essential player
● Discuss how focus groups and surveys in safety management and in helping the com-
are utilized for better communication pany achieve security goals. This creates an
environment that reduces liability risk and loss
prevention by encouraging general safety prac-
tices and strategies that produce lasting results.
INTRODUCTION Whether a matter of routine or during an emer-
gency, team members should, at least, know the
Security awareness has long been a goal of most current corporate security plan, accept
organizations that strive to provide a safe and responsibility, and have the ability to imple-
secure environment for their employees, cus- ment program objectives.
tomers, and those who want to defend precious
assets. The practice of security awareness oper-
ates best when a reasonable plan is put together WHAT IS SECURITY AWARENESS?
with policies and procedures that support a
comprehensive team concept. A security aware- When we speak about “security awareness,”
ness team is crucial to sustaining a healthy we are talking about the need to focus attention

83
84 7. SECURITY AWARENESS

on security throughout the organization and to organization down, but should also flow
keep security in the forefront of every employee’s back up to the top. It is in this way that
mind during the day. It involves a sense of duty outdated procedures are discovered and
by those who could be affected to be aware of corrected.
security practices as they relate to daily activi- 2. Modern security techniques now involve
ties of the organization. Although the plan can more collaboration with external associates
be extensive, it does not require every employee such as customers, venders, contractors,
to know every aspect; many times it will apply insurance providers, security consultants,
to specialized or departmental duties. public safety officials, law enforcement, the
Security awareness provides a framework of fire department, government emergency
established policies and procedures that partici- management operators, and others. By
pants employ by reporting unsafe conditions, collaborating with associates a synergy is
suspicious activity, and noticing general safety developed that acts as a force multiplier.
breaches, merely as second nature. Value is added to the security plan by using
Team members are trained and polled regu- proven ideas from experienced external
larly to heighten their awareness about chang- contributors.
ing trends in practices and rapidly advancing
Security departments should liaise with local,
technology. In the past, the main concern has
state, and federal law enforcement officials.
been on physical site security issues; focusing
These officials can speak with management to
mostly on gates, doors, windows, and locks.
reinforce security and safety practices that the
Today, along with physical awareness, security
security department recommends including in
initiatives must include internal matters, like
company policies and procedures. The secu-
avoiding workplace violence, enhancing per-
rity manager should solicit the officials to offer
sonal safety, and being up-to-date on the latest
advice and feedback from their observations.
information technology, including safe Internet
The internal and external partners described
practices. Greater emphasis must now be placed
above become stakeholders through common
on these issues, more so than in the past.
interests and shared goals that help the organi-
zation succeed. Stakeholders may be directly or
indirectly related to an organization and may
EXPANDING THE TEAM offer input that reflects commitment to ongo-
THROUGH PARTNERSHIPS ing functions. As stakeholders, managers and
employees all benefit through financial or per-
To be effective, the security department sonal investment, employment, and so on. All
should instill “security awareness” among share the belief that it is in their best interest
members from all layers of the organization as to protect and promote the organization as if it
well as external partners. were their very own. See Figure 7-1.
1. Employees should be made to feel part of the
awareness team and should be solicited for
their ideas to improve security. Encourage TECHNIQUES FOR REINFORCING
employees to report security problems POLICY AND PROCEDURES TO
and correct safety potential issues when INCREASE SECURITY AWARENESS
observed. Use a double loop communication
model, which means that information To greatly increase security awareness, mem-
should not only flow from the top of the bers from all layers of the organization and

II. COMMUNICATIONS
DOUBLE LOOP LEARNING 85
Management

Security
All employees
department

External
partners

FIGURE 7-1 Security awareness with partner approach (stakeholder). Figure courtesy of J. E. Sellers, 2009.

external partners should be instilled with a ● Security awareness meetings should be held
sense of partnership through interactive activi- with all departments at least every quarter.
ties that include orientation sessions, training,
Technology such as Internet e-mail, Webcast
security updates via newsletters, e-mails, and
training, and electronic newsletters, now enable
informative signage.
security departments to easily and inexpensively
● All employees should be apprised of the communicate and distribute valuable security
organization’s policies and procedures and safety information throughout the organi-
upon entering the organization. Employee zation. The correspondence should focus on the
orientation should be documented and positive outcomes that can be achieved if the
signed to indicate the rules are understood. organization’s security procedures are followed.
● Organizational policies and procedures should See Figure 7-2.
be clear, concise, and written correctly. They
should also be reviewed and updated annually,
at a minimum. Print and electronic copies DOUBLE LOOP LEARNING
should be readily available to all employees.
● Repetition of the security awareness message Management should consider the Double
will lead to increased involvement. Loop Learning theory of Argyris and Schon
● Repetition can be accomplished by such (1978). In this theory the organization becomes a
methods as daily exposure through the use “learning organization” by detecting and correct-
of posters, weekly exposure via e-mails, ing errors through questioning and modification
and monthly or quarterly exposure through of existing norms, procedures, polices, and objec-
newsletters and handouts. tives. According to Fiol and Lyles (1985), learning

II. COMMUNICATIONS
86 7. SECURITY AWARENESS

is “the process of improving actions through


Written better knowledge and understanding.” With a
Policy and
Procedure double loop learning security awareness commu-
Orientation
nication model (Figure 7-3), a mechanism is insti-
tuted which provides feedback from employees
on improving security awareness. By creating
double loop communication, employees can then
Scheduled become stakeholders who have a vested interest
Meetings,
Training,
in the success of the security awareness effort.
Focus Groups,
Surveys
Security Informative
Updates Signage,
via Email, Posters, TOOLS
Newsletter, Handouts,
Webcast Library
The tools utilized to create this valuable feed-
FIGURE 7-2 Developing security awareness. From Policy back are focus groups and surveys.
and procedure reinforcement (J. E. Sellers, 2009). Focus Groups: Focus groups consist of indi-
viduals selected by management to participate

Security Information
Suggestions Security Policy and
from Employees Procedure
to Management from Management
(ideas are considered to Security
to correct errors and Department
improve security)

Security Information
from
Security Management
to All Employees

FIGURE 7-3 Developing security awareness. Double loop learning security awareness communication model (J. E. Sellers, 2009).
Adapted from Argyris and Schon (1978).

II. COMMUNICATIONS
RESOURCES 87
in discussions on security policies, procedures, organization. This technique uses examples in
and other security programs. The groups con- which security awareness leads to a successful
sist of mostly “end users” who operate under outcome, resulting in an increase in safety or a
the policies. It is this group that often can offer reduction in crime. The “lessons learned” exam-
practical solutions for seemingly complicated ples show how security awareness fits into the
“problems.” Focus groups have brief scheduled organization’s culture or even contributes to creat-
meetings that have minimum interference with ing a security culture where one was nonexistent.
the company’s scheduled core activities. The “lessons learned” examples help employ-
Surveys: Short surveys on security aware- ees and partners understand why strong secu-
ness should be included in e-mails, newsletters, rity is important to them personally as well as
and Webcasts. The surveys can be evaluated to to the success of the organization.
identify what areas of the security awareness
program should be adjusted to keep it on track.
Information from the focus groups and sur- RESOURCES
veys should be available within the organiza-
tion to lend credence to the double loop security Security department managers should reach
awareness communication process and improve out to available resources provided by professional
the management/employee partnership. groups when setting policies and procedures. There
are a number of industry-specific organizations
that provide support by sharing information with
LESSONS LEARNED their members. There also are security organiza-
tions such as IFPO and ASIS that have established
The technique for obtaining greater involve- guidelines on security topics. These organizations
ment in security awareness should include a have Websites that offer security information and
collection of lessons learned from inside the provide links to other valuable sources.

EMERGING TRENDS

Ever-improving and changing technology pro- could result. These security breaches may include
vides business opportunities, yet at the same time computer viruses that can be introduced via the
creates security dilemmas for security managers. Internet. These viruses can attack the organiza-
Subjects, such as information technology (IT), tion’s computer system and result in lost pro-
now occupy much of the security department’s ductivity and expensive corrective action. It is
resources. Technology in the form of cellular imperative that all stakeholders know how they
phones, computers, digital cameras, copiers, and can be affected and be made aware of the dangers
facsimile machines, while increasing the speed of misusing information technology. They must
of conducting business, can also be a method be vigilant, use safe Internet practices, and report
for compromising valuable organizational or any suspicious computer activity. The security
personal information through theft or misuse. director should always seek better ways to pro-
Without safeguards, including rules regarding the vide employees with the knowledge necessary
use of electronic devices, severe security breaches for secure information technology use.

II. COMMUNICATIONS
88 7. SECURITY AWARENESS

References Figures 7-1, 7-2, 7-3 content by J. E. Sellers (2009) using


Micro Soft, 2003 “drawing”.
Argyris, C., & Schon, D. (1978). Organizational learning: A the- Senge, P. M. (1990). The fifth discipline: The art and practice of
ory of action perspective. Reading, MA: Addison-Wesley. the learning organization. New York: Doubleday.
Argysis, C. (1991). Teaching smart people to learn. Harvard Sellers, J. E. (2002). A study of contributing factors to job sat-
Business Review. isfaction at the Atlanta police department’s crimes against
Fiol, C., & Lyles, M. (1985) Briacliff, NY: Academy of property section. Atlanta.
Management. Academy of Management, 10(4), 803–813.

S E C URI T Y QU IZ 6. The “lessons learned” examples help


1. Security awareness is simply letting employees and partners understand why
everyone know in the organization how security awareness is important to them
security impacts them and how important personally and for the success of the
they are, as stakeholders and team members, organization.
to the continued success of the company. a. True
a. True b. False
b. False 7. Which is a method to increase
2. To be effective, the security department should security awareness among all layers
instill “security awareness” among all levels of of the organization and external
the organization and external partners. partners?
a. True a. Eyeglasses
b. False b. Bright lights
c. Interactive activities
3. Security awareness meetings should be
d. None of the above
held with all departments at a minimum
8. Focus groups consist of:
frequency of:
a. Organizations
a. Annually
b. External partners
b. Quarterly
c. Individuals selected by management
c. Weekly
d. None of the above
d. Daily
9. When double loop communication is
4. Security awareness should be instilled
used, the following employees have the
among half of the members, from all
opportunity to become active:
layers of the organization and external
a. Police officers
partners.
b. Stakeholders
a. True
c. Managers
b. False d. None of the above
5. In double loop communication, information 10. Team members are trained and polled
should not only flow from the top of the regularly to heighten their awareness about
organization but also a process should be in changing trends in practices and rapidly
place for information to travel back to the top. advancing technology in security.
a. True a. True
b. False b. False

II. COMMUNICATIONS
C H A P T E R

8
Central Alarm Stations and
Dispatch Operations
Sean Smith, Jim Ellis, and Rich Abrams

INTRODUCTION
CHAPTER OBJECTIVES
● Explain the history of central alarm In the modern world of safety and security,
stations and dispatch centers and how the necessity of a fully functional central alarm
they evolved into the technologically station and dispatch center must not be under-
advanced operations of today estimated. According to Abrams (2003), “The
control room is the nerve center of any safety
● Provide an overview of the various types
and security department.” Such an operation is
of alarm and control systems that may
capable of detecting nearly any emergency that
be monitored by a central station, as well
could occur, 24 hours a day, 7 days a week. Such
as computerized visitor management
situations may include fire, burglary, major facil-
systems
ity equipment failure, or certain natural disas-
● Introduce the numerous types of sensors ters. Equally as important is the responsibility of
incorporated into alarm and control a dispatcher to coordinate communications with
systems that transmit messages back to protection officers in the field, as well as assist
the central station agencies and the general public. Alarm systems
● Provide an overview of the transmission are powerful tools in the prevention of crime
media by which messages are and disaster, but the observations of the field
transmitted from alarm and control officer and the report from the customer on the
sensors to their systems’ central telephone are also vital. Dispatchers are trained
processors to obtain and record all the information neces-
● Introduce the reader to the sary to send an appropriate response to any sit-
communications equipment utilized by uation, ranging from a customer who is locked
dispatchers in a central station, with a out of his or her office to a field officer being
focus on radio and telephone systems assaulted by a suspect. Thanks to sophisticated
detection and communication equipment—and

89
90 8. CENTRAL ALARM STATIONS AND DISPATCH OPERATIONS

very quick thinking—dispatch and monitoring alarm systems, such as an attached clock that
staff are prepared to coordinate an immediate could activate and deactivate the system at cer-
response to all of the above and more. tain intervals, as well as a latching circuit that
required authorized personnel to manually
reset the system prior to deactivating the audi-
HISTORY OF CENTRAL ALARM ble alarm (Fischer, 2008b).
AND DISPATCH CENTERS Around the year 1877, Holmes installed the
first network of burglar alarm systems con-
In the past, humans acted as both alarm nected to a central station (Ellis, 2007). He sent
sensors and transmission media. In order his son to Boston to establish a second central
for a response to occur, an emergency situa- station there. While in Boston, Holmes Jr. dis-
tion had to be directly observed by a citizen, covered that alarm signals could be transmit-
who then rushed to police or fire headquar- ted to a central station via preexisting telephone
ters to notify the authorities in person wires, and vice versa. He set up a network of
(National Communications Institute [NCI], 700 telephones connected to the Boston central
2001). However, this process began to change office, and promptly informed Holmes Sr., who
when William Cooke and Charles Wheatstone set up a similar operation in New York City. In
invented the electrical telegraph in 1837 1878, Holmes Sr. expanded his telephone inter-
(Stewart, 1994). The telegraph was tailored ests by becoming president of the newly formed
to the public safety industry in 1852, when Bell Telephone Company. He sold his interest
William Channing invented the fire alarm tele- in the company 2 years later but retained the
graph (Fischer, 2008a), which allowed a citizen exclusive right to utilize Bell telephone wires
to activate a pull box, sending a signal with the for his alarm circuits (Fischer, 2008c).
location of that box to the local fire company. In 1871, Holmes was introduced to direct
In 1853, Augustus Russell Pope developed competition when Edward Callahan formed the
and patented the first modern burglar alarm in American District Telegraph company, which
Somerville, Massachusetts. It involved an open eventually became ADT. They utilized manual
electrical circuit that connected the doors and action call boxes connected to a central moni-
windows in a building; when a protected door toring station (Ellis, 2007). When the station
or window was opened, the circuit would close received an alarm, messenger boys were dis-
and activate an audible alarm. Pope only com- patched to the source and would immediately
pleted one installation, however. The patent report their findings to local police or fire offi-
was sold in 1858 to Edwin Holmes, who greatly cials via preexisting call boxes. By 1875, ADT
expanded the business (Fischer, 2008a). had expanded from New York City to Brooklyn,
Holmes installed his first burglar alarm sys- Baltimore, Philadelphia, and Chicago (Fischer,
tem in Boston in 1858 (Ellis, 2007). However, 2008d). At this time, the company offered
within 1 year, he chose to relocate to New York police, fire, and all-purpose messenger boy ser-
City, because at the time, it was perceived to be vices; however, within a few years, they began
where “all the country’s burglars made their to offer a contract security patrol service known
home” (Fischer, 2008b). By 1866, Holmes’s cli- as the “Night Watch.” Even so, messenger boy
ent base had grown to over 1200 residential cus- services initially accounted for over 70% of the
tomers. Around this time, he began marketing company’s revenue. However, use of this ser-
to business entities as well as private residences, vice declined rapidly with the development
with great success. The year 1868 brought sev- and proliferation of the telephone. In 1901,
eral technological advances to Holmes’s burglar R. C. Clowery, then owner of ADT, decided the

II. COMMUNICATIONS
TYPES OF MONITORING SYSTEMS 91
wisest course of action was to focus almost touch screens, enhanced caller ID, voice record-
exclusively on police, fire, and security services ing, and telecommunication devices for the deaf.
(Fischer, 2008d). Two-way radios have evolved into networks
In 1877, the city of Albany, New York, pur- including many advanced features, such as:
chased the world’s first police telephones ● touch screen interface
and installed them in the mayor’s office and ● voice recording
five city districts (Stewart, 1994). In 1883, the ● remote paging
Gamewell Company created a call box that ● remote activation and deactivation of
could be used by the police or the public. These
handheld units
call box systems were installed in Washington,
DC, Chicago, Detroit, and Boston within the Pencil-and-paper record-keeping systems
next several years. In the United Kingdom, gas have been replaced by computer-aided dis-
lights were installed on top of police call boxes, patch software, making it much easier to enter
which could be lit by police headquarters in new data and retrieve archived information.
order to notify the officer on foot patrol to con- These systems can be integrated with a variety
tact the nearest station (Stewart, 1994). of other programs, including report manage-
Radio communication for police would ment software, telephone or radio interfaces,
come many years later. The first police radios geographic mapping and tracking systems, and
in America were utilized by officers in Detroit, even alarm-monitoring software.
Michigan, in 1928. These were only capable of
transmitting from the base station to a mobile
radio. Bayonne, New Jersey, became the first TYPES OF MONITORING SYSTEMS
police department to utilize two-way radios
in 1933 (Institute of Electrical and Electronics A security officer might come into contact
Engineers, 2009). At that time, and for many with any number of monitoring systems when
years, a dispatch center was a relatively sim- staffing a console. Each system may control a
ple operation. A typical center would consist specific action or sequence of actions if so pro-
of a telephone system, a radio system, and a grammed. The most complex are integrated sys-
record-keeping interface. The telephone sys- tems that operate multiple individual operations
tem was basic, unlikely to incorporate features from one software application.
that were not found in residential or office tele-
phones, other than a manual switchboard used
to redirect calls. The radio system was a simple
Alarm Systems
desk microphone with a “push to talk” switch. At the basic, but most reliable, end of the
Records were kept by hand on a series of paper spectrum is an alarm system that monitors
forms (NCI, 2001). Such an operation may be areas of a facility. This would consist of sen-
staffed by a switchboard operator, or by a police sors placed around the facility and connected
or protection officer assigned to the desk. to a central console. In some systems, the con-
Currently, the core functions of a dispatch sole might include lights and a buzzer such
center remain the same: telephone communica- that a violation or alarm would cause both the
tion, radio communication, and recordkeeping. light and buzzer to activate. Toggle switches
However, the technology has changed drasti- connected in the circuit allow for areas to
cally over the years. Consumer-grade telephones be shunted, bypassed, or silenced until the
have been replaced with multi-line telephone alarm can be investigated. This also allows for
terminals accompanied by features such as a sensor with a fault on it to be silenced until

II. COMMUNICATIONS
92 8. CENTRAL ALARM STATIONS AND DISPATCH OPERATIONS

repaired. However, this generally leads to the something that is known, generally a personal
assumption that any alarm on that device is identification number; something that is car-
usually a false alarm. It is therefore imperative ried, such as a card or token; or something that
to repair any part of the system that is malfunc- the authorized person has, such as a fingerprint
tioning as soon as possible. Depending on the or iris (the colored part of the eye). The creden-
type of sensor that is malfunctioning, it may be tial is entered, swiped, presented, or scanned,
necessary to station an additional security offi- and, after some level of verification, access is
cer in that area or conduct additional patrols. granted or denied.
Modern alarm systems have a keypad that Access control systems come with various
operates much in this same fashion, but with the means of operation and scope from a single
addition of a communicator that allows the sig- door to many thousands of doors or alarms
nals to be transmitted offsite to another console around the world. At the small end of the access
in a neighboring facility, an alarm central moni- control spectrum is the single door keypad at
toring station, or in rare cases, to the police. Some which a person enters a code that is mechani-
modern alarm systems will spell out the location cally or electronically verified. Most access con-
of the alarm in a textual format. As long as the trol systems use a card-based credential, which
naming convention is consistent across the sys- is swiped or presented to an electronic reader to
tem and all officers are trained in how to locate gain access. These systems can be used across
an alarm that is spelled out, this can be a very just a few doors to many thousands of doors
cost-effective method of monitoring a facility. and sensors connected via the company’s com-
Fixed graphical alarm panels will show an puter network. The most secure access control
outline of the facility and critical areas being systems utilize a biometric authentication pro-
monitored within. When an alarm is generated, cess. Biometrics entails using something that is
it is much easier to find and locate the alarm part of the person for verification of identity,
because the alarm is shown relative to the lay- such as fingerprints, hand geometry, vein pat-
out of the facility. Computer-based graphical tern recognition, voice print, and iris recogni-
alarm panels will also show the facility, but tion. Biometrics can be used as the sole means
can be modified as the facility or the system of verification, but are frequently used in con-
expands in scope and coverage. junction with a card reader.
Another main component of medium- to
large-sized access control systems is the distrib-
Access Control Systems uted processor, sometimes referred to as a field
Access control systems are based on the controller. This computer is installed between
premise that issuing keys to all employees the main computer and the card reader at the
who need them is generally not cost-effective. door and communicates back to the main com-
Another premise of an access control system is puter only when necessary, such as to request
that it would be cost prohibitive to rekey the updated information about card holders or
facility should a key be lost. Finally, an access when there is an alarm. The distributed proces-
control system can limit employee access; sor makes all of the decisions as to granting or
allowing them entry only to areas in which they denying access to a person who presents their
are authorized, or granting entry during certain card at the card reader, therefore taking the pro-
times of day. cessing load off the main computer and allow-
An access control system uses a means of ing the entire system to operate faster. The
verification, known as a credential, to allow a distributed processor also allows the system to
person to enter an area. The credential can be continue to operate if the connection back to the

II. COMMUNICATIONS
TYPES OF MONITORING SYSTEMS 93
main computer is interrupted. Typically, distrib- that allows the application to show building
uted processors control between 2 and 16 doors layout or to import floor plans from another
and allow for the connection of various sensors, application. Thus, all activity in the system is
just like a regular alarm system. Distributed presented on a single screen. Automatic actions
processors can communicate to the main com- for certain events can be programmed into such
puter via a communications protocol such as a system, such as calling up a particular camera
RS-232 or RS-485, although an increasing num- when a door goes into alarm.
ber of systems are now being connected to a
company’s internal computer network (intra-
net). Newer systems are taking the network
Fire Alarm Systems
connection all the way down to the card reader Of all the alarm systems, it is most critical for
at the door. Other systems use a Web-based security officers to understand the basic opera-
interface for programming the system and can tion and interaction of fire alarm systems. Fire
communicate down to the distributed proces- alarm systems are regulated by building and
sor via the network or through the wireless data fire alarm codes adopted by the municipality
network available from cell phone companies. in which the facility resides. Because different
The main computer in an access control municipalities may adopt different codes, how
system can be a simple desktop computer for a system operates or is installed at one location
small systems up to redundant mirrored serv- might be quite different at another location. As
ers for very large systems, or any combination fire alarm systems are so essential for the safety
in between. In smaller systems, the computer is of the employees and the well-being of the
used for entering cardholder information and facility, it is critical to have a thorough working
programming the system, whereas in larger knowledge of the operation of the system and
systems there may be multiple computers dedi- the security officer’s role in its successful use. It
cated to programming and photo badge cre- is also very important to understand the proper
ation or monitoring and controlling the various operation of the system and expectations of the
alarms and doors connected to the system. In fire department.
the largest systems the desktops communicate Fire alarm systems typically have a main
to a server, which is a high-speed computer able control panel with a display. If necessary, addi-
to perform several thousand operations per sec- tional displays can be installed in other areas.
ond: essential for controlling the flow of data Larger systems may incorporate a graphical
back and forth across a large access control sys- display of the facility and locations of the vari-
tem. In some cases, a secondary server is kept ous sensors therein. Where the alarm must be
on standby to act as a reserve to the primary monitored offsite, a communicator or dialer is
server should it fail or need periodic mainte- installed to allow the fire alarm to send alerts
nance. When this secondary server is receiving to an alarm company central station or, in some
the same updates at almost the same time as the rare cases, to the fire department.
primary server and can automatically take over Like intrusion alarm systems, fire alarms
the processing load, it is said to be redundant can be connected with a number of devices
or mirrored. on a zone. Newer, larger fire alarm systems
Access control systems can be used to moni- (and intrusion alarm systems as well) utilize
tor alarms, such as door alarms, duress buttons, a multiplex loop, where all of the devices are
or environmental situations (high or low tem- connected on the same loop, with each device
perature, sump pump, water level). The control having its own unique identifier or address.
systems typically contain a graphical interface This type of system is known as a multiplex or

II. COMMUNICATIONS
94 8. CENTRAL ALARM STATIONS AND DISPATCH OPERATIONS

addressable system. The largest fire alarm systems the central monitoring station, dispatchers can
integrate dozens or hundreds of control panels control these cameras at will, in order to focus on
across several facilities, with a dedicated main locations or individuals that require close obser-
computer in the company command center for vation at a given time. These cameras can also be
monitoring. set up to focus on a series of locations, one after
another, each for a preset length of time.
CCTV cameras generally incorporate a
Building Automation Systems (BAS) method of recording the images they monitor.
Building automation systems operate much This allows protection officers to revisit images
the same, and in a similar configuration, as to verify descriptions of individuals and events,
access control systems. Building automation and also to retain those images for use as evi-
systems control heating, ventilating and air con- dence. At particularly sensitive locations, video
ditioning (known collectively as HVAC), as well may be recorded on a continuous basis, but this
as lights. More expansive systems can assist in very quickly consumes a great deal of data stor-
controlling elevators, escalators, and irrigation age space. Cameras that are integrated with
systems. Building automation systems may other sensors—intrusion sensors, for example—
integrate with, or share the same software and can be set up to focus on a specific area and
hardware as, an access control system. begin recording when an alarm is received from
the associated sensor. A dispatcher typically has
the ability to begin and end a video recording
Closed-Circuit Television Systems (CCTV) at any time and to take a single snapshot image.
Closed-circuit television (CCTV) systems Images have typically been stored on video
allow dispatchers to watch over a large number cassettes, in either real time or time-lapse for-
of areas at once. They provide an excellent (and mat (Ruiz, 1999). However, the current trend
cost-effective) way to monitor high-sensitivity is for image files to be digitally stored onto
and high-risk locations at all times, without computer hard disk drives either using digital
needing to post a protection officer at those video recorders, (DVR), or with several drives
locations. The cameras used may be easily vis- together, or onto large capacity storage devices
ible to the public or they may be hidden to the known as network attached storage (NAS) or
point of near-invisibility, depending on the needs storage area networks (SANs). It is possible to
of the organization and the locations at which connect the hard disk drives into a configura-
they are stationed. tion known as a redundant array of indepen-
From the central monitoring station, a dis- dent disks, or RAID. Such a configuration has
patcher may be able to view up to 16 separate the capability of either manually or automati-
images in real time on a single monitor (Nelson, cally backing up drives so that the failure of
1999). Alternatively, he or she may view a single any one drive does not result in the loss of all
image at a time, and switch to other images on recorded data. Other options for exporting
demand or at preset intervals. The video images images include CD-ROM compact disks, digital
may be in color or black-and-white format. video disks, or even USB flash drives.
According to Nelson (1999), color images are
better for identification purposes, while black-
and-white images have better performance in
Integrated Systems
low light. Cameras may be stationary, but those As security and fire alarm systems become
with pan, tilt, and zoom capabilities can easily more expansive in scope and operation, it is
be installed wherever they are necessary. From sometimes necessary to link the systems together

II. COMMUNICATIONS
TYPES OF SENSORS 95
under one controlling piece of software or appli- ● Glass break sensors. When a pane of glass
cation. Other times it is necessary to link various breaks, it emits sound waves in a specific
systems together, such as human resources sys- frequency. Glass break sensors are able to
tems, parking applications, and payroll systems, pick up this frequency and generate an alarm
so that there is greater functionality and more in response. They are particularly useful
accurate information flowing automatically near windows and glass doors (J. Russell,
between those systems. Such systems are generi- personal communication, July 8, 2009).
cally referred to as “integrated systems.” ● Motion sensors. Microwave sensors send
waves of electromagnetic energy back and
forth within an area. If an intruder enters,
TYPES OF SENSORS the energy is interrupted, and the sensor
generates an alarm. Passive infrared sensors
All security, fire, and other alarm systems detect the body heat of an intruder and
incorporate a wide variety of sensors at vari- generate an alarm in response. Ideally, an
ous points throughout a protected facility. The area will be protected by dual-technology
basic purpose of a sensor is to detect a physi- sensors. These combine microwave and
cal change in the environment, interpret what infrared technology into one sensor,
event might be taking place, and transmit that increasing the reliability of the system and
information back to a central processor where it decreasing the number of false alarms
is translated into a format that can be read by transmitted to the monitoring station
the dispatchers in the central alarm station. (Morris, 2003).
● Electric eye. This type of sensor consists
of a transmitter, which generates infrared
Intrusion Sensors light in a straight line, and a receiver
directly opposite the transmitter. When
Intrusion sensors are meant to determine
the beam of light is broken by an intruder,
whether an unauthorized person has accessed,
an alarm is sent to the central processor.
or attempted to access, a protected area (Garcia,
Electric eyes have declined in popularity
1999). Various types of sensors can be placed
due to the availability of motion detectors
around the perimeter of a facility, around a
with greater reliability (J. Russell, personal
smaller area within the facility, or on a particu-
communication, July 8, 2009).
lar spot or item (Morris, 2003). They typically ● Seismic sensors. These are able to pick up
incorporate a short delay prior to generating an
vibrations on a surface and when a certain
alarm, in order to allow an authorized person
vibration threshold is reached, an alarm is
to deactivate the system without sending a false
generated. Seismic sensors may be placed on
alarm to the monitoring station. Types of intru-
floors in order to detect a walking intruder,
sion sensors include:
or on walls or doors, to detect an attempted
● Magnetic contact switches. These are placed break-in (J. Russell, personal communication,
on doors, windows, and other potential July 8, 2009).
access points. Typically, the first part of the ● Pressure sensors. These detect the weight
mechanism is placed on the frame and the of a person or object. If an intruder steps
second part is placed on the movable portion on a pressure mat, the change in surface
of the access point. When the access point is weight activates an alarm. Alternatively, a
opened, the magnetic signal is interrupted pressure switch may be placed underneath
and the sensor generates an alarm. an object at risk of theft or removal. Again, if

II. COMMUNICATIONS
96 8. CENTRAL ALARM STATIONS AND DISPATCH OPERATIONS

an intruder removes the object, the change in not be programmed to unlock the door, as
surface weight triggers an alarm. this allows the door to be unlocked from the
● Panic and duress alarms. These are switches outside without a key or card.
that must be manually activated by a staff ● Keypad locks. These devices require
member when he or she is threatened by an an employee to input a numeric code in
intruder or other emergency. Typically, they order to bypass the locking mechanism.
are utilized in high-risk or high-sensitivity Because codes can be easily transferred to
areas and are hidden from the general unauthorized persons, these locks are often
public. Alternatively, handheld wireless used in conjunction with other access control
panic alarm triggers may be issued directly measures.
to employees (Morris, 2003). ● Magnetic strip readers. An employee is
issued a card with a magnetic strip, which
is embedded with numerical data. The
Access Control Sensors employee swipes the card through the
reader, which uses that data to verify his
Access control sensors may be used to detect
or her authorization for access (J. Russell,
unauthorized access to a facility, and to gener-
personal communication, July 8, 2009).
ate security alarms in response. However, they ● Proximity card readers. Proximity cards are
may also be used to grant access to authorized
also embedded with a numeric identifier.
personnel when presented with the proper cre-
The staff member waves the card near the
dentials. Several types of access control sensors
reader, which utilizes radio frequencies to
are often used at a single entry point in order to
receive the data, which is sent to the field
provide multiple layers of security:
controller. The field controller verifies the
● Magnetic contact switches. These operate in card and grants or denies access accordingly
the same manner as they do when applied to (Best, 2003).
intrusion detection systems. These switches ● Wiegand card readers. A Wiegand card
are able to detect whether a door is open contains specially treated wires with a
or closed; if the door is opened without unique magnetic signature. A sensing coil
presentation of a proper credential, a forced inside the reader receives the data contained
door alarm will be generated (J. Russell, within the employee’s card (Best, 2003). The
personal communication, July 8, 2009). card can either be swiped or passed through,
● Request-to-exit devices. Also known as REX depending on the design of the reader.
switches, these are sometimes embedded ● Biometric readers. These detect the unique
into the crash bar or doorknob on the interior characteristics of parts of a person’s body in
of a door. A motion sensor may also be used order to verify his or her access privileges.
as a request-to-exit device when mounted Biometric readers include fingerprint scanners,
above the door, to sense a person traveling handprint scanners, retinal scanners, facial
toward the door to exit. When the door is recognition, and voice recognition.
opened properly in order to exit an area, the
REX switch is triggered and bypasses the
Fire Alarm Sensors
magnetic contact switch, avoiding a false
alarm. However, if the door is left open for The ability of fire to devastate lives and prop-
an extended period of time, a held door erty should never be underestimated. Fire alarm
alarm will be generated. Unless there is a sensors seek to prevent significant damage by
requirement to do so, REX devices should detecting fires in their earliest stages, allowing

II. COMMUNICATIONS
TYPES OF SENSORS 97
protection officers and fire officials ample time or combustion particles. They typically
to respond. Fire alarm sensors include (J. Russell, incorporate ultraviolet light sensors, infrared
personal communication, July 8, 2009): light sensors, or visible light sensors.
● Pull stations. These switches are
● Heat detectors. These measure changes strategically placed throughout a protected
in a room’s ambient temperature. They facility, and when a person observes fire or
are programmed to a certain baseline smoke, he or she is encouraged to manually
temperature and when the room’s pull the nearest switch, triggering a fire
temperature exceeds the baseline, a fire alarm and speeding evacuation of the
alarm is triggered. area. Unfortunately, pull stations are easily
● Photoelectric smoke detectors. This type of abused. To activate a pull station in order
detector contains an electric eye, generating to cause a false public alarm is a criminal
a beam of infrared light within its housing. offense in most jurisdictions; therefore,
When smoke enters the detector, it refracts protection officers responding to such
that infrared light, and an alarm is triggered alarms should be prepared to enforce their
in response. organization’s relevant policy or involve
● Ionization detectors. These devices contain local law enforcement as appropriate.
a tiny amount of radioactive material, which
creates radiation in an ionization chamber.
Any smoke that enters will absorb some of Building Automation Sensors
the radiation and change the electrical charge Building automation sensors are typically
within the chamber, prompting the device used to measure and adjust the heating, ven-
to send an alarm signal to the monitoring tilation, air conditioning, lighting, and other
station. environmental conditions in a protected facility.
● Air sampling detectors. These are often They include:
used to protect rooms filled with sensitive
equipment, such as computer servers. They ● Gas detectors. There are several different
continuously take in air from the room types of gas detectors, each of which will
and analyze the air samples for smoke or measure the levels of a particular type of
combustion particles. If a positive result is gas in the air (such as natural gas, carbon
received, the detector generates an alarm monoxide, carbon dioxide, and radon). If the
and in many cases, immediately causes a fire gas levels exceed a preset tolerance, an alarm
suppressant to be discharged within the room. is generated.
● Beam detectors. These utilize an electric ● Level indicators. These are often applied
eye, which extends a beam of infrared light to tanks that hold liquids or gases that are
across an entire room, rather than within critical to a facility’s operation. When the
the housing of a photoelectric detector. They amount of liquid or gas in the tanks drops
are most often used in rooms with very below a preprogrammed level, a notification
high ceilings, where it would be impractical can be sent to the central monitoring station
to install and maintain a smaller detector. or to personnel who will refill the tanks
Again, the beam of light will be refracted (J. Russell, personal communication, July 8,
by smoke in the room and an alarm will be 2009).
triggered. ● Temperature sensors. As the name suggests,
● Flame detectors. These are able to spot these measure the ambient temperature in a
actual flames, rather than sense smoke room. They are often utilized in rooms where

II. COMMUNICATIONS
98 8. CENTRAL ALARM STATIONS AND DISPATCH OPERATIONS

scientific experiments are being conducted ● Motion sensors or Video Motion Detection
and the temperature must be kept extremely (VMD). Certain types of motion sensors
hot, extremely cold, or within a specific can be incorporated directly into a CCTV
range. If the temperature falls out of the camera. These typically utilize a reference
pre-set range, an alarm is triggered. image, which is compared to the image
● Power failure sensors. These are integrated currently being picked up by the camera,
with the electrical system of a facility. When in order to detect whether the image has
a power failure occurs, a notification alarm changed significantly (J. Russell, personal
can be sent to the central monitoring station. communication, July 8, 2009).
At the same time, devices such as backup ● Facial recognition. This biometric technology,
generators and emergency lights can be when integrated with sophisticated CCTV
automatically activated. cameras, can identify potentially dangerous
● Integrated sensors. Some of the same individuals by comparing a face with wanted
devices used to detect intruders—magnetic person lists or terrorism watch lists. They
door switches and motion sensors, are most often utilized by law enforcement
for example—can be integrated with officials at immigrations checkpoints, such as
lighting systems. In this way, lights can be airports (Best, 2003).
programmed to turn on automatically when
a staff member enters a darkened room.
TRANSMISSION MEDIA

When an alarm sensor detects an event that


Closed-Circuit Television Sensors warrants a protection officer’s attention, it imme-
Closed-circuit television cameras themselves diately transmits a message back to the central
can be considered sensors because they receive monitoring station. A transmission medium is
visual images and transmit them back to the simply the method by which that message is car-
central monitoring station. However, human ried. Signals may be carried by a variety of solid
eyes alone are not the most reliable detectors materials, or may pass through the air itself.
when it comes to CCTV systems (Garcia, 1999), ● Copper wire. This type of material is
particularly when they may be focused on up to
extremely common throughout the alarm
16 images on a single monitor. For this reason,
industry. Intrusion and fire alarms can
additional sensors are usually integrated into a
be transmitted through copper cables
CCTV system:
specifically geared toward alarm systems;
● Integrated sensors. The majority of CCTV however, they are frequently transmitted
sensors are not incorporated into the camera through traditional telephone lines,
unit itself. However, CCTV systems can be which are also usually made of copper. A
integrated with a wide variety of sensors from disadvantage of copper wire is that it can
other systems, including intrusion detection, be cut or otherwise damaged, interrupting
access control, and fire detection. For example, the transmission of vital signals. However,
if a bank teller triggers a panic alarm, the a major advantage is that it is continuously
bank’s cameras can be programmed to zoom monitored by the alarm system if properly
in on his or her location and begin recording installed, so that if such damage occurs,
immediately. At the central monitoring station, the central monitoring station will be
an additional alarm may draw the dispatcher’s immediately notified (J. Russell, personal
attention to the relevant camera images. communication, July 8, 2009).

II. COMMUNICATIONS
VISITOR MANAGEMENT SYSTEMS 99
● Optical fiber. This type of material is number of visitors each day as part of their nor-
increasing in popularity at a rapid pace. It mal operations. Personnel at the front office or
was once far more expensive to install a fiber security office must fulfill two functions: first,
optic network than a copper one, but like they must determine whether or not to allow a
most technological innovations, fiber optics visitor access to the building. Second, they must
are dropping in price. Copper wire carries keep a log of all visitors who have arrived and
signals in the form of electricity; optical fiber departed.
carries signals in the form of light, which is less In the past, organizations typically relied
inherently dangerous. Additionally, optical on a paper sign-in sheet at the building’s main
fiber is able to carry larger amounts of data at a entrance. A visitor would write his or her name,
faster rate than copper wire. Both transmission time of arrival, specific destination within the
media can be cut or damaged, but like copper building, and purpose of the visit on the sign-in
wire, optical fiber is continuously monitored, sheet. Personnel at the desk would verify the
so the central monitoring station will be made visitor’s identity, ensure that he or she had per-
aware as soon as this occurs. mission to enter the building, and in most cases,
● Radio transmission. This method utilizes the issue a temporary identification badge for the
air as its transmission medium. Alarm signals visitor to wear while on the premises. The visitor
are sent via a certain radio frequency from would then be required to sign out when exiting
point A directly to point B. This solution can the building. This type of procedure is still in
cover a much longer distance than copper place at many organizations, especially smaller
wire or optical fiber. A drawback with some ones, due to its simplicity and low cost.
radio systems, however, is that the signal However, for many larger organizations,
is prone to interference from trees, other electronic visitor management systems prove
objects, or competing radio signals (J. Russell, safer and more cost-effective because staff mem-
personal communication, July 8, 2009). bers no longer need to spend time logging visi-
● Cellular transmission. Cellular signals are tors in and out, and personally clearing each
similar to radio signals; in fact, they operate one through applicable unwanted person data-
within the radio frequency spectrum. The bases (Savicki, 2007). Such solutions greatly
difference is that cellular signals are transmitted increased in popularity after September 11,
at a higher frequency within that spectrum. 2001. A typical electronic visitor management
Additionally, they utilize cell towers that are system consists of a kiosk at the building’s
capable of digitally processing, sending, and entrance, an attached printer, and software that
receiving the signals over a wider area than links the kiosk to the front office or security
traditional radio signals. Unfortunately, this office. A visitor approaches the kiosk and enters
transmission medium is not continuously his or her personal information or presents his
monitored; therefore, in fire alarm systems, it or her driver’s license for the machine to read.
can only be used as a backup method, rather The purpose of the visit must also be provided
than a first line of defense (J. Russell, personal (Moorhouse, 2008). The kiosk may check the
communication, July 8, 2009). individual through applicable state and national
databases—sex offender registries are typically
utilized in school settings—as well as organi-
VISITOR MANAGEMENT SYSTEMS zationally defined unwanted person databases.
If the visitor is not cleared, he or she is issued
Several organizations—large office build- a voided identification badge and appropriate
ings and schools, for example—receive a large staff members are notified automatically to take

II. COMMUNICATIONS
100 8. CENTRAL ALARM STATIONS AND DISPATCH OPERATIONS

further action (Savicki, 2007). If the visitor is switch between functions quickly and easily.
cleared, the kiosk prints an identification badge Typically, the operator will be equipped with a
for him or her to wear on the premises, which headset, in order to move about the station and
includes a facial photograph, the date, time, keep both hands free while communicating with
and purpose of the visit (Moorhouse, 2008). An a caller. The system may incorporate several
added benefit is the ability of staff members to incoming emergency lines and several incom-
easily search the software database for detailed ing nonemergency lines, which would likely be
information on previous visitors. shared by all telephone consoles at the station.
It is also possible to integrate a visitor man- Each console would also have access to its own
agement system with a building’s access con- line for outgoing calls. Alternatively, all emer-
trol system. For example, the card printed by gency calls may be routed to a dedicated “red
the kiosk may be programmed with certain phone” in the station, eliminating the need to
electronic credentials, which would allow the place an emergency caller on hold while brief-
bearer to enter authorized doors by swiping ing police, fire, or emergency medical services
the card or presenting it to an electronic reader. (Thibodeau, 2003). It is common for all tele-
Alternatively, frequent visitors may be issued a phone calls, incoming and outgoing, emergency
permanent card or tag, which can be presented and nonemergency, to be automatically recorded
to the kiosk when entering or exiting the build- and archived for supervisors to refer to later.
ing, without necessitating a new identification In agencies with very advanced technology,
card for each visit (Savicki, 2007). telephone systems may be integrated with a
variety of other systems in the central station.
For example, it is possible to connect certain
COMMUNICATIONS telephone software with certain computer-aided
dispatch software and geographic mapping
Communications equipment plays a huge role software. In these situations, the central station
in the successful resolution of alarms, criminal may receive an emergency call, and the location
and policy violations, emergency situations, and, provided by the caller ID may be automatically
of course, customer service. In a modern central highlighted on a computerized map. The loca-
monitoring and dispatch station, communication tion might then be automatically imported into
takes many forms. However, the vast majority of the computer-aided dispatch software when a
communication is performed verbally, through new event is created by the operator.
telephone lines and radio channels. Organizational policy varies with regard to the
A modern telephone system in a central usage of cellular phones by protection officers in
station will incorporate many technological the field. When they are permitted, they can be
advances available to the general public, such as very useful tools for relaying information back
caller ID, preset number dialers, and the ability and forth that is sensitive but nonemergency in
to place callers on hold or transfer them to other nature. At the very least, it is common for a patrol
lines. However, the system should also be tai- supervisor to be equipped with an organization-
lored for use by emergency service personnel. issued cellular phone for this purpose.
The system’s interface may be a series of Radio systems are equally as important as
physical keys on what looks like a very large telephone systems in both emergency and non-
telephone base, or it may be integrated with emergency situations. They are the most fre-
touchscreen software, to allow the operator to quently used method by which field officers

II. COMMUNICATIONS
CONCLUSION 101
communicate with their dispatchers and with messages—to be sent and received. Certain digital
each other. A modern radio system interface, radio systems can even be integrated with certain
like that of a modern telephone system, may computer-aided dispatch software, which can
consist of a set of keys or may incorporate a communicate via text with individual radio units.
touch screen for ease of use. The same headset
used by the operator for telephone communica-
tion will often be integrated with the station’s CONCLUSION
radio system as well. Additionally, the cen-
tral station should be equipped with software Remember: the most important component
enabling an operator to see the name or ID of of a central monitoring and dispatch operation
a handheld or mobile unit; to page, activate, or is you, the protection officer assigned to the sta-
deactivate an individual unit; to acknowledge tion. Cutting-edge technology is no substitute for
emergency signals received; and to perform an individual with good communication skills,
maintenance functions. sound judgment, knowledge of department pol-
The radio system will typically be capable of icy, and proper and up-to-date training.
monitoring and transmitting on a large number After completing the initial department-
of channels simultaneously. These may consist approved courses and on-the-job training, it
of the primary channel, an emergency channel, is important to continue growing as a profes-
a tactical channel, maintenance and custodial sional. This is achieved in part by studying
staff channels, and many more. Direct monitor- current departmental policy and seeking con-
ing and transmitting on local police, fire, and tinuous feedback from coworkers and super-
emergency medical channels is also possible. visors. However, in order to keep up with
A two-way radio operates in either simplex or industry developments and open up additional
duplex mode. In simplex mode, a radio transmits training opportunities, it is often wise to turn to
and receives messages on the same frequency a professional organization.
and communicates directly with other radios. In The International Foundation for Protection
duplex mode, a radio transmits and receives mes- Officers is an excellent starting point. Their
sages on two different frequencies. This mode Certified Protection Officer program is extremely
also incorporates a repeater. A repeater is sim- beneficial to officers both in the field and at the
ply a stationary device, attached to an antenna, central console. Several organizations exist, how-
which receives a radio message, amplifies it to ever, which provide more specialized opportuni-
increase its range, then retransmits the message ties for dispatchers and monitoring personnel.
to its destination. Duplex mode is far more com- The Association of Public Safety Communications
mon than simplex mode in this day and age. Officials (APCO) and the National Emergency
Radio equipment can be either analog or digi- Number Association (NENA) provide continu-
tal. Analog equipment has been in use for many ing education programs and advocacy for dis-
years. It tends to be less complicated than digital, patchers in the public and private sectors. The
and is therefore less expensive to purchase and National Burglar and Fire Alarm Association
maintain. It also tends to be more compatible (NBFAA), the Security Industry Association (SIA)
with existing radio systems. Digital equipment and Central Station Alarm Association (CSAA),
allows for a larger number of officers to talk provide similar services, but are geared toward
at once on the same channel. It also allows the life safety and security alarm monitoring end
for different types of data—for example, text of the spectrum.

II. COMMUNICATIONS
102 8. CENTRAL ALARM STATIONS AND DISPATCH OPERATIONS

EMERGING TRENDS
● As we have seen, many different types of organizations, analog systems provide
alarms can be integrated with each other to plenty of functionality at a greatly reduced
achieve optimal results. Likewise, telephone cost. While digital equipment is on the
and radio systems can be integrated with rise, analog equipment is far from
computer-aided dispatch software and a obsolete.
variety of other software packages. The ● Text-based communication has been
ability to integrate is highly valued, and as utilized among protection officers for
technology improves, the ability will continue years, incorporated into the mobile data
to become more widespread. terminals installed in many police and
● Plain language radio transmission is rapidly security vehicles. It has also been utilized
becoming the preferred protocol for many in telecommunications devices for the deaf,
organizations, rather than the use of 10-codes which allow the hearing-impaired to quickly
and other codes to denote certain types of call for emergency assistance. However,
events. This is because plain language makes very recently, a call center in Iowa became
it far easier to cooperate with other agencies the first in the nation to accept emergency
during emergency situations. text messages to 911 (Svensson, 2009). This
● Digital radio systems are becoming more capability is likely to be adopted by many
widespread, thanks to their enhanced more emergency call centers in the near
voice and data transmission capabilities, future. Whether or not similar technology
and the potential for integration with will become popular in the private sector
software applications. However, for many remains to be seen.

References Garcia, M. L. (1999). Security systems design and evalua-


tion. In S. J. Davies & R. R. Minion (Eds.), Security super-
Abrams, R. (2003). Central alarm stations and dispatch cen- vision: Theory and practice of asset protection (2nd ed.)
ters. In: Protection officer training manual (7th ed.) (pp. (pp. 236–254). Burlington: Elsevier Science.
93–95). Burlington: Elsevier Science. Institute of Electrical and Electronics Engineers. (2009). IEEE
Best, C. (2003). Access control. In: Protection officer training history center: Milestones chronological listing. Retrieved from
manual (7th ed.) (pp. 96–102). Burlington: Elsevier Science. http://www.ieee.org/web/aboutus/history_center/
Ellis, J. (2007). Proprietary central alarm monitoring stations in milestones_alpha.html.
modern security management operations (Master’s thesis, Moorhouse, E. (January 20, 2008). Kiosks guard the lobbies
Webster University, 2007). at Lenape district’s high schools. The Burlington County
Fischer, J. (2008a). Who was Augustus Russell Pope? CSAA Times. Retrieved from http://www.phillyburbs.com/
Signals, 14(3). Retrieved June 30, 2009, from http://www pb-dyn/news/112-01202008-1474276.html.
.csaaul.org/AugustusRussellPope.html. Morris, C. (2003). Alarm systems fundamentals. In
Fischer, J. (2008b). Our father’s beginning. CSAA Signals, Protection officer training manual (7th ed.) (pp. 87–92).
14(4). Retrieved June 30, 2009, from http://www.csaaul Burlington: Elsevier Science.
.org/EdwinHolmes1.html. National Communications Institute. (2001). Carter, C. D. (Ed.).
Fischer, J. (2008c). Protecting the protection? CSAA Signals, In Basic communications officer: Student’s course guide (4th
14(5). Retrieved June 30, 2009, from http://www.csaaul ed.). Gainesville, FL: Georgia Design and Graphics.
.org/BirthofCentralStationIdea.html. Nelson, L. A. (1999). Designing operations centers. In S. J.
Fischer, J. (2008d). The central station evolves. CSAA Signals, Davies & R. R. Minion (Eds.), Security supervision: Theory
14(7). Retrieved June 30, 2009, from http://www.csaaul and practice of asset protection (2nd ed.) (pp. 277–279).
.org/BirthofADT.html. Burlington: Elsevier Science.

II. COMMUNICATIONS
SECURITY QUIZ 103
Ruiz, H. C. (1999). Security technologies. In S. J. Davies & from http://www.eee.strath.ac.uk/r.w.stewart/boxes
R. R. Minion (Eds.), Security supervision: Theory and prac- .pdf.
tice of asset protection (2nd ed.) (pp. 263–271). Burlington: Svensson, P. (August 5, 2009). Iowa 911 call center
Elsevier Science. becomes first to accept texts. ABC News. Retrieved from
Savicki, M. (April 26, 2007). School uses high-tech check- http://abcnews.go.com/Technology/wireStory?id
point for visitors. The Charlotte Observer. Retrieved from 8259735.
http://www.lobbyguard.com/news/charlotteobserver- Thibodeau, C. T. (2003). Effective communications. In
20070426.htm. Protection officer training manual (7th ed.) (pp. 166–170).
Stewart, R. W. (1994). The police signal box: A 100 year Burlington: Elsevier Science.
history (University of Strathclyde, 1994). Retrieved

S EC U RI T Y QU IZ 6. The 10-codes are used to assist with rapid


transmission of radio communications.
1. Magnetic contact switches, motion sensors a. True
and glass break sensors are examples of what b. False
kind of sensors. 7. Access control sensors may be used to
a. Access control detect unauthorized access to a facility, and
b. Building automation to generate security alarms in response.
c. Closed circuit television Which of the following is not one of those
d. Intrusion access control sensors:
2. Magnetic stripe, wiegand, proximity and a. Magnetic contact switch
biometric are examples of access control b. Network attached storage device
readers. c. Keypad locks
a. True d. REX or request to exit device
b. False 8. A transmission medium is simply the
3. An advanced radio dispatch system may method by which an electronic message
consist of the following: is carried. Signals may be transmitted in a
a. Touch screen interface variety of ways. Which of the following is
b. Voice recording not one of those mediums used to transmit
c. Remote paging electronic messages:
d. All of the above a. Copper wire
4. A main component of a medium to b. Fiber optics
large access control system is the c. Cellular Transmission
following: d. None of the above
a. Access control 9. A smoke detector is a device to manually
b. Distributed processor initiate a fire alarm
c. Card data a. True
d. Field b. False
5. Network Attached Storage (NAS) and 10. Gas, temperature and power failure are
Storage Area Networks (SAN) are examples examples of which of the following sensors:
of Large capacity storage devices used with a. Access control
video surveillance systems. b. Building automation
a. True c. Closed circuit television
b. False d. Fire alarm

II. COMMUNICATIONS
This page intentionally left blank
U N I T III

PROTECTION OFFICER
FUNCTIONS

9 Automation in Protection Operations


10 Patrol Principles
11 Traffic Control
12 Crowd Management and Special Event Planning
This page intentionally left blank
C H A P T E R

9
Automation in Protection
Operations
Kevin E. Peterson

today. We feel that this information is beneficial and


CHAPTER OBJECTIVES supports the purpose of the book. It does not repre-
● Provide a historical perspective on sent an endorsement of any particular product or
automation in the protection industry vendor by the author, the publisher, or IFPO.)
● Explain the proper application of
automation in the protection officer’s
sphere of responsibilities HISTORICAL PERSPECTIVE
● Describe different types of technology
The security industry in the United States
applications that support protection
was born in the mid-1800s and grew rapidly
operations
with the establishment of innovative compa-
● Identify emerging roles for protection nies such as the Pinkerton Detective Agency
officers with regard to automation and Wells Fargo. These companies provided a
● Emphasize the need for appropriate variety of services such as investigations, exec-
education and training in information utive protection, guard forces, and counterintel-
technology and security automation ligence. The innovations of that time included
as part of a well-rounded professional such techniques as mug shots, handwriting
development strategy for protection analysis, and criminal information databases
professionals (ASIS International, 2006, pp. 6–7).
In the late 1800s and early 1900s, security
providers focused much of their attention on
labor unrest. Although some changes in the
(Note: In this chapter we mention a number of industry occurred during this time, such as
specific products and product/service providers. This state and federal regulation of security compa-
is meant to present the reader with a general view nies and increased “professionalization” of these
of the types of products, services, and providers that firms (e.g., the use of written contracts, sales
are available to security and protection professionals staffs, and a formal command structure), the

107
108 9. AUTOMATION IN PROTECTION OPERATIONS

services themselves remained largely low-tech, A number of studies in recent years have
focusing on armed guards and facility protec- projected massive expansion of electronic secu-
tion (Smith, 2003). rity systems employing advanced technologies,
The next major jump in security services but they also concluded that the human element
occurred as World War II approached and the (i.e., security officers) will not be predominantly
defense industrial complex emerged. The field replaced by technology (Webster University,
of “industrial security” was established to meet 2009). This conclusion is particularly interest-
the needs of the federal government in manag- ing, and profound, since some of those studies
ing security requirements for defense contrac- were funded by security systems vendors.
tors. The “industrial security” era resulted in Nonetheless, technology can and should be
a wide array of new security-related technolo- exploited by the security services industry—-
gies, concepts, and procedures—and an increase and this will require officers and supervisors
in the use of security officers. Existing security who are well rounded in technology applica-
providers opened specialized divisions and new tions. Some of these applications are discussed
providers were established to meet the need. in the remainder of this chapter, according to
Despite these innovations and forward-looking the primary functions they perform.
companies, many people viewed the security
industry as nothing more than night watch-
men, even up to and through the 1960s. Over CONTEMPORARY SECURITY
the next three decades, the use of security offi- ENVIRONMENT
cers became more prevalent. Ironically, one rea-
son for this may have been the development of Today, an increasing number and variety of
security technology such as electronic access technology applications support security func-
control and surveillance systems. For example, tions. The most relevant of these applications,
these technologies led to the establishment of from the perspective of the professional protec-
security operations centers (or command cen- tion officer, are listed below.
ters), which created a new function for protec-
tion professionals.
During these years, computer and commu-
Incident Management Systems
nications technologies developed rapidly and Few would argue that one of the most tedious
permeated virtually every type of business as tasks for the protection officer is report writing.
well as our personal lives. However, the secu- Originally, incident management systems simply
rity services industry is generally perceived as changed the task of writing a hardcopy report
having been slow to embrace technology in the into a computer-based function where officers
performance of their mission. would enter the same data into a computer using
The terrorist attacks of September 11, 2001, a word-processing-like program. One of the
brought new and intense attention to the secu- benefits of this change was that users of these
rity industry in both the public and private sec- reports no longer had to deal with issues such
tors. One of the benefits of this attention was the as poor handwriting and missing pages. Data
development and implementation of new and entry, however, was awkward, formats were
improved security technology applications. cumbersome, and it was difficult or impossible
Essentially, it gave a “shot in the arm” to secu- to include attachments, diagrams, and sketches.
rity budgets and made it easier for security pro- The functionality of incident management
fessionals to justify innovations in equipment, systems expanded rapidly and developed into
tactics, and techniques. more integrated tools such as IRIMS (Incident

III. PROTECTION OFFICER FUNCTIONS


CONTEMPORARY SECURITY ENVIRONMENT 109
Reporting and Information Management Sys- ● Stand-alone visitor management tools
tem), a product of a Canadian firm known as that can be linked to existing incident
PPM 2000. The product was introduced in the management systems
mid-1990s and released as a full enterprise-wide ● Stand-alone visitor management products
version in 2001. During this time, a number (independent)
of competing products such as iViewSystems ● Sophisticated, completely integrated visitor
entered the marketplace as well. management tools
The real benefit of these tools is their ability ● Simple, low-end, affordable visitor
to integrate, manage, and truly use the informa- management tools
tion not only for incident management but also
for subsequent investigations, trend analysis, Automated tools for visitor management
and strategic security planning. Unfortunately, have several advantages, including the ability to
many organizations (whether by decisions of keep a searchable record of visitors and gener-
the executive management or of security direc- ate reports based on individual, company, facil-
tors themselves) remained with the “comfort- ity, or date range. Data from these systems can
able” paper-and-pencil method, using hardcopy also support subsequent investigations when
(often handwritten) incident reports. an incident is discovered after the fact. From a
Some of the complaints regarding automated life safety perspective, some systems can report
incident management systems were a lack of who is currently in a facility, allowing protec-
user-friendliness, inability to adequately tailor the tion professionals to better account for all build-
system to the particular company using it, incon- ing occupants in the event of an evacuation.
venient report generators, and, not insignificantly, System components may include an input
that officers were not computer-savvy enough to device that can read driver’s licenses or other
effectively use the systems. Today, many of those identification cards (including photographs),
problems have been solved with new versions of cameras, badge printers, and self-service kiosks
the software or even new product lines for inci- (for larger applications). Most automated
dent management systems. For instance, most systems also allow employees to preregister
products now include extremely user-friendly expected visitors (this can usually be done
GUIs (Graphic User Interfaces) that make data through the company intranet right from the
entry straightforward and officer familiarization employee’s desktop). Another benefit is the abil-
quick. See the “Emerging Trends” box at the end ity to store records of and designate frequent or
of this chapter to learn about some of the trends repeat visitors. Both of these capabilities serve
in these systems and why they have become an to streamline entry procedures, thereby facilitat-
invaluable tool for asset protection programs in ing business operations and presenting a profes-
both the public and private sectors. sional security image for the organization.
Among popular product providers are
EasyLobby, iTrak (by iViewSystems), TEMPbadge
Visitor Management Tools (the company that first introduced self-expiring
Automated visitor management tools are paper badges), and LobbyGuard. In addition,
widely available today and should be in use by extremely affordable packages such as one
almost all types and sizes of organization. Among by Brother are available at popular office sup-
the types of visitor management tools are: ply stores. This indicates that there are visitor
management tools on the market for all types
● Visitor management modules within of users, all sizes of facilities, and at all cost
incident management systems levels.

III. PROTECTION OFFICER FUNCTIONS


110 9. AUTOMATION IN PROTECTION OPERATIONS

There is no excuse today for using a hand- Near-term plans for CAP Index include
written sign-in log as a visitor management tool. “… an ‘ultimate dashboard’ that will merge
In addition to the inefficiencies and inability to crime forecasting with site surveys and risk
electronically store and access data, hardcopy assessment, event history and loss-related
visitor logs can represent a security vulnerability. alerts …” (Groussman, 2008, p. 63). Tools like
Visitors can generally view the log while they are this should be used for strategic security plan-
signing in and see who else (individual, company, ning, making a business case for new policies
etc.) was recently in the facility. In some environ- and programs, and conducting risk assessments.
ments, that may be very sensitive information— It is extremely useful to track crime data for a
or may at least represent a privacy issue. given location over time and also be able to
compare crime levels in surrounding areas.
Crime Mapping
Another category of automation that is Geospatial Information Systems (GIS)
increasingly important to the crime prevention
Closely related to crime mapping, GIS pro-
and security communities is that of crime map-
vides a graphic view of various situations by
ping. The most well-known and respected pro-
leveraging the capability to layer information
vider of crime mapping services is CAP Index.
from different databases or inputs over a map
They refer to their primary capabilities as crime
or image. This tool is generally used for exterior
forecasting and security risk analysis. This firm
spaces (e.g., a map of a city or neighborhood),
provides several products, all based on objec-
but can also be used with diagrams, campuses,
tive crime and incident data. Among the uses
or even building interiors. The objective may be
for this type of data are:
to review historical data (such as incidents or
● Site selection—used by organizations to aid a particular type), identify patterns of activity,
in determining where to locate new facilities display sensitive locations or areas that warrant
or where to expand existing facilities based special security attention, support an investi-
in part on local crime data gation, identify traffic patterns (vehicular, foot,
● Rank and compare—the ability to compare or product), or compare any type of data with
crime statistics at different locations other data sets by location.
● Security allocation—data to assist in One example of a GIS provider is ESRI, which
determining security force deployment, staff has supported a wide variety of homeland secu-
augmentation, and resource allocation rity, law enforcement, disaster management,
● Litigation defense—crime data can be used and public safety projects. They provide com-
to justify corporate policies and procedures mercial-off-the-shelf (COTS) software as well
that may be questioned during a security- as individualized consulting and project man-
related lawsuit or other legal action agement services. The ESRI Web site states that
● Loss prediction—products can be integrated “a geographic information system … integrates
with corporate data such as shrinkage figures hardware, software, and data for capturing,
to aid in predicting losses and setting risk managing, analyzing, and displaying all forms
tolerance (thresholds) for specific retail or of geographically referenced information. GIS
other sites allows us to view, understand, question, inter-
● Return on investment (RoI)—data can be pret, and visualize data in many ways that reveal
used to justify security expenditures and relationships, patterns, and trends in the form
projected budgets for specific sites or entire of maps, globes, reports and charts.” Regarding
enterprises force protection and security applications,

III. PROTECTION OFFICER FUNCTIONS


CONTEMPORARY SECURITY ENVIRONMENT 111
the site mentions the ability to “assess security security risk management in general. Criminal
risks, develop preparedness and security plans, intelligence/criminal analysis tools are the last
and understand the impact of incidents” as key application we will cover.
benefits (ESRI, 2009). According to Marilyn Peterson, past presi-
According to an article in the Fall 2002 edi- dent of the International Association of Law
tion of Energy Currents, GIS can be used not Enforcement Intelligence Analysts (IALEIA),
only for security planning but also to develop “Criminal analysis is the application of particu-
exercise scenarios and to compare projected out- lar analytical methods to data collected for …
comes of various security solutions. Some appli- criminal investigation or criminal research” and
cations suggested by the article are comparing is “practiced in law enforcement … and in pri-
scenarios for pedestrian traffic flow and timing vate security organizations around the world”
for building evacuations, simulating “entire (Peterson, 1998, p. 1). This field, like some of
community” response to a crisis (i.e., not only those previously discussed, originated in a man-
how will you react, but how will your neigh- ual form and has now migrated to a largely auto-
bors react—and how that affects your reaction), mated process.
and modeling of toxic substance releases based One of several vendors that offers automated
on wind speed and direction. The article also solutions for criminal intelligence analysis is i2
mentions that GIS can be used to plan and/or Incorporated. They offer an “integrated suite
compare different CPTED (Crime Prevention of products that enables investigators and ana-
through Environmental Design) options for cor- lysts to quickly understand complex scenarios
porate facilities, government agencies, or com- and volumes of seemingly unrelated data, per-
munities (Shields, 2002). form analyses, and communicate the results”
The concerns of the energy and utilities indus- (i2, 2009). Their customers include law enforce-
try, and the wide variety of applications for GIS ment, government, military, and intelligence
are outlined nicely in the article as follows: users as well as commercial organizations.
Products like this help protection profession-
When disaster occurs, data becomes critical to als “connect the dots” to uncover crime trends
life and property savings. GIS shows where the gas,
and conduct complex investigations. The
water, fiber optics, and power lines are (or were).
Rescue teams need to know the location of buildings, Protection of Assets Manual (POA) lists crimi-
stairwells, and basement facilities. Safe traffic routes nal intelligence analysis as an important “force
that avoid probable leaks and live wires need to be multiplier” for investigative and security pro-
drawn. Staging areas for heavy equipment are also a fessionals (ASIS International, 2006, p. 46).
GIS concern (Shields, 2002).
Another force multiplier is the use of com-
mercial and other online databases. According
Criminal Intelligence and to POA:
Analysis Tools Anything that significantly improves the speed
and efficiency of information gathering, collation,
According to Brian McIlravey of PPM 2000, analysis, or organization is an important force multi-
“Using information about actual and prevented plier. On-line resources are such a tool and are expand-
incidents is essential to the development of effec- ing at a rapid pace (ASIS International, 2006, p. 71).
tive security safeguards for each workplace
environment …” (McIlravey, 2009, p. 7). This That document also warns, however, against
quote highlights the relevance of all of the tools two dangers in using online resources for inves-
discussed in this chapter to the professional tigative and security functions. First, there is
protection officer specifically, and the practice of the danger that protection professionals will

III. PROTECTION OFFICER FUNCTIONS


112 9. AUTOMATION IN PROTECTION OPERATIONS

get side tracked and go off on tangents, focus- much that they more readily accept technol-
ing more on the online environment than on ogy in their workplace. Still, the effective use of
the investigative or security objectives. Second, automated security tools should be emphasized
there is a natural assumption that anything in officer training and education programs.
extracted from databases or online sources is Two graduate students in a Business and
credible. Users must remember to validate and Organizational Security Management program
corroborate all sources, including those that studied college curricula designed to pre-
originate in online databases or files (ASIS pare protection officers for a career in security.
International, 2006, p. 73). Among their findings was a distinct lack of
coursework addressing emerging technology
issues. They concluded that course content
THE ROLE OF THE should include orientation on automated tools
PROFESSIONAL such as incident and visitor management sys-
PROTECTION OFFICER tems as well as crime mapping and analysis.
According to their report, “Security officers
Protection professionals, whether operating lacking this knowledge would be placed at a
in a government or private sector environment, great disadvantage among peers …” (Bolyard &
are increasingly relying on technology and Powell, 2007, p. 4).
automated applications such as those described In addition to individual officers, security
in this chapter. Individuals who embrace tech- service providers might consider expanding
nology and leverage it as a tool in performing their service offerings to include items such as:
their duties—and in their own professional ● Conducting automation-assisted risk
development—are those who will excel. In fact,
assessments
the same applies to security services providers. ● Providing security technology training
As security business consultant Mark Gottlieb
services
puts it: ● Recommending security technology
Due to advances in security technology, computer solutions to clients
literate guards who understand “smart buildings” ● Including automated crime analysis or crime
and possess an understanding of the loss preven- mapping within security services
tion function will find their services in high demand.
... Technological improvements and innovation are
● Providing security services specific to IT
changing the role of the security guard. Security environments (e.g., data centers)
firms must keep abreast of these changes (Gottlieb, ● Providing IT security services
2006, p. 4).
As systems and procedures become more
Only a few years ago, administrators at a integrated and technology-dependent, we must
college offering an associate’s degree in crimi- also begin to consider the “security of security
nal justice and security management stated systems.” The Alliance for Enterprise Security
that their students—those employed as, or Risk Management began to address this issue in
aspiring to become, security officers—were a booklet entitled “Convergent Security Risks in
literally “afraid” of computers. For that rea- Physical Security Systems and IT Infrastructures.”
son, the college was extremely hesitant to add One of the many recommendations presented in
computer skills to their learning objectives and the booklet was:
curriculum. Connecting special systems and devices to orga-
Today, things have changed as people rou- nizations’ networks introduces new and usually seri-
tinely use technology in their personal lives so ous levels of risk. The trade-offs between connecting

III. PROTECTION OFFICER FUNCTIONS


SUMMARY 113
these systems to organizations’ networks and the Technology and automation is bringing unprec-
security risks that doing so introduces thus need edented benefits, efficiencies, and opportunities
to be better analyzed and understood (Alliance for
Enterprise Security Risk Management, 2006, p. 15).
to the field of security and assets protection.
From information sharing and information
management to risk assessment and strategic
SUMMARY security planning, automated tools are truly of
value. One warning, from technology consul-
The issue of automation in protection opera- tant Anton Ivanov, however, is very relevant
tions can be summarized nicely with the follow- here:
ing quotations:
IT … is a tool to allow [organizations] to imple-
… networked computer technology and asso- ment business processes … [and] operate more
ciated applications will provide enterprises with efficiently.… However, it is the business process that
increased operational efficiencies and intelligent makes the business more efficient, not IT as such
security” (Open Security Exchange, 2007, p. 3). (Ivanov, 2009).

and
We need to be careful to use technology as
… the amount and variety of security data flow- a tool rather than allow ourselves to be used
ing into their information systems is only going by technology. Nonetheless, professional pro-
to grow … as their corporations grow and as new tection officers should develop a technology-
technology-based security systems come online. The
corresponding need to store and organize this data
friendly mind-set, develop their skills, and
for meaningful use will thus become an even more incorporate high-tech thinking into their profes-
pressing issue … (McIlravey, 2009, p. 9). sional worldview.

EMERGING TRENDS
The driving force in today’s electronic secu- Electronic security systems are now routinely
rity systems is “integration.” Security systems capable of being controlled from remote sites
are increasingly integrated with fire and life via the Internet (over secure connections) and
safety systems, communications systems, and even using mobile devices such as a BlackBerry
even automated building controls. This allows or iPod (including activation/deactivation of
new capabilities such as “downstream controls” access cards, and dissemination of threat alerts
and “automatic lockdowns.” In other words, a to specific audiences). This trend is expected to
breach at an entrance turnstile might lock down continue and will require security professionals
the elevators or close selected interior doors. to keep up on these technologies (Belfor, 2008).
Building controls may include doors and locks, Somewhat related is the trend toward greater
elevators, lighting, HVAC, and communications functionality of incident management systems.
systems. Today, these controls can be integrated Data is being collected, analyzed, and utilized
with CCTV, intrusion detection, and electronic in unprecedented ways. Contemporary systems
access control systems. can provide valuable data for corporate inves-
Another important trend is toward remote tigations, level-of-trust decisions, on-site inci-
monitoring and control of security systems. dent management, evacuation management,

III. PROTECTION OFFICER FUNCTIONS


114 9. AUTOMATION IN PROTECTION OPERATIONS

regulatory compliance monitoring, security The continued development of public-private


performance measurement, security planning, partnerships that involve the private security
force deployment, report generation, business community may influence this issue and allow
case analysis, and many other tasks. As stated by special access to security-relevant data.
Brian McIlravey: “Incident reporting and inves- In short, technology is expanding rapidly
tigation management software solutions … are and is making more and more of an impact on
becoming the keystone of a well-thought-out security operations and the way protection
and executed security information management professionals perform their duties. McIlravey
program, playing a key role in the risk manage- summarized the entire issue of “automation in
ment and decision-making process” (McIlravey, protection operations” this way:
2009, p. 24). There is a strong trend in security manage-
Finally, the use of online sources and inte- ment to strengthen and make more consistent
gration of disparate databases for information the management of security information across
sharing will become indispensable in protec- the enterprise. This trend is driven … by the
tion operations. At the same time, however, this much broader corporate interest in data analysis
information-sharing environment will raise ques- and knowledge-based decision making. There is
tions about personal privacy concerns which will also relentless pressure to improve the speed and
likely lead to data restrictions. The proper bal- quality of decision making, reduce costs, improve
ance between security and privacy will be a key productivity, and demonstrate a commitment to
issue and will be the subject of much discussion. best practices (McIlravey, 2009, pp. 23–24).

References Groussman, J. (2008, May). Loss forecasting and ROI.


Security, pp 62–63. BNP Media, Troy, MI, http://www.
Alliance for enterprise security risk management (AESRM). securitymagazine.com.
Convergent security risks in physical security systems i2, http://www.i2group.com, (corporate web site), McLean,
and IT infrastructures. 2006. VA, accessed September 2009.
ASIS International. (2006). Protection of assets manual (Vol. Ivanov, A. (Technology Consultant, Cambridge, UK), Internet
II). Investigations Management. Chapter 1, Part 1, ASIS posting on “LinkedIn Q&A Forum/Information Security,”
International, Alexandria, VA. posted 12 October 2009, www.linkedin.com.
ASIS International. (2007). Protection of assets manual (Vol. I). McIlravey, B. (2009). Security information management—The
Introduction to Assets Protection. Chapter 2, Part 1, ASIS foundation of enterprise security (white paper). PPM 2000
International, Alexandria, VA. Inc. Edmonton, AB, Canada.
Belfor, H. J. (2008, March). Chairman ASIS International Open Security Exchange. (2007). Physical security conver-
Physical Security Council, “New Directions in Security gence: What it means, why it’s needed, and how to get there,
Systems and Integration: An overview” (presentation). Washington, DC (white paper).
Bolyard, D., & Powell, D. (2007, April). An assessment of Peterson, M. (1998). Applications in criminal analysis: A
undergraduate curriculum in criminal justice and homeland sourcebook. Praeger Publishing Company, Santa Barbara,
security (master’s thesis), Webster University, National CA.
Capital Region. Shields, B. (2002). Crime and catastrophe: A GIS response.
ESRI. Web site www.esri.com/. Accessed October 11, Energy Currents, Fall, ESRI, Redlands, CA.
2009. Smith, R. M. (2003). From blackjacks to briefcases. Ohio
Gottlieb, M. S. (2006). Security: An industry study. MSG University Press, Athens, OH.
Accountants, Consultants and Business Valuators. Great Webster University, National Capital Region, “Business
Neck, NY. (white paper). assets protection,” course materials, 2009.

III. PROTECTION OFFICER FUNCTIONS


SECURITY QUIZ 115

S EC U RI T Y QU IZ 7. A study by Bolyard and Powell concluded


1. Automated visitor management systems that “security officers lacking this
should only be used in large, complex knowledge would be placed at a great
organizations with multiple facilities. disadvantage.…” What “knowledge” were
a. True they referring to?
b. False a. An understanding of basic electronic
2. One use for crime mapping is to help security systems and design parameters
determine where to locate new facilities. b. A thorough understanding of contempo-
a. True rary information technology (IT) security
b. False threats and risks
3. Studies indicate that security technologies c. An orientation on automated tools such as
will soon make security officers obsolete. incident and visitor management systems
a. True as well as crime mapping and analysis
b. False d. An orientation on the historical basis for
4. Incident Management Systems today are automation in protection operations as
really nothing more than word processing it applies to the security industry in the
systems that allow an officer to enter reports United States
electronically. 8. Geographic Information Systems (GIS) are
a. True closely related to:
b. False a. Integrated security systems
5. Two dangers mentioned in this chapter that b. Crime mapping systems
protection professionals should be aware of c. Automated incident management systems
in using online resources are (circle two): d. Graphical user interface systems
a. The possibility of going off on a tangent 9. A number of studies in recent years have
rather than focusing on the objective projected massive expansion of electronic
b. The possibility of introducing a virus to the security systems employing advanced
system technologies, but they also concluded that
c. Accidentally disseminating sensitive the human element (i.e., security officers)
information to unauthorized recipients will not be predominantly replaced by
d. Assuming that information in online technology.
databases is credible a. True
6. Among the advantages of automated visitor b. False
management systems are (circle all that apply): 10. Technology and automation is not bringing
a. Ability to reduce costs by integrating with the benefits, efficiencies, and opportunities
access control systems to the field of security and asset protection
b. Ability to keep a searchable record of that was anticipated.
visitors a. True
c. Ability to better account for all building b. False
occupants during an evacuation
d. Ability to support subsequent
investigations in the event of an incident

III. PROTECTION OFFICER FUNCTIONS


This page intentionally left blank
C H A P T E R

10
Patrol Principles
Christopher A. Vail

function today, it’s necessary to see its genesis.


CHAPTER OBJECTIVES The very word “patrol” is thought to be derived
● Provide a history of security patrol from the French word patrouiller, which origi-
● List the major purposes of patrol nally meant “to tramp in the mud.” To many,
this translation may well reflect what may be
● Explore issues relating to both foot and described as a function that is “arduous, tir-
mobile patrol ing, difficult, and performed in conditions other
● Provide techniques that enhance an than ideal” (Cole, 1995).
officer’s ability to detect unusual Around 2100 B.C., the first codification of
situations customs was written by Hammurabi, King of
● List factors that influence patrol Babylon. Under these laws of Hammurabi, it
effectiveness is believed that messengers were appointed to
● Identify areas of professional conduct for carry out the commands of the law—the first
officers on patrol form of patrol duty. About 1400 B.C., Amenhotep,
pharaoh of Egypt, developed a marine patrol
on Egypt’s coast, the first recorded history of a
patrol unit.
In early Greece, guard systems were established
HISTORY OF PATROL to protect the tower, highways, and the person of
Pisistratus, ruler of Athens. Ancient Rome saw the
Security work encompasses various func- establishment of quaestores (inquirers; also basi-
tions; however, there is one function that is cally judicial officers) who would go to the house
common to all security agencies—the job of of the accused and blow a trumpet or horn as an
patrol. In order to understand the technical indication of his arrest. In 27 B.C., under Augustus,
aspects of patrol, it is important to see how this emperor of Rome, the Praetorian Guards were
function came about, how it developed, and formed to protect the life and property of the
how it changes over time. Eugene O’Neill, a emperor, and urban cohorts were established to
famous writer, once said, “The past is the pres- keep the peace of the city. The vigiles (from which
ent, isn’t it? It’s the future, too.” Therefore, to we get the word vigilantes) were formed to
gain insight and understanding of the patrol patrol the streets and act as enforcement officers.

117
118 10. PATROL PRINCIPLES

Although they were nonmilitary, they were armed paid watchmen were those paid by merchants,
with staves and the traditional short swords. These parishioners, and householders. In 1737, the
patrolmen were also assigned to patrol geographi- Elizabethan Act of 1585 was enlarged to allow
cal precincts. cities to levy taxes to pay for the night watch.
As people moved north toward England In 1748, Henry Fielding suggested that polic-
and developed collective living arrangements ing was a municipal function and that some
(the precursors to towns), a form of individual form of mobile patrol was needed to protect
and group responsibility for policing began the highways. The Bow Street Runners were
to emerge through the concept of local self- formed, with a foot patrol to operate in the inner
government. Around A.D. 700, tithings (groups areas of London, and a horse patrol to operate in
of ten families) were formed for the purpose of the outer areas. In 1829, the Home Secretary, Sir
maintaining the peace and protecting the com- Robert Peel, introduced “An Act for Improving
munity. Tithingmen were elected by the group, the Police In and Near the Metropolis”—the
and their responsibilities included raising the Metropolitan Police Act. This legislation forms
hue and cry upon learning of a crime in the the basis for law enforcement organizational
group and dispensing punishment. Ten tith- structure in America. Setting the stage for orga-
ings were called a hundred and the head man nized patrol activity, 1 of the 12 fundamental
was called a reeve. Several hundreds within the principles of the Act stated that “the deploy-
same geographical area were collectively called ment of police strength by time and area is
a shire (the equivalent of our county) and the essential.” By the end of 1830, the metropolitan
chief law enforcement officer was called a shire- area of London was organized into 17 divisions
reeve (what we now call the sheriff). and superintendents were appointed. Patrol sec-
William, the duke of Normandy, introduced a tions were created, and each section was broken
highly repressive police system in A.D. 1066, in down into beat areas.
which collective security was deemed far more Basically, Peel replaced the patchwork of pri-
important than individual freedom in England. vate law enforcement systems then in existence
He divided England into 55 separate military with an organized and regular police structure
districts and appointed an officer of his choice that would serve the state and not local interests.
to be the shire-reeve in each shire, or military He believed that deterrence of criminal activ-
district. The state assumed the responsibility for ity should be accomplished by patrol officers
keeping the peace in this system. England lived trained to prevent crime by their presence in the
under this system until the Magna Carta (Great community. Hence, modern patrol was born.
Charter) was written in A.D. 1215, guarantee- Many English systems and beliefs became
ing civil and political rights to individuals and the basis for American social, political, legal, and
restoring local control to the communities. governmental systems. In New England, com-
In 1252 in England, the watch system was munities were formed around towns and villages,
established. People appointed to the duty of which relied on constables to provide protection
watchman had the responsibility for keeping and keep the peace by using the watch system.
the peace. They were unpaid and were often The South was more rural and agricultural, with
the dregs of society—the old, infirm, sick, and smaller communities. The county was the primary
criminally inclined. After 1285, some watches form of government, in which the sheriff system
grouped together for the purpose of safety, was the prominent form of law enforcement. As
forming a “marching watch,” which may be expansion moved westward, law enforcement
considered the first form of patrol organiza- organizations combined the functions and roles of
tion found in our present-day system. The only constable and sheriff.

III. PROTECTION OFFICER FUNCTIONS


PURPOSE OF PATROL 119
Patrol activity in America can be traced random violent criminal activity, much of which
to Boston in 1636, when a night watch was is directed toward innocent victims; of drug-
formed. In 1658, New York City formed a “rat- related crime; of juvenile crime involving sense-
tle watch,” so named because they used a rat- less violence; of overloaded legal systems; and
tle to communicate their presence and signal of more civil litigation. At the same time, there is
each other. Oftentimes, people who committed more being demanded from property and orga-
minor crimes were sentenced to serve on the nizational managers in terms of protection from
watch as punishment. As can well be imagined, fire, disaster, and accident. Administrative agen-
order discipline was a major problem, leading cies at the federal, state, and local level continue
New Haven to create a regulation that said “no to enact new regulations that employers must
watchman will have the liberty to sleep.” A 1750 follow. Security officers have more responsibil-
Boston rule said that “watchman will walk their ity now than they have ever had before. In fact,
rounds slowly and now and then stand and the patrol function is more than just the back-
listen.” Following this rule—as well as mak- bone of security; it is also the heart and soul of a
ing sure to look up, down, and all around—are total loss control approach.
good procedures for contemporary protection
officers to follow.
Uniformed and paid police did not come
about until the early to mid-1800s. In 1833,
PURPOSE OF PATROL
Philadelphia began paying police officers and
The function of security is to prevent and
the New York City Police started wearing uni-
control loss. As a means of accomplishing this,
forms around 1855. As America grew, policing
patrol officers make periodic checks around a
took on new shapes and challenges, with the
facility. Therefore, patrol can be defined as the
addition of technological advances, new orga-
act of moving about an area to provide protec-
nizational and political structures, new laws
tion and to conduct observation. That is a fairly
requiring more police officers, societal reliance
simplistic definition, since while protection
on law enforcement, and the slow growth of
and observation may be the major elements of
private police and security agencies. However,
patrol, there are numerous other functions that
the patrol function of police and security
the officer may be called on to perform dur-
remains the same and is considered the “back-
ing his or her tour of duty. Based on organiza-
bone” of security and police agencies.
tional needs, there are several major purposes
Security patrols may be routine and boring
of patrol.
to some; however, the patrol activity of today is
much more than “tramping in the mud,” sound- 1. Detection of criminal or unauthorized
ing the hue and cry, or shaking a rattle. The activity. Contingent upon organizations’
officer of today who protects a facility is respon- needs, this could include trespassing, noise
sible for the safety and security of physical—and violations, safety violations, lease violations
often intellectual—assets of tremendously high by tenants, alcohol violations, parking
value. He/she is responsible for the safety and violations, and so on. In order to be effective,
security of a workforce consisting of people who officers must be intimately familiar with
are educated, well trained, and professional— organizational rules, laws, and patterns of
a huge investment of human worth and pro- criminal behavior, all of which are constantly
ductivity. Today’s security officer has available changing.
training, equipment, and technology hereto- 2. Prevention and deterrence of crime and
fore unheard of. We now live in an age of more unauthorized activity. This includes

III. PROTECTION OFFICER FUNCTIONS


120 10. PATROL PRINCIPLES

projecting a security presence onto the 8. Respond to emergencies. This is where


environment. Making the security program security patrol has traditionally varied from
visible will at least temporarily suppress police patrol; while security emphasizes
criminal/unauthorized activity. prevention, law enforcement emphasizes
3. Ensure compliance with organizational response to problems. Unfortunately,
policy. At the same time this is done, security departments must be able to
public/community relations are maintained respond professionally to accidents, fights,
by interacting with persons in the work fires, intrusions, assaults, thefts, HAZMAT
environment. Relations with tenants, problems, or other reasonably foreseeable
vendors, neighboring security departments, emergencies. Staffing levels, response times,
and local law enforcement certainly come training, and equipment must all support the
into play here. Additionally, officers may requirement for emergency response.
help ensure compliance with administrative 9. Performance of other services required by
agency regulations such as OSHA, EPA, or management. This can include opening up
U.S. Labor Department mandates. areas and making them ready for visitors.
4. Assess, report, and record loss-causing It could also include dispensing literature,
situations or circumstances. This conduction of formal or informal surveys
could include any type of fire, safety, or of visitors, testing equipment, finding lost
health hazard, such as chemical spills, children, or acting as an escort.
overcrowding of rooms/area, radiation
leaks, coffee pots left on, leaking pipes, Obviously, the needs of all organizations/
unsanitary conditions, congested areas, facilities are unique. Shopping centers have
mechanical failures, and so on. different loss control needs than warehouses.
5. Investigate as directed by the central alarm Hospitals are different from power plants. Hotels
station (CAS), dispatch, or supervisor in are different from amusement parks. Military
charge. There are a host of possible lines of installations are different from college cam-
inquiry that can be requested of the patrol puses. What activities occur and what activities
officer by management. are unauthorized vary considerably. Patrol may
6. Test and inspect the physical security system. involve taking action against unauthorized per-
This includes alarms, locks, lights, CCTV, sonnel, suspicious persons, illegal activities, and
access points, and physical barriers such as suspicious automobiles. Pertinent state and local
fence lines. While assuming greater importance laws and company policies will dictate what
in high-security installations, this is a function security officers are to do in these situations.
of patrols in all environments to some degree. Depending on the officer’s employer, he or she
7. Act as a compensatory measure during may also be required to conduct an investigation
system outages. Should there be an outage of criminal activity. The catch-all phrase of “per-
or malfunction of a physical security system formance of other services” may include a mul-
component, the patrolling officer will titude of functions as requested by the officer’s
stand by and assume a fixed post at the employer, the client, and/or as needed by others
affected point/area until the situation is such as visitors, vendors, and employees. In any
remedied. This may simply involve calling event, patrol is the “eyes and ears of security.”
maintenance and standing by until a lock is The provision of security services is not an “after-
fixed, or it may require continuous posting thought;” it is a business necessity. Organizations
out in a high-security facility with an alarm that don’t take steps to protect their assets
or power outage. will lose them! Employers also have a legal

III. PROTECTION OFFICER FUNCTIONS


TYPES OF PATROL 121
and moral responsibility to provide a safe and on a frequent and random basis, making it diffi-
secure workplace for their employees and those cult for one with criminal intent to penetrate that
who visit their organization. Insurance com- area. Officers on foot patrol also have as much
panies require that certain security measures use of their five senses—sight, smell, taste, feel,
be enacted. There are court decisions affecting and hearing—as their physical condition allows
security, particularly relating to the commission and they can actually “patrol” a larger area using
of wrongful acts or the omission of required one or more of these senses.
acts. Federal, state, and local laws, rules, and Major drawbacks to foot patrols are the
regulations dictate that certain security mea- small size of the area that can be patrolled
sures be placed in effect. Security, therefore, is a effectively, the amount of time taken to con-
part of management in any company or organi- duct one round while carefully checking every-
zation. Patrol is the essence of providing those thing, and getting from one part of the area to
security measures. another. Other drawbacks include access to
emergency equipment if needed and personnel
costs involved—it takes many protection offi-
TYPES OF PATROL cers to provide adequate protection. Inclement
weather conditions also sometimes restrict foot
There are two basic types of patrol: foot and patrol activity.
mobile. With each type of patrol, different meth- Patrol officers can use a number of different
ods may be used, depending on many factors. methods of mobile patrol. The automobile is the
Mobile patrols include the use of automobiles, most common form of patrol; however, many
bicycles, mopeds, and golf carts. Helicopters agencies find it economical, while providing
and horses are other means of mobile patrol, other benefits, to patrol with golf carts, bicycles,
but are not all that common. or mopeds. The advantage of mobile patrol
Foot patrols are normally conducted by one includes the very fact that it is mobile. The offi-
officer “walking a beat.” Areas to be patrolled cer can patrol a much larger area. Depending
are both indoors and outdoors. The major advan- on which type of vehicle is used, the officer has
tage to this type of patrol is that officers can learn access to emergency equipment, and he/she
their assigned areas well. While this is not an all- can carry different amounts and types of equip-
inclusive list of what a foot patrolman can learn, ment. Obviously, a car can carry a lot more than
he or she will learn what doors and windows a bicycle, and this is a bona fide consideration
are normally locked or unlocked, what lights when determining what type of mobile patrol
are normally left on at night, what personnel are to use. While a bicycle can’t carry as much
authorized in certain areas, where emergency equipment as a car can, it can get to places a car
equipment is located, and what potential hazards can’t, and can do it much more quietly. These
exist. Such knowledge will assist the officer in are some other factors to consider in selecting
determining if anything is amiss. It is also a good what type of mobile patrol to use:
opportunity for the officers to become known to
the employees and to establish a positive profes- 1. Initial cost of purchase
sional relationship with everyone they contact. 2. Ongoing maintenance costs
One way to accomplish this is by discussing the 3. Size of the area to be patrolled
above-mentioned items, or any other official mat- 4. Need to access emergency and other
ter, with the people involved. Another advantage equipment, such as first-aid kits, traffic
of foot patrol is that an officer could place him- control equipment, extra rain ponchos,
self or herself at or near high security risk areas additional radios, and so on

III. PROTECTION OFFICER FUNCTIONS


122 10. PATROL PRINCIPLES

5. Type of facility being protected, and the The officer should have a positive attitude
organizational image and culture of the facility when going to work—his or her mind should
6. The threat model and degree of vulnerability be focused on the job ahead. No personal prob-
of the facility lems, hobbies, or business should be carried to
work with the officer.
Depending on the size of the patrol area
There should be absolutely no ingestion of
and access to a car, or in some cases where golf
alcoholic beverages or other psychoactive sub-
carts are used, the officer can also carry patrol
stances at least 8 hours before going on duty.
dogs. Dogs enable the officer to search a large
The officer should have had ample rest before
and/or complex environment very quickly with
going to work, as he or she will need to be both
minimal manpower. In very large areas, aerial
mentally and physically alert on duty. Officers
patrols may be conducted by helicopter. In rug-
should have a positive attitude and an accom-
ged terrain, horses or ATVs may be used. Each
panying bearing that reflects courtesy, polite-
of these methods has some capacity to carry
ness, and a willingness to serve. These are basic
equipment.
qualities of professionalism, which instill confi-
dence in a department.
All personal and company equipment issued
PREPARATION FOR PATROL or used while on duty should be checked to
ensure that it is in working order. For exam-
Preparation for going on patrol duty is not ple, making sure a pen has ink for note-taking
only the physical act of putting on a uniform; it or a radio has working batteries, which can be
also requires mental and psychological prepara- life-saving if the officer needs to call for help.
tion. Security officers should act and look pro- Officers need to know all policies, rules, and
fessional not only while on duty, but also while regulations that pertain to the security of the
going to work. This not only produces a posi- facility, and particularly, the assigned patrol
tive impression on the people they serve, but it post. While proper procedures for performing
helps the officer to perform better. When they the job should be known, many officers have
look and act like professional security officers, their own procedures for accomplishing a task.
such demeanor demands more respect from If used, they should be in compliance with
others. This respect generates a positive attitude accepted practices of the security agency, the
in the officer, and he or she becomes more con- client, and certainly, the law.
fident and more competent in his or her work. It is important, when preparing to go on
While people should not “judge a book by its patrol, that the officer knows the property he or
cover,” the fact remains that people do judge pro- she is protecting “like the back of his/her hand.”
tection officers based on their first impression. The location and condition of emergency equip-
Clothes “do make the man,” so one’s personal ment, water shut-off valves, electrical controls,
appearance is important. The officer’s uniform fire alarms, and telephones should be known, as
should be properly tailored and in good con- the patrol officer may be the first responder to a
dition—neat, clean, and pressed. There should situation requiring their use. The location of any
be no holes, patches, or loose threads dangling hazardous materials, or places where hazard-
from it. Shoes and leather equipment should be ous materials are worked with, should be firmly
polished. Male officers should be clean shaven. implanted in the officer’s mind. All doors and
Hair and fingernails should be clean. No items windows, and the condition they’re normally
not authorized by the employing organization found in, should be well known. This includes
should be attached to the uniform. knowledge of existing scratches or other marks

III. PROTECTION OFFICER FUNCTIONS


PREPARATION FOR PATROL 123
that could otherwise be a sign of forcible entry. These are some techniques that enhance an
Also, some doors and windows are frequently officer’s ability to detect unusual situations.
left open, some partially open, and some should ● Get to know people in the patrol
never be open. Knowledge of the state of these
environment. Maintain a professional—not
exits and entrances is very valuable to the
personal—relationship with them. Have
patrolman.
some idea what their jobs and/or functions
The alert patrol officer will know what type
are. Most people will gladly elaborate on
of conduct, organizational behavior in this case,
what they do if asked in a tactful manner.
is considered acceptable or normal at his or her ● Inspect equipment. Get in the habit of
facility. Conduct that is considered abnormal in
checking maintenance tags on equipment.
one area or section may be very commonplace
Know what the equipment does.
in another. Examples include such things as ● Get to know maintenance personnel and
what doors are normally left ajar; what vendors
procedures. Consider taking an orientation
or service personnel use what doors regularly;
tour with the maintenance department.
what computers are left on; what certain smells ● Visit the central alarm station, if possible.
or odors are normal; and what types of people
Become familiar with the alarms and CCTV
frequent the facility. The officer must first be
in each protected point and area.
able to determine what is customary for his or
her patrol area, and then look for actions, condi- There are many different incidents that could
tions, or patterns that are unusual. Each officer occur to an officer on patrol that may require
must decide in his or her own mind, and to his immediate action on his or her part or on the
or her own satisfaction, what is suspicious. This part of others. As the first responding author-
will vary by experience, background, training, ity to such incidents, the officer should be men-
attitude, and type of environment in which he tally and physically alert and able to respond,
or she works. A successful officer is one who is making correct decisions as to what needs to be
able to combine logical suspicion with skillful done. The officer may have to take immediate
observation and has enough natural curiosity to action using his or her own professional knowl-
investigate those conditions that he or she feels edge, skills, and abilities, or he or she may have
are unusual. to direct others such as the police, EMS, fire,
If an officer works the night shift, it is advis- or maintenance personnel to the scene via the
able to visit the work site during the day. This most expedient way.
will give the officer a fresh and clearer perspec- In some circumstances, the officer may have
tive of his/her responsibilities. For example, the to control a gathering group of onlookers and it
officer might discover the existence of doors or is essential to know how to isolate them from
windows that he or she didn’t even know were the crisis point (problem area). Being able to
there. He or she might discover that a part of block off an area quickly and efficiently is obvi-
the facility thought to be empty or unused is ously important in emergencies. Since anything
really full of expensive equipment. Or the offi- could happen at any time, the effective security
cer might find that an area thought to contain officer knows his or her patrol area very well.
valuable equipment or materials is actually When arriving for duty, an officer should
empty or full of items to be discarded. It also be briefed by a supervisor or check with
gives the officer the opportunity to talk with the previous shift for any unusual events or
and discuss security issues about the facility occurrences; suspicious activities or persons;
with other officers whom he or she normally facility problems dealing with security, fire,
doesn’t meet. or safety; orders, directives, and policies; and

III. PROTECTION OFFICER FUNCTIONS


124 10. PATROL PRINCIPLES

any expected VIPs, vendors, contractors, and opportunity, the desire, and the tools. Patrol
so on. Determine if there are any communica- officers have a direct influence over the first one
tion “dead areas” and where they are. In other and some influence over the second. An effective
words, to be fully prepared to go on patrol, an patrol officer, by following accepted patrol proce-
officer must know what has happened, what is dures, can and will hinder the first element—the
happening, and what is likely to happen. opportunity to commit a criminal act. By ensur-
One area of preparation often overlooked by ing all doors and windows are properly closed
many officers and departments is that of con- and locked, ensuring there is adequate lighting
tinuing training and education. With the many in vulnerable areas such as where safes or valu-
and increased demands placed on security per- ables are kept and around the building(s) proper,
sonnel today, it is essential for the officer to stay and making access difficult to possible targets
abreast of the latest laws, equipment, products, for criminal activity, opportunities for the crim-
services, and procedures in security. This infor- inal are reduced or eliminated. This is the very
mation is gained only through education or essence of loss prevention.
training. Companies who contract out for their While the patrol officer may not be able to
security services, proprietary security depart- directly influence a person’s desire to commit
ments, and security companies themselves, a crime, that desire is greatly hampered by the
should provide basic and ongoing training for very presence of a security officer perform-
their security officers. Companies can estab- ing his or her patrol duties in a professional
lish internal training programs, send officers way. It is indeed a rare criminal who will com-
or require officers to attend local colleges that mit a crime in the presence of a patrol officer
have security educational programs, or have (although it has happened), especially one who
their officers take home-study courses. is visible, alert, and showing confidence. The
There are also private vendors who special- third element is not controllable by security
ize in conducting security training programs. personnel; however, security officers should
If a local police department has a “ride-along” know what tools are generally used by crimi-
program, this can provide excellent training for nals. Guns are obviously a tool, but some peo-
the security officer. Another way for an officer ple have the authority and permission to carry
to gain new information and knowledge is by weapons. Screwdrivers and pry bars are com-
reading security- and law enforcement–related mon everywhere, but in the hands of a criminal,
professional journals and magazines. Protection they become burglar tools. Information gather-
News, Security, Police and Security News, FBI Law ing equipment, such as photographic or record-
Enforcement Bulletin, and Security Management ing devices, may be used to steal information.
are all excellent sources of up-to-date profes- Radio transmitting or monitoring devices may
sional information. also be used by terrorists and sophisticated pro-
fessional criminals.
Patrol is never routine; anything is liable to
TECHNIQUES OF PATROL happen at any time. Therefore, there are two
major principles of patrol that guide the effec-
As stated earlier, patrol is defined as the act tive patrol officer. The first principle of patrol
of moving about an area to provide protection is that it should always be done in a random
and conduct observation. In the security world, fashion. Never patrol by driving or walking
the majority of patrol activity is focused on the in the same direction. Alter routes; change the
prevention of criminal behavior. A crime can- pace occasionally; walk or drive for a while and
not occur unless three elements are present: the then stop to look and listen. Sometimes, turn

III. PROTECTION OFFICER FUNCTIONS


TECHNIQUES OF PATROL 125
around and backtrack your route. If someone is Patrol officers must also thoroughly docu-
trying to figure out where the patrol officer will ment their observations. There should be
be at any given time so that they may conduct detailed notes taken on any unusual, suspi-
some illegal act, random patrolling will keep cious, or potential loss-causing situation. Notes
them off guard. must be kept professionally and observations
The second principle of patrol ties in with reported up the chain of command to the appro-
randomness: The frequency of patrol should priate management personnel. Forms designed
be random. Do not go on patrol at the same specifically for each environment should be on
time each time; the officer’s patrol schedule hand. Whether there is a predesigned form or
should always vary. Depending on the vul- not, the important thing is to report all situations
nerability of the facility being protected, the if there is any doubt as to their importance.
officer may want to patrol the area once every Although it is not a patrol technique in the true
few hours, once every 2 hours, once an hour or sense of the word, officer survival is a major con-
more. At the very least, every facility or area sideration when on patrol. One way to survive
should be patrolled when going on duty and patrol is to use “sensible” patrol methods—that
just before going off-duty. Patrol should never is, use all five natural senses—sight, hearing,
be conducted the same way each time by timing smell, touch, and sometimes, although rarely, the
or route; there should be nothing predictable sense of taste on patrol. The two strongest senses
about a patrol officer’s schedule as the officer the officer will use are that of sight and hear-
should not patrol by a set routine or pattern. ing. If riding in a motorized vehicle an officer
With the use of automatic monitoring sys- should keep the windows opened a little, allow-
tems or barcode technology, patrols are docu- ing him or her to detect the sound of breaking
mented. These systems generally require that glass or other noises of suspicious origin. He or
officers patrol in a set sequence within an estab- she should not play a commercial radio loudly if
lished time period. Using a random patrol route the car is equipped with one as it could drown
with a barcode unit is still possible by approach- out noises that require investigation. An open
ing each patrol point from a different direction. window will also allow the officer to use his or
Times may also be varied to some degree. her sense of smell to detect smoke or other odors
Another principle of patrol is communi- that should be investigated.
cation. Patrol officers should always keep the Often a person is known to have a “sixth
command post, supervisor, backup officer, or sense.” This means that they seem to know
central alarm station advised of where they are when something “just isn’t right,” or they get
and what the situation is. They must follow the a “feeling” about a person or a situation. This
following proper radio procedures: sense is called intuition. It develops from expe-
rience, and it permits a person to sense what
1. Listening before speaking into the radio is abnormal or unusual. While an officer can-
2. Depressing the microphone a split second not testify in court that he or she performed a
before and after speaking to ensure that all certain duty by using his or her “sixth sense,”
syllables are transmitted it can be very accurate in determining when
3. Speaking clearly and a little more slowly something needs further investigation. While
than normal into the microphone it can be used as a guide to determine which
4. Not broadcasting when not necessary action or actions are appropriate, it should
5. Avoiding the use of profanity, horseplay, or never be used as the sole determining factor.
confidential information on the radio Another means of patrol survival is the use
6. Scanners abound—especially with reporters. of the mental “what if?” game. This game (also

III. PROTECTION OFFICER FUNCTIONS


126 10. PATROL PRINCIPLES

known as creative daydreaming or mental flashlight. If there is a glare from lights, use it
rehearsal) is played as an officer patrols his or to your advantage if necessary! Use flashlights
her area by thinking of any possible incident, judiciously; don’t have them turned on more
remote as it might be, that could occur at any than necessary (although for walking safety
place or time. For instance, the officer could they should be used if other light sources are
think of what to do if someone came running not available). “See others before they see you.”
out of an office or building that is supposed to
be closed and locked, just as he or she gets there.
The officer could think about what actions to
take if he or she heard a loud explosion, or gun-
FACTORS THAT INFLUENCE
shots in the area. What would an officer do if he
PATROL EFFECTIVENESS
or she smelled smoke in the area or saw a fire in
As patrol is an expensive loss control tech-
progress? What would an officer do if he or she
nique, it only makes sense to have the officer
saw a chemical leak in progress? The list goes
detect the greatest number of loss-causing situ-
on and on. Doing this might uncover a potential
ations as possible. The WAECUP theory of loss
loss event that has occurred or is occurring. It
control is applicable here.
will also keep an officer up-to-date on company
rules, regulations, policies, and procedures. Waste—Patrol officers check scraps being
It is a form of self-training, as the officer can thrown away, look for lights, heat, and water
determine his or her own needs for improve- turned on needlessly.
ment and take the appropriate steps to correct Accident—Officers look for spills and other
any deficiencies in his or her professional life. slippery walking conditions. Always observe
Finally, it makes response to the event more effi- all around patrol points for fire hazards,
cient, should it occur. It may save the life of an materials stacked too high, and so on. “Look
officer or the life of another. up, down, and all around.”
Light and noise discipline should be prac- Error—Patrol officers should be thoroughly
ticed when on patrol. This means that patrolling briefed prior to their shift as to what
officers should avoid making any more noise activities are occurring in their patrol
than is necessary. They should keep the radio environment. They should check and
turned down somewhat, keep keys and equip- double-check schedules of building openings
ment from jangling, and so on. They should and shipments of personnel arrivals.
be able to “hear others before they hear you.” In many cases, the security department
Note that radio net discipline is also important; functions as “the grease in the machine,”
overuse of the radio ties up the net and depletes making things run smoothly between
the battery. Extended conversations should be different departments. In most organizations,
carried out by landline methods, such as tele- security makes sure that things don’t “fall
phones. Note, too, that backup means of com- through the cracks.” Patrol officers can play
munication should always be considered when a key role in alleviating problems caused by
on patrol or fixed post duty. Always have a con- simple human error.
tingency plan if the primary means of commu- Crime—Become familiar with criminal
nication doesn’t work. behaviors in the local area. Also, keep up-to-
Similarly, light discipline should be prac- date on criminal trends within the industry.
ticed. This means avoid being silhouetted. Speaking with local police and reading
Never sit with lights behind you or stay in a car industry-specific management literature are
with the dome light on. Use a clipboard light or good ways to maintain one’s professional

III. PROTECTION OFFICER FUNCTIONS


FIXED POSTS 127
education. Also, patrol in a random manner things such as burglary tool marks or the
and develop professional relationships with smell of marijuana more quickly than an
people in the patrol area so that you are inexperienced officer.
approachable. If people observe something ● Variety of activities: Officers do many
that doesn’t quite seem right, and they various things, many of which don’t even
are comfortable talking with a security appear to be connected, and things can
officer about it, they will. This can uncover happen very quickly. Other employment,
numerous potential crimes. such as an extra job, can influence an officer’s
work performance (see fatigue above).
● Failing senses: Age or illness affects an
UNETHICAL/UNPROFESSIONAL officer’s senses; the older or sicker he or she
PRACTICES becomes, the less quickly the body is able to
respond to stimuli. Obviously, keeping in good
Patrol officers should be wary of fraternizing
health aids the officer in being more discerning
with employees (“Familiarity breeds contempt”).
on patrol. It also makes for better interactions
They should also be on guard for possible indi-
with others; something that is critical to the
cations of collusion between employees, employ-
success—and job survival—of the officer.
ees who constantly work when no one else is
around, gambling between employees, racist There are also external factors that can affect
graffiti in bathrooms and elevators, employees the ability to perform the patrol function effec-
conducting competing businesses while using tively, including the following.
company resources, and so on. ● Environmental conditions: These can be
Since observation and perception are key
weather, highway traffic conditions or
effective patrol techniques, the officer should
lighting (day patrol vs. night patrol, interior
be aware of certain internal factors that can
patrol and exterior patrol).
influence his or her ability to perform on patrol ● Distance: Things that are closer to us are
effectively. While the officer may not be able
easier to perceive, and things more distant
to control all of these factors, the very realiza-
are harder to identify clearly.
tion that they exist can help the officer be more ● Time: The more intense a person’s
effective. Internal factors include:
involvement in an activity, the faster time
● Fatigue: Feeling tired or worn out can affect seems to go. Also, security officers may
the way an officer perceives things (with the work shift hours and often an officer needs
use of all five senses). to adjust his or her “internal clock” both at
● Boredom: The more often a task is work and at home.
performed, the more it becomes routine and ● Duration of the Input: The longer a
boring. Boredom leads to stress; stress leads stimulus is received, the more accurate the
to hasty, improper decisions being made. interpretation will be.
This can be a deadly distraction if not kept
under control.
● Personal problems: Preoccupation with FIXED POSTS
personal problems distracts from keeping
one’s mind on the job and should not be While not patrols in the strict sense of the
brought to work with the officer. word, fixed posts manned by security person-
● Known facts: Officers with security or law nel are a part of almost every facility. In some
enforcement experience will recognize cases, these are in designated structures like

III. PROTECTION OFFICER FUNCTIONS


128 10. PATROL PRINCIPLES

those manufactured by commercial suppliers. 7. In high-threat situations such as strikes,


In others, they may consist of manning a desk civil disturbances, or crowds that could
in the lobby during evening hours. Many situa- trample an officer, a route of retreat should
tions support the use of temporarily fixed posts always be open to the officer manning
such as at public events, at traffic control points the post. There may also be justification
during rush hour, or during heightened periods for concealing the post or building cover
of security, such as strikes. into it. Whatever the situation, safety of the
Regardless of the employment, fixed posts officer must be of paramount importance.
represent a substantial amount of man-hours 8. Comfort—reasonable comfort—should
and cost. Fixed post duties should be performed always be afforded to officers on post.
in a professional manner, bearing in mind the Care should be taken to ensure that
following: guard booths are not so hot as to induce
sleepiness.
1. The mission or objective of the post must 9. Fixed posts should be visible from other
be clearly understood. The reason for the posts, patrolling officers (on foot or in a
existence of the post should be specified in vehicle), or CCTV. This helps to ensure the
written post orders. These orders should be safety of officers, and provides overlapping
readily available to the officer manning the visual coverage of the area being secured.
post. 10. Officers should not leave the post until
2. Duties as mandated by the post orders properly relieved. This is of critical
should be read and understood. A importance in high-security installations
supervisor or auditor who inspects the post or where a contract firm is billing a client
should be favorably impressed with how for a fixed post officer. Officers should stay
well the officer knows his or her duties. in the immediate vicinity of the post. They
3. Post orders should be kept neat, orderly, should check out the area near the post for
and secure. Persons without a “need to unusual or unacceptable conditions, prior
know” should not be told what the orders of to assuming it.
the post are.
4. Light discipline—avoidance of being
silhouetted should be maintained just as on CONCLUSION
patrol. “See others before they see you.”
5. All equipment, especially communications The need for security is not a modern
equipment, should be checked when first requirement. The caveman was initially con-
manning the post. Simple tests of detection cerned only for his personal well-being, and
equipment (X-ray, metal detectors, explosive then he became responsible for his immediate
detectors, and so on) should be conducted as family’s safety and security. Eventually, fami-
early in the shift as is practical. Manuals for use lies became clans or tribes which evolved into
of the equipment should be readily available. communities. Security became a social respon-
Officers must be accountable for the presence sibility. Within this responsibility, the patrol
and condition of all equipment on post. function with designated people to conduct
6. Officers being relieved on post should the patrols dates to early Egypt. Despite politi-
brief their relief officer. Large, complex cal, legal, and other changes, the patrol function
operations may have a predesigned form for has remained the primary means of providing
this, or a simple list of things to advise might security services to communities, regardless of
be compiled by the officer being relieved. whether they are public or private entities.

III. PROTECTION OFFICER FUNCTIONS


SECURITY QUIZ 129
Protective services in America are based on Performance Dimensions Publishing provides patrol books,
English precedents. While there have been tre- videos, and equipment (800-877-7453), Powers Lake, WI
53159-0502.
mendous changes in technology, society, work,
political scenes, economies, and the work forces
themselves, the purpose of patrol today remains S E CURI TY QU I Z
as it has always been: the protection of prop- 1. Uniformed and paid police did not come
erty and lives, the prevention and detection of around until which of the following:
crime, and the performance of other services. a. The early 1900s just before World War I
Today’s security officer has many more duties b. The 1830s when Philadelphia started
and responsibilities than his predecessors. He paying police
or she must be technically competent in patrol c. The late 1700s about the start of the
techniques; the laws, rules, and regulations per- Revolutionary War
taining to security; and numerous other areas of d. 725 A.D.
responsibility, such as firefighting and medical 2. The patrol function is the least important but
emergencies. Embracing the WAECUP theory necessary part of the loss control approach.
and putting it into practice will go a long way a. True
toward making patrols more cost-effective and b. False
professional. 3. Based on organizational needs, there are
Proper training and preparation for patrol, many major purposes of patrol. Which of the
professional work habits, and attentive patrol- following is not one of those purposes:
ling techniques will enhance the patrol officer’s a. To detect unauthorized activity
skill and abilities. What was once considered a b. To prevent unauthorized activity
punishment for minor criminal offenses, or a c. To perform an activity that creates the
job with little or no responsibility for the “down appearance of authority
and out,” is rapidly becoming a profession. d. To provide emergency response in a timely
In conclusion, professional patrol performance fashion
may be considered using the following acronym: 4. There are basically two types of patron.
P Preparation Which of the following are those two types?
A Alertness a. Mobile and foot patrol
T Thoroughness b. CCTV Surveillance and foot patrol
R Reports c. Canine patrol and checking ID’s at the
O Observations main entrance
L Language (communication) d. None of the above
5. Preparation for a patrol tour of duty requires
more than just putting on the uniform and
References going to work. It also requires mental and
Butterworth-Heinemann, an imprint of Elsevier Science, psychological preparation.
has books on physical security, alarms, report writing, a. True
and security in schools, hotels, colleges, office buildings, b. False
and retail stores. http://stbooks.elsevier.com/security 6. If the officer is working the overnight shift,
(800-545-2522).
2200 to 0600, it is advisable to do which of the
Cole, G. F. (1995). The American system of criminal justice (7th
ed.). Belmont, CA: Wadsworth. following:
Professional Training Resources has books and videos on a. Stop ingesting alcohol-laced adult
patrol and a multitude of other security topics (800-998- beverages two hours before the shift
9400), P.O. Box 439, Shaftsbury, VT 05262.

III. PROTECTION OFFICER FUNCTIONS


130 10. PATROL PRINCIPLES

b. Sleep at least 10 hours before the shift to c. Failing to provide less-than-lethal


assure alertness all through the night weapons to each officer
c. Ingest at least four cups of coffee to keep d. Equipping the patrol vehicle with wrong
awake all night colored flashing lights
d. Visit the work site during the day for 9. Which of the following is a principle of
facility orientation patrol that every patrol person should
7. There are numerous techniques that help an follow:
officer to detect unusual situations. Which of a. A patrol should always be done in a
the following is one of those techniques: random fashion
a. Get acquainted with the people on your b. The time the patrol officer leaves on
shift and where they should be and what patrol each time should be random
they do c. Keep in communications with either
b. Get to know maintenance personnel and internal or external backup support when
how they can help you needed
c. Visit the central alarm station and become d. All the above
familiar with the CCTV system and what 10. There are many internal factors that can
the area of coverage is influence a patrol officer’s performance in a
d. All the above negative way. Which of the following is not
8. One area of preparation often overlooked by one of those internal factors:
many security departments is: a. Fatigue
a. Failing to provide continuing training and b. Preoccupation with personal problems
education c. Environmental conditions
b. Failing to perform driver license checks on d. Boredom
each patrol officer

III. PROTECTION OFFICER FUNCTIONS


C H A P T E R

11
Traffic Control
Arthur A. Holm

important sign in use today. These three func-


CHAPTER OBJECTIVES tions of a STOP sign are taken for granted:
● Provide an overview of the importance of 1. Regulates traffic flow.
traffic control 2. Clarifies the question of right-of-way at
● Explore the elements of successful traffic intersections.
control 3. Reduces motor vehicle accidents at
● Describe basic traffic control hand signals intersections.
● List five general rules for traffic direction Generally speaking, there are two main types
of automatic traffic signals:
1. Traffic lights of three colors, sometimes with
an arrow for easy turning.
An officer directing traffic at a busy site pro- 2. Visual and audio warning signals commonly
vides the most frequent contact between citi- seen at railway crossings.
zens and security personnel. The importance
of bearing, appearance, and attitude cannot be Automatic traffic signals normally provide
overemphasized. Likewise, the skillful handling adequate intersectional control. However, there
of what citizens recognize to be a difficult and are numerous situations that must be directed
hazardous job can generate and maintain pub- by a “point control” officer, to assure safe and
lic respect. efficient vehicular and pedestrian movements.
Construction sites, accidents, rush hour peri-
ods, special events, or any other condition that
SIGNS AND AUTOMATIC SIGNALS causes congestion of traffic must receive imme-
diate attention.
If you hold a driver’s license, then you Traffic duty consists of directing and supervis-
can assume knowledge of most traffic signs. ing traffic at gates and intersections and patrol-
The STOP sign is without a doubt the most ling parking areas. These duties are performed

131
132 11. TRAFFIC CONTROL

in order to keep traffic moving with a minimum must therefore assume a military bearing, with
of delay and maximum of safety. weight evenly distributed on both feet.
Since traffic control duty may require an offi- When not engaged in signaling motorists,
cer to remain at his post for hours in all kinds he/she must stand in the “at ease” position,
of weather, protective clothing must be readily facing traffic, and with hands at his/her sides.
available. Proper protection against the elements When directing traffic, shoulders must be in
is an important factor in maintaining efficient line with the flow of traffic and attention must
traffic control. It has been observed that a wet or be directed to the vehicular movement.
cold officer presents a hazard to himself as well
as to motorists.
Proper clothing should also include high- HAND SIGNALS
visibility material to increase the safety value
during nighttime assignments, whether the Prompt compliance to hand signals is depen-
intersection is well lit or not. dent on the officer’s ability to use uniform,
clearly defined, and understandable gestures.
Intersectional control does not call for compli-
ROADWAY POSITIONS cated choreography or wild arm movements.
Improper hand signals, although highly
The position selected to direct traffic entertaining to bystanders, cause confusion,
must be suited to the particular intersection hesitation, and lead to violations and accidents.
and expected traffic patterns. It must com- Unusual movements undermine the purpose of
mand a full view of the intersection and its traffic control and direction.
approaches. In turn, the officer must be com- Stopping traffic: Two clearly defined motions
pletely visible to the motorists and pedestrians. are required to stop traffic. First, select the
In many instances, noncompliance to gestures vehicle to be stopped. Look directly at the
or whistle signals is caused by the inability of driver, and point in his direction with the arm
the motorist to see the officer. Usually, officers fully extended. The position is held until you
assigned to traffic control will select a position are observed by the driver. Then raise your
in the center of the intersection or at one of the hand so that the palm is extended. The position
corners. is held until you are observed by the driver.
Then raise your hand so that the palm is toward
1. The center of the intersection: This position
the driver and the arm is slightly bent at the
affords the greatest visibility, but it is also
elbow.
the most hazardous. This location is usually
Maintain this position until the oncom-
selected when traffic signals are inoperative,
ing traffic has stopped. With the one arm still
traffic is not moving at a high rate of speed,
raised, turn your head and repeat the procedure
and where there is little pedestrian traffic.
with your other hand to stop the traffic moving
2. The corner position: Intersections having
in the other direction. The arms are now low-
heavy pedestrian or vehicular turns can
ered until all traffic has stopped (Figure 11-1).
be controlled by an officer standing a few
Starting traffic: To start vehicular movement
feet off the curb line at one of the corners
on the cross street, pivot a quarter turn to place
providing the greatest personal safety and
your shoulders parallel with the vehicles waiting
better pedestrian control.
to move. When the intersection is cleared, turn
Posture serves to communicate the fact that your head to one side facing the waiting traf-
the officer is in command of the situation. He/she fic. Attract attention by pointing to the lead car.

III. PROTECTION OFFICER FUNCTIONS


TRAFFIC CONTROL 133

BASIC STANCE STOPPING FIGURE 11-1 Stopping traffic.


1 POINT 3 POINT

DIRECTION OF MOVING TRAFFIC


SHOULDERS PARALLEL TO

2 STOP 4 STOP

WHISTLE ONE LONG BLAST

STARTING THE WHISTLE


1 POINT 3 POINT
The whistle, when properly used, attracts the
attention of motorists and pedestrians and facili-
tates compliance with hand signals. Improperly
used, it becomes a meaningless distraction that
2 START 4 START adds to the confusion.
To be effective, the whistle must be used in
moderation. It then becomes an invaluable aid
to assist in the control of the various road users.
The whistle should be blown loudly and not
TWO SHORT BLASTS tooted lightly. It is a means of communicating
rather than a musical instrument.
FIGURE 11-2 Starting traffic.
One long blast is used to attract the motorist’s
attention to the officer’s hand signals to stop.
Two short blasts with a wave means “start.”
Then, turning the palm inward, bring the hand
Three short blasts are used to give warning of
up and over to the chin, bending the arm at the
unusual or dangerous conditions—turning vehi-
elbow.
cles, improper crossing, and the like. The num-
If the driver’s attention has been properly
ber of warning sounds should be limited as it
obtained, it will only be necessary to make a
is in this area that most improper whistle usage
few motions. After traffic begins to move, the
occurs. Normally, three short blasts will suffice
arm is dropped to the side. The opposing traffic
to warn any motorist or pedestrian.
is then started in the same manner, but with the
other arm.
Slow or timid drivers may be urged to speed TRAFFIC CONTROL
up by increasing the rapidity of the arm move-
ments. However, flailing the air with wild arm With the responsibility of traffic direction,
gestures and shouting at the slow-moving vehi- you will be assigned to safely expedite the flow
cles is unnecessary and only confuses nervous of traffic, with the purpose of preventing con-
drivers and may lead to greater traffic conges- gestion and providing maximum vehicular
tion or accidents (Figure 11-2). movement. The following responsibilities must

III. PROTECTION OFFICER FUNCTIONS


134 11. TRAFFIC CONTROL

be fulfilled in order to properly carry out this LEFT TURN


assignment: 1 POINT 3 POINT

1. Regulate the flow of traffic. Give priority


of movement to the most heavily traveled
areas by allowing longer periods of running
time. Traffic movements must be of equal
2 STOP 4 START
and adequate time if the intersecting streets
carry an equal traffic volume. Long runs are
preferable as they reduce the loss of time
from frequent changes of traffic directions.
2. Control and assist turning vehicles. Supervise
all vehicular turns. If traffic is exceptionally
heavy or a spillback is caused by another FIGURE 11-3 Directing a left turn.
intersection, determine the preference of traffic
direction. If turning vehicles increase the
3. Coordinate the flow of traffic with the
amount of congestion, direct traffic to continue
adjacent intersections. Whenever applicable,
straight ahead during the period of the backup.
allow the movement of traffic at the
Prevent improper turns; right turns from the adjoining intersections to serve as a guide. If
left lane, or a left turn from the right lane, must the vehicular movement is not coordinated,
be prohibited. Not only are they illegal, but they traffic spillbacks may occur by reason of
increase potential congestion and accidents. traffic being stopped at the next intersection.
Traffic backups or accidents may be caused 4. Protect pedestrians. Immediate motorist
by motorists waiting to turn left or cutting in response cannot be assured when traffic
front of oncoming automobiles. Assist vehicles is signaled to stop. Mechanical failure,
wishing to turn left. Direct the waiting motor- inattentiveness, or other reasons may cause
ists to enter the intersection on the left turn failure to obey the signal. Pedestrians can
lane. Allow approaching vehicles that present then be protected only if they are held
an immediate hazard to pass. Stop the other back at the curb until all moving traffic is
oncoming traffic and motion the vehicles turn- completely stopped. Pay particular attention
ing left through the intersection (Figure 11-3). to children, blind or handicapped persons,
Priority of movement is determined by the and the elderly. Escort these people across
amount of traffic flow in each direction. If the the street if necessary.
number of vehicles turning left is greater than 5. Assist people seeking information. Carry
the opposing traffic flow, the turning traffic a street guide or a map of the local area to
is given preference. If the oncoming traffic is assist out-of-towners or local citizens seeking
heavy and there are only a few vehicles wait- directions. If an inquiry can be quickly
ing to turn, these vehicles are held up until a answered, there is no need to leave the
sufficient amount of traffic has been permitted intersection. However, if a detailed explanation
to pass through. The cross traffic is not started is necessary, direct the citizen to the curb where
until the intersection has been cleared. the answer may be given in safety. Don’t leave
In heavily congested situations in which a your post unless traffic conditions permit.
large number of motorists are making right 6. Assisting emergency vehicles. Stop all
turns, hold back pedestrians to give precedence vehicles and pedestrian traffic when an
to the vehicular traffic. emergency vehicle is approaching. Give

III. PROTECTION OFFICER FUNCTIONS


GENERAL RULES FOR TRAFFIC DIRECTION 135
the driver a “Go” signal indicating the 1. Clothing—You must dress properly
intersection is clear. If the driver of the according to the weather conditions. If you
emergency vehicle signals for a turn, are uncomfortable because you are cold or
acknowledge by motioning in the proper wet, you cannot perform at peak efficiency.
direction, indicating that the way is clear. 2. Reflective body vests and armlets—These
aids help the motorist to see you and help
There is no written, legal authorization that
protect your safety.
allows private citizens (security officers) to
3. Flashlight—Use a flashlight with a red or
direct traffic on public land or thoroughfares.
orange cone on the end of it at night. This
However, should you be requested or ordered
makes you more visible to the motorist and
by a police officer to assist him, you are obli-
also aids in giving directions.
gated to do so. This includes directing traffic if
4. Whistle—The whistle is used to attract
necessary.
the attention of the motorist and is used in
On private property, the safe movement
conjunction with hand signals.
of traffic is the responsibility of the owner or
5. Radio—The radio provides a means of
someone delegated by the owner. In most cases,
communication with your supervisor or
the delegated authority is the security officer.
other security officers.
On construction sites, assistance is required
6. Signs—Stop and Go signs and flags are most
to get traffic in and out of the site quickly and
commonly used on construction sites and
safely. Highway flagmen are required for the
highways.
safety of the workers and for an even flow of
7. Pass or badge—In some situations, you are
traffic around building or repair sites.
required to have a pass or a badge to allow you
to perform your duties at a gate, crosswalk, or
GATE DUTY building or highway construction site.

Directing traffic from or at a gate would


include such duties as checking passes, check- GENERAL RULES FOR TRAFFIC
ing trip tickets, and regulating special types of DIRECTION
traffic flow.
The position you take at a gate is determined 1. Select a position best suited for the
by the design of the gate, traffic characteristics, intersection.
daylight or night conditions, and the degree of 2. Use uniform signals and gestures.
control required. In taking up your position, 3. Keep stragglers alert and rolling in their
keep these factors in mind: proper traffic lanes.
a. Be visible to approaching traffic. 4. If a spill-back begins to form, look
b. Be in a position to see approaching traffic. immediately for the source of the trouble and
c. Do not interfere unnecessarily with the flow take action.
of traffic. 5. Be cheerful, but firm. Do not shout or argue
with motorists or pedestrians.
As a general rule, protection officers are
EQUIPMENT assigned to control private parking and traffic
scenes. Examples are shopping centers, parking
It is essential that you have the proper equip- lots, sporting events, construction sites, resort
ment when on traffic control. areas, and so on. Each area is different and the

III. PROTECTION OFFICER FUNCTIONS


136 11. TRAFFIC CONTROL

protection officer must exhibit sound judgment Vehicles should be allotted space by ensur-
in selecting his position. For example, when ing one section is filled in an orderly fashion
an extremely heavy flow of traffic is expected before rotating to another section. The signals
at a football game, a pregame plan should be to start and stop traffic are extremely important.
formulated. Practice them.

S E C URI T Y QU IZ 6. Directing traffic from the corner position


is safer than a center-of-the-intersection
1. The following sign is without doubt the most
position.
important sign in use today.
a. True
a. Yield
b. False
b. No U Turns
7. Proper protection against the elements is
c. Stop an important factor in maintaining efficient
d. None of the above traffic control.
2. Directing traffic from or at a gate would a. True
include such duties as checking b. False
a. Traffic flow 8. The primary use of the traffic whistle is to
b. Entry pass attract the police.
c. Travel tickets a. True
d. All of the above b. False
3. On private property, the safe movement of 9. General rules for traffic direction are:
traffic is the responsibility of the security a. Select a position best suited for the
officer. intersection
a. True b. Use uniform signals and gestures
b. False c. Be cheerful, but firm
4. When signaling a driver to stop, your hand d. All of the above
should be: 10. When on traffic control, proper equipment
a. Closed includes:
b. Palm open a. Proper clothing
c. Finger pointed b. Flashlight
d. Fist clenched c. Radio
5. Slow or timid drivers should not be urged d. All of the above
forward with increased rapidity of arm
motion because they may over-react and
cause an accident.
a. True
b. False

III. PROTECTION OFFICER FUNCTIONS


C H A P T E R

12
Crowd Management and Special
Event Planning
Patrick C. Bishop,
Terence M. Gibbs, and
Jennifer Lantz

When disturbances do occur, it becomes the


CHAPTER OBJECTIVES responsibility of the police, and in some instances,
● Define basic terms the responsibility of security forces, to restore
● Explain causes of crowd formation order. Once a crowd has been allowed to get out
of hand, through inadequate supervision or in
● Identify different types of crowds spite of the best efforts by security personnel to
● List steps to take when controlling a crowd prevent a disturbance, the task of restoring any
● Planning strategies, personal behaviors, semblance of order, protecting life and property,
and responsibilities of crowd control and the eventual dispersement of the crowd or
● Explore riot control formations mob is a tremendous one.
It is important, therefore, that police and
● Crowd management assessment security forces be able to quickly determine if a
● Alcohol serving considerations gathering will become uncontrollable and take
immediate steps to prevent disorder. The only
way this will be successfully accomplished is
INTRODUCTION for the personnel of all crowd control groups
to have a good understanding of the types of
Whenever people gather together in large num- crowd formations that are likely to be encoun-
bers, such as at athletic events, parades, strikes, tered. Also, these personnel should note the dif-
peaceful demonstrations, protest rallies, and so ferent responsibilities of security officers, police,
on, there exists a potential threat for mass discord. and riot control forces.

137
138 12. CROWD MANAGEMENT AND SPECIAL EVENT PLANNING

DEFINITIONS a soapbox orator. Such a crowd has a common


interest for only a short time. It has no organiza-
1. Crowd—A concentration of people whose tion, no unity of purpose beyond mere curiosity,
present or anticipated behavior is such that it and its members come and go. Such a group will
requires police action for the maintenance of normally respond without resentment to the urg-
order. ings of a police officer to “stand back,” “move on,”
2. Demonstration—A crowd that is exhibiting or “keep moving.” There is no emotional unity
sympathy for or against authority, or some and they offer little concern.
political, economical, or social condition. However, even in this most ordinary and
3. Disaster—Any extreme or catastrophic routine situation, the person in authority who
condition that imperils or results in loss of is lacking in good judgment and discretion
life and/or property. may meet with resistance. Derogatory remarks,
4. Picket line—A demonstration in which unnecessary shoving and the like cause imme-
several people walk about in a public space, diate resentment in people and become self-
carrying signs that show their displeasure defeating. Impartiality, courtesy, and fair play
with a business or government policy. Often hold the key to any situation involving people.
associated with strikes, picket lines are When you instruct a crowd to “move on,” it
usually legal in the United States, as long as must mean everyone. If you make exceptions
the picketers keep moving and do not attempt and allow some people to remain, strong objec-
to harass or interfere with others in any way. tions may be raised. This glaring partiality may
5. Rally—A gathering of people to show cause some people to defy you. Incidents such
support for a common cause. as these can rapidly change crowd attitudes
6. Riot—A breach of the peace committed and, if nothing else, impart a very poor impres-
to violence by three or more persons, in sion of the security officer.
furtherance of a common cause to protest A crowd may also assemble for a deliber-
or disrupt some enterprise, venging action ate purpose—spectators at a football game or
against anyone who may oppose them. a rally of some sort, or it may be a disgruntled
7. Sit-down strike—A form of a strike in citizen, or group of citizens, willing to be led
which the workers refuse both to work into lawlessness if their demands are not met.
or leave the workplace. This makes it Members of these crowds have little depen-
impossible for the employer to bring in dence on each other, but they do have a unity of
others to do the strikers’ jobs. Sit-down purpose; they are drawn together to share a com-
strikes are illegal in the United States. mon experience. If outside influences interfere
8. Strike—A work action in which employees with their purpose or enjoyment, it is possible for
withhold their labor in order to put pressure some individuals in the group to become unruly
on their employer. and aggressive. There are numerous instances of
riots occurring during, or immediately following, a
sporting event or rally in which emotions run high.
FORMATION OF CROWDS

A crowd may exist as a casual or temporary CAUSES OF CROWD FORMATIONS


assembly having no cohesive group behavior. It
may consist of curious onlookers at a construc- 1. Basic cause—The basic reason for the
tion site, spectators at the scene of a fatal acci- formation of any crowd is the occurrence of
dent, or curious citizens who are attracted to an event that is of common interest to each

III. PROTECTION OFFICER FUNCTIONS


PSYCHOLOGICAL FACTORS 139
individual. The nature of the crowd is largely PSYCHOLOGICAL FACTORS
governed by the nature of the event.
2. Casual causes—A large and comparatively In addition to the factors that cause crowds to
orderly “casual crowd” may gather in a form and turn peaceful groups into disorderly
shopping area or at a sporting event. mobs, it is important that people dealing with
This casually formed crowd is characterized crowds understand that a small crowd often
by the fact that its members think and act as attracts a great many initially disinterested peo-
individuals. There is an absence of cohesion ple, thereby rapidly increasing its size; this snow-
or organization. This type of crowd is balling effect is caused by certain psychological
easily controlled in its formative stages, factors:
but it may develop otherwise if the event
becomes alarming, or if something occurs 1. Security—Certain individuals may be
which causes severe emotional upset to its attracted to a crowd due to the feeling
members. of security and safety it provides while
3. Emotional causes—Crowds that are formed associating with large numbers. This
due to events that incite the emotions of situation is most likely to arise during
the members are almost invariably unruly periods of civil unrest where large gangs are
and troublesome simply because emotion roaming the streets, looting and threatening
makes them blind to reason. These are the the safety and peaceful existence of the
most frequently encountered emotional citizens who become fearful for their well-
causes: being and join with the gang for the security
a) Social—Crowd disturbances resulting it may afford them.
from racial or religious differences, or 2. Suggestion—Persons joining a crowd tend
excitement stemming from a celebration, to accept the ideas of a dominant member
sports, or other similar event. without realization or conscious objection.
b) Political—A common political cause may If the dominant member is sufficiently
result in attempts by large groups to gain forceful with their words and ideas, they
political power or settle political disputes may be able to sway the good judgment
by other than lawful means. and commonsense reasoning of those about
c) Economic—Economic causes of them. There is a tendency to accept even
disturbances arise from conditions such the wildest of ideas; thus they transform the
as disagreements between labor and susceptible into unthinking followers.
management, or from such extreme 3. Novelty—An individual may join a crowd
conditions of poverty that people resort to as a welcome break in one’s normal routine
violence to obtain the necessities of life. and through persuasion and suggestion react
d) Absence of authority—The absence of enthusiastically to what they consider proper
authority, or the failure of authorities to form under these new circumstances.
carry out their responsibilities, may cause 4. Loss of identity—Similar to that of the
people to believe they can violate the law “security” factor. The individual tends to
without fear of reprisal or hindrance. lose self-consciousness and identity in a
e) Disaster—Disaster conditions may result crowd. Consequently, one may feel safe to
in violent emotional disturbances among be neither detected nor punished for any
people in the area due to fear, hunger, loss participation in wrongdoing.
of shelter, or injury and death of loved 5. Release of emotions—The prejudices and
ones. unsatisfied desires of the individual that are

III. PROTECTION OFFICER FUNCTIONS


140 12. CROWD MANAGEMENT AND SPECIAL EVENT PLANNING

normally held in restraint may be released crowd can quickly become unruly and very
in an emotional crowd. This temporary violent.
release of emotions is a strong incentive to an 4. Hostile—Crowds of this nature are generally
individual to participate in the activities of motivated by feelings of hate and fear to the
the crowd. It provides the opportunity to do extent they are prepared to fight for what they
things he or she has been inwardly desirous want. The most prominent types are strikes,
of doing but hitherto has not dared. political demonstrations, and hoodlums or
rival mobs. Hostile crowds may have leaders
who direct and maintain a high degree of
hostility in their followers, but not always.
TYPES OF CROWDS 5. Escape—An escape crowd is one that is
attempting to flee from something it fears. It
The behavior of crowds varies widely depend-
is leaderless and completely disorganized,
ing on its motivational interest. Crowds are clas-
but it is homogeneous in that each person
sified in accordance with their behavior patterns
is motivated by the same desire, which is to
and it is essential that any security measures
escape. Once an escape crowd reaches safety,
are based on recognition and understanding of
it will lose its homogeneity and its members
the type of crowd they must deal with. The fol-
must then be handled as refugees.
lowing outline is representative of most of the
crowd types that might be encountered in this
country.
CROWD ACTIONS AND
1. Acquisitive—The members of an acquisitive SUGGESTED COUNTERMEASURES
crowd are motivated by the desire to get
something. They are best illustrated by a The majority of crowds do not, as a rule,
crowd of shoppers seeking items in short resort to violence; however, any crowd is poten-
supply or at an auction sale. They have no tially dangerous or at the least, aggressive. The
leaders, little in common, and each member mood of a peaceful crowd—that is, acquisitive,
is concerned with his or her own interest. spectator, or expressive—may change quickly to
2. Expressive—In this type of crowd, the that of a hostile or “escape” crowd. Since most
members gather to express their feelings concern is caused by a hostile crowd, as opposed
such as at a convention or political rally. to the other types mentioned, a more thorough
The expressive crowd is usually well study should be made of it.
behaved; however, some persons in it may A hostile crowd is usually noisy and threat-
feel that slight disorders and unscheduled ening, and its individual members may harass
demonstrations should be condoned by security personnel. This kind of crowd will
the officials. When they are thwarted or hesitate to participate in planned lawlessness
restrained, resentment occurs and their because it generally lacks organization and
otherwise cheerful enthusiasm may be leadership in its early stages. However, it may
replaced by hostility. provide the seedbed for “mob” action when it
3. Spectator—This crowd gathers to watch is aroused by the more forceful persons who
out of interest, curiosity, instruction, or assume leadership. It may also be triggered into
entertainment. It is invariably well behaved violence by the undesirable actions of individ-
and good humored initially, but since ual protective personnel.
spectator sporting events, parades, and so on Aroused crowds will often vent their resent-
tend to stir the emotions rapidly, this kind of ment and hostility on those assigned to maintain

III. PROTECTION OFFICER FUNCTIONS


CROWD ACTIONS AND SUGGESTED COUNTERMEASURES 141
order. Some individuals may try to bait security the mood and feelings of the crowd. This
officers into committing errors of judgment, or collective excitement is communicated to
displays of unnecessary force in order to discredit each member of the group in what is known
authorities, or to further incite crowd members to as the “milling process.”
commit acts of lawlessness, or to oppose efforts in
The presence of an adequate force of men to
regaining control. Such crowd actions are usually
disperse the crowd and break it into small iso-
directed toward one or two individual officers
lated groups before it becomes hysterical and
in the nature of taunts, curses and other minor
aggressive is an effective method of coping with
annoyances. Verbal abuses must be ignored, no
the milling process. It is necessary for security
matter how aggressive they may become. By
to make a show of force, which does not neces-
contrast, immediate action must be taken to those
sarily mean the use of force. The mere presence
who assault, throw rocks, or attempt in any way
of an adequate number of well-disciplined and
to interfere with protective units.
well-trained control forces often suffices.
In controlling a hostile crowd, sufficient man-
power is basic to your success. If it appears that 3. Removing the crowd leaders. The most
a peaceful demonstration or other large crowd excited and vocal members of a crowd
gathering is showing hostile tendencies, do not establish themselves as the informal
hesitate to report and call for immediate assis- leaders. Removing or isolating the agitators
tance. This does not, however, mean you may contributes greatly to eventual crowd
or should resort to the use of unnecessary force. dispersal. Isolating the more boisterous
Such action is never justified. Potentially dan- individuals should only be attempted if
gerous crowds can usually be controlled by the sufficient manpower is available. A crowd is
following methods: not impressed with inadequate manpower
and violence may result. Individual heroics
1. Removing or isolating individuals involved are not only foolhardy but dangerous, as well.
in precipitating an incident before the 4. Diverting the attention of the crowd. The
crowd can achieve unity of purpose. This use of a public address system on the fringe
may cause temporary resentment in a very of a crowd, urging the people to “break
small portion of the crowd members. It is up and go home,” is a successful crowd
important, therefore, to immediately remove dispersal tactic. Amplifying the authoritative
the subject from the area. Elimination of tone of the command attracts the attention of
the cause of irritation will prevent an ugly individuals in the crowd and breaks the spell
incident. Remember that the injudicious use cast by the more excited crowd members.
of force can well defeat your purpose and 5. A crowd that grows in hostility and defies
turn the entire crowd against you. orders to disperse can also be controlled by
2. Fragmentizing the crowd into small forcing the individuals to focus attention on
isolated groups. The police often arrive at themselves rather than the objectives of the
the scene of an incident or hastily conceived group. Instead of making a direct assault on
demonstration after a crowd has assembled the crowd, a series of random arrests is made
and achieved a degree of unity. The close of individuals situated on the edge of a crowd.
contact of the crowd members and the The crowd will soon recognize that a greater
emotionalism of the situation cause the number of persons are being arrested. But the
individuals in the crowd to become group- fact that arrest is threatened through haphazard
influenced and directed. Individual controls selection causes them to fear for their liberty
disappear and each person is swayed by and a spontaneous dispersal results.

III. PROTECTION OFFICER FUNCTIONS


142 12. CROWD MANAGEMENT AND SPECIAL EVENT PLANNING

6. Using a recognized leader. An effective them pass through the ranks and then close
method of counteracting the developing rapidly behind them.
leadership in a crowd is by using someone
having greater appeal to the crowd. A
trusted labor leader, a member of the clergy, WHEN VERBALIZATION
a well-known sports figure, or a well-known DOESN’T WORK
civil rights leader can often successfully
plead for order and reason. Depending on When verbalization is not effective, there may
the origin and cause of the crowd formation, be a need to physically move crowd members.
an appropriate public figure or official may This should be done only as a last resort, and
greatly assist in calming the excitement and should include verbalization. It should be a
emotions of the crowd. planned action, only be done after professional
7. Preventing panic from developing in a instruction has been received on the proper
crowd. Panic is caused by fear and is most procedures. The following are some physical
often found in the “escape” crowd fleeing control techniques that are appropriate for the
from disaster or the threat of disaster or movement of people in crowds:
violence. The primary cause of panic is 1. “Heavy hands”—Assert your presence with
blockage of the escape route. Security actions your hands in front of you.
should aim at providing an escape route, 2. Be assertive! Do not take a backward step
directing and controlling the progress of when moving the crowd.
the crowd along the route, and at the same 3. Destabilize resistant persons by one or more
time dividing the crowd into small groups, of the following techniques:
if possible. The following control techniques a) Upper torso restraint.
might be implemented: b) Arm around waist with an escort hold.
a) Display a helpful, calm and confident c) Belt lift with an escort hold.
attitude. Loudspeakers should be used to d) Bracketing with an escort hold.
give directions and helpful information. e) Pressure point control as appropriate.
b) Use rational members of the crowd to f) Wristlocks, team control position, arm
assist in calming or isolating hysterical bars, etc. as appropriate.
persons.
c) Provide first aid and medical attention to
the injured and weak, particularly women SECURITY AND
and children. DEMONSTRATIONS
d) Use security to block off routes so as
to channel movement in the desired Security organizations assigned to supervise
direction. Care must be taken to ensure demonstrations have a twofold responsibility.
that the security forces do not panic a Regardless of individual convictions, they must
crowd by hasty action, arrogance, or first protect the peaceful demonstrators who are
thoughtlessness. exercising their right to protest.
8. Directing women and children. Crowds Spectators not in sympathy with the demon-
and demonstrators may resort to having stration constitute a potential threat of violence.
women or children wheeling baby carriages This is often aggravated by counterdemonstra-
at the head of their advance. If the marchers tion whether it is organized or spontaneous.
must be stopped, an attempt should be made Crowd control forces must also protect the
to divert the women and children or let general public from demonstrators who infringe

III. PROTECTION OFFICER FUNCTIONS


PLANNING CONSIDERATIONS 143
upon the rights of others. The more common life and property of citizens to assure the basic
problems occur when demonstrators engage rights of all people.
in “sit-ins” and so on, and violate the property If you observe a hostile crowd gathering,
rights of others. Fanatical members may even lie never hesitate to request assistance. In these
down in the path of vehicles and refuse to move. instances, it is definitely safer to overstate the
They must be picked up and carried away at number of personnel needed to restore order,
once. Use of tear gas in this situation is not gener- than to attempt to act alone or underestimate
ally recommended in view of the passive nature your requirements. A show of force not only
of the gathering and their relatively few numbers. has a restraining effect on the crowd, but also
Such groups may attempt to discredit secu- provides the necessary manpower.
rity with harassment during removal, by resort- Order must be established. Approaching the
ing to shouts of “brutality,” raising their hands more vocal individuals in a crowd is an effec-
as if to ward off blows, and emitting cries of tive method of dealing with a group. When
pain when they are aware of the presence addressing these persons, be firm and care-
of news media. Such encounters will tax the fully phrase your commands. Do not become
patience and control of individual security offi- involved in an argument. Use simple language
cers, who must ignore all such verbal attacks. and inform the people of the violations they are
or may be committing. Request that the viola-
tions stop and that the groups disperse. Allow
FORMATION OF A MOB the crowd the opportunity to withdraw peace-
fully without interference. If the throng defies
The crowd or demonstration will deteriorate authority and the apparent leaders make no
into a mob if it has been preconditioned by irri- efforts to disperse the crowd, arrests should be
tating events, aroused by rumors, and inflamed made and police assistance obtained.
by professional agitators who appeal to emo- Whenever you are dealing with an excited
tion rather than to reason. Hostility prevails and or hostile crowd, remember that it is poten-
unity replaces confusion and disorganization. tially dangerous and may require only a slight
The early frustrations engendered by agitation incident to turn it into a mob—your example
and rumor require a climactic incident to unleash and your ability to maintain order are the best
the mob and may come about for any number of deterrents to mob action.
reasons. It may often be influenced by the appar-
ent weakening of the strength and attitude of
security groups assigned to preserve the peace.
PLANNING CONSIDERATIONS

From time to time, security personnel have


the opportunity to plan for large crowd control
RESPONSIBILITY AND BEHAVIOR events. An example of this may be political
OF PROTECTIVE GROUPS rallies, sporting events, parades, or shopping
mall events. As there is always some form of
Protection must extend to all people. This
advance notice for these expected large crowd
means fair and equal treatment of all. Observe a
events, the following considerations should
position of neutrality—act with firmness—this
form part of the contingency procedure:
is not belligerence or unreasonable force. After
an order is given, it must be enforced for the 1. Is police involvement required?
preservation of the public peace and the carry- 2. Barriers (this includes metal fencing, ropes
ing out of the traditional mission of protecting and stanchions, people)

III. PROTECTION OFFICER FUNCTIONS


144 12. CROWD MANAGEMENT AND SPECIAL EVENT PLANNING

3. Communications (radio and telephone, PA 2. Take lawbreakers into custody and turn over
system) to the police for arrest.
4. First aid staff 3. Use reasonable force to enforce the law.
5. Ambulance or first aid rooms a) Do not overlook violations or defiance of
6. Doctors lawful orders.
7. Location of event b) The use of unreasonable force often incites
8. Fire procedures, equipment, personnel a crowd which normally would be passive
9. Communications center or curious.
10. Media observation area c) Charges of brutality are often made in
11. Entry and exit location for VIPs an attempt to discredit the security force;
12. Parking they will have no basis in fact if brutality
13. Lavatories is not used.
14. Food concessions 4. Remain on the fringe of the crowd. Do not
15. Disabled persons areas (wheelchairs) get too close or mix with a hostile crowd.
16. Entertainment before or after event Remain out of reach and observant of crowd
17. Signs and individual activities, pending the arrival
18. Timing schedule of reinforcements.
19. Number of security personnel and degree 5. Assist fellow officers who may be in
of expertise required trouble. If one of your associates situated
20. News releases and media precoverage near you is physically attacked, go to his
21. Time of year and type of environment or her immediate assistance. Arrest the
22. Alternate power sources assailant. To permit such a person to escape
23. Size of crowd expected will encourage others to assault or try to
24. Vehicles for movement of VIPs, and overpower individual security personnel.
so on 6. Refrain from participating in crowd activities.
a) An aggressive crowd will invariably
As you can see, when a large crowd control
throw a barrage of rocks, sticks, bottles,
event is known and sufficient time is avail-
and so on at opposing forces. DO NOT
able for preplanning, the event should be able
throw them back at the crowd! This will
to take place with minimal problems for both
only precipitate greater hostility and
security staff and participants alike.
supply the crowd with more missiles.
b) Withdraw to a safe distance until
dispersal operations can be commenced.
PERSONAL BEHAVIOR

1. Stand your ground without yielding. Your


RIOT CONTROL FORCE
job is to maintain order and protect life and
DEPLOYMENT PROCEDURES
property.
a) Avoid all unnecessary conversation.
Basic riot and crowd control formations used
b) Do not exchange pleasantries with
by control forces exist in the following forms
the crowd or apologize for your
(Figure 12-1):
actions.
c) Do not give the impression you will 1. Arrowhead—This is used to strike into and
not enforce orders to disperse or arrest split a crowd or mob, or to provide an escort
individuals defying such an order. for a person(s) to a given point through a

III. PROTECTION OFFICER FUNCTIONS


CROWD MANAGEMENT ASSESSMENT 145
PERSONNEL EMPLOYMENT
BASIC RIOT AND CROWD CONTROL FORMATIONS USED BY CONTROL FORCES EXIST
IN THE FOLLOWING FORMS:

a) ARROWHEAD
THIS IS USED TO STRIKE INTO AND SPLIT A CROWD OR MOB, TO PROVIDE AN
ESCORT FOR A PERSON (S) TO A GIVEN POINT THROUGH A FRIENDLY OR DIS-
ORGANIZED CROWD. THE USE OF AN ADDITIONAL INVERTED ARROWHEAD AT
REAR OF THE FORMATION WILL GIVE ALL-AROUND PROTECTION.
b) LEFT FLANKING AND RIGHT FLANKING

USED TO MOVE A CROWD OR MOB TO THE RIGHT OR LEFT, OR TO TURN A


CROWD AWAY FROM THE FRONT OF A BUILDING, FENCE, ETC.
c) LINE
USED TO MOVE A CROWD OR MOB STRAIGHT BACK UP THE STREET.

FIGURE 12-1 Riot and crowd control formations.

friendly or disorganized crowd. The use of 7. Are the security personnel properly briefed
an additional inverted arrowhead at rear of on the type of crowd?
the formation will give all-around protection. 8. Is the company providing security
2. Left flanking and right flanking—Used to properly licensed?
move a crowd or mob to the right or left, 9. Have all required permits been obtained?
or to turn a crowd away from the front of a 10. What is the seating?
building, fence, and so on. 11. What is the procedure for extracting
3. Line—Used to move a crowd or mob problem people from the crowd and
straight back up the street. ensuring that they leave the venue without
posing a threat to anyone inside or outside
the venue?
CROWD MANAGEMENT 12. Is supervision present and adequate?
ASSESSMENT 13. Are communications, including two-way
radios, adequate?
1. What is the officer-audience ratio? 14. Is alcohol being served at the event?
2. Are the security personnel deployed in a way If so, what are the procedures for
as to maximize surveillance of the crowd? controlling access to alcoholic
3. What type of performance is this? beverages?
4. Are the security personnel properly trained 15. What are the evacuation procedures in the
to handle the crowd? event of panic in the crowd?
5. Are the security personnel knowledgeable 16. In the event of a cancellation after the
in first aid? audience has been admitted to the venue,
6. Are the security personnel licensed and what procedures are in place to placate the
armed with any weapons? crowd?

III. PROTECTION OFFICER FUNCTIONS


146 12. CROWD MANAGEMENT AND SPECIAL EVENT PLANNING

ALCOHOL SERVING service, and therefore ensure intoxicated


CONSIDERATIONS persons do not harm themselves or others?
Are security personnel:
Serving alcohol at special events can create
a host of safety, security, and liability issues. 1. Properly trained in the above techniques so
A few considerations regarding alcohol service that they can control access to the venue?
are: They must also be able to intervene properly
Are persons dispensing alcohol: in matters involving intoxicated patrons,
including making sure that intoxicated
1. Properly trained in correct procedures for patrons do not harm themselves or others.
checking and verifying IDs of patrons? 2. Properly and adequately trained in the
2. Properly trained in the methods to use to methods of extracting problem patrons from
control service of alcoholic beverages? the crowd?
3. Properly trained in the recognition and 3. Correctly trained and instructed to ensure
identification of behavioral cues (TIPS that evicted patrons do not linger about
program: Training for Intervention the exterior of the establishment to take
Procedures) of intoxication and the revenge upon other patrons or employees,
intervention techniques to use to stop or re-ignite an earlier conflict?

EMERGING TRENDS
The first and foremost emerging trend is a greater are sworn in for the duration of the fair. Some of
awareness by organizational management of the the officers then joke that they are “suspended
problems and potential liabilities associated with without pay for 355 days” once the fair is over.
special events. Special events are complex under- In addition to the fair police, there are township
takings and many things can go wrong. Perhaps police, and some contract security personnel.
the best way to conceptualize this is the old saying York County Deputy Sheriffs perform security
“whatever else can go wrong, will go wrong.” at concerts held at the fair. Private investigative
It is clear that special event security is a firms conduct surveillance and make controlled
division of the security field that needs to be buys from vendors who sell counterfeit goods.
addressed. It is defined as a part of physical York County Probation Department person-
security, but it is not ongoing. It is occasional; nel search for probation violators and perform
only temporary. As such, it may not garner the security at concerts. This is an excellent means
attention that it deserves. of both apprehending probationers who are in
An interesting example of event security is violation as well as deterring troublemakers.
at the oldest fair in the United States, the York Deputy U.S. Marshalls sometimes conduct sting
County Fair, in York, Pennsylvania. Security operations for fugitives.
at the fair is difficult because of the number of Gang activity is prevalent, especially on stu-
people in such a small space. The fair takes place dent nights when students get in for free. Nearly
in September, so planning must begin in March. 100 police officers are required, and EMS needs
There must be adequate EMS (emergency medical to be prepared for possible mass casualty situ-
services), fire, and police in place. In fact, the fair ations. It is evident that there is a need for even
has its own police force, a group of officers who more officers, but monetarily it isn’t possible.

III. PROTECTION OFFICER FUNCTIONS


REFERENCE 147

So the trend is to reach out to the private sector money depending on the size of the venue and if
and specialized service firms for security at these the event was set up correctly. INA also utilizes
types of special events. probation officers who take vacation days to
In addition to the example of the York Fair, man special events. The probation officers are all
we are seeing more varied and creative use of college graduates who have had some relevant
protection forces across the board. These include training and experience.
proprietary security, t-shirt security, contract Another trend is having more restrictions in
security, off-duty police, and so on, all working place as to what can be brought into an event, as
in contact with one another. INA, Inc., based out well as more restrictions on tailgating parties and
of Harrisburg, Pennsylvania, finds that using serving alcohol. There is also an increase in the
off-duty police officers saves a great deal of use of dogs and horses at some special events.

Reference c. Removing them


Health Communications Inc. The TIPS Program: Training for d. Arresting them
Intervention Procedures, Alexandria, VA; 1985–2009. 3. If you observe a hostile crowd gathering,
never hesitate to request additional:
Resources a. Weapons
b. Assistance
The International Association of Assembly Managers is
an organization of professional venue managers. The
c. Rioters
IAAM conducts and publishes research, holds meetings, d. Vehicles
and administers a professional certification program for 4. A demonstration is a crowd that is
assembly managers. Visit http://www.iaam.org/. exhibiting sympathy for or against
The Center for Venue Management Studies (CVMS) is authority, or some political, economical,
IAAM’s resource center for public assembly facility man-
agement. The Center offers a variety of books and videos.
or social condition.
CVMS works with IAAM staff and work groups, such as a. True
the Safety and Security Task Force, to develop and dis- b. False
tribute resource materials and practice aids for the indus- 5. A riot means any extreme or catastrophic
try. Visit http://www.iaam.org/CVMS/CVMS.htm. condition that imperils or results in loss of life
and/or property.
S EC U RI T Y QU IZ a. True
b. False
1. In controlling a hostile crowd, sufficient
6. The basic reason for the formation of any
___________________ is/are basic to your
crowd is the occurrence of an event that is of
success.
common interest to each individual.
a. Force
a. True
b. Manpower
b. False
c. Time
7. A leaderless crowd that is attempting to flee
d. Weapons
from something it fears is a/an:
2. The protection officer should attempt to
a. Spectator crowd
isolate an individual troublemaker by:
b. Emotional crowd
a. Taking them down
c. Hostile crowd
b. Tranquilizing them
d. Escape crowd

III. PROTECTION OFFICER FUNCTIONS


148 12. CROWD MANAGEMENT AND SPECIAL EVENT PLANNING

8. Some psychological factors in crowd c. Apologize for his/her actions


formation are: d. All of the above
a. Security e. None of the above
b. Novelty 10. Some riot control, force deployment
c. Loss of identity procedures are:
d. None of the above a. Arrowhead, left and right flanking,
e. All of the above line
9. The protection officer dealing with crowds b. Right flanking, bullet, left flanking
should: c. Line, bow, arrowhead
a. Exchange pleasantries with the crowd d. Arrowhead, bullet, left flanking
b. Give the impression he/she will
enforce orders

III. PROTECTION OFFICER FUNCTIONS


U N I T IV

CRIME PREVENTION AND


PHYSICAL SECURITY

13 Environmental Crime Control


14 Physical Security Concepts and Applications
15 Alarm System Fundamentals
16 Access Control
17 Detection Technology
This page intentionally left blank
C H A P T E R

13
Environmental Crime Control
Glen Kitteringham

While the reader is likely familiar with Crime


CHAPTER OBJECTIVES Prevention through Environmental Design
● Define environmental crime prevention (CPTED), there are several other theories that
● Provide an overview of the main offer insight into crime control opportunities.
environmental crime control theories But the question remains: Why should secu-
rity practitioners know the reasons for apply-
● Explain how theory application aids in ing particular security applications, as well as
informed crime control decisions the theories behind them? Because if you are
going to implement a new security application,
you should understand why! Learning and
applying these theories will allow you to make
INTRODUCTION informed crime control decisions as to why
certain security measures should or should
The private security industry has come a not be carried out. Once you understand why
long way from when Allan Pinkerton created an offender carried out unwanted activity in
his world famous Pinkerton’s Detective Agency a particular area, you can implement security
in the middle of the nineteenth century. In the measures with a far better chance of success.
intervening 16 decades, there has been a great As security measures cost money to implement,
deal of activity. Significant steps have been the wise security practitioner will not want to
taken in lock and key systems, access control waste time, effort, or money. Following crimi-
hardware, the increasing ingenuity of vaults nal activity, an officer may wonder: Was there
and safes, fencing systems, CCTV, increas- an absence of a capable guardian as Felson and
ing professionalism and training of security Cohen theorize (1979)? Did the offender make
officers, and a host of other physical security a rational choice either for or against carrying
enhancements. However, proper attention has out a criminal act as Cornish and Clarke (2008)
not been given to the environmental crime con- believe takes place? A deeper understanding of
trol theories and subsequent practical applica- the offense allows the responding security pro-
tions behind the deployment of these human, fessional to make keener and more analytical
hardware, and documentation innovations. choices about how to respond to the situation.

151
152 13. ENVIRONMENTAL CRIME CONTROL

Will it require a simple or a complicated fix? In follow-up measures and programs. While the
some cases, simple is usually cheaper and can intent of this chapter is not to argue the pros
be just as successful as more expensive security and cons of one theory over the other, one com-
measures. ment will be made. While all the programs
There is a danger in thinking that once secu- and money spent upon social crime control
rity measures have been implemented, there can be considered laudable, it would be a fool-
will never again be a crime or unwanted activ- ish security manager who donated his or her
ity in the same area. Crime may or may not security budget to a social crime control pro-
occur. Other factors may be at work, including gram regardless of how noble it may seem.
the effects of displacement and diffusion of ben- Government and big businesses have spent
efits (to be explained). This forces the security billions of dollars on this issue for many years,
practitioner to continually review the area from but physical security forces are required more
many different perspectives. Has new tech- than ever.
nology made the old security solutions moot? Environmental crime control has not been
Will an attack come from a different direc- relegated the same attention and respect as the
tion, during a different time of day? Will the social crime control model. Social crime con-
attacker be forced to try new methods or big- trol has been practiced in one form or another
ger or better tools, or will be there be a different for hundreds of years. In contrast, environmen-
attacker? Continual awareness and review are tal crime control grew from work completed at
necessary. the University of Chicago in the 1920s. It was
there that more attention was paid to the area
in which the crime was being committed than
ENVIRONMENTAL CRIME to the people who committed the criminal acts.
PREVENTION VERSUS SOCIAL The theory laid dormant for several decades,
CRIME PREVENTION but was given a rebirth by the influential writer
and social commentator, Jane Jacobs, when she
A simple explanation of environmental crime wrote The Death and Life of Great American Cities
prevention is that environmental crime prac- in 1961. Her work inspired both C. Ray Jeffery
titioners focus their attention and energies on and Oscar Newman, both of whom took off in
locations of potential criminal activity. These new directions: Jeffery, with his book, Crime
practitioners “look for crime patterns and seek Prevention through Environmental Design, and
to explain them in terms of environmental Newman, with his Defensible Space. In turn,
influences. From these explanations they derive both researchers inspired others, such as Paul
rules that enable predictions to be made about and Patricia Brantingham, Tim Crowe, Ronald
emerging crime problems, and that ultimately V. Clarke, and Marcus Felson. What follows is
inform the development of strategies that an overview of the various environmental crime
might be employed to prevent crime” (Wortley control theories.
& Mazerolle, 2008, p. 1). Locks, doors, and other
barriers, CCTV equipment, and patrolling secu-
rity officers are all examples of environmental
THEORIES
crime control measures. On the other side of the
coin is social crime prevention. This area focuses
Rational Choice Theory
upon social programs, education, employment
creation, welfare, unemployment insurance, Rational Choice Theory was first presented
police, corrections, and other after-the-fact by Ronald V. Clarke and Derek B. Cornish in

IV. CRIME PREVENTION AND PHYSICAL SECURITY


THEORIES 153
1986 in The Reasoning Criminal: Rational Choice will be different for the laptop thief than for the
Perspectives on Offending. As Tayler (1997, p. 293) arsonist, vandal, or industrial spy. In addition to
states, the rationale behind the theory is that these issues, even within the narrow confines of
people will commit a crime if it is in their own a single crime such as laptop theft, what moti-
best interests. Basically, the offender uses a vates one offender (e.g., financial desire) will be
decision-making process whereby the positive different from another (e.g., a drug addict who
and negative aspects of committing a particular steals to trade for crack cocaine). These situ-
act are weighed. If the perception is that there are ational crime prevention techniques are laid out
more reasons for proceeding, regardless of the in Table 13-1.
existing security barriers, then, at the very least, Rational choice theory also includes the prin-
an attempt will be made. If an opportunity ciple that criminals are opportunistic. These
presents itself, there is a benefit, and there is lit- opportunistic criminals are not profession-
tle likelihood of being apprehended, then they als, but average people. If the reward is high
will commit the crime. Further, Pease (1997, enough, deterrents will not work. People will
p. 967) quotes Clarke and Cornish (1985), who weigh the pros and cons of committing the
claim that “the underlying assumption is that crime, and these are centered on the specifics of
offenders seek to benefit themselves by their the target. Finally, situational crime prevention
criminal behavior. This entails making deci- works best with the amateur criminal and least
sions and choices, however rudimentary their with the professional criminal. Bearing in mind
rationality might be, being constrained by limits that there are different classifications of crimi-
of time, ability, and the availability of relevant nals, primarily amateur criminal and profes-
information.” sional, the more security precautions taken, the
Following this rationalization, it is up to the more likely all but the most determined attacker
security practitioner to convince the poten- will be stopped. Other factors come into play as
tial offender that it is not in the offender’s best well; two that will be discussed are displace-
interests to carry out the act. The application ment and diffusion of benefits.
of situational crime prevention techniques is
the result of this theory. As rational choice is
the theoretical element, what follows are situ-
Displacement of Crime
ational crime prevention techniques that are the The basis for displacement is that a deter-
practical efforts used to reduce criminal oppor- mined attacker, if stopped at or by one method,
tunities. These techniques involve increasing location, etc., will try other ways of commit-
the effort, increasing the risk, reducing rewards, ting a crime until successful. There are six ele-
reducing provocations, and removing excuses. ments to displacement as laid out in Table 13-2.
These five techniques are further subdivided Displacement claims that, regardless of whether
into five subcategories to help eliminate oppor- a specific crime is committed at a particular
tunities for criminals. They can range from location, the criminal will simply move to a
physical access control devices to the use of more “criminal user-friendly” location until the
psychology to deter people’s criminal tenden- crime can be completed. One way to remember
cies. Finally, one should remember that criminal the six elements is to consider who, what, when,
decision making is crime-specific. This means where, why, and how. Coincidentally, these are
that “specific offenses bring particular benefits also the six elements of a properly written inci-
to offenders and are committed with specific dent report.
motives in mind” (Cornish and Clarke, 2009, Research indicates that displacement is
p. 26). The weighed actions, risks, and rewards not nearly as strong a factor as many people

IV. CRIME PREVENTION AND PHYSICAL SECURITY


154
TABLE 13-1 Twenty-five techniques of situational prevention

Increase the Effort Increase the Risks Reduce the Rewards Reduce Provocations Remove Excuses
1. Harden target (both premise 6. Extend guardianship 11. Conceal targets 16. Reduce frustrations and 21. Set rules
and laptop itself ) • Take routine precautions: • Off-street parking stress • Rental agreements
• Steering column locks go out in groups at night • Gender-neutral • Efficient queues and • Harassment codes
and immobilizers leave signs of occupancy phone directors polite service • Hotel registration
• Anti-robbery screens carry phone • Unmarked bullion • Expanded seating
• Tamper-proof packaging • “Cocoon” neighborhood trucks • Soothing music/muted
watch lights

2. Control access to facilities 7. Assist natural surveillance 12. Remove targets 17. Avoid disputes 22. Post instructions
IV. CRIME PREVENTION AND PHYSICAL SECURITY

• Entry phones • Improved street lighting • Removable car • Separate enclosures for • “No Parking”
• Electronic card access • Defensible Space design radio rival soccer fans • “Private Property”
• Baggage screening • Support whistleblowers • Women’s refuges • Reduce crowding in • “Extinguish camp

13. ENVIRONMENTAL CRIME CONTROL


• Pre-paid cards for pubs fires”
payphones • Fixed cab fares

3. Screen exits 8. Reduce anonymity 13. Identify property 18. Reduce temptation 23. Alert conscience
• Ticket needed for exit • Taxi driver IDs • Property marking • Controls on violent • Roadside speed
• Export documents • “How’s my driving?” • Vehicle licensing pornography display boards
• Electronic merchandise decals and parts marking • Enforce good behavior • Signatures
tags • School uniforms • Cattle branding on soccer field for customs
• Prohibit racial slurs declarations
• “Shoplifting is
stealing”

4. Deflect offenders 9. Use place managers 14. Disrupt markets 19. Neutralize peer pressure 24. Assist compliance
• Street closures • CCTV for double-deck • Monitor pawn • “Idiots drink and • Easy library
• Separate bathrooms for buses shops drive” checkout
women • Two clerks for • Control classified • “It’s OK to say No” • Public lavatories
• Disperse pubs convenience stores ads • Disperse • Litter bins
• Reward vigilance • License street troublemakers at
vendors school

5. Control tools/ weapons 10. Strengthen formal surveillance 15. Deny benefits 20. Discourage imitation 25. Control drugs and
• “Smart” guns • Red light cameras • Ink merchandise • Rapid repair of alcohol
• Disable stolen cell • Burglar alarms tags vandalism • Breathalyzers in
phones • Security guards • Graffiti cleaning • V-chips in TVs pubs
• Restrict spray paint sales • Speed humps • Censor details of • Server intervention
to juveniles modus operandi • Alcohol-free events

http://popcenter.org/library/25%20techniques%20grid.pdf. Accessed June 7, 2009.


THEORIES 155
TABLE 13-2 Methods of Displacement

Type Reason Issues to Consider


1 Who The offender Quits, moves, goes to The next offender may have different motivations, skill
changes jail, retires, dies, is sets, tools, patience, knowledge, etc. Existing security
replaced measures may no longer be adequate.

2 What The type of If security measures An addict, failing to gain access to an office to steal
offense carried out prove to be adequate, laptops to trade for drugs, may instead conduct a street
consideration should robbery. An offender may switch from robbing banks
be given to the offender to writing bad checks. An offender may switch from
changing offenses. crimes of violence to Internet-based scams.

3 When The time in which Daytime, nighttime, The offender may change the time of their offense. If
the crime was morning, afternoon, they cannot tunnel into a bank vault at night, they may
committed evening, weekdays, rob the bank during the day. A laptop thief, if unable to
weekends, summer, defeat physical security after hours, may decide to talk
winter, etc. their way past a receptionist to gain access.

4 Where The location of the Moves on to another If an offender cannot gain access to one building, they
criminal act house, store, may attempt to go next door to gain access. Regardless,
neighborhood, city, state/ the expectation is that they will go elsewhere. They
province, or country, etc. may change locations because they have become too
well known in their present area.

5 Why The type of target Weaker, younger, older, There are a variety of reasons why the offender may
which is attacked less security, female, male, switch targets. If a location is attacked and the target
inability to overcome turns out to be removed, the offender may take other
current security measures, items. Retail thieves may enter a pharmacy intending
etc. to steal drugs, but if narcotics are not available and
cash is, they will switch targets.

6 How The method used Gun, knife, pen, computer, The offender may change their modus operandi. For
to complete the vehicle, etc. example, the terrorists who brought down the World
crime Trade Center towers originally used a vehicle bomb
in the underground parking garage. When that failed,
they used airplanes as cruise missiles.

assume. Common sense indicates that dis- Diffusion of Benefits


placement increases the effort on the offender’s
Diffusion of benefits is the opposite of dis-
part, which is exactly why security measures
placement. Just as it is assumed by critics of
are implemented in the first place. Increasing
Rationalism that crime is simply moved to
the effort makes it more costly for the criminal
another location, there is also a belief that the
(Clarke, 2008, p. 188). Displacement can also be
benefits of situational crime prevention tech-
viewed positively if the security practitioner
niques are also moved to other locations,
gives thought from a planning perspective, con-
thereby resulting in a decrease in crime. As
siders how the criminal may react to existing
Pease states in reference to both issues:
security measures, and then creates additional
security measures. This is why multiple levels The fact that displacement has been long debated,
of physical, IT, and procedural security mea- and that diffusion of benefits has been neglected sug-
sures should be implemented. gests that displacement is dominant not because it

IV. CRIME PREVENTION AND PHYSICAL SECURITY


156 13. ENVIRONMENTAL CRIME CONTROL

reflects a real attempt to understand crime flux, but social group cohesiveness, or a host of other
because it serves as a convenient excuse for doing aspects. Acknowledging the complexity of the
nothing (‘Why bother? It will only get displaced’)”
(1997, p. 978).
theory, a crime prevention response cannot come
from one area alone. Instead, a multidisciplinary
A further, somewhat controversial point to approach must be taken, in which responses are
displacement is that there may be a benefit to tailored to the situation. One must consider the
displacing certain kinds of crimes. For example, criminal opportunity, the individual offender,
drug and prostitution control may be made eas- his or her readiness and willingness to commit
ier or more tolerable when it is away from resi- crime, and the combination of the previous three
dential neighborhoods or concentrated in one aspects as they impact the sociocultural, eco-
locale (Pease, 1997, p. 979). nomic, legal, and environmental cues. Granted,
this is not an easy theory to employ from a theo-
retical or a practical perspective. Some of the
components of this theory are certainly beyond
ROUTINE ACTIVITY THEORY the security practitioner’s reach to address, but
knowing that a detailed examination of the envi-
Routine activity theory, developed by Cohen ronment is required may enable practitioners to
and Felson, revolves around three things: a view the environment from a broader perspec-
“potential offender, a suitable target, and the tive. Knowing that decisions to conduct criminal
absence of a capable guardian” (Bottoms & Wiles, activity are often carried out for entirely differ-
1997, p. 320). All three must come together in ent reasons than previously suspected gives the
order for criminal activity to be realized. Routine security officer the opportunity to view criminal
activity theory relies on the same rational choice activity in a new light.
methodology as situational crime prevention
techniques. As in any theory, routine activity
theory has its criticisms. One of the primary criti- CRIME PREVENTION THROUGH
cisms is the assumption that criminals are rational ENVIRONMENTAL DESIGN
in their decision making. They may not use the (CPTED)
same rationale as the person implementing the
security measures. They may not even be aware CPTED, probably the most well known of
of the situational crime prevention techniques the environmental crime control theories, was
put into effect. They may be under the influence first discussed by Dr. C. Ray Jeffery in 1971. To
of drugs or alcohol or, for whatever reason, they quote Tim Crowe, a huge proponent, CPTED
may simply not care about the security measures. “expands upon the assumption that the proper
design and effective use of the built environ-
ment can lead to a reduction in the fear of crime
CRIME PATTERN THEORY and the incidence of crime, and to an improve-
ment in the quality of life” (Crowe, 1991, p. 1).
Crime pattern theory, developed by Paul and There are three key concepts specific to
Patricia Brantingham, is a rather complex amal- CPTED. These concepts are:
gamation of both rational choice and routine The use of natural surveillance. Natural sur-
activity theories, as well as a further introduc- veillance refers to increasing the ability of legiti-
tion of sociocultural, economic, legal, and physi- mate place users to see farther and wider, while
cal environmental cues. The premise is that decreasing the ability of illegitimate place users
crime does not occur randomly in time, place, to hide when waiting for the right time to carry

IV. CRIME PREVENTION AND PHYSICAL SECURITY


SECOND-GENERATION CPTED 157
out their activity. An example of using natural it a dangerous area to visit. Several CPTED
surveillance could be in an underground park- strategies were employed, including design
ing lot. As users leave their cars and head changes and enhanced security officer presence.
toward either an elevator lobby or staircase, it is Eventually, a large number of legitimate users
often difficult to see what lies inside. By replac- returned to the area, which, in turn, further
ing cinderblock with a glass partition, the prop- deterred the skateboarders from coming back in
erty manager increases the natural surveillance large numbers. While the problem has not com-
whereby legitimate users can see directly into pletely gone away, it has decreased noticeably.
the vestibule area instead of guessing what lies Further, CPTED planners should classify
ahead. Also, it is difficult for an illegitimate user security strategies into three categories. The
to stay in this area for long, as they are subject first category is the use of organized strate-
to increased visual scrutiny. gies. This includes the use of human resources
The use of natural access control. This con- to increase security, such as security or police
cept falls under the umbrella of spatial definition. officers or some other type of official guardian.
An example of natural access control is when The second strategy is to incorporate mechani-
normal place users are encouraged to use an area cal methods into enhanced security. This is
for legitimate purposes, and illegitimate users are achieved through the use of hardware such as
discouraged from remaining in the area. How CCTV, locking mechanisms, access control sys-
this is accomplished is determined by the particu- tems, fences, and other barriers. Finally, the
lar location and imagination of the property man- third and probably most important strategy is to
ager. For example, if unwanted visitors remain in use natural enhancements to enhance security
an area because of a design feature, such as a wall awareness. This may take the form of increased
or barrier, the feature should be removed (unless presence of legitimate place users, proper use
required) or changed to make it less attractive, of windows to increase surveillance, or making
thereby reducing the overall attractiveness of the all users responsible for security, and so on. It
area. Another example is skateboarders who use is important to start with the natural methods
a particular plaza because of the many attrac- of enhancing security, and then augment them
tive, flat wooden benches. Pop-up seats could be through organized and mechanical methods.
installed on the benches, making it difficult, if not
impossible, for skateboarders to use them.
Territorial behavior. This concept is key to
reclaiming an area if it has been taken over by
SECOND-GENERATION CPTED
illegitimate users. If design features have created
Developed in 1998 by Saville and Cleveland
a haven for illegitimate users and frightened off
(2009, p. 80), second-generation CPTED includes
legitimate users, then one of the most important
the original emphasis on physical location and
required actions is for the space to be reclaimed.
adds the newer concept of including social fac-
Initially, this may take the form of enhanced
tors. These factors include:
security patrols to keep illegitimate users away
until the area is once again seen as desirable for 1. Social cohesion: involves the local community
legitimate users. The return of high numbers in events, associations, and positive problem
of normal space users will deter the presence solving without resorting to violence, and
of illegitimate space users. A prime example is builds positive community relationships.
based upon the previous example of skateboard- 2. Connectivity: the neighborhood has positive
ers. In one instance, an area had practically relations and influence with external
been taken over by illegitimate users, making agencies (Saville & Cleveland, 2009, p. 82).

IV. CRIME PREVENTION AND PHYSICAL SECURITY


158 13. ENVIRONMENTAL CRIME CONTROL

3. Community culture: positive social and occupants can easily adopt proprietary
cultural activities. attitudes;
4. Threshold capacity: positive community ● Those which improve the natural capability
resources that do not overwhelm the area, of residents to survey both the interior and
proper land density use and zoning, and a exterior of the residential space;
lack of crime generators. ● Those which enhance the safety of adjoining
Second-generation CPTED focuses on the phys- areas such as communal facilities;
ical and social aspects of communities to mini-
● Finally, through the judicious building
mize both criminals and criminal opportunities. materials to reduce the perception of
peculiarity such as vulnerability, isolation
and stigma of housing projects and their
DEFENSIBLE SPACE: CRIME residents (Newman, 1971).
PREVENTION THROUGH
URBAN DESIGN
PRACTICAL APPLICATIONS
This theory revolves around the public hous-
ing environment and seeks to reduce crime As one can see, there are some similarities
through the use of natural surveillance, natural between Defensible Space and CPTED applica-
access control, and territorial concern. tions. The important concept of legitimate users
History of Defensible Space. While Oscar versus illegitimate users, the proper and effec-
Newman has written many influential pieces on tive utilization of surveillance, both natural and
this important concept over the past 30 plus years, man-made, and creating safe havens for normal
two of his most important works are Architectural users are common to both. Knowing and under-
Design for Crime Prevention, published in 1971 standing who belongs in an area and who does
through the U.S. Department of Justice, and not (legitimate users versus illegitimate users of
Defensible Space, published in 1972. Additional space), the importance of various types of sur-
books, such as Creating Defensible Space from veillance, and encouraging legitimate users of
1996, published through the U.S. Department of space to use or reclaim areas for activities are
Housing and Urban Development, add to his sig- recommendations that security practitioners
nificant body of work. can understand and appreciate.
Concept and Strategies. While there will
not be a detailed analysis of all the concepts
that encompass the theory of Defensible Space,
SUMMARY
a general overview will be made. The writer
While this chapter has not detailed each and
encourages interested parties who seek a
every theory or practice of crime prevention, it
deeper understanding to access the aforemen-
has provided an overview of the main existing
tioned books for an in-depth analysis. Basically,
environmental crime theories. Readers are encour-
Defensible Space calls for proprietors and
aged to further examine the theories outlined
legitimate users of residential space to act as
here, as they are an important aspect of crime con-
guardians of their living areas. To quote from
trol. While certainly not the only theories, rational
Architectural Design (p. 2):
choice, routine activities, CPTED, Defensible Space,
Physical mechanisms for achieving Defen-
crime pattern theory, and situational crime preven-
sible Space are as follows:
tion techniques comprise an important basis for
● Those which serve to define spheres of explaining some of the root causes of why certain
influence of territorial influence which crimes may occur repeatedly in specific locations.

IV. CRIME PREVENTION AND PHYSICAL SECURITY


SECURITY QUIZ 159
Not all the answers are contained here, and while Wortley, R. (2001). A classification of techniques for con-
every situation is unique, the security practitio- trolling situational precipitators of crime. In B. Fisher &
M. Gill (Eds.), Security journal, Vol. 14, No. 4 (pp. 63–82).
ner should understand that there are some basic Perpetuity Press.
explanations and rationales behind every crimi- Wortley, R., & Mazerolle, L. (2008). Environmental criminol-
nal activity. Implementing security enhancements ogy and crime analysis. Portland: Willan Publishing.
should be an educated decision. Hence, a detailed
study of the criminal area with the accompanying
rationale should reduce criminal opportunity. Resources
Vellani, K., & Nahoun, J. (2001). Applied crime analysis.
Butterworth-Heinemann.
References Newman, O. (1996). Creating defensible space. U.S.
Department of Housing and Urban Development.
Bottoms, A., & Wiles, P. (1997). Environmental criminology.
Newman, O. (1972). Defensible space: Crime prevention through
In M. Maguire, R. Morgan, & R. Reiner (Eds.), The Oxford
urban design. The Macmillan Company.
handbook of criminology (2nd ed.) (pp. 305–359). Oxford:
Fennelly, L. J., & Lombardi, J. H. (1997). Spotlight on security for
Clarendon Press.
real estate managers. Institute for Real Estate Management.
Clarke, R. V. (1997). Situational crime prevention: Successful
Jacobs, J. (1992). The death and life of great American cities.
case studies (2nd ed.). Albany, NY: Harrow and Heston.
Vintage.
Clarke, R. V. (2008). Situational crime prevention. In R. Wortley
National Crime Prevention Institute (NCPI). (2001).
& L. Mazerolle (Eds.), Environmental criminology and crime
Understanding crime prevention (2nd ed.). Butterworth-
analysis (pp. 178–194). Portland: Willan Publishing.
Heinemann.
Cornish, D. B., & Clarke, R. V. (2008). The rational choice
perspective. In R. Wortley & L. Mazerolle (Eds.),
Environmental criminology and crime analysis (pp. 21–47).
Portland: Willan Publishing.
Crowe, T. D. (1991). Crime prevention through environmental S E CURI TY QU I Z
design. Boston, MA: Butterworth-Heinemann.
Module 1. (1999a). Criminological theory 2: Rational choice 1. Environmental crime control theory focuses
theory: 277–304. The Scarman Centre for Public Order: upon the ___________ of the criminal act:
University of Leicester. a. Time
Module 1. (1999b). Crime prevention 2: The situational approach:
b. Location
305–344. The Scarman Centre for Public Order: University
of Leicester. c. Perpetrator
Module 5. (2000). Applied crime management: Unit 3: Crime d. Victim
pattern analysis: 113–168. The Scarman Centre for Public 2. Basically the offender uses a decision making
Order: University of Leicester. process whereby the positive and negative
Newman, O. (1971). Architectural design for crime prevention.
aspects of committing a particular act is
National Institute of Law Enforcement and Criminal Justice.
Pease, K. (1997). Crime prevention. In M. Maguire, weighed. This is an example of:
R. Morgan, & R. Reiner (Eds.), The Oxford handbook of a. CPTED (Crime Prevention Through
criminology (2nd ed.) (pp. 963–995). Oxford: Clarendon Environmental Design)
Press. b. Routine activity theory
Saville, G., & Cleveland, G. (2008). Second generation
c. Rational choice theory
CPTED: The rise and fall of opportunity theory. In
R. Atlas (Ed.), 21st century security and CPTED (pp. 79–90). d. Defensible space
Boca Raton, FL: CRC Press. 3. The application of situational crime prevention
Tayler, I. (1997). The political economy of crime. In techniques are the results of this theory.
M. Maguire, R. Morgan, & R. Reiner (Eds.), The Oxford a. Rational choice theory
handbook of criminology (2nd ed.) (pp. 265–303). Oxford:
b. Routine activity theory
Clarendon Press.
Tyska, L. A., & Fennelly, L. J. (1998). 150 Things that you c. Crime pattern theory
should know about security. Boston, MA: Butterworth- d. Defensible space
Heinemann.

IV. CRIME PREVENTION AND PHYSICAL SECURITY


160 13. ENVIRONMENTAL CRIME CONTROL

4. There are ______ aspects of displacement? c. Acting under the influence of drugs or
a. Three alcohol
b. Four d. The absence of a capable guardian
c. Five
d. Six ANSWER KEY
5. There are three key concepts specific to Manual Questions
CPTED. Which of the following is not one? 1. Environmental Crime Prevention and Social
a. Natural surveillance Crime Prevention
b. Defensible space 2. Environmental, location, criminal
c. Natural access control 3. potential, criminal
d. Territorial behavior 4. Displacement
6. There are _____ main categories of 5. Diffusion, security
Situational Crime Prevention Techniques. 6. Location
a. Three 7. Rational choice theory
b. Four 8. Rational choice theory
c. Five 9. Six
d. Six 10. Defensible space
7. Further, the categories have ___________
different sub-categories? Interim Questions
a. Three 1. Potential, target, capable
b. Five 2. Crime pattern, environmental clues
c. Seven 3. Residential, natural, natural, territorial
d. Nine 4. CPTED, increase
8. Defensible Space: Crime Prevention 5. Benefits, situational, techniques, decrease
Through Urban Design was created by: 6. Five
a. Oscar Newman 7. Five
b. Marcus Felson 8. Oscar Newman
c. Patricia Brantingham 9. Defensible Space
d. Ronald V. Clarke 10. Acting under the influence of drugs or alcohol
9. This revolves around public housing and
seeks to reduce crime through the use of Ten Final Questions
natural surveillance, natural access control 1. Defensible, guardians
and territorial concern. 2. Situational, crime, five
a. Crime Prevention Through 3. rational
Environmental Design (CPTED) 4. Environmental, Chicago, location
b. Crime Pattern Theory 5. Natural, illegitimate
c. Defensible Space 6. Location
d. Rational Choice Theory 7. Rational choice
10. Routine Activity Theory, developed by 8. Five
Cohen and Felson, revolves around three 9. Five
things: which of the following is not one of 10. Defensible Space
the three factors?
a. A potential offender
b. A suitable target

IV. CRIME PREVENTION AND PHYSICAL SECURITY


C H A P T E R

14
Physical Security Concepts and
Applications
Kevin T. Doss and
Denis A. O’Sullivan

In the security planning process, the organi-


CHAPTER OBJECTIVES
zation identifies which assets require protection
● Define physical security planning and the types of risks that could compromise
● List five steps of the security planning those assets. This critical function determines
process the level of appropriate countermeasure that is
required based upon a formally documented
● List three options for intrusion
process. Risks are usually categorized into three
monitoring
categories:
● Explain the three primary objectives of
security lighting 1. People—Human resources are usually the
most critical asset within any organization,
● Provide the three roles of CCTV and and as such, must receive a stronger
access controls consideration when assessing risk.
● Explain the value of safes, vaults, 2. Property—Physical property or intellectual
containers, fencing, and barriers assets.
3. Legal liability—Legal risks can also
affect people and property, but need to be
considered as a separate category. This is
PHYSICAL SECURITY PLANNING due, in part, to the extent which lawsuits
affect the security industry these days.
What is “physical security planning?” It is a Additionally, the security planning process
recognized security process that, if followed, will should determine the probability of such occur-
result in the selection of physical countermea- rences and the impact on the organization if
sures based on appropriateness. The selected loss should ever occur. These steps are critical
countermeasures should also be justifiable from to determine how to best protect organizational
a cost point of view. assets and must be performed periodically. An

161
162 14. PHYSICAL SECURITY CONCEPTS AND APPLICATIONS

added benefit of the security planning process according to their nature. All threats can be
is the potential for increased security awareness grouped under the following headings: indus-
throughout every level of the organization. trial disaster, natural disaster, civil disturbance,
The security planning process consists of the crime, and other risks.
following five steps: Industrial disasters—these should be easy
to identify, associated threats related to on-site
1. Assets are identified.
or adjacent activity. The following are typi-
2. Loss events are exposed.
cal industrial disasters that might affect most
3. Occurrence probability factors are assigned.
companies: explosions, fires, major accidents,
4. Impact of occurrence is assessed.
and structural collapse. To correctly assess the
5. Countermeasures are selected.
threat, you must intimately know the nature of
Let’s look at each of these steps. company activity, the nature of activity on adja-
cent properties, dangerous routes, flight paths,
1. Assets are identified
and the existence of nearby major oil or gas
At first glance, this step would appear easy;
pipelines.
however, this is not necessarily the case. Have
Natural disasters—the potential for a natu-
you ever attempted to take inventory of your
ral disaster largely rests with the geographic
personal property? The major problem seems
location of the company property. If the prop-
to be “how to;” that is, do we include every nut
erty is located in the southeast United States, it
and bolt? For the purpose of following the secu-
is reasonable to identify hurricanes as possible
rity process, this is not necessary. It should suf-
loss events. Similarly, if the property is located
fice to group assets according to category except
in California, it would be reasonable to plan for
where an item is especially attractive (from a
earthquakes. Other areas may suggest the need
thief’s viewpoint) and valuable. The following
to identify floods or tornados as threats.
categories should encompass the majority of
Civil disturbance—most companies can be
assets for most companies:
threatened either directly or indirectly by actions
– land – buildings that can be categorized as civil disturbances. If
– heavy machinery – production equipment your company is engaged in weapons technol-
– office equipment – office furniture
ogy, or indeed any activity that might be viewed
as threatening the environment, it is reasonable
– vehicles – cash or other negotiables
to expect that the company might become the
– goodwill – public image target of demonstrators. All labor disputes fall
– raw material – finished product under this heading.
Crime—it is relatively easy to identify crimes
Depending on the nature of the company’s
that might affect company operations. Any
activities, there may be other categories. In any
or all of the following will affect most compa-
event, there is one asset which has not been
nies: arson, assault, bomb threats, breaking and
mentioned primarily because it is controversial:
entering, theft, and vandalism. If a company is
employees. Employees are a company’s most
engaged in high-tech, it would be reasonable to
valuable asset, although some people do not
also include espionage, extortion, and sabotage
like to group them with all the other assets.
as likely threats.
2. Loss events are exposed Other risks—this is meant to be a catch-all
This step consists of exposing all possible for those threats that do not neatly fit the above
threats to the assets that were identified. Similar categories. Two examples are disturbed persons
to how we group assets, we group threats and loss of utilities.

IV. CRIME PREVENTION AND PHYSICAL SECURITY


PHYSICAL SECURITY PLANNING 163
3. Occurrence probability factors are assigned 4. Impact of occurrence is assessed
Having identified assets and exposed the This step is not as difficult or as uncertain
threats to those assets, the next step is to quan- as determining probability. Impact for almost
tify the possibility that the threat will occur. all organizations has a bottom line of dollars
This is probably the most difficult step in the and cents. The most important thing to remem-
process. Information must be collected and ber is that dollar losses may be either direct or
carefully analyzed to determine its effect on the indirect and that they may be so high as to be
probability for occurrence. The following affect crippling.
probability: Direct costs are those that can be directly
assigned as the value of the asset that has been
● The physical composition of structures—for lost or damaged. Indirect losses are those costs
example, wood frame or concrete block associated with the loss that would not have
● The climatic history of the area, such been incurred if the loss event had not occurred.
as number and frequency of tornados, An example is downtime.
hurricanes, earthquakes, and so on The final task in relation to impact is to
● The nature of activity at the property to assign levels or classifications that will allow for
be protected. For example, if the products correlation with the four degrees of probability.
being produced are televisions and related Again, the actual words are not important; how-
products, then the probability for theft will ever, the following are suggested:
likely be high
● The criminal history for the local and ● Very serious
adjacent areas ● Serious
● Is there community conflict in the area? ● Moderately serious
● Unimportant
An analysis of the foregoing, coupled with
We will see the importance of these ratings
a review of the activity and organization of the
shortly. Before we move to the final step, let us
company to be protected, will enable one to
recap: we have taken inventory of our assets,
make a determination with reasonable accuracy
identified the threats to those assets, assessed
regarding the probability for a loss relative to
the probability of occurrence for the threats, and
specific assets or groups of assets.
assessed the potential impact on company oper-
The probability for occurrence will not be the
ations if one of these threats were to occur.
same for all loss events. For this reason and to
facilitate later correlation with impact factors,
5. Countermeasures are selected
we must assign probability ratings. While the
This is the final step in the planning process.
actual wording is not important, the following
We now have to use all the data we have col-
are suggested:
lected to protect our property in the most effi-
● Certain cient manner, while also considering the cost of
● Highly probable these countermeasures in relation to the value
● Moderately probable of our assets. The initial step is to decide on the
● Improbable level of protection needed; the level can range
from low to very high.
To make these words more meaningful, we When selecting physical security coun-
can assign percentage weights to each: certain  termeasures, it is imperative that one use a
75–100%; highly probable  50–75%; moderately systematic approach. By standardizing the pro-
probable  25–50%; and improbable  0–25%. cess, mistakes are less likely to occur and more

IV. CRIME PREVENTION AND PHYSICAL SECURITY


164 14. PHYSICAL SECURITY CONCEPTS AND APPLICATIONS

accurate calculations can be made. In addition, Referring to our matrix, we can quickly see
one must document the process and keep accu- that the recommended level of protection is
rate written records of the recorded data. This “level IV,” the highest level possible. This would
allows for better-informed decisions regarding suggest using an effective detection system cou-
the selection and implementation of physical pled with an efficient suppression system.
security countermeasures. The large number and variety of assets and
There are several methods or processes avail- associated threats means that we will end up
able to the security practitioner when select- with a complex pattern of different levels of
ing countermeasures; however, the simplest protection. This is not as confusing as we might
method to ascertain the desired levels of pro- expect, particularly if we think in terms of
tection is a matrix as illustrated in Figure 14-1. security-in-depth.
For example, consider the threat of fire. The Security-in-depth, also known as layered
probability of a fire can be rated as “moderately protection, is a concept that means placing a
probable” for most types of businesses; from a series of progressively more difficult obstacles
criticality point of view, we must consider fire in the path of an aggressor. These obstacles are
as potentially “very serious.” often referred to as lines of defense.

Threat Level Matrix


Moderately Highly
Improbable probable probable Certain

Unimportant I I I I

Moderately
I II II II
Serious

Serious II III III IV

Very Serious III IV IV IV

Levels of Security
I Low
II Medium
III High
IV Very High

FIGURE 14-1 Threat level matrix.

IV. CRIME PREVENTION AND PHYSICAL SECURITY


PHYSICAL SECURITY PLANNING 165
The first line of defense is at the property we would apply the principle first to the prop-
line. Methods of defense at this point may be erty in general terms as described above, and
either natural, such as a river, or manmade, then to each and every asset separately. An
such as a fence. Additionally, the barrier may example would be an industrial complex and
be psychological or physical. At the very mini- an asset such as information.
mum, the property boundary must be defined The complex itself will probably be protected
in some way that separates it from its neigh- by a perimeter fence. Each building within
bors. Psychological barriers, such as property will be properly secured and there will be elec-
definition, do not impede would-be trespassers; tronic intrusion detection systems within the
however, they do play an important role in the buildings. In addition to this general protec-
rights of the property owner. tion, we should attempt to establish protective
The second line of defense is the exterior of rings around the information. For example, the
buildings. Controls at this point should be dif- information should be stored in a safe (third
ficult to overcome. It is important to remember line of defense), the safe should be in a room
that all six sides of structures (roof, floor, and that has interior motion detection (second line
walls) may present weaknesses that must be of defense), and access to the room should be
strengthened. Special attention must be given to through a door equipped with proper locking
the usual points of break and enters: doors, win- hardware and possibly a card access system
dows, and skylights. In fact, any opening greater (the first line of defense) (Figure 14-2).
than 96 square inches in area and less than 18 feet Selecting appropriate countermeasures is
from grade must be protected. It is usually at this a difficult task, requiring considerable practi-
line of defense that electronic intrusion detection cal experience and extensive knowledge of the
devices and electronic access controls are used. various controls and their strengths and weak-
The third line of defense is interior controls or nesses. Effective planning will result in a cost-
object protection. Controls at this line of defense justified, integrated protection program.
include electronic motion and intruder detection An integrated protection program results from
devices, access controls, safes, vaults, document a systems approach to selecting controls. The fol-
storage cabinets, quality locking devices, and fire lowing are two important points in relation to
protection. using a systems approach:
Applying the security-in-depth concept
means more than simply establishing three lines 1. The whole, rather than its individual parts,
of defense that will meet all your needs. Ideally, must be considered.

Doors locked Alleys and rear


and barred properly lighted
Roof openings
Fence in
secured
good repair
Alarm system
throughout store, Windows locked,
24-hr. phone barred, or well
number available secured
Locks modern Access to roof
and adequate protected
Safe lighted and Debris cleared
in open view
Building interior Cash drawer open
well lighted to prevent damage

FIGURE 14-2 Defense around exterior of building.

IV. CRIME PREVENTION AND PHYSICAL SECURITY


166 14. PHYSICAL SECURITY CONCEPTS AND APPLICATIONS

2. Design should allow for an acceptable level types of gaseous discharge lamps take 2 to 5
of redundancy, without any unnecessary minutes to reach maximum intensity. They are
duplication of effort. very effective in areas where fog is prevalent.
A word of caution in relation to gaseous dis-
A systems approach is often referred to as charge lamps is that they make color identifica-
“systems engineering.” tion unreliable.
The remainder of this chapter will concen- Metal halide lamps are also of a gaseous
trate on the physical components of a protec- type, but due to the excellent color rendition
tion program. While space will not permit great this lamp offers, it is recommended for many
detail, we will attempt to explain the major security applications. Metal halide lamps can be
points relative to security lighting, security glaz- used very effectively with color CCTV cameras
ing, alarm systems, card access systems, locks due to the light properties which imitate natu-
and keying, closed circuit television, safes and ral daylight. The downside of this lamp is that
vaults, and fencing. it is expensive to use.
Incandescent lamps are typically used in res-
idential homes for lighting. They are very ineffi-
SECURITY LIGHTING cient and have limited use for security purposes
due to the short lifecycle and expense of use.
Security lighting has three primary objectives: Quartz lamps emit a very bright white
light. Lighting may be classified as floodlights,
1. It must act as a deterrent to intruders.
searchlights, fresnels, and street lighting. The
2. It must make detection likely if an intrusion
difference between floodlights and searchlights
is attempted.
is that searchlights project a highly focused
3. It should not unnecessarily expose patrolling
beam of light, whereas floodlights project a
personnel.
concentrated beam. Fresnels produce a rectan-
Lighting systems are often referred to gular beam of light and are particularly suit-
as “continuous,” “standby,” and “movable” or able for illuminating the exterior of buildings.
“emergency.” Streetlights produce a diffused light and are
Continuous lighting is most commonly used. suitable for use in parking areas and driveways.
Lamps are mounted on fixed luminaries and are Certain lighting intensities are recommended
normally lit during the hours of darkness. for specific situations.
Standby lighting is different from continu-
ous lighting in that the lamps are only lit as Perimeter or property boundary 0.15 to 0.4 fc
required. Parking lots (open) 2.0 to 3.0 fc
Movable or emergency lighting is portable Parking garage (enclosed) 5.0 to 6.0 fc
lighting that may be used to supplement either Vehicle entrances 1.0 fc
continuous or standby lighting. Light sources Pedestrian entrances (active) 5.0 fc
may be incandescent, gaseous discharge, or
Exterior of buildings 1.0 fc
quartz lamps. The common lightbulb emits
incandescent light. Open yards 0.2 fc
Gaseous discharge lamps are street-type
lighting and may be either mercury vapor or The foregoing are suggested lighting inten-
sodium vapor lamps. Mercury vapor lamps sities only; specific circumstances may dictate
emit a strong light with a bluish cast. Sodium different intensities. To explain the suggested
vapor lamps emit a soft yellow light. Both intensities, “fc” means foot-candle and simply

IV. CRIME PREVENTION AND PHYSICAL SECURITY


GLAZING 167
refers to the amount of light emitted within 1 Safety/fire: Under this heading, we are basi-
square foot of a lit standard candle. cally looking at two types of glass: tempered
and wired.
Tempered glass can be considered safety
glass, as it is several times stronger than ordi-
APPLICATION CONSIDERATIONS nary glass. It is especially resistive to accidental
breakage. If it does break, it will disintegrate into
1. When designing a protective lighting system,
small pieces with dull edges, thereby minimiz-
consider three lines of defense: the perimeter,
ing risk of injury. Tempered glass is available in
open yards, and building exteriors.
different thicknesses to suit different purposes.
2. All accessible exterior lamp enclosures
Wired glass is glass with a wire mesh built
should be in tamper- or vandal-resistive
into it. The wire is embedded in the glass when
housing. This means that the receptacle
it is still in its molten state. Wire glass resists
and lens should be constructed of a material
impact because of its strength. It is also listed by
that will resist damage if attacked and that
Underwriter’s Laboratories as a fire-retardant
the mounting screws or bolts should be
material.
tamper-resistant.
Here are some suggested uses for safety/fire-
3. If protective lighting is to be located in an
retardant glass:
area that may be subject to explosions, the
housings should be explosive-resistant. ● Passageways
4. Before finalizing any decision on the ● Entrance doors and adjacent panels
installation of lighting, consider the impact ● Sliding glass doors
that additional lighting will have on your ● Bathtub enclosures and shower doors
neighbors. Failure to consult with a neighbor Burglar/vandal-resistive: Several types of
prior to an installation may result in costly burglar/vandal-resistive glazing materials are
redesign. available, including laminated glass, wired
The foregoing is a presentation of the basics glass and acrylic, and polycarbonate plastics.
of security lighting. Prior to utilizing any of the Laminated glass will resist degrees of impact
suggested standards, please check local codes proportionate to its thickness. This type of glass is
or ordinances. particularly valuable where the quality of trans-
parency is important and where other types of
impact-resistant material may be subject to vandal-
ism. Wired glass provides resistance of a limited
GLAZING nature; it will not resist prolonged attack. Acrylic
plastic is particularly resistive to forced attack;
The various uses, methods of fabrication, and
however, it is not as resistive as polycarbonate. It
overabundance of trade names make the selec-
is, however, much more transparent than poly-
tion of an appropriate glazing material appear
carbonate. Polycarbonate plastic is 20 to 30 times
very confusing. In an effort to simplify the pro-
stronger than acrylic of comparable thickness.
cess, we will address the subject under the fol-
Bullet resistive: Bullet-resistive material is
lowing headings:
available in the form of laminated glass or acrylic
● Safety/fire and polycarbonate plastics. Bullet-resistant lami-
● Burglar/vandal-resistive nated glass consists of multiple piles of glass and
● Bullet resistive plastic material laminated together. Highly trans-
● Special purpose parent, bullet-resistant acrylic material is suitable

IV. CRIME PREVENTION AND PHYSICAL SECURITY


168 14. PHYSICAL SECURITY CONCEPTS AND APPLICATIONS

for many cash-handling situations, such as those program. Intrusion sensors are typically inte-
which occur in banks. Polycarbonate, consisting grated with physical barriers, such as a door
of several sheets of plastic laminated together, is or window, and must take environmental
highly resistive to ballistics; however, visibility is conditions into consideration to be effective.
somewhat impaired. Selection of the appropriate detector, from the
Special purpose: Under this heading, we will numerous and varied options available, is often
look at transparent mirror glass, coated glass, a difficult task. The end user is well-advised
heated glass, and rough or patterned glass. to become familiar with the different types of
Transparent mirror glass may be installed in a detectors/sensors available and must evaluate
door or in a wall. From one side, it is functionally both the application and environmental con-
a mirror, and from the other, it permits an unob- ditions prior to implementation. If relying on
structed view through the mirror. The primary advice from a vendor for proper intrusion sen-
purpose of transparent glass is for surreptitious sor selection, it is essential that the end user
surveillance. Flow-on or cement-on plastic coat- describe their objectives and make the vendor
ing is available for application to existing installed contractually responsible for meeting those
glass. This material may serve well as an interim stated objectives.
measure until a more appropriate vandal-resistive In the following paragraphs, we will look at
material can be installed. Rough or patterned glass different types of detectors: magnetic switches,
is available with many different designs that make metallic foil, audio, vibration, ultrasonic, photo-
it range from practically opaque to practically electric, passive infrared, microwave, dual tech-
transparent. This type of glazing is most appropri- nology, and video motion.
ate where there is a conflict between the need for Magnetic switches: These are often referred
privacy and natural light. to as door contacts. They may be either sur-
face-mounted or recessed. The choice is largely
an aesthetic one; however, the recessed ones
INTRUSION DETECTION do afford more protection from tampering.
Switches are commonly “unbalanced,” which
Every intrusion detection system is meant to means that they may be defeated by substitu-
detect the following: tion of a secondary magnetic field to keep the
contacts in the open position while the detector
1. Unauthorized entry magnet is moved away from the housing con-
2. Unauthorized movement within taining the contacts.
3. Unauthorized access to controlled areas or For high-security applications, a “balanced”
objects switch is available. This switch is designed to
There are three components to an intrusion withstand defeat by creation of a secondary
detection system: magnetic field. Magnetic switches have many
potential uses in addition to their traditional
1. Detectors/sensors use on doors and windows. They may be used
2. System controls on desk or file cabinet drawers or to secure
3. Signal transmission equipment to a fixed position.
Metallic foil: This is a narrow strip of metal
foil designed to break if the surface to which
Detectors/Sensors
it is attached is attacked. It is mostly used as
The design and implementation of intrusion a glass breakage detector and is commonly
sensors are critical for any physical security seen on storefront windows and glass doors.

IV. CRIME PREVENTION AND PHYSICAL SECURITY


INTRUSION DETECTION 169
It may also be used as a barrier penetration measure radiated energy. When activated, they
detector, such as in a wall under gyprock. If simply establish the ambient temperature. From
properly installed, it should do its job well. that point on, any significant deviation will
A major detractor is that it is not considered result in an alarm.
aesthetically pleasing; this can also be overcome Microwave: Microwave detectors use high-
to some extent by the experienced installer. frequency radio waves to establish a protected
Vibration: Vibration detectors are shock sen- area. They are particularly suitable for use in
sors. They may be used to detect persons climb- areas where air turbulence or changing air tem-
ing chain-link fencing, breaking through walls, peratures may prohibit the use of ultrasonic
or attacking safes or other containers. As glass or infrared detectors. A major weakness with
breakage detectors, they are very effective and microwave is that it can penetrate beyond a
not too expensive. protected area. Microwaves will penetrate prac-
Ultrasonic: These are motion detectors. A tically all surfaces except concrete and metal.
protected area is flooded with an oval pattern Dual technology: Dual technology sensors
of sound waves. As the sound waves bounce off combine two technologies into a single sensor.
objects, they reflect a signal back to a receiver. An example of this would be to combine a pas-
Any movement in the protected area will cause sive infrared sensor with a microwave sensor.
a change in the reflected pattern, which will An alarm signal is not generated until both
result in an alarm. Ultrasonic sound waves are sensing devices are triggered. Thus, the use of
in a frequency range that is above the capac- such technology should result in fewer nui-
ity of the human ear. These detectors are par- sance alarms being generated if installed cor-
ticularly susceptible to false alarm due to air rectly and applied properly.
turbulence. Video motion: Using CCTV cameras to ini-
Photoelectric: A beam of light is transmitted tiate an alarm is another method that can be
to a receiver. The transmitter and receiver may utilized for intrusion detection. Video motion
be in one housing with the beam reflected. Any technology detects changes in light brightness
interruption of the beam causes an alarm. These levels within the coverage area. It is advisable
devices are commonly used as automatic door to only use video motion detection for an inte-
openers or in stores to ward off a customer from rior application due to the varied environmen-
entering. When used for security purposes, dif- tal conditions which exist outdoors. Vibrations,
ferent methods are used to make the beam moving objects such as trees and bushes, and
invisible to the naked eye. Either an infrared fluctuating light levels can trigger nuisance
light-emitting diode is used or an infrared fil- alarms when using video motion; they may ren-
ter is simply placed over the light source. Either der the system ineffective.
method effectively makes the beam invisible.
Infrared: These are probably the most ver-
satile detectors currently available. Patterns of
System Controls
coverage are available that will protect practi- System controls consist of components that
cally any configuration of space. They can be transform individual detectors/sensors into
used effectively to protect long narrow corri- a network of intelligence-gathering devices.
dors, portions of rooms, or entire large rooms. System controls include data processing equip-
Infrared detectors are often referred to as pas- ment, signal transmission equipment, on/off
sive detectors because they are the only detector and reset controls, backup power supply, LED
that does not monitor an environment that has system status indicators, and any other equip-
been created by the detector. Infrared detectors ment specific to a particular system.

IV. CRIME PREVENTION AND PHYSICAL SECURITY


170 14. PHYSICAL SECURITY CONCEPTS AND APPLICATIONS

The data processing equipment basically station to a commercial station in the event of a
acts as a receiver and interpreter of signals holdup of the monitoring personnel.
from the sensors/detectors and reacts to these Commercial monitoring falls into two cate-
signals in accordance with preprogrammed gories: monitoring stations or answering ser-
instructions. vices. The answering services are useful for the
The signal transmission equipment is the economical monitoring of signals transmitted
means by which an alarm is raised. This equip- by telephone dialers; however, this is not for
ment may simply activate a local siren, or it high security systems. Commercial monitoring
may send a signal over telephone wires to a stations are either Underwriters Laboratories
remote monitoring location. The telephone (UL) approved or they are not. UL-approved is
wires may be either dedicated (the most secure the best guarantee of quality service.
system) or through the normal telephone net- Note: An initial step in planning an intrusion
work by use of a digital dialer that transmits to detection system is to identify zones of pro-
a special type of receiver/decoder. tection in the building that will create a series
The on/off and reset controls can be keys, of independent subsystems. Each subsystem
toggle switches, or digital keypads. The digital should (1) be compatible with normal opera-
keypad is recommended. The backup power tions, and (2) allow for prompt response to a
supply is essential in case the electrical power specific problem area.
supply fails or is sabotaged. When the functional requirements of a sys-
The LED (light-emitting diode) system sta- tem have been identified, the system engineer-
tus indicators use different colors to indicate ing should be left to experts.
whether the system is on or off, or if there is
trouble in the system. The usual colors are red
for system okay (but in the off mode), yellow
for trouble somewhere in the system, and green CARD ACCESS
for armed and properly functioning.
The decision to use, or not to use, a card
access system should be based on the perceived
need for accountability and the accompanying
SYSTEM MONITORING financial considerations. An objective statement
for a card access system might read: “To eco-
There are basically three options: nomically eliminate the inherent security weak-
1. Local nesses in key access systems by electronically
2. Proprietary supervising and documenting the activities or
3. Commercial persons authorized to access the property.”
To be useful, a card access system should
A local system is just that, a siren or bell on have the following minimum capabilities:
the outside of the protected premises. This sys-
tem is not recommended due to its reliance on a ● Restrict access by authorized persons
passerby to actually call the police. to certain times and/or days of the
The proprietary system is similar to a local week.
system in that the system is monitored on-site ● Allow controlled after-hours access to
or remotely by employees of the owner of the selected areas within.
protected premises. If this system is used, it is ● Control after-hours access to a
advisable to have a link from the proprietary parkade.

IV. CRIME PREVENTION AND PHYSICAL SECURITY


LOCKING HARDWARE 171
● Selectively control after-hours use of ID card can easily be incorporated into any access
elevators. card:
● Maintain a record of all valid and invalid use ● Company name and logo
of cards. ● Details of cardholder
● Provide an audit trail permitting a printout ● Name
of persons on the property at any one time. ● Department
There are numerous types of cards: ● Date of birth
● Magnetic coded ● Signature
● Magnetic strip coded ● Photograph
● Proximity coded ● Condition of use (restrictions)
● Weigand coded This is not recommended, however, because
● Hollerith if the card is lost, it will be obvious to the finder
● Optical coded that it is owned by a particular organization,
The magnetic coded card contains a sheet of which may lead to unauthorized use of the
flexible magnetic material on which an array of card. There are many different card readers; the
spots have been permanently magnetized. The significant difference among them is the addi-
code is determined by the polarity of the mag- tion of a secondary method of verification or
netized spots. The magnetic strip encoding is confirmation, such as the requirement for inser-
widely used in commercial credit cards. The tion of a personal identification number (PIN),
proximity card is a badge into which electroni- through a numerical keypad.
cally tuned circuits are laminated. The badge The use of a numerical keypad usually offers
gets its name from the fact that it only has to be the valuable option of allowing a user to signal
held near the reader for authorized access to be that he is operating under duress.
granted. The reader for this card is concealed Figure 14-3 shows the functional operation of
in the wall behind drywall or paneling. The a card access system.
Weigand-coded badge contains a series of par-
allel wires embedded in the bottom half of the LOCKING HARDWARE
badge. Each wire can be assigned a logic “0” or
“1;” the combination reveals the ID number. Locking hardware can be categorized as
The Hollerith badge is easy to recognize mechanical, electrical, or electromagnetic, and
because the card has small rectangular holes as either security or nonsecurity.
punched in it. It cannot be considered a high- Quality mechanical security locks should be
security badge. The optical coded badge is easy used for all of the following:
to recognize if it uses a barcode as its encoding ● Perimeter openings
device. The barcode is commonly used on retail ● Doors that control/restrict internal
goods to assist the cashier with pricing.
movement
All of the commonly used coded cards are ● Doors to sensitive/restricted areas
reliable and, with the exception of the Hollerith
badge, are reasonably resistive to compromise. Only deadbolt locks should be considered.
Although it is not recommended, many orga- The bolt should offer a minimum of 1-inch
nizations like to use their access cards as both throw. If the door is a glass metal-framed door,
an access card and an identification badge. The the bolt should be of the pivotal type to ensure
information contained in the normal employee maximum throw.

IV. CRIME PREVENTION AND PHYSICAL SECURITY


172 14. PHYSICAL SECURITY CONCEPTS AND APPLICATIONS

Proper Send badge FIGURE 14-3 Functional operation of a card


Badge input access system.
type of number for
into reader
badge analysis

Badge
number
analyzed

Valid
Time zone Door opens
badge
allows access for seconds
number

Door
relocks

Electric locks are particularly suitable for the Note: It is essential that the fire department
following: be consulted prior to any final decision on the
locks of any door that may be considered an
● Remote control of the after-hours pedestrian
emergency exit. Get their decision in writing,
entrance door
and carefully consider it before compliance.
● Grade-level emergency exit doors
Emergency exit devices that are normally
● Exit doors from stairwells to grade level
used on emergency exit doors cause justifi-
● All stairwell doors
able security concern. If permitted, only qual-
Electric locks are available where the strike ity electric or electromagnetic locks should
is normally in the locked or unlocked position. be used. If electric or magnetic locks cannot be
Electromagnetic locks are particularly suitable for used, great care should be taken to ensure
use on emergency exit doors, as there are no mov- the emergency devices use such features as
ing parts that can accidentally become jammed. the following:
Several conditions must be met before this type
of lock can be used on an emergency exit door: ● Deadbolts
● A manual or automated egress device to ● Deadlocking latches
unlock door within close proximity. ● Vertical locking bars for pairs of doors
● When activated, the fire alarm system must
be able to automatically deactivate the Remember that emergency exit devices can
locking device. be connected to a proprietary or commercially
● Each location must have a fire pull station monitored alarm system. Loud local alarms
in its vicinity, and its activation must are also an effective way to protect emergency
automatically deactivate the lock. exits.

IV. CRIME PREVENTION AND PHYSICAL SECURITY


CLOSED CIRCUIT TELEVISION 173

CLOSED CIRCUIT TELEVISION Intelligent video is currently used in some of


the largest cities in the world to detect criminal
CCTV has three major roles in any physical activity and other issues, such as traffic prob-
security program: lems, loitering, and riot activity. Among the tre-
mendous benefits of using technology to detect
1. To deter crime or unwanted activities certain events, intelligent video may allow for
2. To allow the ability to witness an act as it the reduction of manpower by harnessing tech-
occurs nology to increase efficiency and accuracy of
3. As an investigative tool after an act has CCTV systems.
already been committed There are three main views that a standard
CCTV system should provide, depending upon
Although CCTV is typically used to monitor the application requirements:
a property or facility for crime prevention pur- 1. Identification of any subjects
poses, there are a multitude of applications with 2. Identify the actions within a scene
which this technology can be used to visually 3. Identify the scene where the act occurred
monitor events. CCTV is a great tool for assess-
ing a real-time situation involving crowd con- Subject identification is based on the prin-
trol and responding to personnel movements. ciple that whoever or whatever is viewed must
In addition, it can be used to capture customer be identifiable beyond any reasonable doubt.
movement and behavior in the retail environ- This includes capturing specific features that
ment as well as to monitor internal staff as they could identify the person, such as nose, ears,
work. CCTV can also remotely watch traffic and eye characteristics. As an example, the
flow on highways and monitor weather activity scene view usually will provide about 25% cov-
in specific areas. erage of the person being viewed. The subject
CCTV technology has progressed quickly identification view is critical when used with
in recent years. The advent of software-based facial recognition software, as the facial features
analytics has skyrocketed the capabilities of must be captured to have a reasonable success
CCTV into the future. “Intelligent video,” as rate in identification.
it is known, can offer tremendous capabilities Action identification is a view that can
under the right circumstances. As with any assess what has occurred within a given area.
CCTV system, the surrounding environment This level of video surveillance can usually
can adversely affect the effectiveness of any determine what has occurred. A good example
CCTV program. That being stated, here are a might be that a painting was stolen or that an
few CCTV software feature sets that fall into the act of violence occurred. Another illustration
intelligent video realm: of an action identification view would be in a
retail environment to determine how a retail
● Video motion detection (VMD) customer purchases specific goods while shop-
● People counting and tracking ping, and which advertisement was most effec-
● Object classification, counting and tracking tive in gaining additional sales. The action view
● License plate recognition usually comprises about 10% of the total scene
● Facial recognition image.
● Crowd detection Identification of a scene view is based on
● Psychology of motion (still under being able to identify where an act took place.
development) An example might be in the lobby or in a specific

IV. CRIME PREVENTION AND PHYSICAL SECURITY


174 14. PHYSICAL SECURITY CONCEPTS AND APPLICATIONS

department. Each scene must stand on its own Housings—several types of housings are
merit and be identifiable during playback. available. They fall into two categories: aes-
Weather monitoring is another example of an thetic and environmental. Housings can also
application using a scene view. effectively disguise the existence of a camera.
Great care must be exercised in designing a Monitors—monitors are available in differ-
CCTV system to ensure that the objectives are ent sizes and in color, monochrome, or LCD.
achieved. Caution is also necessary to ensure When a quality image is required, it is neces-
that costs do not get out of hand. This is a com- sary to use a high-resolution screen.
mon problem when the system is not designed Sequential switches—it is not necessary, or
by a security expert. usually desirable, to have a monitor for every
The following are suggested practical appli- camera. By using a sequential switcher, the
cations for CCTV: image from two or more cameras can be rou-
tinely rotated for viewing on one monitor. When
● Parkade areas, entrances/exits, shuttle
required, an operator can lock on the image
elevator lobbies, stairwells, and elevators
from one particular camera for select viewing.
● Shipping/receiving areas
Motion detectors—cameras are available
● Main floor elevator lobbies
with built-in motion detection capability. If
● Cross-over floors
movement occurs within the field of view of the
● Cash handling areas
camera lens, an alarm will sound at the control
All CCTV systems are made up of several center, or a video recorder will be activated to
components that an end user should be, at the record the activity that caused the alarm. This
very least, familiar with. The following is a brief feature is very valuable when using a large
description of each component: number of monitors.
Cameras—a primary consideration in rela- Pan/tilt/zoom—the need to use several cam-
tion to camera selection is the available light eras to cover an area or activity can be avoided
coupled with required image quality. The two by carefully positioning one camera and pro-
most common cameras in use today are the viding pan/tilt/zoom features.
charge coupled device (CCD) and the comple- Controls—in addition to the normal televi-
mentary metal oxide semiconductor (CMOS). sion controls, controls will be required for what-
Both are relatively stable camera platforms that ever special features are built into the system.
outperform older camera technology. Consoles—the design of a control center
Lenses—there are three major types of lenses console that houses a CCTV system is definitely
available for cameras today. They are fixed lens, an engineering task. Care must be exercised to
varifocal lens, and zoom lens. The fixed lens only ensure operator comfort, particularly in relation
offers a single point of view and is best used on to viewing angles and ease of accessibility of
indoor applications due to the more consistent controls.
environment. The varifocal lens offers a range Video recorders—a CCTV system should be
of views and great flexibility in application, as considered incomplete if it does not have the
long as the range is within the lens capabilities, ability to selectively record events. Recording
and the lens does not need to be refocused. The can be done on VHS recorders; however, these
zoom lens, by contrast, is best for situations in are quickly being replaced by digital video
which the lens needs to be refocused, should recorders (DVRs) and by network video record-
one change the field of view. The focus on a ers (NVRs). In some cases, the recordings are
zoom lens is maintained either through manual sent directly to a computer server using a graph-
or motorized adjustments. ical user interface (GUI). The GUI eliminates

IV. CRIME PREVENTION AND PHYSICAL SECURITY


SAFES AND VAULTS 175

Time, day, FIGURE 14-4 Typical closed circuit televi-


Video sion system.
date
monitor
generator
Camera

Camera Sequential Time-lapse


switcher VCR

Camera

the need for a separate recording “box” by Locks


using software to manage the recordings.
Day/time generators—this feature has potential Safes are available with three types of lock-
benefits in specific circumstances—for example, ing systems:
where no immediate incident response capability ● Single combination
is available, or if the recording may be required as ● Single key lock combination
evidence in court. ● Dual combination
For an example of a typical system diagram,
see Figure 14-4. With the single combination option, an unac-
companied person with the combination can
access the contents at any time. The second
option, a key lock combination, requires that
two persons be in attendance to open the safe.
SAFES AND VAULTS One person has the key to unlock the combina-
tion-turning mechanism, and the other has the
Safes and vaults are designed to offer vary- combination to unlock the safe. The third option
ing levels of protection from specific risks— is similar to option two in that two persons
namely burglary, robbery, and fire. must be in attendance to open the safe. Each
person has only one of the combinations.

Burglary-Resistive Safes
Interiors
In addition to their actual construction,
burglary-resistive safes have a number of pro- Sufficient options are available in interior con-
tective features: figurations so that the need for customization can
be avoided. Available features include fixed or
● Locks adjustable shelving and enclosed compartments
● Interior design that may be either key or combination-locked.
● Depository Available options increase proportionately to the
● Time locks size and cost of the safe.
● Time delay locks
● Relocking device
Depository
● Extra weight
● Floor anchoring This feature permits the insertion of prop-
● Counterspy dials erty, most often cash, without allowing access

IV. CRIME PREVENTION AND PHYSICAL SECURITY


176 14. PHYSICAL SECURITY CONCEPTS AND APPLICATIONS

to the safe contents. The depository is usually structural reasons, is floor anchoring—provided
fitted with an antifish device to inhibit retrieval a concrete slab is available.
of deposited property.
Counterspy Dials
Time Locks
It is not uncommon for thieves to note the
Time locks prevent access to the safe con- combination of a safe while surreptitiously
tents for predetermined timeframes by persons viewing it being unlocked. A counterspy dial
normally authorized for access. For example, prohibits anyone other than the person imme-
when a bank safe is locked at the close of the diately in front of the dial to see the numbers,
business day, it cannot be opened again until and only one number is visible at a time.
the following morning. Should the bank man- Apart from the foregoing obvious security
ager be taken from his home forcibly, he cannot features, we can tell little about a safe by look-
be forced to open the safe. ing at it; nowhere can appearances be more
deceptive. For this reason, a purchaser has to
Time-Delay Locks rely on a particular vendor or on independent
This feature is designed to protect against a appraisal. Independent appraisal is available
holdup. Opening a safe equipped with this fea- from Underwriters Laboratories Inc. (UL). If
ture requires keying the lock, followed by a pre- a manufacturer submits a product sample to
determined waiting period, before the locking UL, they will conduct various tests and issue
mechanism will unlock. A safe with this feature authority to the manufacturer to affix a specific
label to the protected line. The following UL
is often used at late-night convenience stores or
labels are available:
24-hour gas stations.
UL Labels Resistant to Attack From
Relocking Devices T.L.-15 Ordinary household tools for
15 minutes
These devices are designed to act as a second-
ary locking feature if the normal one is attacked. T.L.-30 Ordinary household tools for
30 minutes
For example, if someone attacks the combina-
tion dial with a sledgehammer, the relocking T.R.T.L.-30 Oxyacetylene torch or ordinary
household tools for 30 minutes
device will activate. After this happens, only a
qualified safe expert can open the safe. T.R.T.L.-30  6 Torch and tools for 30 minutes,
six sides
X-60 Explosives for 60 minutes
Extra Weight
T.R.T.L.-60 Oxyacetylene torch for 60
To prevent thieves from simply walking minutes
away with a safe, it is recommended that a safe T.X.-60 Torch and explosives for 60
weigh a minimum of 340 kg or 750 lbs. Most minutes
large safes do weigh 340 kg, and smaller ones T.X.T.L.-60 Torch, explosives, and tools for
can be ordered with extra weight added. 60 minutes

Safe manufacturers sometimes assign their


Floor Anchoring own ratings. An assigned rating will usually
An acceptable alternative to extra weight, mean that the safe offers a level of protection
where extra weight may present problems for that compares to what UL would assign if given

IV. CRIME PREVENTION AND PHYSICAL SECURITY


FENCING 177
the opportunity to test. A concern exists, how- Two very important points in relation to fire-
ever, that without an independently assigned resistive containers are:
rating or classification, a purchaser has no way ● Paper records will destruct at temperatures
of verifying the expected level of protection.
in excess of 350°F (159°C).
● Computer tapes/disks will destruct at
temperatures in excess of 150°F (66°C).
Burglary-Resistive Vaults
Underwriters Laboratories tests fire-resistive
Any storage container specifically designed
containers for their ability to protect contents
to resist forcible entry and large enough to per-
when exposed to heat. Tests are also conducted
mit a person to enter and move around within,
to determine the container’s ability to survive a
while remaining upright, can be considered a
drop, as might happen when a floor collapses in
vault. Vault construction consists of reinforced
a fire situation.
concrete walls, floor and ceiling, and a specially
Note: It is of the utmost importance to remem-
constructed vault door.
ber that safes and vaults are only designed to
Any consideration to build/purchase (pre-
delay entry when attacked; they are not impen-
fabricated vaults are available from most large
etrable. For this reason, safes and vaults should
safe manufacturers) must be carefully assessed
always be protected by a burglary alarm system.
to ensure cost-effectiveness. The assessment
Similarly, alarm systems should be used to pro-
must recognize that the value of the asset to be
tect the contents of record safes from theft.
stored in the vault will likely attract the profes-
sionally competent thief. The impact of this is
that regardless of construction, the vault will
only delay penetration.
UNDERWRITERS LABORATORIES
In addition to applicable features as men-
Underwriters Laboratories (UL) is a recog-
tioned for “burglary-resistive safes,” the possi-
nized certification organization for security
bility that an employee(s) may be locked into the
equipment, security systems, and security mon-
vault accidentally or deliberately in a robbery
itoring. UL criteria are important in physical
situation must be considered. To ensure safety
security, as it helps to reduce potential litiga-
of employees, all vaults should be equipped
tion by conforming to specific standards. UL
with approved vault ventilators and a method
has created safety standards for every device,
of communicating to those outside the vault.
system, and monitoring center that they cer-
tify. Many jurisdictions require UL certification
prior to commissioning the system, and in many
Fire-Resistive Containers cases, insurance premiums can be reduced for
Insulated safes, filing cabinets, and record UL-compliant installations.
containers that offer varying degrees of pro-
tection to contents from exposure to heat are
available. FENCING
The appearance of fire-resistive containers
can be particularly deceptive—of necessity, the The subject of fencing is a much more inter-
construction material is totally different from esting and important topic than most people
burglary safes. The insulation material used in first realize. Fencing has been used through-
fire-resistive containers offers little protection out history as a defense against enemies—the
from physical assault. walled city of Pompeii dates back to 800 B.C.,

IV. CRIME PREVENTION AND PHYSICAL SECURITY


178 14. PHYSICAL SECURITY CONCEPTS AND APPLICATIONS

and it was not uncommon for the complete a risk assessment. It is also necessary to gain
frontiers of kingdoms in China to be walled a thorough understanding of the enterprise’s
(origin of the Great Wall of China). Closer to operation. For the purpose of this article, we
home, the old city of Quebec remains the only will discuss the fencing requirements for a typi-
enclosed city in Canada and the United States. cal manufacturing plant located in an industrial
Modern acts of terrorism and civil distur- area of a large city. The objective of the fenc-
bance have resulted in innovations in the types ing program is twofold—to control movement
and usage of fencing. Barbed tape (razor rib- to and from the property, and to minimize the
bon), a modern version of barbed wire, is a very need for costly manpower at control points. The
effective (if not vicious) defensive, or should we latter is to be attained by keeping the number of
say, offensive material. Its use is rarely justified, perimeter openings to a minimum.
except where the highest standards of secu- While it is true that the industry is becoming
rity are necessary—for example, in a federal ever more security conscious, it is also true that
penitentiary. the owners of industrial facilities do not want
The use of barbed tape in industrial facili- their property to look like a prison compound
ties is not common in North America. Barbed or armed camp. With this in mind, the first
tape can be used in coils along the top of fences, objective is to define the boundary of the prop-
instead of the conventional barbed wire over- erty. Most often, this will require a combination
hang. In very high-risk situations, coils of of structural and psychological barriers.
barbed tape stacked in a pyramid configuration From a psychological point of view, we are
between a double conventional fence will pro- only concerned with defining the boundary—-
vide a very effective defense. mostly for legal reasons, prevention of trespass,
Another product of modern terrorism is and liability lawsuits. Property definition may
the freely rotating barbed wire fence topping be simply a change in landscaping, or indeed,
recently developed in Ireland. When a would-be anything that distinguishes the property from
intruder grabs the overhang in an attempt to its neighbor.
gain leverage, a second overhang simply rotates Somewhere between the property line and the
into place. This is more effective than the con- area of company activity, it will be necessary to
ventional overhang and much more acceptable install a structural barrier that will act as a phys-
for routine application than coils of barbed tape. ical deterrence to the would-be intruder. Usually,
Fencing as used in most applications is the this barrier is a chain-link fence, and it should be
common chain-link type with a barbed wire, topped with a barbed wire overhang. The fol-
outward facing overhang. A major weakness lowing are suggested minimum specifications:
with the chain-link fence is the ease with which
it can be climbed. To overcome this problem, 1. Minimum of 70 in height excluding top
the British developed the “welded mesh fence.” overhang.
Compared to the 2-square-inch opening in 2. Wire must be 9-gauge or heavier.
chain-link fence fabric, the welded mesh fence 3. Mesh openings must not be larger than 2
has openings of 1.5 square inches. The openings square inches.
are 3  ½ and run vertically. The narrowness 4. Fabric must be fastened securely to rigid
of the openings makes it almost impossible for a metal or reinforced concrete posts set in
climber to gain purchase. The width of the open- concrete.
ings also inhibits the use of wire or bolt cutters. 5. There should be no more than 2 inches
Prior to making any decision on the location between the bottom of the fence and the
and type of fencing, it is necessary to conduct ground.

IV. CRIME PREVENTION AND PHYSICAL SECURITY


CONVERGENCE 179
6. Where the ground is soft or sandy, the fence The employee car park should be completely
fabric should extend below the surface. enclosed; access to the area should ideally be
7. Top overhang should face outward and controlled by a card access system. Access from
upward at a 45-degree angle. the car park to the plant should be through a
8. Overhang supporting arms should be control point (manned during shift changes).
firmly affixed to the top of the fence posts. In addition to the possible need for a second-
9. Overhang should increase the overall ary line of defense, there may also be a need
height of the fence by 1 foot. for fenced areas to provide secure overnight
10. Three strands of barbed wire, spaced 6 storage for company vehicles, bulk raw materi-
inches apart, should be installed on the als, or large finished products. Waste awaiting
supporting arms. disposal should also be stored within a fenced
11. A clear zone of 20 feet or more should area. Fencing may also be required to segregate
exist between the perimeter and exterior operational areas, such as stores, tool cribs, and
structures. so on.
12. Where possible, a clear zone of 50 feet or It is important to remember that fencing is
more should exist between the perimeter first and foremost a barrier, and that as a bar-
barrier and structures within the protected rier, it does not have to be chain-link fencing. If
area. we also remember that fencing will only delay
the determined would-be intruder, it should
Vehicular and pedestrian gates in the perime- be easy to be flexible regarding the material
ter fence should be kept to a minimum—ideally, used. Hedging, poured concrete, solid concrete
to only one common entry point for employees blocks, and decorative concrete blocks are all
and business visitors. Depending on the size suitable fencing material.
and layout of the site, it may be necessary to If fencing is required to provide a very high
install a secondary entry point for emergency level of protection, its use should be supple-
use, such as access by the fire department. mented by fence disturbance detectors, motion
However, this entry point should normally detectors, and patrolling guards or surveillance
remain closed and locked. by closed circuit television.
All openings in the perimeter fence should be
equipped with gates. Even if these gates are not
to be electronically controlled initially, planning CONVERGENCE
should provide for power to each gate location
with provision for a remote control capability The term “convergence” is one that is cur-
from the control/security center. rently commonplace in the physical security
Typically, security control is provided at the arena. Simply put, convergence can be defined
first defensible point; however, numerous facili- as the meshing of physical security, logical
ties allow free access beyond this point to an security, information technology, risk manage-
inner control location. This may be beneficial for ment, and business continuity into a seamless
many reasons, especially in large, heavy traffic and integrated system and process. It would
plants. Once inside the initial perimeter, signs be remiss to overlook this important aspect of
should direct employees to the employee car physical security, as the entire industry is on the
park, visitors to an information center, and truck road to making convergence a reality.
traffic to shipping/receiving areas. Beyond these Organizations that take a holistic view of
points, a secondary secure perimeter should be security and integrate their physical security pro-
established. gram into a converged environment are finding

IV. CRIME PREVENTION AND PHYSICAL SECURITY


180 14. PHYSICAL SECURITY CONCEPTS AND APPLICATIONS

mutual benefits within the entire organization. of exposure to concepts and theory in security
When an organization can integrate their video, management. If already employed in the secu-
intrusion, and access control systems into their rity industry, an advanced degree can lead to
information technology systems, there are effi- faster promotions or an increase in salary.
ciencies that can improve the entire organization. Work experience is also a critical component,
A basic example of convergence would be and when combined with the proper education,
using the access control system over the corpo- it can lead to opportunities not afforded to those
rate network to transfer data and integrate with without the benefit of continued education.
the employee time and attendance system. The Universities such as the University of
human resources department can then utilize Leicester in the United Kingdom specialize in
the access control database (a physical security the compilation and distance education deliv-
subsystem) to track and calculate employee ery of security-specific educational opportu-
attendance and hours worked. Although this is nities. A bit closer to home, schools such as
a very basic example of convergence, it shows American Military University, York College of
how security technology can drive business Pennsylvania, and Eastern Kentucky University
efficiency and lower operating costs through offer studies that can be tailored to one’s spe-
convergence. cific area of focus. A fairly comprehensive list
One of the greatest challenges with con- of universities and colleges that offer security-
vergence is due to many departments having related degree programs can be found online at
different reporting structures, and correspond- http://www.asisonline.org/education/univer-
ingly different missions, within the orga- sityPrograms/traditionalprograms.pdf/
nization. Budgetary funding and political
wrangling can often hinder a converged envi-
ronment. Some organizations have created a PHYSICAL SECURITY
Chief Security Officer (CSO) position to assist CERTIFICATION
in the convergence of information technology
and procedures into the physical security func- ASIS International offers the only board cer-
tion. The CSO position usually has some over- tification program for physical security profes-
sight and direct accountability to make sure sionals worldwide. The ASIS Board Certified
that multiple departments work together in a Physical Security Professional (PSP) designa-
converged environment for the betterment of tion focuses on one’s proficiency in three major
the organization. domains of knowledge:
1. Physical security assessment
2. Application, design, and integration of
CONTINUING EDUCATION physical security systems
3. Implementation of physical security
There are many benefits in continuing one’s
measures
education in the security field. Continued
education is part of the career planning phase The course reference materials are comprised
and should not be overlooked as a method of eight publications, offering a substantial look
of differentiating oneself in the job market. It at physical security-related topics designed to
is more important than ever today to continu- assist security professionals in their career field.
ally improve one’s knowledge and education. It is important to point out that the ASIS
Employers are searching for employees that are “Board-Certified” designation brings accredi-
dedicated to their field and have a wide range tation to the certification process, and thereby

IV. CRIME PREVENTION AND PHYSICAL SECURITY


REFERENCES 181
creates a credential that is earned through exami- ASIS International does have eligibility require-
nation and not just handed out for doing course- ments, which include work experience, in order
work. As such, it has become the most respected to sit for the PSP certification exam. Additional
professional designation for Physical Security details can be found online at www.asisonline
Professionals worldwide. .org/certification.

EMERGING TRENDS
The physical security field is quickly develop- directly from the manufacturer. Surreptitious attack
ing futuristic technologies to meet developing methods on smart locks are difficult, if not impos-
threats. The industry is adopting automated tech- sible, to achieve, thus making such locking devices
nologies to assist in the detection and assessment more effective when protecting critical assets.
phases prior to a security force response. Visual Currently, security professionals are being
analytics, which is the science of computer-aided asked to do more, using fewer resources, which
assessment for surveillance systems, is becom- can make the task daunting, even for the best and
ing more accurate, which has led to deployments brightest. Recent terrorist attacks have hastened
around the world. These analytically driven solu- the technology curve in order to develop robust,
tions allow for rapid detection and assessment scalable, user-friendly physical security solutions
using facial recognition, psychology of motion, in the never-ending effort to prevent such acts.
path analysis, and much, much more. The need for new technologies will be critical to
Even “simplistic” devices such as locks are allow these practitioners to respond and mitigate
becoming “smart” through the use of computer the risk. It is evident that as the threats become
chips and RFID technology. These smart locks are more sophisticated, physical security technol-
almost impossible to pick and do not allow for cop- ogy must improve to meet those challenges, both
ies of the keys to be made, except when ordered now and in the future.

References Nilsson, F. (2009). Intelligent network video. New York, NY:


CRC Press.
ASIS International. (2009). PSP reference (2nd ed.). Alexandria: Phillips, B. (2002). The complete book of electronic security.
ASIS International. New York, NY: McGraw-Hill.
Barnard, R. L. (1988). Intrusion detection systems (2nd ed.).
Boston, MA: Butterworth-Heinemann.
Broder, J. F. (2006). Risk analysis and the security survey (3rd
ed.). Boston, MA: Butterworth-Heinemann.
Resources
Fennelly, L. J. (2004). Effective physical security (3rd ed.). Listed below are several resources that will
Boston, MA: Butterworth-Heinemann.
provide additional information regarding the
Fischer, R. J., Halibozek, E., & Green, G. (2008). Introduction to
security (8th ed.). Boston, MA: Butterworth-Heinemann. physical security industry:
Garcia, M. L. (2008). The design and evaluation of physical
protection systems (2nd ed.). Boston, MA: Butterworth- ● www.asisonline.org
Heinemann. ● www.info4security.com
Illuminating Engineering Society of North America. (2003).
Guideline for security lighting for people, property and public
● www.siaonline.org
spaces. New York, NY: Illuminating Engineering Society ● www.securityinfowatch.com
of North America. ● www.securitymagazine.com

IV. CRIME PREVENTION AND PHYSICAL SECURITY


182 14. PHYSICAL SECURITY CONCEPTS AND APPLICATIONS

S E C URI T Y QU IZ a. True
b. False
1. Risks are usually categorized into three 6. Deadbolt locks should have a minimum of a
categories. (Select one that does not apply) ½ throw.
a. People a. True
b. Property b. False
c. Legal liability 7. Card access systems permit accountability.
d. Insurance a. True
2. Physical security planning is a recognized b. False
security process that, if followed, will result 8. The most commonly used security fencing
in the selection of physical countermeasures material is:
based on appropriateness. a. Barbed wire
a. True b. Barbed tape
b. False c. Chain-link
3. The security planning process consists of d. Welded wire mesh
following a selected number of steps. 9. The minimum height of a security fence
a. Three should be:
b. Four a. 7 feet
c. Five b. 6 feet
d. Six c. 8 feet
4. Security-in-depth is also known as: d. 9 feet
a. Layered protection 10. Which of the following types of lighting are
b. Concealed protection only lit on an as-required basis?
c. Altered protection a. Continuous
d. Necessary protection b. Standby
5. Microwave detectors use high-frequency c. Movable
sound waves to establish a protected area. d. Emergency

IV. CRIME PREVENTION AND PHYSICAL SECURITY


C H A P T E R

15
Alarm System Fundamentals
Doug Durant and
Kevin Pound

responsible for the protection of people, prop-


CHAPTER OBJECTIVES erty, profits, and information. This chapter
● Define an alarm system provides the fundamental information you
● Explore the fundamentals of alarm need to know to be successful at your job. It is
systems and operations important to point out that this material must
be supplemented with specific information as it
● List four types of alarm monitoring applies to the alarm systems at your duty loca-
● Explain alarm sensors and how they tion. While all alarm systems perform the same
work basic function, each manufacturer’s product
● Provide effective alarm response may operate in a slightly different manner at
guidelines the location. The site may require some specific
alarm system component that makes the opera-
tion of the system different from other sites that
you may attend or be involved with as a secu-
rity practitioner.
In many cases, alarm systems form the back- Starting with the basics, a definition of an
bone of a facility’s physical protection program. alarm system is in order. Quite simply, an alarm
Universally used, alarms are very likely to be system is used to provide early warning of an
encountered by the protection officer or security intruder. There are three components to an effec-
specialist as they perform their daily duties. In tive alarm system: sensor, signal, and response.
fact, regardless of your industry, employer, shift The “system” can consist of a relatively simple
schedule, or geographic location, it is likely that switch that activates a local audible device (e.g.,
you will have some involvement with alarm siren and/or flashing emergency lights). If the
systems. system is monitored, a signal can be sent to
An understanding of basic alarm systems alert authorities or response personnel, who can
and their operation should be considered a then investigate the cause of the alarm. It can
“core knowledge” requirement for anyone also be quite complex, consisting of hardware

183
184 15. ALARM SYSTEM FUNDAMENTALS

and software elements that require considerable many cases, this will scare the criminal off before
skill and training of assigned security staff. the crime can be completed. However, in other
The most effective physical security is “lay- instances, a seasoned criminal may realize a
ered.” An alarm system should be designed to response is dependent on someone in the local
provide one or more layers of detection around area not only hearing the alarm, but also taking
an asset. Each layer is made up of a series of action to investigate it. In short, the criminal may
detection zones designed to isolate the pro- be well aware that he has a certain amount of time
tected property and to control the entry and exit to “work,” despite the activation of the alarm.
of authorized personnel and materials.
In more sophisticated systems, sensors are
interfaced with electronic entry-control devices, 2. Central Station Monitoring
Closed circuit television (CCTV), alarm report- This is the best and most popular method of
ing displays (both visual and audible), and alarm monitoring. It consists of a company that is
security lighting. As you can see, the alarm sys- paid to provide monitoring services for a variety
tem can serve as a crucial “layer” in any physi- of clients. Typically, these alarm companies charge
cal security plan. a one-time installation fee and then bill monthly
for monitoring services. Alternatively, many larger
businesses may have all of their alarm signals
ALARM MONITORING monitored by their own control centers and have
an in-house or proprietary security force respond.
Your involvement with an alarm system will When an alarm signal is received, an
depend largely on how it is monitored. There employee of the alarm company is responsible
are four methods of monitoring. for notifying the police so they can respond. In
most cases, a company’s security officers are
also notified so they can respond as well.
1. Local Monitoring
Despite its popularity, central station moni-
This is the simplest form of alarm monitor- toring is not without problems. There have been
ing. It consists of a bell or horn located near the several documented cases where the alarm com-
protected door or window. In the event of an pany failed to make the proper notifications.
attempted penetration, the resulting sound is Some alarm companies will provide their own
intended to alert nearby police, security person- security officers to respond to and investigate
nel, neighbors, or company employees. alarm conditions. In these instances, the alarm
A major drawback of this approach is the fact company’s employees must be given keys to
that many people will not bother to investigate the protected premises in order to investigate
a blaring alarm. Furthermore, manpower short- alarms. From a security and business viewpoint,
ages often make a security or police response this should be considered an additional risk.
impractical. Although relatively inexpensive to
install, this form of alarm monitoring does not
provide an adequate level of protection for most
3. Direct Fire or Police Monitoring
situations. Also, a potential criminal can disable This is no longer a common method of alarm
these alarms relatively easily. In many jurisdic- monitoring. However, in some rural or remote
tions, local municipal noise laws require the bells jurisdictions the local police or fire station will
or horns to stop after a required period of time. monitor alarms from their headquarters. When
When activated, the audible alert tells the used, this method tends to be a relatively reli-
intruder his activities have been noticed. In able way to monitor alarms.

IV. CRIME PREVENTION AND PHYSICAL SECURITY


OPERATOR INTERFACE 185

4. Proprietary Monitoring Visual displays. The type of display used


to visually inform the operator of the system’s
In this approach, alarms are monitored by status is determined mostly by the system’s
the company’s security staff. In most cases, a complexity. Today, status information is usually
security control center is on the premises and displayed on computer workstations.
serves as a focal point for all security opera- Computer workstations provide great flexi-
tions. During an alarm event, the situation can be bility in the type and format of alarm infor-
assessed by dispatching security staff to the alarm mation that may be displayed. Both text and
location or by using CCTV to “check things out.” graphic information can be presented in a variety
In a proprietary monitoring approach, the alarm of colors. Multiple alarms may also be dis-
system is operated and controlled by the property played. If alarms are prioritized, higher-priority
owner. In most cases, this means assigned secu- alarms may be highlighted by blinking, chang-
rity specialists are adequately trained and are very ing colors, or by using bold print, and so on. To
familiar with their property and its various secu- assist the operator in determining the correct
rity systems. They have a vested interest because response, alarm-specific instructions may be
they are protecting “their” company. displayed adjacent to the alarm information.
A drawback, however, is that proprietary mon- Audible alarm devices. In conjunction with
itoring can be very expensive. This is because the the visual display of an alarm, the system must
company must not only buy the required moni- also generate an audible alarm. The audible
toring equipment, it must also pay people to alarm may be produced by the ringing of a bell
operate it. Likewise, a proprietary system may or by the generation of a steady or pulsating
provide inferior results if it is not designed for the tone from an electronic device. In any case, the
specific needs of a building and its occupants. audible alarm serves to attract the operator’s
attention to the visual alarm display. Most sys-
tems have a switch to silence the audible signal
OPERATOR INTERFACE before the operator resets the alarm.
Logging devices. All alarm system activity
Regardless of the type of alarm monitoring (such as arming the system, disarming the sys-
used at your current location, eventually the tem, maintenance, and system faults) should
system’s operation will come down to a human be logged and recorded. Logged information is
being. This person might be a monitor in a cen- important not only for security personnel inves-
tral station hundreds of miles away, or they tigating an event, but also for maintenance per-
could be one of your coworkers, assigned to the sonnel checking equipment. This is especially
security control system on the first floor of cor- important when trying to troubleshoot nuisance
porate headquarters. In all cases, the operator or “false” alarms.
interfaces with the alarm. He or she interacts Alarm printers. Alarm printers are typically
with the alarm system through devices that can of the high-speed, continuous-feed variety. The
be seen, heard, or touched, as well as manipu- printer provides a hard-copy record of all alarm
lated. In most modern systems, visual displays events and system activity.
and printers can be used to inform the operator Report printers. Many modern systems
of an alarm or the equipment’s status. Likewise, include a separate printer for printed reports,
audible devices are frequently used to alert an which use information stored by the central
operator to an alarm or the equipment’s failure. computer.
Such computer workstations permit an opera- Operator control. A means is required to
tor to acknowledge and reset alarms. transmit information from the operator to the

IV. CRIME PREVENTION AND PHYSICAL SECURITY


186 15. ALARM SYSTEM FUNDAMENTALS

system. The types of controls provided usually Area protection is also sometimes called
depends on the type of display the system uses. volumetric protection. The sensors used for this
For example, keypads consist of a numeric or purpose protect the interior spaces of a busi-
LCD display system that are generally pro- ness or residence. These devices provide cover-
vided with a 12-digit keypad and several func- age whether or not the perimeter is penetrated
tion keys. These allow the operator to perform and are especially useful in detecting the “stay-
such actions as to secure, access, acknowledge, behind” criminal. As a general rule, area sen-
and reset alarms. sors may be active or passive. Active sensors
(such as microwave) fill the protected area with
an energy pattern and recognize a disturbance
ALARM SENSORS in the pattern when anything moves within the
detection zone.
A basic alarm system is divided into three By contrast, active sensors generate their
layers: perimeter protection, area protection, own energy pattern to detect an intruder. Some
and spot protection. Perimeter protection is the sensors, known as dual-technology sensors, use
first line of defense to detect a potential intruder. a combination of two different technologies,
Alarm sensors on the perimeter are typically usually one active and one passive, within the
mounted on doors, windows, vents, and sky- same unit.
lights. Since a vast majority of burglaries are Sensors used for area protection include the
committed using such openings, it is important following:
that they be a priority for protection. Commonly Microwave motion sensors. With microwave
used perimeter sensors include the following: motion sensors, high-frequency electromagnetic
Glass-break sensors. These detect the break- energy is used to detect an intruder’s motion
ing of glass. The noise from breaking glass con- within the protected area.
sists of frequencies in both the audible and Passive infra-red (PIR). These motion sen-
ultrasonic range. Glass-breakage sensors use sors detect a change in the thermal energy pat-
microphone transducers to detect the glass break- tern caused by a moving intruder and initiate
age. The sensors are designed to respond to spe- an alarm when the change in energy satisfies
cific frequencies only, thus minimizing such false the detector’s alarm criteria. These sensors are
alarms as may be caused by banging on the glass. passive devices because they do not transmit
Balanced magnetic switch. Balanced mag- energy; they monitor the energy radiated by the
netic switches (BMSs) are typically used to surrounding environment.
detect the opening of a door, window, gate, Dual-technology sensors. To minimize the
vent, skylight, and so on. Usually, the BMS is generation of alarms caused by sources other than
mounted on the doorframe, and the actuating intruders, dual-technology sensors combine two
magnet is installed on the door. The BMS has different technologies in one unit. Ideally, this is
a three-position reed switch and an additional achieved by combining two sensors that, individ-
magnet (called the bias magnet) located adja- ually, have high reliability and do not respond to
cent to the switch. When the door is closed, the common sources of false alarms. Available dual-
reed switch is held in the balanced or center technology sensors combine an active ultrasonic
position by interacting magnetic fields. If the or microwave sensor with a PIR sensor.
door is opened or an external magnet is brought Spot protection is used to detect unautho-
near the sensor in an attempt to defeat it, the rized activity at a specific location. It serves as
switch becomes unbalanced and generates an the final protective layer of a typical alarm sys-
alarm. tem. Assets most commonly secured with spot

IV. CRIME PREVENTION AND PHYSICAL SECURITY


NUISANCE ALARMS 187
protection include safes, vaults, filing cabi- (sometimes called “panic buttons”) are fre-
nets, art objects, jewelry, firearms, and other quently encountered in many business settings.
high-value property. These sensors (sometimes They are often concealed under a desk or coun-
referred to as proximity sensors) detect an tertop. Duress alarms are often used by recep-
intruder coming in close proximity to, touching, tionists, cashiers, bank tellers, security officers,
or lifting an object. Several different types are and customer service employees engaged in
available, including capacitance sensors, pres- transactions with the general public. In short,
sure mats, and pressure switches. anyone who may encounter a threatening, hos-
Capacitance sensors. These detect an intruder tile individual in the course of his or her work
approaching or touching a metal object by sens- may find a duress device of value.
ing a change in capacitance (storage of an elec- Duress alarm devices may be fixed or porta-
trical charge) between the object and the ground. ble. Operations and security personnel use them
A capacitor consists of two metallic plates sepa- to signal a life-threatening emergency. Activation
rated by a dielectric medium (an insulating of a duress device will generate an alarm at the
substance through which electric charges can alarm-monitoring station. Police or security per-
travel via induction). A change in the dielectric sonnel are then dispatched to render assistance.
medium or electrical charge results in a change Fixed duress devices are mechanical switches
in capacitance, and thus an alarm. permanently mounted in an inconspicuous loca-
Pressure mats. Pressure mats generate an tion. They can be simple pushbutton switches
alarm when pressure is applied to any part of activated by the touch of a finger or hand or
the mat’s surface. For example, an alarm is trig- foot-operated switches attached to the floor.
gered when someone steps on a mat. Pressure Portable duress devices are wireless units
mats can be used to detect an intruder approach- consisting of a transmitter and a receiver. The
ing a protected object, or they can be placed by transmitter is portable and small enough to be
doors or windows to detect entry. Because pres- conveniently carried by a person. The receiver
sure mats are easy to bridge, they should be well is mounted in a fixed location within the facil-
concealed, such as hidden beneath carpeting. ity. Either ultrasonic or RF energy can be used
Pressure switches. Mechanically activated as the communication medium. When acti-
contact switches can be used as pressure vated, the transmitter generates an alarm that
switches. Objects that require protection can is detected (within range) by the receiver. The
be placed on top of the switch. When the object receiver then activates a relay that is hardwired
is moved, the switch actuates and generates to the alarm-monitoring system.
an alarm. Naturally, in such applications, the
switch must be well concealed. The interface
between the switch and the protected object NUISANCE ALARMS
should be designed so that an intruder cannot
slide a thin piece of material under the object to A vast majority of alarms are nuisance or
override the switch while the object is removed. “false” alarms. In many jurisdictions, this places
a great deal of stress on local law enforcement
agencies. Each time a police officer is dispatched
to investigate an alarm, valuable resources are
DURESS ALARMS
being consumed. To make matters worse, most
faulty alarms are generated by the following:
In addition to perimeter, area, and spot pro-
tection, alarms can also be used for special- ● User error
ized applications. For example, duress alarms ● Poor installation

IV. CRIME PREVENTION AND PHYSICAL SECURITY


188 15. ALARM SYSTEM FUNDAMENTALS

● Poor maintenance nothing of coming into work early, staying late,


● Substandard materials or visiting the office on a holiday. There is usu-
● Employee indifference ally nothing wrong with such activity. However,
● Inadequate training and system information if it results in continuous alarm activations, an
employee awareness program is probably in
Security officers and business owners must order.
learn as much as possible about their alarm sys- Nuisance alarms consume security and law
tems. Where are the sensors located? What type enforcement resources which could be more
are they? Who monitors the system? Awareness usefully employed in other activities. Those
is the first step in effective alarm management. which come to the attention of the police can
There is simply no excuse for arming a security also be expensive. The nuisance alarm rate has
system only to have alarms activated because become so bad in many areas that local govern-
people are still in the building. ments are now assessing fines on businesses
Similarly, at some larger facilities, people and residences. These can run into the thou-
sometimes simply forget to turn the alarm system sands of dollars.
on. Checklists should be used to arm and disarm Your organization’s ability to operate its
various parts of the alarm system as required dur- alarm system may not only protect property but
ing the business day. This will also provide docu- also help protect hard-earned profits as well.
mentation of who did what and will minimize the
chances for oversights between shift changes.
When it comes to installation, many alarms
ALARM RESPONSE
are the result of inappropriate sensor selection
Earlier, the various types of alarm moni-
or placement. Alarm installations and equip-
toring were discussed. In some cases, the pro-
ment selection are not jobs for amateurs.
tection officer or security specialist will be
Alarms are electrical/mechanical devices.
dispatched to investigate an alarm event. The
As such, they require periodic maintenance.
alarm might be the result of an employee enter-
Routine operational checks should be included
ing his office before the alarm is deactivated.
to ensure sensors and related components are
It could have been caused by a stray cat wan-
working properly. For example, security staff
dering the interior of a warehouse. The simple
should walk-test every motion detector each
movement of balloons, plants, or a sign from
day. This involves physically ensuring that each
the building’s air conditioning or heating sys-
detector is functioning properly.
tem can activate a motion detector. Then again,
Likewise, there is considerable truth in the
it could be something much more dangerous.
saying, “you get what you pay for.” Substandard
One of the major problems with nuisance
materials can include sensors, mounting hard-
alarms is that they invariably reinforce a mind-
ware, wiring, and even software. There is noth-
set that every alarm is a nuisance alarm. For
ing wrong with going for the lowest bid on an
both public law enforcement and private secu-
alarm installation. However, make sure you are
rity, this leads to complacent attitudes and poor
not chasing false economy by using inadequate
officer safety procedures. For the private sector
materials which will break and require continual
protection officer, the following alarm response
replacement and repair.
tactics are recommended:
Many non-security employees have little
understanding of security issues. This includes ● Never assume an alarm event is “nothing.”
even the most basic awareness of the compa- Assume you are responding to an intrusion
ny’s alarm system. Often, employees will think until proven otherwise.

IV. CRIME PREVENTION AND PHYSICAL SECURITY


ALARM RESPONSE 189

EMERGING TRENDS
Alarm systems have and will continue to situation and allow them to respond effectively.
form a part of a protection plan in the fore- This will continue to help lower the false alarm
seeable future. However, the technology and rates and will help organizations comply with
reporting mechanisms that form part of an local and regional false alarm legislation.
alarm system continue to broaden. As with any Sensor technology continues to change, allow-
technology, end users will continue to look for ing for larger and more complex facilities or
smarter, faster, and more economical solutions. structures to be protected, along with new ways
The use of video analytics, in combination with to send those signals. Methods of alarm notifi-
CCTV, along with voice verification, will help to cation continue to be explored with improved
provide verified alarms. Alarm signals that gen- ways to provide mass notification alerts to large
erate attached video or captured images of the employee or student populations. Instant mes-
location of the alarm will provide the end user saging, text alerts, and cellular messaging are
with a clearer picture and understanding of the some of the options being used and improved.

● Maintain radio contact with fellow officers ● Know your company’s policy for alarm
and your security control center. response. Use common sense and avoid
● Maintain sound discipline. Keep radio volume complacency that can lead to tragic
low. Secure noisy keys and other equipment. consequences.
● If upon arrival to the scene, you detect ● Know of or how to locate appropriate phone
broken glass or other indications of an numbers and passwords for your monitoring
intrusion, do NOT proceed into the building. station.
Call the police and assume a position from ● Keep emergency call lists, updated with
where you can be a “good witness.” appropriate call-out lists, as well as local
● Evaluate all alarm information. Has there authorities.
been just one alarm? Is there a series of
Any alarm system is only as good as the
alarms which might indicate someone is
people who operate, monitor, and respond to it.
actually moving around the interior of the
Protection officers must be properly trained to
building? The professional evaluation of all
respond to alarms. They must understand how
alarms can assist you in determining where
their system works and the need to treat every
the intruder is. Relay this information to
alarm seriously.
responding police units.

IV. CRIME PREVENTION AND PHYSICAL SECURITY


190 15. ALARM SYSTEM FUNDAMENTALS

S E C URI T Y QU IZ c. Four
1. In many cases, ________________ d. Six
______________ form the backbone of a 6. Which of the following is not a type of alarm
facility’s physical protection program. monitoring?
a. Alarm systems a. Central station
b. Covert surveillance b. Direct fire and police
c. Report writing c. Satellite
d. Physical force d. Proprietary
2. The primary purpose of an alarm system is: 7. Logging devices are used for:
a. To conduct area surveillance a. Recording system activities and faults
b. To serve as a physical barrier b. Controlling CCTV cameras
c. To provide early warning of an intruder c. Recording time and attendance of security
d. To lower insurance rates staff
3. According to the text material, the most d. Access control to computer networks
effective security is provided with a: 8. Alarm printers are typically:
a. Technical approach a. Of the color laser type
b. Layered approach b. Of the high-speed, continuous-feed type
c. Large security force c. Black and white and medium speed
d. Key and lock program d. Extremely expensive
4. In more sophisticated alarm systems, sensors 9. A glass-break sensor is an example of:
are interfaced with electronic entry-control a. A perimeter sensor
devices, CCTV, alarm reporting displays b. A spot sensor
(both visual and audible), and _____________ c. An area sensor
_____________. d. A volumetric device
a. Police patrols 10. A duress alarm is also sometimes called:
b. Aerial units a. A reset button
c. Sniper teams b. A panic button
d. Security lighting c. Activation switch
5. How many different types of alarm d. A silent partner
monitoring were examined in the text?
a. Two
b. Three

IV. CRIME PREVENTION AND PHYSICAL SECURITY


C H A P T E R

16
Access Control
Colin Best

be expected to perform a duty relative to access


CHAPTER OBJECTIVES control during the course of their employment.
● Define access control Access control is usually more than just the face
● Clarify the security professional’s role in at the front door. It is a combination of several
access control things, including control, record keeping, and
careful planning. In many instances, access to
● Identify various methods of achieving a given area may be by patrol and identifying
access control any people in the area being patrolled. Other
● Emphasize the value of record keeping forms may involve the control and monitor-
and data storage ing of physical security systems, such as key
systems, large-scale access control, alarms, and
CCTV systems.
One familiar example of access control is
a security officer behind a desk at the front
entrance of an office building, industrial facil-
INTRODUCTION ity, or other property. This area is often called
a “checkpoint” or “guard station.” This check-
The concept of access control is relatively point is often a fixed post, meaning the officer
simple. Access control is essentially what the is posted permanently until relieved or when
wording implies: the control of access to prop- policy and/or post orders dictate. The presence
erty, services, events, or information. A large of the officer in this key location of common
part of the protection of assets, personnel, and access is a deterrent to those who may be unau-
information begins with controlling access to thorized to enter the protected area or struc-
them and the facilities where they exist. The ture. In addition to the deterrent function, an
function and practice of access control are fun- officer familiar with the protected property and
damental to the protection officer in his or her its frequent occupants will recognize those who
duties. The security officer will almost certainly are common to the property and can challenge

191
192 16. ACCESS CONTROL

those who are unauthorized. This form of aid- that it is within the legal rights of the protec-
ing access control is common in large apartment tion officer to perform the arrest. The addition
complexes. Recognition of regular occupants by of locks to alternate entrances to the facility or
the security officer is actually considered a very property will also control access. Other forms of
secure form of controlling access; however, this additional physical security, such as CCTV and
“soft” method of access control becomes less alarm systems, will further assist in the preven-
effective as the volume of traffic increases. tion of unauthorized access, although physical
Achieving the task of controlling access may be security must not interrupt safe egress from the
considered somewhat difficult if an officer were, property or site in the event of an emergency.
for example, assigned the task to control access
to a property consisting of acres of land with no
fences or physical boundaries. Access control
EMERGENCY ACCESS CONTROL
could only be achieved by frequent patrols of
One must be sure, when controlling access, that
the protected area, challenging those unfamiliar
egress in the event of an emergency is not sacri-
persons caught on the property. In this example,
ficed. Local and national fire codes often present
those challenges may be the accepted form of
challenges to controlling access to many facilities,
access control, with no further control necessary.
and it is imperative that there is no sacrifice to
However, most facilities require additional forms
the safety of the occupants of a facility in order to
of controlling access, such as waste sites, storage
achieve better security. In most instances, policies
yards, and other facilities.
are drastically altered for access in an emergency.
In some circumstances, large properties or
Where policy dictates, a fixed post may become
defensible spaces may require a softer form of
a roaming position for the officer to facilitate an
physical barrier. This may be achieved through
escort for emergency medical services or the fire
dense foliage or even through designated walk-
department. The opposite may be true when a
ways with paint around the area of protection
roaming officer will be called from a roaming
or defensible zone. This form of control merely
patrol to a fixed position at the entrance of the
implies that a certain area is off limits and offers a
protected facility to provide speedy access for dis-
convenient path around the area.
patched emergency services.
Many properties cannot depend on this “soft”
Generally, an emergency such as fire, medi-
form of physical security. It is for this reason
cal concern, hazardous spill, or gas release
that it usually becomes necessary to add forms
should result in the halt of all work in the facil-
of physical security to achieve suitable access
ity to help facilitate access. Elevators and other
control. Fences may be erected around a prop-
conveyances should immediately be surren-
erty to control access and to “force” or “funnel”
dered from casual use for use by the emergency
visitors or employees to a common entrance or
service personnel. Parking control at a facility
“checkpoint” manned by a protection officer.
entrance or loading dock can be considered an
Appropriate signage indicating a no trespass-
access control duty where entrances are kept
ing order will aid in controlling access through
clear to make way for emergency personnel.
the message that anyone trying to breach secu-
rity and access the forbidden area risks arrest
and trespassing charges. In situations where it EXAMPLES OF ACCESS CONTROL
is expected that the protection officer will arrest
anyone caught trespassing, it is crucial that sig- Now that a given facility or property has
nage is in accordance with the laws concerning been equipped with fences, locks, and other bar-
local trespass acts. It is also extremely important riers, access can be controlled at one focal point.

IV. CRIME PREVENTION AND PHYSICAL SECURITY


ACCESS AUTHORIZATION 193
Visitors and workers can be directed to one The above example is effective for regular
common point of access, but still one question occupants of a facility, but for the authorized
remains unanswered: What prevents unauthor- contractor or temporary staff, the security offi-
ized persons from simply accessing the facility cer may be provided with a visitor list or per-
through the front entrance, where the security mits. Those appearing on permits or lists will be
officer is stationed? This is the reason to have the only persons permitted access. Temporary
a policy for access control. The policy should or visitor badges may be issued in this case, lest
outline a clear definition of the requirements a person be challenged by staff in secure areas
for access to the property; for instance, a facil- of a facility.
ity such as a nightclub may only permit access
to those of a consenting age, so persons may be
required to present a valid operator’s license
AUDIT AND RECORD KEEPING
to gain access. Some facilities may require pre-
Signing a security register or muster is a com-
sentation of an invitation or ticket for a public
mon function of controlling access. The necessity
venue or private function such as concerts, large
of signing the security register can be considered
weddings, or other events. Sometimes, the offi-
a valid deterrent to unauthorized visitors, even
cer will be assigned access control to a parking
if the visitor does not need to present any other
garage and handling cash, then becomes part of
credential. This form of controlling access can be
the assignment. The protection officer may con-
applied to many facilities and areas. The security
trol access to other services. For example, the
register can have two functions: it can be used
officer may control access to a conveyance such
as an audit trail of who accessed the facilities at
as managing elevator bookings or to a loading
any given time; it can also be used for reference
area or entrance. The issuing of visitor and con-
by emergency services to obtain a list of “who’s
tractor badges may accomplish control of access
in” during a facility emergency, such as a fire.
in regard to temporary contractors. Office and
A register commonly contains information such
industrial facilities may require contractors to
as the name, employee number, work location,
present company identification. Policies and pro-
phone number, as well as the time in and time
cedures regarding access control may apply only
out and signature or initials of the individual
to certain people in certain areas at certain times.
requiring access. The officer assigned to main-
The identification industry is becoming
taining the security register should be prepared
more and more advanced, and many large
to assist those unfamiliar with the process in
corporations are implementing identification
order to keep neat and consistent files. Records
systems as corporate standards for all employ-
of this nature should be archived for retrieval
ees. Unfortunately, the tools to replicate iden-
according to the policies outlined by the
tification are also available to the criminal
employer or the client. Once expired, the records
population. Dye-sublimation card printers are
must be considered confidential and should be
readily available and are compatible with most
destroyed prior to disposal. Maintaining confi-
personal computers and graphics programs. It
dentiality of these files can be considered part of
is for this reason that many companies are add-
the duty of access control.
ing modern security features to their corporate
IDs. The use of holograms and watermarking
make replication of a well-designed identifica- ACCESS AUTHORIZATION
tion card difficult by unauthorized persons.
Company identification can be combined or During the course of performing access con-
integrated with an access card for the facility. trol, it may become necessary to deny access

IV. CRIME PREVENTION AND PHYSICAL SECURITY


194 16. ACCESS CONTROL

to those without proper credentials. The per- consist of executive offices, chemical rooms, file
son wishing to gain access may very well have rooms, and other areas that may require limit-
legitimate business on the protected property, ing or curtailing access. Rather than posting
and outright denial could create losses for the an officer at every area, access is controlled by
facility or property being protected. It is for this way of physical security barriers such as doors,
reason that facilities need a clear policy for the locks, CCTV, alarms, and electronic access con-
denial of access to individuals without proper trol. The effectiveness of physical security is
credentials. further enhanced by strict key control, effective
There are some facilities that may employ monitoring of CCTV and alarm systems by the
a strict “No Authorization, No Access” policy security officer, and accurate database manage-
that will dictate that the person requesting ment in electronic access control systems. Other
access without proper credentials be denied. important tools used to aid access control are
Many facilities will have a “backup” procedure intercom, telephone, and other voice commu-
to obtain the proper authorization for access. nications systems. Requests for access can be
One example may be that a facility manager made from remote points within the facility,
or supervisor could be called to provide verbal allowing an officer to be dispatched or to grant
authority for access. Another example may be access remotely from an electronic access sys-
to require a visitor requesting access to call an tem, given proper authorization.
authorized occupant in the facility to provide
an escort.
When the security officer is left with the LOCKS AND KEY CONTROL
decision of whether or not to allow access, it is
usually best that the officer act on the side of Locks and keys have been around for thou-
caution and deny access until a fair approval sands of years and are definitely the standard
or compromise is reached. Advising the person for controlling access in many areas. Since their
that he or she has to be denied access is an act invention, the durability and security of locks
best accomplished with diplomacy and respect. and keys have greatly increased along with their
The event of the denial should also be docu- use. Today, they help control access to almost
mented on a report suitable for the employer or every structure imaginable. Generally speaking,
client. Policies for granting and denying access a lock is a mechanical device that consists of a
should comprise part of the protection officer’s cylinder, springs, and several pins or “tumblers”
post orders or standard operating procedures. that prevent rotation of the lock cylinder or
plug without the insertion of a correctly cut key.
Higher security locks manufactured today make
APPLYING PHYSICAL SECURITY unauthorized replication virtually impossible.
IN ACCESS CONTROL Proprietary key blanks can have a restricted issue
to one distributor or end user. A restricted propri-
For many facilities, control of access at any etary keyway, combined with strict key control, is
one point may not be practical, particularly in an effective form of controlling access. Permanent
large facilities with many areas such as indus- keys should not be issued without signature or
trial and office buildings. Posting officers at receipt. Identical keys should each have unique
these various checkpoints to control access control numbers permanently stamped on the
might be an effective form of access control, key to identify issue. Temporary issue of keys
but in most circumstances, would not be a cost- should be accompanied by signature on a regis-
effective, long-term solution. These areas may ter or key sign-out form indicating a return time.

IV. CRIME PREVENTION AND PHYSICAL SECURITY


ELECTRONIC ACCESS CONTROL SYSTEMS 195
All codes and control numbers appearing on the on a computer screen, directing the security offi-
keys should be documented for key sign-out. All cer to take a predetermined action. Specifics as
key control documentation should be consid- to the name, ID number, time of transaction, and
ered confidential and should be subject to similar type of denial are also recorded electronically
record-keeping procedures as the security reg- to histories, as well as other alarms. Histories
ister. When the need to revoke access privileges and other system reports can be customized in
is necessary, keys should be retrieved, or if nec- various ways and can be a valuable aid in the
essary, locks should be changed. Some newer investigation of various incidents, as well as in
generation locks can suspend or revoke access to controlling and monitoring time and attendance.
certain keys electronically, similar to an electronic Some companies utilize data from the access
access control system. This can eliminate the costs control systems to trend occupancy levels and
of lock changes, as well as administrative costs of use this data to shed energy loads in order to
reissuing new keys to authorized people. save on rising energy prices.
The industry of electronic access systems is
continually expanding in terms of technologies,
ELECTRONIC ACCESS manufacturers, and installations. The major-
CONTROL SYSTEMS ity of these systems are becoming more afford-
able and easier to use, whereas the technology
With the addition of electronic access control that makes the systems work is becoming more
to a facility, the officer can gain control of many advanced. Compiling modern, easy-to-use,
individuals in different areas of the facility at dif- graphical user interface software has made the
ferent times, regardless of traffic volume. Most management of “enterprise” scale systems a
access systems installed today provide ease of much easier task than it was just a few years
access for authorized parties to come and go to ago. Older enterprise scale systems use operat-
their authorized destinations. Access is gained by ing systems and software that consist mostly of
presentation of a card or other physical medium typed command line interfaces, which are less
to a “reader.” The reader may be connected elec- user-friendly than the more recent graphical
tronically to an “interface” or “controller,” or user interface-based technology. Front-end com-
networked directly to a host computer system, a puters on these earlier systems usually require
trend often referred to as “edge networked tech- more frequent maintenance and are more
nology.” Modern systems are usually configured costly to repair than the modern systems being
so that the remote controller, or even the reader, installed today. Installation of an electronic
will make local decisions for access control and access control system will also contribute to the
retain history transactions locally, in the event control of keys. Master keys need only be issued
of a host computer failure or scheduled main- in certain circumstances and may be signed out
tenance. This feature is known in the industry only when necessary. A daily sign-out control
as “distributed” or “field” intelligence, and the policy can ensure that master keys never need to
activation of this feature is often referred to as leave the property. Most installed access systems
“degraded” or “offline” mode. When access is use a card or similar medium to provide access
granted to a given area, the access transaction in place of the key. If lost, the card can easily be
is stored electronically on disk, tape, or printed voided by the operator of the system. This is a
media for future retrieval as part of a “history.” simple solution compared to the loss of a master
A person attempting to gain access where not key, which results in changing many locks and
permitted can usually be reported as an alarm reissuing keys to all keyholders. The access card

IV. CRIME PREVENTION AND PHYSICAL SECURITY


196 16. ACCESS CONTROL

will usually have a numeric or binary code that Systems can be interfaced or integrated with
is verified by a computer host, ensuring validity. other systems such as building automation, fire
systems, and human resources computer data-
bases. This allows the access holder to gain
access and turn on lights or air conditioning to
his or her work area with the use of the access
RADIO FREQUENCY (RF) system. With the activation of a fire alarm, an
INNOVATIONS access card could be automatically validated for
Most modern access control systems utilize use by the fire department.
a contactless or radio frequency card that, when
merely presented near a card reader, will be read ACCESS SYSTEM DATABASE
by the system and either permit or deny access. MANAGEMENT
Recent innovations in access control technology
have led to the use of contactless “smart” cards. Controlling the access system should have
In addition to providing the required data for tra- similar strict procedures to those of the key sys-
ditional electronic access control, other informa- tems. Issue should be controlled by consistent
tion can be stored on the card, such as personal and appropriate documentation. Typically, infor-
identification numbers to allow access, or even a mation is kept in a cardholder’s file, along with
biometric template, matching the cardholder’s a history of changes and authorizations. These
thumbprint or retina information to the content files should remain easily accessible by autho-
of the card. Other uses for the card may involve rized personnel until a set time has elapsed since
building automation or cashless vending. termination of the cardholder’s access. This not
only assists in audits, but can also control costs,
as a card with picture identification can be kept
on file in the event that the cardholder returns to
work in the near future. Returned damaged or
Modern electronic access systems have many
defective cards should be destroyed and docu-
features to enhance the level of access control
mented in the system database so identical cards
to a facility, area, or room. Turnstiles, interlock-
can be reissued in the future. Equal attention
ing mantraps, and parkade gates are combined
should be paid to the management of electronic
with access readers to prevent passback and
databases. Spelling and pattern consistency are
“piggybacking” in parking garages and high-
vital to good database management. Frequent
security areas. Cards may only allow one badge
software backups may one day pay off in the
in and one badge out to track the time in and
event of host server failure.
out of the facility or area. Some systems have
enhancements, such as the addition of “mobil-
ity impaired” access, to allow the extended BIOMETRIC TECHNOLOGIES
opening time of a door. In the event of a stolen
card, the card can be “tagged” with an alarm Biometric technology is slowly becoming more
upon use, alerting the operator at the monitor- commonly used in airports and other immigra-
ing station to dispatch security personnel to the tion checkpoints. Facial recognition technology
location of the cardholder. Meanwhile, the card is integrated into CCTV systems to identify indi-
remains active and permits access, so as not to viduals who are either wanted by law enforce-
alert the holder of the card. ment or may not be permitted travel to a given

IV. CRIME PREVENTION AND PHYSICAL SECURITY


ACCESS CONTROL IN THE INFORMATION AGE 197
country. Facial recognition technology is quickly Another large part of controlling access is
becoming an important tool in the prevention security awareness. Identifying and reporting
of international terrorism, smuggling of contra- lapses in security can prevent unauthorized
band, and child abduction at points of entry in access. Closing blinds in a locked office pre-
countries around the world. vents access to some of the visible information
held within. Paying extra attention to weak-
nesses in physical security, policy, and facility
ACCESS CONTROL IN THE design can play a large part in access control.
INFORMATION AGE As with many processes, the policies and pro-
cedures for controlling access in facilities are
Since the mid-1990s, business has migrated sometimes subject to flaws or have “room for
from the physical storefront to the Internet. We improvement,” and should therefore be scruti-
now use this medium to perform banking, man- nized by management. Some ideas for change
age our investments, and purchase goods and and improvement can be made at the level of
services. Companies make use of the Internet to the protection officer, and discussion between
give their employees access to the corporate net- officers concerning problems should be encour-
work so that they may work from home. Years aged at shift exchanges during officer brief-
ago, people perceived corporate espionage as ings and staff meetings. Tightening security
being performed by people dressed in trench should not be the only criterion for continuous
coats, picking locks with crude devices, and steal- improvement. In many instances, the need for
ing information with small cameras. Today, that faster authentication of authorized person-
image has been replaced with a teenaged com- nel may be considered essential, as losses may
puter hacker at home in his parents’ basement. occur due to an unauthorized person being
This sort of threat has led to an increase in the IT “held up” by security.
security field, a multibillion-dollar industry.

EMERGING TRENDS
In addition to those trends in information images produced by this technology for viewing
security, there are many new and emerging by security personnel are truly vivid nude ren-
trends and tools that relate to the function of derings of passengers. The industry insists that
access control. These include, but are not limited privacy is maintained, as there are no stored
to, optical high-speed turnstiles, handheld explo- images, and the facial images are censored.
sive and biohazard detection, and most recently, Use of these systems has not only been insti-
millimeter wave scanning. Millimeter wave scan- tuted at airports and embassies, but is becoming
ning is the latest trend in pre-board screening at common in nightclubs and even theaters. The
airport facilities. While it is an effective replace- role of performing and facilitating access control
ment for manually searching passengers, privacy continues to evolve, as does the technology that
advocates criticize the technology as unnecessar- supports it. It is a vital first line of defense in the
ily invasive and a threat to personal privacy. The protection of people, assets, and information.

IV. CRIME PREVENTION AND PHYSICAL SECURITY


198 16. ACCESS CONTROL

S EC U R I TY QU IZ 6. __________ key blanks can have a restricted


1. The task of performing effective Access issue to one distributor or end user.
Control includes record___________ a. Metal
a. Control b. Foreign
b. Planning c. Proprietary
c. Keeping d. Expensive
d. Destruction 7. The feature of access control systems
2. Signing in at a security ________ is a common operating off-line and not connected to
function of controlling access. a host computer is often referred to as
a. Officer ‘________’ or ‘offline’ mode.
b. Register a. Upgraded
c. Course b. Access
d. Door c. Degraded
3. ________ of regular occupants to a facility d. Egress
is considered a very secure form of access 8. Smartcards have the ability to store a
control. biometric _______ among other types of
a. Recognition information.
b. Harassment a. Template
c. Interrogation b. Contemplate
d. Arrest c. Record
4. There needs to exist a clear policy for the d. Cash
denial of _______ for individuals without 9. _________ __________ _________ is an
proper credentials. effective alternative to manually searching
a. Rights airline passengers.
b. Access a. X-Rays
c. Service b. Facial Recognition Technology
d. Income c. Millimeter Wave Scanning
5. The effectiveness of physical security is d. Biometric Template Technology
further enhanced by strict __________ control. 10. Biometric technology is slowly being
a. Inventory removed from usage in airports and other
b. Pest immigration checkpoints.
c. Car a. True
d. Key b. False

IV. CRIME PREVENTION AND PHYSICAL SECURITY


C H A P T E R

17
Detection Technology
Kevin T. Doss‚
Christopher A. Hertig, and
Bethany J. Redmond

personnel efforts and assist in the assessment of


CHAPTER OBJECTIVES containers or vehicles. The selection and use of
● Identify considerations for selecting and detection equipment should complement the
implementing detection equipment types of inspections defined by security policy
● Metal detection and related procedures. In addition, detection
technology should be based upon the protec-
● Explosive detection tion level required, as well as the sophistication
● X-ray detection and type of threat.
● Canine detection To determine which detection technology is
● Electronic article surveillance systems most suitable for organizational needs, it is essen-
tial to consider the durability and reliability of the
● Responding to alarms equipment, the area of detection, and volume of
traffic or articles to be screened, and the aesthetic
effect on and cultural fit with the work environ-
ment. It is also necessary to evaluate the life-cycle
cost of the detection equipment when purchas-
WHICH DETECTION EQUIPMENT ing the proper technology. The life-cycle cost
IS THE BEST? estimates include more than the initial cost of the
equipment, as it is necessary to factor in the cost
It has been a long-standing practice to uti- to install, operate, maintain, and adjust for other
lize inspections and searches to detect and pre- fees, such as applicable taxes.
vent the introduction of dangerous articles or After the selection of the detection equipment
deter the theft of organizational assets. To better has been made, it is necessary for the supplier to
protect assets and personnel, detection equip- assist in developing training material for the pro-
ment is used at ingress and egress points. This tection officers who will operate the equipment.
detection technology can enhance security This training should be developed in accordance

199
200 17. DETECTION TECHNOLOGY

with the manufacturer’s specifications and com- Magnetometers


ply with the organization’s security policy and
procedures. Such training should address all A magnetometer is a device that detects
organizational requirements and related expecta- changes in a magnetic field caused by the pres-
tions regarding the implementation of the detec- ence of ferromagnetic materials, or materials
tion systems. The training phase will also assist attracted by a magnet. Metals such as copper,
in the promotion, awareness, and compliance for aluminum, and zinc cannot be detected by a
employee and visitor alike. magnetometer.

METAL DETECTION Continuous Wave Devices


These devices generate a magnetic field of
Devices used for the detection of metal vary low strength. A difference in the signals sent and
by application (walk-through monitors or hand- received by the transmitter and receiver from
held devices) and composition sensitivity (what the introduction of a metallic object in the mag-
type of metal it can detect). A manual inspec- netic field will cause an alarm. Continuous wave
tion, using a handheld metal detector, may be devices can be calibrated to optimize detection
necessary to locate objects on an individual if of ferromagnetic or nonferromagnetic metals.
a larger, automated detector is triggered when
the individual passes through the field of detec-
tion. It is essential that the protection officer Pulse-Field Detectors
conducting the manual inspection displays the
Pulse-field detectors operate by complex fre-
utmost level of professionalism and courtesy to
quency waves that induce an eddy current in
the individual subject to the screening. If pos-
the metal introduced in the field of detection.
sible, the gender of the officer conducting the
The signal resulting from this reaction will gen-
screening should be the same as the individual
erate an alarm when it exceeds a certain thresh-
being screened.
old. As with the continuous wave device, the
Non-portable, or “fixed,” metal detectors
pulse-field detector’s phase detection permits
are being used at airports, courthouses, pris-
form optimization for detection of ferromag-
ons, mailrooms, and even in public schools.
netic and non-ferromagnetic metals. If paired
Moreover, high-security facilities, such as labo-
with digital technology, a pulse-field detector
ratories, nuclear plants, and chemical facilities,
produces an enhanced analysis of the signal,
deploy such technology for both security and
allowing for better discrimination between
safety purposes. Many mineral companies have
different types of metals, as well as between
also deployed such technology to track employ-
prohibited items and harmless metal objects
ees who handle precious metals, such as gold or
passing through the detection field.
silver, due to the high value these metals have
on the open market.
Another application for metal detection tech-
nology is being used by police investigative units X-RAY
that operate portable (often handheld) metal
detectors at crime scenes to locate guns, knives, X-ray detection technologies are also used
bullets, and casings for investigative purposes. to detect dangerous or prohibited items when
The following are several metal detection screening packages, containers, or vehicles. The
technologies in use today: type of substance detected by the X-ray detector

IV. CRIME PREVENTION AND PHYSICAL SECURITY


EXPLOSIVE DETECTION 201
is dependent upon the energy transmitted by the or vehicles. Security officers involved in the
device. X-ray detection devices are capable of inspection process are responsible for prevent-
detecting drugs, metallic items, explosives, and ing the introduction of hazardous materials into
some food items. An example is a portable X-ray the area and should be able to recognize the five
detector used in a mailroom to check packages basic components of an explosive device:
for explosives or other dangerous items. ● A power source such as a battery
Standard X-ray units can only scan objects, ● An explosive material such as TNT,
but not people, due to the amount of radia-
dynamite, or C-4
tion produced. However, low-dose X-ray units ● A detonator or blasting cap
are being tested at several airports. These low- ● A triggering device such as a clock or switch
dose machines utilize backscatter technology, ● Connecting wires
which allows for safe use of X-ray detection on
humans. This type of detector will show the When viewing the detection equipment moni-
human body underneath clothes and requires tor, it is important to observe the shapes of objects
a front and back scan to properly assess the being screened. Some dangerous articles will be
individual. A note of caution must be exercised more obvious than others. Sometimes a danger-
when using these devices, as there have been ous or hazardous item may be disassembled. In
several lawsuits involving “invasion of pri- this case, a package or container may be classified
vacy” charges by individuals who have been as a possible threat even if only two components
scanned. In response, one airport has started to of an explosive device can be identified.
“black out” private areas on individuals being
scanned to protect their privacy. Chemiluminescence Detectors
There are a few concerns when using X-ray
technology as a detection method. First is the Chemiluminescence detectors can detect explo-
fatigue that operators experience when look- sives such as RDX and PETN through photo-
ing at an X-ray monitor for extended periods chemical means. Vapor samples collected from the
of time. This can be mitigated by rotating shifts subject being screened are separated into compo-
routinely based on 20- to 30-minute intervals nents by a gas chromatograph. After the sample
between operators. Another important issue to is heated and the existing nitrogen compounds
operators is the assessment interpretation dur- decompose, the residual nitrogen oxide (NO) will
ing image analysis. Individuals can make mis- react with ozone, creating nitrogen dioxide that
takes and often misdiagnose items or overlook emits a photon detected by the device.
dangerous objects. Mistakes can be reduced
through proper training of staff and by use of
Backscattering Technology
corrective measures.
Backscattering technology utilizes a detec-
tion process which can detect organic com-
pounds with a low atomic number using X-ray
EXPLOSIVE DETECTION reflection. This type of sensing technology is
also very effective in detecting narcotic drugs.
Like metal detectors, devices used to detect
explosives may vary based on method of
Computed Tomography
detection or application. Some devices are
suitable for screening people, while other tech- Computed tomography (CT) uses a compu-
nologies can only be used to search containers ter program to automatically scan packages for

IV. CRIME PREVENTION AND PHYSICAL SECURITY


202 17. DETECTION TECHNOLOGY

explosives. CT technology uses X-ray scanners consistency and uniformity make it possible for
that provide 3D images of the potential explo- dogs and handlers to be interchangeable among
sives. The costs to operate CT technology are teams. This also allows for additional flexibility
comparably higher than other explosive detec- among handlers should someone be out on sick
tion technologies. leave or take vacation time.
Typically, canine olfaction is used to detect
explosives at military bases or airports, or dur-
CANINE DETECTION ing special events. What’s more, they are very
effective in tracking down illegal substances
Dogs can be very effective instruments of at border crossings, public schools, and cor-
detection and offer great portability in a vari- rectional institutions. Dogs are also effective
ety of security applications. Research indi- in detecting both live humans and/or dead
cates that a dog’s olfactory system is 10,000 to bodies during environmental disasters such as
10,000,000 times greater than that of a human. Hurricane Katrina.
A dog’s keen sense of smell can be developed Additionally, the presence of a detection
and used in a variety of detection and security dog can provide a deterrent value to individu-
applications: als considering entering the area with prohib-
ited items or dangerous articles. Dogs are also
● Explosives
of high value when used to disarm or distract
● Human concealment and tracking
dangerous subjects.
● Drugs
It is worth mentioning that improper beha-
● Patrol services
vior by the dog and handler can ruin the
● Chemical weapons of mass destruction
reputation of the company or organization.
● Dual-trained as detection and bite dogs
Management should consider the potential
● Defense and protection of the handler
reputation damage resulting from unprofes-
Dogs trained for detection purposes may be sional behavior by the handler or dog and must
more reliable than other methods of detection ensure compliance with any legislation pertain-
because they are not very susceptible to false ing to the use of guard dogs. Indemnity against
alarms. Dogs are reliable and selective when harm or damage arising from the use of guard
detecting sources of chemical vapors and are or detection dogs should be provided by the
able to distinguish between very similar chemi- contractor. Another downside to using dogs is
cal compounds. Machines used in detection are the lengthy initial training period required for
adjustable and can be altered by users to reduce both dog and handler. Such training equates to
the occurrence of false positives. However, if cost, and many organizations do not have the
the threshold of the detection equipment is patience or funding to support it.
changed too much, the equipment may no lon-
ger be effective in detecting these substances.
A well-trained dog and handler team can typi- ELECTRONIC ARTICLE
cally work effectively for 8–10 hours. However, SURVEILLANCE
there are other variables to take into account to
determine how long a dog can work, such as vol- Electronic article surveillance (EAS) is a
ume of work, temperature, and amount of rest. technology that typically uses magnetic, VHF/
Consistency must be established during the train- microwave, or barcode sensors to detect fraudu-
ing regimen, and every handler and dog should lent activity. An EAS system is a protection sys-
be trained under the same conditions. Such tem that uses electronic sensors and detectors

IV. CRIME PREVENTION AND PHYSICAL SECURITY


RESPONDING TO ALARMS 203
that create a field of detection or surveillance. RESPONDING TO ALARMS
The electronic sensors, also known as labels or
hard tags, are secured directly to the merchan- A systematic process for the investigation, iso-
dise or asset. If the label or tag is not properly lation, and handling of the person, item, or area
removed from the item, the detector will sound being screened is necessary when responding to
an alarm when the article passes through the an alarm. The detection and identification of a
zone of surveillance. dangerous or prohibited item are the first steps
In the past, EAS technologies were generally of incident prevention. During an inspection,
used only in retail establishments to prevent the a protection officer must be on the lookout for
theft of merchandise. Today, EAS systems can indicators of dangerous articles, unusual series of
be found wherever there is a need to protect events, and abnormal behavior. After a suspect
assets from loss, including libraries, long-term article is discovered, it is crucial for the protection
care or assisted living facilities, and pediatric officer to proceed rationally and calmly to take
units in hospitals. control of the situation. Officers and responders
Another technology which has gained must act decisively, in accordance with policy
ground recently is radio frequency identifica- and procedures, while taking into account the
tion (RFID). Retailers have been at the forefront circumstances, the environment, and the detected
of this technology curve, using RFID to detect material or article itself. Report the situation to
fraudulent activities. However, RFID technology the controller or supervisor and take action to
allows for more than just theft protection at the reduce the threat and protect life. Be sure to con-
retail outlet. Products can be tracked from the trol and limit access to the immediate area and
raw material stage, through the manufacturing/ direct people safely to a designated muster area,
production stages, all the way to the end user. away from the suspected article. Do not attempt
Thus, RFID technology provides real-time data to move or disrupt the suspect item. Make note
which can assist the organization in efficiency of any details of the article and report them to
and productivity, while protecting assets from the supervisor and response personnel. When
theft or damage. the response personnel arrive, work with them to
In addition to electronic EAS tags, there are maintain control of the area and situation.
a few other technologies which are currently in Hands-on inspections of people are to be
use. Value deprivation tags make the item more used only as a last resort, in concurrence with
difficult to steal, but usually do not initiate an security policy, and under the direction of super-
alarm. Tags such as the “gator” tag actually tear vision. A manual inspection may be necessary to
the clothing they are attached to if an attempt to locate objects on an individual if an automated
remove them without the proper tool is made. detector alarms. If an individual refuses to coop-
Another similar tag is the infamous “ink” tag, erate with the protection officer’s request for an
which explodes stain onto the clothing if an inspection, the officer should remember that
attempt is made to remove it without the proper physical force is used as a last resort and refusal
removal tool. The retailer must place such tags to comply with the request is not a crime. Force
on clothing so they are visible, since these are should only be used under severe circumstances
considered to be deterrent devices. Moreover, and if the protection officer reasonably believes
additional training and funding are required that the individual poses a threat to others. In
to implement such technology storewide. The the event the inspection reveals the presence of
tags can also reduce cashier efficiency level, as a prohibited or dangerous article, the protec-
the cashiers must remove the tag at the time of tion officer should contact law enforcement and
purchase. hand the person over to them.

IV. CRIME PREVENTION AND PHYSICAL SECURITY


204 17. DETECTION TECHNOLOGY

EMERGING TRENDS

Emerging trends in detection technology compared to other bulk explosive detection


include the possible use of MRIs in airports to technologies on the market today. One potential
scan and differentiate hazardous liquids from application for QR is the detection of land mines
nonhazardous liquids. Researchers at national in combat zones.
laboratories, who developed “MagViz” to take As technology advances and security demands
enhanced pictures of the brain, believe that this increase, the capabilities and uses for detection
technology might also be helpful in airport secu- equipment will also increase. Furthermore, it is
rity screening. Another detection technology that anticipated that the adversary will become even
is becoming more prominent is quadrupole reso- more sophisticated, and detection technology
nance (QR) or nuclear quadrupole resonance. will need to improve as new threats develop. In
(NQR), which is an MRI technology used to addition, both criminals and terrorists are devis-
detect hidden explosives. This technology uses ing unconventional methods and techniques to
radio waves (low energy type) to determine if destroy or compromise assets. Such advancements
any nitrogen-rich materials are present. The cost will require a more educated and aware operator,
of these QR scanners is relatively inexpensive along with an effective training program.

SUMMARY the organization. Detection technology is here


to stay and will become more sophisticated to
It is evident that no single detection techno- meet security requirements in the future.
logy is properly suited for all applications. The
detection technology must be matched to the
organizational objectives and applicable threats. References
As with most security technologies, human Association for Automatic Identification and Mobility. (n.d.).
interaction and assessment capabilities drive the Electronic article surveillance. Retrieved October 14, 2009,
effectiveness of detection technology. Total cost from http://www.aimglobal.org/technologies/eas/.
of ownership for the technology system, along Cannon, J. C. (2008). MRI at the airport? Retrieved October
with operator training, is a critical component 15, 2009, from http://www.innovation-america.org/
archive.php?articleID447.
in choosing a detection system. A security pro- Fischer, R. J., Halibozek, E., & Green, G. (2008). Introduction to
fessional should consult with an attorney to security (8th ed.). Boston, MA: Butterworth-Heinemann.
discuss potential liabilities and concerns prior Garcia, M. L. (2008). The design and evaluation of physical
to implementing any of these technologies, as protection systems (2nd ed.). Boston, MA: Butterworth-
some may be considered “invasive.” It is also Heinemann.
Patterson, D. G. (2004). Implementing physical protection sys-
critical during the planning phase to deter- tems: A practical guide. Alexandria, VA: ASIS International.
mine the threat basis and design the detection U.S. Department of Energy. (2008). Contractor protective force,
system based upon the needs and culture of DOE M 470.4-3A.

IV. CRIME PREVENTION AND PHYSICAL SECURITY


SECURITY QUIZ 205

S EC U RI T Y QU IZ b. X-ray
Detection Equipment c. Pulse-field detector
d. CT scan
1. How many suspect components of an
6. Which chemical compound does
explosive device are needed to warrant a
chemiluminescence technology detect?
possible threat?
a. Carbon dioxide
a. Five
b. Nitroglycerin
b. Three
c. Nitrogen dioxide
c. One
d. PETN
d. Two
7. The selection of detection equipment should
2. Which component is not considered a basic
be based on:
component of an explosive device?
a. Life-cycle cost of the equipment
a. Explosive material
b. Reliability of the equipment
b. Detonator
c. Type of threat
c. Connecting wires
d. All of the above
d. Projectile
8. Electronic article surveillance (EAS) systems
3. Which of the following is considered to be a
are used to detect:
downside to using detection dogs?
a. Electrodes
a. A dog’s keen sense of smell can be
b. Merchandise surplus
developed and used to detect drugs and
c. Fraudulent activity
explosives
d. Retail invoices
b. Unprofessional behavior by a dog and
9. When responding to an alarm, it is
its handler may ruin the company’s
important to:
reputation
a. Use physical force
c. An individual may be deterred by the
b. Remove the suspected article from
presence of a detection dog from entering a
the area
facility with a dangerous item
c. Control access to the detection
d. A detection dog may be an effective tool
equipment
for detecting lost or missing persons after
d. Abide by company policy and procedure
an environmental disaster
10. Which of the following is not a consideration
4. A magnetometer is a kind of metal detector
when using X-ray detection technologies?
that detects:
a. Taking necessary precautions to protect
a. Zinc
one’s personal privacy
b. Aluminum
b. Implementing shift rotation for security
c. Ferromagnetic material
personnel to mitigate operator fatigue
d. Nonferromagnetic material
c. Training new operators is lengthy and
5. Which of the following is not a metal
expensive
detection technology used prominently in
d. Implementing proper training and
security applications?
corrective measures to reduce mistakes
a. Continuous wave device
made in assessment interpretations

IV. CRIME PREVENTION AND PHYSICAL SECURITY


This page intentionally left blank
U N I T V

SAFETY AND FIRE


PROTECTION

18 Fire Prevention, Detection, and Response


19 Occupational Safety and Health and the Protection Officer
20 An All Hazards Approach to Hazardous Materials
This page intentionally left blank
C H A P T E R

18
Fire Prevention, Detection,
and Response
Michael Stroberger

situations, the protection of human lives must


CHAPTER OBJECTIVES be the most important factor. Property can be
● Identify the three components of a fire replaced, information recompiled, and other
triangle materials remade. Protection of human lives
● List typical hazard areas where fires may must be the overriding consideration in every
occur prevention and response plan.
● Identify the four types of fires
● Explain the use of five types of fire FIRE BASICS
extinguishers
● Emphasize the necessity of developing a Fire is, in its basic mechanics, nothing more
fire plan than an extremely rapid conversion from one
state to another. This reaction requires three com-
ponents to occur and must continue to utilize
these three components to be sustained. As such,
in looking at the prevention and response to fires,
Fire has long held a position as one of the
it is essential that everyone understand these
most feared threats to life and property. Fires
parts, known as the “fire triangle.”
not only destroy homes and buildings, but they
can also consume vast expanses of wilderness 1. Fuel—for a fire to exist, there must be
or entire neighborhoods, and take the lives of some materials available that are capable
people within their area of effect. Once initi- of combustion. The material could be as
ated, fires spread rapidly and become extremely simple as paper or wood, or as complex
hard to control or extinguish. as magnesium. In every case, fuel is the
Our best defense is the prevention of fire component that undergoes the conversion
before it begins. Through effective controls from its current state to a different state. In
and inspection, this threat can be significantly most cases, conversion is from a solid to a
reduced to the benefit of everyone. In all fire gas, with some solid materials remaining.

209
210 18. FIRE PREVENTION, DETECTION, AND RESPONSE

2. Oxygen—the conversion of states in a area. The operation of industrial dryers requires


fire situation requires an interaction with the production of heat. When processing cloth,
available oxygen. In most cases, fires are there is a certain amount of lint that is produced.
entirely dependent on the oxygen in the As a result, there is a ready supply of fuel (lint is
surrounding air; in other, fairly rare, cases very combustible) in close proximity to a heat
the material that is being consumed may source. The prevention practice is extremely sim-
produce oxygen as a result of this process. ple: remove and clean the lint filter after each load,
3. Heat—the final component required to cause or at least on a regular basis.
the fuel in an oxygenated environment to Other typical hazard areas to inspect could
begin the process of conversion is some include the following:
source of heat. ● Boilers, heaters, and furnaces
Without the presence of all three compo-
● Cooking areas
nents, a fire cannot begin or be sustained. This
● Electrical equipment and breaker rooms
leads us to the basic concept that cleanliness is
● Storage areas for flammable liquids
a major contributor to the prevention of acci-
● Vehicle storage areas
dental fires. If all available fuels are stored in
● Work areas that utilize oils, paint thinners,
a manner consistent with fire prevention prac- and other combustible liquids
tices, they will be sufficiently removed from
● Smoking areas
identified sources of heat, and the chance of As a general rule, areas that are cluttered
combustion is almost eliminated. This means tend to have an increased chance of fire hazards
that all identified sources of fuel must be iden- and should be frequently inspected until they
tified and properly utilized and stored, to pre- are properly cleaned.
vent exposure to heat (Figure 18-1). When inspecting for fire hazards, which
For example, one of the more common fire should be a constant aspect of every patrol,
locations in the hospitality industry is the laundry it is also essential that identified hazards be
Chemical
(O

e
He
e)

sid
xid
tur

at

en
izin
era

sid

yg
ga
mp

Ox
ge
(Te

Ox
at

nt)
yg
He

en

Re
ac
ain tio
Ch n

Fuel side
Fuel

(Reducing agent)

FIGURE 18-1 The fire tetrahedron.

V. SAFETY AND FIRE PROTECTION


FIRE TYPES 211
corrected, documented, and prevented from utilizing an electronic system as a backup to
reoccurring. these components, you greatly increase the
likelihood of identifying fire situations. As pre-
viously stated, it is essential that fires be iden-
DETECTION METHODS tified at the earliest possible moment, so that
they have not had a chance to grow too large to
If prevention methods fail and a fire begins, be contained and extinguished.
the specific hazard must be detected so that
the response program can be effective. The two
methods of fire detection are human observa- FIRE TYPES
tion and electronic systems.
Human observation is often more effective, Although based upon the same concept,
since it allows for the use of reasoning and judg- fires can be divided into four basic types, deter-
ment to determine the nature of the actual situa- mined by the nature of the fuel component of
tion. In this case, however, there must be people their fire triangle. It is important to know these
present to make the discovery. Patrol officers have types and the differences in their fuels, as it can
excellent opportunities to identify potential fires make a difference in how the fire is contained
through smell, sight, and even sound and touch. and extinguished. The basic classes are:
In some cases, officers observe fires in such an
1. Class A fires generally have common solid,
early stage of development that they are able to
combustible materials as their fuel. This may
effectively extinguish them without outside assis-
include such fuels as wood, paper, and cloth.
tance. In addition, by obtaining the cooperation
This is a very common form of fire. It is also
of other people in the environment, the chances
the most basic.
of human observation can be increased. Often,
2. Type B fires are fueled by liquid or gaseous
these other observers must be given some form
fuels, such as gasoline, kerosene, and
of basic training to identify hazards or early stage
compressed gas tanks like propane.
fire threats so that they can be more effective.
3. Type C fires are initiated by, or contain an
Electronic detection can also be highly effec-
element of, electrical involvement. Fires in a
tive, especially in areas where chances of obser-
breaker box, power strip, frayed extension
vation by people are relatively low due to
cord, or item of powered equipment would
infrequent travel or visual obstructions. Electronic
fall into this category.
systems of detection can include sensors that
4. Type D fires are caused by burning metals,
watch for smoke, rapid increases in tempera-
such as magnesium. They are often
ture, temperatures above certain levels (regard-
extremely intense and require special
less of how quickly that temperature is reached),
equipment to handle.
and even early combustion of airborne particles.
Unfortunately, electronic sensors can also trigger Once the nature of a fire is understood, it
alarms as a result of situations other than fires. It becomes a determining factor in how to handle
is because of this that all alarms must be investi- a particular situation. For the most part, classes
gated to determine the actual cause. A, B, and C fires of sufficiently small size can be
The ideal detection program is, of course, a contained and extinguished by a person utiliz-
combination of human observation and elec- ing an appropriate extinguisher. Class D fires
tronic monitoring. By thoroughly training the require such specialized equipment that most
protective force and offering basic training to responders will not be able to effectively handle
all other people who will be in the area, and them, and should be cautioned to maintain a

V. SAFETY AND FIRE PROTECTION


212 18. FIRE PREVENTION, DETECTION, AND RESPONSE

Ordinary Flammable Electrical Combustible

Combustibles Liquids Equipment Metals

(Green triangle) (Red square) (Blue circle) (Yellow star)

FIGURE 18-2 Fire classifications.

safe distance in the process of evacuating the common extinguisher types and the class of
immediate area (Figure 18-2). fire they are intended to be used on are as
follows:
● Dry chemical—these utilize a powder that
EXTINGUISHERS is expelled from the nozzle in a stream
of pressurized, nonflammable gas. Dry
The most critical aspect of deciding if you are chemical extinguishers are usually classified
going to attempt to extinguish a fire is deter- as usable on Class A, B, and C fires, as
mining if you can do so without serious risk to they will be both effective and relatively
your own safety or the safety of others. Make no safe in those applications. Dry chemical
mistake: fighting a fire is dangerous. By its very extinguishers extinguish the fire by coating
nature, this activity requires that you intention- the fuel of the fire, making it unavailable for
ally remain within, or move within, close prox- combustion.
imity to a highly hazardous environment. Care ● Carbon dioxide—these units produce a
should be taken to ensure that the responding cloud of snow-like particles that quickly
person understands the dangers and the equip- evaporate into a carbon dioxide layer. This
ment to be used, as well as its limitations. The layer reduces the available oxygen and cools
purpose of fighting a fire is to save lives and the area, breaking the fire triangle. They
property, not to risk them needlessly. are commonly classified as B and C type
When working in an environment with extin- extinguishers.
guishers that you may not have used before, it ● Water-based—water is a good extinguishing
is recommended that a test unit be obtained, agent for Class A fires, but can aggravate
even in a group setting, so that the area of other types. If used on burning liquids
effect, limits of range, and duration of use can (Class B), it can spread the fuel, thus
be explored. enlarging the fire area. If used on electrical
When deciding if it is appropriate to attempt fires (Class C), it can cause serious harm to
to extinguish a fire, it is important that the the responder, as it may conduct an electrical
equipment you select matches the fire type. charge, causing an electrical shock to be
Mismatching the extinguisher and fire types delivered to the holder of the unit or others
may result in a marked increase in the level standing in the runoff from it.
of personal danger to which the responder is ● Halogenated units—these are referred to
exposed. With this in mind, some of the more as “clean agent” extinguishers because they

V. SAFETY AND FIRE PROTECTION


CONTAINMENT 213
contain a chemical that leaves no residue upon to certain minimum temperatures. These
evaporation. They cool and smother fires, valves, called “sprinkler heads,” are located at
making them typically usable on Class A, B, regular intervals throughout the entire building.
and C fires. These are the ideal type of unit Once the valve opens, the feed pipe that is
for responding to computer or other delicate attached to it will continue to supply it with
electrical equipment fires, as they are far less water until the control valve for that area is
likely to cause damage to the equipment in the closed or the sprinkler head is replaced. In most
process of extinguishing the fire. systems, the feed pipe has a sensor added to it
● Foaming agents—these units produce a foam to activate the alarm system if the water begins
layer that blocks the flow of oxygen to the to flow toward an activated sprinkler head.
fire area. They are very effective against Class ● Range-hood systems—in kitchen areas,
A and B fires. Unfortunately, foaming agent there are often specialized systems designed
extinguishers often utilize a water-based agent to blanket the entire working area with a
and so should not be used on Class C fires. special chemical agent. This is designed to
be highly effective on grease fires and other
In the past, there were extinguishers that had to
common kitchen fires, yet still be relatively
be inverted to cause a reaction between the main
easy and sanitary to clean up. These systems
tank contents and a bicarbonate material, result-
are triggered manually by persons who
ing in development of pressure. It has been rec-
observe a fire.
ognized that this motion, the inversion of a heavy ● Stand pipes—based on application of fire
extinguisher, may not be within the capabilities of
codes, most buildings have a stand pipe
persons with disabilities, and their use has been
system that allows for the connection and
largely discontinued. In the United States, such
supply of fire hoses. Like an extension
extinguishers do not comply with the Americans
of a fire hydrant, these provide the fire
with Disabilities Act and should not be present in
department, or in-house fire brigade, with an
the workplace.
available source of water.
Extinguishers should also be checked and
inspected on a regular basis. If there is high traf- It is widely accepted that, even under the
fic in a given area, especially one that is open to best of circumstances, these types of automatic
the public, checking extinguishers daily, or even or large-scale systems usually slow or contain a
on each eight-hour shift, might be in order. It fire, but often do not extinguish it. As a result, it
is important to ensure that they have not been is essential that each activation is investigated
discharged or tampered with so that they will and the fire department becomes involved to
be available for use if a fire is discovered. ensure that the hazard is properly eliminated.

PERMANENT EXTINGUISHING CONTAINMENT


HARDWARE
In addition to the actions of responders and
In addition to extinguishers, which may be
the utilization of various systems and equip-
carried by possible responders, there are some
ment, there are usually design limitations that
more elaborate extinguishing devices that are
aid in the containment of a fire. In most juris-
installed in buildings:
dictions, and within many companies, there are
● Automatic sprinklers—these operate through specific design and construction requirements,
a spring-loaded valve that opens when exposed with regard to the use of fire-resistant building

V. SAFETY AND FIRE PROTECTION


214 18. FIRE PREVENTION, DETECTION, AND RESPONSE

materials. Such items as fire-resistant doors, It is essential that senior management review
designed to resist the spread of a fire for certain this program and support it. It is also essential,
periods of time, aid greatly in the containment and in some areas required, that the fire mar-
of a fire. However, to be effective, they must be shal have a chance to review the fire plan and
in their proper position and working in accor- approve it prior to implementation.
dance with their original design. As part of As part of a formal plan, alarm systems
every officer’s patrol, confirming that fire doors should be regularly inspected and tested to
are in proper condition and not propped or ensure that the components are functioning
wedged open should be a constant component. properly. This should include activation of every
sensor through cooperation with a qualified/
certified inspector or installer and the presence
FIRE PLANS or approval of the fire marshal.
Above all, the response portion of a fire plan
Designing a fire plan, prior to an actual event,
must be realistic in its assignments and expec-
is the most effective step in any fire prevention,
tations. It should be written with the following
fire detection, and fire response program. It is
limitations in mind:
through this plan that all of these factors should
be addressed and given structure and detail. ● Assign duties only to people or positions
Developing such a plan must be done in coop- that will always be present. If you work
eration with those expected to execute the plan, in an area where the patrol officer is the
and they should be involved from the beginning. only position that is staffed at all times, the
Without this, it is possible that aspects of the response plan should assume that this will
final plan may be unrealistic, and could prevent be the only person present for its critical
an effective program from being implemented. aspects. It is easier to assign an extra person
The written plan should include the follow- to a new duty than it is to find an extra
ing as a basic guide: person for a vacant function.
● Write each phase with the protection of lives
● Emergency contact names and telephone
as the primary focus, and property concerns
numbers
as a secondary motivation.
● A formal chain of command ● Write the plan based on existing equipment
● Detailed explanations of the responsibilities
and supplies only. Do not count on having
of each person or department in prevention
time to obtain other items before the plan
aspects
must be put into action.
● Detailed explanations of the responsibilities of
each person or department in response aspects The most important point about fire plans is
● An explanation of the equipment available, that they must be put into effect! What good is a
the frequency of inspection, and the method plan that is exhaustively researched, designed
of documentation by a broadly scoped committee, approved by
● An explanation of the training that personnel every member of the team, and then put on a
receive, the frequency of retraining, and the shelf and never utilized?
specific responsibilities bestowed as a result
of this training ARSON
● Charts and diagrams of the property,
detailing equipment locations, routes of Fires are not always accidents or acts of nature.
egress, evacuation meeting locations, and An alarming number of cases are thought to be
similar fixed points fires that are intentionally set for any of a vast

V. SAFETY AND FIRE PROTECTION


SECURITY QUIZ 215
number of reasons. In some cases, insurance fraud which could draw attention to them. Much like
is believed to be the motivator; in others it is due other crimes, a motivated and dedicated arsonist
to psychological disorders. Whatever the motive, will eventually find a way to attempt to carry out
arson fires are some of the most dangerous. Often, their crime, but you can create an environment
accelerants are utilized to cause the fire to grow where the arsonist, looking for a random place to
rapidly beyond the containment and extinguish- start a fire, will be less likely to feel comfortable.
ing capabilities of the responding fire department.
In some tragic cases, this means that those within CONCLUSION
the structure don’t have time to escape before fall-
ing victim to smoke inhalation. In even more sin- Know the basics and apply them to every
ister cases, arsonists have been known to block or patrol. Train each member of the team who is
lock doors, preventing escape from the flames. supposed to respond to fire situations so that
Your best protection against arson is a com- they are not hesitant when that time comes. Train
bination of highly visible patrols to deter the everyone in how to prevent fires and respond to
attempt, and effective securing of unused rooms discovering them, for their own safety. Fire can
and flammables. These steps will reduce the areas be a devastating event, especially if the response
of concealment, which the arsonist often relies on is uncoordinated or slow. Regularly check and
to prepare for the incident, and also cause the inspect equipment to ensure that it is in usable
arsonist to have to bring their own materials, condition, should the need arise.

S EC U RI T Y QU IZ c. Both of the above


1. One component of the Fire Triangle is heat. d. Neither of the above
a. True 7. Arson fires are:
b. False a. Intentionally started
2. Class A fires are those involving alcohol as b. Often made more dangerous through the
the fuel. use of accelerants
a. True c. Sometimes part of insurance fraud attempts.
b. False d. All of the above
3. Fighting a fire with an extinguisher is very safe. 8. Typical hazard areas include:
a. True a. Boilers, heaters, and furnaces
b. False b. Cooking areas
4. Human life and safety should be the c. Smoking areas
primary concerns in fire situations. d. Vehicle storage areas
a. True e. All of the above
b. False 9. Dry chemical hand extinguishers are usually
5. Fire plans should include: considered:
a. Evacuation routes a. Class A
b. Defined responsibilities b. Class B
c. A chain of command c. Class C
d. All of the above d. All of the above
6. The detection of fires can be broken into: 10. A magnesium fire is an example of a Class B fire.
a. Electronic methods a. True
b. Human methods b. False

V. SAFETY AND FIRE PROTECTION


This page intentionally left blank
C H A P T E R

19
Occupational Safety and Health
and the Protection Officer
Kevin Palacios

In many instances the only protective force


CHAPTER OBJECTIVES on duty is the officers patrolling or perform-
● Definition of work and health ing access control duties. Providing a safe and
● Consequences of occupational hazards secure physical environment is the major func-
tion of all protection officers.
● Basic elements of an Occupational Safety Many organizations combine the disciplines
and Health (OSH) program of Occupational Safety and Health (OSH), secu-
● Major causes of occupational accidents rity, and fire protection into one single depart-
and illness ment because of their common objectives. This
● The role of the protection officer in OSH department is usually referred to as the Loss
programs Control Department or the Loss Prevention
● Key terminology Department. It is usually directed by a manager
or administrator.
The protection officer, by nature of his duties
and familiarity with its surrounding, is in the
INTRODUCTION best position to identify and correct unsafe
conditions, unsafe acts, and potential hazards.
Risk can take many different forms. It can The protection officer can play a significant
affect people, information, tangible assets, repu- role in accident prevention, safety awareness,
tation, and the environment in all organizations. and health promotion in the workplace. As
This list not only describes all the domains a safety and health are broad, diverse, and ever-
protection officer has to look after, but also changing topics of study, the officer must
highlights the priorities in the job description of become familiar with the Key Terminology
the modern professional protection officer. section at the end of this chapter. They must
It is commonly accepted that the protec- also take continuing education classes on such
tion of people against all types of harm is the topics as HAZMAT, fire protection, first aid,
top priority of all security and safety efforts. and so on.

217
218 19. OCCUPATIONAL SAFETY AND HEALTH AND THE PROTECTION OFFICER

WORK AND HEALTH The consequences of occupational hazards


can generate losses such as:
The World Health Organization (WHO) ● Temporary/permanent absenteeism of the
has defined health as “more than just the wounded/ill employee
absence of disease. Rather, it is a state of com- ● Medical treatments/medicine costs
plete physical, mental and social well-being” ● Temporary/permanent replacement of
(WHO, www.who.int). It is important to personnel, equipment, and materials
highlight this triple dimension of physical, ● Insurance deductible costs and increase of
mental, and social well-being, plus the con- insurance premiums
notation of acquiring this balance in each ● Waste of time and resources on the
person. productive process
Work has a direct influence over the worker’s ● Governmental fines, temporary/permanent
health, oftentimes a positive one (i.e., when one closure, and even civil and criminal liability
develops the physical and intellectual capaci- ● Diminished motivation and productivity
ties, thus obtaining a better quality of life); but ● Legal fees and investigations costs
on occasion this influence can negatively impact ● Cost of redesigning processes
one’s health. Work conditions and workers’ acts ● Administrative costs, managerial time
include many different variables that could be, ● Increased scrutiny by governmental agencies
on some occasions, the most important source and insurance carriers
of risk to workers.
Contemporary companies develop their
activities in an extremely competitive environ-
ment. The market demands that production
BASIC ELEMENTS OF AN
systems achieve social responsibility, profit,
OCCUPATIONAL SAFETY AND
growth, and even survival goals. Companies are
HEALTH (OSH) PROGRAM
under pressure to develop “quality” products
The protection officer should be familiar
that are constantly being improved. In many
with the basic elements of the OSH program at
cases, these constant improvements generate
his company because his activities may have an
changes in work conditions and require modifi-
influence on the program. The logic behind all
cations in the way work is done. These changes
OSH programs follows similar priorities as with
can affect workers’ health. When a company’s
any Enterprise Risk Management effort:
processes, materials, techniques, employees
and even organization changes, it is necessary 1. Plan the prevention, mitigation, and
to reassess health and safety conditions. Special response measures at the inception of the
attention must be paid to the underlying orga- business/design of the workplace.
nizational and psychosocial factors related to 2. Assess all risks periodically, updating the
change, as their consequences (distractions, assessment when circumstances change.
physical and mental fatigue, labor stress, dis- 3. Avoid all unnecessary risks by redesigning
satisfaction) are not usually as visible as those dangerous tasks or replacing hazardous
of accidents and illness, but they can be just as material, equipment, or surroundings.
dangerous. 4. Treat risks with positive measures to
All elements that can negatively influence eliminate and/or to control the risks that
the work conditions or the health and safety of have been detected.
the workers, are referred to as “occupational • First target must be the source of hazard
hazards.” • Second is the medium of transmission

V. SAFETY AND FIRE PROTECTION


BASIC ELEMENTS OF AN OCCUPATIONAL SAFETY AND HEALTH (OSH) PROGRAM 219
• Third is collective protection program, as they carry out the following
• Fourth is personal protection of the basic functions which enhance the
worker overall safety program:
5. Control the effectiveness of the adopted • Discover unsafe conditions and
measures. unsafe practices, identify hazards,
6. Integrate preventive, mitigation, and and make recommendations to
response measures in all company control or eliminate them. Discuss
programs. safety policies and procedures with
7. Inform each and every worker about the recommendations for management.
risks their tasks entail. • Teach safety to committee members
8. Train the workers in self-protection. who will in turn teach safety to all
9. Establish control and monitoring of health. employees.
10. Plan for emergency situations. • Review accident reports and
recommending appropriate changes.
It is important to note that each country,
2.3. Individual Operations: Each employee
state, and even city has specific legal require-
must look after their own safety and
ments that need to be followed. This might
health; protection officers must perform
include statutory threshold limit values (TLV),
several duties:
task procedures, and even organization and
• Preventive—identifying unsafe
resources that need to be dedicated to OSH
conditions, practices, and hazards;
efforts. The protection officer must become
acting upon and reporting on a
familiar with the standards of his or her region
continuous basis.
and industry. In broad terms, an effective OSH
• Mitigation—by inspecting
program should include at least six requisites:
occupational hazards during patrols
1. Management Leadership and even while performing “standby”
This is usually documented in a company duties for the duration of a dangerous
safety policy. A company safety policy is a activity that is taking place.
guide that outlines the responsibilities of all • Response—activating alarms and
employees, whether they are hourly workers, performing emergency procedures,
supervisors, or managers, in the prevention administering first aid, etc.
of accidents, injuries, and illnesses on and off
the job site. Without management leadership, 3. Maintenance of Safe and Healthful
the reduction or elimination of accidents is Working Conditions
extremely difficult. The protection officer should remember that
inspections are one of the best methods to pre-
2. Assignment of Authority vent accidents and safeguard employees.
Documented authority must be assigned to 3.1. Inspection of Work Areas: The
nearly everyone in the company. protection officer should be familiar
2.1. Safety and Health Directors and with safety audits or inspections
Managers: These are change makers because these procedures are a principal
who can implement all the necessary method of discovering accident causes,
decisions via company resources unsafe conditions, and unsafe work
(organizational, technical, and people). practices. They also provide the means
2.2. Safety Committees: This is a vital of promptly correcting these unsafe
component of a successful OSH conditions and work practices.

V. SAFETY AND FIRE PROTECTION


220 19. OCCUPATIONAL SAFETY AND HEALTH AND THE PROTECTION OFFICER

• A safety program that initiates determine potential hazards and the


regular safety inspections or means to protect employees at their
audits demonstrates to employees place of work.
management’s interest and sincerity in 3.5. Health Surveys: Performed by industrial
accident prevention. Also, inspections hygienists to control and monitor
enable the individual worker to make the appearance and development of
contact with loss control personnel on a potential illnesses as detected by the job
one-to-one basis. analysis.
• The worker can point out unsafe work
conditions unique to his work area 4. Establishment of Safety and Health
that would otherwise go undetected. Training
When a worker’s suggestions are 4.1. Safety Training: An effective company
acted upon, he realizes that he has safety program is based on proper
made a contribution to the safety job performance. When employees
program and his viewpoints are taken are trained to do their jobs properly,
seriously. they will do them safely. Supervisors
3.2. Fire and Specific Inspections: Normally, should know how to train an employee
when specific inspections are conducted, in the safe and proper method of doing
checklists are used. Each company, a job. The immediate task of accident
plant, or department usually develops prevention falls upon the supervisor,
its own checklist. Items usually included thus the need for supervisor safety
on an inspection report are as follows: training. Most companies give extensive
housekeeping, material handling, OSH training to supervisors.
material piling and storage, aisles and 4.2. Awareness and Motivation: OSH
walkways, machinery and equipment, requires constant and skillful
electrical and welding equipment, tools, promotion. Some methods of awareness
ladders and stairs, floors, platforms and motivation that are common
and railings, exits, lighting, ventilation, in the industry, and the protection
overhead valves, protective clothing officer should be aware of include the
and equipment, dust, fumes, gases following:
and vapors, explosion hazards, unsafe • On-the-job safety and health
practices, hand and power-driven discussions and safety meetings.
trucks, firefighting equipment, vehicles, • Safety contests with awards are
guards and safety devices, horseplay, effective in increasing employee
and maintenance. safety awareness and motivation,
3.3. Maintenance and Fleet Safety Program: stimulating pride among
Depending on the nature and type departmental employees, and
of company, the loss control or loss improving the safety record.
prevention department may organize a • Posters and displays.
complete program for motor vehicle/ • Safety campaigns serve to focus
fleet accident prevention and operator the attention of the entire plant
education. on one specific accident problem
3.4. Job Safety and Health Analysis: (e.g., campaign may be undertaken
Performed by safety engineers to to promote use of safety glasses).

V. SAFETY AND FIRE PROTECTION


OCCUPATIONAL RISKS 221
• Educational materials (films, 6.2. Medical: First aid and professional
newsletters, booklets, leaflets, etc.). health care needs to be arranged.
5. Accident Record/Data Collection System
5.1. Accident Investigation: Accident OCCUPATIONAL RISKS
investigation is essential in the
prevention of future accidents. An All workplaces have an almost infinite num-
effective investigation should produce ber of potential hazards; it is only because of the
information that will lead to the presence of risk factors associated with them
development of countermeasures which that negative consequences actually occur. A
will prevent or reduce the number of risk factor is an unsafe/unhealthy condition or
accidents. action (also referred to as substandard actions
5.2. Accident Analysis: The near accident or conditions) that enables the hazard to pro-
or incident should be investigated to duce harm (accidents, illness, discomfort).
determine cause in order to prevent In order to differentiate accidents from ill-
the possibility of a future accident. ness, we must pay attention to the “hardness”
Near accidents or near misses are of the aggression and to the “speed” of the pro-
much more common than completed duction of damage. Occupational illnesses are
accidents. Near accidents usually normally caused by long-term exposure to sub-
indicate deficiencies in the system. A standard conditions (physical, chemical, biolog-
thorough investigation can reveal these ical, mechanical risk factors); these are physical,
deficiencies, as well as contributory psychological, and even ergonomic.
causes. Aggressions that act only once and produce
• For purposes of accident prevention, injuries of a temporary, incapacitating, or even
investigations should be fact- mortal nature are called occupational accidents.
finding and not fault-finding. The Generally speaking, there are four major
investigation should be concerned causes of occupational accidents and illness.
only with the facts. The investigating
1. Limited managerial understanding of the
officer, who may be the protection
human consequences and economic losses
officer, is best kept free from
attached to them.
involvement with the discipline
2. Unsafe/unhealthy conditions—any
aspects of their investigation.
condition of structures, materials, tools,
5.3. Records, Rates, and Countermeasures:
equipment, machinery, or other conditions
A comprehensive data management
of a worker’s environment that cause
system is mandatory in virtually any
or contribute to an accident or illness.
safety legislation.
(Examples: inadequate lighting, poor
6. Emergency Management, First Aid, and housekeeping, chaotic or badly organized
Medical Systems surroundings, or lack of warning systems).
6.1. EMS: Proper resources must be in place Unsafe/unhealthy conditions increase the
to respond accordingly; protection probability of an accident occurring.
officers must remember that 3. Source causes—any unsafe/unhealthy
their security tasks must not be condition has a source cause. A source
neglected while providing OSH cause can contribute to or cause an unsafe/
assistance. unhealthy condition that could lead to

V. SAFETY AND FIRE PROTECTION


222 19. OCCUPATIONAL SAFETY AND HEALTH AND THE PROTECTION OFFICER

an accident. (Examples: normal wear and ● Document the safety violation and
tear, pipes corroding from within, ropes forward a report to appropriate
becoming rotted creating an unsafe/ management.
unhealthy condition, or lack of preventive ● The protection officer who observes an
maintenance). The source cause sets the unsafe condition, or a safety hazard should
stage for an accident; it makes the accident do the following:
possible. ● Correct the condition or report it to
4. Unsafe/unhealthy acts—Human behavior someone who can correct it.
action(s) by the worker that deviate from ● Mark off the condition as a hazard
the accepted safe work procedure that cause where immediate corrective action is not
or contribute to an accident. (Examples: possible.
horseplay or workers not wearing proper ● Document the unsafe hazard or condition
personal protective equipment.) Unsafe acts and the action taken, forwarding the
are often what trigger an accident. They may report for appropriate action.
complete the cycle so that the accident event Unfortunately, most health-related hazards
occurs. Personal factor causes often serve as and risk factors can’t be easily/directly observed.
the reason for unsafe/unhealthy behavior. The officers must be aware of the potential
Personal factor causes are any personal symptoms and consequences associated with
characteristic or conditions that may cause their workplace in order to report them for early
or influence a worker to act in an unsafe/ diagnosis.
unhealthy manner. Examples of personal
factor causes include physical or mental
conditions, extreme fatigue, intoxication,
Common Safety Hazards
poor attitude, and tense relationships in the There are numerous safety hazards that the
workplace. protection officer should be made aware. Some
of the frequently encountered safety hazards or
conditions include the following:
THE ROLE OF THE PROTECTION 1. Fire protection
OFFICER IN OSH PROGRAMS – violation of no smoking regulations
– unusual odors, especially smoke
The protection officer is trained to observe
– obstructed passageways and fire doors
and identify potential hazards. The majority
– inadequate exit signs
of large companies maintain a loss prevention
– obstructions in front of hydrants, alarm
department with protection officers on duty
boxes, extinguishers
24 hours a day, 7 days a week. The protection
– electrical heaters and coffee pots left
officer is in a position to report and correct
turned on
unsafe acts, unsafe conditions, and potential
– improper disposal of waste
hazards while conducting routine patrols.
– flammable gases and liquids which are
The protection officer who observes a
uncontrolled in areas where they may
safety violation by a worker should do the
pose a hazard
following:
– paint or painting areas poorly ventilated
● Record the worker’s name. and not properly secured
● Notify the worker’s supervisor, advising him – gas pumping areas close to operations
or her of the violation. where an open flame may be used

V. SAFETY AND FIRE PROTECTION


KEY FACTS IN ACCIDENTS 223
– use of flame-or spark-producing – respiratory protective equipment not
equipment near flammable substances maintained
– missing fire protection equipment – proper protective clothing not worn
2. Housekeeping 6. Machinery maintenance
– missing handrails on stairways – lack of adequate guarding
– debris on grounds – worn belts, pulleys, gears, and so on
– inadequate containers for trash – frayed electrical wiring that may result in
– broken glass short-circuiting
– obstructions on walkways, such as snow – workers operating machinery with loose-
and ice fitting clothing
– oil spills or slippery substances that may – dangerous machinery lacking automatic
cause slipping and tripping shut-off devices
– cables, pipe, electrical wires across aisles 7. Other hazards
– aisle obstructions – first aid supply improperly stored and
– litter accumulation on shop floors maintained
– cracks, holes, breaks in parking lots, – emergency routes not adequately marked
roadways, and sidewalks – improper labeling of dangerous goods
3. Doors and emergency exits – broken or damaged equipment not
– burned out or missing emergency lights adequately tagged
– doors that don’t fit properly that would These are the more common safety hazards
hinder emergency exit encountered by the protection officer on routine
– improperly fitting door frames patrol. A good rule of thumb is that the protec-
– equipment or debris blocking emergency tion officer should devote one complete patrol
doors during his shift to safety. Dedicating one patrol
– improper panic hardware for doors to the observation and reporting of unsafe acts,
4. Vehicle and fleet safety unsafe conditions, and safety hazards is a good
– improper audible warning devices for practice.
backing up
– improper wheel chocking for parked
vehicles
– speeding violations
KEY FACTS IN ACCIDENTS
– improper preventive maintenance
Definition—an accident is an unexpected
procedures
event in which physical contact is made
– vehicles parked in fire lane or blocking
between a worker and some object or exposure
emergency exit
to a substance that interrupts work.
– vehicles without proper signaling devices
The protection officer must be knowledgeable
or lights
of the key facts in accidents. Whether or not all the
– improper tires for road conditions
key facts are present will depend upon the par-
5. Personal protective equipment
ticular case. Key facts are taken from “Accident
– improper personal protective equipment
Prevention Manual for Industrial Operations”
for the job
(National Safety Council 1980, p. 154):
– protective eye goggles not worn
– safety-toed boots not worn a. Nature of injury—the type of physical injury
– protective gloves not worn b. Part of body—the part of the injured
– hearing protection not utilized person’s body affected by the injury

V. SAFETY AND FIRE PROTECTION


224 19. OCCUPATIONAL SAFETY AND HEALTH AND THE PROTECTION OFFICER

c. Source of injury—the object, substance, Accident Types


exposure, or bodily motion that directly
produced the injury Accidents normally involve physical con-
d. Accident type—the event which directly tact or exposure between the worker and some
resulted in the injury object or substance. With this in mind, accidents
e. Hazardous condition—the physical are categorized into the following basic types:
condition or circumstance that permitted the struck by example: struck by a fall-
occurrence of the accident type ing tool
f. Agency of accident—the object, substance, or contacted by example: contacted by
part of the premises in which the hazardous hot steam
condition existed struck against example: banging your
g. Agency of accident part—the specific head against a low beam
part of the agency of accident that was contact with example: touching a hot
hazardous pipe
h. Unsafe act—the violation of a commonly trapped in example: trapped in a tank
accepted safe procedure that directly caught on example: pant cuff caught
permitted the occurrence of the accident on a board, causing a fall
event caught between example: finger caught in
a car door
Other items of information closely related to different level fall example: falling down
the key facts that the protection officer should stairs
be aware of include age, sex, type of occupa- same level fall example: slipping or trip-
tion, and type of work. ping
Remember: The protection officer must be exposure example: exposure to toxic
knowledgeable of the eight basic elements of a gasses
safety program: overexertion example: back strain

1. Employer or client safety policy


Key Terminology
2. Safety rules
3. Safety committees Accident—an unplanned event that results
4. Safety audits or inspections in harm to people, damage to property, or loss
5. Safety training to process.
6. Safety awareness and motivation Accident causation—The many factors that
7. Motor vehicle or fleet safety act together to cause accidents. They include
8. Accident investigation personal factors, job factors, and lack of man-
agement control factors.
The protection officer should have some Personal factors:
basic knowledge of accident types and accident
causes because he may be involved in accident
● Inadequate capability
investigation.
● Lack of knowledge/skill
These are the three elements to remember
● Improper motivation
about accidents:
● Stress
Job factors:
a. An accident is an unexpected event.
b. Contact is made. ● Inadequate leadership or supervision
c. Work is stopped or delayed. ● Inadequate engineering

V. SAFETY AND FIRE PROTECTION


KEY FACTS IN ACCIDENTS 225
● Inadequate purchasing to eliminate or minimize the hazard. Examples
● Inadequate maintenance of engineering controls include ventilation, iso-
● Inadequate work standards/procedures lation, elimination, enclosure, substitution, and
● Inadequate hazard controls design of the workplace or equipment.
Environment—The surrounding conditions,
Lack of management control factors:
influences, and forces to which an employee is
● Inadequate program exposed in the workplace.
● Inadequate program standards Ergonomics—An applied science that stud-
● Inadequate compliance with standards ies the interaction between people and the
● Inadequate hazard controls work environment. It focuses on matching the
job to the worker, incorporating biology and
Accident Investigation—The process of engineering into the process. Ergonomics helps
systematically gathering and analyzing infor- to prevent repetitive motion injuries such as
mation about an accident. This is done for the carpal tunnel syndrome.
purposes of identifying causes and making First Aid—The immediate care given to
recommendations to prevent the accident from a person who is injured or who suddenly
happening again. becomes ill. It can range from disinfecting a cut
Accident Prevention—The systematic appli- and applying a bandage to helping someone
cation of recognized principles to reduce inci- who is choking or having a heart attack.
dents, accidents, or the accident potential of a Hazard—The potential of any machine, equip-
system or organization. ment, process, material (including biological and
Administrative Controls—A category of haz- chemical) or physical factor that may cause harm
ard control that uses administrative/manage- to people, or damage to property or the environ-
ment involvement in order to minimize employee ment. A hazard is a dangerous condition, behav-
exposure to the hazard. Some examples are: ior, or object that can cause harm or injury.
● job enrichment Hazardous Material—Any substance that
● job rotation may produce adverse health and/or safety
● work/rest schedules effects to people or the environment.
● work rates Health and Safety Policy—A policy is a
● periods of adjustment statement of intent, and a commitment to plan
for coordinated management action. A policy
Danger Zone—An area or location where the should provide a clear indication of a compa-
probability of injury is high (e.g., in the vicinity ny’s health and safety objectives. This, in turn,
of saw blades). will provide direction for the health and safety
Due Diligence—The taking of every reason- program.
able precaution under the circumstances for the Health and Safety Program—A systematic
protection of the health and safety of workers. combination of activities, procedures, and facili-
Emergency Plan—Detailed procedures for ties designed to ensure and maintain a safe and
responding to an emergency, such as a fire or healthy workplace.
explosion, a chemical spill, or an uncontrolled Incident—An unwanted event that, in differ-
release of energy. An emergency plan is neces- ent circumstances, could have resulted in harm
sary to keep order and minimize the effects of to people, damage to property, or loss to a pro-
the disaster. cess. Also known as a near miss.
Engineering Controls—A category of hazard Incident Investigation—The process of sys-
control that uses physical/engineering methods tematically gathering and analyzing information

V. SAFETY AND FIRE PROTECTION


226 19. OCCUPATIONAL SAFETY AND HEALTH AND THE PROTECTION OFFICER

about an incident. This is done for the purposes mental, and emotional well-being of employees.
of identifying causes and making recommenda- These policies and programs strive to:
tions to prevent the incident from happening
again.
● Prevent harmful health effects because of the
Industrial Hygiene—A science that deals work environment
with the anticipation, recognition, evaluation,
● Protect employees from health hazards while
and control of hazards in the workplace. These on the job
hazards may cause sickness, harm to employee
● Place employees in work environments that
health, discomfort, and inefficient perfor- are suitable to their physical and mental
mance on the job. Also known as occupational make up
hygiene.
● Address other factors that may affect an
Job Design—The planning of a job and the employee’s health and well-being, such as:
establishment of procedures for performing that
● Ineffective organization of work
job so that the potential for injury and illness is
● Harassment and violence in the workplace
reduced or eliminated.
● The need to balance work and family
Job Enrichment—Adding one or more responsibilities (e.g., elder care, child care)
related tasks or functions to an existing job.
● Promote healthy lifestyles
These may include some managerial functions Occupational Illness—A harmful condition
(e.g., planning, organizing, controlling). or sickness that results from exposure in the
Loss Control—Measures taken to prevent workplace to a biological, chemical, or physical
and reduce loss. Loss may occur through injury agent or an ergonomic hazard.
and illness, property damage, poor work qual- Occupational Safety—The maintenance of a
ity, and so on. work environment that is relatively free from
Material Safety Data Sheet (MSDS)— actual or potential hazards that can injure
A form that contains detailed information about employees.
the possible health and safety hazards of a Personal Protective Equipment (PPE)—Any
product and how to safely store, use, and han- device worn by a worker to protect against haz-
dle the product. Under the federal Hazardous ards. Some examples are respirators, gloves,
Products Act, suppliers are required to provide ear plugs, hard hats, safety goggles, and safety
MSDSs for all hazardous materials as a condi- shoes.
tion of sale. Organizations that use hazardous Physical Agent—A source of energy (e.g.,
products are required to keep an MSDS onsite noise, radiation, vibration, heat) that affects the
for each product. This is a provision of the Right body, a part of the body, or any of its functions.
to Know Act. The effects may be beneficial or harmful.
Medical Surveillance—The systematic Preventive Maintenance—A system for
approach to monitoring health changes in work- preventing machinery and equipment failure
ers to identify and determine which effects may through:
be work-related.
Nature of Injury or Illness—The main phys- ● Scheduled regular maintenance
ical characteristics of a workplace injury or ill- ● Knowledge of reliability of parts
ness (e.g., burn, cut, sprain, dermatitis, hearing ● Maintenance of service records
loss). ● Scheduled replacement of parts
Occupational Health—The development, ● Maintenance of inventories of the least
promotion, and maintenance of workplace reliable parts and parts scheduled for
policies and programs that ensure the physical, replacement

V. SAFETY AND FIRE PROTECTION


KEY FACTS IN ACCIDENTS 227

EMERGING TRENDS
Despite the fact that the basic role of most security and safety risks by packaging them
protection officers is currently somewhat lim- together into a single program. Such an approach
ited to physical and logical security, many pro- may be particularly helpful with international
tection officers already perform several duties operations: going into a foreign country presents
in OSH programs. This will be more common in a whole new host of risks. Convergence with
the future as the need for loss control, financial other risk management functions within the
austerity, and competition among organizations organization (health, environment, safety, and
grows. quality) is quickly gaining momentum.
Enterprise Risk Management is the assess- Laws and regulations vary greatly in different
ment and management of all risks that an orga- regions of the world; nevertheless, major efforts
nization faces. Business risks such as profit and are taking place to standardize procedures, train-
loss are being managed along with traditional ing, and risk management models globally.

Procedure—A step-by-step description of Threshold Limit Value (TLV)—A threshold


how to properly perform a task, job, or activity. limit value refers to the airborne concentration
Risk—The probability of a worker suffer- of a substance to which it is believed that nearly
ing an injury or health problem, or of damage all workers may be repeatedly exposed day
occurring to property or the environment as a after day (for 8 hours per day) without harmful
result of exposure to or contact with a hazard. effect. Because of individual susceptibility,
Root Cause—The real or underlying cause(s) however, a small percentage of workers may
of an event. Distinguished from immediate experience discomfort from substances in con-
cause(s) which are usually quite apparent. centrations at or below the threshold limit.
Task—A set of related steps that make up a A smaller percentage may be affected more
discrete part of a job. Every job is made up of seriously by aggravation of a preexisting condi-
a collection of tasks. For example, answering tion or by the development of an occupational
a phone or entering data into a computer are illness.
tasks of a secretary. Workplace Inspection—A regular and care-
Task Analysis—A technique used to identify, ful check of a workplace or part of a workplace
evaluate, and control health and safety hazards in order to identify health and safety hazards
linked to particular tasks. A task analysis sys- and to recommend corrective action. Workplace
tematically breaks tasks down into their basic factors that have the potential to cause injury
components. This allows each step of the pro- or illness to employees include equipment,
cess to be thoroughly evaluated. Also known as materials, processes or work activities, and the
job task analysis. environment.

V. SAFETY AND FIRE PROTECTION


228 19. OCCUPATIONAL SAFETY AND HEALTH AND THE PROTECTION OFFICER

S E C URI T Y QU IZ 8. A safety program that initiates regular


safety inspections (audits) demonstrates to
1. The disciplines of safety and security are
employees:
dissimilar. They don’t share the same
a. Management’s concern for improved
common objectives in terms of the overall
productivity
protection process.
b. Management’s interest in accident
a. True
prevention
b. False
c. Management’s concern for the off-duty
2. The protection officer must take continuing
worker
education in HAZMAT and first aid.
d. Management’s concern for an unsafe
a. True
workplace
b. False
9. When a safety recommendation made by an
3. The World Health Organization has defined
employee is acted upon:
health as “more than just the absence of
a. Management recognizes the employee’s
disease.”
contribution to the safety program
a. True
b. The employee is likely to become a
b. False
member of the safety committee
4. One aspect of a formal safety policy is to
c. The employee is likely to become less
prevent accidents and illness on and off the
safety conscious
job.
d. Management perceives this kind of action
a. True
as interfering with the safety committee
b. False
10. A safety checklist is useful because (check
5. One of the main functions of a safety
best answers):
committee is to administer effective rescue
a. It makes employees aware of safety
training programs.
hazards
a. True
b. It can be used by various departments to
b. False
audit general safety procedures
6. The safety committee has the authority
c. It can be incorporated into security patrol
to make safety recommendations to
procedures
management.
d. All of the above
a. True
b. False
7. The protection officer should carefully inspect
the work habits of members of the workforce
and report deficiencies detected.
a. True
b. False

V. SAFETY AND FIRE PROTECTION


C H A P T E R

20
An All Hazards Approach
to Hazardous Materials
Robert D. Jaffin

might never think of as hazardous can become


CHAPTER OBJECTIVES hazardous if released in the wrong place. For
● To define hazardous materials example, saline—or saltwater—is ordinarily
viewed as a benign substance, one that does
● Explore the role of the protection officer
not need special attention. However, if an orga-
in handling hazardous materials
nization is moving saline via tank car and a
● Explain how to respond to a hazardous derailment causes one of the tank cars to rup-
materials incident ture, pouring this saltwater into an upstream
● Provide response models and templates, freshwater fish spawning ground, it can create
as well as tools and resources an environmental disaster. In this case, that salt-
water has become an environmentally hazard-
ous material. The same is true for moving milk
in bulk using a tank truck or a tank car. Liquids
of any sort, including water, when released at
the wrong time or the wrong place, can create a
The concept of hazardous materials can be life-threatening or facility-threatening situation.
a difficult concept to grasp. There are literally Anything that moves in bulk that could be
millions of materials that could be classified as considered a raw material can meet the defini-
hazardous. In addition, some materials might tion of a hazardous material if improperly dis-
not be considered hazardous in their original charged. In 2002, the unofficial estimate was
state, but they become hazardous once they that there are 1.2 million movements of hazard-
are used or they become “waste.” For the pur- ous materials per day in the United States alone.
poses of this discussion, a hazardous mate- Note the implications—there are hazardous
rial is anything that has the potential to cause materials moving into and out of almost every
harm to people or the environment (plants, ani- industrial operation on a daily basis. Those
mals, and waterways) if released in an uncon- quantities could be as small as a few ounces
trolled manner. Beyond that, material that one or they could be as large as multiple tank cars.

229
230 20. AN ALL HAZARDS APPROACH TO HAZARDOUS MATERIALS

These movement estimates do not even take into occurring. That is the unglorious but real chal-
account pipelines, which distribute some of the lenge for the professional protection officer.
most hazardous, although not necessarily the Yet, in today’s world, where the “all hazards
deadliest, materials in use. From a practical stand- approach” has become the standard, weather-
point, it is important to understand the generally related incidents and hazardous materials inci-
accepted concepts and definitions for hazardous dents represent the majority of recurring serious
materials. The best, but extremely complex, defi- incidents in the workplace.
nition is in Federal Standard 313D of the Material Awareness of the evolving technologies and
Safety Data, Transportation Data and Disposal the inherent dangers of many new products is
Data for Hazardous Materials Furnished to an often overlooked part of this job. Today’s
Government Activities. That standard takes over products, including products carried and used
two pages to define a hazardous material and ref- by protection professionals, represent their own
erences multiple external documents. set of new and unique hazardous material chal-
On a practical level, hazardous materials lenges. Here are some examples of new, and in
have been internationally categorized into one some cases variations on older, products that
of nine hazard classes. Some of these classes are represent new and often times overlooked or
further divided into divisions. The most widely misunderstood hazards:
used and commonly understood classifica-
tion system includes 23 classes and divisions. 1. Ethanol-enhanced fuels. It requires a
Seven of these classes and divisions represent different kind of foam to fight an ethanol-
inherently hazardous materials that must be or alcohol-based fire than a gasoline- or
considered immediate and direct threats in petroleum-based fire. Knowing that ethanol
any quantity. Those include certain classes and is being moved may require a facility, and
divisions of explosives, mass explosion hazard, its protection force, to increase the type and
projection hazard, fire or incendiary hazard; number of both portable firefighting devices
dangerous when wet materials; toxic inhalation and fire suppression systems available.
hazards; and high-level radioactive materials. 2. Lithium ion batteries. These batteries are
one of the most dangerous products that
are used in everything from toys to oxygen-
ROLE OF THE PROTECTION generating vests, aircraft black boxes to
OFFICER computers and UPS backup power supplies.
These batteries present such a great risk
A proactive approach on the part of any in transportation, as distinct from their
business and every individual leads to minimi- individual use in consumer products, that
zation, if not elimination, of hazardous mate- the international community has assigned
rials incidents. Education and training that new identification numbers for them; and in
specifically include a full explanation of all the 2008 Emergency Response Guidebook
the materials that move through or are used (ERG), for the first time in over 12 years
within a facility is the first line of defense. the U.S. Department of Transportation (U.S.
Understanding the terminology and federally DOT) added a new guide number. That
mandated response framework is a critical is particularly significant because there
part of that training. The fact is, there is noth- are over five million different hazardous
ing heroic or exciting about maintaining good materials but there are only 66 guides in
and safe work practices, and proper site secu- the ERG. If lithium ion batteries are short-
rity, to eliminate the possibility of an incident circuited they will generate a tremendous

V. SAFETY AND FIRE PROTECTION


HAZARDOUS MATERIAL INCIDENTS 231
amount of power, usually in the form of heat. the possibility of untoward events involving
There are very few satisfactory firefighting hazardous materials requires a full awareness of
techniques for lithium ion battery fires. the workplace environment, the products used,
Realistically, lithium ion batteries, like and the nature of all materials from janitorial
magnesium, burn at extremely high supplies to production processes to power gen-
temperatures and can break down water into eration and finished products of the business
oxygen and hydrogen, which is an explosive being protected.
mixture. While not always practical, the
most effective way to fight fires by what are
known as “refractory” substances, is to bury HAZARDOUS MATERIAL
them with sand and deny them the oxygen INCIDENTS
required to support continued combustion.
3. Compact fluorescent lights (CFLs). All The technological and social changes that
fluorescent lighting contains mercury and occurred at the beginning of the 21st century
it is illegal to dispose of such lightbulbs by have forced those in safety and security to
merely discarding them in the trash. If any reevaluate their roles and better define their
quantity of fluorescent lightbulbs are broken, responsibilities. Law enforcement, firefighters,
it would generate a surprisingly large release emergency medical personnel, and protection
of mercury requiring separate and specific officers are not expendable. These personnel
federally mandated cleanup activities. A form our first line of defense in case of an inci-
single broken lightbulb is not a cause for dent, regardless of that incident’s cause. While
alarm; however, it is still officially an “event” their overall objective is the protection of life
because mercury, which is extremely toxic, and property, a protection officer’s primary
has been released into the environment. objective must always be to survive so that they
4. Pressurized fire extinguishers. While fire can continue to provide that protection to the
extinguishers are important to have on hand for general public. That means the protection offi-
safety reasons, the heat generated from a fire cer must understand how to evaluate and take
can cause those fire extinguishers to explode. the action that will bring the correct resources
5. Aerosol lubricants and deicing materials. to bear for the many different types of incidents
These materials are not regulated for private that can occur. Rule number one with hazard-
use, so if a private individual has them in ous materials incidents is to always approach
a vehicle there are no federal safety “rules” from upwind, uphill, or upstream. Obviously,
that apply. However, under the U.S. DOT if one comes upon an incident in the course of
guideline 49 CFR 173.6, if one has those normal duties it may not be possible to observe
materials in a patrol vehicle, they become that rule. However, a HAZMAT response team
“materials of trade” and certain rules do will always observe that rule. It generally
apply. Those rules are based primarily on would be wrong for a protection officer to take
individual awareness of the inherent hazards direct action, but for small releases of the more
of such materials and the need to properly common and less lethal hazardous materials,
secure them. direct action is sometimes appropriate. Even for
the smallest of spills involving the most benign
The portable radio and the cell phone as well chemicals, no action should be taken until the
as the “green” vehicle being used for patrol material has been positively identified and
duties all might represent their own unique haz- appropriate actions confirmed. Knowing where
ards. Understanding, and therefore minimizing, to find the correct information and/or expertise

V. SAFETY AND FIRE PROTECTION


232 20. AN ALL HAZARDS APPROACH TO HAZARDOUS MATERIALS

is much more critical than being a “hero.” those recommendations and codify them into
Nowhere is that more important than when their own regulations. While hazardous mate-
dealing with hazardous materials. Mitigation rials fall under the Occupational Safety and
of danger in a hazardous materials release situ- Health Administration (OSHA), Environmental
ation should be left to those with proper train- Protection Agency (EPA), and DOT, the most
ing and experience. For protection officers, the comprehensive information available on the
first step is to self-protection, the next is mate- majority of these hazards comes from the fed-
rial identification, the next is to evacuate as eral DOT guideline 49 CFR parts 100 to 180
necessary and activate the appropriate contin- which is known as the “Hazardous Materials
gency or response plans, and the last step in Regulations” or HMR. The HMR are standard-
most circumstances is to provide containment. ized and harmonized with the rest of the world.
That may be as simple as maintaining a physi- Portions of the EPA and OSHA regulations
cal security perimeter or as complex as break- contain language and definitions that are not
ing out absorbent materials, turning off entire universally accepted and may be unique to the
HVAC plants, and preserving “crime scene” United States or North America. The HMR is
integrity. also one of the most difficult federal regulations
to read and understand. A good practical tool to
use is the most current version of the Emergency
TOOLS AND RESOURCES Response Guide; at the time of this writing that
would be the 2008 ERG. This guide is pub-
While protection officers should know some lished by the U.S. DOT in conjunction with
basic firefighting techniques and basic emer- other North and South American governments,
gency medical techniques including CPR and and has been updated on a 4-year cycle since
first aid, most security professionals recognize 1996. The next version is likely to be the 2012
that they are neither paramedics nor firefight- ERG, with a new ERG published again in 2016.
ers. The same concept is true for hazardous Copies of the regulations, as well as handy
materials response, containment, and mitiga- pocket-sized copies of the ERG, are available
tion. Small releases of less deadly materials can from a number of sources and the leading pro-
be handled by anyone with the right formal viders of this material have been included at the
training, basic knowledge of hazardous materi- end of this section. The single most valuable site
als response, an understanding of the risks and for obtaining additional HAZMAT information
protocols, and access to the Material Safety Data (although not emergency response information
Sheets (MSDS) to properly identify risks associ- in the face of a specific incident) is http://www
ated with each specific incident or material. .phmsa.dot.gov/hazmat.
The most universally accepted method to iden- The Emergency Response Guide is a tool that
tify and classify hazardous materials comes from should accompany the professional whenever
the world of transportation. The original work on duty; this author keeps one in the glove
was developed by the United Nations Committee compartment of his private vehicle. Learning
of Experts, who developed the “Orange Book” how to use the ERG is a key to minimizing and
of recommendations that is the basis for the mitigating the impact of hazardous materials
initial classification and identification of haz- releases. There are going to be times when the
ardous materials throughout the world; these most appropriate action is to turn and run! The
are not regulations but a set of recommenda- ERG is a quick response tool to initiate both
tions. Individual nations, as well as interna- protective and response/containment actions.
tional governing authorities, must recognize To paraphrase standardized training materials,

V. SAFETY AND FIRE PROTECTION


RESPONSE MODELS AND TEMPLATES 233
“it is good for the first 30 seconds.” That state- There are a number of other federal guide-
ment is an oversimplification, but it goes to the lines, documents, and consensus standards
heart of the issue. It is better to spend more time that impact directly on actions and protocols
reading the ERG in case of a real release than to required in the case of an incident. Any incident
spend time taking any mediation action. There that can have an impact outside of the imme-
are cases when the only action might be some- diate workspace and/or requires response
thing as simple as “use a fire extinguisher or from public safety personnel or might escalate
cover with sand,” but there are other times when into a larger scale incident requires an appre-
the correct action is to “run the other way.” ciation for, and a basic understanding of, the
Remember that the professional protection offi- National Incident Management System (NIMS),
cer cannot help anyone or everyone else if that including the Incident Command System (ICS)
officer has already been harmed. structure and function, the National Response
One of the first things a professional should Framework, and the NFPA 1600 standard. The
do in a new job, or for that matter in a new protection officer may very well be the “first on
location, is to identify all the hazardous materi- scene” and the “first responder” and must be
als that enter, are used in, or leave, the facility. ready and able to communicate effectively with
OSHA, under 29 CFR 1910–1200, has defined a all the outside agencies that quickly become
“Hazard Communication Standard.” The two involved in such incidents. One does not need
key pieces that intersect the role of the protection to become an expert, but one does need to
professional are the requirement for the MSDS understand how municipal, or for that matter
and the requirement for a workplace Hazard private, response is governed and how such
Communication Program that includes easy incidents are managed.
accessibility to the MSDS in every workspace
that hazardous material might pass through.
A security professional should review all the
MSDS information for each worksite under their RESPONSE MODELS AND
protection and know exactly where to find that TEMPLATES
information in case an incident occurs.
For decades, hazardous materials have been
used with little or no training provided to the
end users or those individuals charged with
responding to a hazardous material release.
Diamond Designation Traditionally, the common point of view was
A standard, but not legally required, method
that “dilution is the solution to pollution.” This
to broadly identify hazards in facilities is the theory held that no matter how hazardous a
National Fire Protection Association (NFPA) substance was, if you were able to dilute it
704M consensus standard. Driving through enough (usually with water), it would be ren-
industrial areas, one can spot many buildings dered harmless. In the event of a hazard release,
and sheds with a large “diamond” on them. the common response was to call the local fire
That diamond is in four colors—blue, yellow, department or plant security team, who would
red, and white—and it conveys to emergency then wash the contaminated area down in an
responders the nature and severity, in very effort to decontaminate the area. In the process,
broad terms, of the materials contained within the contaminated water was usually washed
the structure. into the sewer systems and surrounding
ground, and ultimately into the environment.

V. SAFETY AND FIRE PROTECTION


234 20. AN ALL HAZARDS APPROACH TO HAZARDOUS MATERIALS

To a limited degree this method worked for standard (29 CFR 1910–1200) and Hazardous
a while. The problem is that after diluting so Communications (49 CFR Part 172, subparts D,
many hazardous materials into the environment E, and F). In addition, the EPA’s 40 CFR specifi-
for so many years, the environment has become cally addresses use of transportation labeling
saturated and, as a result, traces of those same and identifications within workspaces. If mate-
substances are appearing in our food and water rial is being used or processed in a workspace
supplies today—to say nothing of the long-term those communication standards require easy
and short-term health hazards faced by unpro- access to the MSDS. Assuming compliance with
tected response personnel, using no or minimal those requirements, between the information on
Personal Protective Equipment (PPE). an MSDS and the information contained within
Today, government and industry agree that the ERG, specifically the information provided
just as firefighting requires specialized train- for each guide number, professional protection
ing, response to hazardous materials requires officers can identify spilled materials and begin
specialized knowledge, training protocols, and to take mitigating or corrective actions.
protective equipment to ensure minimal risk to
the workplace, the environment, and all indi-
Determine the Quantity
viduals. Today there are firms that specialize
of the Released Substance
in enhanced material incident response and
cleanup and both public and private safety and After identifying the substance, it is important
security organizations create and train their to determine how much of it has been released.
specialized HAZMAT response teams. The uncontrolled release of 8 oz. (1 cup) of ace-
tone, while requiring caution in cleanup, does not
necessitate response from a HAZMAT team. The
THE INITIAL RESPONSE same quantity of cyanide or an explosive would
require extraordinary measures to be taken.
Whether or not a facility has a HAZMAT Quickly determining what substance has been
response team in place, there are some basic released allows more time for the HAZMAT
steps that must be followed. team to decide what course of action they must
take.
If the release is a liquid or solid and has
Identify the Substance Released occurred in a more or less open area, it may
There are several ways to safely determine be possible to see where the substance is leak-
what has been released. But the most important ing from. Never go near the area unless prop-
thing to remember is the basic instruction pro- erly trained in the required level of PPE; this
vided in the ERG: always stay upwind, uphill, prevents the professional from inadvertently
and/or upstream of any hazardous materials becoming another victim of the incident.
release until able to identify it. One way to iden- It may be possible to read the placard on a
tify material at the workplace is to ask the person transport vehicle or a larger shipment, or the
who was using it. This may not always be pos- label which should appear on smaller packag-
sible, since the employee in question may have ing, from a safe distance with or without the
been injured. However, there are several other use of binoculars. The identifying labels or plac-
safe ways to determine what a released sub- ards may have a class, such as “Poison Gas,”
stance is. In the United States, under 29 CFR and and should have the class or division number
49 CFR, the OSHA and DOT regulations, there is or, on placards of large enough quantities, the
both a requirement for a hazard communication specific universally recognized “UN number.”

V. SAFETY AND FIRE PROTECTION


THE INITIAL RESPONSE 235
That identifier is a four-digit number which caused. It is necessary to ascertain if there are
can be looked up in the ERG. When reading the any fires or fumes being spread by the release.
guide information in the ERG, be sure to read It is extremely important to keep clear of the
all the information on both pages for that guide area and to keep others clear until this deter-
number. Labels are the least accurate identifiers mination has been made. The smoke produced
and although recognizing the label allows one to by a fire can carry the contaminating substance
enter the emergency response guide to determine a considerable distance, sometimes for miles.
what to do in the “first 30 seconds,” identifying A classic example of this was a fuming sulfu-
the four-digit number unique to a spilled mate- ric acid release at a General Chemical com-
rial is always the best and most accurate way pany facility in Richmond, California. In that
to determine appropriate response actions. For case, fumes were carried over 20 miles up the
transportation, that number will appear on the Sacramento River Valley with the effects felt as
shipping papers. Within the facility, the number far away as Antioch in Contra Costa County. It
should appear in the appropriate section of the is important to determine what path the fumes
MSDS for that material. It takes knowledge of the or smoke might take, but that must be done
OSHA requirements and the DOT requirements from a safe distance. HAZMAT response teams,
to most effectively monitor and manage hazard- even if composed of employees, are often not
ous materials incidents. The more information familiar with areas of the facility outside of their
one can initially provide, the better prepared and normal work area. A protection officer is in the
equipped the responding organization and per- unique position of routinely patrolling all areas
sonnel will be once they arrive on scene. of a facility and that knowledge can be invalu-
able to the HAZMAT team in helping them
Activate the Appropriate Contingency Plan direct a proper response.
Any injured people should be treated by qual-
In many countries, facilities are required by ified first aid or medical personnel as soon as
law to have a HAZMAT contingency plan in they are safely removed from the contaminated
place that can be activated in the event of an area. Once again, the critical issue is proper iden-
uncontrolled release of a hazardous material. tification of the hazardous material; the injured
In the United States, this is addressed in part person, if contaminated, will need to be decon-
by OSHA’s Hazardous Waste Operations and taminated before treatment can be rendered.
Emergency Response (HAZWOPER) Standard.
If there is no legal requirement for a contingency
plan or for another reason the facility does not Perform Site Security
have one, notify the public agency involved In this context, site security simply means
in handling HAZMAT incidents for the area. keeping onlookers and bystanders out of the
Usually this will be the local fire department. contaminated area. This can be a bigger chal-
When they arrive on the scene, they will take lenge than it sounds. No matter how well
command and control of the situation. Everyone the safety and security staff communicate to
will then be directed by the incident commander. coworkers or to the general public that there
is a hazardous area and that they must keep
away for their own good, people seem to have
Determine the Extent of the Damage a strong belief that no matter what they do, no
After the material and amount released have harm will come to them. Invariably, people who
been determined, it is necessary to evaluate believe this eventually end up getting hurt.
the extent of any damage that may have been Often they are the ones who get seriously hurt

V. SAFETY AND FIRE PROTECTION


236 20. AN ALL HAZARDS APPROACH TO HAZARDOUS MATERIALS

and force rescue workers to jeopardize their own must be treated. This last concern increases
safety to save them. During the initial phases of the workload of response personnel who may
an incident, the risks of unauthorized personnel be overextended and understaffed initially.
interfering with or, worse, distracting response Another problem with the media intrusion is
personnel are very high. It is important to that their entry into restricted areas encour-
remember that initially the first protection pro- ages curiosity seekers to follow and go beyond
fessional on scene is the incident commander. safety barricades.
The media will take risks that most normal People like to watch others dealing with
citizens would never dream of. Reporters have problems. On a crowded highway, during rush
been known to cross barricades and sneak past hour, drivers will always slow down to take a
security to get a close shot of the incident area. closer look at any incident along their route,
This poses several problems: they interfere with even when that incident is on the other side of
the HAZMAT team’s operation by attempting the roadway. An accident, even on a divided
to talk to them and generally get in their way; highway, inevitably has the effect of drastically
they typically fail to follow safety precautions reducing traffic flow in both directions. That
and risk becoming exposed themselves; and same human curiosity draws onlookers to the
when they do become unintended victims, they scene of a hazardous materials incident.

EMERGING TRENDS
Hazardous materials will continue to evolve 9/11 attacks on the World Trade Center what jet
over time. As new chemicals, medicines, and fuel can add to the equation.
foodstuffs are manufactured, the potential for The Department of Homeland Security, as
dangerous concoctions escalates. Adding to the well as several state agencies, has placed regula-
danger is an increasingly crowded transporta- tions on chemical manufacturing plants. These
tion infrastructure. As highways and bridges are plants are being required to have security plans
more heavily traveled, the potential consequences and dedicated individuals in charge of the pro-
of a HAZMAT incident increase. A spill or release tection function. Such regulation is likely to
will affect more people in the future than at expand; new jobs and duties will evolve for pro-
present. tection officers at chemical facilities.
Hazardous materials management is a key Along with a more robust regulatory environ-
component of an anti-terrorism campaign. ment, the current concern with environmental pro-
Understanding the scope and nature of danger tection will undoubtedly play a role in hazardous
that surrounds different substances is a neces- materials manufacture and use. Organizations will
sary first step in protecting against terrorism. need to continually assess their risk of hazardous
Protection officers must appreciate the risks materials incidents in light of potential negative
associated with hazardous materials in and near publicity. They will also have to mount compre-
their work environment. Security measures must hensive media campaigns before, during, and
be enacted so that terrorists cannot divert or det- after a HAZMAT incident, likely making them
onate existing materials. We have seen with the more careful in hazardous material precautions.

V. SAFETY AND FIRE PROTECTION


SECURITY QUIZ 237

Resources b. Activate the appropriate contingency


ALOHA (Area Locations of Hazardous Atmospheres). plan, determine the extent of the damage,
http://www.response.restoration.noaa.gov/aloha. identify the material
CAMEO (Computer-Aided Management of Emergency
Operations). http://www.epa.gov/oem/content/cameo/
c. Activate the appropriate contingency
index.htm. plan, identify the material, determine the
CHEMTREC. www.chemtrec.com. quantity of released material
CHRIS (Chemical Hazards Response Information System d. Identify the material, activate the
USCG). www.chrismanual.com/. appropriate contingency plan, determine
JJKELLER. A primary provider of publications and training
materials. www.JJKeller.com.
the quantity of released material
LabelMaster. A primary provider of publications and train- 6. There are several ways to determine what
ing materials. www.labelmaster.com. hazardous material has been released in an
National Response Center (NRC). www.nrc.uscg.mil/. employee-related spill, but the best way is to:
Pipeline & Hazardous Materials Safety Administration a. Ask bystanders and onlookers
(PHMSA). www.phmsa.dot.gov/hazmat.
b. Ask the person who was using it
c. Assemble members of the HAZMAT
S EC U RI T Y QU IZ Response team
d. Contact the local fire department as
1. Hazardous material is well defined and easily
quickly and practically as possible
identifiable.
7. There is a standard that should be used for
a. True
preparing an MSDS.
b. False
a. True
2. The emergency response guide is updated
b. False
and reprinted on a 5-year cycle.
8. The media present unique challenges for site
a. True
security personnel.
b. False
a. True
3. Always approach hazardous material
b. False
incidents from upwind, uphill, or upstream.
9. The most comprehensive and detailed
a. True
information concerning a specific hazard
b. False
would be found in the:
4. In a crisis involving the release of a
a. MSDS
hazardous material, the first thing that must
b. 49 CFR
be done is to identify what has been released
c. NIOSH handbook
and in what quantity.
d. Emergency Response Guide
a. True
10. The fumes from hazardous materials release
b. False
have been known to carry 20 miles or more.
5. The standard response protocol consists of
a. True
three consecutive steps. The correct order of
b. False
these steps is:
a. Identify the material, activate the
appropriate contingency plan, perform site
security

V. SAFETY AND FIRE PROTECTION


This page intentionally left blank
U N I T VI

INFORMATION PROTECTION

21 Information Security and Counterintelligence


This page intentionally left blank
C H A P T E R

21
Information Security and
Counterintelligence
Kevin E. Peterson

of terminology and definitions is essential when


CHAPTER OBJECTIVES discussing the topics of information security and
● Provide important definitions counterintelligence. The following discussion of
related to information security and some key terms serves as a solid foundation for
counterintelligence the concepts addressed in this chapter.
● Explain the difference between Information Assets—According to the
“counterintelligence” as used in the Protection of Assets Manual (POA), informa-
private sector versus the federal tion assets “consist of sensitive and proprietary
government sector information, privacy-protected data, intellec-
tual property, intangible assets and informa-
● Describe the primary threats to tion defined under international, federal, and
information and intangible assets in both state laws governing trade secrets, patents, and
the public and private sectors copyrights” (ASIS International, 2008, p. 2-I-1).
● Identify various types of information Although not all inclusive, some examples of
security vulnerabilities, reasonable risk information assets are:
mitigation, and security measures to ● Scientific and technical data
counter the threat ● Formulas
● Explore the role of the professional ● Knowledge
protection officer and security service ● Manufacturing and other business processes
providers in the protection of sensitive ● Organizational goodwill and reputation
information and intangible assets ● Brand
● Personnel data
● Medical records
KEY TERMINOLOGY ● Customer information
● Pricing data
More than any other discipline or aspect of the ● Business and marketing strategies
protection profession, a thorough understanding ● Testing procedures and results

241
242 21. INFORMATION SECURITY AND COUNTERINTELLIGENCE

● Engineering data and specifications Similarly, the U.S. Department of Defense


● Information protected under regulatory defines information security as “the system
requirements (e.g., health care, financial, and of policies, procedures, and requirements
grand jury information) established … to protect information that, if
subjected to unauthorized disclosure, could
Information assets can exist in a wide vari- reasonably be expected to cause damage. …”
ety of forms and formats such as hard copy, The same document defines information as
computer data (on systems, in transmission, or “Any knowledge that can be communicated or
on media), electromagnetic or electro-optical documentary material, regardless of its physical
signals, spoken word, individual knowledge, form or characteristics, that is owned by, pro-
prototypes, models, and processes. Protection duced by or for, or is under the control of [an
strategies should consider both the content of enterprise]…” (Department of Defense, 1997).
the information to be protected and the form or The emerging disciplines complement infor-
format in which it exists. mation security and include the conduct of
Information Assets Protection—This is an due diligence investigations as a vetting tool
overarching concept that integrates the subdis- (to establish an appropriate level of trust with
cipline of information security along with sev- potential partners, vendors, contractors, and
eral emerging disciplines that are focused on other third parties). They also include the prac-
protecting information and intangible assets tice of market entry planning and product secu-
under specific conditions. Figure 21-1 illustrates rity (ASIS International and IAP Council, 2009).
the concept. These topics will be discussed later in this
Information security includes traditional chapter.
information protection measures such as Information assets protection brings these
marking, storage, proper transmission, and disciplines and elements together in a concerted
destruction of information. It also encompasses way and provides a comprehensive approach to
information technology (or IT) security to pro- maintaining the value of information and intan-
tect automated information systems, hardware, gible assets.
software, and the data being stored, processed, Intangible Assets—These are assets of any
or transmitted through them. The third element organization (including companies and gov-
of information security involves the protection ernment agencies) that are not physical in
of intellectual property rights (IPR). nature. Examples of intangible assets are an
organization’s reputation, brand, relationships,
management style, knowledge, and processes.
Information Asset Intangible assets are generally very difficult to
Protection measure or quantify—and may often be over-
looked when determining where to apply secu-
Information Emerging rity or protection efforts.
Security Disciplines Competitive Intelligence versus Economic
Espionage—Although both of these methods
Traditional InfoSec Due Diligence involve collecting information for the ultimate
IT Security Market Entry Planning purpose of supporting business or government
Intellectual Property Product Security
Protection
objectives, they represent opposite ends of a
spectrum of “ethicalness.” Competitive intel-
FIGURE 21-1 Structure of information asset protection ligence is a normal business function which
functions. can include completely benign activities such

VI. INFORMATION PROTECTION


THREATS TO INFORMATION AND INTANGIBLE ASSETS 243
as market research. As competitive intelligence Technical Security—Measures taken to iden-
measures become more aggressive, they may tify, prevent, or neutralize technical threats
approach a “gray area” in the center of the spec- including electronic or electro-optic eavesdrop-
trum that borders on unethical behavior. This ping, wiretapping, bugging, signal intercept,
includes activities like making pretext phone covert/illicit surveillance, and attacks on infor-
calls (or e-mails) to competitors to gather infor- mation technology or telecommunications sys-
mation, or sending individuals to pose as job tems (ASIS International, Information Asset
applicants. Industrial or economic espionage is Protection Guideline, 2007, p. 8).
on the other end of the spectrum and includes Technical Surveillance Countermeasures—
illegal activities such as electronic eavesdropping Also known as TSCM, they include services,
and hiring employees away from competitors equipment, and techniques designed to locate,
for the specific purpose of gaining confidential identify, and neutralize technical surveillance
information (Webster University, 2008). activities such as covert listening devices.
Compromise—Refers to a situation where Trade Secret—Trade secrets are defined by
sensitive, controlled, or classified information laws, such as the Economic Espionage Act, at
actually falls into the hands of an unauthorized the federal level, as well as by state and local
person or organization. This is contrasted with a laws. Generally, trade secrets are designated
security violation, for example, in which a policy by the owner, but must meet certain criteria in
or procedure was not followed but there is no order to qualify for applicable legal protections.
indication that any information was actually lost. Although the laws vary, most require that infor-
Counterintelligence—Any measures taken mation have demonstrable value to the owner,
to negate intelligence collection efforts against be specifically identified, and be adequately
an organization or its people. In the federal protected in order to qualify as a trade secret.
sector, counterintelligence relates to programs
designed to counteract foreign intelligence ser-
vices and recruited agents. In the private sector THREATS TO INFORMATION
it is often referred to as “countercompetitive AND INTANGIBLE ASSETS
intelligence” and may be focused on protect-
ing against actions ranging from simple market As with any asset protection issue, we must
research up to and including industrial espio- consider three categories of threats: intentional,
nage. The term is also used in the law enforce- natural, and inadvertent. Like any tangible
ment community to refer to actions taken to asset such as a building or piece of equipment,
protect sensitive information from falling into information will be subject to all three catego-
the hands of criminal organizations that may ries. Although our primary focus in informa-
be targeting law enforcement agencies, person- tion asset protection (IAP) is on intentional and
nel, or task forces. Counterintelligence activities inadvertent threats, some attention must also be
may be defensive or offensive in nature, and directed at natural threats. For example, in the
may also be primarily proactive or reactive. wake of Hurricane Katrina (2005), many small
Information Security—(see paragraph on businesses failed, not because their facility was
Information Assets Protection) destroyed or their people displaced, but because
Sensitive Information—Information or they lost the bulk of their critical business infor-
knowledge that might result in loss of an mation. It is not uncommon for organizations
advantage or level of security if disclosed to to prepare their facilities and people for the
others (ASIS International, Information Asset effects of a natural disaster, while neglecting to
Protection Guideline, 2007, p. 8). take prudent information protection measures.

VI. INFORMATION PROTECTION


244 21. INFORMATION SECURITY AND COUNTERINTELLIGENCE

Preparations such as geographically separated ● Misdirected e-mail or other electronic


off-site backup or data protection measures for communications
contingency remote computing can mean the ● Deliberate disclosure (e.g., by a disgruntled
difference between successful business recovery employee)
and catastrophic failure. ● Inadvertent disclosure through errors or by
The nature and extent of the threat to infor- accident
mation and intangible assets is concisely sum- ● Inadvertent disclosure through third parties
marized in the introduction to the economic who may not maintain the same security
espionage page on the Federal Bureau of standards that your organization does
Investigation’s (FBI) Web site:
(ASIS International/ASIS Foundation, August
The Cold War is not over, it has merely moved
into a new arena: the global marketplace. The FBI esti-
2007, p. 28)
mates that every year billions of U.S. dollars are lost to One specific threat that is worth mentioning
foreign competitors who deliberately target economic separately is that of laptop computer theft. A
intelligence in flourishing U.S. industries and technol- recent research report (for the ASIS Foundation)
ogies …(Federal Bureau of Investigation, 2009). by consultant Glenn Kitteringham, CPP, stud-
ied the theft of laptops. The report noted that a
The methods that comprise the threat to
2006 Ponemon Institute survey found that 81%
information assets cover the gamut from old,
of companies responding reported the loss of
time-tested techniques to new and innovative
one or more laptop computers in the preceding
collection measures. Among the commonly
12 months. Kitteringham’s study also mentioned
reported collection methods are:
that according to the FBI, 97% of stolen laptops
● Open source collection of public information are never recovered (Kitteringham, 2008, p. 5). In
● Data mining and/or the use of information a recent interview with the author, Kitteringham
brokers mentioned that the original intent of the lap-
● Social engineering and other elicitation top theft research study was to focus on theft of
techniques the hardware, but as he uncovered more infor-
● Co-opting/recruiting a current or former mation he realized that the real threat in stolen
employee (or trusted third party) laptops was the loss of the data (or information
● Hiring key employees away from the assets) they contained. This changed the direc-
targeted organization tion of his research and resulted in a conclusion
● Targeting meetings and conferences that information protection measures were a
● Electronic eavesdropping more immediate need than hardware theft pre-
● Theft of hardcopy information vention (Kitteringham, 2009).
● Ttheft of softcopy information/media (e.g., There is often a controversy over whether
thumb drives, laptop computers, mobile the primary source of the threat to informa-
devices, etc.) tion comes from outside the organization or
● Unauthorized penetration of information from insiders (employees and others with a
systems (e.g., hacking) trusted relationship). Several studies, including
● Unauthorized access to information systems a report by the U.S. Secret Service and another
by insiders one by the Defense Department’s Personnel
● Exploitation of joint venture partners or Security Research Center (PERSEREC), con-
other trusted third parties clude that a significant portion of the threat
● Unauthorized physical access to (or is attributable to insiders. Insiders have some
observation of) information level of authorized access, they know “the

VI. INFORMATION PROTECTION


HOW TECHNOLOGY IS CHANGING THE THREAT 245
system,” and they know where to look for valu- productivity, and accomplishment, but it also
able information. According to the 2007 Trends represents a new paradigm for security risks. In
in Proprietary Information Loss Survey Report: some ways the threat remains unchanged, yet
“The largest threats to proprietary information in other ways things are very different. David
are from those with a trusted relationship with Drab sums it up this way in a white paper on
the organization—current and former employ- the Economic Espionage Act (EEA):
ees and those partners, outsourced providers,
The motives and tactics have remained constant
and customers …” (ASIS International/ASIS
over the years—economic gain, competition, career
Foundation, August 2007, p. 29). recognition, and vengeance. However, the methods
Beyond the question of insider versus used to collect and transmit information have sig-
outsider, we need to take a look at who our nificantly changed as a result of high technology, the
adversaries might be in terms to threats to World Wide Web, and worldwide telecommunica-
tions (Drab, August 2003, p. 2).
our information assets. The collectors (or per-
petrators) are fairly well defined by the list of One result of changing technology is that the
methods previously mentioned in this section. traditional reaction to an information compro-
However, we should also consider who the mise - containment - essentially becomes obsolete.
“customers” or end users of the information Previously, when a privileged hardcopy docu-
might be. Being able to distinguish between the ment was inadvertently (or intentionally) dissem-
collector and the end user allows security pro- inated to unauthorized recipients, the immediate
fessionals to develop more effective risk mitiga- reaction was to attempt to retrieve the copies—
tion strategies for information asset protection. and hopefully get them all back. This concept no
End users may be the same as the collectors, longer works in our 21st-century interconnected
but often are not. Among common end users for world. As the 2007 ASIS report on the Trends in
compromised information assets are: Proprietary Information Loss Survey puts it:
● Domestic and foreign competitors
[We need to recognize the] reality of “speed” at
● Foreign governments
which valuable information-based assets can be
● Organized criminal enterprises acquired and disseminated globally. Once the asset is
● Information brokers gone or compromised, containment—in the conven-
● Activist groups (environmental, animal tional sense—is seldom a realistic option.
rights, monetary rights, anticapitalist, etc.) The consequences in terms of lost economic/
competitive advantage can be extremely quick and
● Terrorist groups
long lasting (ASIS International/ASIS Foundation,
● Political advisors 2007, p. 41).
● Quasi-government groups
● Financial or business cartels In other words, once information is lost, it
● Product counterfeiting operations is lost permanently and globally—and that can
● Targets of law enforcement activities happen instantaneously! As security profession-
als, we need to recognize this fact.
Other technological factors affecting the risk
HOW TECHNOLOGY IS environment for information assets include:
CHANGING THE THREAT Miniaturization of Media—More and more
data is being stored on smaller and smaller
Today technology is moving and advanc- devices. Not only can huge amounts of data be
ing at an amazing pace. This results in won- stored, but today we can even build an entire
derful opportunities for information sharing, computing environment on a flash drive.

VI. INFORMATION PROTECTION


246 21. INFORMATION SECURITY AND COUNTERINTELLIGENCE

Social Networking Media—Sites such as participate in telecommuting and/or stay con-


Facebook, MySpace, and Twitter are grow- nected while away from the office.
ing in popularity each day. Although they are Security of Security Systems—is a growing
extremely popular among almost all demo- concern as security systems for surveillance,
graphics, they also have security risk implica- access control, facility management, intrusion
tions. For example, this type of media provides detection, and other functions increasingly ride
another outlet for instantly sharing information on the Internet and can be managed remotely
(including possibly sensitive/proprietary infor- (including on mobile devices). The following
mation or destructive false rumors) across wide quote from a research report on this topic is
audiences—and in some cases, anonymously. eye-opening to many protection professionals:
The threat of an unhappy employee posting
damaging information in an angry rage (before … a general trend to open architectures across
thinking about the implications or having the TCP/IP-enabled networks, has resulted in new, seri-
ous security risks that are often overlooked. Few
opportunity to calm down and regain a rational individuals realize, for example, that closed circuit
state) is a growing concern for organizations of cameras are misnamed in that they are no longer
all types—and as mentioned: once it’s gone … “closed” from a networking standpoint. When these
it’s gone. special systems and devices are connected to orga-
Volume and Dispersal of Data—The enormity nizations’ networks, they often introduce a multi-
tude of new, previously unanticipated security risks
of the current volume of data makes it far more (Alliance for Enterprise Security Risk Management,
difficult in many cases to identify a data breach 2006, pp. 9–10).
in real time or to determine if sensitive informa-
tion has been compromised.
Data Mining and Information Brokers—
Emerging threats to sensitive information A SUITE OF PROTECTIVE
worldwide. A cottage industry is growing up MEASURES
around the mass collection of data from a mul-
titude of sources and selling it to whoever is Effectively protecting information and intan-
willing to pay for it. Modern software tools are gible assets presents special challenges, but like
available to “mine” (search and collect) infor- any asset protection situation, warrants a well-
mation continuously from databases, reposi- thought-out strategy that comprises a suite of
tories, archives, Web sites, and other sources. countermeasures. The measures employed to
Additional software tools can sort, collate, and protect information assets fall into three catego-
analyze data to easily and quickly generate a ries: security, legal, and management.
useful—and very valuable—product on any
subject requested. In essence, this is automated
intelligence gathering—and it is happening Security Measures
every day and everywhere. It represents a sig-
The following list represents a sampling of
nificant threat to information assets in both the
security measures that are typically applied to
public and private sector.
the task of protecting information and intangi-
Wireless and Remote Computing
ble assets.
Environments—These expose new vulnerabili-
ties as sensitive information can be exchanged ● Assessment (possibly including penetration
through hot spots in public locations, hotel testing or “red teaming”)
networks, or even home networks. This issue ● Need-to-know controls
becomes increasingly relevant as more employees ● Information storage and handling

VI. INFORMATION PROTECTION


A SUITE OF PROTECTIVE MEASURES 247
● Physical security (surveillance, access … where each individual entrusted with sensitive
control, intrusion detection) information takes prudent measures and personal
responsibility for protecting those assets, a robust
● Visitor control and escort procedures security environment should occur naturally (ASIS
● Design and layout of facility (controlled International, IAP Guideline, 2007, p. 14).
versus open/public areas)
● Security officers/response forces
● Information destruction Another strong recommendation for all orga-
● Technical security measures nizations is that elements of information asset
● TSCM protection be incorporated into due diligence
● Communications, emanations, and signals assessments (investigations) for mergers, acquisi-
security measures tions, joint ventures, partnerships, and other key
● Information systems security (IT security) business transactions. This will aid immeasurably
● Product security in anticipating risks that will or may present
● Travel security programs themselves after the fact.
● Training and awareness (for employees, Finally, product security technologies includ-
users, contractors, vendors, partners, and ing embedded electronic article surveillance,
trusted third parties) various packaging innovations, RFID, and seri-
● Investigation capabilities alization techniques are, by necessity, becoming
commonplace.
Many of these are standard security mea- Some measures will be reactive rather than
sures which are in place and protect all types proactive. When an information loss is known
of assets: people, property, and information. or suspected, conduct an investigation to sup-
Other measures are more specific to informa- port a damage assessment as well as any pos-
tion protection. Our challenge is to effectively sible law enforcement, litigation, or asset
leverage the standard security measures while recovery actions. The results of the investiga-
identifying and implementing those specific tion should also reveal the root cause of the
measures that support the information asset compromise and be used to implement cor-
protection strategy. While there are a variety of rective actions and prevent future occurrences
sources (including other chapters of this book) (ASIS International, 2008, p. 2-I-29).
for details on these countermeasures, a few of
the items listed above warrant some brief dis-
Legal Measures
cussion here.
Training and awareness are absolutely essen- Beyond their deterrent value, most legal
tial tools. They must be delivered using a variety measures are reactive in nature. Nonetheless,
of media (classroom programs, computer-based they are an important element of the informa-
training, computer screen banners, newsletters, tion asset protection strategy. Patents, copy-
intranet resources, and others) on a regular basis rights, and trademarks are common legal tools
in order to keep the subject in the forefront of in protecting highly valuable information.
protection officers’ minds. As the Information Another tool is that of a “trade secret,” which
Asset Protection Guideline mentions: is generally considered to be the most restric-
tive or protective measure. Trade secrets have
the advantage of not requiring registration but
… security awareness and training is one of the
most cost effective measures that can be employed
are subject to strict interpretation in court with
to protect corporate and organizational information respect to the need to identify, determine value,
assets. and adequately protect the information. The

VI. INFORMATION PROTECTION


248 21. INFORMATION SECURITY AND COUNTERINTELLIGENCE

high legal standard of “adequate protection” communicates, or conveys such information.”


often supports the use of robust security mea- A violator can also be someone who “[knowingly]
sures within an organization—which is a wel- receives, buys, [or] possesses” information
come situation from a security perspective. (Drab, August 2003, p. 4).
For these legal means to be useful, however, This is a very forward-thinking law that can
the organization must be willing to enforce and has been applied effectively to resolve trade
the tools in a court of law. This can be a very secret and intellectual property cases in many
resource-intensive ordeal, particularly in terms industry sectors.
of time, effort, and cost. These are decisions that
must be made at the executive level and shared
with key players in the organization such as the Management Measures
security and legal departments.
An interesting study by the U.S. Secret
Other legal measures include contract clauses,
Service looked at threats to information assets
third party agreements, and possibly even per-
by analyzing a number of specific cases. It focused
formance incentives for vendors, partners, and
on “insider” threats and reported some rel-
joint venture participants. Information and
evant results. In 80% of the cases studied, the
intellectual property protection is a highly spe-
perpetrator had come to the attention of man-
cialized discipline and organizations should
agement due to inappropriate behaviors before
obtain support from a qualified legal advisor/
the incident (e.g., tardiness, truancy, arguments
firm rather than relying on a generalist or local
with coworkers, or poor job performance) (U.S.
general counsel.
Secret Service, 2005, p. 15). This highlights the
An important tool in protecting informa-
importance of “management measures” as
tion assets is the 1996 Economic Espionage Act
part of an overall information asset protection
(EEA). This is a very relevant piece of legisla-
strategy.
tion as it makes the theft of intellectual property
Other management measures that should
a federal offense and allows the FBI to inves-
be considered, and generally be coordinated
tigate such cases even if a foreign intelligence
with the security program, include effective
service is not involved.
employee screening (preemployment and peri-
A Xerox white paper on the EEA reads:
odic), drug screening, establishing relevant poli-
cies and procedures, and offering a reporting
[Recognizing that] trade secrets are the lifeblood mechanism that allows employees and others
of most process-driven companies … it naturally fol- to provide information (and make allegations).
lows … that organizations that fail to safeguard their
When using a reporting mechanism such as an
intellectual assets lose ground.
The Economic Espionage Act … [prohibits] mis- employee hotline, be sure that the organization
conduct regarding trade secrets … [including anyone is responsive to calls and allegations. Otherwise,
who] steals or obtains [trade secret information] by the hotline will soon lose its effectiveness, and
fraud or deception. important reports will be missed.
The FBI offers some recommendations on
their economic espionage Web page. They pre-
The law includes the following as prohib- sent six steps to protect your business from espi-
ited activities with respect to trade secrets onage—and all are worth considering. They are:
and related information: anyone who “cop-
ies, duplicates, sketches, draws, photographs,
downloads, uploads, alters, destroys, photocop- 1. Recognize there is a real threat.
ies, replicates, transmits, delivers, sends, mails, 2. Identify and evaluate trade secrets.

VI. INFORMATION PROTECTION


THE ROLE OF THE PROFESSIONAL PROTECTION OFFICER 249

LEGAL SECURITY
PROTECTIONS PROTECTIONS

Patents Physical Security


Trademarks/Service marks Security Officers
Copyrights Personnel Security
Trade Secrets Technical Security
Non-Disclosure Agreements IT Security
Non-Compete Agreements Information Protection
Non-Solicitation Agreements Investigations
Contract Clauses Training and Awareness
Performance Product Security
Penalties/Bonuses

FIGURE 21-2 Examples of legal protections and security protections.

3. Implement a definable plan for safeguarding back up the ones that were unsuccessful. As
trade secrets. Winkler puts it, when we apply defense in depth,
4. Secure physical trade secrets and limit access “security [isn’t] perfect, but it [is] prepared”
to trade secrets. (Winkler, 2005, p. 305). Examples of some of those
5. Confine intellectual knowledge. “layers” might be strong password protection,
6. Provide ongoing security training to encryption, biometric authentication, physical
employee security measures, personnel screening, attended
facility access (security officers), employee train-
(Federal Bureau of Investigation, 2009).
ing, and password-protected screensavers.
As indicated, it is important—in any private
or public sector setting—to find the proper bal-
ance between legal protections and security THE ROLE OF THE PROFESSIONAL
protections. Figure 21-2 shows some consider- PROTECTION OFFICER
ations for each.
To achieve protection objectives and ensure The most effective protection officers are those
they are consistent with the business or orga- who know their customer (the organization they
nization’s strategic goals, these two “commu- serve) and tailor the way they provide security
nities” of protection measures should work services to the customer’s mission and culture.
together to develop an integrated risk mitiga- In many organizations, information assets are
tion approach. Working in a vacuum can result absolutely crucial to the survival and success
in duplication of effort and significant waste as of the enterprise. Officers should recognize
well as poor results due to internal conflicts. this aspect of the organization and factor it into
Finally, according to well-respected consul- the performance of their protection duties. It
tant and author Ira Winkler, the best approach to should be noted that many contemporary com-
addressing risks to information assets is to apply panies are centered on information as their core
defense in depth (layered security) by incorporat- business function, hence our “information-based
ing both IT and traditional protection measures. society.” It is our responsibility to remember that
Even if one or a few layers fail, other layers will a key objective of information asset protection is

VI. INFORMATION PROTECTION


250 21. INFORMATION SECURITY AND COUNTERINTELLIGENCE

EMERGING TRENDS
Three emerging issues that are relevant to the and home settings. As such use and popularity
protection of information and intangible assets increases, systems and the data residing on them
are the increasingly interconnected global busi- become more attractive targets for a variety of
ness environment, the rapid advances in infor- adversaries.
mation technology, and the fact that we now These new technology tools can also be
have to consider—in a different way—the secu- exploited by adversaries to support their illicit
rity of security systems. These issues are dis- activities. The best examples at the moment are
cussed in this chapter, but need to be constantly the new cottage industry of information bro-
reviewed due to the unprecedented pace of kers and the use of sophisticated data-mining
change in today’s security environment. tools and techniques to target sensitive informa-
The advances in information technology tion. This trend will expand in the future and
have a number of implications. One is the new newly introduced business tools such as cloud
family of risks that are introduced by drasti- computing and wireless technologies will
cally increased use of information technol- likely be “abused” by bad actors for nefarious
ogy in business, organization, government, activities.

to enable core business functions, rather than SUMMARY


present obstacles. As the past Chairman of the
ASIS Information Asset Protection Council puts Studies have concluded that as much as 75%
it, “The ultimate objective is to enable business. or more of a company’s value may lie in infor-
Security’s role is to help organizations assess mation and intangible assets (Moberly, 2007).
and address risk to enable ‘smart’ business trans- Since these assets are the most difficult to iden-
actions” (Heffernan, 2007). tify, measure, and control, they deserve a great
In general, professional protection officers deal of attention from a risk management per-
place most of their emphasis on protecting peo- spective. Following a thorough risk assessment,
ple and property, but it is important to support an orchestrated suite of security, legal, and
the third asset category as well: information. management solutions should be applied to the
Elements of information asset and intellectual identified organizational risks. The mission and
property protection should be included in offi- culture of the organization (customer) should be
cer and supervisor training, as well as quality factored in to the services provided and the man-
assurance standards for security programs. ner in which they are delivered and managed.
Security service providers should consider Protection officers play a key role in the pro-
adding information asset protection services to tection of information and intangible assets. In
their suite of protective service offerings. This fact, they can even influence the reputation of an
might include conducting information protec- organization by presenting a highly competent
tion assessments, specialized protection ser- and professional image and by acknowledging
vices, courier services, or other tools focused on the nature of the assets (including information
this category of asset. assets) they are responsible for protecting.

VI. INFORMATION PROTECTION


SECURITY QUIZ 251
Through conscientious IAP practices, organiza-
tions will be better prepared to deal with today’s S E CURI TY QU I Z
broad array of threats ranging from competitive 1. Computer security, information security, and
intelligence and industrial espionage, to cyber information technology (IT) security all mean
attacks, to counterfeiting and product piracy the same thing and are interchangeable terms.
(ASIS International and IAP Council, 2009). a. True
b. False
2. Counterintelligence is an important function
References and can be applied in private sector
Alliance for Enterprise Security Risk Management (AESRM). companies as well as in government agencies.
(2006). Convergent security risks in physical security a. True
systems and IT infrastructures.
b. False
ASIS International. (2008). Protection of assets manual, Volume
III, Chapter 2, Part 1. Alexandria, VA: Information Asset 3. Legal measures are generally “reactive”
Protection. rather than “proactive” in nature.
ASIS International. (2007). Information Asset Protection Guideline. a. True
ASIS International/Information Asset Protection Council, b. False
Fact Sheet—“What Is” Series: “What Is Information Asset
4. According to consultant Michael Moberly,
Protection?” “What Is Information Risk Management?”
“What Is Market Entry Planning?” 2009. approximately what percentage of a
ASIS International/ASIS Foundation. (August, 2007). Trends company’s value generally lies in information
in proprietary information loss-survey report. and intangible assets?
Drab, D. (August, 2003). Protection under the law: Under- a. 90%
standing the economic espionage act of 1996. A White Paper
b. 50%
by Xerox Global Services.
Federal Bureau of Investigation (FBI). “Focus on Economic c. 10%
Espionage,” Investigative Programs-Counterintelligence d. 75%
Website: http://www.fbi.gov/hq/ci/economic, accessed 5. The practice of asset protection focuses on
November 10, 2009. which categories of “assets”?
Heffernan, R., President, R. J. Heffernan and Associates, 2007.
(Circle all that apply.)
Keeney, M., & Kowalski, E. (2005). Insider threat study: Computer
system sabotage in critical infrastructure sectors. Washington, a. Information
DC: National Threat Assessment Center, U.S. Secret Service; b. Physical
and Cappelli, D., Moore, A., Shimeall, T., & Rogers, S. c. People
(2005). Insider threat study: Computer system sabotage in critical d. Property
infrastructure sectors. Carnegie Mellon University, Pittsburgh,
6. Which of the following is NOT a characteristic
PA: CERT Program, Software Engineering Institute.
Kitteringham, G. (2008). Lost laptops  lost data: Connection
of the Economic Espionage Act of 1996?
research in security to practice (crisp) report. Alexandria, a. It makes it a federal crime to steal trade secrets
VA: ASIS International/ASIS Foundation. b. It is a forward-looking piece of legislation
Kitteringham, G. (September 2009). Personal communication. c. It includes “altering” information as a
Kramer, L., Heuer, R. J., Jr., & Crawford, K. S. (May 2005). prohibited act
Technological, social, and economic trends that are increas-
ing U.S. vulnerability to insider espionage. Montercy, CA:
d. It must be updated every 5 years
Defense Personnel Security Research Center. 7. According to this chapter, the field of
Moberly, M., President, Knowledge Protection Strategies, 2007. “information security” includes:
U.S., Department of Defense, DoD 5200.1-R, “Information a. Competitive intelligence
Security Program,” January 1997. b. IT security
Webster University, National Capital Region, “Business
Intelligence,” course materials, 2008.
c. Intellectual property protection
Winkler, I. (2005). Spies among US. Indianapolis, IN: Wiley d. Traditional information security
Publishing.

VI. INFORMATION PROTECTION


252 21. INFORMATION SECURITY AND COUNTERINTELLIGENCE

8. When an information loss is known or 10. An important tool in protecting information


suspected, the following actions should assets is the Economic Espionage Act (EEA)
be taken: of 1996
a. Corrective actions a. True
b. Damage assessment b. False
c. Containment
d. Determine root cause
9. Information that is lost is not permanently lost
a. True
b. False

VI. INFORMATION PROTECTION


U N I T VII

DEVIANCE CRIME AND


VIOLENCE

22 Workplace Crime and Deviance


23 Substance Abuse
24 Workplace Violence
25 Crisis Intervention
26 Strikes, Lockouts, and Labor Relations
This page intentionally left blank
C H A P T E R

22
Workplace Crime and Deviance
Norman R. Bottom and
Whitney D. Gunter

to strike at management may damage equip-


CHAPTER OBJECTIVES ment or interrupt processes. So too may man-
● Identify theories of workplace crime agers who harbor some resentment toward the
● Provide ways to minimize theft employer engage in deliberate work interrup-
tions. While not nearly as common as stealing,
● Identify the process for responding to sabotage is sometimes interwoven with theft.
theft Both may occur together.
This information should not make a protec-
tion officer pessimistic, as most people are hon-
In any organization, some employees will est (at least to a degree). The problem is not that
steal. The more opportunity allowed for theft, everyone steals or does damage; the problem is
the more theft there will be. Dishonest employ- that everyone has the potential to. As a result,
ees tend to steal what is most available to them. no one is beyond reasonable suspicion.
Office personnel steal office supplies, computer
users steal technology, cashiers steal cash, and
warehouse employees steal merchandise pass- THEORIES OF WORKPLACE CRIME
ing through their hands.
Managers, supervisors, and line employees Criminology is the study of the causes of
can all steal. Protection officers have been known crime. There are dozens of mainstream crimi-
to steal, too. Many times, dishonest employees nological theories that explain theft. However,
use external accomplices, such as family mem- many of these theories focus on social influ-
bers and friends, to help them steal. An individ- ences that long precede actual crime (e.g., lack
ual employee can steal, or several employees may of social bond, poor parenting, lack of legiti-
conspire to commit theft for their mutual benefit. mate opportunity, etc.). For the purposes of
In addition to theft of products, materials, preventing workplace crime, there are a few
tools, or information, there may be acts of sabo- theories that are particularly relevant to theft
tage committed. Hourly employees who wish prevention.

255
256 22. WORKPLACE CRIME AND DEVIANCE

General Deterrence itself. Once the punishment clearly outweighs


the crime, additional severity will not further
Deterrence is perhaps the most well-known deter.
theory of criminal behavior. It actually dates The overall implication of this theory is prob-
back to Cesare Beccaria’s Essay on Crimes and ably already the policy of most loss prevention
Punishments (1764). Beccaria lived in a time efforts: catch and punish. It is the subtleties of
when crime was typically attributed to evil influ- these efforts that can be improved by under-
ence, and punishment was extremely severe. standing this theory. Punishment severity is
In an attempt to give guidance to the leaders of often easiest to increase. As a result, although
the time, Beccaria provided a logical rationale punishment certainty is not ignored, severity
for punishment: to decrease crime. He argued is more of a focus. Beccaria argued that this is
that two possible benefits arise from punish- backward. As long as the severity of punish-
ing someone caught committing a crime. First, ment exceeds the benefit of the crime, it is suffi-
that person might learn his or her lesson and cient. Rather, it is punishment certainty that can
not commit the crime again. This is called spe- be improved upon to increase a deterrent effect.
cific deterrence. Second, others might witness the
punishment and learn that committing the crime
is not worth the consequences. This more wide-
Routine Activity
spread result is called general deterrence. Both Although general deterrence is valuable for
are important benefits of punishing, although understanding the importance of detection and
general deterrence is certainly more so. punishment, it does not speak very well to spe-
This, however, only describes why we pun- cific circumstances. For looking beyond the gen-
ish. It is in the specifics of punishment that we eralities and probabilities that deterrence theory
learn how to punish properly. Three concepts uses, a more recent theory is appropriate. In an
influence the effectiveness of punishment. First, attempt to explain increases in crime several
punishment certainty is the likelihood of getting decades ago, Lawrence Cohen and Marcus Felson
caught. The more often a crime is committed (1979) developed their theory of routine activity.
without the perpetrator getting caught, the less It should be noted that this theory applies only to
punishment certainty there is, and the less of a “direct-contact predatory violations,” which sim-
deterrent there will be. Second, punishment celer- ply means it is a theory of theft.
ity refers to the swiftness of the punishment. According to the theory, crime (theft) is a prod-
The quicker a punishment occurs, the more of uct of three circumstances happening at the same
a deterrent it will create. This aspect of deter- time and in the same place. The first requirement
rence is less obvious than the others. Think for crime is the presence of a motivated offender.
of it like this: if someone is stealing on a regu- For the purposes of this theory, it is assumed
lar basis and gets away with it for a year, then that everyone is a motivated offender, or at least
gets caught, but does not go to court for another that such potential offenders are not scarce. The
10 months, the cause and effect of crime and second requirement for crime to occur is the
punishment are not as obvious to the public as presence of a suitable target. In determining how
they would have been if the entire process was suitable a target is, four aspects of the potential
quicker. The final element of deterrence is pun- target should be considered: the financial value,
ishment severity. The more severe a punishment, inertia (ease in moving the item), accessibility,
the more deterrence it will cause. However, and visibility. Because one would not want to
this is only true up to the amount of punish- decrease the financial value of something, it is
ment that outweighs the benefit of the crime the other three aspects of a potential target that

VII. DEVIANCE CRIME AND VIOLENCE


THEORIES OF WORKPLACE CRIME 257
should be addressed. Making an item harder to peers (or other sources) how to commit crimes.
move, limiting access to only those who need Some crimes, such as pretty theft, require little
access, and keeping it out of sight are all actions technical ability to commit. Learning better ways
that would make a target less suitable. to commit these crimes, however, may improve
The third and final requirement for theft to one’s technique, and therefore make it easier to
occur is the absence of capable guardianship. This commit the crime, or make it less likely that one
concept is the one that ties routine activity the- will get caught.
ory to deterrence theory. If a guardian is pres- The other form of learning, and the one that
ent, punishment certainty is increased to near is more useful to address, is learning to perceive
certainty, and therefore, the crime is less likely crime, or certain types of crimes in certain situa-
to occur. A capable guardian need not necessar- tions, as acceptable behavior. If someone notices
ily be a protection officer, loss prevention spe- that other employees are stealing, they are more
cialist, or other such person. It can be anyone likely to do it themselves. Not only because it
who might report the theft, or even an inani- makes it more obvious that it is possible to get
mate object, such as a noticeable security cam- away with the crime, but because it makes them
era, that could result in the perpetrator getting feel like it is not taboo. The more often someone
caught. Many standard practices of the security is exposed to this message, the more accepted it
industry already address this theory, including becomes.
target hardening, CPTED, situational crime pre- Unfortunately, this theory in and of itself does
vention, and other such strategies. not contribute policy that might be useful beyond
what is already obvious: that employees who
Social Learning Theory steal should be removed to prevent them from
tainting other employees (and for other obvious
Both of the theories discussed so far make a reasons, of course). However, it does imply that
common assumption: that all people are will- efforts could be made to highlight why it is not
ing to commit a crime if they think they can acceptable to steal or engage in other workplace
get away with it. While this is at least par- crimes. Such positive messages can counteract
tially true, there are other factors involved. messages that favor crime. To get some specific
Specifically, even in the same situation, different ideas for what messages to counteract, the tech-
people would be more or less likely to commit niques of neutralization may be useful.
a crime than others might be. There are many
criminological theories that address this issue.
However, most are not particularly useful from
Techniques of Neutralization
a security and loss prevention standpoint. One The techniques of neutralization were first
of the few theories that has potential application described by Sykes and Matza (1957). They listed
to workplace crime is social learning theory. five categories by which an offender might neu-
Generally, social learning theory (Sutherland & tralize his or her behavior to make it seem accept-
Cressey, 1960/2003; Burgess & Akers, 1966) is able, thus preventing guilt (Table 22-1).
applied most often to describe how children learn In a workplace setting, it’s more often denial
from their parents and peers, and how that influ- of injury and denial of victim that are used.
ences their decision of whether crime is an accept- For example, if an employee can in some way
able behavior. However, this same model can be attribute blame for some personal problem on
applied to the workplace. In its broadest sense, the employer or even coworkers, whether such
social learning theory describes two categories of blame is deserved or not, that person could
learning that can occur. First, one may learn from convince him- or herself that the company or

VII. DEVIANCE CRIME AND VIOLENCE


258 22. WORKPLACE CRIME AND DEVIANCE

TABLE 22-1 in-depth analysis of preventing the most com-


mon crime at the workplace: theft.
Techniques of Sample Usages
Neutralization

Denial of Responsibility It was an accident. It wasn’t my THEFT PREVENTION


fault.

Denial of Injury It didn’t hurt anyone. I was just Not all internal (employee) theft is prevent-
borrowing it. able. This section will provide some ways to
Denial of Victim He deserved it. His kind minimize, moderate, and control this crimi-
deserve it. nal activity, but not stop it entirely. Protection
offers can have an impact by preventing, deter-
Condemnation of the The police are corrupt. That
Condemners teacher plays favorites anyway. ring, and displacing theft. When security is
He would have done it too. tight, thieves look for another place to steal.
Making theft so difficult and so much trouble
Appeals to Higher I was just following orders.
Loyalties I was doing God’s work. that the would-be thief will decide against it is
a reasonable goal for a loss prevention officer.
Preventing theft can save many jobs, and that
coworkers deserve whatever the crime costs includes one’s own.
them. Denial of injury is even easier to apply, as Opportunities for employee theft come about
it is not difficult for an individual to fail to rec- because of waste, accident, error, crime, and
ognize that their actions hurt a “faceless” corpo- unethical or unprofessional practices. The first
ration. This is especially true if they realize that letters of these opportunities (which are really
an insurance provider will cover losses. threats) come together to form the acronym
Note that other crimes, in addition to theft “WAECUP” (pronounced “wake up”). Below
may be neutralized by workplace criminals. is a list of WAECUP loss threats, with several
Condemnation of the condemners and appeals examples of each.
to higher loyalties may be used by those who
commit acts of sabotage or espionage. Labor A. Waste
union extremists, terrorists, and spies may 1. Protection officers who waste time create
focus on the employer, criticizing and blam- opportunity for employees to steal.
ing them for some perceived wrongdoing. 2. Waste containers are favorite stash places for
Terrorists involved in religiously based extrem- employees who steal.
ism may choose to believe that God has granted 3. Discarding usable items causes loss, as does
them the right to commit acts of sabotage. So, deliberately putting them in trash to be
too, may those who steal information and give stolen later on.
it to an adversary organization.
B. Accident
1. The confusion that surrounds an accident
Summary for Theories of
scene may be used to screen employee theft.
Workplace Crime
2. Arson has been used by employees to cover
These theories provide some ideas for how up theft. (What seems to be an accident can
criminological theories might be applied to actually be a crime.)
workplace crime and the prevention of such 3. Workman’s Compensation fraud may
crimes. Moving toward more specific strategies occur after an accident where the employee
and actions, the next section will provide an exaggerates the extent of the injury.

VII. DEVIANCE CRIME AND VIOLENCE


THEFT PREVENTION 259
C. Error This will give you some tips on observation.
1. Protection officers who err in following For example, employees who bring in empty
procedures, such as failing to make an or almost empty shopping bags and then leave
assigned round, create opportunity for with bags bulging should be viewed with suspi-
undetected theft. cion. Those bulging bags may contain company
2. Other (nonsecurity) employees who fail to property. As a general rule, always look for
follow security-related instructions, such as the unusual and out-of-place, and then inves-
failing to lock up storage areas or exterior tigate discreetly. Also, this section will explain
doors, create opportunity for theft. some things about reporting, and discuss what
to report and to whom. For example, doors
D. Crime propped open (that are normally locked) may
1. If protection officers allow employee theft, be used by thieves as access points to sneak
other employees will get the idea that it is company property outside. Such things should
okay to steal and commit other crimes. be reported and written up. This will also be
2. Failure to recognize valuable merchandise a discussion of actions to take and not to take.
allows more crime (protection staff and For example, managers and other executives
management will not be watching the often work at home during the evening. They
correct items). are usually permitted to take company property
home to do this. Hourly workers (shift workers)
E. Unethical/Unprofessional Practices seldom have the right to take company prop-
1. A general feeling among employees that it is erty home. Know company rules before you act
okay to pilfer (steal) will result in more theft. or accuse.
This is sometimes called the “rolling ball effect.”
It is similar to the “broken windows” theory. Definition of Employee Dishonesty
2. Unprofessional practices by management
create resentment among other employees, Employee dishonesty is theft. It is cheating
leading to deviant acts like theft. customers. It is committing industrial espionage.
It is lying on employment applications and fal-
sifying time records. It is claiming sick leave
Objective when there is no sickness. Anything that can be
Protection officers must reduce employee moved, or taken apart and the pieces moved, is
theft. This section focuses on practical methods a candidate for employee theft. Protection offi-
to reduce theft. However, it takes more than cers can reduce the theft of visible items of com-
your presence, standing around in a sharp uni- pany property. They can catch thieves, of course,
form, or strutting through an area. You must but it is better to reduce opportunity for theft.
know what to look for, what to report, and Each organization has its own types of prop-
what actions to take. You must also know what erty, including personal (movable property) and
actions not to take. fixed (real property). Real property, such as per-
Thieves can be clever, and new opportunities manent buildings and land, cannot be carried
for employee theft will develop. This chapter is off. In these strategies, only personal property
only a beginning. You must continue to study will be addressed. Personal property, in business
employee theft prevention as long as you are a usage, is not “personal effects.” Business tries to
protection officer. The objective of this section is protect the machinery or means of production.
to whet your appetite on the scope of employee The materials or equipment used for production
theft prevention and widen your knowledge. (or sale) of goods and services need protection,

VII. DEVIANCE CRIME AND VIOLENCE


260 22. WORKPLACE CRIME AND DEVIANCE

and those goods, services, products, and so on


offered to the public must be guarded. S A M P L E L I S T — RE TA I L
Business wants to protect and keep its reward: E S TA B L I S HM E NT
the income received for selling its products, of
Office Area
course. Those categories are what we mean by
1. Paper products
business personal property. Some business is
2. Typewriters, calculators, computers,
devoted to manufacturing. Here, the threat of
telephones
employee theft takes place at several stages.
3. Desks, chairs, bookcase, file cabinets
Those stages occur from the time that machines
4. Rugs, paintings
are installed and raw materials purchased
5. Petty cash
through the entire production process—and until
the finished goods are delivered. Stock Room
Other companies specialize in storage and 1. Sales merchandise of various types
transportation. They warehouse and distrib- 2. Shelving
ute manufactured products. These companies 3. Materials, handling equipment
worry while goods are stored. Each time goods 4. Some office supplies
are handled by employees causes theft concern,
Sales Area
too. Goods in transit present additional possi-
1. Merchandise to be sold
bilities for theft.
2. Shelving and cabinets
We all shop at malls and other retail stores.
3. Cash registers/computerized sales terminals
Retail is certainly a familiar business to all. There
4. Product displays
are also wholesale outlets that specialize in sell-
5. Sales receipts (cash, checks, etc.)
ing quantities to the trade. Each retail store, and
each wholesaler, worries about losing the prop- Parking Areas and Outbuildings
erty they hope to sell. Employee theft is one way 1. Exterior merchandise displays
the property can be lost to these owners. 2. Equipment stored outside (in the open or in
Institutions like hospitals have special outbuildings)
employee theft problems. These include the 3. Company vehicles
unauthorized use or taking of narcotics, and 4. Trash and refuse containers
theft of patients’ property. Banking institutions
worry about their cash, naturally. The point
to remember is that all business needs protec- master list available. And if there is no master
tion against employee theft, and that necessity list, suggest to your supervisor that an official
demands proper security and loss control effort one be created. Test your powers of observa-
by protection officers. tion by comparing your list with those of other
protection officers. Update your list as new
property arrives and old property is replaced. It
First Steps is good to know as much as possible about all
The first step in employee theft prevention company property, including value. More valu-
is to learn what can be stolen. A list of property able items, especially if easily moved (portable),
categories is useful for reference. All protection deserve a special theft prevention effort.
officers can use such a list to help them identify
company property.
Markings
A similar list of categories can be drawn up
for any work environment. Buy a notebook and Life becomes difficult if company property is
make your own list, especially if there is no not marked to indicate ownership. Learn what

VII. DEVIANCE CRIME AND VIOLENCE


THEFT PREVENTION 261
marking system, if any, is used to mark all equip- Periodically, check all garbage cans, dump-
ment. This includes office typewriters, computer sters, and sealed garbage bags for stolen mer-
equipment, and so on. Sale merchandise should chandise. Be especially alert to those employees
be marked, too, with special tags. Some mark- who take garbage and trash outside. That activ-
ing systems use stick-on labels. Other marking ity is a critical junction. It is critical because sto-
systems involve stamping numbers on metal. len merchandise can be hidden in the trash. It
Paint and stencil are used by some companies is a junction because the merchandise is leav-
for identification purposes. There are chemical ing the premises. Normally, only a few trusted
compounds that can be painted (or sprayed) on. employees are allowed to take trash outside.
These compounds leave markings visible only Know who these employees are.
in certain light. Another trick of the employee thief is to take
If valuable items are not marked, you should a particular item and hide it for later pickup.
ask “Why not?” Your supervisor might give you Remember that everything has its place, and
a good explanation. He may commend you for an everything should be in its place. Be alert to
idea that’s time has come. A good protection offi- the out-of-place item concealed in a strange or
cer learns how to recognize company property. unusual location. This may be an indication
A general reminder: Learn, learn, learn— of employee theft in progress. Look behind
continue to ask good questions. Keep written shelved merchandise. Examine storage rooms
records of the answers. In that way, you will and broom closets.
not have to ask the same question twice. And
you will have a ready reference when there is
no supervisor available. Examples
● Valuables, like watches, normally under
Concealment lock and key, found on open shelves, tucked
behind cheap items.
Hide and seek is a children’s game, famil- ● Office equipment and/or office supplies
iar to most of us. The basic instructions call stashed in an area where there is no desk or
for someone blindfolded to count while other clerical work performed.
children hide. The counter then opens his eyes ● Valuable merchandise found in areas set
and tries to find the others. It may help to think aside for employees to leave their purses and
of employee thieves as the other children who other personal belongings. The same goes for
have the time to take and hide your company’s employee locker areas.
property. The protection officer should not, of ● Sheds, lean-tos, truck courts, and other
course, have his eyes closed while this theft and locations outside main buildings, but on
concealment go on. company property. Company property
Trash and garbage containers are time- found at these locations should be
honored hiding places for employee thieves. appropriate to the area. For example, office
Plastic garbage bags are another useful item for computers do not belong in a garden shed.
thieves. Modern garbage bags are sturdy and
unaffected by moisture, and they are opaque—- Briefcases, lunchboxes, purses, shopping bags,
that is, you cannot see through them. The pro- and other containers will be carried to work
tection officer should look for garbage bags in by employees. Thieves use these containers to
containers, both inside and outside the build- remove company property from the site. The
ing. Garbage bags will be found in corners and officer must realize, of course, that such personal
adjacent to doorways. items are entitled to reasonable privacy. Always

VII. DEVIANCE CRIME AND VIOLENCE


262 22. WORKPLACE CRIME AND DEVIANCE

remember this, or your search will only cause is a second thing to remember. Get report results
trouble to you. Always check with a supervisor to the right individual(s). The right person or per-
before searching an employee or his property. sons will be able to take the necessary action.
Many companies have rules about what types So far, there are three main points to remem-
of items can be brought onto company property. ber. First, reporting must follow observation.
Know these rules. You may prevent a theft by Observation may involve sighting suspicious
advising an employee that the gunny sack in his activity by employees. Observation includes
hand cannot be brought in. threat potential, such as open doors. Or the pro-
Vehicle parking is another factor in conceal- tection officer may discover concealed company
ment. The personal vehicle of an employee property. First observe; then report.
should not be parked next to the storeroom The second main point is timely reporting. If
door, for example. In fact, employee parking you wait too long to report suspicious activity, the
should be at some distance from buildings and theft will take place. If you wait too long to report
doorways. Company policy establishes the a suspicious open door, stolen items will exit
parking rules, but you should point out parking through that door. If you wait too long to report a
hazards that make employee theft easier. concealed item, it will be removed by the thief.
Employee thieves may use their own car or The third main point is reporting to the right
truck. They may also use a company vehicle to person. The right person will react properly to
haul away the stolen merchandise. For example, a the threat you observed. The right person will
driver may load a few extra cases onto the truck, authorize or take corrective action in a timely
cases not listed on the manifest. These will be sold fashion. The right person will see that your work
for his personal profit and the company’s loss. is not wasted. Who is the right person(s)? Your
Some thieves are very bold. They will attempt supervisor, if available, is the right person. The
to walk out with stolen merchandise in their nonsecurity supervisor in the hazard area is
hands. Employees who attempt to remove com- another. Each company and each business will
pany property from the premises should have have a chain of command or leadership tree.
a pass or other authorizing document. Since Protection officers must know the responsibilities
pass forms may be stolen or counterfeited, it is of various managers. They must know how to
important to know and recognize authorized reach managers in case of an emergency, which
signatures. When in doubt, check with your can include a serious threat of employee theft.
supervisor. And make sure that the pass cov- Reports about employee theft should be both
ers each and every item. If the pass says “six” verbal and written. The need for verbal reporting
items, do not let the employee remove seven. often increases with rapidly unfolding events. The
need for written reports is twofold. First is clarity.
Verbal information often becomes distorted when
RESPONSE TO THEFT relayed from one person to another. Second is
record keeping. Written reports serve as the basis
for planning by the security and loss control staff.
Reporting
History tends to repeat itself, and hazards repeat
All observed suspicious activity, and espe- unless records are kept and used.
cially that involving employees, should be Written reports from protection officers are
immediately reported. Remember that all obser- sometimes hastily read by management, if read
vations and concealment findings are a waste of at all. This is especially true of shift reports. It is
time unless your results are promptly reported. hard to say why these reports are not properly
Along with the need for timely reporting, there used. Sometimes, it is the protection officer’s

VII. DEVIANCE CRIME AND VIOLENCE


RESPONSE TO THEFT 263
fault. Reports are not valuable if poorly writ- careful in conducting searches. Search actions are
ten or have illegible handwriting. Other prob- the most troublesome preventive actions.
lems relate to forms that are poorly designed. Preventive actions do not always mean trou-
At other times, the boss means well, but just ble. Many preventive actions are pleasant. They
cannot seem to get around to reading activity involve heading off employee theft at an early
reports until they are stale. stage. Never forget, the essence of protection is
A protection officer may develop a nega- prevention of employee theft. Cultivate a good
tive attitude about reporting his observations liaison with as many senior employees as you
(to include employee theft hazards). Perhaps can. Let these employees be additional eyes and
nobody asked for an explanation of important ears.
observations. No pats on the back or positive
feedback. Or nothing seems to have been done
to reduce the reported threat. Many protection
Search Policy
officers, especially those working the night Occasionally, you may feel it necessary to
shift, never see the protection boss or his depu- search a lunch bucket or purse. Or you may
ties. That shift, especially, may wonder if their decide an employee locker contains stolen mer-
reports are ever read. chandise. There may be an excellent reason to
What can be done? Verbally report sus- suspect company property is in an employee’s
picious activity and other employee theft personal vehicle. However, before you take
potentials. Discuss your written reports with action, before you search, know your company
supervisors whenever you can. Once in a while, policy and always follow it.
take some initiative and call the protection Do not take actions in conflict with company
office when you are off-duty and the boss is in. policy. Policy may state that employee packages
Show your concern for your duties and for your or vehicles can be inspected on demand, or pol-
reports. Such dedication is often rewarded. The icy may instead authorize periodic and random
protection officer bears responsibility for his searches of employee parcels, briefcases, and
observations on employee theft or the potential purses. A company without a written and well-
for theft. Your observations must be understood communicated policy is buying trouble for itself
by the top ranks. No excuses or moaning about and the protection staff. When in doubt about
lack of communication will help the situation. search policy, ask your supervisor. Remember
that an error on your part could result in your
termination or court action.
Preventive Actions Searching a company vehicle is less hazard-
Observation and reporting are crucial in ous, but company policy still rules. It may be
employee theft prevention, as already addressed. necessary to break a door seal. A search could
Preventive action is also important, but actions delay delivery of overdue merchandise. The
can be hazardous. The wrong action can bring union contract may set limitations or require-
unnecessary embarrassment to an employee, the ments. For example, rules may require the pres-
protection manager, and the individual protection ence of a union steward or a supervisor during
officer. Wrongful action can expose you and your the search. Know the rules and follow them.
company to civil suit. For example, an employee Searching other areas, such as storage sheds,
falsely accused of theft can bring suit for monetary or checking trash containers and garbage bags is
damages. Some wrongful actions lead to criminal normally simple, but it is wise to ask your super-
prosecution and jailing of the protection officer. visor if such routine checks can be done without
Be careful when facing accusations. Be especially giving prior notice to the protection office or some

VII. DEVIANCE CRIME AND VIOLENCE


264 22. WORKPLACE CRIME AND DEVIANCE

supervisor. Routine searches should be done at know an area or the activities taking place as
different times, of course. If officers always check well as employees who work there. Changes
a trash container at 4:00 P.M., employee thieves in the workplace—for example, getting a ship-
will wait until 4:10 P.M. to stash the stolen goods. ment of new, valuable items, opening a formerly
Protection officers may not be allowed in sealed door, or hiring temporary help—can raise
some areas unless invited. Such areas often the potential for employee theft. New merchan-
include the research laboratory and executive dise represents something additional to observe.
offices. Barging into a research laboratory could Opening a previously sealed door means another
ruin experiments in progress. It is important access route to remove stolen merchandise.
to remember that company executives do not Temporary staff may themselves steal or be
want protection officers poking around when blamed as regular employees attempt theft.
important business is under way.
Public relations are the key to almost every-
thing the protection officer does. This is never SUMMARY
truer than in searching an employee’s bag,
briefcase, or vehicle. Your attitude during a This chapter presented some lessons about
search must be professional and nonthreaten- controlling employee dishonesty. Employees at
ing. Remember that you must work tomorrow all levels may steal from their employers. Most
with the same employees you search today. An employees steal what is immediately available
overbearing or nasty attitude will make ene- to them. Opportunities for theft come about
mies you cannot afford. because of WAECUP. Protection officers cannot
prevent all employee theft, but they can have a
positive impact. Theft prevention is a good idea
Employee Liaison at any time. Today, it is especially important
No protection officer can be successful with- because of the economic climate.
out help. Help will come from the protection Practical methods to prevent theft have been
staff, of course, but you can also get help from provided. These include tips on what to look
nonsecurity employees. It is necessary to cul- for, what to report, and what actions to take. As
tivate the respect of those employees who can a general rule, always look for the unusual and
assist you to estimate employee theft threats. out of place, but be prudent in taking action. An
Morale is a good indicator of theft potential. employee may have permission to take com-
When overall morale is high, there tends to be pany property off premises.
less employee theft. When moral is low, theft Protection officers can reduce theft of vis-
is more likely. The protection officer needs to ible items, but it is best to reduce opportunity
keep his or her finger on the pulse of employee for theft. Theft reduction requires knowledge
morale. This can best be done through contacts of company property, how it is marked, and its
in the workplace. value. Make a property list to aid one’s memory.
Often, nonsecurity employees will witness Concealment often comes before removal of
an employee theft, but fail to report it. This company property by the employee thief. Trash,
can continue for a long time. A protection offi- garbage containers, and garbage bags are favor-
cer who has the respect of key employees may ite hiding places. The thief may conceal valu-
receive valuable hints about the deviant activi- able merchandise behind less valuable items.
ties of employees. Everything should be in its place. Look behind
Liaison with nonsecurity employees has other shelved merchandise; examine storage rooms
benefits. A roving protection officer will never and broom closets.

VII. DEVIANCE CRIME AND VIOLENCE


SUMMARY 265
Know the rules about what employees may Search of trash or storage areas is usually with-
bring onto company property. You may be out complication. These searches should be done
able to prevent a theft simply by advising an at staggered times. Some areas, such as research
employee not to bring in a container. Vehicle labs and executive offices, need prior permission
parking is another factor. Point out parking to enter, even by the protection officer. There are
hazards that make employee theft easier. valid reasons for these restrictions.
Report suspicious activity, both verbally and Public relations are important, especially
in writing. Timely observation is critical to the during any search involving an employee. An
right person or persons. Know who the right officer must work tomorrow with the employee
person is. Follow up on the reporting in discus- who is being searched today. Cultivate the
sions with protection supervisors. respect of senior employees. These people can
Preventive actions are important to employee help the officer recognize employee theft poten-
theft prevention. Wrongful actions by protection tial. As a general rule, morale is a good indica-
officers can lead to civil and criminal problems. tor of theft potential. Low morale is likely to
Considerable care is needed in making searches mean more employee theft problems.
and in making accusations. Some preventive Sometimes employees witness theft, but do
actions are pleasant. Employee liaison is an excel- not report it. If the protection officer develops
lent way to prevent employee theft. Liaison with the respect of key employees, hints to employee
senior employees means additional eyes and ears. deviancy may be given. Liaison with non-
Company search policy must be understood security employees has other benefits. Changes
and applied. Know whether policy allows ran- in the workplace environment can raise the
dom searches or searches on demand. A written potential for employee theft. Good liaison will
search policy is essential. Search of company keep you up-to-date on such changes.
vehicles may be easier, but complications can The protection officer can do a good job in
arise with respect to seals, delays, or contract preventing employee theft, but only if he fol-
provisions. Always follow the rules. lows the methods outlined and company policy.

EMERGING TRENDS
Losses caused by employees have been a con- loyalty and commitment to the employer are also
cern throughout history. At one time, employ- critical if theft, sabotage, espionage, and so on are
ers in England and the United States forbade to be controlled.
employees to talk during working hours. This Workplace crime is not limited to theft; sabotage
was to ensure that there was no loss due to by employees can also occur. There are various
wasted time. A more contemporary approach types of sabotage, from total or near total destruc-
to this issue is the use of temporary employees. tion of equipment and facilities (planting explo-
Contract service firms provide employees to cli- sives or incendiaries), to damaging equipment,
ent organizations on an as-needed basis. to deliberate work slowdowns. Sabotage may be
Such an approach cuts waste, but may create motivated by a variety of reasons. In construction
the potential for theft, espionage, and other crimes. and other industries, sabotage may be conducted
Obviously, all employees with access to assets must to prolong the work; damage slows completion of
be properly screened and supervised. Employee the project and keeps hourly workers employed.

VII. DEVIANCE CRIME AND VIOLENCE


266 22. WORKPLACE CRIME AND DEVIANCE

Conversely, acts of sabotage may be motivated by to address the crime problem. Intelligence ana-
labor unrest during contract negotiations or strikes. lysts help to spot and track the activity of orga-
Sabotage may be committed by those advancing nized crime groups, terrorists, and embezzlers.
political or social agendas (terrorism), or it may The effective use of intelligence analysts helps to
be the work of foreign agents during times of war. detect crime or loss problems that are forming.
Regardless of the motivation, sabotage is a type of Intelligence analysts can also direct investigation
workplace crime. The control of sabotage is similar into crime or loss situations. Exception reporting
to the control of theft in most cases. systems, which spot deviations from the norm,
Organized crime has been involved in some such as an unusual amount of voided sales at a
workplaces for many years. Infiltration of busi- cash register, are part of a theft intelligence sys-
nesses, with the goal of exploiting their assets, is tem. Simply put, intelligence directs internal theft
a common occurrence. Organized crime groups investigations. It tells us where to start looking.
are now becoming involved with identity theft/ The individual protection officer plays a key
fraud. Exploitation of an insider who provides role in reducing workplace crime and deviance.
confidential customer or employee information Unfortunately, many organizations do not fully rec-
is a key concern. As information becomes a more ognize this, relying instead on accountants, audi-
valuable and accessible asset, such scenarios will tors, and human resources personnel to manage
likely increase. internal losses. This perspective is most often seen
Intelligence and crime analysis positions are with uniformed security personnel; plainclothes
becoming more common. In public sector organi- personnel, such as retail loss prevention officers,
zations, there are often crime analysts employed by tend to be more involved in internal loss problems.
police departments. Intelligence analysts may be In retail, loss prevention agents do various forms
employed within law enforcement or investigative of auditing, interviewing, and surveillance. In
organizations. Major corporations are also using many cases, retail loss prevention officers also are
the services of those who can conduct applied involved in educational programs for employees.
research on an organization’s loss problems. Crime Coordinating and delivering awareness programs
analysts help pinpoint where crime is occurring on internal loss, organized retail crime (ORC),
by day, time, and location. They aid in more effec- safety, and related topics are functions that are
tively deploying personnel and other resources often performed below the managerial level.

References Criminological theory: Past to present: Essential readings


(2nd ed.) (pp. 131–134). Los Angeles: Roxbury. (Reprinted
Beccaria, C. (1764). Essay on crimes and punishments. Retrieved from Principles of criminology, 6th ed., 1960.)
August 16, 2007, from http://www.crimetheory.com/ Sykes, G. M., & Matza, D. (1957). Techniques of neutral-
Archive/Beccaria/. ization: A theory of delinquency. American Sociological
Burgess, R. L., & Akers, R. L. (1966). A differential association– Review, 22, 664–670.
reinforcement theory of criminal behavior. Social Problems,
14, 128–147.
Cohen, L. E., & Felson, M. (1979). Social change and crime
rate trends: A routine activity approach. American
Resources
Sociological Review, 44, 588–608. The Association of Certified Fraud Examiners has over
Sutherland, E. H., & Cressey, D. R. (2003). A theory of dif- 45,000 members. Membership is open to students. There
ferential association. In F. T. Cullen & R. Agnew (Eds.), is a series of substantial discounts available to educators

VII. DEVIANCE CRIME AND VIOLENCE


SECURITY QUIZ 267
who join the Association. The Association sponsors the
Certified Fraud Examiner (CFE) designation and has a 3. Social learning theory is only about learning
database of articles on fraud. Visit /www.acfe.com. how to commit a crime, not why crime might
Business Controls Inc. offers investigation, consultation, be acceptable.
and employee hotline services for employers and edu-
a. True
cational institutions. In addition, Business Controls pro-
vides both online and instructor-led training in fraud b. False
investigation, workplace violence, employee handbooks, 4. Which of the following is an example of a
substance abuse, theft investigation, and related topics technique of neutralization that would be
at http://www.businesscontrols.com. used if the employee believed the company
Dr. Richard Hollinger’s column in Loss Prevention maga-
would get insurance money to replace the
zine is an outstanding discussion on employee theft.
Loss Prevention also has articles on inventory control, loss?
shrinkage reduction, etc. Visit the site at http://www a. Denial of responsibility
.losspreventionmagazine.com/. b. Denial of injury
The International Foundation for Protection Officers offers a c. Appeals to higher loyalties
certificate program in Crime and Loss Investigation. The
d. Condemning the condemners
Crime and Loss Investigation Program consists of texts
and a series of online papers. The online papers deal 5. Which step must immediately follow
with intelligence, background investigation, and inter- observation of suspicious activity?
viewing. They can be located in the Foundation’s Article a. Marking
Archives at www.ifpo.org. b. Concealment
The University of Leicester’s Department of Criminology
c. Reporting
conducts a wide range of research on workplace crime,
shrinkage control, and related topics. The University d. Liaison
is one of the leading research institutions in the United 6. Liaison with nonsecurity employees has
Kingdom and offers a variety of certificate and degree many benefits for the protection officer.
programs online at http://www.le.ac.uk/criminology/ a. True
researchmain.html.
b. False
7. Protection officers may visit any office or
activity without notice and at the officer’s
convenience.
a. True
b. False
S EC U RI T Y QU IZ
8. Employee package policies usually include:
1. Which of the following is not relevant to a. Search on demand
general deterrence? b. Periodic or random search
a. Punishment certainty c. Neither of the above
b. Punishment celerity d. Either a or b
c. Punishment carnality 9. Suspicious activity should be reported only
d. Punishment severity in writing.
2. Routine activity theory states that crime will a. True
only happen when a motivated offender, a b. False
suitable target, and the absence of _________ 10. Reporting observations to the right person or
_________occur at the same place and time. persons is vital.
a. Suitable guardians a. True
b. Capable guardians b. False
c. Protection officers
d. Probation officers

VII. DEVIANCE CRIME AND VIOLENCE


This page intentionally left blank
C H A P T E R

23
Substance Abuse
Francis J. Elliott, Glen Kitteringham, and
Terence M. Gibbs

and child abuse. According to the World Health


CHAPTER OBJECTIVES Organization, the abuse of psychoactive sub-
● Provide an overview of the impact of stances is estimated at 2 billion alcohol users,
various types of substance abuse 1.3 billion smokers, and 185 million illicit drug
● Elevate the protection officer’s awareness users. It was estimated to be responsible for
about substance abuse in the workplace 12.4% of all annual deaths worldwide (World
Health Organization: Substance Abuse Facts).
● Discuss psychoactive drugs and the Substance abuse adversely affects our schools
behaviors resulting from their use and/ and the education of our children; it divides
or abuse and destroys families, drains the economy of
● Identify the risks that these behaviors entire communities, and jeopardizes the abil-
pose for employees and the employer ity of business and industry to be competitive.
● Prepare security professionals to deal Substance abuse is a threat to our society and
with substance abuse on the job and public safety. It destroys the human will and
effectively communicate observations denies dreams. Substance abuse does not dis-
and information to supervisors criminate. It favors no race, age group, intel-
● Identify conditions that may point to a ligence level, social or economic status, or sex.
security risk or vulnerability It consumes anyone who dares to embrace its
false promises for perpetual self-gratification
and well-being.
This chapter is aimed at elevating the pro-
Today, we live and work in a society in which tection officer’s awareness about substance
substance abuse is omnipresent. It is a major abuse in the workplace, and about psychoactive
problem confronting Canada, the United States, drugs and the behaviors resulting from their
and other countries around the world and is use and/or abuse. This chapter also identifies
the leading cause of crime, health problems, the risks these behaviors pose for employees

269
270 23. SUBSTANCE ABUSE

and the employer, and the methods by which Green, 2008) and 90% of alcoholics are
to prevent or confront these risks. As a security employed in the workplace. Many of these
professional, you must be prepared to deal with employees are poly-drug abusers. That is,
substance abuse on the job and effectively com- they abuse more than one drug in the course
municate your observations and information of their drug-taking behavior. Employees with
to your supervisor. Because of your daily inter- alcohol and other drug problems represent
action with employees and others who visit 10–20% of any given workforce. Within this
your workplace, you must be able to recognize workforce, the highest concentration of abus-
conditions that may point to a security risk or ers is within the 18- to 25-year-old age group.
vulnerability A 2007 U.S. Department of Health and Human
For the purposes of this chapter, the phrase Services study shows that 20% of work-
“substance abuse” refers to the use, usually ers age 18 to 25 use drugs on the job, while
self-administered, of any psychoactive drug, the rate for 27- to 34-year-olds is 10%, 35- to
in a manner that deviates from the approved 49-year-olds is 7%, and 50- to 64-year-olds is
legal, medical, or social patterns within a given 2.6% (Larson, Eyerman, Foster, & Gfroerer,
culture. A drug is defined as any substance 2007). The Canadian Centre for Occupational
that by its chemical nature alters the structure Health and Safety put the 2002 economic cost
or function of the living organism. A psycho- of substance abuse to the Canadian workplace
active drug is one which alters the structure or at $39.8 billion (www.ccohs.ca/oshanswers/
function of the brain. Psychoactive drugs alter psychosocial/substance.html). U.S. government
mood, perception, or consciousness. Examples data suggests that the economic cost of the
include nicotine, alcohol, marijuana, cocaine, United States’ extensive involvement with mind-
amphetamines, and LSD. altering drugs and alcohol may be close to $400
Because our focus is on drugs that directly billion annually to the American business
affect performance and behavior on the job, community (U.S. Department of Health and
nicotine will not be a focus of this chapter. Human Services, 2009). The annual cost for a
However, it is important to note that nicotine single employee with a substance abuse prob-
consumption produces classic drug depen- lem is reported to be between 5% and 15% of
dence characteristics. Along with alcohol, it is a company’s health care budget (Fischer et al.,
considered a gateway drug for those who ulti- 2008). The European Monitoring Centre for
mately use other dependence-producing drugs, Drugs and Drug Addiction (2009) estimates
such as marijuana and cocaine. Finally, nicotine that at least 100 million Europeans, or 32% of
has been clearly identified as an insidious sub- the population, have a lifetime prevalence for
stance responsible for approximately 5.4 million using such drugs as cannabis, cocaine, ecstasy,
deaths worldwide and is referred to the big- amphetamines, and opioids. It is safe to assume
gest “killer in the world” by the World Health that their workforce is also directly impacted
Organization (United Nations Press Briefings/ by substance abuse. Aside from the substance
Tobacco). abuser population, there exist an unspecified
number of employees who are codependent.
These employees do not abuse drugs. However,
IMPACT ON BUSINESS AND they share a common thread. They are the
INDUSTRY spouses, children, and significant others who
arrive for work each day preoccupied with the
In the United States, recent studies reveal that physical and emotional condition of their loved
75% of illicit drug users (Fischer, Halibozek, & ones.

VII. DEVIANCE CRIME AND VIOLENCE


SUBSTANCE ABUSE: WHAT IS THE MOTIVATION? 271
These are some of the tangible costs gener- components that complement a company’s par-
ated by the substance abuser: ticular philosophy and culture. These compo-
nents include policy development, training and
1. Decreased productivity—they are 25% less
education, employee assistance programs, the
productive.
security function, and drug testing measures.
2. Accidents—they are three to four times
more likely to have an accident on the job.
Fifty percent of all accidents are attributable SUBSTANCE ABUSE: WHAT IS
to substance abusers. Forty percent of THE MOTIVATION?
industrial accidents resulting in fatality
are linked to alcohol consumption and Time and again the question is asked, “Why
alcoholism. do people abuse drugs?” The reasons are usu-
3. Absenteeism—they are absent four times ally complex. Early drug use, at any age, may
more often. Also, they are more likely to be be a result of peer pressure, low self-esteem,
away from their assigned locations during insecurity, boredom, or various other social,
regular work hours. environmental, psychological, and biologi-
4. Theft—they are responsible for 50 to 80% of cal factors that induce stress and anxiety. In all
employee thefts. likelihood, some combination of these variables
5. Worker ’s compensation—they are stimulates the initial use and abuse of psycho-
five times more likely to file a worker ’s active drugs. Initial use is usually reinforced as
compensation claim. a result of (1) pleasant effects, (2) a perceived
6. Health care costs—they use medical benefits control over the drug, (3) peer acceptance and
five times more often, and the family members recognition, and (4) myth and misinforma-
of substance abusers generally have higher- tion. What we know is that drugs can quickly
than-average health care claims (Protection of relieve unpleasant feelings. Mind-altering drugs
Assets Manual, 2007, Vol. I, Ch. 8). quickly affect the pleasure centers of the brain
so that the user who is feeling good feels better,
Aside from the tangible costs of substance
and those feeling bad will feel good. The result
abuse, many hidden costs exist for which a
is nearly immediate self-gratification, but it is
dollar figure cannot be assigned, such as the
only temporary. In reality, sooner or later, the
following:
user and others always pay the price.
● Morale problems Continued use of a psychoactive drug will
● Intimidation of managers and employees most often result in problematic behavior such
● Wasted supervisory time as drinking and driving, job jeopardy, or split-
● Overtime costs ting with the family. Ultimately, repeated use
● Grievance costs can lead to physical and/or psychological
● Training and replacement costs dependence. As use continues, there are usually
● Decreased quality of products and services three anticipated outcomes:
To successfully address the adverse conse- 1. Return to a drug-free lifestyle.
quences of substance abuse in the workplace, 2. Continue to abuse drugs, avoiding
we must elevate awareness and change existing dependence but exhibiting problematic
attitudes and procedures that enable perpetu- behavior at work, home, or the community.
ation of the problem. There is no single solu- 3. Continue to abuse drugs to the point of
tion. The greatest success will come through the dependence and most likely death from his/
selection of various prevention and remedial her disease.

VII. DEVIANCE CRIME AND VIOLENCE


272 23. SUBSTANCE ABUSE

How each substance abuser will land is unpre- person. We also know that there are not enough
dictable, and is often guided by circumstance of these programs to meet the needs of the
beyond anyone’s control. afflicted. According to the U.S. government,
the cost offset is tremendous. For every $1.00
spent on treatment, $7.00 is saved on crime and
HOW PROBLEMATIC BEHAVIOR criminal justice costs. When factoring in health
AND DEPENDENCE DEVELOP care savings, a total of $12.00 is saved (U.S.
Department of Health and Human Services,
Today, drug dependency is viewed as a dis- 2009). In spite of the various programs and mod-
ease with identifiable causes, signs, and symp- els, we know that recidivism rates are high. So,
toms. As such, in many jurisdictions people for all that is known, the experts still have much
with addiction issues are protected by human to learn and continue to do so each day. There is,
rights councils. Dependency follows a predict- however, a solid body of evidence pertaining to
able course and outcome, and it is treatable. the stages of dependency and associated behav-
The disease of drug dependence can be the iors which the protection officer should know.
following: An understanding of the process is critical to
prevention and rehabilitation efforts.
● Primary—it is not simply the symptom
Drug dependence follows a predictable
of some other problem(s); it is in itself the
course of action which, most often, begins with
problem.
experimentation. This may be the result of curi-
● Contagious—it attracts others who are
osity, peer pressure, or a variety of other vari-
vulnerable.
ables or combination of variables. Everyone
● A family disease—it affects entire families,
is susceptible to the abuse of drugs and some
not just the individual abuser.
more so than others due to a host of social, envi-
● Chronic—it is difficult to control, is quite
ronmental, psychological, and biological issues
often recurring, and although treatable, it is
or, in some cases, heredity. What is significant is
incurable.
that each incidence of use makes the user more
● Fatal—it takes hundreds of thousands of
susceptible to continued use, up to and includ-
lives annually.
ing dependence. Further, the earlier drug use
Drug dependence may be physical or psy- begins, the more likely it is to progress to abuse
chological, and it represents an individual’s loss and dependence.
of control. Physical dependence occurs when a Another facet of dependence is recovery. The
person cannot function normally without the individual user has a greater opportunity for a
repeated use of a drug. If drug use is abruptly full recovery if treatment begins before depen-
discontinued, the person experiences severe dence sets in. The longer one uses a drug(s),
physical and psychic disturbance, known as the more complex the physical and psychologi-
withdrawal. Psychological dependence pro- cal symptoms become. As a result, recovery for
vides a strong psychological desire to continue the dependent person, or daily user, is a greater
the self-administration of drugs for a sense of challenge in most instances than recovery from
improved well-being. occasional use or experimentation. This is why
A great number of programs and treatment early intervention is significant.
approaches exist for the treatment of drug Whether an intervention occurs at home,
dependencies. What we do know about these work, school, or in the community, it is certain
various programs is that no single approach or that the earlier the intervention takes place the
program is effective for every drug dependent greater the opportunity is for recovery.

VII. DEVIANCE CRIME AND VIOLENCE


HOW IS SUBSTANCE ABUSE PERPETUATED? 273

HOW IS SUBSTANCE ABUSE dangerous combinations, such as barbiturates


PERPETUATED? and alcohol. Some drugs, like over-the-counter
(OTC) medications, can be harmful in therapeu-
There are essentially five reasons why sub- tic doses if alertness is diminished or drowsi-
stance abuse continues to be a problem in the ness results. Finally, certain drugs taken by
workplace. hypersensitive people can be lethal—for exam-
ple, penicillin. Given the potential harmfulness
1. Denial
of some legal, prescription, and OTC drugs, one
2. Mixed messages
must realize the increased potential for harm,
3. The “harmless” theory
impairment, and death with illegal street drugs,
4. Drug use is controllable by the user
whose composition is never truly known.
5. The problem is viewed as controllable
Controllable use is some people’s belief that
through attrition
drug use can be “recreational,” provided one
Denial provides the biggest single road- controls his/her intake of a given psychoactive
block to successfully addressing the problem drug. However, this arrangement is academic
of substance abuse in society or the workplace. because even so-called social, “recreational,” or
Parents, teachers, husbands, wives, managers, “controlled use” of psychoactive drugs on the
and users themselves all tend to deny the prob- job often leads to impairment, which in turn
lem exists, even in light of hard evidence. Some leads to diminished performance, accidents,
familiar phrases illustrate the point: “Not my and other adverse consequences. Everyone pays
kid,” “What is wrong with a few drinks?” “Not a price for his/her drug use. Some pay earlier
in my company,” “Not Joe—he’s just a good- than others, and all too often innocent people
natured guy,” “It must have been entrapment.” suffer first.
Mixed messages are heard daily, and are con- Attrition in industry is often seen as a solu-
fusing to the layperson. Some insist the use of tion to the drug problem. Unfortunately, tomor-
certain drugs for “recreational” purposes is row’s workforce is intimately involved with
harmless. Others say that the same drugs con- drugs today. Consider the following:
tribute to many individual, social, and occu-
pational ills. For instance, some marijuana In 1975, 55 percent of high-school-aged children
had tried illicit drugs. This increased to 66 percent by
advocates say that this drug is harmless and 1981. In 2008 the rate of abuse in the United States for
does not interfere with one’s work. Others 12- to 17-year-olds is 47 percent (D.A.R.E. America
claim that the drug has a negative impact Annual Report, 2008, p. 8). Similar statistics from the
on education, motivation, and the ability to United Kingdom for 16–24 year olds were reported
remember and perform complex or new tasks. in the Annual 2002/2003 British Crime Survey. Those
who have tried illicit drugs in this age category, at
Hence, marijuana use may contribute to indus- least once were reported at 47 percent. (Condon &
trial accidents. Smith, 2003)
The “harmless” theory contends that the use
of drugs such as marijuana, cocaine, and alco- The data clearly show that tomorrow’s work-
hol is considered by many to be an innocuous force is intimately involved with the use and
activity, on or off the job. In fact, some forces are abuse of alcohol and other drugs today. It is
aggressively moving to legalize all psychoactive evident that business and government will con-
drugs. In reality, no drug can ever be consid- stantly be confronted with a new generation of
ered harmless. Any drug is harmful when taken young people predisposed to tolerating the use
in excess, even aspirin and, of course, alcohol. and abuse of psychoactive drugs. For this rea-
Some drugs can also be harmful if taken in son, the business community must gather its

VII. DEVIANCE CRIME AND VIOLENCE


274 23. SUBSTANCE ABUSE

resources to establish sound drug-free work- by the layperson. These signs include the
place programs that will meet this challenge. following:
1. Observation of drugs and/or drug
paraphernalia in the workplace.
CONDITIONS ADVERSELY 2. Observation of suspicious activity, especially
AFFECTING THE WORKPLACE in secluded areas of the facility or parking
lots. Whenever suspicious activity is
As substance abusers arrive for work each
observed, you should immediately contact
day, they generally fit into one or more of these
your supervisor and request backup before
categories that present threatening conditions
approaching. However, immediate action
for employees and their employer:
may be necessary if a threat to personal
1. Appear for work under the influence of safety exists.
drugs and will be openly and obviously 3. Scent of chemical odors not commonly
impaired, or intoxicated and unfit for duty. present in the workplace.
2. Possess and use drugs on the job. Although 4. Observation of abnormal behavior, including
they are impaired, it will not be evident. the signs of intoxication. Keep in mind that
3. Sell or otherwise distribute, or transfer not all abnormal behavior is an indication
illegal drugs or legal drugs illegally, while of substance abuse. Some employees may
on the job. have legitimate medical problems that can
4. Display impairment due to the residual result in behavior similar to intoxication.
effects of drugs taken hours or even days Regardless of the cause, immediate action is
prior to coming to work. These effects may required to protect the employee, coworkers,
include emotional outbursts, personality and the company’s property and interest.
changes, irritability, combativeness, memory
problems, and the inability to complete
assignments.
5. Have codependent loved ones working at
HOW MUST INDUSTRY
jobs where they will be less productive.
RESPOND?
Keeping in mind that the protection officer The workplace plays an integral part in the
is not a diagnostician, recognizing impairment fight against substance abuse. When continued
due to sustained low dosages and residual employment is conditional upon being drug-
effects, or codependence, will be unlikely unless free, then employment becomes a powerful
he/she is informed of this by a third party. If incentive in support of a drug-free workplace.
third-party information is received, then the When a company demonstrates commitment
protection officer should bring this intelligence to a comprehensive program in support of a
to his/her supervisors immediately. These con- drug-free workplace, then the opportunity to
ditions are best left to supervisors and manag- affect attitudes, behavior, and the lifestyles of
ers who can evaluate these issues as a matter employees is significant. Through the influ-
of job performance and make the necessary ence of these programs, employees are likely
referrals, or take disciplinary action when per- to make healthier choices. Employees who are
formance is considered to be deteriorating. educated and committed to a drug-free life-
However, the protection officer should be alert style convey this attitude to their families and
for the outward signs of drug possession, use, friends. In effect, the employee not only serves
and distribution, which are often overlooked to reduce substance abuse at work, but he/she

VII. DEVIANCE CRIME AND VIOLENCE


HOW MUST INDUSTRY RESPOND? 275
serves to improve the health of his/her family on matters pertaining to troubled employ-
and community. ees, assess employee problems, make refer-
Historically, “private enterprise has pio- rals for treatment and counseling, and in some
neered most of the programs in drug detection, instances, oversee drug testing programs.
rehabilitation, and prevention” (Fischer et al., Current data reveals that each dollar invested
2008, p. 357). To respond effectively, a multidi- in an EAP can save a company $5.00–16.00 in
mensional approach is necessary. A company the long run. Where an EAP is not available, a
should consider five components in the devel- company may provide insurance coverage that
opment of a comprehensive drug-free work- will allow an employee to seek community
place program. resources.
Drug testing programs like those provided
1. Policy development
by the EAP have traditionally been employed
2. Training and education
by large companies. One of the restrictive fac-
3. Employee assistance
tors for a small company is, of course, cost. As
4. Drug testing
with EAPs, smaller companies are banding
5. Security measures
together to form consortiums in order to make
A company policy is the first step on which drug testing more cost-effective. This momen-
to build an effective drug-free workplace pro- tum for testing is being pushed:
gram. It must clearly state the company’s pur- ● By legislation that all workers in safety-
pose, what will and will not be tolerated, how
sensitive positions are subject to mandatory
the company will respond to violations, and
testing;
what training and treatment support are avail- ● By insurance companies who threaten to
able. It should also describe the company’s
increase rates if drug testing is not carried
drug testing policy, if they choose to conduct
out; and
these tests. ● By the resurgence of background checks,
Training and education should be pro-
partly precipitated by the events of
vided at all levels of employment, especially
September 11, 2001 (Gips, 2006, p. 54).
supervisors and managers, for they represent
a company’s first line of defense. Training and The purpose of drug testing is to deter sub-
education should focus on a review of the com- stance abuse, prevent the hiring of substance
pany’s policy, and provide a clear understand- abusers, and provide for the early identification
ing of the nature and scope of substance abuse and referral to treatment of employees with a
and the required response to prevent and prop- substance abuse problem.
erly address the problem. Several types of testing can be performed by
Employee assistance programs (EAPs) are a company, depending on their needs and col-
most often a resource offered by large com- lective bargaining or legal restrictions. These
panies. However, more and more smaller- include preemployment, postaccident, follow-
sized companies are forming consortiums and up to treatment or counseling, reasonable sus-
thereby making the availability of EAP services picion, and random. Urinalysis has been the
cost-effective. An EAP may be an in-house func- predominant method used to test for the pres-
tion or contracted out through an independent ence of controlled substances. However, other
service. These programs assist employees and testing materials being evaluated and/or used
their families in addressing a wide range of per- include blood, hair, pupillometry, and saliva.
sonal problems, including substance abuse. In Each of the components discussed above
addition, they offer training programs, consult plays an integral part in a drug-free workplace

VII. DEVIANCE CRIME AND VIOLENCE


276 23. SUBSTANCE ABUSE

strategy. However, these components cannot drugs can effectively supplement their income
address all situations. Sometimes a security by removing valuable equipment or money
response is required. This is true when reck- from the employer or other employees.
less and wanton behavior places the safety To counteract the activities of drug dealers,
of employees and the interest of the com- the company’s security department or inde-
pany at great risk. Protection officers should pendent contractor may have to employ certain
clearly understand why and when the security investigative techniques. For the most part, these
response is necessary. techniques include interviews with employees,
There is a small percentage of substance undercover operations, covert surveillance, or
abusing employees, perhaps 4–10%, who will searches conducted by drug-sniffing dogs or
not accept or benefit from an offer of assis- chemical process.
tance in the way of treatment or counseling. Interviews are conducted for the purpose of
These individuals include drug dealers who gathering intelligence that may dictate future
may or may not use drugs on the job, and users action, such as policy changes or the selection
who are not interested in or ready for recovery of an investigative technique. Employees quite
because they are in denial. Employees who deal often possess critical information, but may not
drugs are engaged in criminal activity that can- recognize its significance unless questioned by
not be tolerated. They make available the sup- a trained investigator.
plies on which troubled employees depend and An undercover operation is a specialized
they establish new opportunities for other types investigative technique. It is employed for the
of criminal activity such as gambling, pros- purpose of covertly infiltrating a workforce in
titution, and theft. A survey conducted with order to identify violations of company policies
substance abusing employees revealed that or law. These investigations are usually initiated
44% had sold drugs on the job. They sell their when there is a suspicion or clear knowledge
drugs in bathrooms, parking lots, vehicles, and that drug dealing is taking place, but the source
secluded areas. and the degree are unknown. Even if a source
In some cases, major drug trafficking orga- was identified, in many instances an undercover
nizations have directed dealers to secure jobs operation may be necessary to gather the evi-
in industry and to develop a clientele. Why? dence required for disciplinary or legal action.
Because (1) there is low police visibility, (2) Covert surveillance or hidden cameras are
security forces are well known and predictable, used when the activity in question is confined
and (3) there is a ready-made clientele. These to an individual or specific location. When this
types of employees create morale and safety is the case, a special surveillance camera can
problems and, in many cases, create a great be covertly secreted inside a ceiling, wall, fix-
deal of intimidation for employees and manag- ture, or a variety of other areas restricted only
ers alike. by one’s imagination. The greatest advantage to
Theft is a major problem for both employers the hidden camera is the undisputed nature of
and employees. Employees who use drugs on the evidence, a picture of the event, and those
or off the job need to support that use. In many responsible.
cases the cost of drugs is very high, costing The act of searching a work area or entire
thousands of dollars a month. To support this workplace is not a common practice in most
need, employees have been guilty of the theft industries. When a search is performed it is
of valuables such as equipment, money, and usually carried out by drug-sniffing dogs or by
trade secrets. By contrast, a person who spends chemical analysis. Most employers reject searches
$20.00–40.00 a week for marijuana and/or other by dogs, based on the perceived negative impact

VII. DEVIANCE CRIME AND VIOLENCE


DRUGS OF ABUSE, PARAPHERNALIA, AND DEFINITIONS 277
it would have on employee morale. However, Tolerance: Refers to a state in which the
these searches can and do detect the presence body’s tissue cells become accustomed to the
of controlled substances. Once detected, a host presence of a drug at a given dosage and even-
of questions are raised regarding what legal or tually fail to respond to this ordinarily effective
disciplinary action may be justified or taken. The dosage. Hence, increasingly larger dosages are
action to be taken can only be determined on a necessary to produce the desired effect.
case-by-case basis, after analyzing a variety of Physical dependence: Often referred to as
factors. addiction, this occurs when a person cannot
The second type of search is less intrusive function normally without the repeated use of
and much more discrete. The chemical analysis a drug. If the drug is withdrawn, the person
search involves sweeping an area and analyz- has mild to severe physical and psychic distur-
ing the contents for the presence of a controlled bance, known as withdrawal.
substance. The chemical analysis is, however, Withdrawal: This is characterized by symp-
restricted to the identification of a limited num- toms that occur after drug use is abruptly dis-
ber of drugs. The same legal and disciplinary continued. Symptoms may be mild or severe
issues apply, as mentioned above. and include seizures, restlessness, irritability,
nausea, depression, and more. In some cases, as
with alcohol and other depressants, withdrawal
DRUGS OF ABUSE, can be life-threatening.
PARAPHERNALIA, AND Psychological dependence: This is the result
DEFINITIONS of repeated consumption of a drug that produces
psychological but not physical dependence.
Although there are many drugs that will Psychological dependence produces a strong
fall within the psychoactive classification, it desire to continue taking drugs for the sense of
is important that protection officers have an improved well-being, but the body is not physi-
awareness of those that are most prevalent in cally dependent on the drug. Psychological
the workplace. The following are in order of dependence is the most difficult to treat.
significance: Potentiation: This is concurrent use of two
or more depressant drugs with the same action
1. Alcohol
that produce a multiple effect greater than the
2. Cannabis
sum of either drug when taken alone. For exam-
3. Stimulants
ple, use of barbiturates and alcohol. Potentiation
4. Depressants (other than alcohol)
can result in unexpected lethal overdose.
5. Narcotics
Lookalike drugs: Drugs (tablets, capsules,
6. Hallucinogens
and powders) that are manufactured to closely
To facilitate a review of the most popular resemble the appearance of well-known, brand
drugs of abuse within each class, a controlled name drugs, such as Dexedrine (dexies), and
substance chart is provided that identifies spe- Biphetamine (black beauties). They generally
cific drugs, trade or other names, medical uses contain drugs found in OTC medications, but
if any, its potential for producing dependence usually in larger amounts to provide greater
and tolerance, duration of effects, routes of potency.
administration, and possible effects of abuse,
overdoses, and withdrawal. A word of CAUTION: You should never taste,
Before continuing, it will be helpful to review smell, or directly touch an unknown substance. IT
the following definitions: COULD BE HAZARDOUS TO YOUR HEALTH!

VII. DEVIANCE CRIME AND VIOLENCE


278 23. SUBSTANCE ABUSE

INDICATORS AND COMMON 2. Pupils may be dilated and the eyes


SIGNS OF ABUSE bloodshot.
3. Use results in distortion of depth and time
There are various indicators that suggest or perception, making driving or the operation
positively identify drug involvement in any of machinery hazardous.
environment, including the following: 4. Smokers may be impaired for as long as
24 hours following intoxication, which may
● Presence of a drug and/or drug last 1–2 hours.
paraphernalia 5. Short-term memory is impaired.
● Physical signs (needle marks, dilated pupils) 6. Long-term use of marijuana is associated
● Behavioral signs (slurred speech, irritability, with mental deterioration in some users
personality changes) and presents a significant health risk to
● Analytical tests (saliva, urine, blood, hair) adolescents, the unborn, diabetics, the
There are many signs of substance abuse emotionally disturbed, and those with
that can be identified by the protection officer. respiratory problems.
However, keep in mind that some people have
legitimate reasons for possessing a syringe Marijuana is the most commonly used illicit
and needle (diabetics), or having capsules and drug in the workplace, because it is easily con-
tablets (valid prescriptions). Having the snif- cealed and use can be accomplished quickly.
fles and running eyes and nose may be due This drug is often a brown, herbaceous sub-
to a head cold or allergy and not cocaine use. stance, but may be shades of brown, red, green,
Unusual and odd behavior may not be con- or yellow depending on its origins. Marijuana is
nected in any way with drug use. For these rea- smoked as a “joint” (cigarette) or through vari-
sons protection officers cannot and should not ous types of pipes. When the joint is reduced to
view themselves as diagnosticians. The protec- a butt and can no longer be held with the fin-
tion officer’s role is to observe and report sus- gers, it is referred to as a “roach” and held with
picious conduct or behavior to the appropriate a “roach clip” for continued smoking. Another
supervisory contact within the company, so method used to smoke marijuana is to hollow
that they can evaluate each incident and follow out a cigar and fill it with the marijuana. This
through in the appropriate manner. preparation is referred to as a “blunt.”
Marijuana may also be taken orally when
used in the preparation of food or drink.
SIGNS AND SYMPTOMS: However, smoking is the preferred route of
CONTROLLED SUBSTANCES administration.
Cost is based in large degree on availability
The following are specific characteristics and/or its potency, which is determined by the
attributable to each drug class: percentage content of the psychoactive chemi-
cal called THC (Delta 9 Tetrahydrocannabinol).
It is often packaged in clear plastic baggies, but
Cannabis: Marijuana, Hashish, any type of container may be used.
Hashish Oil Marijuana users attempt to avoid detection
on the job by smoking small amounts of mari-
1. Initially, the person may appear animated juana, called “sustained low dosages,” through-
with rapid loud talking and bursts of laughter. out the workday. This enables the user to avoid
In later stages, he/she may be sleepy. intoxication and therefore detection, because the

VII. DEVIANCE CRIME AND VIOLENCE


SIGNS AND SYMPTOMS: CONTROLLED SUBSTANCES 279
euphoria or impairment is not outwardly obvi- route), injection, and smoked as crack. On-the-
ous. The user experiences mild effects along job use is usually confined to snorting, which
with a level of impairment that can adversely can be accomplished quickly and surreptitiously.
affect one’s fitness for duty and safety on the job. Cocaine can be snorted with the use of a
Hashish and hashish oil contain concen- coke spoon, a straw, the corner of a matchbook
trated levels of THC, which result in increased cover, or the tip of a long fingernail. When
potency over marijuana. These forms of canna- using a straw, which might be a rolled-up piece
bis are generally not consumed at work because of currency, the user refers to this as “snorting
of the preparation required, but they are readily a line” of cocaine. In addition, there is para-
distributed. phernalia available today that is disguised as
common sinus inhalers but is used to dupe
unsuspecting employers into believing the user
Stimulants: Cocaine, Amphetamines,
is treating a cold. In some cases employees have
Crystal Meth, Lookalikes
been dismissed on sick leave to address their
symptoms!
1. The user may be excessively active, irritable,
Although traces of cocaine remain in the
argumentative, nervous, or restless.
body for up to a week, its mind-altering effects,
2. The user generally shows signs of excitation,
which users seek, last only 15–30 minutes.
euphoria, talkativeness, and hyperactivity.
This is important because following this brief
3. May perform the same tasks repeatedly.
drugged state, the user experiences varying
4. Dilated pupils and dry mouth are common.
degrees of depression, exhaustion, and dull-
5. Regular users can go long periods without
ness, due to chemical disturbances in the brain
sleeping or eating. This can result in fatigue,
that reinforce readministration of the drug.
depression, and weight loss.
This may lead to continued or compulsive use
6. Long-term heavy use can produce delusions,
and quite often to new routes of administra-
psychosis, paranoia, or death.
tion to achieve a more potent effect. The high
7. Specific to cocaine—the user may exhibit
cost is a powerful force that can lead to theft,
runny nose, sniffles, watery eyes (symptoms
drug dealing, and other criminal activity in the
similar to the common cold), and ulcerations
workplace.
of the nasal passage.
Amphetamines are produced by both legiti-
8. Paraphernalia consists of razor blades
mate pharmaceutical companies for medical
and mirrors for chopping cocaine into fine
purposes and by clandestine laboratory opera-
particles. Straws and small spoons are then
tors (drug traffickers) in makeshift laboratories
used for snorting.
located in bathrooms or garages, or in elabo-
Cocaine is a drug produced by chemically rate facilities including workplace laborato-
processing the leaves of the coca bush, which is ries. Their effects are similar to cocaine with
indigenous to South America. one important exception: They last for hours
Cocaine is usually a white, crystalline sub- rather than minutes. When these drugs are
stance that looks like snow. When sold and used for nonmedical reasons, they are com-
used as “crack,” it takes the form of solid matter monly obtained through (1) pharmacy theft,
and resembles small rocks or pebbles. Various (2) clandestine manufacturers, or (3) unscrupu-
containers are used to conceal or store the drug, lous doctors who write illegal prescriptions for
such as tin foil, paper, and small glass vials. monetary gain.
Cocaine is taken by various routes of admin- Some of the more popular amphetamines
istration, including snorting (the most popular are methamphetamine (Speed), Biphetamine

VII. DEVIANCE CRIME AND VIOLENCE


280 23. SUBSTANCE ABUSE

(Black Beauties), Dexedrine (Dexies), and Ben- drugs. This not only creates an image problem,
zedrine (Pink Hearts). Ritalin and Preludin but also a safety problem, because many of the
are amphetamine-like substances that are also necessary precursor chemicals are highly flam-
popular. mable and/or explosive.
Amphetamines are taken orally as tablets
or capsules that vary in color, shape, and size.
Some, like methamphetamine or methcathinone Depressants: Alcohol, Barbiturates,
(CAT), are available in powder form and are Tranquilizers, Rohypnol
injected, snorted, or taken orally.
1. Behavior like that of alcohol intoxication, but
In addition to the drugs listed above, a whole
without the odor of alcohol on the breath
new class of substances referred to as “looka-
2. Staggering, stumbling, or decreased reaction
like” drugs have become problematic. Initially
time
utilized by truck drivers and students, these
3. Falling asleep while at work
substances have now infiltrated the workplace
4. Slurred speech
and are taking their toll. These substances can
5. Constricted pupils
be distributed legally. They consist of capsules,
6. Difficulty concentrating and impaired
tablets, and powders that contain legal, OTC
thinking
stimulants such as caffeine and ephedrine. They
7. Limited attention span
are marketed as “stay awake” and “stay alert”
drugs. However, their use can cause irritabil- These drugs, with the exception of alcohol,
ity and fatigue that in turn has contributed to are produced and obtained in the same manner
morale problems within the workforce. as amphetamines.
The use of stimulants, often referred to as The most commonly abused drugs in this
“uppers” or “speed,” on the job poses three group, aside from alcohol, are the barbiturates,
serious problems. First, being under the influ- such as Secondal (Red Devils), Tuinal (Rainbows),
ence of these drugs gives one a false sense and Nembutal (Yellow Jackets), and the benzodi-
that they are capable of achieving any task or azepines, such as Valium and Librium. Another
conquering any challenge. In this condition, popular drug in this classification is Rohypnol.
employees may use poor judgment or attempt The depressants possess two important char-
tasks that are beyond their training and knowl- acteristics that bear mentioning. First, as stated
edge, resulting in wasted time, property or per- in the definitions at the beginning of this sec-
sonal damage, safety infractions, and accidents. tion, they are potentiating when combined with
Second, in a stimulated, talkative, and hyperac- other depressant drugs. Second, withdrawal
tive condition, users often disrupt coworkers, from alcohol and other depressants is life-
thereby creating employee morale problems. threatening, and should always be done under
Finally, stimulant users tend to repeat tasks. medically supervised conditions.
This reduces productivity and quality control, Valium and Librium are the most widely pre-
and can affect morale in an environment depen- scribed and abused tranquilizers. They are also
dent upon a team effort. potentiating when combined with alcohol, bar-
Note: Many precursor chemicals necessary biturates, or other tranquilizers.
to manufacture illegal drugs are legitimately “Lookalike” substances containing antihis-
used in private industry. To avoid theft of tamines and analgesics like acetaminophen are
these chemicals by drug traffickers, a company also available as described for the stimulants.
should establish safeguards. Also, the work- Rohypnol is one of the latest fad drugs of the
place has been used to manufacture illegal 1990s, and is becoming increasingly popular

VII. DEVIANCE CRIME AND VIOLENCE


SIGNS AND SYMPTOMS: CONTROLLED SUBSTANCES 281
with young people. It has Valium-like effects and Dilaudid, and synthetics like Demerol,
and is referred to as “Roofies.” Percodan, and Fentanyl, are popular.
Depressants are taken orally and no specific Narcotics are usually available in tablet,
form of packaging is outstanding. capsule, or powder form, and can be injected,
The use of depressants diminishes alert- smoked, snorted, or taken orally. In addition,
ness and impairs judgment, making the opera- capsules may be used to conceal heroin in pow-
tion of machinery difficult. Manipulative skills der form to produce a legitimate appearance.
and coordination are also affected. This type Heroin is generally packaged much like cocaine
of impairment can lead to accidents and poor in tin foil, paper, balloons, baggies, and vials.
quality control, as well as diminished work Heroin is usually white, brown, or black (“black
performance. tar”), or in shades of these colors. Synthetic and
Depressants are frequently referred to as semisynthetic tablets and capsules appear in
dry alcohol, and alcoholics routinely substitute various colors, shapes, and sizes.
these drugs for alcohol during the workday in The narcotics are not popular drugs of abuse
order to avoid detection from alcohol’s odor. in the workplace, because their use suggests
a long history of abuse, which contributes to
unemployment and criminal careers. The time
Narcotics: Heroin, Dilaudid, Percodan required to prepare an injection is another factor
discouraging heroin use on the job. However, the
1. Scars (tracks) on the arms or on the backs of
administration of heroin via snorting is becom-
the hands, caused by repeated injections
ing more popular. If this trend continues, then
2. Pupils constricted and fixed
heroin may become as popular as cocaine. Aside
3. Scratches oneself frequently
from the issue of use, narcotics are quite often
4. Loss of appetite
encountered for sale and distribution on the job.
5. May have sniffles, red watering eyes, and a
cough that disappears when the user gets a
“fix” (injection) Hallucinogens: LSD, PCP, DMT
6. User often leaves paraphernalia such as 1. Behavior and mood vary widely. The user
syringes, bent spoons, cotton balls, needles, may sit or recline quietly in a trancelike state
metal bottle caps, eye droppers, and glassine or may appear fearful or even terrified.
bags in lockers or desk drawers. They may 2. Rapid eye movement, drooling, flushed and
also be discarded in stairwells, remote areas sweaty appearance, trembling hands, and
of a parking lot, or a secluded location dizziness.
within the workplace. 3. There may be changes in sense of light,
7. Users, when under the influence, may hearing, touch, smell, and time.
appear lethargic, drowsy, and may go on the
“nod” (i.e., an alternating cycle of dosing Hallucinogens are rarely utilized by employ-
and awakening). ees on the job because of their long duration
of effects (2–12 hours) and their unpredict-
Natural narcotics (opium, morphine, codeine) able nature. Also, impairment is total, there-
are a product of the opium poppy, which is fore obviating any degree of productivity.
cultivated for the purpose of extracting these Hallucinogenic drugs are especially popular
powerful drugs for medical use. Major grow- with 18- to 25-year-olds, and are frequently
ing areas include Southeast Asia, Southwest available at the workplace for distribution in
Asia, the Middle East, South America, and their various forms. The most popular halluci-
Mexico. In addition, semisynthetics like heroin nogens include LSD and PCP.

VII. DEVIANCE CRIME AND VIOLENCE


282 23. SUBSTANCE ABUSE

Hallucinogens, often called “psychedelics,” 5. Presence of plastic or paper bags or rags


are a group of drugs that alter perception and containing saturated quantities of the
awareness. Their effects are generally unpre- inhalant
dictable and in some cases, bizarre. The nature 6. Slurred speech
and intensity of the drug experience are deter-
Inhalants represent a diverse group of psy-
mined by the potency and amount taken, the
choactive chemicals composed of organic sol-
user’s personality, mood expectation, and the
vents and volatile substances. These chemicals
social and environmental setting.
like glues, paint products, gasoline, and white
The LSD experience is labeled a “trip” that is
erasing fluid, can be readily found in the home
characterized as “good” or “bad.” The nature of
and workplace. Their easy accessibility, low
the trip can only be determined after ingestion,
cost, and ease of concealment make inhalants,
and can last as long as 10–12 hours. The “good
for many, one of the first substances abused.
trip” is characterized by a passive trancelike
Inhalants are usually sniffed directly from
state with pleasant hallucinations, perhaps a
an open container or from a rag soaked in the
kaleidoscope of colors and altered sensations.
substance and held to the face. This is usually
Senses sometimes cross so that the user sees
referred to as “huffing.” Some users have been
sounds and hears colors. These characteris-
known to place open containers or soaked rags
tics result in the hallucinations being touted as
inside a bag, where the vapors can concentrate,
mind-expanding drugs. The “bad trip” is char-
before being inhaled. These substances are rap-
acterized by unpleasant experiences including
idly transported to the brain, and can result in
terrifying hallucinations, panic, and irrational
unconsciousness or death.
acts, which have resulted in injury and death.
These substances are not widely abused in the
LSD is sold on the street in tablet and blotter
workplace. However, incidents of workplace inhal-
form. As tablets, they are commonly referred to as
ant abuse have been reported. Many of the chemi-
“microdot acid,” and are sold in variety of colors,
cals used by some businesses can and are diverted
shapes, and sizes. When liquid LSD is dabbed on
for the purpose of inhalation. In some cases, the
blotter paper, it is called “blotter acid.” Because
diversion and subsequent use have resulted in
of LSD’s negative reputation as an unpredictable
death on company property (Figure 23-1).
and bizarre drug, it is commonly sold to unsus-
For further information on drugs of abuse, a
pecting buyers as THC or Mescaline.
comprehensive description and photographic
Mescaline (Mesc), PCP, Psilocybin (mush-
collection of drugs and paraphernalia can be
rooms), and DMT (Dimethyltryptamine) are
found in “Drugs of Abuse,” published by the
other commonly used hallucinogens.
U.S. Department of Justice, Drug Enforcement
Administration (2005 Edition).

INHALANTS: GLUE, GASOLINE, PROTECTING PEOPLE AND


ERASING FLUID ASSETS

1. Odor of substance inhaled on breath and The role of any protection officer is that of
clothes protecting people and assets. The protection offi-
2. Excessive nasal secretions and watering of cer accomplishes this responsibility by observing
the eyes and reporting incidents or situations which pre-
3. Poor muscular control sent a threat to the people and assets he or she
4. Drowsiness or unconsciousness has a duty to protect. Substance abuse is one such

VII. DEVIANCE CRIME AND VIOLENCE


Duration of Effects Usual Method of
Drugs Trade or Other Names Medical Use Dependence Potential Tolerance (in hours) Administration Possible Effects of Abuse Effects of Overdose Withdrawal Symptoms
Physical Psychological

Fentanyl Innovar, Sublimaze Analgesic, High High Yes 10 to 72 Injected


anesthetic
N
a Morphine Morphine Analgesic High High Yes 3 to 6 Oral, Smoked,
r Injected
c Codeine Codeine Analgesic, Moderate Moderate Yes 3 to 6 Oral, Injected
o antitussive Watery eyes, runny noses,
Euphoria, drowsiness, Slow and shallow breathing,
t yawning, loss of appetite,
Heroin Diacetylmorphine, None in U.S. High High Yes 3 to 6 Injected, Snorted respiratory depression, clammy skin, convulsions,
i irritability, tremors, panic, chills,
Horse, Smack constricted pupils, nausea coma, possible death
c and sweating, cramps, nausea
s Methadone Dolophine, Methadone, Analgesic, Heroin
Methadose substitute, High High Yes 12 to 24 Oral, Injected
analgesic,
Dilaudid, Darvon, antidiarrheal,
Other Narcotics Demerol, Percodan antitussive High High Yes 3 to 6 Oral, Injected

Chloral Hydrate Noctec, Sommos Hypnotic Moderate Moderate Yes 5 to 8 Oral


Amytal, Nembutal, anesthetic, anti-
D Phenobarbital, Seconal convulsant,
e Barbiturates Tuinal sedation, sleep High-Moderate High-Moderate Yes 1 to 16 Oral, Injected
p
r Glutethimide Doriden Sedation, sleep High Moderate Yes 4 to 8 Oral
VII. DEVIANCE CRIME AND VIOLENCE

Shallow respiration, cold and


e Alcohol Ethyl Alcohol, Ethanol Ingredient in some Moderate Moderate Yes 2 to 8 Oral Slurred speech, disorientation, clammy skin, dilated pupils, Anxiety, insomnia, tremors,
s medicines
drunken behavior, stumbling weak and rapid pulse, coma, delirium, convulsions, possible
s Ativan, Halcion, Equanil, possible death death
a Librium, Miltown, Serax,

PROTECTING PEOPLE AND ASSETS


n Tranxene, Valium, Anti-anxiety,
t Benzodiazepines Verstran sedation, sleep Moderate Moderate Yes 4 to 8 Oral, Injected
s
Equanil, Dormate, Anti-anxiety,
Other Depressants Noludar, Placidyl, Falmid sedation, sleep Moderate Moderate Yes 4 to 8 Oral

Coke, Snow, Flake, Injected, Snorted,


S Cocaine Local anesthetic Possible High Yes 1 to 2 Smoked
Crack
t
i Biphetamine, Ice, Narcolepsy, weight Oral, Injected,
Amphetamines Desoxyn, Dexedrine, control Possible High Yes 2 to 4 Smoked Increased alertness, excitation,
m euphoria, dilated pupils, Agitation, Increase in body Apathy, long periods of sleep,
u increased pulse rate and blood temperature, hallucinations, irritability, depression,
l Phenmetrazine Preludin Weight control Possible High Yes 2 to 4 Oral pressure, insomnia, loss of convulsions, possible death disorientation
a Hyperkinesis, appetite
n Methylphenidate Ritalin narcolepsy Possible High Yes 2 to 4 Oral, Injected
t Plegine, Sadorex,
s Other Stimulants Adipex Weight control Possible High Yes 2 to 4 Oral, Injected

H
a LSD Acid, Microdot None None Degree Unknown Yes 8 to 12 Oral
l
l
u Mescaline and Peyote Mescal, Buttons, Mesc None None Degree Unknown Yes 8 to 12 Oral
c Illusions and hallucinations (with Longer and more intense “trip”
Withdrawal symptoms not
i MDA STP, Ecstasy, exception of MDA); poor episodes, psychosis, possible
Amphetamine Variants Yes Variable reported
COM, MDMA None Degree Unknown Degree Unknown Oral, Injected perception of time and distance death
n
o
Oral, Smoked,
g Phencyclidine PCP, Hog, Angel Dust None Degree Unknown High Yes Days Injected
e
n Oral, Injected,
s Other Hallucinogens DMT, DET, Psilocybin None None Degree Unknown Possible Variable Smoked, Snorted

C
a Pot, Frass, Sinsemilla,
n Thai Sticks, Marinol Marijuana - None,
Marijuana, THC Degree Unknown Moderate Yes 2 to 4 Oral, Smoked Euphoria, relaxed inhibitions,
n (Synthetic THC) THC - Antiemetic Fatigue, paranoia, possible Insomnia, nervousness, and
increased appetite, depth and
a psychosis decreased appetite
time perception distorted
b
i
s Hashish and Hashish Oil Hash, Hash Oil Hashish - None Degree Unknown Moderate Yes 2 to 4 Oral, Smoked

S Depo-Testosterone,
t Testosterone Delatestryl Hypogonadism Degree Unknown Degree Unknown Degree Unknown 14 to 28 days Injected
e Virilization, acne, edema,
r Anemia, Breast aggressive behavior, testicular Unknown Possible depression
o Nandrolone Nortestosterone, DECA Cancer Degree Unknown Degree Unknown Degree Unknown 14 to 21 days Injected atrphy, gynecomastia
i
d
s Oxymetholone Adadrol - 50 Anemia Degree Unknown Degree Unknown Degree Unknown 24 Oral

FIGURE 23-1 Controlled substances: Uses and effects. (Source: National Drug Institute.)

283
284 23. SUBSTANCE ABUSE

threat, and the protection officer represents a crit- Finally, every protection officer should com-
ical component in a company’s effort to combat municate his/her knowledge about the causes
this threat and maintain a drug-free workplace. and effects of substance abuse beyond the con-
By understanding the scope and nature of this fines of the workplace. By sharing this vital
problem, along with the specific security-related information about the perils of abuse, the pro-
concerns, the protection officer will be prepared tection officer can influence his/her family and
to recognize and report substance abuse situa- community in a most positive way.
tions that undermine safety and security.

EMERGING TRENDS
As we have seen in this chapter, substance prescription painkillers is safer than abusing
abuse is nothing new in our society. In recent “street” drugs (www.usdoj.gov/dea/
years, however, a new face of this menace emerged concern/prescription_drug_fact_sheet.html.
on the scene, presenting an immediate and future Retrieved on October 5, 2009).
threat to our well-being. It is the face of pre-
The ready accessibility of prescription drugs
scription drug abuse. Even children are abusing
subject to abuse and the misperception that they
prescription drugs.
are safer than street drugs must be addressed
Prescription drug diversion and abuse are
and corrected. The Substance Abuse and Mental
rapidly growing phenomena in our population.
Health Services Administration (SAMHSA),
The U.S. Drug Enforcement Administration’s
in its 2006 National Survey on Drug Use and
“Fact Sheet: Prescription Drug Abuse—a DEA
Health (September 2007), reports that 70% of
Focus,” presents sobering data regarding this
pain relievers, both prescription and OTC drugs,
emerging trend, including:
are obtained from friends or relatives (www
● The number of Americans abusing .usdoj.gov/dea/concern/prescription_drug_
prescription drugs increased from 3.8 million fact_sheet.html. Retrieved on October 5, 2009).
in 2000 to nearly 7 million in 2006, a startling The implications of this growing trend are
increase of 80%, more than the number who of great concern to security professionals. The
are abusing cocaine, heroin, hallucinogens, teenagers of today who are abusing prescription
Ecstasy, and inhalants combined. drugs are the adults of tomorrow who may very
● Prescription pain relievers are new drug well continue that abuse. Entering the work-
users’ drug of choice, vs. marijuana or place, they will bring with them the yoke of drug
cocaine, with hydrocodone being the most abuse and addiction that can lead to numerous
commonly diverted and abused controlled security threats, including employee theft and
pharmaceutical in the United States. workplace injury and violence.
● Opioid painkillers now cause more drug To rise up and effectively defeat this challeng-
overdose deaths than cocaine and heroin ing trend, we must develop and deliver to all
combined. stakeholders in our society a competent training
● Nearly 1 in 10 high school seniors admits to program that will raise their awareness level and
abusing powerful prescription painkillers. enable them to promptly and adequately iden-
A shocking 40% of teens and an almost tify the telltale signs of prescription drug abuse.
equal number of their parents think abusing This training must include the requisite steps

VII. DEVIANCE CRIME AND VIOLENCE


SECURITY QUIZ 285

to be taken to restrict teen access to these drugs to grow and develop into healthy adults who
and encourage them in their lawful, proper, and will contribute to communal safety and security
responsible use, thereby enabling our children rather than threaten and undermine it.

References 2. Which of the following applies to drug


Condon, J., & Smith, N. (2003). Prevalence of drug use: Key dependence?
findings from the 2002/2003 British Crime Survey. London: a. It is fatal
Home Office.
Fischer, R. J., Halibozek, E., & Green, G. (2008). Introduction to
b. It is a family disease
security (8th ed.). Boston, MA: Butterworth Heinemann. c. It is contagious
Gips, M. A. (February 2006). High on the job. Security d. All of the above
Management, 50(2), 50–58. 3. The biggest single roadblock to addressing
Joseph, D. E. (Ed.). (2005). Drugs of abuse. Washington, DC: a person’s substance abuse problem is their
Government Printing Office. U.S. Department of Justice,
Drug Enforcement Administration.
drug of choice.
Larson, S. L., Eyerman, J., Foster, M. S., & Gfroerer, a. True
J. C. (2007). Worker substance use and workplace poli- b. False
cies and programs. Department of Health and Human 4. A company can effectively fight substance
Services: Substance Abuse and Mental Health Services abuse by just starting a drug testing program.
Administration Office of Applied Studies. Rockview,
MD: SAMHSA Office of Applied Studies.
a. True
Protection of Assets Manual Vol. I, Chapter 8, Part II. (2007). b. False
Workplace substance abuse: Prevention and intervention. 5. A person who does not use drugs, but is
Alexandria: ASIS International. preoccupied with a loved one who does, is
25 Years “D.A.R.E. America” Annual Report. (2008). said to be codependent.
Inglewood, CA: D.A.R.E. America U.S. Department of
Health and Human Services (June 2009). Cost offset of
a. True
treatment services, Substance Abuse and Mental Health b. False
Services Administration, Center for Substance Abuse 6. The first step in developing a Drug-Free
Treatment. Rockview, MD: SAMHSA Office of Applied Workplace Program is to:
Studies. a. Provide education
b. Start an employee assistance program
c. Write a policy
d. Start drug testing
7. The most widely used drug testing material
in use today is:
S EC U RI T Y QU IZ a. Blood
1. Drug dependence is a primary disease. b. Saliva
a. True c. Urine
b. False d. Hair

VII. DEVIANCE CRIME AND VIOLENCE


286 23. SUBSTANCE ABUSE

8. Psychoactive drugs affect which of the 10. The protection officer is to take which of the
following: following actions in reference to substance
a. Brain abuse behavior in the workplace:
b. Blood a. Set up an undercover operation
c. Lungs b. Arrest the perpetrators
d. None of above c. Observe and report to your up line
9. Nicotine and marijuana are referred to as d. None of the above
which of the following:
a. Equal in terms of habit forming drugs
b. A harmless recreational drug
c. The most dangerous drug
d. Gateway drugs

VII. DEVIANCE CRIME AND VIOLENCE


C H A P T E R

24
Workplace Violence
Timothy A. Pritchard and Roger Maslen

“Workplace violence is violence or the threat of


CHAPTER OBJECTIVES violence against workers. Violence can occur at
● Define the parameters of workplace the physical workplace or outside the workplace
violence (such as a taxi cab driver) and can range from
● List levels of workplace violence threats and verbal abuse to physical assaults
and homicide, one of the leading causes of job-
● List violent actions in each level of related deaths [in the United States]” (OSHA,
workplace violence http://www.osha.gov/OshDoc/data_General_
● Explain the basic role of a security officer Facts/factsheet-workplace-violence.pdf).
in a workplace violence situation Categorizing the types of incidents can be help-
● List the components of a workplace ful in understanding the scope of workplace vio-
violence prevention plan lence. There are three levels of workplace violence.
These incidents may be subtle, and a situation can
move from one level to another very quickly or
slowly.
Violence is pervasive in our world and
has been part of human society since its earli-
est recorded time. Violence in society, in one Level 1—Least Injurious
form or another, is unfortunate and is simply ● Refusal to cooperate with immediate supervisor
unavoidable. Workplace violence is a special- ● Spreads rumors and gossip to harm others
ized problem, one that security professionals ● Argues with coworkers
must deal with in their day-to-day work lives. ● Belligerent toward customers/clients
Whether it is at a large governmental facility, ● Swears at others
a retail store, or a small, privately owned pro- ● Makes unwanted sexual comments
fessional business, there is no industry, profes- ● Minor violations of company policy
sion, or organization that is immune from the ● Pranks
threat of workplace violence. There are many Level 2—Moderately Injurious
definitions of workplace violence. The U.S. ● Argues increasingly with customers, vendors,
Department of Labor, Occupational Safety coworkers, and management
and Health Administration (OSHA), states, ● Refuses to obey company policy and procedures

287
288 24. WORKPLACE VIOLENCE

● Sabotages equipment and steals property for revenge However it manifests itself, “workplace vio-
● Verbalizes wishes to hurt coworkers and/or lence is a growing concern for employers and
management employees nationwide” (OSHA, 2002). While
● Sends sexual or violent notes to coworkers and/or we intuitively know that workplace violence has
management occurred in organizations for as long as organi-
● Sees self as victimized by management (me against zations have existed, only in recent decades has
them) the U.S. government measured and statistically
Level 3—Highly Injurious reported on the topic. One of the first work-
● Physical attacks and assaults shops held on the topic was on occupational
● Psychological trauma homicide prevention in 1990 in Washington,
● Anger-related accidents DC. This workshop, which was sponsored by
● Rape, arson, murder the National Institute for Occupational Safety
and Health (NIOSH), concluded, in part, that “it
is clear from the available data that workplace
Once you understand the types of work- violence is a public health problem of signifi-
place violence, you must also understand their cant proportion” (Bell & Jenkins, 1992). In that
sources. There are generally four sources of report, which covered the years 1980–1985, it
workplace violence: was reported that homicide was the third larg-
Criminal acts. A perpetrator has no relation- est cause of occupational injury death in the
ship to the business and commits a violent act at workplace. The statistics gathered in this study
a worksite in the course of committing another speak specifically to homicides. Today’s work-
crime. For instance, a homicide or assault occur- place violence analysis has a much better view
ring in the course of a robbery. of the problem.
Customer/client/patient violence. The per- In a 2006 survey conducted by the Bureau of
petrator is not an employee, but has a relation- Labor Statistics, U.S. Department of Labor, for the
ship with the business as a customer, client, or National Institute for Occupational Safety and
patient, and becomes violent while receiving Health, Centers for Disease Control, for the per-
services, or for reasons engendered by the busi- iod from September 2004 to June 2006, shows a
ness relationship. For instance, when a psychiat- broader and more detailed outlook of the perva-
ric patient assaults a physician, or a disgruntled siveness of workplace violence. From that survey,
client or customer threatens a company or one we learn that nearly 5% of the 7.1 million private
of its employees. industry businesses in the United States had a
Worker-on-worker violence. Stems from an workplace violence incident in the 12 months
employment relationship; this includes inci- prior to the survey. The survey found for employ-
dents in which a current or former employee ers with over 1000 employees:
(or independent contractor) harms or threatens
to harm another employee.
Workplace Violence Experience
Violence stemming from a personal relation-
ship. They occur in the workplace, but arise from Have Had an Incident 49.9%
a personal, or intimate, relationship between Criminal 17.2%
the perpetrator and victim. Someone may be
harassed, threatened, or harmed at their work- Customer/Client 28.3%
place by an abusive partner. This may occur in Co-worker 34.1%
instances where the abused partner, the abuser, or Domestic Violence 24.1%
both are employed at the workplace in question.

VII. DEVIANCE CRIME AND VIOLENCE


WORKPLACE VIOLENCE 289
Some practical conclusions can be deduced hierarchy, is the protection of people, property,
from these statistics. First, a workplace violence and information. Of this protection hierarchy,
incident can be perpetrated by either an internal people always come first, and a workplace vio-
or external source, as evidenced by the “crimi- lence incident always affects the people in the
nal” and “coworker” numbers. An “external organization, including friends and family, in
source” typically refers to those individuals who one way or another. The cost of a workplace
are not employed with an organization, whereas violence incident is, at minimum, exorbitant.
“internal source” is most often used to identify In the survey conducted by NIOSH, the effects
an employee of a particular organization. We of a workplace violence incident are reported
have seen a shift in the statistics, whereas in the by the respondents. In this survey, for employ-
past, most workplace violence incidents were ers with over 1000 employees, the effects were
committed by individuals who are external to reported as:
the organization (nonemployees). The most
recent statistics show the threats are from inter-
Effects of Workplace Violence
nal sources. An example of an external source
would be an armed robbery of a convenience No Effect 51.4%
store clerk and an example of a workplace vio- Absenteeism 12.2%
lence incident committed by an internal source
Turn Over 6.3%
would be one employee physically assaulting
another employee while at work. Second, most Fear Levels 29.7%
workplace violence incidents occur in occupa- Productivity 14.2%
tions that are somewhat predictable, such as taxi
Morale 22
driving and retail work. This means that if a
security officer works in any of the known “high
probability of violence occurring” professions, These impacts can have a profound effect on
then he or she knows that there is an inherently the overall business success. Should an orga-
greater probability of an incident occurring than nization ignore this phenomenon within their
in a profession with reduced exposure to work- environment, they could be placing themselves
place violence incidents. Third, when we have in a very precarious position. Workplace vio-
an idea of what workplace violence threats our lence affects many aspects of the business:
workers are likely to encounter, we can imple- Interruption of business. This can happen
ment precautions that reduce the probability of in many forms within all three levels of vio-
incidents occurring. Finally, just because most lence. An employee may be effected by anoth-
workplace violence incidents occur in occupa- er’s actions as stated in Level One, and may
tions that are somewhat predictable, this does be required to take sick leave or seek counsel-
not mean that a workplace violence incident ing, affecting their performance. Customers
cannot occur in any business or organization may develop a negative feeling toward the
at any time. It is imperative that both security organization.
managers and security officers understand Increased legal and medical fees. Should
this and are prepared for such an incident, a traumatic event occur within the workplace,
should one occur. The other key stakeholders in the additional costs incurred by an increase in
addressing workplace violence are the human counseling services would be borne by the com-
resources and legal departments. pany or their insurance carriers. There could
The generally recognized primary objec- also be additional, significant costs for legal
tive of a security program, and the priority services, as the potential for lawsuits would be

VII. DEVIANCE CRIME AND VIOLENCE


290 24. WORKPLACE VIOLENCE

very real. Costs for losses could also be incurred officers will likely be among the first on the
over and above any insurance the organization scene if an incident occurs. Thus, it is essen-
may have. tial that security officers possess the personal
Loss of productivity. Employees placed in demeanor and professional skills necessary to
stressful situations and faced with traumatic respond to and successfully manage a work-
events of varying levels will quite probably place violence incident. Security personnel can
experience a reduction in productivity. For com- provide valuable assistance to law enforcement
panies already doing more with less, as a result officers who respond to a threat or violent inci-
of current financial realities, this could have sig- dent. A good, positive relationship with local
nificant impact on projects and core business. police agencies should expedite police response
Repair or replacement of equipment and to an incident. Each sector of our workforce
facilities. Vandalism, theft, damages caused by requires different skills from the security officer
an event of any level, could incur unnecessary (i.e., a security officer working at an industrial
costs to the corporation. site requires different skills from one working
Therefore, it is incumbent on the organiza- at a mall or hospital). However, the following
tional leadership to do all they can, at all lev- skills and attributes can considerably add to the
els, to prevent a workplace violence incident individual’s ability to have a positive impact on
from occurring. All individuals in the security the workplace violence prevention plan:
department, including all security officers, must ● Sound powers of observation
be an integral part of this prevention process to ● Vigilance of the activities in the workplace
achieve the maximum level of success. ● Ability to identify signs of potential violence
A successful workplace violence preven-
and effectively communicate them
tion program requires participation of several ● Strong skills in dealing with difficult people
departments inside an organization, including ● Ability to respond in a crisis
security, human resources, risk management, ● Verbal communication skills
and trade unions. This list is only an example; ● Clear understanding of the policies,
each organization may include or exclude cer-
procedures, and plans
tain departments as makes sense for their busi-
ness. The key is that the plan requires active Preparation for a likely incident, especially
participation by many. The plan consists of sev- one involving an external threat, is much easier
eral components, including: than preparing for any eventuality involving
an internal incident. Of all the workplace vio-
● A general workplace violence policy which
lence threats, there is little question that internal
is supported by the highest level of the
workplace violence threats cause organizational
organization and clearly supports a zero-
leaders the most significant level of anxiety.
tolerance position
This is due to the uncertainty of when and how
● Identification of organizational risks
a threat can emerge within the organization.
● A prevention plan
Upon investigation of incidents after they
● A response plan to workplace violence
occurred, it became apparent that people who
incidents (including testing of the plan)
perpetrated workplace violence displayed warn-
● An employee communication and awareness
ing signs prior to the incident. The good news is
program, which includes training for all
that only a very small percentage of employees
levels of staff and plan-active participants
who have violent propensities will actually per-
The security department is a key component form a violent crime. Employees who commit-
of the workplace violence plan, and security ted workplace violence often started out at the

VII. DEVIANCE CRIME AND VIOLENCE


WORKPLACE VIOLENCE 291
very first levels of workplace violence, being Even though they may appear normal or
rude to coworkers. There was an escalation that somewhat normal, security officers should
then occurred, culminating in homicide. remember that individuals who commit a work-
It is crucial for security professionals to know place violence incident are not mentally stable.
the warning signs of a person who is a potential The reality is that there is not one distinguish-
workplace violence threat. These are some gen- ing warning sign or clue that indicates mental
eral warning signs and clues: instability. Thus, it is important to “read the big
picture” and not focus on specific actions, draw-
● Has little tolerance of others ing broad-based conclusions from those actions.
● Intimidates others around them, including The list of warning signs above provides a very
through verbal threats large scope for assessing an individual’s poten-
● Gets away with overinflated and unearned tial for workplace violence, some of which would
performance evaluations not necessarily be known by the security staff.
● Has a history of family problems For this reason, cooperation between depart-
● Has a history of alcohol and/or drug abuse ments is imperative. When security, human
● Frequently talks about or is obsessed with resources, and operations can share information,
violence or killings the pieces of a puzzle come together to create
● Is fond of violent films and television shows a picture that leads to an intervention with the
● Has a fascination with weapons employee or the implementation of protective
● Has a history of job losses measures. The security officer’s contribution to
● Is depressed, feels desperate; has mood this is most likely the proper and timely report-
swings ing of incidents that seem out of the “ordinary.”
● Displays feelings of job dissatisfaction It is also essential that every organization
● Frequently complains and appeals—always provide meaningful training on the topic of
seems to be the victim workplace violence to all employees. If employ-
● Has a history of violent episodes or ees are not educated about workplace vio-
criminal acts lence warning signs, then the probability is
● Does not have a communicative personality greater that management will find out about
● Has a chemical imbalance a workplace violence incident as it is occur-
● Known as “crazy,” “wound tightly,” ring or after it occurs. According to the U.S.
“strange,” or “a time bomb” Office of Personnel Management’s Office of
● Has extreme reactions to new policies or Workforce Relations, “[Employee] training is a
procedures critical component of any prevention strategy.
● Has a hard time with persons of authority Training is necessary for employees, supervi-
and may challenge authority sors, and the staff members of each office that
● Is very neat or very sloppy may be involved in responding to an incident
● Has a history of lying or exaggerating of workplace violence” (United States Office
● Is self-centered of Personnel Management, 1998, February).
● Seems aloof, distant, and detached Employee training is one of the best and least
● Lacks little or no social skills expensive measures organizations can take to
● Overreacts to small changes on a regular basis help combat workplace violence. All organiza-
● Tolerates attitudes of violence tions should have a zero-tolerance policy for
● Has a history of continuous stressors in life violence and threats of violence.
● Ties their self-esteem and self-worth to The purpose of this chapter has been to iden-
their job tify what workplace violence is, to identify steps

VII. DEVIANCE CRIME AND VIOLENCE


292 24. WORKPLACE VIOLENCE

EMERGING TRENDS
In recent years, the Internet has had an effect There is also more legislation, both in place
on workplace violence. There is much informa- and being written, to reduce the risk of work-
tion on the Internet about weapons, bomb mak- place violence. In some jurisdictions, Working
ing, and other strategies, and yet, there is also Alone Legislation either prevents employees
a lot of information on workplace violence and from working alone, or ensures that if they are
how to prevent it. Naturally, this has lead to working alone, they must be checked on at regu-
more public awareness of the issue. lar intervals.

that an organization can take to prevent a work- fact, the opposite is true. Every organization
place violence incident from occurring, and to has its inherent risks, and those risks must be
better prepare the security officer to recognize identified and mitigated by the organization’s
a potential threat and take appropriate preven- leadership. The security team should be a sig-
tive action, or properly react to an incident as it nificant part of this planning and mitigation
occurs. There is not one response plan or pro- effort. If an organization fails to plan, then it is
gram that fits the needs of all organizations. In planning to fail.

References
Bell, C. A., & Jenkins, E. L. (1992). Homicide in U.S. work-
S E CURI TY QU I Z
places: A strategy for prevention and research. Morgantown, 1. Workplace violence is broadly defined as the
WV: United States Department of Health and Human use of violence against workers.
Services.
a. True
Duhart, D. T. (2001). Violence in the workplace 1993–99. NCJ
Publication No. 190076. Washington, DC: United States b. False
Department of Justice. 2. Workplace violence can be categorized into
Occupational Safety and Health Administration. (2002). three levels. Fill in the blank for each level, and
Workplace violence fact sheet. United States Department of cross reference with the examples of each level.
Labor.
___________ Injurious (A)______ Argues with
United States Office of Personnel Management. (1998).
Dealing with workplace violence (OWR-09). customers
Sygnatur, E. F., & Toscano, G. A. (2000). Work-related homi- ______ Swears at others
cides: The facts. United States Bureau of Justice Statistics. ___________ Injurious (B)______ Physical
Bureau of Labor Statistics, U.S. Department of Labor, for the attacks
National Institute for Occupational Safety and Health,
______ Pranks
Centers for Disease Control. (2006). Survey of workplace
violence prevention, 2005. http://www.bls.gov/iif/oshwc/ ___________ Injurious (C)______ Verbalizes
osnr0026.txt . desire to hurt coworkers
ASIS International. (2005). Workplace violence prevention and ______ Causes psychological trauma
response guideline. ASIS International.

VII. DEVIANCE CRIME AND VIOLENCE


SECURITY QUIZ 293

3. Workplace violence can occur in almost 7. Although the 2006 survey discussed in this
every workplace: small businesses, large section indicated that 51.4% of respondents
companies, government facilities. reported that workplace violence events had
a. True no effect on their workplace, 29.7% reported
b. False that this effect was observed:
4. An employee who exhibits rude manners a. Absenteeism
toward his or her fellow workers is a definite b. Turnover
workplace violence threat. c. Fear levels
a. True d. Productivity
b. False e. Morale
5. In a 2006 survey conducted by the Bureau of 8. Examples of workplace violence
Labor Statistics, U.S. Department of Labor, for situations are
the National Institute for Occupational Safety a. One worker’s aggression toward his or
and Health, Centers for Disease Control, what her fellow employees in the workplace
percentage of workplace violence events were b. An armed robbery of a taxicab driver
perpetrated by coworkers? c. Criminal activity involving personal
a. 22.7% injury to a worker
b. 34.1% d. All of the above
c. 24.1% 9. According to this chapter, the generally
d. 12.5% recognized primary objective of a security
6. There are many effects of workplace violence program is the protection of:
on an organization. Find the most correct a. Property and the organization’s
group of effects below. employees
a. Interruption to sales, Increased wages, b. People, property, and information
Loss of management, Repair/replacement c. Fire, property, and information
of equipment/facilities d. People, property, and money
b. Interruption to business, Increased 10. According to this chapter, a very small
legal/wages, Loss of machines, Repair/ percentage of employees who have violent
replacement of equipment/facilities propensities will actually perform a violent
c. Interruption to business, Increased legal/ crime.
medical fees, Loss of productivity, Repair/ a. True
replacement of equipment/facilities b. False
d. Complete organizational failure

VII. DEVIANCE CRIME AND VIOLENCE


This page intentionally left blank
C H A P T E R

25
Crisis Intervention
Michael A. Hannigan and
Christopher A. Hertig

The protection officer, by the nature of his/


CHAPTER OBJECTIVES her job function, must deal with individuals
● Discuss causes of disruptive behavior who present the threat of violent behavior. This
● Review stages of management of can stem from factors such as involvement with
disruptive behavior alcohol or drugs, being a victim of a crime, suf-
fering from an accident, illness, an argument
● Explore crisis development behavior with their spouse, or even the loss of a loved
models one. These individuals not only pose a seri-
● Develop protection officer guidelines ous threat to themselves, but most certainly to
● Emphasize the importance of empathic employees, the public, and of course, protection
listening and nonverbal communications personnel.
● Discuss team intervention approach There is a method of behavior management
that can be used to allow more control of the
● Review safety considerations in crisis outcome of a situation that involves a person
management who is behaving in a violent manner. A posi-
tive outcome can be achieved by suggesting
certain proactive behaviors to these individuals
through staff actions. It can also occur by what
INTRODUCTION protection officers say and how the message is
verbally or nonverbally communicated. This
Over 100 years ago, Walter Bagehot, a British technique is behavioral management, or perhaps
journalist wrote, “Violence heads the list of better known as crisis intervention. Crisis inter-
inherent fears that are experienced by man- vention is a relatively safe collection of tech-
kind.” It is safe to say that the risk that violence niques designed to aid in maintaining the best
may be perpetrated against individuals in our possible care and welfare of agitated or out of
modern workplaces has to be a major security/ control individuals while lending maximum
loss control concern. safety to protection personnel.

295
296 25. CRISIS INTERVENTION

CAUSES OF DISRUPTIVE 5. Anger/Frustration


BEHAVIOR These conditions are often exhibited by
individuals who lack the common decency to
The reasons people become violent or dis- behave in a manner that is socially acceptable.
ruptive vary greatly but most frequently fall Often the level of individual maturity will dic-
into at least one of the following categories: tate the extent of objectionable conduct. But in
some cases, the anger and lack of emotional
1. Illness or Injury control can lead to any number of violent reac-
People who are suffering from insulin shock, tions on the part of the subject.
have severe breathing problems, or are in need
of a particular medication can become physi-
cally violent until they receive medical atten- STAGES OF MANAGEMENT OF
tion. Sustaining a head injury, for example, DISRUPTIVE BEHAVIOR
could cause a person to become aggravated. In
all of these situations, the affected individual The management of disruptive or violent
may not have control over their actions or even behavior consists of five states or stages. These
remember what they have done. stages are based upon conditions that a protec-
tion officer must learn to recognize.
2. Emotional Problems or Mental Illness
1. Evaluation
People with these types of problems may
What is going on? Why? Who is involved?
become verbally abusive or physically assaultive.
Is the protection officer, disruptive person, or
They could be suffering from severe depression,
others in immediate danger? Is support needed
psychosis, or schizophrenia. These individuals
from fellow officers or resource personnel such
require prompt professional attention. The psy-
as supervisory staff, social workers, medical
chiatric or medical professional may order new
personnel, or police?
medication or a change in existing medication.
2. Planning
3. Substance/Alcohol Abuse or Medication Now that I know what is going on, what
Reaction do I need to do? How do I do it? Do I have the
Those who abuse alcohol or other substances resources available, such as people or equip-
such as PCP (animal tranquilizers), cocaine, ment? Remember that situations usually start
LSD, heroin, and so on are prime candidates for out one-on-one, but should never be permit-
violence. It is not possible to predict behavior ted to stay that way for long—no longer than
patterns without having some indication of the it takes to get back-up personnel. Once the
kind of substance involved. plan of action has been determined, whether it
be to continue talking, containment, restraint,
4. Stress
removal of the person(s), referral or arrest, com-
Stress is often referred to as the “silent
municate the decision to team members. When
killer.” Everyone suffers from various levels of
planning, seek input from others when possible.
stress from time to time. Stress that more fre-
quently leads to depression, remains a personal 3. Implement
matter. However, individuals who are not able Put the plan into action. At this stage, things
to manage personal stress may be susceptible to may not go as anticipated, but regardless, remain
severe aggravation, which can precede violence calm. A contingency plan can be activated that
directed against others. may be more fitting for the circumstances. In all

VII. DEVIANCE CRIME AND VIOLENCE


CRISIS DEVELOPMENT BEHAVIOR MODULES 297
crisis situations, the officer’s personal safety is 1. Anxiety
of prime importance. Protection officer actions 2. Defensiveness
should be dictated accordingly. Do not attempt 3. Anger/frustration
to resolve a volatile situation alone. Observe 4. Tension reduction
exactly what is happening, position yourself
For each level there is a demand for a spe-
with personal safety in mind, and await support
cific response to provide the maximum chance
staff.
of defusing the crisis (see also Table 25-1).
4. Document
1. Supportive
Effective documentation of a crisis incident is
2. Directive
vital for future reference and guidance. A well-
3. Nonviolent physical crisis intervention
documented report will also serve to provide
4. Therapeutic rapport
litigation protection should legal actions result
from actions or inactions on the part of crisis It is important to relate each behavior level to
respondents. The final report should include a specific response.
the standard who, what, where, when, how, and
Behavior Level
why. Address each of these questions carefully
so that the report can be read and understood 1. Anxiety: A notable state of dismay/torment
by all individuals and organizations involved. 2. Defensive: Beginning stage of loss of
rationality. Unreasonable and challenging
5. Review
3. Anger/frustration: Loss of control,
This is the final stage of the crisis manage-
physically acting out
ment phase, but by no means any less impor-
4. Tension reduction: Regaining of rationality
tant. This is when staff critique the entire crisis
after physically acting out
event. Carefully examine all documentation.
It is imperative to openly discuss exactly what Staff Response
happened. It gives all protection personnel
1. Supportive: Active, friendly, empathic
involved the opportunity to vent feelings and
attempts to alleviate observed behavior
frustrations and gain the needed confidence to
deal with future similar situations. Talk openly
about what happened, why it happened, and TABLE 25-1 Behavior levels and protection officer
if it could have been prevented. Could it have responses
been handled more effectively? If so, how? This Behavior Level Response
is the reconstruction state that must be managed
in a positive manner. It is not a “fault finding Anxiety Supportive—attempt to help the
person by eliminating the cause of
mission” but, rather, a time to reflect positively
the anxiety.
on the actions taken and develop safeguards for
future occurrences. Defensive Directive—setting reasonable and
enforceable limits. Repeat limits if
necessary.

CRISIS DEVELOPMENT Anger/frustration Nonviolent restraint—prevent


movement without causing pain
BEHAVIOR MODULES or injury.

During a crisis development situation, there Tension reduction Therapeutic rapport—communicate,


debrief, and reassure the person.
are four distinct and identifiable behavior levels.

VII. DEVIANCE CRIME AND VIOLENCE


298 25. CRISIS INTERVENTION

2. Directive: Set limits, suggest expected reassuring. Identify the amount of space needed
outcomes to develop a calming effect.
3. Nonviolent crisis intervention: Safe, prudent How to react, and how quickly to react, will
control and restraint techniques depend on the nature of the disturbance and
4. Therapeutic rapport: Communication with whether there is an immediate threat constitut-
individual during reduction ing a safety hazard. If you do not perceive such
a threat, use the time to calm the subject and
to continue your evaluation of the situation. If
PROTECTION OFFICER you have an audience, move them or move the
GUIDELINES situation. Only people who could provide prob-
able support should be allowed to remain in the
Written policy and procedures will vary from area—not spectators.
one organization to another, but there are three It is important to know how and why the
basic guidelines that are applicable for any situation started and always make sure help is
situation. available.
● Remain calm—move a little slower and
speak a little lower. Remember that “calmness
VERBAL AND PHYSICAL
is contagious,” and lead by example.
DISRUPTIVE BEHAVIOR
● Act appropriately—be serious but human.
● Be objective.
When a person is verbally acting out, they
Do not allow the subject to anger the officer(s) may or may not be fully aware of what they are
or to make him or her act inappropriately. saying or doing. They may express anxiety or
Losing one’s composure will most certainly defensiveness, make demands or threats, or use
intensify the situation. Remember that “when abusive language. This is especially true when
you lose your temper; someone else has control over the subject is in insulin shock, having severe
you.” Don’t become complacent and take any- breathing difficulties (lack of oxygen to the brain),
thing for granted. Always be alert. In terms of or has suffered a head injury. These individuals
personal protection, never stand directly in are not usually able to control their actions and
front of the individual; this could make them may suffer memory loss.
feel threatened. Stand just off to the side, at an Subjects who are physically violent and
angle; this is considered a non-threatening posi- require preventive measures can be easily
tion. Use the person’s name, treating him or her detected by the protection officer. Typically,
with respect. Keep a minimum of 3 feet distance they throw objects or use them as weapons,
between officer and subject. This serves two kick, or attempt to grab or strike other individu-
purposes: first, it will preserve the individual’s als. These physically out-of-control people may
personal space; and second, it will provide time even try to barricade themselves in a room or a
to react if the individual begins to physically particular area.
act out. Remember, the amount of personal Protection officers need to be aware of the
space may vary according to the individual indistinct signs of physical acting out (violence).
and the situation. For example, if the person is Certain signs are likely to precede more com-
highly agitated, he or she may need more room bative behavior. Watch for indicators such as
and coming closer may intensify the crisis. By gritting teeth, closing and opening hands, and
contrast, a troubled person may want to have tensing. These are strong indicators of a possi-
other people closer; their presence may feel ble outbreak of physical aggression.

VII. DEVIANCE CRIME AND VIOLENCE


CONTROLLING DISRUPTIVE OR VIOLENT BEHAVIOR 299

EMPATHIC LISTENING NONVERBAL COMMUNICATIONS


Empathic listening is an active process which Nonverbal communication deals with body
enables the interviewer to more fully under- language—a message that is conveyed to some-
stand what a person in crisis is trying to say. one without words. Subtle or obvious body
There are five measures that will enhance the movements or gestures can provide clear indi-
listening and understanding process. cations as to what another person might be
thinking. Only a small percentage—perhaps
1. Never be judgmental. Never come on with 7–10%—of what is said is conveyed by the words
the attitude that the other person “caused that are spoken, whereas at least 85% of inter-
his or her own problem.” Don’t adopt the personal communications are paraverbal or non-
position that the subject’s actions have been verbal. Individuals who are functioning under
carefully thought out with a view to inflict a stressful or emotional state of mind will often
pain or injury to others. This is sometimes communicate even more useful information in a
difficult not to do, but it must be done in paraverbal or nonverbal manner. Practice iden-
order to professionally deal with others. tifying what people are saying without words.
2. Don’t fake attention or ignore. If the Here are some useful points to consider.
officer ignores the individual, this will Proxemics or personal space—Respect the sub-
not only make them upset, but staff will ject’s personal space, which is considered to be 1.5
experience difficulty in learning what is to 3 feet in front of them. Note that upset or violent
really happening. Encourage free-flowing persons may require much more space; sometimes
communications. as much as 12 feet. Avoid crowding or “getting in
3. Carefully listen to what the subject is really their face.” Note also that different age groups and
saying. This presents the opportunity to cultures have varying amounts of personal space.
gain accurate insight into what is actually Kinesics—Body posture and movement are
happening and what may have caused the critical in a crisis situation. Avoid toe-to-toe
crisis to develop. Listen for verbal clues that or eye-to-eye gestures that can be considered
may be used to help defuse the situation. challenging.
Look for repeated and underlying themes in Supportive stance—Approximately one leg
the message. length away, on an angle, and slightly to the side
4. Use silence and listen carefully to clarify the of the individual. This is sometimes referred to
message. This technique serves two useful as a 1.5 or “interview” position. This avoids any
purposes. First, it provides the opportunity feelings of encroachment or invasion of personal
to better understand what the subject space. It provides the person being interviewed
is actually trying to say, and second, it with enough room to escape, as well as the offi-
indicates that the officer is genuinely cer doing the interviewing. It also enhances offi-
concerned. cer safety as the subject must step forward in
5. Reflection or reflective listening can be used order to assault the officer.
to reinforce. When the individual completes
his or her statement, state to them what
message is being received. An example might CONTROLLING DISRUPTIVE OR
be “You are very concerned about this, aren’t VIOLENT BEHAVIOR
you?” or “You’re feeling frightened by this.”
The subject will agree with the reflective There are a number of useful methods that
statement or clarify it in some manner. can be applied to control violent or aggressive

VII. DEVIANCE CRIME AND VIOLENCE


300 25. CRISIS INTERVENTION

behavior, such as verbal communications, use TEAM INTERVENTION


of chemicals, physical force, or a combination of
all three. Team intervention is considered to be the
Verbally—Assume a neutral body stance, let best approach to be used during crisis devel-
the individual talk and listen to what they are opment. Personnel should use the least restric-
saying. Do not argue or threaten. Acknowledge tive method to control aggressive/disruptive
feelings and thoughts. This can be achieved individual(s). The objective, as in almost all vol-
without agreeing or disagreeing. Consider voice atile conditions that require security interven-
tone, volume, and rate when communicating tion, is to defuse the situation in a manner that
verbally (paraverbals). Use the person’s name reduces the risk of guilt, pain, or injury.
and maintain eye contact. It may be necessary
to make the subject aware that his/her actions
are inappropriate, and he/she will be held POSITIVE FACTORS RESULTING
accountable for his/her actions and responsible FROM TEAM APPROACH
for the outcome of the situation.
Chemically—In most crisis situations that The team should consist of no more than five
occur, the protection officer seldom has the use people, all of whom must be capable of dealing
of chemicals as a viable option. The decision to with a crisis situation. More than five members
chemically control an individual can only be tends to lead to confusion and a lack of unit
made by qualified medical or psychiatric per- cohesiveness. When team action seems inevi-
sonnel. Medications that could be used in these table, reserve/resource members should remain
instances are generally depressants, such as out of sight, nearby, and ready. These are some
Valium, Thorazine, or Haldol. There are other of the advantages of the team approach:
medications to choose from and the qualified
1. Team members enjoy more personal safety
medical professional will use what is felt to be
and a feeling of security resulting from the
most effective after evaluating the behavior of
presence of fellow officers or other support
the individual.
staff.
Physically—Physical control techniques are
2. Team members are able to maintain a
used to prevent harm or injury to the individual
professional profile because of the support
or others in the immediate vicinity of the inci-
and reliance that result from team member
dent. Application of physical force should be
interactions.
considered only if no other feasible options are
3. Team members do not feel that the violence
possible. If an individual has to be restrained,
or unruly behavior is directed against them
nonviolent techniques are the logical choice.
personally; rather it is directed at the team as
These techniques are intended for personal
a whole.
safety and self-defense and must be taught by
4. Team members can provide verification
a qualified instructor. The primary focus is to
of actions and inactions. The verification
protect employees and clients from injury.
can support a legal position in the event of
Other—Whether or not to use pepper spray,
complaints or litigation being initiated by
electronic defense units, tasers, and so on is a
affected individual(s).
question to be addressed by local laws, ordi-
nances, and organizational policy. Intensive The manner in which the team gets to the
training is a must before any consideration can scene is vitally important. A mass convergence
be given to the use of these kinds of protective of staff will be perceived as a show of force
equipment. and have an unsettling effect on the disruptive

VII. DEVIANCE CRIME AND VIOLENCE


CONCLUSION 301
individual(s). Try to avoid the attraction of a responsibilities. In the event practice/drills
crowd. Protection officers should carry two- have not been conducted, the leader must
way radios that facilitate effective communica- improvise.
tion with other team members. 4. Begin the communication process. Assess
Resource staff that is involved in deploy- the situation. Take whatever remedial actions
ment to the scene must receive preincident are warranted. Activate contingency plan(s)
training and instruction in all facets of the as required. Keep team members appraised.
intervention process, particularly methods of
communications.
SAFETY CONSIDERATIONS IN
CRISIS INTERVENTION
LEADERSHIP IN THE TEAM
APPROACH The goal in any crisis situation is to neutral-
ize the threat/risk while maintaining the safety
As in any kind of teamwork approach, there and welfare of everyone involved. Mentally
has to be a leader. The team leader can be anyone deranged or violent individuals will often resort
who has special skills, training, or expertise that to throwing objects or try to grab or strike the
will lend strength and unity to the team. When person they envision as a threat. Usually this is
the leader arrives at the scene, he/she must be the person in charge, most often the protection
prepared to “take over.” Here are some additional officer. In these instances, being resourceful is
points to consider when selecting a team leader. important. Protection can be obtained through
the effective and safe use of a pillow, chair back
1. The leader will likely be the first person on cushions, or any object that is readily available.
the scene. Accessibility to the scene is an A blanket or coat can be used to help restrain an
important consideration. individual while distracting their attention.
2. The leader must be confident. Note the location of windows, doors, and fur-
3. The leader must be familiar with personnel niture in the area. Normally you would not want
who occupy the facility or facilities who may to block a door with your body, nor would you
be a target for a crisis. want the disruptive person between you and the
4. The leader must be familiar with the door that may be your only escape route. Stay
physical layout of the facility. away from windows. Try to keep the subject
5. The leader should, ideally, be familiar with away from things that can be used as weapons:
the acting out person or persons. chairs, water pitcher, phone, glass, desk accesso-
ries, or any kind of blunt or sharp object.
When the event occurs and team action is
called for, the team leader must take charge and
ensure that the following measures/steps are
taken as quickly and prudently as possible: CONCLUSION
1. Assess the situation, and then determine Disruptive individuals can have a serious
what action will be taken. adverse effect on organizational operations.
2. Formulate the action plan and put it into If such incidents are perceived as a threat by
play as quickly and effectively as conditions employees, it will reduce productivity, lower
allow. morale, and instill a sense of fear. The presence
3. Apprise the team of what is happening. of a capable, confident protection officer, will-
Each team member must know his/her ing and able to effectively communicate with

VII. DEVIANCE CRIME AND VIOLENCE


302 25. CRISIS INTERVENTION

EMERGING TRENDS
Crisis intervention is becoming increasingly number of angry people in their environment.
important as we deal with an aging population They can blend customer service skills with cri-
and the widespread abuse of prescription medi- sis intervention. Such an approach is certainly
cine. There are also greater expectations for safe, cost-effective. It is also in keeping with an orga-
efficient, and effective management of aggressive nization’s mission and values. If each and every
behavior. Protection staff at health care facilities, employee is thoroughly indoctrinated with cus-
schools, treatment centers, and special events tomer service skills and attitudes, they will have
need to be particularly adept at handling a crisis. gone a long way toward managing crisis.
This requires practice, experience, and hands-on Another trend is a greater recognition of the
instruction. But such instruction can be preceded adverse effects that crisis may have on people.
by and reinforced by distance education. Reading Victims, witnesses, and protection staff are all
and observing video reenactments of crisis man- impacted emotionally by crisis. Post-traumatic
agement situations, as well as taking exams, is part stress disorder is a concern. So too are staff
of distance learning. Distance delivery is playing a depression and burnout due to continual expo-
key role in crisis intervention training. sure to crisis. Critical incident stress debriefing
One means of managing crisis and work- may be appropriate for the aftermath of a crisis.
place violence is to emphasize customer ser- Rotation of personnel away from constant expo-
vice. Organizations that do this can reduce the sure to violent people may be necessary.

employees, will have a stabilizing effect on the Discussing the matter with other team members
workplace. will help. Above all, avoid being discouraged
In a post-crisis intervention situation, the and maintain a positive attitude.
protection officer may experience anger, fear, Remember, when crisis intervention is
or frustration; this is a natural reaction that required, stay calm, be objective, and act appro-
must be controlled. It is not uncommon for priately. Let common sense prevail. Remember
the officer to feel that he/she has been the vic- the plan for success: EVALUATE, IMPLEMENT,
tim. This can result from a real or perceived DOCUMENT, and REVIEW.
lack of management support during and after
the crisis or being exposed to the crisis for a
prolonged period of time. Do everything pos- Resource
sible to resolve the crisis in an expeditious man- For more information, visit the Crisis Prevention Institute
ner. Getting it over as quickly as possible will (CPI) at www.crisisprevention.com. CPI is an inter-
reduce team frustration and apprehension. national training organization that specializes in the safe
The officer must waste no time in committing management of disruptive and assaultive behavior. CPI
has been in existence since 1980 and has trained over 5.5
thoughts to paper. By promptly composing a
million persons. The Institute offers a variety of courses
well-written report, the writer can vividly recall and instructor certifications. These programs are offered
what exactly has happened. Documenting the around the world. The Institute also has various forms
report will provide a vehicle to vent frustration. of instructional materials such as videos and posters.

VII. DEVIANCE CRIME AND VIOLENCE


SECURITY QUIZ 303

S EC U RI T Y QU IZ opening of hands, and tensing, may precede


1. This is often referred to as “the silent killer.” more combative behavior.
a. Insulin shock a. True
b. Diabetes b. False
c. Stress 7. Experts say that 7–15% of the messages we
d. Mental illness convey are nonverbal.
2. “When you lose your ___, someone else has a. True
control over you.” b. False
a. Cool 8. Paraverbal communications—how we
b. Temper deliver our words or verbal intervention—
c. Money includes which of the following?
d. Job a. Tone
3. Some rules for setting limits are to: b. Volume
a. Set reasonable limits c. Rate
b. Set only limits that can be enforced d. All of the above
c. Repeat the limits if necessary 9. Persons who are behaving in a physically
d. All of the above violent manner may be controlled in all of
4. Being complacent during a crisis situation is the following ways except:
good; it allows the individual not to know a. Verbally
what you are thinking. b. Challenged
a. True c. Physically
b. False d. Chemically
5. The best stance during a crisis situation is just 10. When involved in a one-on-one situation,
off to the side at an angle. the first action taken should be:
a. True a. Make a plan of action
b. False b. Do not block the doorway
6. Indistinct signs of possible physical acting c. Communicate with the individual
out, such as gritting teeth, closing and d. Be sure assistance is en route

VII. DEVIANCE CRIME AND VIOLENCE


This page intentionally left blank
C H A P T E R

26
Strikes, Lockouts, and Labor
Relations
David J. DeLong

influence on labor relations: strikes, searches,


CHAPTER OBJECTIVES employee discipline, employee misconduct and
● List three types of strikes dishonesty, arbitrations, and interviews.
● List thirteen security procedures before
or during a strike STRIKES
● Provide advice on what to document
during a strike Strikes are an almost inevitable occurrence
● Define employee misconduct and related for many unionized companies. Indeed, it may
disciplinary techniques be argued that for such companies, strike costs
are an integral part of the labor costs to maintain
the operation.
Work stoppages as a result of labor relation
activities and difficulties will arise primarily in
The protection officer should have a thor-
three instances.
ough knowledge of the security practices and
procedures in existence at his/her place of 1. Wildcat strike or illegal walkout—this type of
employment, and their role in the labor rela- strike is an unauthorized work stoppage that
tions process. Labor relations are a subsection of is in violation of the law and/or a collective
industrial relations in existence at any company, agreement in existence. The most common
particularly those with unionized employees. reason for a wildcat strike is the result of the
Labor relations include employers and employ- union considering some action to be unjust.
ees dealing with matters such as collective bar- 2. Lawful strike—this type of strike takes place
gaining and associated activities. in accordance with applicable laws and the
The role of the protection officer and his/her collective agreement in existence. The lawful
activities can have a major influence on labor strike usually occurs as a result of terms and
relations at any given company. Security’s role conditions of employment. For example,
in the following activities can have a major at the expiration of an existing collective

305
306 26. STRIKES, LOCKOUTS, AND LABOR RELATIONS

agreement, a strike may commence after a at all times. An employee may want access to the
strike vote has been taken. Wages or certain property for a variety of reasons (e.g., employee
aspects of the collective agreement, such as has quit and wants to remove tools). Any visitors
health and safety, may not be satisfactory to who have authorization to access the property
members of the union, resulting in a strike. should be escorted by a protection officer from
3. Lockout—this type of work stoppage takes the property line to their contact on the property,
place in accordance with applicable laws and escorted off the property once business has
and the collective agreement in existence. been conducted.
Lockout refers to management’s refusal to
allow members of the bargaining union onto
3. Chain of Command
company property. The purpose of a lockout
by management is to put economic pressure The protection officer should be fully con-
on members of the union to cause a behavior versant with the chain of command in existence
change that members of the union are not during a strike. Normally, the site security super-
willing to accept. visor or the security chief will be responsible for
all security and fire watch responsibilities.
The protection officer should be familiar
with the company strike plan and manual in
place. The strike plan will highlight and pro- 4. Police Assistance
vide guidelines for the protection officer to fol- The security department should notify the
low. Normally, the strike plan is designed and police of the labor situation ahead of time, should
updated to eliminate problems that occur dur- a strike appear inevitable. Arrangements should
ing a strike and provide guidance for security be made for the police to be present at the picket
and management. line during shift changes to avoid problems.
The protection officer should be aware of the
following security procedures during or prior
to a strike, whether they are covered in a strike 5. Communications
manual or not: The main security gatehouse is normally des-
ignated as the command post because of its rapid
1. Access Control response capabilities. This command post is
occupied 24 hours a day by a protection officer.
Will locks be changed on all gates surround-
ing the property? How will premise access be
handled? Normally, the majority of company 6. Prestrike Vandalism
vehicles are left within the plant main gate. The
fewer the number of company vehicles crossing Employees may attempt to sabotage opera-
the picket line, the better. Nonunion employ- tions just prior to the strike commencing,
ees who travel to work should travel in a fleet especially if they know the company intends
and cross the picket line at the same time. Other to continue production. The protection officer
than those nonunion people working, who else must be especially alert on patrol rounds for
may desire access to the property? any indications of sabotage.

2. Escorts 7. Fire Safety


Any union member desiring access to the pro- The protection officer may have fire
perty should be escorted by a protection officer responsibilities in the absence of a fire crew

VII. DEVIANCE CRIME AND VIOLENCE


STRIKES 307
or maintenance crew during a strike. These protection officer should keep in mind the fol-
responsibilities may include inspecting extin- lowing points when crossing a picket line:
guishers, testing sprinkler systems, and inspect-
ing fire alarms, hoses, and fire equipment. ● Cross the line only if necessary.
● Do not cross on foot.
● Try not to cross the line alone. Two witnesses
8. Building Security to an incident are better than one.
The security department recovers keys from
● Move slowly and steadily in your vehicle,
all but essential persons prior to the strike trying not to stop.
commencing. If there is any reason to believe
● Only stop when directly confronted by
that strikers have keys for exterior doors, then picketers who are in front of your vehicle.
the locks should be changed. It is common for
● Don’t leave the vehicle if stopped.
strikers to make locks nonfunctional by driv-
● Keep vehicle windows up and doors
ing spikes into keyholes or filling the lock with locked.
glue. Plenty of spare locks should be available.
● Be cautious about verbal exchange with
picketers. Be aware of the mood of the
picketers.
9. Security Lighting ● Observe and report any picket line
infractions.
All security lighting should be checked prior
to a strike. All perimeter and yard lighting
should be available. 13. Picket Line Surveillance and
Documentary Coverage
10. Purchasing Surveillance of picket line activity is crucial
during a strike to monitor and gather appropri-
The purchasing department ensures that ate evidence that may be used in supporting
there is an adequate supply of raw materials company discipline imposed on an employee,
available for any work that is to be continued supporting criminal charges, supporting or
during a strike. Constant communications exist defending complaints about unfair labor prac-
between purchasing and security in the event tices, and supporting obtaining an injunction,
that special shipments may need access to the which is a court order requiring a party to do or
property. refrain from doing a particular act. For example,
a company may obtain an injunction to try and
11. Threatening Phone Calls limit the number of pickets on a picket line.
One of the primary functions of the protec-
Frequently, strikers or their sympathizers tion officer during a strike is picket line sur-
will telephone threats to the company or to veillance. This surveillance should continue
officials’ homes. The protection officer should 24 hours a day for all or part of the strike. The
record such phone calls and be prepared to be protection officer should be trained in the use
part of a security investigation. of both still and movie cameras with telescopic
lenses to capture activity. The protection officer
should also have a tape recorder to keep a run-
12. Crossing the Picket Line ning verbal account of picket line activity. If a
The protection officer may be required to tape recorder is not available, then a detailed
cross the picket line for a variety of reasons. The written diary of events should be kept on at

VII. DEVIANCE CRIME AND VIOLENCE


308 26. STRIKES, LOCKOUTS, AND LABOR RELATIONS

least an hour-by-hour basis. The following vital to the protection of company assets, espe-
should be documented: cially during a strike.

● Location of pickets (attach plan showing


pickets by company property lines and
gates) and whether pickets are on company
SEARCHES
property.
There is not much literature available on
● Number of pickets, location (i.e., whether
searches and labor relations for the protec-
spread out or in a group) and description of
tion officer. The protection officer should
their conduct.
only conduct searches under the following
● Time and place that picketing commenced
conditions:
and ended.
● Identity of pickets and union affiliation. 1. If an employee consents, a search can be
License numbers of any vehicles at or near conducted of his/her effects.
the picket line. 2. The employer or his/her representative, who
● Number, size, wording of placards, and is usually the protection officer, can conduct
general description. a search of an employee or his effects if
● Conversations with pickets: Caution should there is an expressed term in the collective
be used. It is quite proper to ask the pickets agreement. Also, a search can be conducted
their names, who sent them, how long the of an employee or his effects if there is an
picket line will last, and its purpose. Relate implied agreement or implied term. An
conversations overheard between pickets or implied term can be derived by the company
between pickets and other persons. Make developing a formal search policy that is
notes of all conversations. practiced regularly, consistently, and in a
● Behavior of picket lines: Provide details of nondiscriminatory manner.
whether pickets are stationary or walking, 3. If no expressed or implied term exists on
whether talking to employees or other employee searches in a collective agreement,
persons. Note any threats, threatening the protection officer should have reasonable
behavior, damage to property, acts of and probable grounds before conducting a
violence, and so on, and make notes. Provide search.
details if any vehicles have been unable to
enter or leave company property. There may be some question as to why
● Photographs: It is recommended that searches are conducted at every shift change at
color photographs be taken with a a plant or facility, but remember, every com-
Polaroid camera. Each should be marked pany has a right to protect its assets. A protec-
on the reverse side with the name of the tion officer conducting searches of employees
photographer and the date and time, with a and their effects on a regular basis can help
brief explanation. a company protect its assets in the following
● Witnesses: Full names, addresses, and manner:
occupations of other people who have
witnessed any illegal activity on the picket 1. May reduce accident rates (alcohol- and
line should be recorded. drug-related).
2. May reduce company material loss through
The role of the protection officer is essential theft and through employees hoarding
prior to and during a strike. His/her role can be materials in their lockers.

VII. DEVIANCE CRIME AND VIOLENCE


TYPES OF DISCIPLINE 309
3. May reduce the use or possession of EMPLOYEE DISCIPLINE
contraband on company property.
4. May increase employee morale because The protection officer should be aware of the
employees will feel that the company is types of discipline available to his employer for
concerned about maintaining a safe and these reasons:
secure physical environment.
5. May develop employee awareness about
● The type and severity of discipline imposed
theft. Regular searches conducted by may depend on how thorough the protection
protection officers deter employees from officer’s investigation is.
taking material off a property. Remember,
● The protection officer may be in a position
the key to a good security is prevention, not to recommend the type of discipline to be
apprehension. imposed.
● Discipline is an effective deterrent in the
asset protection program.

EMPLOYEE MISCONDUCT
AND DISHONESTY TYPES OF DISCIPLINE
There are many types of dishonesty and
employee misconduct at the workplace that 1. Verbal. This type of discipline is given by an
the protection officer should be involved immediate supervisor where normally there
in. The protection officer should be aware is no documentation of the conversation.
of these types of dishonesty and employee 2. Written warning. A formal warning is given
misconduct: by the immediate supervisor and placed in
the employee’s file as a record of discipline.
1. Employee theft 3. Suspension. This type of discipline is
2. Employee fraud—falsification of normally the first step toward discharge.
employment records, falsification of The time off provides the employee an
time cards and employee rebates, or opportunity to think about the infraction(s)
falsification of worker ’s compensation committed and whether the employee wishes
insurance claims to pursue employment with the company.
3. Sabotage 4. Demotion. This type of discipline is used
4. Conflict of interest—kickbacks, selling infrequently. An employee may be removed
information from the job for discipline reasons or because
5. Fighting, assault of physical or emotional difficulties in
6. Alcohol and drug use performing the job.
7. Insubordination 5. Termination or discharge. This type
8. Sleeping on the job of discipline is the most severe. Before
9. Safety violations terminating an employee, a company must
10. Leaving work early consider the following factors:
11. Horseplay
● Age of the employee
All of the above may merit some form of dis- ● Company seniority
cipline. The protection officer should be aware ● Marital status of the employee
of the variety of disciplinary actions available ● Previous work record of the employee
to his/her employer. with the company

VII. DEVIANCE CRIME AND VIOLENCE


310 26. STRIKES, LOCKOUTS, AND LABOR RELATIONS

● Severity of the offense (e.g., extent SUMMARY


of damage to equipment in case of
negligence) The protection officer must be aware of the
● Willingness of the employee to cooperate union in existence at his/her plant or facility
with the company investigators and the influence it may have on the following
● Whether or not the employee shows security functions: strikes, searches, employee
remorse misconduct and dishonesty, employee disci-
● Whether or not the offense was pline, arbitration, and interviews.
premeditated or a spur of the moment act
● Whether the discipline is in accordance with
past practice (i.e., do all employees receive
the same discipline for the same act?)
S E CURI TY QU I Z
1. Labor relations include the employee/
ARBITRATION employer relations dealing with matters
pertaining to which of the following
The protection officer may find himself activities:
involved in an arbitration case as a witness of a. Strike parameters
a breach of company policy where discipline b. Lock out regulations
has been given. The union representing the c. Collective bargaining and associated
penalized employee may feel that the discipline activities
is too severe or unjust, thus taking the case to d. None of the above
arbitration. An arbitrator acts as an impartial 2. The role of the protection officer has an
third party to determine whether the discipline influence on the labor relations climate at
was just. Both the company and the union reach any given company. Which of the following
agreement in choosing an arbitrator. activities does the protection officer influence:
The arbitrator is not bound by formal rules of a. Wildcat strikes
evidence, so the arbitration is less formal than b. Lawful strikes
courtroom proceedings. In an arbitration hearing, c. Lockouts
the onus is on the company to establish the exis- d. All of the above
tence of just cause. In other words, the company 3. Which of the following is a legal move by
has to show good reason why an employee may management to put pressure on the unions:
have received the type and nature of discipline. a. Lockout
Remember: The protection officer could find b. Legal strike
himself going both to court and to arbitration c. Locked gate process
over the same employee offense. d. A and C only
4. A wildcat strike is a legal strike.
Interviews a. True
b. False
The protection officer should keep in mind 5. Work stoppages as a result of labor relations
that a union representative should be provided difficulties will arise when union officials
if a witness or a suspect makes such a request. order production limitations.
The protection officer may face accusations of a. True
harassment or unfair labor practices should a b. False
union representative not be provided.

VII. DEVIANCE CRIME AND VIOLENCE


SECURITY QUIZ 311

6. The protection officer should be aware of the c. An arbitration hearing


types of discipline available to his employer d. All of the above
because: 9. The strike plan is designed and updated to
a. The protection officer may hand out eliminate problems that occur during a strike
discipline and provide guidelines for security and
b. The protection officer will be disciplined if management.
he doesn’t know the types of discipline a. True
c. Discipline is an effective deterrent b. False
d. The protection officer should know what is 10. When stopped at a picket line in your
going on vehicle, you should:
7. Which of the following is not illegal during a a. Cross the picket line on foot
legal strike? b. Roll down the window and demand that
a. Picketing of residences you be let through
b. Obstructing highways c. Remain in the vehicle and proceed with
c. Carrying placards caution
d. Picketing within the premises d. Unlock the windows and doors
8. An incident of theft whereby an employee is
discharged can become an issue in:
a. Civil court
b. Criminal court

VII. DEVIANCE CRIME AND VIOLENCE


This page intentionally left blank
U N I T VIII

RISK AND THREAT


MANAGEMENT

27 Security Risk Management


28 Emergency Planning
29 Terrorism
30 Antiterrorism and VIP Protection
This page intentionally left blank
C H A P T E R

27
Security Risk Management
Kevin E. Peterson

in the financial industry, where risks can result in


CHAPTER OBJECTIVES significant loss of money or missed opportunities
● Explain the basis for all protection to grow financial assets. In recent years, finan-
functions, regardless of environment in cial risk has been highlighted by major losses in
which they are practiced worldwide financial markets and public scan-
● Identify and define two key elements of dals such as the Enron collapse (2001) and the
security risk management Bernie Madoff fraud case (2008). In fact, Madoff’s
scheme has been described as “the biggest finan-
● Explain the risk management cycle/ cial swindle in history” (Frank & Efrati, 2009).
process Concern for managing risk is also critical in
● Reinforce the idea that the practice of risk other fields such as business, science and tech-
management requires both a thorough nology, politics, and insurance. In reality, some
risk assessment and an ongoing program degree of risk is inherent in almost any business
of risk monitoring decision. Should we develop a new product
● Provide the tools to apply security line? Establish a joint venture or partnership
risk management strategies to assess a with a particular company? Manufacture or
situation, develop a menu of feasible distribute our products in a different country
options, and recommend a realistic or region of the world? Expand the business?
solution set to meet defined asset Build a new facility? The answer to any one
protection objectives of these questions can result in tremendous
growth for a company and its revenues—or it
can mean disaster (in business terms).
If we think about these questions from our
THE HISTORICAL BASIS FOR perspective, however, we can see that the
RISK MANAGEMENT answers usually have security risk implications
as well. Because of this, it is extremely impor-
The idea of “risk” and “risk management” is tant that security professionals be included in
not unique to the security field—in fact, it is rel- discussions over important business or organi-
atively new to us. The idea probably originated zational decisions.

315
316 27. SECURITY RISK MANAGEMENT

The same can be said of fields such as sci- mentioned in an article by Diana Thompson, a
entific research and development and the well-respected consultant in organizational risk
application of new technologies. Almost any management based in Australia:
program or project decision in these areas can
have significant implications for the future—- To most businesses, the concept of risk manage-
including security and asset protection issues. ment is confined to financial aspects … but the risk
game is fast changing … [now] covering everything
As an example, consider the selection among from a computer meltdown to a terrorist attack.…
various ballistic missile defense technologies (Thompson, 2003)
for the United States. This is clearly an issue of
technology risk when comparing such diverse Today, risk management is a central concept in
options as ground-based interceptors, space- the fields of security, asset protection, and crime/
based interceptors, the airborne laser and loss prevention. Risk management principles are
seaborne platforms. Besides the obvious fac- used to help us conserve our limited resources
tors of cost, schedule, and performance, each of (in terms of time, effort, manpower, and money),
these approaches also has security implications. apply the right solutions in the right places, and
Think of how to go about developing a secu- keep up with changes in our operational environ-
rity approach to protect the people, equipment, ment. Plus, as shown in the quote above, it keeps
communications, and information associated us attuned to the broad array of threats that we
with each of these options. This will probably face in any type of organization.
show quite different security challenges and
recommendations for each platform.
Finally, the insurance industry is almost
entirely focused on the concept of “risk.” In fact, TWO KEY ELEMENTS:
one of the earliest uses of the term “risk man- ASSESSMENT AND MITIGATION
ager” is attributed to companies that recognized
the increasingly clear relationship between busi- The practice of security risk management
ness practices and insurance costs in the 1950s (SRM) begins with a thorough and well-
(Thompson, 2003). The role of risk management in thought-out risk assessment. Why? Because
the insurance industry is further illustrated by the we cannot begin to answer questions until we
fact that in 1975, the American Society of Insurance know what the questions are—or solve prob-
Management changed its name to the Risk & lems until we know what the problems are.
Insurance Management Society (RIMS) (Hampton, A good assessment process naturally leads
2007). Essentially, the insurance providers are tak- directly into a risk mitigation strategy. These
ing on (or accepting) a portion of their policy two key elements will be discussed further
holders’ risk for a fee (their premiums). As we in this chapter and are mentioned at various
will discuss later, insurance is the most common points throughout this book with respect to spe-
example of “risk transfer,” one of the five avenues cific protection applications.
of addressing security/asset protection risks. Note: The following material is extracted from
“Primer on Security Risk Management” and is used
with permission.
WHAT IS SECURITY RISK Whether in the public or private sector,
MANAGEMENT? and whether dealing with traditional or cyber
security (or both), asset protection practice is
So how do we (protection professionals) increasingly based on the principle of risk man-
fit into the picture of risk management? As agement. The concept is a perfect fit for the field

VIII. RISK AND THREAT MANAGEMENT


THE RISK MANAGEMENT PROCESS 317
of asset protection, since our primary objective is cost-effective countermeasures to protect
to manage risks by balancing the cost of protec- valuable assets
tion measures with their benefit. ● Improves the success rate of an organization’s
security efforts by emphasizing the
communication of risks and recommendations
TAKING A STRATEGIC RISK to the final decision-making authority
MANAGEMENT APPROACH ● Helps security professionals and key
decision makers answer the question, “How
Too often, organization leaders look for the much security is enough?”
“quick fix” to satisfy their security needs. They
(National Infrastructure Protection Center,
buy a popular security system or are convinced
2002)
by a sales representative that a particular prod-
uct or service is the all-encompassing answer
to their protection needs. They are convinced THE RISK MANAGEMENT PROCESS
that their critical assets are then completely safe
without even asking what those assets are or The five components of the risk management
what types of threats they face. This is a partic- process—which lead to a comprehensive asset
ular problem for small and medium-sized busi- protection strategy—are depicted in the accom-
nesses, but it certainly could apply to any size panying diagram (Figure 27-1). The process
enterprise. begins by identifying realistic asset protection
Taking a “strategic approach” means bas- objectives and then conducting a comprehensive
ing the enterprise’s asset protection practice risk assessment (described below). This can
on sound planning, management, and evaluation, be done at the enterprise-wide level and/or at
and taking into consideration both the organi- the specific process or project level. Depending
zation’s mission and the environment in which upon the nature of the business, it may be
it operates. A “strategy” should articulate—to appropriate to do it at multiple levels.
the security professional and executive decision
makers—what is being protected, why it’s being
Risk Management Process
protected and how it’s being protected.
The National Infrastructure Protection
SELECT
Center (NIPC)1 defines risk management as “a TEST Protective
systematic and analytical process by which an IMPLEMENT measures Asset identification
TRAIN
organization identifies, reduces and controls its and valuation
potential risks and losses.” They further state
that risk management:
Risk analysis Threat definition
● Identifies weaknesses in an organization or
system
● Offers a rational and defendable method Vulnerability
assessment
for making decisions about the expenditure
of scarce resources and the selection of FIGURE 27-1 The risk management cycle.

1
With the establishment of the Department of Homeland Security (DHS) within the U.S. government, the responsibilities of
the NIPC were redistributed between the DHS Information Analysis and Infrastructure Protection (IAIP) Directorate and
the FBI’s Cyber Division.

VIII. RISK AND THREAT MANAGEMENT


318 27. SECURITY RISK MANAGEMENT

Assets. The first step in risk assessment approaches. Each approach has inherent pros
is identification and valuation of assets. As and cons.
Gardner asserts, “the first step in establish-
Qualitative analysis is any approach which does
ing [any] effective [asset protection] program not use numbers or numeric values to describe the
involves identifying the businesses’ assets” risk components. Generally, comparative terms such
(Gardner, 1995). Although this is a step that is as “critical,” “high,” “medium,” “low,” and “negligi-
frequently overlooked, no effective security ble” may be used to gauge the asset value and levels
of risk components and risk itself.
program can be implemented without a thor-
ough understanding (on the part of both the Quantitative analysis is any approach which uses
asset owner and the security professional) of numeric measures to describe the value of assets
what is being protected—or should be protected. or the level (severity or probability) of threats, vul-
nerabilities, impact, or loss events. It can vary from
All three types of assets—tangible, intangible,
simple scale ratings (e.g., 1 to 5) to sophisticated sta-
and mixed—should be considered and incor- tistical methods and mathematical formulas.
porated into the risk assessment process. Too
often, asset owners and security professionals Many executive decision makers prefer infor-
focus exclusively on tangible assets or those mation to be summarized in charts and graphs
which appear on the accountant’s balance which can display a great deal of data in a concise
sheet. manner. (One example is shown in Figure 27-2.)
Each component of the risk management pro- This is the strongest argument for using a quanti-
cess must be evaluated (gauged or rated) and tative approach. The other major advantage is the
this can be done either qualitatively or quanti- ability to automatically manipulate the data using
tatively. The value of assets is often expressed computer programs and algorithms. Qualitative
in dollar amounts, but assigning such a number methods, by contrast, are generally simpler and
is not always possible, particularly in the case quicker to use, and often provide results that are
of intangible and mixed assets. just as meaningful as numeric calculations.
This provides a natural lead into the debate Among the factors to consider in determin-
over qualitative versus quantitative assessment ing asset value are immediate response and

FIGURE 27-2 Most prevalent risks by severity level.

VIII. RISK AND THREAT MANAGEMENT


THE RISK MANAGEMENT PROCESS 319
recovery costs, investigation costs and replace- Since September 11, 2001, it is common to focus
ment costs, and indirect costs (which are often heavily (sometimes almost exclusively) on the
overlooked in the overall assessment). Indirect terrorist threat when conducting corporate or
costs may include things such as: organizational risk analyses. However, terror-
ism is only one aspect of one category of threats
✓ temporary leased ✓ recruiting/staffing costs for that should be considered. This tendency is not
facilities permanent workforce
unique. In the mid-1980’s, for example, there
✓ equipment rental/ ✓ increased security costs was an overemphasis on the theft of advanced
purchase (temporary or permanent)
technology. At other times, the security com-
✓ alternative suppliers/ ✓ increased communications munity has focused too heavily on white collar
vendors capabilities crime, cyberattacks, natural disasters, or other
✓ alternative shippers/ ✓ data recovery/IT system calamities.
logistics support (Information Technology) A balanced approach to threat assessment is
✓ temporary ✓ administrative support necessary. Of course, some types of threats will
warehousing facilities be more prevalent at certain times and in certain
✓ special employee ✓ increased travel places. Long-term asset protection strategies,
benefits however, must be based on a realistic, full scope,
✓ counseling/employee ✓ marketing/public relations and balanced threat assessment. According to
assistance efforts security expert and author Ira Winkler, “accurate
✓ loss of market share ✓ emergency/continuity assessment of the level of threat against your
(temporary or plan revamps organization is critical to the success of your …
permanent) security plan.” “Threat is an essential factor in
✓ decreased employee your risk reduction formula, and you must con-
productivity sider it carefully. If you don’t, you’ll simply be
✓ increased insurance flying blind when it comes to prioritizing coun-
premiums termeasures …” (Winkler, 1997, p. 37).
✓ temporary workforce/ In terms of evaluating levels of threat con-
staffing sider the following three primary categories:
Intentional Threats—Evaluation of inten-
In addition, intangible and mixed assets tional threats is based on identification and
must be considered even though they are gen- study of potential adversaries. Assessors should
erally very difficult to value. Executive deci- think “outside the box” when listing potential
sion makers need to be educated with respect adversaries. For example, the most obvious
to intangible and mixed assets. Although it is adversaries in a particular case may be interna-
often difficult or impossible to place a specific tional terrorist organizations, organized crime,
dollar value on intangible assets, they are cer- or aggressive business competitors. Other
tainly subject to loss events and can have a sig- important potential adversaries, however, may
nificant impact on the organization’s vitality be activist groups (such as environmental rights
and mission performance. activists or other special interest groups)—and
Threat. Enterprises—regardless of size, loca- their threats could be easily overlooked. The
tion or mission—face a wide variety of threats identification and assessment of adversaries are
that fall into three categories: intentional, natu- growing challenges today based on the post—
ral, and inadvertent. A comprehensive—and Cold War environment, the global nature of
hence more meaningful—threat assessment our economy, worldwide demographic shifts,
will consider all three categories of threats. and the emergence of a far more asymmetric

VIII. RISK AND THREAT MANAGEMENT


320 27. SECURITY RISK MANAGEMENT

(less conventional and more difficult to define) shutdowns, productivity disruptions, and envi-
nature of modern-day threats. ronmental effects (e.g., smoke, debris, water, or
In most cases, adversaries can be judged chemical runoff, etc.).
according to their capabilities to cause a loss Inadvertent threats are the most difficult to pre-
event (or attack) and their intentions to do so. dict and prepare for. Although, to some degree,
Among the sources of information on adver- the nature of the workforce, operations, or other
sary capabilities and intentions are past history, environmental factors can influence the level of
organization rhetoric, public pronouncements, the inadvertent threat, there is usually little or
other open sources, internal communications no historical data to use for planning purposes.
(newsletters, websites, etc.), law enforcement The best defenses are preparation, education and
reports, automated databases, and threat assess- awareness, and realization that the threat exists.
ment professionals. Vulnerability. The most common view of
Natural Threats—Rather than adversary “vulnerability” is a security weakness or prob-
capabilities and intentions, natural threats are lem. Although this can be the case, we must also
typically evaluated using historical trends and recognize that some vulnerabilities are simply
statistics. Long-term data is generally collected existing conditions or business practices which
on weather and other natural hazards for spe- support mission accomplishment. For example,
cific geographical areas, terrains, and environ- engaging in sales by e-commerce can be viewed
ments. In some cases, data has been assembled as a vulnerability, but it may also be an essen-
on natural hazard effects for particular industry tial way of conducting business for a particular
sectors or facility types. Although this data pro- company. One concise definition of “vulnerabil-
vides extremely useful planning information, ity” is “a weakness or organizational practice
assessors must recognize that the unexpected that may facilitate or allow a threat to be imple-
can, and usually does, occur. Therefore, compre- mented or increase the magnitude of a loss
hensive contingency planning and at least some event” (ASIS International, 2007, p. 8).
degree of all-hazard preparedness are strongly One important difference between a threat
recommended by most professionals. and a vulnerability is that a vulnerability is a
Inadvertent Threats—Perhaps the most characteristic of the organization or facility. As
overlooked or neglected threats are inadver- such, it is generally something over which the
tent threats. These include accidents, errors, organization can exercise at least some degree
and omissions. Security expert and author Ira of control. Threats, by contrast, are usually out-
Winkler put it best when he wrote that “… the side the control of the organization.
biggest threat to U.S. corporations is human Vulnerabilities can be evaluated in different
error” and “People make mistakes, and those ways, but one common approach is to measure
mistakes are the most likely things to hurt you” them in terms of observability and exploitability.
(Winkler, 1997, p. 39).
Another key consideration—which is a sub- ● Observability is the ability of an adversary to
set of the inadvertent threat—is that of periph- see and identify a vulnerability. For example,
eral threats—for example, a threat that is a hole in a chain-link perimeter fence is
targeted at a neighboring facility but that may likely observable by a potential adversary,
have a major impact on the post operation. The whereas an inoperable CCTV (Closed-Circuit
effects of peripheral threats can include utility Television) camera is not.
interruptions, required evacuations, closure of ● Exploitability is the ability of the adversary to
access routes to the facility, unwanted attention take advantage of the vulnerability once they
or traffic at the facility, full or partial operation become aware of it.

VIII. RISK AND THREAT MANAGEMENT


LIKELIHOOD VERSUS CONSEQUENCE SCATTER CHARTING 321
In assessing natural threats, we can still that assessors are most often challenged when
use the concepts of observability and exploit- reporting their risk-analysis results to clients,
ability, although from a slightly different executives, and decision makers.
perspective. The observability factor would There are many effective and time-tested
essentially be reversed and refer to our ability approaches to calculating risk results once the
to observe—or become aware of, track, etc.—- numbers (evaluation levels) have been identified.
the oncoming threat (e.g., storm). This involves Risk analysis results should be presented to
mechanisms for early warning and notification the client or decision maker in a manner which
of the impending threat. By contrast, exploitabil- assists them in understanding the data and mak-
ity would be expressed in terms of the capability ing decisions. This includes placing the identified
of a particular threat to cause damage specific to risks in a priority order or into priority categories
the facility, mission, or organization. to help show, from the assessor’s perspective,
Using this observability/exploitability app- which risks should be addressed first.
roach, AP (Asset Protection) professionals can A final note about risk analysis, as discussed
assess and develop plans to mitigate vulner- in a 2000 Security Management article entitled
abilities both in the long-term (strategic) and “Truth & Consequences,” we need to consider
immediate (tactical) time frames. low-probability/high-consequence risks as
For inadvertent threats, the observability/ well as those that are most likely to occur in our
exploitability approach is again slightly differ- workplace (Garcia, 2000). Many corporate exec-
ent. In this case, we measure our vulnerabilities utives and decision makers only want to hear
via two questions: about the risks that represent the highest prob-
ability of occurrence—that’s where they want to
● Are we aware of the vulnerabilities?
expend their resources. We must also, however,
● Are the particular vulnerabilities subject to
give serious consideration to potential losses
relevant inadvertent threats?
that, although they are not highly likely to occur,
Again, both the inadvertent threats and associ- will result in very significant consequences
ated vulnerabilities are generally the most difficult (mission impact) if they do occur. Examples of
for any organization to identify and measure. This such risks are terrorist attacks and catastrophic
should not, however, be used as an excuse for workplace violence incidents. Again, the objec-
neglecting this aspect of the overall risk posture. tive of a comprehensive asset protection strat-
Risk Analysis. In this step, the assessor puts egy is a rational balance between the focus on
all of the information on assets, threats, and high-probability-of-occurrence risks and low-
vulnerabilities together, and then considers the probability/high-consequence risks.
potential impact or consequences of a loss event.
In all risk analyses, but particularly in quantita-
tive ones, it is advisable to determine the evalua- LIKELIHOOD VERSUS
tion levels (for threat, vulnerability, and impact) CONSEQUENCE SCATTER
by committee. In other words, assessments CHARTING
should be performed by a multidisciplinary
team of subject matter experts2 in order to reach Another method for considering organiza-
credible and justifiable numbers as input to tional risk is the use of a “Likelihood versus
the analysis. Justifying the numbers is the area Consequence” matrix, sometimes referred to as
2
Team members and the required expertise must be tailored to individual assessment. Examples of team member expertise
may include Physical Security, IT Security, Information Protection, Personnel Security, Technical Security, Operations, Audit,
and Safety.

VIII. RISK AND THREAT MANAGEMENT


322 27. SECURITY RISK MANAGEMENT

a “scatter chart.” Conceptually, any organiza- level, etc.) can easily move some risks from one
tion must consider the question of likelihood ver- quadrant to another. For this reason, security
sus consequence (impact) for their relevant risk and management officials must periodically
or potential loss events. Figure 27-3 illustrates review the risk posture as well as operational
this issue by way of four quadrants. and administrative changes that may influence
Logically, a risk (potential loss event) located the “likelihood versus consequence” equation.
in Quadrant 1 would require the most urgent The likelihood versus consequence scatter
attention and resource allocation. These risks chart technique may be used in combination
have a high likelihood of occurring and, if with a traditional risk analysis method. This
they do, will have significant consequences or often provides a more comprehensive and accu-
impact on the organization. The consequences rate picture of the risk environment (and con-
may be in the form of increased operating costs, tributing factors) than the use of one method
damage to reputation/public trust, decreased alone.
safety or efficiency, loss of personnel resources, Risk management is a cyclical process—one
loss of, or damage to, facilities/equipment, or that must regularly evaluate changes in assets,
loss of critical information. threats, vulnerabilities, and loss event impact.
The priority of addressing risks will gener- These factors are in constant flux and must be
ally decrease with each successive quadrant. deliberately and carefully monitored to ensure
Many organizations, however, neglect the fact that the asset protection strategy and its compo-
that Quadrant 2 warrants significant atten- nents remain both effective and efficient.
tion. Risks which lie in this quadrant have Following a thorough risk analysis, the
a low-to-moderate likelihood of occurrence, next step is to recommend a suite of solutions
but a high consequence of impact if they do or “mitigation measures” to address the risks
occur. Examples of risks that typically fall into that have been identified and prioritized. By
Quadrant 2 are dramatic workplace violence “suite,” we mean a series of measures that work
incidents and terrorist attacks. together and comprise elements of a deliberate
Risks that fall into Quadrants 3 and 4 should plan—or a “mitigation strategy.”
not be automatically discounted. Various events
(reorganization, expansion, adding new mis-
sions, change in neighbors, change in threat THE FOUNDATION OF A
MITIGATION STRATEGY
HIGH Taking a truly strategic approach helps avoid
major mistakes such as knee-jerk reactions to
2 1
incidents/events, introducing inefficiencies,
CONSEQUENCE OF over-relying on vendors or salespeople for solu-
A LOSS EVENT
tions, and serious resource misallocations. Any
risk mitigation strategy should consider three
4 3 underlying or foundational concepts: the five
avenues to address risk, the “Four D’s,” and lay-
LOW
ered security (defense in depth). The best and
LOW HIGH most effective protection programs are based
LIKELIHOOD OF A LOSS EVENT on strategies that integrate the philosophies
FIGURE 27-3 Likelihood versus consequence consi- embodied in all three of these foundational
derations. concepts.

VIII. RISK AND THREAT MANAGEMENT


THE FIVE AVENUES TO ADDRESS RISK 323

THE FIVE AVENUES TO irrelevant—since the measures required to


ADDRESS RISK completely avoid risk will essentially negate
the enterprise’s ability to perform its mission
The concept of the five avenues to address or accomplish its objectives.
risk is directly related to the comprehensive Risk spreading—this very effective
risk management approach. It contends that practice avoids putting “all your eggs in the
there are five distinct avenues we can follow to same basket.” The best example of this is
address identified risks to assets. Generally, a geographically distributing an organization’s
comprehensive asset protection strategy incor- assets. If a company maintains an inventory
porates a well-thought-out combination of all of high-value merchandise, for example,
or most of these avenues. The five avenues are and stored all of it in a single warehouse,
risk avoidance, risk transfer, risk spreading, risk the potential loss could be 100% of the
reduction, and risk acceptance (Figure 27-4). merchandise if that warehouse experienced
The following diagram illustrates the appli- a major loss event (e.g., theft, flood, fire,
cation of “the five avenues to address risk.” etc.). If, however, this merchandise were
It begins with an initial consideration of risk distributed among three geographically
avoidance then proceeds to three additional separated warehouse facilities, the loss
avenues of addressing risk (transfer, spreading event would result in a potential loss of
and reduction). Ideally, these three avenues are only about one-third of their total inventory.
employed in concert with one another as part of This simplified example provides an
a comprehensive strategy. Finally, Figure 27-5 excellent illustration of the concept of risk
shows that any residual risk must be acknowl- spreading. Another good example of risk
edged and accepted. spreading is the practice of off-site backups
for computer data. By storing a copy of this
Risk avoidance—this is the most direct highly valuable “asset” in another location,
avenue for dealing with risk. It simply a relatively quick recovery from the loss of
involves removing any opportunity for the original data can be effected. Risk spreading
risk to cause a loss event. Many security can increase the cost of an operation, but the
professionals consider risk avoidance generally modest costs are usually offset by
impractical—and therefore, essentially the decrease in risk to critical assets.

Layered security
(Defense in depth)

The Four D’s


Risk avoidance Risk mitigation
Risk transfer DETER
Risk spreading strategy
Risk reduction DENY
Risk acceptance
DETECT

DELAY

FIGURE 27-4 Five avenues to address risk.

VIII. RISK AND THREAT MANAGEMENT


324 27. SECURITY RISK MANAGEMENT

YES
RISK NO
AVOIDANCE RISK

NO

RISK TRANSFER

RISK SPREADING RISK ACCEPTANCE ACCEPTABLE


RISK
RISK REDUCTION

FIGURE 27-5 Five avenues to address risk. (© 2006 Innovative Protection Solutions LLC)

Risk transfer—the typical example of Common risk reduction mechanisms are


risk transfer is the purchase of insurance. security measures, policy enforcement, and
Although not commonly viewed as a part employee education and awareness, as well
of the traditional “security” function, as financial and legal positioning.
insurance is generally a key element of Risk acceptance—after all risk spreading, risk
an organization’s (or individual’s) risk transfer, and risk reduction measures have
management strategy. Another form of risk been implemented, some risk will remain
transfer is the act of making oneself a less since it is virtually impossible to eliminate
attractive target than other potential targets all risk (except as discussed under risk
(such as neighboring facilities). Although avoidance). This risk is termed “residual risk.”
it may not be considered “polite,” this is a One example of risk acceptance is the setting
way of “transferring” a portion of the risk of shrinkage tolerance levels in the retail
to a neighbor. In some cases, a portion of industry. In addition, some organizations
risk can be transferred to suppliers, vendors, established a formal process for risk
or others through contract clauses or other acceptance. For example, the U.S. Department
types of formal agreements. of Defense requires a “Designated Approval
Risk reduction—essentially, risk reduction Authority” to sign a document indicating
involves any security measures or other that they accept the residual risk in IT
actions that would reduce the risk to assets. (Information Technology) systems under
The most common and direct means of their jurisdiction after they have reviewed the
reducing risk, in this sense, are actions that threat and the protective measures in place.
decrease the vulnerability in the risk equation In fact, this recommendation is part of the IT
(whereas risk spreading and risk transfer System Accreditation Process across all U.S.
primarily decrease the impact of a loss event). government agencies.3

3
“Accreditation is a process whereby a Designated Approval Authority (DAA) or other authorizing management official
authorizes an IT system to operate for a specific purpose using a defined set of safeguards at an acceptable level of risk”
(National Institute of Standards and Technology, 2002, p. D-1).

VIII. RISK AND THREAT MANAGEMENT


LAYERED SECURITY (DEFENSE IN DEPTH) 325
Carefully considering the five avenues to
address risk is an excellent exercise and can be DETER
very effective at helping (protection) profession-
als and management to think outside the box in DENY
terms of multiple approaches to protecting assets.
DETECT

“THE FOUR D’S” DELAY

The “Four D’s” is a classic principle in the


crime prevention community and applies FIGURE 27-6 The Four D’s of crime prevention.
equally well to almost any aspect of asset pro-
tection or security risk management. It nicely
complements its “cousin” concepts: the five port management, and content filtering work
avenues to address risk and layered security together to support the concept of the “Four
(defense in depth) (see Figure 27-6). The “Four D’s” in the world of cybersecurity.
D’s” are deter, deny, detect, and delay. Under this
concept, the first objective in protecting assets
is to deter any type of attack or attempt by a LAYERED SECURITY (DEFENSE
potential adversary. IN DEPTH)
The second objective is to deny the potential
adversary access to the target (or asset). This is A closely related concept is that of layered
typically achieved through traditional access con- security, which is also known as defense in depth.
trols and other physical, personnel, or technical Again, this principle applies across the board to
security measures. physical, logical, and converged environments.
The next objective—should deterrence and Defense in depth recognizes that a single pro-
denial fail in whole or part—is to detect the attack tection measure is not adequate, and that a
or situation. This can be done in a variety of ways, series of well-planned and complementary lev-
traditionally using surveillance and intrusion els of security measures comprise an effective
detection systems, human observation, or even a asset protection scheme.
management system that will immediately iden- The ASIS International Glossary of Security
tify or flag shortages or inconsistencies (e.g., an defines “layered security” as:
inventory tracking system which reports out-of- A physical security approach that requires a
tolerance conditions). criminal to penetrate or overcome a series of security
Finally, once an attack or attempt is in prog- layers before reaching the target. The layers might
ress, the intention should be to delay the perpetra- be perimeter barriers; building or area protection
with locks, CCTV, and guards; and point and trap
tors enough to either convince them to give up/ protection using safes, vaults, and sensors. (ASIS
terminate the attempt or to allow an appropriate International, August 2006)
security/law enforcement response to the scene.
Like the other foundational concepts, the In a more comprehensive sense, however, the
“Four D’s” can be applied in a traditional secu- concept can include personnel security, techni-
rity environment or in the logical security sense cal security, policies and procedures, security
with respect to IT systems. Such tools as access education, facility layout, traffic patterns, and
control, authentication, encryption, intrusion even—in the case of shopping centers, for
detection systems, anomaly reporting, firewalls, example—Neighborhood Watch programs.

VIII. RISK AND THREAT MANAGEMENT


326 27. SECURITY RISK MANAGEMENT

In short, asset protection should involve a and organization being protected. There are
comprehensive strategy, not a combination of important factors that affect how protection
piecemeal elements (officers, CCTV, access con- measures will be implemented, how well they
trol systems, etc.). Developing such strategies, will be accepted, and how effective they will
particularly in today’s complex global environ- be. Even within subsets of industry sectors, fine
ment, requires both broad expertise and a very distinctions exist that can significantly impact
thorough thought process based on underlying the effectiveness of protection strategies and
concepts such as those described above. individual protection measures. For example,
there are very significant differences between a
worldwide intermodal cargo shipping firm and
MITIGATION MEASURES an urban subway system, even though both are
components of the transportation industry.
A comprehensive strategy incorporates all
Different industry sectors and subsectors
aspects of protective measures that are appro-
are subject to different risks in terms of the
priate to the environment based on its mission,
type, extent, and nature and may view the risks
nature, physical attributes, and risk assessment
themselves, as well as recommended mitigation
results. As mentioned, these should be viewed
strategies, very differently. In addition, factors
as part of a suite of solutions. Among the fami-
such as the type of people who are employed,
lies of measures to be considered are:
the nature of the work, working hours, type of
● Physical security (barriers, locks, access facility, location, and even management style
control, etc.) may affect the way protection measures work—
● Electronic security systems or even if they will work.
● Security officers In today’s global environment, we also need
● Policy and procedure/business practices to consider how the components of our mitiga-
● Employee training and awareness tion strategy will operate in countries around
● Layout, design, and architecture the world where our organization may have
● CPTED (Crime prevention through facilities, people, joint ventures, or partner firms.
environmental design) Laws, language, culture, treaties, and interna-
● Contracts and clauses tional agreements all impact relevant aspects of
● Legal and financial posturing the threat as well as the applicability of security
● Insurance measures and other risk management tools.
● Personnel security
● Technical security (IT and non-IT)
● Travel security THE ROLE OF THE PROFESSIONAL
● Liaison and relationships PROTECTION OFFICER
● Business continuity and crisis preparedness
According to Karim Vellani, a well-respected
(end of extract from “Primer on Security Risk
professional security consultant and author,
Management”)
“risk is the most significant factor that drives
the deployment and redeployment of security
TAILORING A PROGRAM TO THE forces” (Vellani, 2007, p. 234). This statement
SETTING AND ENVIRONMENT seems simple, but is very profound. It attests
to the extremely significant role of security risk
Any risk-mitigation strategy should be tai- management as well as its direct application
lored to the specific industry setting, location, to professional security services and security

VIII. RISK AND THREAT MANAGEMENT


THE ROLE OF THE PROFESSIONAL PROTECTION OFFICER 327
officers. Risk management principles can and regarding the deployment of security resources—
should be applied at three levels related to including officers and staff. Decisions such as
modern-day professional protection officers. the best mix of proprietary and contract offi-
Each level is briefly described below. cers, appropriate officer functions, patrol pro-
cedures, the contents and format of post orders,
arming, standard procedures, and security sys-
Individual Officer
tems will be better informed. Risk management
Every security officer makes decisions on a can be applied in every aspect of an organiza-
wide variety of levels during their shift. They tion’s asset protection program planning, man-
range from mundane to life-and-death. Some of agement, and evaluation. It can also be used as
these decisions include: the basis for interaction between the client and
security service providers to support planning,
● Whether to report an incident/information,
training, evaluation, reporting, and liaison.
or note it and hold it
Risk management helps avoid imprudent
● How to respond to a call for service
security. An example of this was revealed
● How to deal with an aggressive individual
during a series of security risk assessments
● How to word a report
shortly after the September 11 terrorist attacks.
● How in-depth to investigate a situation
Consultants visited numerous locations of a
● Who to call in a particular nonroutine situation
large news organization with sites nationwide.
that is not specifically outlined in post orders
The sites ranged from large news bureaus in
● Whether or not to grant access to a particular
major cities to small communications/server
individual or to allow entry of a package
sites manned by only a few people.
● Whether or not to draw a weapon
After September 11, the corporate executives
● Whether to use nonlethal force
ordered that every site be staffed with a security
● Whether or not to call for backup
officer—and they immediately (and massively)
● Whether or not to overlook an ethical lapse
expanded the scope of their existing security ser-
In every case, the best decisions are based vices contract. During the assessment, consultants
on a sound risk management process. Whether asked each of these new security officers about
this is a formal, documented process laid out in their role and function in support of the client.
a neat flowchart, or an instantaneous thought Without exception, the officers had no idea why
process that yields a split-second decision, risk they were there or what they were supposed to
management should be at play. do. A number of officers stated, “They just told me
By integrating risk management into each to stand here.” Now that IS imprudent security!
security professional’s mind-set and normal However, it is not that uncommon and is exactly
business practices, it will become completely the type of dangerous and wasteful situation that
natural—a part of the way they think and act. can be prevented by applying sound risk man-
More effective decision making will result in agement principles and having those discussions
both strategic and tactical situations, and asset between the client and the security professionals.
protection—people, property, and information— Another important decision-making process
will be enhanced. which can be formed by effective risk man-
agement thinking, regards the proper mix of
Customer or Client security technology, security forces, and other
solutions. Efficiency and effectiveness of secu-
As implied in Vellani’s statement, risk man- rity services in typical threat environments can
agement should be used to make decisions not only save resources but also save lives.

VIII. RISK AND THREAT MANAGEMENT


328 27. SECURITY RISK MANAGEMENT

Security Services Provider as a key quality control function to help set


(Security Company) baseline performance measures for officer
assessment (Vellani, 2007, p. 247). The practical
Service providers can base their core busi- applications for risk management in the secu-
ness model on risk management principles. This rity field are almost limitless. Be creative. It will
will assist in determining the types of services help distinguish the security company as a for-
to offer, staff composition, market objectives, ward-looking and high-performance provider.
industry sectors to emphasize, and many other In terms of client interaction, use risk man-
corporate functions. It should also be incorpo- agement as a foundation for discussions
rated in business processes such as the quality regarding customer requirements, staffing, and
assurance program and training program (for services. Not only will it result in more effective
corporate staff, officers, and others). For exam- security services for the client but also may lead
ple, Vellani recommends using benchmarking to an expanded role for the security provider.

EMERGING TRENDS
The practice of security risk management is previous work done primarily in Australia and
being increasingly formalized here and around the Great Britain.
world. Examples of this include various protocols Other standards being developed include an
established by the U.S. Department of Homeland All Hazards Risk Management Standard and a
Security (DHS) in the wake of the September first-ever ANSI (American National Standards
11, 2001, terrorist attacks, and additional work Institute) Standard on Organizational Resilience.
performed by the Department of Energy. These Although there is a lot of work going on
protocols have been expanded and adapted to around the world—and being applied to many
specific elements of our critical infrastructure such different environments, all of the guidelines, pro-
as chemical plants and water supplies. tocols and standards are closely aligned with the
On a global scale, international standards basic security risk management model presented
are focusing more and more on security prac- in this chapter. Risk management principles will
tices and taking a risk management approach. become even more important in the future as
One example is ISO 27005 (2008), an interna- the threats we face are increasingly ambiguous,
tional standard for Information Security Risk while at the same time security resources (such
Management. This standard is based largely on as budgets and manpower) continue to be tight.

SUMMARY sophisticated computer models—for risk man-


agement, but all are based on a basic “asset-
Risk management is a critical process that threat-vulnerability-impact” model. The simple
touches every aspect of organizational asset objective is “smart security decisions,” whether
protection as well as the activities of the pro- it is how to structure a huge multi-national cor-
fessional protection officer. There are many poration’s security function or how to word an
specific and formalized models—even some incident report.

VIII. RISK AND THREAT MANAGEMENT


SECURITY QUIZ 329
Every protection professional should become
3. Because vulnerabilities are actually a
intimately familiar with the concepts of security
characteristic of the organization or facility,
risk management—and incorporate them into
they are:
their mind-set and business practices at all levels.
a. The risk factor over which the organization
has the most control
References b. Impossible to accurately assess by an
ASIS International. (August 2006). International Glossary outside consultant
of security terms. http://www.asisonline.org/library/ c. The risk factor that is most expensive to
glossary/index.xml.
correct
ASIS International. (2007). Information asset protection guideline,
ASIS GDL IAP 05 2007. d. The only risk factor that can be influenced
Frank, R., & Efrati, A. (2009). “Evil” Madoff gets 150 years by the organization
in epic fraud. Wall Street Journal, June 30. 4. According to “Primer on Security Risk
Garcia, M. L. (2000, June). Truth & consequences. Security Management,” the primary categories of
Management, 44–48.
threats are (circle all correct answers):
Gardner, R. A. (1995). CPP, “Small business: Reducing the
risk.” www.crimewise.com/. a. Criminal
Hampton, J. J. (2007, October 8). 40 Years of risk management b. Intentional
highlights start with the birth of the profession. Business c. Inadvertent
Insurance, 41(41), 26. d. Terrorist
National Infrastructure Protection Center. (2002, November).
e. Natural
Risk management: An essential guide to protecting critical assets.
Peterson, K. (March 2009). Primer on security risk management, 5. In a scatter chart used for risk analysis, which
a white paper (draft). Washington, DC. quadrant represents a “high-likelihood/
Thompson, D. (2003, June/July). Risk management—a brief high-consequence” risk?
history. Business and financial S, pp. 30–32. a. Quadrant 1
Vellani, K. (2007). Strategic security management. Burlington,
b. Quadrant 2
MA: Butterworth-Heinemann.
Vesper, J. (2006). An incomplete history of risk management. c. Quadrant 3
www.pda.org/bookstore in Risk assessment and risk man- d. Quadrant 4
agement in the pharmaceutical industry: Clear and simple. 6. In order to effectively mitigate risks, a
Winkler, I. (1997). Corporate espionage. Roseville, CA: Prima security professional should:
Publishing.
a. Limit their strategy to using proven
security measures only
b. Assess all possible threats to the
S EC U RI T Y QU IZ organization
c. Apply a protection strategy that employs a
1. The terms “threat” and “risk” can be suite of solutions
used interchangeably; for example, a d. Ensure that management is aware of
“threat assessment” is the same as a “risk existing vulnerabilities
assessment.” 7. Buying insurance is one example of:
a. True a. Risk spreading
b. False b. Risk transfer
2. The concept of “risk management” originated c. Risk avoidance
within the security profession. d. Risk reduction
a. True 8. Which one of the following is not one
b. False of the underlying concepts on which a

VIII. RISK AND THREAT MANAGEMENT


330 27. SECURITY RISK MANAGEMENT

risk mitigation strategy should be 10. Service providers should not base their
based? core business model on risk management
a. The five avenues to address risk principles.
b. The “Four D’s” a. True
c. Layered security b. False
d. Quantitative analysis
9. Risk management is a critical process that
touches every aspect of organizational
asset protection—and the activities of the
professional protection officer.
a. True
b. False

VIII. RISK AND THREAT MANAGEMENT


C H A P T E R

28
Emergency Planning
Ernest G. Vendrell and Scott A. Watson

September 11, 2001, terrorist attacks on New


CHAPTER OBJECTIVES York City and the Pentagon, Hurricane
● Explore the scope of emergency Katrina’s landfall in the Gulf Coast, or the sea-
management in the United States sonal wildfires that sweep through California
● Look at the potential impact that and other western states. While all of the afore-
emergencies can have on people and mentioned events are correctly classified as
organizations emergency situations, in a broader sense an
event does not need to be on such a large scale
● Explain emergency management as a to be classified as an emergency. The fact is that
critical organizational function emergencies happen every day and in all types
● Describe how applying effective of environments. While not all emergency situa-
emergency management principles can tions are of the same scale, they have a number
help to stabilize a serious incident of things in common.
● Emphasize the importance of hazard
identification, vulnerability analysis, and
risk assessment
1. An emergency situation impacts people:
● List the many internal and external Emergency situations increase the risk of
stakeholders that will be involved in death or injury and may result in the need
times of crisis for long-term counseling for those impacted
● Explore how effective communication by the event. Proactive organizations engage
leads to coordination and collaboration in extensive pre-planning to mitigate injury
among emergency responders and loss of life, as well as to effectively
respond to the psychological needs of those
directly touched by the event.
2. An emergency situation disrupts normal
INTRODUCTION operations: Normal organizational activities
are impacted by emergencies. Injured people
The word “emergency” may conjure up can’t perform their normal duties, damaged
images of epic but rare events such as the

331
332 28. EMERGENCY PLANNING

equipment cannot properly function,


and evacuated facilities do not produce People
goods or services. Proactive organizations
build redundancies into their response
and recovery plans. These redundancies
mitigate disruptions and serve to speed an Postmortem
Operations
organization’s recovery. analysis
3. An emergency situation impacts the local Emergency
community: Those in the local community situation
who rely on goods or services produced by
the affected organization, are personally
impacted when the normal operations are
disrupted. Proactive organizations have
Resources Communities
plans in place to mitigate the impact of these
disruptions on communities.
4. An emergency situation stretches
resources: In an emergency, additional FIGURE 28-1 The wide impact that emergencies can
have on people, organizations, and communities.
resources will be needed to handle
immediate response needs, the needs of
those served by the organization, and initial TYPES OF POTENTIAL
preparations for long-term recovery. The EMERGENCIES
need to address all of these issues stretches
resources. Proactive organizations will make Given the importance of planning for and
arrangements to obtain needed equipment, responding to emergency situations, the pro-
supplies, and additional response personnel fessional protection officer must be prepared to
in advance. deal with a multitude of emergency situations.
5. An emergency situation will receive a These situations include, but are not limited to,
postmortem analysis: In this era of instant the following (Figure 28-2):
global communications, the response to an
1. Medical Events and Accidents: Medical
emergency is likely to draw both internal
events and accidents resulting in injury are
and external scrutiny. This scrutiny is often
common emergencies at all organizations.
manifested as a sort of referendum on the
All professional protection officers should
quality of the organization’s leadership
be trained in at least basic first aid and CPR.
(Knight & Pretty, 1996). As a result, the
Depending on the specific requirements of the
quality of the response to an emergency
organization, additional training may include
impacts long-term organizational recovery.
the use of automatic external defibrillators
Proactive organizations engage in a regimen
(AED), or training as a first responder or
of continual planning and exercising of their
emergency medical technician (EMT).
response plans; they also train key
2. Fires and Evacuations: Fire and smoke can
personnel on how to respond to media,
quickly sweep through a building, resulting
governmental, and public inquiries
in injury or death of people and significant
(Figure 28-1).
damage to property. The professional
protection officer must be confident in his or
her ability to facilitate an orderly evacuation

VIII. RISK AND THREAT MANAGEMENT


TYPES OF POTENTIAL EMERGENCIES 333

Natural Hazards of facilities, systems, is helpful in such


situations.
Floods
4. Bomb Threats and Suspicious Packages:
Earthquakes Bomb threats and suspicious packages
Hurricanes occur at many facilities. While most of these
incidents turn out to be harmless, they all
Tornadoes
must be taken with the utmost seriousness.
Wildfires In the aftermath of the September 11, 2001,
Tsunamis/Tidal waves terrorist attacks, a series of highly publicized
Blizzards
incidents took place in which media
representatives and public officials received
Droughts packages containing anthrax (Shane, 2008).
Avalanches In the case of the Unabomber, package
bombs were sent to university researchers
Technological Hazards (FBI, 2008). In other instances, judges and
Fires corporate executives have been targeted
Hazardous materials incidents
(Carlson, Shannon, & Winbush, 1990; Elliot,
1994). Bombs and suspicious packages have
Nuclear accidents even been sent as a result of ongoing domestic
Terrorism disputes. In order to be effective at responding
Weapons of mass destruction to such issues, the professional protection
officer must have detailed knowledge of
Civil unrest
their organization’s response plan, as well
FIGURE 28-2 List of various natural hazards and tech-
as training on how to recognize suspicious
nological hazards. (Haddow, Bullock, & Coppola, 2008) packages and utilize a bomb threat checklist.
5. Civil Disobedience: Civil disobedience
can take place as a result of labor disputes,
of the facility according to the organization’s political unrest, environmental protests,
response plans. In addition, basic familiarity racial tensions, and a host of other
with local fire regulations, as well as any controversial issues. Given the complex and
equipment that is on site and that the interdependent nature of modern society,
officer has been trained to use (such as fire an organization should not be directly
extinguishers and self-contained breathing involved in controversial activities to avoid
apparatus [SCBA]), is critical. becoming a target. Financial firms have
3. Shelter in Place and Lockdown Incidents: been targeted due to investments they made
Hazardous material (HAZMAT) events, such in companies that perform controversial
as a chemical spill, or acts of armed violence, activities. Biotechnology companies, that
may result in the need to shelter or lock do not perform tests on animals, have been
down personnel inside a facility for their targeted by animal rights groups because
own protection. The professional protection of a perception that they engage in such
officer must be familiar with his or her activities. The professional protection officer
organization’s shelter in place procedures, must be familiar with the many types
and lockdown/active shooter protocols. In of threats that may arise out of actual or
addition, familiarity with electronic access perceived controversial activities in which
control systems, and a working knowledge the organization they serve may be involved.

VIII. RISK AND THREAT MANAGEMENT


334 28. EMERGENCY PLANNING

6. Power Outages: All organizations have taking place, they are typically the first person-
power necessities and all organizations nel to arrive on the scene. These first several
eventually experience a power outage. minutes constitute a critically important window
When the power goes out, lights, machinery, of opportunity. Professional, quick, and decisive
and HVAC systems all come to a halt. The action on the part of the protection officer can
professional protection officer must be contain the situation, ensure that people are safe,
prepared to deal with safety issues that and mitigate damage to organizational assets
arise as a result of a power outage. Many by taking required initial steps. Although often
organizations have emergency batteries unnoticed by the public, the actions of profes-
and generator back-ups. The professional sional protection officers save lives and property
protection officer should be familiar with on a regular basis. Here are just a few examples
how these systems operate.
7. Disasters: Disasters, whether natural
or technological, pose a threat to all
organizations. Natural disasters include 1. Active Shooter: On June 10, 2009, an 88-year-
such events such as a tornado, or hurricane, old white supremacist entered the Holocaust
blizzard, wildfire, earthquake, flood, tidal Memorial Museum, in Washington, DC, with a
wave, and a host of other naturally occurring .22-caliber rifle and immediately began firing.
phenomena. Technological disasters include One of the gunman’s rounds killed Security
such events as explosions, collapses, HAZMAT Officer Stephen T. Johns. Johns’s fellow
incidents, and industrial fires. The professional officers engaged and killed the gunman, thus
protection officer should be familiar with the preventing a mass shooting in a crowded
potential impacts of natural and technological museum. Such readiness can only be achieved
disasters and how those disasters may impact by thorough planning and a continual
the organization they serve. commitment to training (Stout, 2009).
8. Terrorist Actions: Terrorist acts can include 2. Natural Disaster: Hurricane Katrina’s high
bombings, armed assaults, kidnapping, winds and storm surge made landfall on
sabotage, hostage-taking, and a host of other August 29, 2005, overwhelming New Orleans
serious incidents. While the probability that an and much of the rest of the Gulf Coast.
act of terrorism will occur at a given site on any Homes and businesses were destroyed by the
given day is low, the impact of such actions can high winds and flooding, and power outages
have serious and long-lasting consequences on became widespread, leaving much of the
people, organizations, and communities. The area in darkness. In this chaotic environment,
professional protection officer should take the order broke down in many places as the
time to become familiar with terrorism and public authorities were stretched thin.
terrorist groups, their tactics, goals, and, most Protection officers from a wide variety of
important, preincident indicators (red flags) of organizations helped people impacted by the
potential terrorist actions. storm and its aftermath, protected property,
and assisted public authorities. The provision
for additional protective personnel is a key
Case Studies element in planning for emergencies. In the
The professional protection officer is in a case of Hurricane Katrina, the supply of
unique position to respond to emergency situ- these additional resources was outpaced by
ations. Since the protection officer is usually the demand (Washington Times, 2005).
stationed at the facility where the emergency is

VIII. RISK AND THREAT MANAGEMENT


SCOPE OF THE PROBLEM 335

3. Civil Disobedience: A financial firm was called for assistance over his radio and
targeted for a large-scale protest by an then proceeded to follow the emergency
environmental group. The environmental procedures outlined in the organization’s
group objected to investments the firm response protocols. The protection officer
made in a company that was engaged in took highly absorbent material from a
construction projects in an ecologically nearby crash cart and began to divert the
pristine area. The financial firm became water away from the computer room. In
aware of the date and time of the planned the interim, the command center officer
protests and quickly deployed additional dispatched additional help to the scene, sent
protective personnel. On the day of the out an emergency notice, set up a conference
protests, members of the environmental bridge for the crisis team, and contacted a
group attempted to enter one of the firm’s preselected vendor to respond to assist with
buildings and handcuff themselves to a the cleanup. As a result of these quick actions,
stationary object located just inside the main the computer room suffered minimal damage
entrance. Protection officers successfully kept and the organization was able to maintain its
the protesters from entering the building. operations without disruption.
Additional preplanning also allowed the
firm’s public relations personnel to have
statements already prepared for the media.
Had the protesters succeeded in handcuffing These and many other types of emergency sit-
themselves inside the building, operations uations can happen to any organization, at any
could have been impacted and the media time. The professional protection officer must
attention to the event would certainly have be prepared to respond to such events in accor-
been greater. dance with his or her organizational protocols,
4. Medical Emergency: Protection officers in training, and, most important, good judgment.
a large high-rise building were called to the
scene of a collapsed individual. Upon arrival,
SCOPE OF THE PROBLEM
the protection officers, who were trained
as emergency medical technicians, checked
Over the years, limited research has been con-
the scene to ensure that it was safe to enter
ducted with respect to emergency preparedness
and then began to assess the situation. The
in the private sector (Tierney, Lindell, & Perry,
patient was found to have stopped breathing
2001). The research that does exist indicates
and had no pulse. Utilizing an automatic
that many private sector organizations have
external defibrillator (AED), the protection
not been proactive in this critical arena (Tierney
officers were able to revive and stabilize the
et al., 2001). This is unfortunate, since not hav-
patient until emergency medical services
ing an effective plan in place can ultimately
personnel arrived on scene and transported
lead to a variety of negative consequences rang-
the patient to a nearby hospital.
ing from adverse publicity to significant operat-
5. Flood: A protection officer on routine patrol
ing losses, as well as loss of life. Viewed from a
at his facility discovered a major water
homeland security perspective, this is troubling,
leakage that was spilling into a hallway
considering that approximately 85% of the criti-
located just outside of a critical computer
cal infrastructure in the U.S. is owned by the
room. The protection officer immediately
private sector (Bennett, 2007; Bullock et al.,
2006; Purpura, 2007). Fortunately, the private

VIII. RISK AND THREAT MANAGEMENT


336 28. EMERGENCY PLANNING

Some key terms and acronyms in emergency management:

Hazard: A sure of danger that may or may not lead to an emergency or disaster

Risk: The probability or frequency of an event occurring

Vulnerability: A weak point

Impact: The consequences an event has on people, property, operations, and communities

Disaster: An event that demands substantial response capability beyond the scope of normal operations

ICS: Incident Command System

NIMS: National Incident Management System

FIGURE 28-3 Key terms and acronyms in emergency management. (Adapted from Haddow et al., 2008)

sector has made additional investments in secu- EMERGENCY PLANNING


rity and emergency preparedness since the CONSIDERATIONS
tragic events of 9/11 (Bullock et al., 2006).
However, relevant research indicates that addi- No one emergency response plan can be
tional public-private sector partnerships, as well applied to every potential crisis situation.
as public police-private security cooperation, However, a comprehensive plan that takes into
are needed (Purpura, 2007). consideration potential, natural, technological,
In contrast, some organizations that have and man-made threats, and involves key person-
come to realize that emergency response plan- nel in the planning process, can help organiza-
ning is vital, have created elaborate policies tions to systematically manage emergencies in
and procedures designed to deal with a variety an effective and efficient manner. Consequently,
of emergency situations. Moreover, these orga- the planning process is a key element that ena-
nizations usually feel confident that they are bles protection officers to explore viable options
prepared to deal with any contingency. Their that can be employed in the event of a critical
emergency response plans detail specific actions incident. In essence, it helps to ensure that an
to take in the event of a catastrophic event and organization is prepared for various emergencies
outline the steps that should be employed dur- and can take steps to reduce losses to both peo-
ing the ensuing recovery effort. However, far too ple and property (Perry & Lindell, 2007). It also
often this is where the planning process ends. serves as internal documentation concerning the
Typically, the planning document is filed away direction and control of the response, as well as
and forgotten until a critical incident occurs the basis for periodic drills and exercises (Tierney
(Joyce & Hurth, 1997; Phelps, 2007; Reid, 1996). et al., 2001). Additionally, the planning process
Furthermore, as Canton (2007) points out, a plan can facilitate effective problem solving and com-
is merely a snapshot of an organization’s inten- munication among various stakeholders, thereby
tion at that particular point in time, and many creating a flexible and adaptable environment for
are out of date as soon as they are published. managing critical incidents (Canton, 2007).

VIII. RISK AND THREAT MANAGEMENT


EMERGENCY PLANNING CONSIDERATIONS 337
Being prepared for emergencies involves four guidelines increases the chance that emergency
important components: planning, reviewing, plans will be more effective and efficient:
training, and testing. These are the cornerstones
of any emergency response plan and it should ● Manage resistance to the planning process
be noted that it is a circular rather than linear ● Adopt an all-hazards approach (consider all
process. Perhaps Nudell and Antokol (1988) potential disasters)
explain this concept best when they describe ● Promote multi-organization response
the above components, when implemented, as ● Rely on accurate assumptions
an umbrella of preparation against the thunder- ● Identify appropriate actions while
storms of a potential crisis. encouraging improvisation
Regardless of the type of crisis, Nudell and ● Link emergency response to disaster
Antokol (1988) point out that there is a series of recovery and hazard mitigation
common requirements that must be taken into ● Train and evaluate
account for an organization to be successful ● Adopt a continuous planning process
when a critical incident occurs. These include:
There are a number of established standards
● Deciding policy for emergency planning. One highly regarded
● Assessing threat standard was developed by the National Fire
● Identifying resources Protection Association (NFPA). NFPA Standard
● Selecting crisis team personnel 1600, “Recommended Practice for Disaster/
● Locating the crisis management center Emergency Management and Business Contin-
● Equipping the crisis center uity Programs” was created with the participa-
● Training crisis team personnel tion of the Federal Emergency Management
● Testing contingency plans and emergency Agency (FEMA), the International Association
procedures of Emergency Managers, and the National
● Dealing with the media Emergency Management Association. It sets cri-
● Dealing with victims and their families teria for both developing and evaluating existing
● Dealing with other affected persons emergency management programs, including
(such as employees) private sector business programs (Lindell &
● Getting the organization’s usual work done Prater, 2007). NFPA 1600 “Standard on Disaster/
during the crisis Emergency Management and Business Continuity
● Returning to normal operations after the Programs”, which is widely recognized by profes-
crisis (both operationally and in human sionals in government and industry, defines 14
terms) criteria for programs (Lindell & Prater, 2007):

Lindell and Prater (2007) contend that an ● Laws and Authorities


established planning process does not neces- ● Resource Management
sarily guarantee that an organization or com- ● Direction, Control, and Coordination
munity will be prepared. Instead, the planning ● Communications and Warning
process should be viewed in terms of mile- ● Operations and Procedures
stones in combination with the environment. ● Finance and Administration
This interaction leads to eight planning guide- ● Exercises, Evaluations, and Corrective
lines that are based on relevant research as Actions
well as observations of local emergency plan- ● Crisis Communications and Public
ning processes. Complying with the following Information

VIII. RISK AND THREAT MANAGEMENT


338 28. EMERGENCY PLANNING

● Hazard Identification, Risk Assessment, resources and 5 indicating strong resources). Next,
and Impact Analysis you would total the score for each potential emer-
● Hazard Mitigation gency, taking into consideration that the lower the
● Mutual Aid score, the better. Although somewhat subjective,
● Planning the comparison will be of significant assistance
● Training in determining planning priorities. The following
● Logistics and Facilities example helps to illustrate the process (Table 28-1)
(FEMA, 2007):

VULNERABILITY ANALYSIS The Incident Command System


Hazard identification, risk assessment, and Molino (2006) identified five common con-
impact analysis are important steps in the plan- cepts relative to the control and management of
ning process, since many of the key decisions emergencies. According to Molino, these con-
made relative to the emergency plan are based cepts (referred to as the Five Cs of Command)
on this information. Many times this procedure form the basis of the Incident Command System
can be accomplished by using a simple numerical (ICS):
rating system (scale of 1 to 5, with 1 as the low- ● Command
est and 5 as highest) to list potential emergencies ● Control
(such as fire, flood, terrorist attack, etc.), estimate ● Communications
the probability of each emergency occurring, ● Coordination
assess the potential human impact (death and ● Cooperation
injury), property impact (losses and damages),
potential business impact (loss of market share), ICS was developed in the early 1970s after a
and, finally, the strength of the internal and exter- series of major wildfires in southern California.
nal resources that may be available (1 being weak The fires affected all levels of government

TABLE 28-1 Vulnerability Analysis Chart

Type of Probability Human Property Business Internal External Total


Emergency Impact Impact Impact Resources Resources

High Low High Impact Low Impact Strong Weak


Resources Resources

5↔1 5↔1 5↔1

Note: The lower the score, the better.


Source: Adapted from FEMA’s Emergency Management Guide for Business and Industry (2007).

VIII. RISK AND THREAT MANAGEMENT


VULNERABILITY ANALYSIS 339
(federal, state, and local), and highlighted vari- Most responders receive orders through their
ous recurring problems that prevented res- existing chain of command.
ponding agencies from working together. In ● Unity of Command: To avoid organizational
particular, determining who was in charge confusion, every individual has a designated
of the overall response effort, duplication of supervisor.
efforts, poor coordination due to no joint plan- ● Effective Span of Control: One supervisor
ning, lack of a common organization, and inef- for every 3–7 subordinates, with 5 being the
fective intra-agency communications, hindered optimum number.
the overall emergency response to the fires. ● Modular Structure: Can expand or shrink
ICS established an on-scene management sys- based on needs.
tem that would help responding agencies work ● Comprehensive Resource Management:
together using a coordinated and systematic Human, material, and equipment resources
approach that can be used for all types of inci- are always checked in, and their status
dents regardless of size (Bullock et al., 2008; maintained at all times.
Canton, 2007; McEntire, 2007): ● Consolidated Action Plans: A single plann-
ing process, leading to one incident action
● Common Terminology: Common plan.
vocabulary is used instead of signal codes.
Functional assignments are standardized The ICS structure is built around five major
and easily understood. management activities or functions (McEntire,
● Integrated Communications: To accommodate 2007) (Figure 28-4):
various agencies, a common communications
plan is used with assigned frequencies. ● Command: The incident commander (IC)
● Unified Command Structure: The command determines strategy and objectives and is
structure expands when there is more than responsible for overall command of the
one responding agency, and all organizations incident. Three positions/functions work
share a common set of incident objectives closely with the IC:
and strategies. ● Information Officer: Works with the
● Unit Integrity: Typically, responding units media and releases information to the
are not broken up before being deployed. public as appropriate.

Incident FIGURE 28-4 Basic incident


command command system organizational
chart. (Adapted from U.S. Department
of Homeland Security, 2008)
Information
Safety Officer
Officer

Liaison Officer

Finance/
Operations Planning Logistics
Administration

VIII. RISK AND THREAT MANAGEMENT


340 28. EMERGENCY PLANNING

● Safety Officer: Monitors operations and 11, 2001, and Hurricane Katrina in 2005, high-
advises the IC on all matters related to lighted the need for a comprehensive national
safety. approach to incident management. The National
● Liaison Officer: Is the IC’s point of Incident Management System (NIMS) provides
contact with representatives of other a systematic, proactive, all-hazards approach
organizations. that guides all levels of government, nongov-
● Operations: Responsible for directing and ernment organizations, and the private sector
coordinating all tactical operations to meet to work together to respond to, and manage,
incident objectives. incidents of all sizes and complexity. NIMS is
● Planning: Responsible for all incident- a template that works well with the National
related data (gathering and analyzing) as Response Framework (NRF), which provides
well as the status of all available resources. the structure for national-level policy for inci-
● Logistics: Responsible for providing the dent management (FEMA, 2005).
necessary support (facilities, services, and Clearly, as we have seen over the years,
materials) to meet all needs for the incident the private sector plays a vital role in incident
or situation. response. For this reason, the private sector
● Finance: Responsible for on-site financial should be incorporated into all facets of NIMS,
and administrative management, including and should prepare for all-hazards incidents
monitoring and documenting all costs that may affect their ability to operate. This is
related to the incident. This is especially particularly important for private sector organi-
important for reimbursement by the federal zations that are part of the critical infrastructure,
government when there is a Presidential or those that have a role in emergency response.
Disaster Declaration. Moreover, those private sector organizations that
play a role in emergency response are encour-
It is important for protection officers to under-
aged to become NIMS-compliant through vari-
stand how ICS works for several reasons. First,
ous training programs offered by FEMA (2005).
it is a relatively simple on-scene management
It should also be noted that ICS is an integral
tool that has proven effective in a variety of set-
part of NIMS. This is another reason why pri-
tings over the years, including the private sec-
vate sector organizations and protection officers
tor. Second, any time there is a serious incident
may wish to have a thorough understanding of
that requires public safety personnel from any
ICS and be able to apply the concepts readily in
level of government to respond, they will likely
the event of a serious incident that will require
be using ICS. Consequently, understanding ICS,
a multi-agency response.
and being able to seamlessly fit into this man-
agement system in an effort to solving problems,
would be advantageous for all of the entities
involved in the incident. Emergency Operations Centers
An Emergency Operations Center (EOC)
The National Incident Management serves as a centralized area for the management
of emergency operations. The EOC is where
System (NIMS)
decisions are made by the emergency manage-
In recent years, the United States has been ment team based on information provided by
impacted by a number of devastating disasters. emergency responders and other personnel
In particular, the terrorist attacks of September (FEMA, 2007).

VIII. RISK AND THREAT MANAGEMENT


VULNERABILITY ANALYSIS 341
The EOC can range from a dedicated, well- families of victims, employees, customers, and
equipped center (comprehensive emergency perhaps various interested outside parties will
communications capability including radio, tele- be seeking to lay blame and recover damages.
phone, fax, Internet access, computer, and tele- Attorneys are bound to examine every news-
vision; self-sustaining power sources; bathroom, paper account and TV report of the incident.
eating, and sleeping facilities for staff, etc.) to an They will, of course, be looking for statements
ad hoc room that is used as circumstances dic- from representatives of the organization for any
tate. Of particular importance is that an orga- admission or confirmation that the organization
nization identifies its requirements ahead of was in some way negligent (Gardner, 1997).
time and establishes the type of arrangement Nuss (1997) defines a crisis as “… an event
that best suits its needs (FEMA, 2007; Nudell & requiring rapid decisions involving the media,
Antokol, 1988). that, if handled incorrectly, could damage
Although the EOC should be near senior man- the organization’s credibility and reputation”
agement, it should not interfere with everyday (p. 1). He further provides a number of effective
operations. In addition, an alternate site should crisis communication steps that organizations
always be selected ahead of time. Hawkes and should consider:
Neal (1998) state that “an effective command cen-
ter ready to respond to any emergency is a criti- ● Have a media plan
cal component of a headquarters security plan” ● Build a relationship with the media before a
(p. 54). They further contend that “a successful crisis strikes
command center is the result of careful planning, ● Train employees in crisis communications
clearly defined structure and job descriptions, ● Maintain a good relationship with the media
and comprehensive training” (p. 54). after [a] crisis

Cooperating with the media provides an


organization with a number of important ben-
Media Relations efits that far outweigh the benefits of denying
Procedures for dealing with the media are them access. In particular, it provides the orga-
another important area that cannot be over- nization with an opportunity to provide its
looked. When a critical incident occurs, the side of the story. This is important since often-
security manager will undoubtedly be pulled times the spokesman for the organization can
in many different directions. Faced with a con- release background information that may pro-
siderable number of important tasks, the secu- vide a different perspective on the situation.
rity manager may not view media relations as Furthermore, working with the media may
a primary concern. However, being prepared prevent reporters from seeking out secondary
ahead of time to deal with the media can help sources that are typically less informed and
an organization to get through the incident more likely to misrepresent the organization.
without the additional damage that can be Consequently, it is far better to have the orga-
caused by misinformation and speculation. In nization give an accurate statement of the situ-
addition, the negative publicity that an organi- ation as opposed to leaving it up to the reporter
zation receives as a result of a critical incident to locate an “informed” source, which can lead
can have far-reaching effects. An organization’s to speculation and misinformation. Saying
image and business can be adversely impacted. “nothing” also has its own risks. Ignoring bad
Litigation is bound to result as victims, the news will not make the incident go away and

VIII. RISK AND THREAT MANAGEMENT


342 28. EMERGENCY PLANNING

usually this tactic raises additional questions in order to provide accurate and timely infor-
(Gardner, 1997). mation while safeguarding the reputation and
FEMA (2007, p. 41) provides a number of interests of the organization.
important considerations for dealing with the
media in an emergency:
DEVELOPING THE EMERGENCY
● Designate a trained spokesperson and an RESPONSE PLAN
alternate spokesperson
● Set up a media briefing area The development of a comprehensive emer-
● Establish security procedures gency management plan requires considerable
● Establish procedures for ensuring that time and effort, and sufficient time should be
information is complete, accurate, and provided for its completion. Representatives
approved for public release from key organizational units must be involved
● Determine an appropriate and useful way of from its inception, and upper management sup-
communicating technical information port is essential throughout the entire process.
● Prepare background information about the Typically, this can be readily accomplished by
facility having the chief executive officer or facility
manager issue a mission statement that intro-
FEMA (2007, p. 41) also provides the follow-
duces the emergency management plan, its
ing guidelines when providing information to
purpose and importance to the organization,
the media during an emergency:
and defines the structure and authority of the
Dos planning team. Additionally, it is important, in
the initial planning stages, to select an individ-
● Give all media access to the information ual within the organization to assume responsi-
● When appropriate, conduct press briefings bility for the plan and act as the planning team
and interviews. Give local and national leader or coordinator.
media equal time Ultimately, capabilities and hazards should be
● Try to observe media deadlines analyzed, specific roles and responsibilities should
● Escort media representative to ensure safety be carefully outlined, and critical company prod-
● Keep records of information released ucts and services should be identified in order to
● Provide press releases when possible ensure a coordinated and effective response when
a critical incident does occur. This will typically
Don’ts involve meeting with outside groups, and estab-
● Do not speculate about the incident lishing mutual aid agreements where appropriate.
● Do not permit unauthorized personnel to According to Canton (2007), resource management
release information under NFPA 1600 is broad in scope, enabling orga-
● Do not cover up facts or mislead the media nizations to establish a baseline and determine
● Do not put blame on the incident where they are deficient. Organizations can then
make plans to meet these shortfalls through pro-
It is quite evident that, although safety issues
curement or establishing mutual aid agreements
are always a top consideration, an organization
with outside groups or agencies.
cannot overlook the importance of having an
Some outside groups or agencies could
effective crisis media relations plan in place and
include (per FEMA, 2007):
training protection officers with respect to their
roles. This is critical, since the plan must be ● Local police department
implemented quickly during a critical incident ● Local fire department

VIII. RISK AND THREAT MANAGEMENT


REVIEWING AND INTEGRATING THE EMERGENCY RESPONSE PLAN 343
● Emergency medical services key personnel since problem areas can be read-
● City or county office of emergency ily identified and discussed. The plan can then
management be modified accordingly and later presented
● Local emergency planning committee to the chief executive officer for final approval.
(LEPC) Upon approval, the plan can be distributed to
● Public works department all affected personnel who should be required
● Electric utilities to sign that they have received the document. It
● Telephone companies is then important that the plan be quickly and
● Volunteer agencies such as the American Red clearly communicated to all affected personnel
Cross, the Salvation Army, and so on (Gigliotti & Jason, 1991).
● Essential contractors It is imperative at this point that the plan be
● Suppliers of emergency equipment fully integrated into the organization’s stan-
● Company insurance carriers dard operating procedures (SOPs). According
● Neighboring businesses to FEMA (Guide for All-Hazard Emergency
● Trade associations Operations Planning, 1996), “… SOPs and
● National Weather Service (NWS) checklists provide the detailed instructions that
an organization or individual needs to fulfill
In crisis situations, organizations respond dif-
responsibilities and perform tasks, assigned
ferently based on variations in tasks and level
in the EOP [emergency operations plan] …”
of preparedness, as well as political consider-
(p. 3-3). Clearly, a comprehensive checklist that
ations. Conferring with outside groups or agen-
includes major planning, implementation,
cies ahead of time will undoubtedly decrease
training/testing, response, and recovery com-
confusion and delays during the response phase
ponents would be an invaluable asset to any
of an emergency, improve communication and
organization’s emergency response plan.
coordination during the management phase of
the incident, and help organizations transition
to the recovery phase much faster. However, Training and Testing
it is important to note that these agreements
After the plan has been finalized, communi-
should clearly define the type of assistance as
cated to all affected personnel, and integrated
well as the procedures for activating the agree-
into the organization’s standard operating pro-
ment in order to avoid unnecessary conflict.
cedures, it must be thoroughly tested. An emer-
gency response plan will not work properly
unless realistic training is provided and it is
REVIEWING AND INTEGRATING thoroughly tested prior to implementation in
THE EMERGENCY RESPONSE PLAN an actual emergency. Testing the plan helps to
identify problem areas, as well as inherent weak-
Once the initial plan is complete, it is essen- nesses, that must be corrected in order to ensure
tial that its various components be reviewed in that the plan will work as designed. Training and
depth by planning team personnel and revised testing thus serve to identify areas in need of
as necessary. The draft plan could then be pre- improvement, thereby enhancing coordination
sented to key management personnel as well as and communication among emergency response
any individuals who may be required to per- personnel.
form or provide support services. Many times, The first step in the training process is to assign
a tabletop exercise provides an excellent oppor- a staff member responsible for developing an
tunity to review potential critical incidents with overall training plan and the requisite goals and

VIII. RISK AND THREAT MANAGEMENT


344 28. EMERGENCY PLANNING

objectives for each component. Additionally, a ● Walk-Through Drill—The emergency


determination must be made as to the following: planning team and response teams
● Who will actually perform the training? actually perform their emergency response
● Who will be trained? functions.
● What types of training activities will be
● Functional Drills—Designed to test specific
employed? functions such as medical response, emergency
● What materials and equipment are needed? notifications, and communications procedures,
● When will the training take place? although not necessarily at the same time.
● Where will the training take place? The drill is then evaluated by the various
● How long will the training last? participants and problem areas identified.
● How will the training be evaluated and by
● Evacuation Drill—Participants walk the
whom? evacuation route to a predesignated area
● How will the training activities be where procedures for accounting for all
documented? personnel are tested. Participants are asked
● How will special circumstances be handled? to make note of potential hazards along the
● How will training costs and expenses be way and the emergency response plan is
budgeted? modified accordingly.
● Full-Scale Exercise—An emergency is
It should be noted that critiques, or evalua- simulated as close to reality as possible.
tions, are an important component of the training Involves management, emergency response
process and must be conducted after each train- personnel, and employees, as well as outside
ing activity. Sufficient time should be allotted for groups and agencies that would also be
the critique and any resulting recommendations involved in the response (p. 22).
should be forwarded to the emergency planning
team for further review and action. Additionally, Practical “hands-on” training always provides
organizations should consider how to involve personnel with excellent opportunities to use
outside groups and agencies in the training and skills that are taught and to learn new techniques
evaluation process. As previously mentioned, and procedures. For emergency response train-
this could certainly help to avoid conflict and ing, simulations such as tabletop exercises, drills,
increase coordination and communication and full-scale exercises are particularly valu-
when a critical incident does occur. Emergency able for practicing decision-making skills, tacti-
response training can take a variety of forms. cal techniques, and communications. Moreover,
FEMA (Emergency Management Guide for simulations serve to determine deficiencies in
Business and Industry, 2007) describes six types planning and procedures that can lead to modi-
of training activities that can be considered: fications to the emergency response plan (ASIS,
1994; FEMA, 2007; Nudell & Antokol, 1988).
● Orientation and Education Sessions—
Sessions designed to provide information,
answer questions, and identify needs and Evaluating the Emergency
concerns. Response Plan
● Tabletop Exercise—This is a cost-efficient
Phelps (2007) advocates that training should
and effective way to have members of
occur every 3 months, and that eight major
the emergency planning team, as well as
areas should be tested. These include:
key management personnel, meet in a
conference room setting to discuss roles and ● Internal communications
responsibilities and identify areas of concern. ● External communications

VIII. RISK AND THREAT MANAGEMENT


REVIEWING AND INTEGRATING THE EMERGENCY RESPONSE PLAN 345
● Resources Regardless of the training schedule selected,
● Systems a formal audit of the entire emergency response
● Safety plan should be conducted at least once a year.
● Coordination Furthermore, in addition to the yearly audit, the
● Record-keeping emergency response plan should be evaluated,
● Legal issues and modified if necessary, as follows (FEMA,
2007):
With respect to communications, this is a
critical area that has posed many problems for ● After each drill or exercise
emergency responders over the years. In par- ● After each critical incident
ticular, during multi-agency responses to criti- ● When there has been a change in personnel
cal incidents, responding personnel have not or responsibilities
been able to communicate and coordinate their ● When the layout or design of a facility
responses because their radio equipment has changes
not been compatible (interoperable). The World ● When there is a change in policies or
Trade Center response on September 11, 2001, procedures
certainly highlighted the extent of this problem,
which had disastrous consequences for emer- Of course, any modifications or changes to
gency responders. Unfortunately, according to an emergency response plan should be com-
Straw (2009), “… nearly eight years after 9-11, municated to affected personnel as soon as
the national goal of ensuring that commanders possible. Similarly, changes to the planning
from different public safety agencies and juris- document should be incorporated and distrib-
dictions have interoperable communications uted in a timely manner.
remains elusive …” (p. 68).

EMERGING TRENDS
Conducting Exercises in Difficult In these challenging economic times, some
Economic Times or with the organizations have taken to developing board
Reluctant Organization games or other simple means of conducting a
table-top exercise. When designing an exercise,
The only way to truly tell if a plan is effec- it is important to keep in mind that adult learn-
tive is to either experience an actual incident or ers are generally focused on how they can read-
to conduct an exercise. While most organizations ily apply the information to their organizations.
understand the need to exercise plans, too few Therefore, interactivity and application should
actually take the time and money necessary to be the touchstones of any such exercise plan. The
accomplish this task. This tendency not to con- use of board games and other low-cost simula-
duct exercises is even more pronounced during tions can help organizations that would nor-
difficult economic periods and with organiza- mally not engage in an exercise to start thinking
tions that haven’t completely adopted resiliency seriously about the risk their organizations face
concepts into their corporate culture. and whether their plans are up to the task.

VIII. RISK AND THREAT MANAGEMENT


346 28. EMERGENCY PLANNING

CONCLUSION Federal Emergency Management Agency. (2007). Emergency


management guide for business and industry. Retrieved
August 18, 2009, from http://www.fema.gov/library/
Since emergency situations take on many viewRecord.do?id1689.
forms and have significant impacts for orga- Federal Emergency Management Agency. (1996). Guide for
nizations, individuals, and communities, it is all-hazard emergency operations planning. Washington, DC:
imperative that professional protection offi- U.S. Government Printing Office.
Gardner, R. (1997). Getting ahead of the headlines. Security
cers and the organizations they serve main-
Management, 41(7), 115–119.
tain a 24/7 (24-hour-a-day, 7-day-a-week) state Gigliotti, R., & Jason, R. (1991). Emergency planning for maxi-
of readiness. Readiness involves a thoughtful mum protection. Boston, MA: Butterworth-Heinemann.
approach and continual planning, training, and Haddow, G. D., Bullock, J. A., & Coppola, D. P. (2008).
testing in all four phases of the emergency plan- Introduction to emergency management (3rd ed.). Burling-
ton, MA: Butterworth-Heinemann.
ning cycle: Mitigation, Response, Recovery, and
Hawkes, K., & Neal, J. (1998). Command performance.
Preparedness. Professional development is also Security Management, 42(11), 77–83.
an important part of this process, and organiza- Joyce, E., & Hurth, L. (1997). Booking your next disaster.
tions and officers should take advantage of vari- Security Management, 41(11), 47–50.
ous professional development activities designed Knight, R. F., & Pretty, D. J. (1996). The impact of catastro-
phes on shareholder value. Oxford, England: The Oxford
to increase knowledge and skills. By making con-
Executive Research Briefings; a Research Report spon-
tinuous, incremental improvements to incident sored by the Sedgwick Group.
response plans and the teams that carry them McEntire, D. A. (2007). Disaster response and recovery. Hobo-
out, the professional protection officer can work ken, NJ: John Wiley & Sons, Inc.
as part of an interdisciplinary team to save lives, Molino, L. N., Sr. (2006). Emergency incident management sys-
tems: Fundamentals and applications. Hoboken, NJ: John
prevent property damage, and maintain order.
Wiley & Sons, Inc.
Nudell, M., & Antokol, N. (1988). The handbook for effective
References emergency management. Lexington, MA: Lexington Books.
Nuss, R. (1997). Effective media crisis communication during a crit-
ASIS International. (2003). Emergency planning handbook ical incident. Winter Springs, FL: Nuss and Associates, Inc.
(2nd ed.). Alexandria, VA: ASIS International. Perry, R. W., & Lindell, M. K. (2007). Emergency planning.
Bennett, B. T. (2007). Understanding, assessing, and responding Hoboken, NJ: John Wiley & Sons, Inc.
to terrorism: Protecting critical infrastructure and personnel. Purpura, P. P. (2007). Terrorism and homeland security.
Hoboken, NJ: John Wiley & Sons, Inc. Burlington, MA: Butterworth-Heinemann.
Bullock, J. A., Haddow, G. D., Coppola, D., Ergin, E., Phelps, E. F. (2007). No lights, no camera, just action.
Westerman, L., & Yeletaysi, S. (2006). Introduction to home- Security Management, 51(11), 55–61.
land security (2nd ed.). Burlington, MA: Butterworth- Shane, S. (2008, August 4). Anthrax evidence called mostly
Heinemann. circumstantial. Retrieved August 18, 2009, from http://
Canton, L. C. (2007). Emergency management: Concepts and www.nytimes.com/2008/08/04/us/04anthrax.html.
strategies for effective programs. Hoboken, NJ: John Wiley & Stout, D. (2009, June 10). Museum gunman a longtime foe of
Sons, Inc. government. Retrieved August 18, 2009, from http://
Carlson, M., Shannon, E., & Winbush, D. (1990, January 1). www.nytimes.com/2009/06/11/us/11shoot.html.
Murder by mail. Retrieved August 18, 2009, from Straw, J. (2009). Communicating to save lives. Security
 h t t p : / / w w w. t i m e . c o m / t i m e / m a g a z i n e / a r t i c l e / Management, 53(5), 63–69.
0,9171,969089,00.html. Tierney, K. J., Lindell, M. J., & Perry, R. W. (2001). Facing the
Elliot, S. (1994, December 12). Bombing in New Jersey: The victim; unexpected: Disaster preparedness and response in the United
executive had vaulted to no. 2 post at agency. Retrieved August States. Washington, DC: Joseph Henry Press.
18, 2009, from http://www.nytimes.com/1994/12/12/nyre- U.S. Department of Homeland Security. (2008). National incident
gion/bombing-in-new-jersey-the-victim-executive-had- management system. Retrieved August 18, 2009, from http://
vaulted-to-no-2-post-at-agency.html. www.fema.gov/pdf/emergency/nims/NIMS_core.pdf.
Federal Bureau of Investigation. (2008, April 24). Headline Washington Times. (2005, September 5). Katrina-hit states
archives FBI 100 the Unabomer. Retrieved August 18, turn to security firms. Retrieved August 18, 2009, from
2009,fromhttp://www.fbi.gov/page2/april08/unabomber_ http://www.washingtontimes.com/news/2005/sep/09/
042408.html. 20050909-104738-8181r/.

VIII. RISK AND THREAT MANAGEMENT


SECURITY QUIZ 347

Resource
approach that can be used for all types of
Broder, J. F. (2006). Risk analysis and the security survey incidents regardless of size.
(3rd ed.). Burlington, MA: Butterworth-Heinemann.
a. True
b. False
6. The ICS structure is built around five major
management activities of functions. Which of
S EC U RI T Y QU IZ the following is not one of these functions:
1. Regardless of the type of crisis, there is a a. Operations
series of common requirements that must be b. Planning
taken into account for an organization to be c. Safety
successful when a critical incident occurs. d. Logistics
These include all the following except: 7. The National Incident Management System
a. Assessing threat (NIMS) provides a systematic, proactive,
b. Selecting crisis team personnel all-hazards approach that guides all levels of
c. Training crisis team personnel government, non-governmental organizations,
d. Being willing to spend lots of money on a and the private sector to work together to
solution respond to and manage incidents of all sizes.
2. Observing which of the following guidelines a. True
increases the chances that emergency plans b. False
will be more effective and efficient: 8. Effective crisis media communications steps
a. Promote multi-organization response that organizations should consider include
b. Allow resistance to the planning process all the following except:
c. Separate emergency response from a. Have a media plan
disaster recovery b. Build a relationship with media before a
d. None of the above crisis
3. The National Fire Protection Association c. Develop strict restrictions on what media
(NFPA) standard 1600 sets criteria for can do on your property
both developing and evaluating existing d. Train employees on communications with
emergency management programs. the media
a. True 9. An emergency response plan will work
b. False regardless of any realistic training prior to
4. The Incident Command System (ICS) the implementation in an actual emergency.
identified common concepts that form the a. True
basis for the control and management of b. False
emergencies. Which of the following is not 10. In addition to a yearly audit of the
one of those concepts: emergency plan, that plan should be
a. Control evaluated and modified, if necessary, at all of
b. Communications the following times except:
c. Concentricity a. When there has been a change in personnel
d. Cooperation b. When the layout or design of a facility
5. The National Response Framework (NRF) changes
established an on-scene management system c. When there is a change in policies and
that would help responding agencies work procedures
together using a coordinated and systematic d. None of the above

VIII. RISK AND THREAT MANAGEMENT


This page intentionally left blank
C H A P T E R

29
Terrorism
Robert Metscher

been repeated throughout history, as terrorists


CHAPTER OBJECTIVES have sought to employ tactics that offer success
● Define terrorism against established political power structures.
● Discuss why terror tactics may be While life may have reached equilibrium since
employed 9/11, there are noticeable differences to our soci-
ety. Today’s security professional must be aware
● Differentiate between international and of the fundamental aspects of terrorism as it
domestic terrorism exists today, how it came to be, what it may look
● Explain “lone wolf” terrorism and like in the future, and how that affects their role
“leaderless resistance” as an organizational guardian.
● Explore selection and attack planning
concepts
WHAT IS TERRORISM? A
DEFINITION DILEMMA

The world is experiencing a new era of Defining any term is essential to reach an
terrorism. We will likely hear similar words in objective understanding. Without a common def-
the decades to come as well. Terrorism is cer- inition, the term is defined by individual bias and
tainly not new, and even the techniques are opinion. Consider that there is no one common
not especially different. What has changed is definition of terrorism today. This creates consid-
the publicity, awareness, and the realization that erable difficulty in developing policies to manage
terrorism, international and domestic, affects a very real problem. Merriam-Webster defines
everyone. A determined foe, given sufficient “terror” as a state of intense fear. In turn, “fear”
resources, will find the weakness in any defense. is defined by Merriam-Webster as an unpleas-
The terrorist attacks of September 11, 2001, opened ant, often strong emotion caused by anticipation
an otherwise unaware population’s eyes to the or awareness of danger. It might appear that ter-
fallibility of their nation’s armor. This cycle has rorism is the cause of an unpleasant emotion

349
350 29. TERRORISM

anticipating danger. Clearly this is too broad in the pursuit of goals that are generally
and vague to be useful. Historically, the term political, religious, or ideological.
“terrorist” can be traced to 1795 and the treat-
Federal Bureau of Investigation (1999, p. i)
ment by the French revolutionary government
[T]he unlawful use of force and violence
of its own citizens (Williams & Head, 2006).
against persons or property to intimidate
Operational tactics, that we might consider ter-
or coerce a government, the civilian
rorism today, can be found much farther back
population, or any segment thereof,
with the Zealots as early as 30 BC. Zealots used
in furtherance of political or social
violence and intimidation to forward their
objectives.
agenda of resisting the Roman occupation of
Israel. U.S. State Department (2003, p. xii)
The term “terrorism”, however, has been [P]remeditated, politically motivated
defined in many ways over the decades. The violence perpetrated against
mere mention of the word terrorism today has noncombatant targets by subnational
the ability to affect the perception of nearly any groups or clandestine agents, usually
issue. The use, and overuse, of any term also intended to influence an audience.
tends to obscure its definition. The end result
is a term that everyone believes they under- Each of these definitions revolves around the
stand but no one agrees upon one definition. use of unlawful violence to forward an agenda.
To paraphrase Associate Justice Stewart of the As the term has gained more popular use, addi-
U.S. Supreme Court in his discussion of por- tional terms have been introduced. Other, newer,
nography, “I’ll know it when I see it,” may also activities that have been included under the
be the most accurate way to describe terrorism umbrella of terrorism do not require violence in
today. Unfortunately, such a subjective method the traditional sense of the term (that is, a defi-
of defining any issue allows for misinterpreta- nition of violence requiring the use of physical
tions, distortions, confusion, and finally a term force). Agro-terrorism attacks on the agricultural
with little value beyond emotional appeal. capabilities of a society could either poison a
Recognizing the disparate definitions that exist, population or significantly disrupt their ability
as well as popular public application of the to provide sufficient foodstuffs to the popula-
term, permits the security professional to avoid tion. Cyber-terrorism attacks disrupt the infor-
potential pitfalls while advising organizational mation technology infrastructure of a society
management. causing essential services to fail. Bio-terrorism
The dilemma of finding a common definition attacks introduce viruses or bacterial agents into
is conveniently illustrated by the U.S. govern- an unprepared population causing a widespread
ment. The United Nations has had tremendous health crisis. None of these attacks necessarily
difficulty in producing a definition of terrorism requires an overtly violent act to initiate them.
for fear of inadvertently excluding legitimate There can be little doubt that an action using
efforts at self-determination within nations. these “non-violent” techniques still inflict, and
Multiple agencies have each presented their are intended to inflict, significant harm on the
own definitions within their literature: target population.
In his 2002 article, “Terrorism: Notes Toward
U.S. Department of Defense (2001) a Definition,” published in Slate Magazine,
The calculated use of unlawful violence Christopher Hitchens simplified the definition of
to inculcate fear, intended to coerce or terrorism to “the tactic of demanding the impos-
to intimidate governments or societies sible, and demanding it at gunpoint.” And in

VIII. RISK AND THREAT MANAGEMENT


WHAT IS TERRORISM? A DEFINITION DILEMMA 351
C. Maria (Marijke) Keet’s paper titled “Towards Front to destroy property, but not harm people or
a Resolution of Terrorism using Game Theory,” animals. They insist that they have not harmed
she simply identifies, terrorism parenthetically as a person; however, the use of such a destructive
“the use of physical and psychological violence force—fire—often creates an intense state of fear.
as a means to achieve a political goal” (2003). And it is a rational fear that those targeted, or their
Occasionally, in an effort to define some- family, friends, and co-workers, could be injured
thing, it is helpful to identify what it is not. For or killed in a subsequent event. Even farther
example, the terms activist, extremist, and ter- along the continuum, then, would be those
rorist are occasionally used almost interchange- actions involving direct physical harm such
ably in the media. Yet definitions of “activist” or as during the well-publicized attacks over the
“extremist” do not mention violence or harm. past decade. While a terrorist may be an activ-
Remember that the earliest modern use of ter- ist or extremist, the same does not hold true in
rorist came from the French revolution and the reverse. Terrorism then requires the threat of or
“Reign of Terror” in which political opponents actual harm.
were beheaded. In foregoing definitions that In some instances, terrorists are called mass
indicate a terrorist is one who advocates terror- murderers. But not all mass murderers are ter-
ism, the term terror means “a state of intense rorists. Because they have different motives
fear” (Merriam-Webster, 2009). Thus, a terrorist for committing violence, most mass murder-
would advocate creating a state of intense fear. ers are not considered terrorists. However, Eric
It is unlikely that such fear would come from Rudolph, who was convicted of four bombings,
anything short of a threat of violence or severe wrote about the reason for his attacks, “even
harm. From this, it is safe to argue that neither though the purpose of the Olympics is to pro-
an activist nor an extremist necessarily advo- mote these despicable ideals, the purpose of the
cates using a state of intense fear in their efforts. attack on July 27th was to confound, anger and
An activist is extremely active in their cause; an embarrass the Washington government in the
extremist advocates extreme views or measures; eyes of the world for its abominable sanction-
however, neither is automatically violent nor ing of abortion on demand” (Rudolph, 2005).
accepts violence as a way to usher in change. The Olympic Park bombing killed one person
Placing these terms onto a continuum using the and injured 111. It was not mass murder, but
First Amendment to the U.S. Constitution for certainly an act meant to instill an intense state
protected speech as a reference point, both the of fear. A similar theme may be found in far too
activist and the extremist might engage in ille- many other instances world wide, where the
gal activity, such as acts of civil disobedience, total loss of life does not accurately reflect the
outside of protected expression. These actions, level of fear driven through a wider population.
however, would not likely be far enough along For simplicity’s sake consider terrorism in this
the continuum to create a state of intense fear. light: How the few affect the many, by affecting the
An example might be animal rights advocates few through significant harm, or threaten signifi-
standing naked with signs protesting the use of cant harm, to forward a political or social agenda.
animals for clothing material. While the protes- As a security professional, it is often less impor-
tors could certainly be considered activists and tant to classify a potential threat as terrorism or
even extremists, they do not necessarily cre- crime than to identify and address the threat itself.
ate a state of intense fear, advocate violence, or By recognizing some of the difficulties created by
attempt to harm those nearby. Moving farther not having one accepted definition, the security
along the continuum is the use of arson by the professional can focus on the threat and risk
Animal Liberation Front and Earth Liberation created by these various acts. In the end it may

VIII. RISK AND THREAT MANAGEMENT


352 29. TERRORISM

be of little importance whether an attack comes smaller group against a much larger group that
from a determined and skilled criminal or a is often entrenched in legitimacy, as a society or
terrorist organization. With the exception of a subset of a society. For instance, the Weather
any press coverage, identical attacks will cause Underground in the United States focused on
comparable losses. This is not to say that under- driving a socialist revolution and targeting insti-
standing terrorism is of no small significance. tutions of perceived oppression (FBI, 1976) –
A lack of understanding could result in failing American society as everyone knew it. In contrast,
to accurately identify and address all potential the Animal Liberation Front targets only those
threats against an organization. they perceive as exploiting animals (ALF, 2009) – a
Furthermore, the definition of a terrorist and subset of society. Instead of open warfare against
of what constitutes terrorism will likely change the military forces of a nation, a terrorist uses their
through time. ability to move among the target population to
create a situation in which confusion and uncer-
tainty will drive fearful action. It is this fearful
WHY VIOLENCE? WHY THEY action that ultimately accomplishes the terrorist’s
DO WHAT THEY DO goal. This goal is distrust in the security apparatus
of their government and a corresponding willing-
Why threats and acts of violence? What ness to acquiesce to the terrorist’s demands.
causes an individual or group to embrace these In its modern sense, terrorism has been argued
tactics? More than one reason exists to explain to have such root causes as poverty, social injus-
why any specific act of terrorism or a series tice, political exclusion, and violent oppression.
of actions may be undertaken. An individual Amy Zalman, PhD, a Middle East advisor and
act may be expected to bring about a specific consultant, sums up two causes for terrorism:
change, such as meeting a demand or making
a particular change in public behavior. This
● Social and political injustice: People choose
act may be in concert with other acts that have terrorism when they are trying to right
slightly different goals. Some goals of specific what they perceive to be a social, political,
terrorist actions within terrorism campaigns, or or historical wrong – when they have been
for entire campaigns, include: stripped of their land or rights, or denied these.
● The belief that violence or its threat will be
● Bringing publicity to a plight or cause. effective, and usher in change. Another way
● Inciting retaliation to justify further actions of saying this is the belief that violent means
or encourage popular support. justifies the ends. Many terrorists in history
● Moving the middle of acceptable behaviors. said sincerely that they chose violence after
● Changing public perception of acceptable long deliberation, because they felt they had
activities. no choice.
● Creating a gradual change in public view of
a cause. In his paper “Understanding and Combating
● Injuring the opponent (Keet, 2003). Terrorism,” Major S. M. Grass of the U.S. Marine
Corp refers to Ernest Evans, a research associate
The value of terrorism comes from the fear at the Brookings Institution, who suggests that
generated by the realization that nearly any there are five specific goals of terrorism. These
member of the target population could have goals are:
been a victim—and could be a victim in a subse-
quent attack. Terrorism is a form of asymmetric 1. To publicize a cause on a regional and
warfare, of guerilla warfare, in that it pits a international level.

VIII. RISK AND THREAT MANAGEMENT


THE REASON FOR THE ACTION 353
2. The harassment and intimidation an attempt to change the behavior of those who
of authorities to force them to make do not agree, that fall under the definition of
concessions. terrorist. There are certainly examples of causes
3. Polarization of society to bring down the without supporters that progress to such levels
regime. of extreme action.
4. To aggravate relations between states or In many instances, the mass media will clas-
nations. sify a terrorist organization or cause as left-wing
5. To free political prisoners and secure or right-wing. The origin of these classifications
monetary ransoms to finance their cause. also comes from the French. In the National
Assembly in the 1780s, the physical seating
layout had the revolutionary estate seated to
THE REASON FOR THE ACTION the left and the nobles seated to the right. As
a result, the left is often associated with liberal
The various reasons that terrorist acts are political themes and the right with more con-
committed include the central component of servative themes. To characterize the inaccuracy
forwarding an agenda or cause and the general of these terms, the domestic terrorist organi-
perception that non-violent acts will be ineffec- zations of the United States offer a convenient
tive in achieving their agenda. In his book, “The data set. The Weather Underground from the
Logic of Political Violence,” Craig Rosebraugh 1970’s sought to overthrow of the government
discusses the lack of value of non-violent move- and replace the capitalist economic system with
ments seeking political change. He refers to communism. They were considered a left-wing
Mikhail Bakunin: organization. The various white supremacist
groups, such as the KKK, skinheads, and others,
Was there ever, at any period, or in any coun-
were considered right-wing groups. However,
try, a single example of a privileged and dominant
class which granted concessions freely, spontane- understanding the underlying beliefs of any
ously, and without being driven to it by force or organization or movement, and their potential
fear? (Maximoff, 1953) for destruction, is of greater importance than a
simple classification. As a security officer, reco-
There are many causes and agendas that rep- gnizing the beliefs, and the significant perso-
resent political discontent around the world. nas involved, is essential to determining the
It is typical for any particular cause to have a nature and extent of the threat posed to our
range of supporters from those that passively charges. Effective evaluation and communi-
agree, to those with extreme views and a will- cation of the threat allow a client, employer,
ingness to take direct, even violent, action to or principal to manage protective efforts at an
forward their beliefs. Between these two ele- optimum level.
ments are those that actively engage in open,
or aboveground, dissent; organizing and fund-
raising for activities that are within the legal
International
framework of dissent or marginally outside The phenomenon of international terrorism
of it. Once again, an example of a non-violent became a familiar concept as airline hijack-
extremist might be an animal rights supporter ings began in the 1970’s. International terror-
who uses no animal products at all. They may ism can be considered those organizations and
or may not be active in spreading this belief and acts that go beyond domestic issues. They may
still be extreme in their views. It is those few, target foreign nations, their citizens, corpora-
who embrace a belief and use violent action in tions, or other resources. The evolution of the

VIII. RISK AND THREAT MANAGEMENT


354 29. TERRORISM

phenomenon of international terrorism is more is also an example of domestic terrorism.


a function of international relations and com- Domestic terrorism can be found in nearly every
merce, convenient travel, and most importantly, country, much of it unheard of by those outside
worldwide almost instantaneous media cover- that particular nation. It can be just as dangerous
age. Remember that the theatrical importance as international terrorism, although possibly just
of the larger population witnessing the action is a bit less newsworthy on the international stage.
to create a state of fear, but this is only permit-
ted by the improvement in communications and
the ability of the media to operate and broadcast WHAT THEY LOOK LIKE:
images worldwide. Imagine the anti-climatic FROM INDIVIDUALS TO
effect of a terrorist attack when news traveled by ORGANIZATIONS
horseback. Reading about a terrible event a con-
tinent away that occurred days, weeks, or even To support an ongoing campaign against
months earlier, in a newspaper without images, a foe, an individual, or antagonist, generally
would have little effect. Now, when the citizens needs allies or companions, due to the resources
of an entire nation (and the world) can witness it takes to carry out multiple operations. While
the body of a murdered sailor being thrown out the Unabomber stands out as an exception, the
of an aircraft, there is an immediate and real tempo of his attacks was most certainly tem-
effect on the population. This was the case when pered by his own limited resources. As a terror-
Petty Officer Robert Stetham was murdered dur- ist organization grows to include financial and
ing the hijacking of TWA flight 847 in 1985. The logistical support capabilities, the severity and
same can be said for the incidents of September tempo of the operations can increase. The extent
11, 2001, in New York, March 11, 2004, in Madrid, of available support varies from one organi-
and July 7, 2005, in London when the whole zation to the next. Furthermore, the larger an
world witnessed the destruction of these attacks. organization grows, the more likely its infra-
structure will be discovered and destroyed. The
necessity for secrecy and compartmentalization
Domestic of information makes larger organizations con-
If international terrorism reaches across siderably more difficult to effectively maintain.
international boundaries, then domestic terror- Popular media routinely refers to terrorist
ism is contained within a nation’s interest. For cells. A cell is a small group of individuals oper-
instance, the second worst terrorist act on U.S. ating with a common purpose. There are oper-
soil was the bombing of the Murrah Federal ations or tactical cells, which are the cells that
Building in Oklahoma City on April 19, 1995. carry out actions against others. These consist
This attack claimed 168 lives and injured nearly of the individuals who trained for the mission.
700. One stated reason for this attack was the Although they have a common purpose – the
federal government’s handling of the Branch mission – they may not all be aware of all the
Davidians in Waco, Texas, and Randy Weaver details of the mission. There has been debate
in Idaho. There was no international issue being concerning whether all the 9/11 hijackers, spe-
addressed by the attack. Similarly, the Irish ter- cifically the “muscle” team members, were
rorist groups maintained their conflict in the aware of the intended outcome or were inten-
United Kingdom with the various attacks in tionally kept in the dark.
Great Britain over control of Northern Ireland. To support the cells conducting the opera-
In Spain, the Basque ETA (in English: Basque tions, logistics cells exist to provide assistance.
Homeland and Freedom) seeking independence These may be multi disciplinary in staffing to

VIII. RISK AND THREAT MANAGEMENT


WHAT THEY LOOK LIKE: FROM INDIVIDUALS TO ORGANIZATIONS 355
provide a wide range of skills, or they may be system. McVeigh did act as a lone extremist, as the FBI
focused on a specific task. Each action requires says. He was trained to do it this way. But his act of
lone extremism was part of an ongoing conspiracy that
accurate intelligence about the target, its defenses, continues to inspire violent attacks to this day, and to
weaknesses, and expected responses. They may close our eyes to this conspiracy is to deny reality. It’s
funnel financial resources or make arrangements a matter of connecting the dots. (German, 2005)
for lodging, transportation, food, weapons,
explosives, or other materials needed for a suc- The idea of “leaderless resistance,” or a
cessful mission. Furthermore, separate support movement with no formal organization to sup-
cells may provide specific components, again to port its cause, has proven to make capture of
avoid drawing suspicion to the operations cell. those involved difficult at best. Possibly one of
And there are sleeper cells. These may get the best descriptions of the model of leaderless
the most attention if for no other reason than resistance comes from Edward Abbey’s novel,
their unique name. A sleeper cell is a cluster of The Monkeywrench Gang. This book describes a
individuals who are sent to infiltrate a popula- small group of friends engaging in prank-like
tion. They will typically exist in their day-to- property destruction to prevent the construc-
day lives separate from each other. This lack of tion of roads through undeveloped wild land in
contact works to avoid creating a connection or the American west. One conversation describes
causing suspicion. In some instances the mem- it well:
bers of a sleeper cell will be unaware of each
other. Instead, they may be given some type of “I’ll bet – listen, I’ll bet right this very minute
an authentication method to identify another there’s guys out in the dark doing the same kind of
cell member making contact, or an activation work we’re doing. All over the country, little bunches
code that directs them to take some predeter- of guys in twos and threes, fighting back.”
mined action. Since 2001, each release of a video
“You’re talking about a well-organized national
or audio message from Al-Qaeda drives concern
movement.”
that they contain hidden activation messages.
While the cell is the basic unit of an operation, “No I’m not. No organization at all. None of us
they vary in size. The smallest is an individual. knowing anything about any other little bunch.
Although individuals are capable of carrying out That’s why they can’t stop us.” (Abbey, 1975, p. 182)
acts, most often they will have a support struc-
ture to assist them. The Unabomber is one exam- This non-structure has been embraced by
ple of an individual who operated entirely alone both the Animal Liberation Front (ALF) and the
in his endeavor. There has been much discus- Earth Liberation Front (ELF). They have each
sion of the “lone wolf” terrorist, especially in the published a set of guidelines for those wish-
United States concerning Timothy McVeigh and ing to support their cause with direct action.
the Oklahoma City bombing. However, McVeigh Adhering to these principles provides some
did not operate entirely alone. His support chain continuity of effort without compromising the
included, at a minimum, a few friends who pro- core values, and makes it very difficult to iden-
vided some logistical support. tify persons involved in specific incidents.
In his 2005 Washington Post article, “Behind While leaderless resistance offers some advan-
the Lone Terrorist, a Pack Mentality,” Mike tages, it is not the model for all causes. Those
German, a retired FBI agent, stated: with formal structures gain advantages from
greater logistical resources. These resources may
“Lone extremism” is not a phenomenon; it’s a tech- then be used in a wider variety of strategies.
nique, a ruse designed to subvert the criminal justice They may be concentrated on a particular target

VIII. RISK AND THREAT MANAGEMENT


356 29. TERRORISM

or used across many targets. Greater resources Understanding the organizational structure
also enable the organizations to provide train- of a terrorist organization provides guidance
ing, conduct complex mass communication and on tactics for disrupting their operations. At the
marketing efforts, and coordinate the activities tactical level, such organizational aspects have
of multiple cells. Terrorist groups may be orga- less importance when attempting to identify
nized in many different ways, much like any or disrupt an attack. However, understand-
organization. Some may have a clear pyramid ing the wide range of organizational structures
with a strong centralized authority and multiple offers the security officer possible insight into
layers over a large base of supporters. Within the funding of a potential foe and ultimately
such a structure the central leadership would their ability to engage in complex and resource-
exercise strict authority over giving orders and intensive activities.
confirming logistical resources. Others, may
be structured as an umbrella with several self-
contained, and somewhat autonomous, groups
TARGET SELECTION
under an overarching organization. Each of
AND ATTACKS
these larger organizations is able to effectively
employ tactics that have planned losses, with-
With the knowledge that terrorism is a largely
out bringing an end to their cause. For instance,
theatrical activity to affect a wider audience, it is
a “suicide bomber,” where the individual car-
less difficult to recognize why specific targets are
ries or wears the bomb to the target and deto-
selected. Returning to the five goals of terrorism:
nates it intentionally, would bring a premature
publicity, harassment and intimidation, societal
end to the cause of a lone wolf. Such tactics
polarization, aggravating political relations, and
involving the sacrifice of individuals necessitate
freeing political prisoners/securing monetary
a larger organization to carry on the efforts after
ransoms, it is possible to ask important questions
the attackers die.
of potential targets. Consider whether an attack
With the easy communications offered by the
on the target, such as a person, place, event, or
Internet, it is possible to form virtual groups with
object, could further one or more of these goals.
members who never meet each other in the phys-
Further criteria and tools should also be used in
ical world. Such groups would most likely be
this evaluation process.
found involved in cyberspace attacks, but could
The CARVER model of target selection offers
certainly use cyberspace to coordinate attacks in
a useful tool for considering a target. While
the physical world. A demonstration of how such
CARVER methodology is just one tool, it offers
a cell might operate was offered by Dr. Dwight
value because the factors may be considered
Toavs at the 2008 Director of National Intelligence
from both an offensive and a defensive point
Open Source Conference in Washington, DC
of view. The components (presented from an
(Shachtman, 2008). In the presentation, he demon-
aggressor’s point of view) include:
strated a fictitious online conversation to coordi-
nate an attack on the White House using a World Criticality – How critical is this target to the
of Warcraft map as an overlay to the Washington, operations of the opponent?
DC map. These cyber worlds offer a convenient Accessibility – How easy or difficult is it to
medium for discussing, in “game code” no less, gain access to and egress from the target?
an upcoming operation. Consequently, it is now Recuperability (recovery of operations and
possible to coordinate an operation with complex response) – How quickly can the opponent
logistical needs and multiple cells with little fear recover from the attack? How quickly can
of detection. they mount an effective response?

VIII. RISK AND THREAT MANAGEMENT


SECURITY PREPARATIONS AND DEFENSIVE MEASURES 357
Vulnerability – How vulnerable is the Planes were to be crashed into buildings on both
target itself? What training and tools will be coasts of the United States with one plane land-
needed to carry out the attack? ing and being turned into a media platform from
Effect or Effectiveness – What will the which Khalid Sheikh Mohammed would mur-
attack accomplish? Is this the best target for der the male passengers and disseminate pro-
that effect? paganda. In American Terrorist: Timothy McVeigh
Risk – What are the chances of the attack being & the Oklahoma City Bombing, the authors state
unsuccessful? What factors affect success? that McVeigh used a list with specific criteria for
the target of his attack. Reconnaissance of facili-
An additional component of SHOCK has
ties in Arkansas, Missouri, Arizona, and Texas
since been added to CARVER. The SHOCK fac-
was conducted. An additional comment on
tor represents the wider psychological impact
McVeigh’s selection process reinforces the theat-
of the attack. This is the true theatrical value
rical aspect and the desire to exploit the incident
discussed earlier; the widespread fear through-
(as in number 11 above). “He wanted a big fed-
out the target population caused by the impres-
eral building, with plenty of open space around
siveness of the attack.
it, to allow for the best possible news photos and
Another useful model for understanding the
television footage” (Michel & Herbeck, 2001,
attack process involves twelve steps. Carrying
p. 169). He further sought “to deliver a quan-
out a successful attack requires planning and
tity of casualties the federal government would
preparation. In many instances individuals
never forget.” When asked why he did not bomb
must be trained, resources obtained, and then
the building at night, McVeigh’s response was,
moved into position to facilitate the attack. It
“That would not have gotten the point across
is highly unlikely that all the elements for an
to the government. We needed a body count
attack would be in position and ready by sheer
to make our point.” (Michel & Herbeck, 2001,
chance.
p. 300). McVeigh was also reported to have used
1. Choose multiple targets soup cans in a friend’s kitchen while planning
2. Perform initial surveillance the arrangement of the barrels containing the
3. Identify softest target explosives in the truck.
4. Categorize With an understanding of the motivations
5. Perform secondary surveillance driving our foe, it is possible to identify poten-
6. Plan operation tial targets deemed valuable to them. Knowing
7. Rehearse a few of the tools and methods available for
8. Move to target planning an attack is then helpful to us in pre-
9. Conduct operation paring our defenses to protect those targets
10. Escape of value. Each of these methods shows weak-
11. Exploit the incident nesses in the selection and preparation process
12. Debrief that can be exploited in our defensive planning.

Consider this process through the lens of


two attacks: the 9/11 attacks on the U.S. by SECURITY PREPARATIONS AND
Al-Qaeda and the Oklahoma City bombing at DEFENSIVE MEASURES
the Murrah Federal Building. According to the
9/11 Commission Report, “… KSM describes a In addition to using prudent physical and
grandiose original plan: a total of ten aircraft to network security precautions, the security pro-
be hijacked” (9/11 Commission, 2004, p. 154). fessional must think beyond their own facilities

VIII. RISK AND THREAT MANAGEMENT


358 29. TERRORISM

when coping with terrorism. It is a somewhat identify new threats early, keep constituents and
dated concept to consider the property line as organizational leaders informed, as well as rec-
the first line of defense. While it is most likely ommend and implement sound countermeasures
the first place for which a security professional is to mitigate an attack.
able to establish protective tools, there is certainly The security professional must consider the
more that can be done. As noted above, there are threat environment surrounding their organiza-
at least two instances prior to an attack when tion. Who or what is likely to cause harm, inter-
surveillance is conducted. This typically involves rupt operations, or damage the organization’s
being within relatively close proximity to a facil- reputation? Monitoring known threats, and seek-
ity and likely accessing it as well. The purpose ing to identify new ones early, offers an advan-
for the reconnaissance is to determine suitability tage. Formal threat assessments are certainly
of the target—this offers yet another opportunity important; however, regular monitoring of the
for discouraging the attack. Furthermore, sig- environment offers the opportunity to identify
nificant attacks often cause damage to property potential problems earlier. Whether this involves
surrounding the target. Being located next to a automated online searches, active monitoring
government office, pharmaceutical company, or of Web sites and discussion groups, or walking
religious organization may seem harmless from around and speaking with the organization’s
one day to the next. This close proximity could neighbors, early detection is valuable. It is often
be the only reason for damage from an attack. after a successful attack that individuals come for-
Consequently, on many levels we share the same ward to report their observation of “odd behav-
threats as our neighbors. The daily role of a secu- ior.” Security professionals frequently argue the
rity professional managing the threat of terrorism importance and value of awareness programs.
requires awareness of the nature of the threat; This is an example of the professional heeding
vigilance toward the known threats, the desire to their own advice.

EMERGING TRENDS
infrastructure also creates vulnerabilities to elec-
“Emerging Trends—Terrorism”
tric grids, power generation stations, water sani-
Throughout history, terrorism has been an tation systems, bridge operations, and such. The
evolving concept. Some tactics are tried and largest difference between a physical and virtual
true and will likely be used well into the future. attack is the necessary location of the attacker. A
Newer tactics are evolving today using our physical attack requires the attacker to be pres-
improved communications networks and easier ent, but a virtual attack can be conducted from
access to other technologies. The deplorable potentially anywhere on a network. If that net-
events committed by Al-Qaeda in the past decade work is connected to the Internet, then the
show a desire to capitalize on greater casualties attacker can literally be anywhere in the world.
and more dramatic events. With the increased Attacks by nuclear means and radiological
availability of nuclear, biological, and chemical materials have the potential for casualties far
substances it is likely that these will be part of beyond the immediate attack location and to
future attack plans. The increase in networked deprive the opponent of the use of considerable

VIII. RISK AND THREAT MANAGEMENT


REFERENCES 359

land area. Even if the unusable land area is some pesticides, are able to remain in an area
small, it is significant when that small area is a making it unusable for a considerable time.
vital transportation mode, commercial area, Network, or virtual, attacks are the newest
water source, or infrastructure feature. Dirty among emerging methods. Given the ability of
bombs are radiological devices that, rather than the attacker to reach around the world and the
initiating a nuclear explosion, use conventional difficulty in capturing the perpetrator makes it
explosives to scatter fine particles of radioac- an attractive tool. Network attacks offer a double
tive material. Small amounts of this material punch. First, the effects of the actual attack could be
can prove fatal over time, which makes areas incredible. Second, the trust that the target popula-
uninhabitable for long periods of time. There are tion loses in networked systems may not be quickly
other delivery methods besides explosives that repaired. Consider all the activities that require
permit the release of these materials. Biological these networks: traffic lights, air traffic control sys-
agents have the ability to cause severe illness. tems, power generation, and in some instances,
The anthrax attacks in the United States proved water sanitation, to name a few. It would not be
the validity of this concept. Mailroom processes difficult to lose faith in many of these essential ser-
throughout the country were affected by merely vices. The use of the Internet for coordinating ter-
a few attacks. Bio-agents released into the water rorist activities may increase as new, less detectable
supplies or sprayed over areas can have enor- methods are developed. These will then be coun-
mous effect. However, a highly infectious agent tered and newer ones developed over time.
could be distributed simply by infecting just Knowing that in many ways terrorism func-
a handful of individuals. The same holds true tions as a theatrical event indicates that the meth-
for chemical weapons. The attack on the Tokyo ods will change. Changes will be necessary to fit
subway proved this concept as well. Chemical new audiences with different beliefs. Identifying
agents operate to affect the body’s nervous sys- what these are in advance will be difficult, but
tem. Nerve agents prevent nerve impulses from not impossible. Continuously scanning the envi-
traveling through the body, causing the heart ronment and monitoring changes offers us a tool
and breathing to slow and possibly stop. Other to prepare for these changes. Using gathered
chemical agents have nasty effects such as caus- information to stay aware of the changing threat
ing mucous membranes to bleed or significant has proven elusive in the past. It is necessary to
blisters to form. Currently, chemical agents deliv- learn from our mistakes and develop methods
ered are usually not spread too much after that to adapt to new threats and effectively deploy
delivery. However, persistent agents, much like countermeasures.

References Activist. (2009). In Merriam-Webster Online Dictionary.


 http://www.merriam-webster.com/dictionary/
Abbey, E. (1975). The monkey wrench gang. New York: Harper- activist. Retrieved October 30, 2009.
Collins. Activist. (2009). In Dictionary.com. http://dictionary
Animal Liberation Front (ALF). (Unknown). Animal libera- .reference.com/browse/activist. Retrieved October 30,
tion front primer. http://www.animalliberationfront 2009.
.com/ALFront/ALFPrime.htm. Retrieved October Boudreau, A., & Zamost, S. (2008, February 18). University
30, 2009. shooter’s girlfriend: “I couldn’t believe it.” http://www

VIII. RISK AND THREAT MANAGEMENT


360 29. TERRORISM

.cnn.com/2008/US/02/17/shooter.girlfriend/index Shachtman, N. (2008, September 15). Pentagon researcher


.html#cnnSTCText. Retrieved October 30, 2009. conjures warcraft terror plot. Wired. http://www
Extremist. (2009). In Merriam-Webster Online Dictionary. .wired.com/dangerroom/2008/09/world-of-warcra/.
 http://www.merriam-webster.com/dictionary/ Retrieved October 30, 2009.
extremist. Retrieved October 30, 2009. Terror. (2009). In Merriam-Webster Online Dictionary.
Extremist. (2009). In Dictionary.com http://dictionary  http://www.merriam-webster.com/dictionary/
.reference.com/browse/extremist. Retrieved October terror. Retrieved October 30, 2009.
30, 2009. U.S. State Department. (2003). Patterns of global terrorism.
Fear. (2009). In Merriam-Webster Online Dictionary.  http://www.state.gov/documents/organization/
http://www.merriam-webster.com/dictionary/fear. 31932.pdf. Retrieved October 30, 2009.
Retrieved October 30, 2009. U.S. Department of Defense. (2001). Department of defense
Federal Bureau of Investigation. (1976, August 20). Weatherman dictionary of military and associated terms. http://www
Underground Freedom of Information Act file. .dict.mil/doctrine/jel/new_pubs/jp1_02.pdf  .
Federal Bureau of Investigation. Serial murder – Multi- Retrieved October 30, 2009.
disciplinary perspectives for investigators. (2005). http:// Williams, A., & Head, V. (2006). Terror attacks. London:
www.fbi.gov/publications/serial_murder.htm  . Futura.
Retrieved October 30, 2009. Zalman, A. (Unknown). The causes of terrorism. http://
Federal Bureau of Investigation. Terrorism in the United States. terrorism.about.com/od/causes/a/causes_terror.htm.
(1999). http://www.fbi.gov/publications/terror/terror99 Retrieved October 30, 2009.
.pdf. Retrieved October 30, 2009.
Foreman, D., & Haywood, B. (1987). Ecodefense: A field guide to
monkeywrenching (2nd ed.). Tuscon, AZ: Ned Ludd.
German, M. (2005, June 5). Behind the long terrorist, a pack S E CURI TY QU I Z
mentality. The Washington Post. http://www.washing- 1. Historically, the term “terrorist” can be traced
tonpost.com/wp-dyn/content/article/2005/06/04/
to 1795.
AR2005060400147.html. Retrieved October 30, 2009.
Grass, S. M. (1989). Understanding and combating terrorism. a. True
 http://www.globalsecurity.org/military/library/ b. False
report/1989/GSM.htm. Retrieved October 30, 2009. 2. As a security professional it is often less
Hitchens, C. (2002, November 18). Terrorism: Notes toward important to classify a potential threat as
a definition. Slate Magazine. http://www.slate.com/
terrorism or crime than to identify and
?id  2074129. Retrieved October 30, 2009.
Keet, C. Maria (Marijke). (2003, December). Towards a reso- address the threat itself.
lution of terrorism using game theory. http://www a. True
.meteck.org/TERRORISM_WP.pdf. Retrieved October b. False
30, 2009. 3. The worst terrorist act on U.S. soil was the
Keet, C. Maria (Marijke). (2003). Causes of terrorism.
bombing of the Murrah Federal Building in
 http://www.meteck.org/causesTerrorism.html  .
Retrieved October 30, 2009. Oklahoma City on April 19, 1995.
Maximoff, The political philosophy of Bakunin: Scientific anar- a. True
chism. edited by G. P. Maximoff. 1953 b. False
Michel, L., & Herbeck, D. (2001). American terrorist: Timothy 4. The acroynom ELF refers to:
McVeigh & the Oklahoma City bombing. New York: Harper-
a. Equal Liberation Front
Collins.
Morgan, D. (2008, February 16). NIU shooter described as b. Earth Liberation Front
“gentle, quiet.”  http://www.cbsnews.com/stories/ c. Earth Liaison Front
2008/02/16/national/main3840072.shtml. Retrieved d. Earth Liberal Front
October 30, 2009. 5. The smallest sized cell is:
National Commission on Terrorist Attacks upon the United
a. 3—5
States. (2004). The 9/11 commission report. New York:
W. W. Norton. b. 5—10
Rudolph, E. (2005, April 14). Full text of Eric Rudolph’s confes- c. 10—15
sion. http://www.npr.org/templates/story/story.php? d. Individual
storyId  4600480. Retrieved October 30, 2009.

VIII. RISK AND THREAT MANAGEMENT


SECURITY QUIZ 361

6. The CARVER model of target selection offers 9. An example of a non-violent extremist might
a useful tool for considering a target. be an animal rights supporter that uses no
a. True animal products at all.
b. False a. True
7. A security professional need only concentrate on b. False
their own facility when coping with terrorism. 10. It is impossible to identify potential targets.
a. True a. True
b. False b. False
8. Formal threat assessments are certainly
important; however, regularly monitoring
of the environment offers the opportunity to
identify potential problems earlier.
a. True
b. False

VIII. RISK AND THREAT MANAGEMENT


This page intentionally left blank
C H A P T E R

30
Antiterrorism and VIP Protection
Christopher A. Hertig and
Ted Wade

on staff at abortion centers and acts of violence


CHAPTER OBJECTIVES perpetrated in our courthouses.
● Define terrorist actions and activities Protection officers play an important role as
● Explain steps for creating an antiterrorist they are often the ones who control access to
strategy facilities, guard payrolls and armored trucks,
drive executives to the airport, escort VIPs
● List four antiterrorist techniques through crowds at public affairs, and maintain
● List twenty specific techniques used for the physical security at airports, courthouses,
antiterrorist security power plants, corporate headquarters, and
● Define personal protection specialists military bases. In order to play this role safely
● Explain the concept of protecting the and professionally, they must have a basic
principal understanding of the threat(s) confronting their
work environments. They also need to be com-
● Explore what to do in hostage situations petent in crucial job tasks such as operating
● Explore what to do if taken hostage detection technology, searching personnel and
● Define the Stockholm Syndrome vehicles, driving vehicles, and so on.
● Suicide Attacks

TERRORIST ACTIONS AND


Concerns with terrorism and workplace vio- ACTIVITIES
lence have been growing over the past several
decades. We have seen spectacular terrorist Terrorist activities are contingent upon the
acts, such as the airline attack on the World capabilities of the terrorist organization, the
Trade Center, the Madrid train bombings, and philosophy of that organization, and the area in
the attacks on Mumbai. We have also seen dis- which the action takes place. Whereas Middle
gruntled current or former employees open Eastern terrorists drive car bombs into tar-
fire in their workplaces. We have seen assaults get areas, European groups may attack police

363
364 30. ANTITERRORISM AND VIP PROTECTION

stations, airports, and so on, and North American 9. The terrorists may use diversionary tactics
terrorists may plant bombs, murder members such as sniping or detonating explosives.
of certain ethnic or professional groups (police, 10. They will try to intercept, delay, or
doctors at abortion clinics), and rob banks or destroy responding police forces so that
armored cars. security personnel cannot rely on local law
One cannot assume what terrorists will or enforcement assistance.
will not do, but antiterrorist security person- 11. They may use unaware personnel as part of
nel should be familiar with the groups in their an attack plan, such as duping truck drivers
particular area and those that may target their into carrying explosives.
industry. This will provide them with sufficient 12. Terrorists will take advantage of periods
indication from which a more accurate assess- when security performance is lowered such
ment of terrorist activities can be made. as adverse weather (rain, snow, fog) or
Task b, Element D in “Nuclear Security when there are workers on site.
Personnel for Power Plants: Content and 13. The terrorists will plan and rehearse the
Review Procedures for a Security Training and attack.
Qualification Program” (NUREG 0219) lists the 14. The attack will be planned to take the fire
following characteristics involved in the plan- objective in less than 3 minutes.
ning and execution phases of a terrorist attack. 15. Terrorists will not attack unless they are
100% confident that they will be successful.
1. Terrorists will learn as much as possible
beforehand about the engineering details of While the foregoing was written with nuclear
a facility. power plants in mind, the concepts are appli-
2. They will assess power plant security ahead cable to virtually any fixed site facility such as
of time by observing the plant, talking to a bank, airport, or residence. Attacks against
plant personnel, talking to an insider, and vehicles for the purpose of securing hostages
intercepting radio transmissions. also utilize the elements of surprise, speed,
3. They will attempt to recruit an accomplice diversion, and, ultimately, violence. What can
into the security force. be gleaned from this is as follows:
4. Terrorists will also try to recruit nonsecurity 1. Communications and computer security
employees as accomplices. is paramount. Communications security
5. They will consider kidnapping an employee, protects against the compromise of
or an employee’s family member, prior to an information to terrorist/adversary groups.
attack. It also plays a key role in maintaining
6. They may take hostages during the attack to an effective physical security posture.
force cooperation. Disgruntled employees/customers/terrorists
7. Terrorists will isolate the target site by cutting will undoubtedly target computer systems
off communications and power supplies. more in the coming decade than they have
8. The group will assemble the necessary previously.
weapons and equipment to use in the attack 2. Confidentiality of information is essential!
(this can include firearms, military issue The less a terrorist or other adversary can
shoulder weapons, SMG’s or Sub-Machine learn about an organization and its defenses,
Guns, antitank rockets, high explosives, the less likely that an attack will be planned.
radio jamming or monitoring devices, An organization’s information protection
power tools, construction equipment, and program can be the cornerstone of a
incapacitating agents). terrorism defense strategy.

VIII. RISK AND THREAT MANAGEMENT


ANTITERRORIST STRATEGY 365
3. Personnel security—the protection impact on the organization. They include
of the workforce from infiltration by bombings or arson, assassination,
terrorists, foreign agents, criminals, and kidnapping for “fund-raising” or publicity,
competitors who wish to steal proprietary sabotage of machinery, implanting computer
business information is important. Much viruses, or product tampering.
of the workplace violence issue revolves 3. Occurrence probability factors are assigned,
around the screening and management of such as certain, highly probable, moderately
employees. probable, and improbable.
4. Access control—over both personnel and 4. Impact of occurrence is assessed. Direct
vehicles—must be designed into the physical (replacement), indirect (loss of business), and
security system and maintained through extra expense (added fees, such as advertising
the efforts of protection officers. Terrorists and room rentals) costs are identified.
can be deterred from selecting a facility as a 5. Countermeasures are selected. This can
potential target if they perceive that target as include the following risk management
being too well protected. approaches:
Personnel security, physical security, and
Risk avoidance, such as not operating in a
information security all work cohesively to pro-
hostile country or having a business operation
tect against terrorist threats:
that is prone to attack.
Personnel Security Risk reduction includes target hardening by
Physical Security patrols via locks, lights, barriers, and so on. It
Information Security ⴙ is usually the most expensive means of risk manage-
TERRORISM PROTECTION ment. It is also inconvenient to employees, customers,
and so forth. As such it should not be employed
without first considering alternative approaches
ANTITERRORIST STRATEGY to addressing the risk. CPTED (Crime Prevention
Through Environmental Design) principles can
In essence, defending against terrorism is no
be used to harden a facility without making it
different from defending against other types
resemble a fortress. For example, unsightly bol-
of threats. Even though terrorism is complex
lards and barriers can be replaced by raising
insofar as assessing the threat is concerned, the
landscaping above the road or parking surface
physical security planning process is the same
and using retaining walls as an attractive yet
as it would be with any other threat or situa-
effective barrier.
tion. Physical security must always be planned
Risk spreading involves having several facil-
in several stages.
ities in different areas so that if one facility—or
1. Assets are identified. What has value to key executive—is annihilated, the entire organi-
the organization? What has value that is zation is not crippled.
strategic, monetary, or symbolic to terrorist Risk transfer means transferring the financial
groups/individuals? What assets can be risk of the loss event to another entity. Generally,
used to attack other targets, such as aircraft, this is via insurance coverage. Kidnap insurance
weapons, chemicals, flammable materials, policies have been used for the past two decades
tampered foodstuffs? by major corporations. All organizations must
2. Loss events are exposed. These are easily assess the potential costs of extended business
employed tactics that can be performed by interruption, civil litigation, and negative pub-
a single individual and have a substantial licity in the event of a death. Once this is done,

VIII. RISK AND THREAT MANAGEMENT


366 30. ANTITERRORISM AND VIP PROTECTION

TABLE 30-1 Terrorism Protection Strategies by TABLE 30-2 Governmental and Corporate
Countries and Corporations Partnership Activities

National Corporate/Organizational Government Agencies Private Organizations

Diplomacy/projecting a Public and media relations/ Provide and share intelligence Provide and share
positive image to the world projecting a positive image in to the macro environment: the intelligence to the micro
community the operating environment city, state, or nation environment: the facility,
other branches
Intelligence efforts Intelligence efforts
Offer available seats in Offer general employees
Investigation of suspect Investigation of suspect
training classes to security available seats in corporate
activities activities
personnel training programs
Target hardening/physical Target hardening/physical
Provide consultation on Provide facilities for
security security
terrorism, threat response, conducting training such
Tactical/emergency Tactical/emergency HAZMAT, etc. as performing drills in
planning planning buildings that are closed
Provide instruction on Locate facilities for
terrorism, hostage negotiation, incident command when
various modifications to existing insurance cov-
WMD (Weapons of Mass a crisis arises
erage can be made. Destruction) response

Share equipment obtained Provide funds for


TERRORISM DEFENSIVE through government grant equipment purchase such
STRATEGIES monies or military giveaways as robots, bomb suits, dogs,
vehicles, etc.
Obviously liaison with various organizations
is important to strategies designed for defense
against terrorism. This is important for both unpredictable; and maintaining confidentiality
nations and corporations (Table 30-1). Liaison are all target-hardening approaches.
is important when planning for public events 2. Terrorists can be delayed by the use of
(Olympics, concerts, speeches, etc.), respond- barriers, locks, and response forces. Vehicular
ing to incidents (fires, floods, bombings, power access to potential targets should also be
outages, etc.), and planning for terrorist attacks. controlled as much as is practical under the
There are some specific things that can be done circumstances. This can be via barriers as
by both public and private entities regarding well as access/parking arrangements that
counterterrorism (Table 30-2): prevent quick and easy access to the target.
3. Denial of terrorist objectives can be
accomplished through the use of contingency
ANTITERRORIST TECHNIQUES BY
plans for dealing with the media and
ORGANIZATIONS/FACILITIES
negotiating for hostages. These deny the
terrorists the ploy of widespread panic and
Using the physical security concepts of deter,
media leverage which they attempt to exploit.
delay, deny, and detect in regard to terrorist
4. Detection of terrorist activity can be
attacks, include:
accomplished through the analysis of
1. Techniques used to deter terrorist activity threat intelligence. It can also occur by
include target-hardening so that the terrorists conducting entry searches, using detection
have a lesser chance of success. Checking IDs, technology (X-ray, metal, explosive), CCTV
packages, and vehicles before they enter a (Closed Circuit Television), alarm systems,
secured area; making patrols or routes of travel lights, patrols, and access control systems.

VIII. RISK AND THREAT MANAGEMENT


SPECIFIC TECHNIQUES FOR ANTITERRORIST SECURITY 367
Detection equipment must be paired with • Durability—how long the equipment will
protection personnel who can evaluate what last is key
is detected and assess if the situation poses a • Reliability/pick rate/false alarm
threat. Detection equipment deserves special rate—consideration should be given to
consideration. The use of this equipment was independent testing or endorsement by a
limited to metal detectors in nuclear power regulatory agency (TSA – Transportation
plants, airports, and prisons a decade or so Security Administration, NRC – Nuclear
ago. The events of 9/11 ushered in a wave of Regulatory Commission). Purchase
new technologies for explosive detection and of equipment and services certified
the detection of WMD’s manufactured with and designated as effective by the
biological, chemical, and radioactive agents. U.S. Department of Homeland Security
The use of dogs for explosive detection has under the SAFETY Act provides liability
increased. Obviously there will be additional protection to users of the equipment
uses of detection equipment in the future. under U.S. law
These are a few key points to consider • Routine maintenance needed—cleaning,
when purchasing and using the equipment: start of shift tests, and so on
• Initial cost • Service contracts to maintain the
• Volume of traffic to be screened equipment, possibly conduct in-depth
• Single or progressively higher levels of performance tests, and repair of the
screening, such as with layered access equipment
control • Education of those being searched so they
• The time needed to scan—delays, man- cooperate with the search effort
hours of searches and operators • Training of users such as preemployment
• Aesthetic interface with the environment training, in-service instruction, and
• Response to alarm/detection—there audits/inspections or drills/scenarios to
should be a systematic process in place ensure competency on the job
for investigation, isolation of the person
being screened who emits an alarm and
the area, communication with the cover
SPECIFIC TECHNIQUES FOR
officer/access controller/floor detective,
ANTITERRORIST SECURITY
etc., and control over the person who
Some specific techniques that antiterrorist
made the detector give warning
security personnel (personal protection special-
• Ease of use (“idiot proof”) and amount
ists, airport, power plant, military security offi-
of training required (note that hand
cers) may utilize include the following:
searches are often necessary with metal
detectors and X-rays). Vendors should 1. Become thoroughly familiar with any and
provide training materials (manuals, all security equipment. While this sounds
videos, or e-learning modules) specific overly simple, routine audits at airports
to the equipment to ensure operators and nuclear facilities commonly reveal that
understand how to use and how and equipment is not being properly used for
when to service the equipment any one of a number of reasons.
• Cultural fit with the environment—it 2. Check and test equipment frequently.
must be accepted by management and Develop overlapping auditing systems
users such as employees, students, for the equipment, such as having
visitors, and so on technicians, officers, and supervisors all

VIII. RISK AND THREAT MANAGEMENT


368 30. ANTITERRORISM AND VIP PROTECTION

performing their own tests. Protection be at least two means of communication


officers must be familiar with equipment available to the PPS.
manuals for equipment and perform tests 12. Practice duress codes (verbal and
of the equipment at the start of their shift. nonverbal) so that secret, emergency
Operational tests using standard test messages can be transmitted at all times.
components must also be conducted at 13. Take appropriate action in a tactful
prescribed intervals. manner to ensure that antiterrorist
3. Rotate personnel assignments as often security personnel (airport or nuclear plant
as practical, take notes, and perform protection officers; personal protection
communication checks to maintain and specialists) do not become occupied
insure personnel alertness. and burdened with nonsecurity duties.
4. Check all areas that the person, or Auxiliary duties are important; they are
materials being protected, are about to enter nice to do but security duties are the most
before they enter. important; they must be done.
5. Maintain weapons and other emergency 14. Vehicles should be driven so that there is
equipment in position so that they can be always room to maneuver in case escape is
employed instantaneously. If it can’t be, necessary. Drive on the left side of the road
something is seriously deficient. to prevent the vehicle from being forced off
6. Ascertain the legal implications of the shoulder. Protective services personnel
carrying or using weapons before they are who drive should have specialized training!
carried. Never assume something is legal; 15. Always keep parked vehicles locked and
check it out first. secured as much as possible with alarms,
7. Be familiar with what belongs in an guards, or other techniques.
area and what doesn’t, so that explosives, 16. Check out the vehicle prior to departure
weapons, and surveillance devices can be for basic mechanical soundness (gas in the
detected. tank, fan belts, and tires in good condition).
8. Use cover and concealment to their Have a detailed check done regularly by a
utmost. Stand behind objects which can mechanic.
shield you from bullets (cover) and have the 17. Before departure, check in and around the
protectee do the same whenever possible. vehicles for the presence of unauthorized
Hide movements via darkness, tinted glass, personnel, or any attempts at tampering
or drawn blinds (concealment). Maintain with the engine, gas tank, doors, tires, or
light and noise discipline at appropriate undercarriage.
times such as on patrol. “See others before 18. Assess the security of the route and
they see you; hear others before they hear you.” location being traveled prior to departure.
9. Select positions that provide the greatest 19. Establish and maintain positive working
visual vantage point. This may be a corner relationships with agencies or departments
of a room or an elevated position. that can provide support services. Be
10. Stay close enough to persons who are being friendly, polite, and tactfully inquisitive
protected so that effective defensive actions enough to find out how much and what
can always be taken, yet not so close as to type of assistance they can and will provide.
intrude on the principal’s personal space. 20. As searching is almost always part of
11. Plan for communication failures the security function, keep in mind and
and develop alternate means of practice the principles of searching which
communications. There should always can be applied to any type of search.

VIII. RISK AND THREAT MANAGEMENT


SPECIFIC TECHNIQUES FOR ANTITERRORIST SECURITY 369
a. Identify the search object; know what center of a building. An explosive placed in
is being looked for. The more known, these locations would do the most damage.
the better! Protection officers must know Radiological, biological, or chemical
what weapons or explosives look like. WMD’s would be most damaging near
Recognize that the ability to conceal a air intake systems. In the event of a threat,
device is only limited by the imagination these areas might be searched first. Other
and resources of the adversary. Look for than priority searches, search patterns
indicators that might reveal an explosive should incorporate overlap so that no area
device; improvised wiring and switches, is missed during the search.
overweight vehicles, odors of chemicals, e. Search thoroughly using visual
fertilizer, or fuels, and recent “repairs” assessment, touch, hearing, and aids
that might hide a concealed compartment. such as detection equipment, dogs,
Ongoing professional education is valuable. flashlights, and mirrors. “Look before
b. Establish parameters for the search; touching” is always good advice! One
know boundaries for the search. technique is to use visual angles. Walk
Determine how thorough and intrusive the around the object, vehicle, or person to
search effort must be. be searched in both directions. Look at
c. Assess the environment to be searched them from various angles to see if there is
for obvious items, as well as the anything hidden. Do this before actually
development of a search system. moving in to conduct a search.
A general scan of the area (visual, audio, f. Spread out or open up the person,
olfactory or smell) should always be used. package, or vehicle to be searched. If a
d. Devise a systematic method for vehicle is searched with all the doors, etc.,
conducting the search such as top to open it is easier to see items that don’t
bottom, front to rear (with bomb searches, belong. The same is true with baggage
go bottom to top) after analyzing the or persons. Have the baggage opened
search environment. Each pattern or up with the contents carefully removed
system must be based upon the complexity and stacked. Have the person assume a
and time necessary to conduct the posture with his/her arms outstretched
search. How large an area/person; how and feet a shoulder width or more apart.
complex—how much stuff to search—and g. Continue searching until the entire
how much time available will determine area has been searched—don’t stop
the type of pattern used. In many cases, after finding one item (or person, if it is
a priority search is used. This means that a building search). Terrorists may have
the most obvious or accessible areas are planted secondary explosives. Don’t
searched first. Lobbies and restrooms become a secondary victim! And don’t call
of buildings searched for explosives in a bomb squad until the entire area has
would be an example. Another would be been searched and the technicians know
searching the hand, ankle, and waist areas precisely what the extent of the problem
of a person for weapons—the weapons is. They do not like surprises!
are most likely to be hidden there and are h. Disturb the environment as little as
most accessible to the person carrying possible during the search; try to observe
them. Alternatively, priority searches can before you touch something. Look before
be of areas that are most vulnerable, such touching. This is important for safety as
as the computer center, or power or heat well as human relations concerns—nobody

VIII. RISK AND THREAT MANAGEMENT


370 30. ANTITERRORISM AND VIP PROTECTION

wants their person, personal effects, or other counterterrorist security person


vehicle, or office to be rummaged through. should be a physical security specialist first
i. Be as polite, considerate, and courteous and foremost. An understanding of the theory
as possible. Professional conversations of physical security and risk management,
with those being searched make the including various responses to risk and the
search more efficient. Interview the physical security planning process are crucial
individual being searched to learn more to the success of his/her mission.
about what may be found. This is part of 2. Knowledge of terrorism, especially of
the assessment of the search environment. terrorists operating in the immediate work
j. Search with appropriate personnel such
area and those who have targeted similar
as a searcher and a cover officer/access
facilities. Reading various newspapers is
controller. The searcher conducts the search
essential. So, too, is keeping in contact with
while the cover officer or access controller
professional groups such as a local chapter
oversees it so that it is done properly. The
cover officer also acts to insure that every- of ASIS (American Society for Industrial
thing is done safely. He/she intervenes Security) International or state crime
appropriately if there is an imminent threat prevention officer associations.
against the search officer. 3. Public relations skills, so that security can
k. Evaluate the search effort. This is done be maintained unobtrusively. Manners,
with an observer such as a cover officer/ etiquette, and public speaking are all
access controller. The search must be done essential.
properly and completely. The final part 4. Education (college), sufficient to
of evaluation is to determine when the communicate, understand, and record
search is finished. information that is learned during training
or on the job.
5. Physical fitness, so as to be able to perform
PROFESSIONAL DEVELOPMENT strenuous tasks during emergencies and so
FOR PERSONAL PROTECTION that martial skills can be learned (one must
SPECIALISTS be fit to fight).
6. Martial skills, such as the practical use of
Antiterrorist security personnel must have weapons and defensive tactics. Training for
highly developed professional knowledge and the “five-second fight” where the adversary
skills in order to be effective. They must think is neutralized as quickly as possible, or as a
in terms of the various areas of competency means of low-key, almost invisible control
required. By focusing on these competencies, over a disruptive person who is approaching
the protection officer can better chart a course a principal, is important.
for continuous professional development. In 7. Familiarity with explosives and the
general, counterterrorist security personnel weapons of terrorists, so as to be able
operating in any environment (i.e., personal to identify dangerous items. This means
protection specialists, nuclear security officers, knowing standard military and commercial
airport security officers, etc.) must be proficient
explosives as a start. It also means being
in the following areas:
able to recognize improvised explosives
1. Knowledge of physical security concepts and and keeping abreast of the latest means of
techniques. A personal protection specialist employing them.

VIII. RISK AND THREAT MANAGEMENT


PERSONAL PROTECTION SPECIALISTS (PPS) 371
8. Knowledge of security equipment. The as Nine Lives Associates are invaluable in this
application of technology can be a great regard.
asset, but only when done correctly. Generally, a protection professional is called
Attending professional meetings and trade upon to protect a principal for a short period
shows can help a great deal. This is a key of time. It may be during a speech, a concert, a
area of competency in counterterrorist meeting, and so on. A typical example would be
security. Unfortunately, it is often ignored. a police department that deploys a few officers
Antiterrorist security personnel should to VIP duty while a celebrity is in the city. For
read a lot of equipment manuals! this reason, PPS functions are probably impor-
9. Searching skills used for bomb, tant in the repertoire of professional compe-
personnel, building, package, and vehicle tency for virtually all protection officers.
searches. This is usually a sorely neglected Knowledge of the protectee’s business and
area; oftentimes officers conduct searches personal habits is very important. PPS’s must be
just for the sake of following procedures. able to plan out security measures in accordance
Keep in mind that the purpose of a search with the principal’s business and personal life-
is to find something. style. He or she must be able to devise protective
10. Professional dedication to enable one to strategies that are reasonable and unobtrusive.
put up with boredom, long hours, and Embarrassment to the principal is a major threat;
uncooperative persons. the PPS should not do anything to cause this!
Driving skills and knowledge of vehicles
are especially important to the PPS. Much of the
PERSONAL PROTECTION time spent guarding executives and other VIP’s
SPECIALISTS (PPS) is while those persons are traveling. Specialized
driving classes should be attended. Knowledge
Many people still think of a “bodyguard” as of airline customs and regulations should be
being a physically tough individual who has an acquired and kept up to date. In effect, per-
imposing appearance and/or highly developed sonal protection specialists should be “travel
martial skills (martial arts, firearms, other weap- consultants”!
ons). While there may be a need for such an Study and master personal security systems
individual, and the martial skills have practical to prevent crime. In many areas, attacks from
application, there is much more to the makeup local criminals are the most probable threat.
of a personal protection specialist (PPS). Like A PPS should be adept at performing home
other counterterrorist security personnel, the security surveys. They should be able to set up
PPS must be a security practitioner first and a security systems at residences, hotel rooms, and
“trained killer” second. Of even greater impor- apartments.
tance to the PPS is to have highly developed Develop emergency medical skills. Every
communication and human relation abilities. PPS should be certified in first aid and CPR
Etiquette and the ability to blend in with the (cardiopulmonary resuscitation). They should
protectee are more important than being able to be aware of, and plan for, any medical prob-
destroy all opposition. lems that the protectee might have. Advanced
Few people perform PPS duties on a regu- emergency medical training is a real plus for
lar full-time basis. Those who do generally personal protection specialists as medical emer-
have proven themselves through a series of gencies can arise at any time.
assignments. They usually obtain their posi- Martial skills are important. These skills
tions through networking. Organizations such must be practiced and refined. In order to learn

VIII. RISK AND THREAT MANAGEMENT


372 30. ANTITERRORISM AND VIP PROTECTION

them adequately and safely, and employ them Manners, deportment, and decorum will
in an emergency, security personnel must be in “make or break” a PPS more quickly than any-
excellent physical condition. Here are some tips thing else. Proper dining etiquette and the ability
on physical training: to understand such aspects of corporate proto-
col, such as the conduct of meetings, are every-
● Develop endurance and stamina through day issues that confront a PPS. In many cases,
running, swimming, or sports activities. persons with a criminal justice background have
● Develop explosive power by sprinting, lifting great difficulty adjusting to upper-class society.
light weights rapidly, lifting heavy weights, Anyone wishing to become involved in execu-
and maintaining flexibility. Plyometrics are tive protection must become adept at manners
often used by athletes and can certainly be and dress. A trip to the library or research over
adapted to emergency skill development. the Internet for information on this might be the
● Static strength, or the ability to apply force most important career investment that an aspir-
for an extended period of time, can be ing PPS can make.
developed by practicing holding weights up
or remaining in push-up or pull-up position
for a period of time.
PROTECTING THE PRINCIPAL
● Hand strength—which is important for
grabbing and using any type of weapon—can
The operational aspects of guarding execu-
be developed in any one of a number of ways.
tives, celebrities, political leaders—or witnesses—
Squeezing a rubber ball is the most effective.
encompass a wide range of tasks and duties.
Crumpling up newspaper pages with one
Personal protection is a specialty that requires
hand, doing fingertip push-ups, pull-ups, and
immense dedication. Here are a few things to
virtually any type of weightlifting involving a
bear in mind when acting as a security escort:
pulling type of motion are other approaches.
● Flexibility is important not only because speed
1. Never leave the protectee unguarded.
is increased, but because injuries are prevented
2. Always be alert and ready to respond to
and body tension caused by stress may be
emergencies.
reduced. Stretch first thing in the morning!
This “sets” your body’s range of motion for 3. Position yourself between the protectee and
the rest of the day. Stretching should be done possible threats.
after a warm-up that gets blood flowing to 4. Enter rooms first to make sure they are
the muscles. During all workouts, stretch and safe. Completely scan the room. Consider
contract muscles. Once the muscles have been closing the blinds to avoid being visible from
contracted, stretch them. Rhythmic stretching outside adversaries.
is a fast, effective method of stretching. It 5. When trouble starts, move the protectee to
involves ten repetitions of a stretch. Taking safety immediately. He or she is your first
care to stretch a little farther each time and only responsibility.
develops flexibility. At night to relax, static- 6. Carry items, such as briefcases, in the
passive stretching can be employed. Try holding nongun or nonweapon hand.
in a stretched position for at least 30 seconds. 7. Always watch the hands of potential assailants.
This will make the muscles grow longer and 8. Review the itinerary and prepare for the
help you relax. Ensure that the muscles are day’s activities well beforehand. Know it!
moved around after the static stretch or one At the same time be able to make necessary
will lose speed of movement. changes and adjustments.

VIII. RISK AND THREAT MANAGEMENT


HOSTAGE THREAT RECEIPT 373
9. Become acquainted with a wide range of receiving a hostage/extortion call. Question
sports and hobbies in which the protectee may available witnesses. Find out as much as
engage so that you may accompany him/her. possible about the hostages, hostage takers,
10. Conceal your position as a personal and the immediate physical environment.
protection specialist from everyone except This includes their prior life history, medical
those who need to know. Blend in and be condition, and emotional condition. Building
part of the principal’s team, not an unwanted layout with access/egress points, structural
appendage! Bear in mind that one of the strength, and utilities must be collected as
biggest detriments to executives and celebrities is well. Intelligence data is crucial to the successful
embarrassment. Out-of-place dress, language handling of a hostage incident. Security forces play
or behavior must be avoided. a key role here in having this information available
to hostage negotiators and special response teams!
3. Notify the central alarm station or
dispatcher of the incident and keep the
HOSTAGE SITUATIONS information flowing.
4. Maintain perimeters, supply information,
Hostage-taking has become a serious problem.
keep a low uniformed officer profile, and
The criticality of these incidents (when a life or
await further instruction.
lives are threatened), coupled with the myriad of
emotional, legal, and public relations problems Don’t try to make a play or be a hero, sim-
that accompany them, make hostage incidents a ply contain the problem and report any and all rel-
concern for all security practitioners. In short, the evant information. Isolation of the problem and
direct and indirect costs of these incidents make information regarding it are the key concerns of
them a serious problem. Security personnel must protection officers during a hostage situation.
be prepared to deal with these situations; they
are simply too dangerous not to worry about.
Hostage situations can occur with organized
politically motivated terrorists. They may also
HOSTAGE THREAT RECEIPT
take place with criminals who use hostages as
According to the U.S. Nuclear Regulatory
shields in order to escape. Domestic incidents
Commission (NUREG 0219 Task 57), the follow-
and the actions of the mentally deranged com-
ing procedures should be followed whenever a
prise additional threat scenarios. Hostage sce-
hostage threat call is received:
narios end when the hostage taker/s give up,
attempt to flee, or are overtaken by tactical units. 1. Stay calm.
In the overwhelming majority of hostage inci- 2. Attempt to verify that the caller actually has
dents, negotiation is the key to resolving them. a hostage by asking for information about the
Protection officers need to contain, control, and hostage and asking to speak to the hostage.
calm the situation. They need to set the stage for 3. Record precise details of the call.
negotiation or tactical assault if that is necessary. 4. Notify the central alarm station or the
security shift supervisor.
1. Isolate the area of the incident (crisis
point). Keep the perpetrators contained and Obviously there should be a hostage threat
don’t allow anyone except negotiators or contingency plan that is operational and updated
tactical personnel near the area. periodically. A hostage threat report form should
2. Obtain as much information as possible. be readily available to security officers and tele-
Use a predesigned threat form when phone operators.

VIII. RISK AND THREAT MANAGEMENT


374 30. ANTITERRORISM AND VIP PROTECTION

IF TAKEN HOSTAGE These are control, coordination, communication,


and information. By employing each of these con-
If a security officer is taken hostage or is in cepts, the incident can be successfully negotiated
close proximity to the hostage taker, there are without anyone getting hurt.
several key points to bear in mind.
1. Control access to the area. Set up an inner
1. Do not do anything to excite or aggravate perimeter around the crisis point where
the hostage taker. Accept your fate, speak only negotiation and tactical personnel are
little, and lower your voice. Speak a little authorized to go. An outside perimeter
slower (“slower and lower”). Assume a excludes members of the public and any
passive/supportive body posture. Display other unauthorized personnel. Within the
palms, keeping hands at your sides or folded outside perimeter is the command post. All
in your lap. Shoulders should be rolled communications and agency liaison emanate
slightly forward and your head a bit forward from the command post. Media personnel
and down. This must be comfortable and should be restricted to a secured location
natural; it needs to be only a very slight within the outer perimeter that is not too
change in posture to be effective. close to the command post. The media’s
2. Identify yourself by your first name and needs should be facilitated as much as
use the hostage-taker’s first name. This will possible in terms of access to power supplies,
aid in having him or her view you as a person office/work rooms, and telephones. Their
rather than an object with which to bargain. comfort and work needs should be met as
3. Don’t speak unless spoken to and much as possible by a public information
weigh your words carefully. As with any officer. They need to do their job, yet
emotionally charged individual, avoid the they cannot be allowed to roam around
words “you,” “should,” and “why.” These unescorted.
are too direct/pointed and tend to place the 2. Coordination is also handled through the
person’s reasoning process on trial. command post. Persons who have a “need to
4. Be patient, remain calm, and try to rest. know” should be supplied with information;
Conserve your energy! This helps to prevent actions of the negotiator(s) are not to be
becoming stressed out, preserves your ability divulged to tactical personnel.
to think objectively, and prepares you for 3. Communication is centered in the
what will probably be a long ordeal. command post. Communications with
5. Analyze the hostage taker(s) as much as the hostage taker should be set up
possible. Try to see things through his eyes. immediately, preferably by telephone. The
Empathic listening is key. communications monitoring capabilities of
6. Analyze the physical environment as much the hostage taker and the media must be
as possible. Look for cover, escape routes, carefully assessed and restricted.
means of communication, and obvious 4. Information is the key to successful
hazards. resolution be it through negotiation or
assault. Everything possible concerning the
MANAGING THE HOSTAGE psychological, physical, and background
INCIDENT characteristics of all those involved in the
incident should be collected at the command
Management of a hostage situation—or other post. Details regarding the physical layout of
crisis event—consists of several key elements. the crisis point, such as the location of utility

VIII. RISK AND THREAT MANAGEMENT


SUICIDE ATTACKS 375
lines, room layout, and building structure, the police what was needed to gain their release
should be obtained. and save their lives. They then sided with the
hostage takers.
This syndrome is important to understand.
NEGOTIATION After the hostages begin to sympathize with the
hostage takers they may deny that any abuse
While hostage negotiation is a complex pro- or aggression took place. They may also make
fessional skill demanding education in psy- statements to the media that are supportive of
chology and years of interviewing experience the hostage takers and any cause which they
capped off by specialized training, it is impor- have. The syndrome can also be used by hos-
tant for security personnel to understand some- tage negotiators who can use the rapport built
thing about it. Security personnel must be able between hostages and hostage takers in order
to render first aid. They must be able to provide to resolve the situation (Becker, 2009).
immediate, necessary actions to reduce the level
of violence. Hostage negotiators may not be
immediately available. SUICIDE ATTACKS
Hostage takers may initiate the negotiation
process with someone close at hand and sim- Suicide attacks have been used throughout
ply not want to talk with negotiators when they history by extremist groups and soldiers dur-
arrive. These are the basic concepts of nego- ing war. What has changed is the use of suicide
tiations: bombings as a tactic. Beginning with the Beirut
bombing of 1983, there have been numerous
1. Stall for time as much as possible. Say that other incidents of suicide bombers. Suicide
you have to check with your boss. bombing has spread to many countries. It contin-
2. Don’t give the hostage taker something ues to evolve as a terrorist technique.
without getting something in return. Defense against suicide bombings includes
3. Make the hostage taker think. Wear him out proactive intelligence. Finding out who is ready
mentally by forcing him to constantly decide to launch a suicide attack and intervening are
things. Slow it down. obviously the best defense. In some cases pro-
4. Never give hostage takers weapons or tection officers can identify terrorist attempts
intoxicants. to conduct surveillance and reconnaissance.
5. Don’t make promises or threats that you Obviously anyone taking photos or notes
cannot keep. should be reported and investigated. Also, per-
sons walking around a facility moving against
the flow of traffic may indicate surveillance in
THE STOCKHOLM SYNDROME progress. As Maggio (2009) points out: if the
terrorists can see the target, then the target can
Hostages who are in captivity for extended see the terrorists.
periods of time may begin to empathize with In terms of physical security planning, ex-
and later sympathize with the hostage takers. tending facility perimeters outward helps to
This phenomenon is called the Stockholm limit the effect of a suicide bomber. So, too, does
syndrome and is named after a 131-hour stand- limiting access that a bomber may have to a
off with police in Stockholm, Sweden, in 1973. group of people—large groups of people are the
After the siege went on for a while, the hos- preferred targets of suicide bombers. Another
tages began to think that they knew better than consideration is blast effect. Within the confines

VIII. RISK AND THREAT MANAGEMENT


376 30. ANTITERRORISM AND VIP PROTECTION

of a bus or train car, explosive force is com- also involve getting control of the bomber’s
pressed and increased, and casualties are higher. hands so that they cannot detonate the device.
Suicide bombers are thwarted by security Some devices, however, are detonated by the
officers. Officers notice the bombers or their handler.
handlers and take action. Basic indications of a Obviously, protection officers in areas where
suicide bomber are bulky clothing in which to suicide bombings are a credible threat need
conceal the explosives, a briefcase, or knapsack. specialized training and procedures for deal-
Behavior includes disorientation, mumbling, ing with this threat. Employer and client policy
profuse sweating, and nervousness. The handler must be adhered to. Grabbing someone without
will be nearby and will have a cell phone. There just cause constitutes the tort of battery. Suicide
may also be a vehicle, perhaps a van, which is bombing attacks must be managed as any other
used to drop the bomber off near the target. risk. Suicide attacks must be carefully weighed
Note: stopping a suicide bomber may involve against the threat of civil and perhaps criminal
moving people out of the area—quickly! It may charges filed against the protection officer.

EMERGING TRENDS
In the late 1970s a branch manager for within the past few years. The professional
Burns International Security Services, Inc. literature must be on top of developments
was interviewed by a local newspaper. In the regarding terrorism and related threats.
interview the manager stated that executive 2. The development of theoretical and
protection would be the future of the contract practical aspects of conducting searches
security industry. This did not happen right is imperative so that training programs
away, but it is largely becoming a reality. can produce graduates who are truly
proficient and professional at the searching
Antiterrorism and VIP protection will con-
function. This must be studied and protocols
tinue to evolve with the threats that confront pro-
developed.
tection officers. In order to meet the challenges of
3. An emphasis on manners and deportment
the future—and be a part of that future—there must
by protection officers so that they can join
be a greater emphasis on the following:
the management team and have a voice
1. The study of various types of threat groups in the organization. As PPS develops as a
and individuals by individual protection more common job function—whether on a
officers. There must also be published regular or occasional basis—there is a greater
research on this in the professional literature. awareness of upper management manners by
It cannot be the exclusive domain of political protection staff.
science or the general news media. Security 4. More academic programs in security and
magazines and journals must feature loss control at colleges and universities are
recent, relevant articles on threat groups needed so that both theory and technology
and individuals. This is occurring but only can be studied. This will also aid in making

VIII. RISK AND THREAT MANAGEMENT


REFERENCES 377

security a more visible career option to management utilization by protection


students who are the future of the industry. officers.
At present security programs are a hard 6. Elevation and professionalization of
sell to criminal justice students. Courses the protection officer is occurring.
in security, however, do fit in nicely with Responsibilities and wages are rising.
emergency management or homeland Government agencies are seeing the role
security curricula. that they play in antiterrorism. So must
5. Embracing of the principles of risk the general public and the legislators who
management by protection officers. This mandate training and licensing. In particular,
assists in more creative solutions to threat the role of the protection officer in collecting
problems. It also helps to marry security to intelligence and assisting in emergency
insurance and accepted business practices. response must be appreciated. It might be
The current emphasis on enterprise said that “The biggest asset in public safety is
risk management helps to support risk private security.”

References Butterworth-Heinemann offers a wide variety of titles


relating to terrorism and emergency management.
Becker, R. F. (2009). Criminal investigation. Sudbury, MA: Please visit http://stbooks.elsevier.com/security or call
Jones & Bartlett. (800) 545-2522.
Maggio, E. J. (2009). Private security in the 21st century: Executive Protection Institute (http://www.personal
Concepts and applications. Sudbury, MA: Jones & Bartlett. protection.com/ or (800) 947-5827) offers numerous
U.S. Nuclear Regulatory Commission. (1978). Nuclear security programs relating to executive protection, corporate
personnel for power plants: Content and review procedures for a aircraft security, and so on. They also publish Providing
security training and qualification program. Washington, DC: Executive Protection and Providing Executive Protection
U.S. Nuclear Regulatory Commission. Volume II. In addition, the Institute administers Nine
Lives Associates, a professional organization of per-
sonal protection specialists.
Resources Executive Security International (http://www.esi-lifeforce
ASIS International has an Information Resource Center on .com/ or (888) 718-3105) provides training courses in
their Web site, which is available to members. There are executive protection and counterintelligence. They also
also a variety of books and videos in the ASIS bookstore. offer an outstanding book, The Executive Protection Bible,
ASIS hosts seminars relating to Terrorism and has a and distance education courses.
Council on Global Terrorism. Visit www.asisonline.org. The International Foundation for Protection Officers
AST Corporation (hits@astcorp.com) has numerous (www.IFPO.org) maintains an Article Archives on their
CD-ROMs and online programs within the HITS Web site, which contains articles on detection equip-
Program on Executive Protection and Homeland ment, terrorism, and related topics.
Security. Note that members of the International The Professional Security Training Network (PSTN) offers
Foundation for Protection Officers receive discounts on programs on bomb search, vehicle search, and executive
AST Corporation programs. protection. Visit www.pstn.com.
BSR (Bill Scott Racing School) (http://www.bsr-inc Tony Scotti Associates (http://www.securitydriver.
.dreamhosters.com/ or 304/725-9281) provides training com/vdi.html) offers courses in evasive driving and
in evasive driving and executive security training. other aspects of executive protection. There is also an
CRC Press (www.crcpress.com) offers a variety of books on article bank, blog, e-mail newsletter, and books for
terrorism and related topics. purchase.

VIII. RISK AND THREAT MANAGEMENT


378 30. ANTITERRORISM AND VIP PROTECTION

S E C URI T Y QU IZ b. The numbers and descriptions of


hostage takers
1. Personal protection specialists should attempt
c. Psychological and background information
to stand out as obvious security personnel
on all those involved in the incident
in the principal’s entourage so people know
d. Numbers, identities, and descriptions of
whom to rely on in an emergency.
the hostages
a. True
e. All of the above
b. False
6. A polite respectful approach will make those
2. Personal protection specialists should only
being searched more cooperative with a search
worry about assassins and kidnappers, since
officer and make the search more effective.
common criminals are unlikely to attack a VIP.
a. True
a. True
b. False
b. False
7. Searches should be conducted randomly
3. A principal is about to enter a room; a
without a pattern that can be detected by
protection specialist should enter the room
adversaries.
before the protectee to make sure it is safe
a. True
and consider closing the blinds to prevent
b. False
outside adversaries from observing activity in
the room. 8. Counterterrorist security personnel should
a. True read and become intimately familiar with
b. False detection equipment manuals, calibration
4. When in the presence of a hostage taker or techniques, and capabilities.
other violence-prone individual you should a. True
attempt to take what actions? b. False
a. Assert your authority so they know you 9. Terrorist groups frequently attempt to infiltrate
are in charge, not the hostage takers a facility’s workforce, including the security
b. Let them know you are skilled in martial arts department, prior to conducting an attack.
and it would be dangerous to confront you a. True
c. Remain calm, use your first name, and b. False
cooperate with the hostage takers 10. Which of the following is the least agreeable
d. Use your time with the hostage takers to time to detect a terrorist plot?
convince them their cause is wrong so they a. While the terrorists are conducting
are more likely to release the hostages surveillance to learn about the facility
e. All of the above b. When a terrorist operative applies for a job at
5. There has been a hostage-taking in a building the site and undergoes a background check
on your employer’s property. What items of c. When a terrorist attempts a rehearsal by
information would be valuable to hostage attempting to penetrate the facility
response teams? d. When the terrorists arrive at the site to
a. The physical layout of the facility conduct the attack

VIII. RISK AND THREAT MANAGEMENT


U N I T IX

INVESTIGATIONS

31 Investigation: Concepts and Practices for Security Professionals


32 Crime and Incident Scene Procedures
33 Interviewing and Statements
34 Foundations for Surveillance
35 Report Writing and Field Notes
This page intentionally left blank
C H A P T E R

31
Investigation: Concepts and
Practices for Security
Professionals
Christopher A. Hertig
forensic examination. An unfortunate reality
CHAPTER OBJECTIVES is that many people greatly underestimate the
● Define investigation and protection importance of investigation within the security
● Explore the scope of investigative activity field. Few texts on criminal investigation even
mention private investigation or security inves-
● Provide a brief history of investigation tigation. Save for the obligatory treatment of
● Explain the need for preliminary and Pinkerton, the texts are mute on the topic.
follow-up investigation There seems to be a feeling that investigation
● Identify the relevance of intelligence, is a highly specialized process that is performed
liaison, writing reports, auditing, and only by police or supervisors. The popular image
interviews to the investigatory process. of private detectives who wear trench coats with
● Explain undercover investigations and their collars turned up and have cigarettes dan-
surveillance gling from their lips has been created and rein-
forced by the entertainment media. However,
● Define behavior/condition analysis there needs to be a readjustment of attitudes by
● Identify 10 points to keep in mind the public, managers, academics who write texts,
when testifying in legal and quasi-legal and officers themselves. With the threat of ter-
proceedings rorism and the proliferation of organized crimi-
nal groups, security personnel must become
involved in the investigative process. And they
need to be recognized for their contributions.
Investigation comes from the Latin word The fact of the matter is that investigation
investigere, which means to track or trace is performed each and every day by entry
(Bennett & Hess, 2001). Investigation can take level protection officers as well as specialized
many forms—from the simple asking of a few investigators. The work of these persons rarely
questions and noting it in a report to a full-scale makes it onto the evening news, but it aids the

381
382 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS

asset protection process in innumerable ways. investigative activity is conducted “in-house” on


The contemporary protection officer acts as a a proprietary basis by and for the investigator’s
management representative, a consultant, an employer. Some activity is contracted out to pri-
enforcement agent, and an intelligence agent. vate investigative agencies that are licensed to
The roles of intelligence agent and consultant perform investigative services to another for a fee.
are perhaps most closely related to investigative Private investigators can be useful if the client
activity. In the former role, the protection officer entity (corporation or government agency) does
reports the presence of actual and potential loss- not have the expertise or manpower resources
causing situations to management. In the consul- to conduct the inquiry. Some cases of complex
tant role, the officer must be knowledgeable of financial inquiries or computer crime require the
the legal ramifications involved in searching per- hiring of specialists. Undercover investigation is
sons, vehicles, and so on. They must appreciate almost always outsourced. Insurance companies
the privacy considerations related to surveillance. may use private investigators to conduct sur-
Investigating suspicious changes in the envi- veillance in areas where travel by a proprietary
ronment they are protecting is “part and par- investigator would be impractical. Surveillance
cel” of what protection officers do. It is essential also requires some equipment; specialists in this
to acquiring information that may be useful in field have the expensive equipment necessary
taking legal actions after a loss. It is also criti- for conducting difficult inquiries. Background
cal toward obtaining intelligence on organized screening firms are often used as they rely on
criminal activity so that preventive actions can local personnel to conduct records searches at
be taken. courthouses. While some data can be obtained
Perhaps a start toward a better understanding via computer, in many cases there is a real need
is to see the scope of investigative activity that is for an old-fashioned hand search of records.
performed by various entities (see Table 31-1). Private investigators generally must be
Investigations are performed by police, law- licensed. They and their employees must meet
yers, government agencies at the federal (FBI), regulatory standards often set by state agencies,
state (attorney general’s office), or local levels which also regulate security officers. There may
(municipal police). They are also performed by be restrictions on offering investigative or security
corporate staff—either investigators or supervi- services on a contractual basis without a license to
sors—as well as private investigative firms. Most do so. There may also be a requirement to work

TABLE 31-1 Investigative Activity by Type and Entity

Investigation Type Investigating Entity

Criminal—felonies, misdemeanors, summary offenses, or Police officers, protection officers, corporate investigators,
ordinance violations state or federal agents, private investigative firms

Accident—work stoppage mishaps involved in production; Police officers, security officers, private investigators,
slips and falls, vehicle accidents insurance investigators, regulatory agency investigators
(OSHA)

Personnel—violations of employer policy; may or may not Supervisory or managerial personnel, private investigators
be a crime or tort (civil offense) (undercover), corporate investigators, protection officers

Background—prior employment checks, criminal or credit Private investigative firms, human resources departments,
checks done for hiring or promotion to sensitive positions corporate investigators, federal or state agency
or for bonding investigators

IX. INVESTIGATIONS
INVESTIGATIVE LOGIC 383
for only a single licensed firm at a time, or to carry have indicators that they are about to take place.
an identification card, pay an annual registration After the unfortunate event has happened, it is
fee, recertify by periodically taking training, and often noted what all the indicators were present
so on. The Fair Credit Reporting Act in the United that should have been seen earlier. Perhaps better
States also places extensive requirements on third playing of the intelligence agent role is one means
parties who conduct background investigations. It of taking corrective action before tragedy strikes.
is important that persons working with investiga- In order to fulfill the intelligence agent role
tive firms as employees or clients fully understand effectively, protection personnel must also be able
the legal requirements of such arrangements. In to report what they observe in an articulate man-
North America, the International Association of ner. They must “get it right” on paper. And they
Security and Investigative Regulators lists state should always reinforce the written report with a
and provincial regulations on their Web site at verbal report to the appropriate personnel.
http://www.iasir.org. Investigation has nothing to do with stylish
clothes, gunfights, or flashy cars. It is not glam-
orous. Rather, it is tedious and exacting. It has
Investigation and Asset Protection Go
to do with fact-finding and research. Investigation
Hand-in-Hand
is simply an objective process used to discover
Uniformed protection officers on patrol or facts about a situation, person, or behavior. Once
plainclothes loss prevention agents must be inti- those facts are discovered, they are recorded
mately familiar with their patrol environments. in an appropriate manner. Investigation has a
They must be able to discern when something great deal to do with research; those who like to
isn’t right. In many cases, unusual or unex- do Web or library research may acclimate them-
plained situations indicate criminal activity. The selves to investigative activity better than those
investigating officer on patrol must be able to who disdain research. Investigation requires
first recognize things that aren’t quite right. This precision and attention to detail. It culminates
could be a vehicle parked in an unusual place, in writing reports about the known facts. These
persons taking photographs, unusual trash dis- reports are the product of the investigation.
posal procedures, graffiti, hand gestures, cloth- Investigation is important because without
ing or “colors” worn around the area, persons facts, management cannot make the correct
conversing with others in an unusual way, etc. decisions. As the security officer is a member
The list goes on and on. Each indicator could of the security management team, it may be
mean a variety of different things; terrorists or his/her responsibility to provide management
criminals conducting surveillance on a target, with information. Usually the security officer
theft of materials, gang activity, or drug dealing. will give investigative information to his or her
One lesson to be learned regarding investi- supervisor and they will provide it to manage-
gations is that major cases are solved via minor ment. He/she reports this information after
incidents. Murderers get caught parking ille- conducting some type of investigative activity
gally or shoplifting. While detectives and other (searching for something, talking with people,
investigative specialists may piece incidents observing something, etc.).
together, it is the patrol officer who takes note of
something and acts upon it that supplies the key
information. Small observations often yield big INVESTIGATIVE LOGIC
results: “Minor Is Major.”
Along a similar vein, a review of accidents, Investigation is a logical, systematic process.
terrorist attacks, or acts of workplace violence all Investigators use two types of logic: inductive

IX. INVESTIGATIONS
384 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS

reasoning and deductive reasoning. With inductive John Fielding published the Covent Garden
and deductive reasoning, a hypothesis is con- Journal, which described wanted persons.
structed about what has occurred. Facts are then Based on the ideas of Patrick Colquhoun, the
gathered that either support it or reject it. There Covent Garden Journal was similar to many loss
may be only a few pieces of the puzzle available prevention department newsletters, America’s
so that the investigator must try and search for Most Wanted television show, and the FBI’s
other pieces. The investigator must look at what tip line on the Internet. Pinkerton wrote about
is most likely to have occurred so that investiga- his detectives and in retirement wrote dime-
tive efforts are not wasted. Note that investigation store novels (these were popular forms of
often seeks to narrow the focus of the inquiry: instead entertainment, comparable to contemporary
of pursuing a vast array of possibilities, the inves- videos or DVDs). Pinkerton is credited with
tigator seeks to reduce them logically to a more coining the terms sleuth and private eye,
manageable number. Inductive and deductive which were popularized through his true
reasoning may aid in doing this. Inductive and life accounts of detective work as well as the
deductive reasoning is also more likely to be used fictionalized dime-store novels that he wrote.
in intelligence analysis. When assessing intel- 2. Advertising and media relations are
ligence information, it may be necessary to con- essential for continued investigative success.
struct a theory of the case. This seems to be true for public entities
In inductive and deductive reasoning, facts are as well as private investigative firms that
collected. Next, a theory about what occurred is depend on direct customers for fees. The
formulated. The pieces of the puzzle are obtained Fieldings published the Covent Garden Journal.
and put into place. The fictionalized Sherlock Pinkerton used posters to advertise, featuring
Holmes and the real-life Allan Pinkerton used a large eye and the saying “We Never Sleep.”
deduction. Investigation of crimes, accidents, or J. Edgar Hoover, who ran the FBI from 1924
work rule violations require the use of inductive until 1972, had a weekly radio show and
and deductive reasoning. hired a publicist. It would appear that what
Each form of reasoning has its place. An inves- the Fieldings started in terms of marketing/
tigative inquiry may begin with inductive rea- public relations was taken to new levels by
soning and then become deductive. Investigators Allan Pinkerton and J. Edgar Hoover.
must always make sure that they are logical and 3. Reward systems tend to breed corruption.
objective. Investigators must never let their preju- Jonathan Wild, a sort of prototype for
dices or preconceived notions interfere with their contemporary private investigators, worked
work. If exculpatory evidence—evidence that under the Parliamentary Reward System.
tends to disprove that the suspect committed the This system paid government rewards
offense—is discovered, it cannot be ignored! to those who captured felons. Under the
Parliamentary Reward System, the thief
taker could keep the felon’s property;
HISTORY OF INVESTIGATION
including his horse if he had one. Wild also
retrieved stolen property for his clients
History teaches some important lessons
and received a percentage of the value of
regarding investigation, including the following:
the property. He used the Parliamentary
1. Writing and investigation go hand-in-hand. Reward System to great effect: he would
Investigation has been popularized through have an associate steal the property,
works by Henry and John Fielding and collect the fee from the client for its return,
Allan Pinkerton, among others. Henry and and perhaps turn in the associate and get

IX. INVESTIGATIONS
FOLLOW-UP INVESTIGATION 385
the Parliamentary Reward. In America, preliminary investigation is the initial fact-finding
private detectives used criminal informants component of the investigative process. It is per-
extensively and collected rewards. They formed when the crime or incident is first discov-
were the predecessors of municipal police ered and is crucial to the success of the follow-up
detectives, who also collected rewards. Allan investigative effort. Preliminary investigation con-
Pinkerton forbade his agents from obtaining sists of several key steps:
rewards, even though in the mid- to latter
1. Attending to injured persons. This must be
19th century, municipal police detectives in
the first priority! First aid followed by care
the United States commonly did so. Present-
and concern are the order of the day when
day civil demand in retailing can be thought
dealing with victims.
of as a type of reward system. A civil demand
2. Detaining those who may have committed
letter is sent by a third party to apprehended
the crime. If possible, engage in conversation
shoplifters requiring them to pay a fee under
with any subjects who may be in or near the
fear of civil suit. This may create ethics issues:
scene. Some simple inquiry can go a long way
is the loss prevention department in existence
toward solving an investigative issue. This
to prevent loss or gain profit from the fees
must be done carefully and professionally.
collected from shoplifters?
3. Finding and questioning witnesses. A
4. Ethics is crucial to success. Individuals and
neighborhood canvass of the area to seek out
organizations that don’t have good ethics
witnesses should be performed as soon as
may profit initially, but in the long run they
possible. Systematically find and interview
fail. The same is true of investigators and
those who may have seen or heard something.
investigative organizations. Allan Pinkerton’s
4. Preserving the crime/incident scene for
firm (which emphasized good ethics) became
evidentiary purposes. Protect, preserve,
the largest investigative and security firm in
make notes! Control access to the scene, take
the world and is still around after 150 years.
photographs, and note observations. The
5. New markets and new investigative services
scene must be in pristine condition.
must be explored. Whether the customer
5. Forwarding information about the incident
is internal, as with a proprietary security
to the dispatcher, central alarm station
department, or external, as with a private
(CAS), or the shift supervisor. Officers
investigative agency, it is essential to envision
should always keep the command post
the needs of end users. Currently, background
apprised of their current situation. The
investigations are being used by more and
command post must know where officers
more organizations. Certainly computer and
are, what they are doing, and what the
Internet crime are growing concerns; some
situation is at the officer’s location.
firms are moving into that market. The key
6. Completing a preliminary report so that
question is: “What investigative services could
follow-up investigators have adequate
our organization offer that it currently does not?”
information with which to proceed. Ideally,
a follow-up investigator should have the
case handed to them “on a silver platter.”
PRELIMINARY INVESTIGATION

This is the most important aspect of the FOLLOW-UP INVESTIGATION


investigative process. It is also the investiga-
tive stage that security personnel (or uniformed This step in the process begins where the
police officers) generally get involved with. The preliminary investigation ends. It is a process

IX. INVESTIGATIONS
386 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS

of examining the information provided by the It also includes ongoing professional develop-
preliminary report and proceeding to uncover ment such as knowing the signs and colors of
additional data until the case is solved and a local gangs, the types of drugs that are being
complete understanding of the event is attained. distributed, and the indications that extremist
Obviously, the success of the follow-up inves- groups who may resort to acts of terror are in
tigation is heavily dependent upon the pre- the area. These may include handbills, graffiti,
liminary investigative effort. Without adequate and the observation of extremists congregating.
records, evidence, or witnesses, little or nothing Educational sessions sponsored by local police
can be determined, even if the follow-up investi- are a good way of keeping up-to-date on these
gator is extraordinarily proficient. topics. So, too, is reading professional literature.
Follow-up investigations may be completed Proper reporting is essential. Good writing
by the officer who performed the preliminary skills are part of this. Proper management of
investigation, but in most cases they are han- the information within an intelligence system is
dled by investigative specialists, police detec- another key component.
tives, or supervisory personnel. For this reason, A structured, highly developed intelligence
close liaison must exist between those conduct- process consists of the following steps:
ing the preliminary investigation and those
with follow-up investigative duties. 1. A need to collect the information is
identified. No information should ever be
collected until a demonstrated need for it
INTELLIGENCE exists. There must be a clear connection
between collecting the information and
Intelligence is information. It is data or facts the protection of assets. There must also
regarding current, past, or future events or asso- be a management decision to begin the
ciations. Intelligence collection can be thought collection; there must be a policy regarding
of as a part of the follow-up phase of investi- it. In very simple terms, management
gation. However, in many cases, intelligence will instruct protection officers on what
is collected as an ongoing process, not after a type of information they are to collect as
specific event. One reason for collecting intelli- part of the intelligence agent role that they
gence is to be proactive, to be able to see prob- play.
lems developing rather than investigating them 2. The actual collection process. This is where
after they have occurred. Protection officers observations of protection officers and
play several key roles. One of them is the “intel- investigators come in. It is also where data
ligence agent” role. In order to perform this role searches are performed and information
effectively, officers must do the following: from other agencies is obtained. In order to
be effective, the collection process cannot
1. Be observant.
be impeded by having protection officers
2. Know what to observe.
involved in too many tasks. If they have
3. Report the information in an effective
too much to do, they won’t take the time
manner.
to notice things or the care to report them.
Being observant is self-explanatory. Alert, Officers must also receive positive feedback
attentive patrol officers will gather information. from managers regarding their observations.
Inattentive ones will not. An additional concern here is the liaison that
Knowing what to observe comes from being is conducted with other organizations. It
properly trained and socialized by management. must be positive and productive.

IX. INVESTIGATIONS
LIAISON 387
3. The information is evaluated and collated of the accident, there may be an investigation
or organized. The information is evaluated by an insurance company. Many investigations
to determine if it is worthwhile and correct. It involve more than one organization.
must be timely. It should be verified. It is filed In order to be effective, liaison with other
in an organized manner and collated so that it organizations must be developed and main-
can be compared with other information. The tained. During the development phase of liai-
establishment of files for cross referencing son, it is important to note the following:
is important. Without this step, information
1. Understand the role and purpose of
is not referenced with other bits of data and
each organization. This begins with
“the pieces of the puzzle” don’t get matched
the employing organization. Protection
together. The use of computerized data
officers or investigators who do not know
systems such as the PPM2000 report writing
their employer’s mission statements or
software aids this effort.
philosophies are in trouble to begin with!
4. The information is analyzed and
Once this is done, the external organization
interpreted. The meaning of the information
is studied. Employer, client firm, and
is determined. After collation of the data, a
external agency must all be studied.
professional intelligence officer will make a
2. Examine the capabilities of each organization.
hypothesis on what the data means.
With the flow of funding, these are in a
5. The information is disseminated. The
constant state of flux. Determine what
information is given to authorized users
specific services each is capable of offering
within the organization or to external
to the other, such as surveillance equipment,
agencies. This must be done in accordance
surveillance locations, vehicles, and software.
with policy and based on a need-to-know.
3. Meet with and get to know the key persons
6. The information is reevaluated. Intelligence
in other organizations. For a protection
and the process used to collect and analyze
officer, this may be the local police officers
it are reviewed. This is the “feedback loop”
and their sergeant. For an investigator, it
of the intelligence cycle. This enables the
may be his or her counterparts with different
process to be reviewed and improved upon.
organizations. For a manager, it would be
the agency heads. The point is to develop a
comfort level in working with people from
LIAISON
different organizations.
4. Consider meetings or joint training exercises.
In many—if not most—cases, investigative
Also consider hosting seminars that various
efforts are undertaken in cooperation with other
organizations can attend. In many cases,
organizations. A simple example is counterfeiting.
corporations have conference rooms and
The problem is discovered by a teller or cashier
other resources that can be used by external
who notices a suspect bill. The teller or cashier
entities. Informally “talking shop” is fostered
contacts a manager and/or the security depart-
at these face-to-face get-togethers. Informal
ment. Next, the local police and U.S. Secret Service
intelligence exchange occurs.
are brought in. Each plays a role; counterfeit cur-
rency is not simply the domain of the U.S. Secret Once a liaison is developed, it must be
Service. Another example would be an accident maintained. The need for a positive working
in a parking lot. Security and maintenance would relationship with an outside agency cannot be
be involved. If there are injuries, local emergency overstated. Such a relationship requires contin-
medical services and police are called. In the wake uous care to maintain.

IX. INVESTIGATIONS
388 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS

1. Be respectful. Ask how you can help. for working space, phone lines, and so on.
Oftentimes protection officers can perform A police department doing an interview or
simple tasks for outside investigators such interrogation may need to use a conference
as holding the end of a tape measure at an room. They may also need to review
accident scene. surveillance tapes or disks. There are also
2. Get to know people individually. equipment needs that can be met such as
Introducing oneself with local police loaning vehicles, surveillance equipment,
and other investigators is a start toward and so on, to police agencies.
building a trusting relationship. 10. Consider joining investigative
3. Know the law! One way of doing this is to organizations. Membership in a
ask police and government investigators professional or social organization that
questions. An investigator who works local police also belong to may be an
a specific area of investigation (identity effective way of forming a bond with them.
theft, auto theft, check fraud, etc.) becomes
intimately familiar with the legal aspects
of the offense. NOTES AND REPORTS
4. Know policy! Complying with employer
policy is necessary. Appreciating another Notes are the foundation of a report. It is
organization’s rules and values is also sometimes said that testifying—the last step
important. in the investigative process—begins with note-
5. Protect incident scenes effectively. taking. Without adequate notes on the crucial
Providing another agency with a safe, details, there can be no effective report, follow-
secure, sterile scene from which to carry on up investigation, or testimony. Reports are what
their inquiry is critical. make or break investigators. They are the sum-
6. Be proficient at preliminary investigation. mation of the investigator’s or protection offi-
If calling on local police detectives cer’s work. Here are some key points on note
to initiate a follow-up investigation, taking and report writing.
providing them with a quality, professional, ● Think of notes as aids in remembering key
starting point is a necessity. details. Don’t think of them as another chore
7. Be proficient at case presentation and to do.
testifying effectively. Being able to ● Headings should be placed at the beginning
present a case effectively is important as so that the notes are organized. The type of
it is the culmination of an investigation. incident, date, time, and place can be recorded
Deficiencies at this juncture can sour first at the top of the notes. This same principle
relations between cooperating agencies. applies to notes taken during classes.
8. Keep the other agency informed. Keep ● Start each set of notes on a new page. Also
them “in the loop.” Remember that make sure to skip a few lines after each entry
when you are working with government so that additional information can be added.
agencies in all likelihood you are acting This also applies to notes taken in classes!
under “color of law.” The Constitution of ● Always have a notebook available, even if
the United States may be involved here tape recorders or computers are being used;
and always be in a support services mode old-fashioned paper and pencil are needed
when working under “color of law.” as backup note-taking aids.
9. Provide external agencies with resources ● Periodically check notes. Summarize what
as appropriate. Accommodate their needs is written to witnesses giving statements

IX. INVESTIGATIONS
AUDITING 389
so that you are sure to get the information protection system or of safety procedures on
correctly recorded. This should always be a weekly/monthly/quarterly basis.
done at the conclusion of an interview; it can ● Security supervisors audit reports,
also be done at various junctures throughout procedures, personnel performance, and
the interview process. training/certification records of protection
● Use abbreviations judiciously. If they are officers to ensure that things are being done
commonly known abbreviations, use them. the way they are supposed to be.
Make certain that the abbreviation used is ● Both contract and proprietary security
correct and that anyone reading the notes managers audit policies, procedures, and
would understand it. “If there is any doubt, training records to see that services are being
spell it out.” properly given to client firms.
● Use rough sketches in notes to pictorially ● Increasingly, we will see managers and
represent incident scenes. Simple hand- supervisors auditing for compliance with
drawn figures can aid in making the notes standard-setting organizations, such as
useful later on. government agencies and insurance carriers.
● Treat notes as the part of the official record Also, professional organizations, such as
that they are. Start each set of notes on a new the Joint Commission on the Accreditation
page. Number each page. Write in ink and of Healthcare Organizations (JCAHO),
cross out and initial each correction that must International Association of Campus Law
be made. The best evidence rule requires that Enforcement Administrators, and others,
the original, best, and highest quality of proof will establish sets of standards. As the
must be used in legal proceedings. For this security industry professionalizes, such
reason, original notes should be maintained. developments are inevitable.
However, check with your company policy ● Accountants and/or fraud examiners perform
on notes. Many security departments insist financial audits of records such as payroll,
that all notes be destroyed immediately after accounts receivable, purchasing, or petty cash.
the incident report is completed and signed ● Forensic accountants may review individual
off by your supervisor or manager. points of sale in retail facilities, parking
garages, restaurants, or bars.

Audits enable the auditor to spot irregu-


AUDITING larities. This can mean a lack of commitment to
proper work procedures caused by inadequate
Auditing is something in which loss con-
training, poor supervision, or demoralized job
trol personnel should be involved. An audit is
holders. It may mean that the level of service
simply a check (or investigation) as to whether
being given by the organization is not up to stan-
or not operations are proceeding as expected.
dard and changes are necessary! It can also signal
There are operations audits which determine if
attempts at thefts, completed thefts, or simply
procedures are being followed as well as finan-
the presence of the opportunity to commit thefts.
cial audits to see if there are any fiscal irregular-
Audits are often the starting point of an investi-
ities. Audits can take many forms, depending
gation, the basic leads being uncovered during
upon the organization’s present need.
routine audits. In other cases, they are part of the
● Security officers audit locks and alarms to follow-up investigation. In these instances, the
maintain the integrity of the physical security investigator needs to either expand or narrow
system. They may also do audits of the fire the focus of the inquiry. Conducting an audit can

IX. INVESTIGATIONS
390 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS

help to make this determination. Additionally, has its strengths and weaknesses; each has its
they can be part of a corrective approach taken to time and place. Some that may be of use include:
remedy any problems that have been uncovered. 1. Document review by either systematic (every
When conducting an audit, there are several document in a set) or random selection (a
important points to remember. sample of documents in a set).
1. Compare what is being audited (job 2. Deliberate error technique in which an error
behavior, procedures, or conditions, is deliberately made to see if it is detected.
etc.) with clearly defined, measurable An example would be a mispriced item at a
standards. These can be written instructions, point of sale (POS) terminal.
procedures, post orders, and so on. The 3. Drills are good ways to evaluate the
analysis of the job behavior (e.g., not signing performance of both systems and
in visitors), procedure (price checks on personnel. These must be done safely and
merchandise), or condition (e.g., faulty in such a manner that they are not overly
alarms) must be objective. It cannot simply be disruptive. In most cases, drills can be
the auditor’s professional opinion. “compartmentalized” so that someone only
2. Communicate the purpose of audits to all needs to describe (orally or in writing) the
employees. Obtain the positive cooperation procedures to be followed. Another method
of those who have input into the audit is to have the scenario limited to a single
process. department or unit. Full-scale scenarios are
3. Conduct audits in a fair and uniform manner often not feasible—even though exercises
with a set standard that relates to everyone involving the entire protection operation
and is used to evaluate everyone. and outside agencies are the best “final
4. Utilize a variety of techniques. Each examination” possible for a security system.
technique gives the investigator a specific 4. Observation of job behavior or systems is a
type of information. Each provides the simple technique that can still provide useful
auditor with a different view. Each shows information. This can be with the unaided
a different “angle” or perspective. Use a eye or by reviewing videotape (openly
combination of techniques to see the whole taken) of someone performing job tasks.
picture. 5. Interviewing personnel is a method that may
5. Document the results of audits. Professional be used to investigate practices. In addition
reports are essential. to one-on-one interviews, survey forms can
6. Evaluate and review audits with relevant be used.
personnel. An exit briefing is one means of 6. A conference held with supervisors is
doing this. In an exit briefing, the auditor a technique often used by managers to
briefly discusses his or her findings with investigate workplace problems, practices,
management prior to the submission of a and procedures. This can be scheduled with
complete report. This gives management regular supervisor meetings or as a separate
rapid feedback upon which to make meeting prior to an external audit by a
necessary modifications. government agency or accrediting body.
7. Follow the chain of command, be tactful, and
make sure the information gets to the right
people, and only those people.
INTERVIEWS
As with any type of investigation, there are a The conducting of interviews is something
variety of approaches to auditing. Each approach that security officers do all the time. In many

IX. INVESTIGATIONS
INVESTIGATIVE OR FOCUSED INTERVIEWS 391
cases, these interviews are conducted informally. 7. Take notes in a manner that records the key
Whether formal or informal, an interview is a con- data but does not impede the interview.
versation with the objective of obtaining information. Don’t take notes if it makes the interviewee
Loss control practitioners who are adept at their uncomfortable. Oftentimes, note taking
jobs can collect information from every conversa- should take place after the incident has
tion. Here are some basic rules of interviewing. been related by the witness. Going over the
information again and taking notes on it often
1. Be pleasant, friendly, and helpful to the does not upset the interviewee’s comfort
interviewee. They are taking their time out to level.
help you! 8. Summarizing and then taking notes may
2. Thank people for their help and always end help. The interviewee may add information
an interview on a positive note. Providing that was previously overlooked. It is
them with a business card for future contact also a good way to make sure that all the
is a good policy. In some cases witnesses information is correct. It is, in effect, an audit
contact investigators later on about the same of the interview.
case. Sometimes they contact them about
other cases. Leaving the door open for future
communications is part of being an effective
interviewer.
INVESTIGATIVE OR FOCUSED
3. Ask open-ended questions that require an
INTERVIEWS
explanation rather than a simple yes or no
Investigative or focused interviews are dif-
answer. “Can you tell me what you saw?”
ferent from interviews with witnesses or vic-
“Can you tell me what happened?” or
tims in that the focus upon the person is as a
“Could you describe that?” are examples of
suspect. A focused interview is only conducted
open-ended questions.
after a substantial amount of information from
4. Use silence (“the long pause”) after the person
other sources indicates guilt of an individual.
has answered a question. Don’t say anything;
Focused interviews are conversations with the
let the interviewee continue the conversation.
purpose of acquiring information, but with
Most people will feel obligated to keep the
obtaining admission of guilt or a full confes-
conversation flowing and add more detail.
sion from the subject as the final objective. They
5. Interview in private—to the greatest extent
should not be conducted by inexperienced and
practical; a quiet, relaxed, private setting
untrained individuals! Investigative special-
will yield more information. The interviewee
ists should perform them. Unfortunately, there
must feel comfortable. They cannot be
are instances where a protection officer without
distracted by noise or activity.
extensive information may come upon someone
6. Be approachable and friendly. Pleasant
committing a crime or policy violation. In these
people are easy to talk to. Astute protection
cases, a brief focused interview is appropriate.
professionals are approachable and can
These are some interrogation techniques:
gain the trust of people. Put the person at
ease with a smile, joke, or off-the-subject 1. Be nonaccusatory. Do not blame or accuse
questions (sports, family, current events). the subject. If the facts are wrong and they
Also make the person comfortable; offer are not guilty, there is an obvious problem.
them a seat and sit next to them (picture Additionally, setting up a hostile relationship
the seating arrangements that TV talk show does no good. The investigator must “sell”
hosts use). This helps to establish rapport. the subject on telling the truth.

IX. INVESTIGATIONS
392 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS

2. Discuss the seriousness of the incident Under Weingarten, any time that an interview
with the person being interrogated. This is is held with an employee that could reasonably
helpful in those cases where the individual be expected to result in disciplinary action, the
falsely believes that they can act with employee is entitled to representation by a union
impunity, that it is “no big deal.” steward or another individual. This rule is lim-
3. Request that the subject tell the story ited to those employees who are represented
several tines. Inconsistencies can be better by a collective bargaining unit (members of a
noted in this way. labor union). Failure to comply will result in an
4. Appeal to the emotions of the subject. unfair labor practice charge being filed through
Let him/her know that everybody makes the National Labor Relations Board. Discipline
mistakes. Allow the subject to rationalize what imposed as a result of the illegal interview may be
they have done. Allow them to minimize the set aside in an arbitration hearing. Employees who
harm that has occurred. Allow them to project have been terminated may be reinstated and given
blame onto someone or something else. back pay for the time that they were off work!
5. Point out inconsistencies in the story to While unlike Miranda in that management is not
the subject. This is better done later in obligated to advise employees of this right, once an
the interview. Anything done to make the employee asks for a union representative (union
interviewee defensive should be used as a steward or co-worker) the interview must cease
last resort. until the union representative arrives—provided
6. Confront the subject with part of the the representative is reasonably available.
evidence. Be careful! Employees cannot ask for a specific representative
who is on vacation simply to avoid being inter-
There are various legal restrictions active
viewed. In these cases, the interview may proceed
during interrogation. Basically, these standards
without the representative present. Alternatively,
do not allow any use of force, threats, or intimi-
the interview may cease. Employees can be told
dation. The Miranda decision required all law
that management will take action with the facts
enforcement personnel in the United States to
that they have (Table 31-2). As a general rule, it is
advise suspects of their rights before asking
best not to force an interview with anyone!
them any questions which focus upon them as
the suspect and which are asked in a custodial TABLE 31-2
setting. Failure to follow these procedures will
result in all evidence obtained via illegal ques- Miranda Weingarten
tioning to be excluded from criminal proceed- Police interrogation of Employer questioning of
ings (the Exclusionary Rule). suspects in a custodial employees concerning
While in most states, private security person- setting. violations of employer rules.
nel are not bound to the Miranda decision, a few Warnings are required Warning is not required—the
courts have placed this obligation upon them. before questioning. employee must make the
All U.S. courts place Miranda standards on pri- request for the representative.
vate individuals who are acting at the direction, An attorney is the A union steward or
request of, or in close cooperation with public law representative of the interested co-worker is the
enforcement personnel. Obviously, the Miranda accused. representative, not an attorney.
rule applies if the security officer has any type of The Exclusionary Rule An unfair labor practice
police powers. Such officers are, in fact, agents of prohibits statements charge may be filed; this may
the government, and acting under “color of law.” made in violation of the result in the setting aside of
Another standard that the U.S. Supreme Court law from being used in a discipline.
criminal proceeding.
imposed upon employers is the Weingarten Rule.

IX. INVESTIGATIONS
INFORMANTS 393
There are legal obligations to caution persons 7. Have the subject sign each page of the
being interrogated. There are also other consid- statement and initial all corrections.
erations to be addressed within the legal arena. (There should be some corrections so that
Knowing the laws of your state regarding inter- the integrity of the document can be clearly
rogation is important. In Minnesota there is demonstrated in court.)
something called the “Tennessen Warning” 8. Have someone witness the statement.
given during administrative hearings. This 9. Use the statement as supporting evidence,
law states that the subject of the interview may not the entire case! Corroborate the
not remain silent, must give the information statement with other evidence. Back it up
requested, and anything they say can be and as much as possible.
will be used against them in any future crimi- 10. Make sure the statement is in the
nal or civil investigation or trial. This is just the subject’s own words and that it is dated
opposite of the Miranda Warning. We believe and signed.
this is a Minnesota State Law only. As a general
rule, the following procedures can save security
practitioners a considerable amount of trouble
in court:
INFORMANTS

Informants are a key tool in many types of


1. Review the case thoroughly before investigations. Often informants provide basic
starting the interrogation. The more that leads that alert loss control personnel to the
is known about the incident or scheme, presence of a problem. They are of particular
the better. This is where good preliminary importance when investigating the activities
investigation comes into play. of a social network such as substance abuse,
2. Interrogate in private, but remove all sabotage, gambling, and internal theft investi-
possible suggestions of duress, such as gations. There are several kinds of informants
weapons, locked doors, and intimidating operating under different types of motivations:
individuals from the environment. If the
subject is not being arrested or under arrest 1. A desire to assist the investigator, either
during the interrogation they must be through public spiritedness or a feeling of
told and they must understand they are indebtedness to the investigator.
free to leave at any time. The subject must 2. A need to “play cop” and act like the police.
understand that they are volunteering to 3. Revenge against a criminal competitor such
remain and are not restricted from leaving as a rival drug dealer.
at any time in the process. 4. Manipulation of the investigator. This is
3. Avoid making threats or promises. common with criminal informants; they are
4. Never physically touch a subject! called “cons” for a reason!
5. If the subject is of the opposite sex, do 5. Financial gain such as the collecting of
not question alone. Have a member of rewards from the investigator.
the same sex present. In fact, regardless 6. The investigator “having them over a barrel”
of sex of the subject, it is always a good and the informant wants leniency from
idea to have a witness present in every charges.
interrogation.
6. Advise the suspect of his/her rights, if Investigators using informants should try to
there is any chance of an obligation to understand the informant’s motivation. They
do so. should investigate their background and fully

IX. INVESTIGATIONS
394 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS

comprehend any and all relationships that they UNDERCOVER INVESTIGATIONS


have had with the subject. One can never be too
careful with informants. These are some tips for Occasionally, there arises the need for an
dealing with informants: undercover investigator. Generally there is no
need for them except when other techniques (sur-
1. Treat all informants with dignity and respect. veillance, informants, etc.) have failed to yield
While most informants are good people, the information or when the special perspective avail-
occasional criminal informant will also be used able to an undercover operative is needed.
for leads/information. Avoid using demeaning Undercover (UC) investigation is a very expen-
terms to describe informants; they perform a sive and risky method to use, and there are numer-
valuable service. Also, the use of such terms is ous problems that can occur during an undercover
hardly professional. investigation. For these reasons, it should not be
2. Keep informants “at arm’s length.” Avoid used unless it is absolutely necessary.
close personal involvement with them. Many Ferraro (2007) maintains that the follow-
informants are master manipulators who ing conditions lend themselves to undercover
attempt to obtain confidential information investigation:
from the investigator.
1. Cases where consistent, reliable information
3. Closely evaluate the value of the
suggests employee misconduct and/or
information that has been given. Be vigilant
criminal activity without sufficient detail
against attempts to mislead the investigator
to prevent the behavior or identify those
or exaggerate the importance of the
involved in it.
information they have provided.
2. Known losses occur in a specific area but no
4. Attempt to verify the accuracy of the
information exists as to how they occur or
information through independent sources.
who is responsible.
Don’t rely solely on the information that
3. A strong suspicion (or actual indicators)
an informant provides to build a case.
exists of on-the-job substance abuse and/or
Corroborate with other evidence.
drug dealing within the workplace.
5. Keep a “tight rein” on the informant; don’t
4. When strong suspicion or actual indicators
let them represent themselves as members
of on-the-job impairment or substance abuse
of the security or police organization.
exist and supervision is not responsive to the
Don’t allow them to do anything that is
problem or is incapable of managing it.
unauthorized or illegal. Some informants
5. When there is an absolute need to compare
perceive that they have a license to commit
actual practices with required or specified
crimes. Never allow that situation to develop.
practices and routine auditing is not possible.
6. Take care of the legitimate needs of the
6. When a high probability exists that the
informant. Assist them when possible in
use of undercover investigation will yield
finding work, transportation, child care,
significant results and all other methods of
and so forth. Be helpful but don’t be duped.
inquiry have been ruled out.
Restrict the help to legitimate needs.
7. “Telephone tipsters” should be kept on Undercover investigation should only be per-
the line as long as possible. They should be formed by competent professionals who specialize
interviewed. They should not be given any in this type of work. Proper training, education,
confidential information. They should be and experience are necessary to prepare the agent
thanked and asked to call back in the future for the role they will be playing. Proper super-
if they have any additional information. vision and control over the agent is essential

IX. INVESTIGATIONS
SURVEILLANCE 395
to ensure that the overall operation is effective. should be credible, it is always best to back
Controls need to be in place to reduce the risk of up one’s case.
danger and legal problems from arising.
In order to use undercover investigation to
the greatest advantage, the following consider- SHOPPING SERVICES
ations must be weighed:
Shopping services are a type of “short-term
1. The objectives of the investigation must be undercover” inquiry where the investigator
clearly defined. Management must know poses as a shopper. They are designed to achieve
exactly what information is required and for the following purposes:
what purpose the investigative effort will be 1. Uncover criminal or unauthorized activity.
initiated. Sometimes called “honesty shopping,”
2. The entire situation must be carefully this may involve making purchases and
weighed from all perspectives (legal, labor observing what the cashier/waitress/
relations, economic, operational). UC bartender does with the money. Attempts
investigations can easily cause more serious to under-ring a point-of-sale terminal,
problems than they rectify. Aside from civil pocket money, and so on are noted. Other
liability issues, there can be the threat of an investigations may audit how items are
irritated workforce. Obviously, that situation priced, how return merchandise is handled,
has potential for serious loss. And the losses or items without price tags are processed.
can last a long time. 2. Assess customer service and employee
3. Strict confidentiality on a need-to-know efficiency. This involves “shopping” a
basis must be maintained. Many operations location and seeing how attentive the sales
are compromised when the persons being personnel are to customers.
investigated find out about it.
4. The proper agent must be selected. They Shopping can be done by specialized inves-
must have the necessary job skills to fit in tigative firms or in some cases on a proprietary
with the work environment. They must be basis. In the latter instance, a manager from
sociable and dedicated enough to see things another store or branch of the business may
through when difficult decisions (turning in be used. This provides an expert view on how
friends, accompanying suspects during illegal things are supposed to be done. It also aids in
activities, staying on the job when illegal organizational development as the managers
activities are not occurring) must be made. participate in an audit process.
Simply “looking the part” is not enough.
5. Liaison with law enforcement agencies for
the purpose of gathering information or
SURVEILLANCE
prosecuting suspects must be done. This
Surveillance is an essential investigative activ-
can compromise the agent. It can also create
ity to loss control practitioners. It can be stationary
numerous other problems if not done properly.
(hidden cameras, “plant” or “stakeout”), mobile,
Always assess the goals and objectives of the
or contact ( rolling surveillance or invisible dyes).
organization a liaison is being affiliated with
Surveillance can accomplish various objectives:
so that conflicts are kept to a minimum.
6. Corroborate the agent’s testimony with 1. Identify suspects in a crime.
other evidence. Agents may not be credible 2. Record the movements and associations of
with arbitrators, judges, or juries. While they suspects.

IX. INVESTIGATIONS
396 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS

3. Identify patterns of criminal or unauthorized before wasting precious time and money. Special
activity. attention must be devoted to communications
4. Collect information for prosecution. and the response to incidents. Investigators must
5. Locate and apprehend suspects. decide what may occur and how they will react
6. Prevent crimes from being committed. This to it. With this in mind, personnel and equipment
can be done via overt or covert surveillance. needs can be addressed logically.
Recording of activity observed during sur-
Once objectives have been identified, the veillance must be done with care. The following
planning process can begin. The entire planning is a sample outline for a surveillance log:
process consists of the following steps: Location/objective (an introductory para-
1. Establish the objective of the surveillance. graph should be written)
Write a clear, concise sentence as to why the Date
investigator is doing the surveillance. What Time (all activity occurring at a specific point
is the purpose behind the investigation? in time is detailed)
2. Reconnaissance of the area where the Attachments (photographs, sketches, etc.)
surveillance will be conducted. Examine Summary (brief concluding comments on
it for avenues of entry and exit as well as observations)
vantage points from which to observe. There
should be several of these! BEHAVIOR/CONDITION ANALYSIS
3. Collect as much information as possible on
the background(s) of subject(s). The more Another tool that investigators can use is
known about the person being observed, the behavior/condition analysis. Whenever there is a
better. Having a firm idea of the person’s crime or accident, the behavior of the perpetrator
appearance is essential to ensuring that the and/or victim can be examined and analyzed, as
right person is being surveilled. Knowing can the conditions present. The behavior and con-
the person’s habits or potential for danger is ditions can be divided into three segments:
also critical.
4. Calculate the personnel requirements. 1. The behavior/conditions that existed
A minimum of two people will be needed before the incident. This view can provide
if the surveillance lasts for any appreciable valuable insight into the criminal method
period of time or if there is danger present. of operation and can also be used for
5. Establish communication. Cell phones, analyzing vulnerabilities. One can gain a
radios, and phone booths as a backup better understanding of what took place and
method can all be used. Security and develop more effective prevention efforts. An
continuity of communication are essential. example might be the approach/entry used
6. Calculate equipment needs. Equipment by a robber at the target. What protection
may consist of binoculars, videotape units, was given to the target? Who would know
log or report forms, possibly weapons, and what the target was? Who would be attracted
disguises such as hats, coats, and glasses. to that type of target (“score”)? What kind
of insurance coverage was held by the
If surveillance operations are planned properly, victim? When applied to crimes or accidents,
the chances for success are much higher. As the contributing factors to the event can be
costs of initiating surveillance activities are high, identified. What was the physical, mental,
it certainly behooves the loss control investigator and emotional condition of the accident
to carefully scrutinize all aspects of the operation victim? What was the lighting and noise level

IX. INVESTIGATIONS
TESTIFYING IN LEGAL AND QUASI-LEGAL PROCEEDINGS 397
at the time of the accident? Would anyone disciplinary hearing, or labor arbitration. Officers
gain by making a false report? What was the are also called upon to give depositions in civil
victim doing at the crime or accident scene? suits. In many cases, the officer will testify in
2. The actual incident itself. What actually took several different legal arenas; one never knows
place during the robbery? What did the robber precisely where an incident will be decided!
say and do? What did the burglar do when Each of these proceedings has a different for-
inside the premises (the burglar’s “prowl”)? mat and takes place in a different environment,
What happened during the accident? What but all require providing factual information in a
was the sequence of events in the accident professional manner. Each of these proceedings
(struck by, caught on, falling, etc.)? places the officer on the opposing side of the
3. The behavior immediately after the incident defendant or plaintiff. During these proceedings,
should be identified and examined. How the successful investigator does everything pos-
did the robber make his escape? Where did sible to appear credible and convincing.
the burglar exit from? How was the stolen Here are some things to bear in mind when
merchandise disposed of? How was the testifying in court:
accident handled? What did the victim or
perpetrator say? Who reported it? When and 1. Always be positive. Project a positive,
to whom was it reported? Who responded to affirmative image. Sell yourself to the judge,
the crime, fire or accident? magistrate, jury, etc.
2. Be neat, clean, and conservatively dressed, as
Once all the behaviors and conditions of an
if you were going on a job interview. Project
incident are identified, it becomes much eas-
a businesslike, professional image. Avoid
ier to analyze and understand that incident.
dressing or talking like a cop or a soldier.
Developing a list of questions for each phase of
3. Sit and stand erect with shoulders squared.
the event also helps to unfold lines of inquiry
Face and look at the jury and judge. Be
and perform a more complete investigation.
serious! This is a serious issue that must be
While this technique is commonly used to inves-
handled in a thoroughly professional manner.
tigate robbery, burglary, and homicide, there is
4. Project your voice to the jury or judge.
no reason to limit its application to these types
Maintain eye contact with them. Address
of cases. Embezzlement, passing bad checks,
them when you’re talking to them. Project
credit card fraud, accidents, bombings, fires,
your voice to the person farthest from you.
and chemical spills can all be dissected in this
This will ensure that you are heard by
manner. Behavioral/condition analysis aids in
everyone who needs to hear you.
understanding the human factors in a loss event.
5. Answer “yes” or “no” to questions posed
Key point: Keep the initial questions general
by counsel or the judge. Don’t clarify
rather than specific. Focus the inquiry by going
or elaborate on your answers unless it is
from general questions to more specific ones.
necessary to do so. If you must clarify a
Never start with highly specific lines of inquiry
point, choose your words carefully and
or the behavioral/condition analysis will fail.
know what you’re going to say before you
open your mouth. Prior to the proceeding,
TESTIFYING IN LEGAL AND consider what questions may be asked.
QUASI-LEGAL PROCEEDINGS 6. Have the case prepared before trial.
Any reports or evidence presented must
Once a case has been investigated, it be carefully prepared. Consult counsel
may become necessary to present it in a court, about the case beforehand to ensure that

IX. INVESTIGATIONS
398 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS

preparation is adequate. Go over the case, essential element within the investigative pro-
review evidence. Plan a strategy with the cess. If the investigative effort is not carefully
guidance of counsel. Review all notes and controlled, man-hours will be wasted, confiden-
reports before the proceeding starts. tiality may be compromised, and objectives will
7. Any notes or reports taken to the stand not be met.
may be examined by the opposing attorney. To begin with, the individual investigator
Be critical of and careful with notes for this must have personal management skills. He
reason. Don’t simply read from notes; consult or she must set objectives, make daily priori-
them only if necessary. Don’t take something ties, and manage time effectively. Proper filing
that could cause embarrassment and a loss and administration of records is important.
of credibility. Only professional information Critically evaluating one’s work is crucial.
should be in an officer’s notebook. In an organizational sense, investigations
8. Avoid any show of sarcasm, conceit, or must be managed by a series of procedures and
disgust with the defendant. Be objective controls. These are some techniques to consider
and unemotional. A professional is when supervising an investigation:
objective. Don’t be afraid to say something
positive about the defendant. 1. Selecting and assigning investigators
9. Never try to argue with the judge or properly. Only the most qualified and
attorney. Be polite and professional, efficient personnel should be entrusted
addressing them appropriately as “Sir,” with investigative duties. Individual cases
“Ma’am,” or “Your Honor.” Find out how should be assigned in accordance with the
to properly address them beforehand. individual expertise of the investigator.
10. If unsure as to what occurred, say so. Note that this does not necessarily mean the
Don’t be afraid to admit you don’t know investigator with the most seniority.
something or aren’t sure. If you are sure, 2. Investigators must be properly trained in the
state so in a positive, affirmative manner. basics of investigation (interviewing, report
Try to avoid saying “I think” or any other writing, surveillance, interrogations, etc.)
expression which displays uncertainty. before assuming investigative responsibilities.
11. If you don’t understand a question, ask They must also be trained in specialized areas
that it be repeated or say that you simply (narcotics, fraud, espionage, undercover,
don’t understand it. computer forensics, etc.) should they be
12. Don’t be afraid to admit that you’re wrong assigned these investigative duties. Training
and be honest in all matters. needs must be analyzed carefully. Periodic
13. Critique your performance in order to upgrading must be done in regard to legal
improve future testimony. Experience is a and technological development.
good “teacher” for giving testimony. Look at 3. All investigations should have clearly
every occasion as a learning experience. Don’t defined objectives. These objectives should be
be afraid to watch others testify or to ask for observable and measurable. The effectiveness
critiques from others on your testimony. of the investigative effort can be gauged by
assessing whether or not the objective was
met, how quickly it was met, and what the
MANAGING INVESTIGATIONS total cost was. This can be calculated in man-
hours expended and other expenses.
Just as investigation is an integral part 4. Case worksheets should be designed to meet
of management, so, too, is management an the needs of individual organizations. These

IX. INVESTIGATIONS
CONCLUSION 399
forms list dates, investigator’s names, case objectivity; it must be used in conjunction with
numbers, persons contacted, time invested, other evaluative methods.
expenses, and results of contacts. Their 3. Review of investigative reports. This gives
efficient design and utilization are musts the supervisor a “quick feel” for how the
for the investigative effort to be properly investigator is performing.
administered in a cost-effective manner.
5. Forms for efficiently reviewing reports can
also be used to great effect. These forms CONCLUSION
enable supervisors to objectively audit
reports submitted by security officers or Investigation and asset protection are inter-
investigators. Their use helps to streamline related functions. Neither can exist in any real
the investigative process while at the same sense without the other. The contemporary pro-
time ensuring that errors are caught early tection officer serves as an intelligence agent
enough to prevent disaster. for security management. As such, he or she is
6. Coordination of the investigation with tasked with collecting and reporting all manner
persons who have a “need to know” is of information on potential loss-causing condi-
important. Law enforcement agencies and tions. Information relating to crimes, accidents,
victims should be kept informed of the and unethical/unprofessional practices has
progress of the investigation. (Keep in mind traditionally been collected by protection offi-
your status with respect to “color of law” cers. Contemporary concerns with terrorism
discussed above. You don’t want to jeopardize mandate that intelligence relating to potential
the evidence in any way.) This is important terrorist activities be collected. Future officers
for maintaining supportive relationships will probably perform more auditing functions
and receiving additional information. designed to catch errors and minimize waste.
Special concern must be given to the victim. In most cases, protection officers are involved
Victims need emotional support and a clear in performing preliminary investigations. As the
explanation of judicial procedure if they are to preliminary investigation is the most important
feel comfortable following through with the phase of the investigative process, it is essential
prosecution process. that it be conducted properly. This ensures that
both security management and public police
Investigations can be supervised and evalu-
agencies can uncover facts necessary for the
ated through a number of techniques. As with
completion of their respective missions.
auditing, no single technique is adequate to
Proficiency and future growth and develop-
provide a complete assessment. Using several
ment in investigation depend on a mastery of
methods in concert with each other provides
the basic skills. Protective service professionals
the best results.
must master interviews (every conversation is an
1. Statistical analysis of numbers of interview), note taking (edit and review notes at
apprehensions, conviction rates, amounts of various stages of the investigation), and report
stolen property recovered, and numbers of writing. Efforts must also extend to testifying in
complaints against the investigator can also legal and quasi-legal proceedings. Effective oral
be used as an indicator of job performance. communication skills are a necessity if cases are
2. On-the-job visits can always be used as a to be presented effectively. They are also inte-
technique. Good supervisors are “coaches” to gral to the development of a professional image
their subordinates. However, as an assessment and more productive relations with manage-
method it is limited in effectiveness and lacks ment, police, clients, and the public at large.

IX. INVESTIGATIONS
400 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS

EMERGING TRENDS
As we deal with large scale disasters, arsons, or nurses, etc. Background checks are the fastest
terrorist bombings, our ability to move from the growing area of investigative activity. Most of
emergency response phase of the event to the inves- these investigations are being conducted by spe-
tigative phase is improving. Fire and EMS personnel cialized firms such as USIS. There has been an
are being taught crime scene preservation. Crime explosive growth in the number of private inves-
scenes must be more carefully processed than ever tigative firms specializing in employee back-
before. New scientific advances are enabling the ground investigations. There are hundreds of
collection of physical evidence such as DNA. such companies in the United States alone.
General loss interviewing is being done more Not all background investigations are per-
frequently. This is a general conversational inter- formed by investigative firms. Some are con-
view performed after an inventory has been ducted by governmental agencies such as the U.S.
conducted. It may also be performed after an Office of Personnel Management. In-house secu-
“Orientation to Loss Prevention” session. It is rity departments may also conduct backgrounds;
somewhat open and informal; interviewers do in other cases human resource departments do
this to uncover possible loss issues. Patrol officers them. HR departments may also conduct part of
also do this, as a general conversation with people the inquiry and contract out portions of it such as
encountered on patrol may lead to some indica- criminal records or credit checks.
tion of a problem. This initial information is then With increasing privatization, it is likely that
studied and further investigation conducted. The a greater proportion of investigative tasks will be
key is to make every conversation an interview, performed by private investigative agencies and
albeit in a subtle, easy, conversational manner. proprietary security departments. Driving forces
Interviewing is becoming a more structured, for privatization are decreased budgets for pub-
methodological undertaking. There is more plan- lic agencies and the need for specialized expertise.
ning before going into an investigative interview Public police agencies will probably contract out
and more time spent in building rapport. In law for various types of investigative services in the
enforcement, videotaping is being used more future more than at present. Investigative functions
often, whereas corporate interviews are using not currently envisioned will be carried out by both
a two-person team approach. At the conclusion proprietary and contract security organizations.
of the interview, the interviewer is debriefed by In many corporate settings investigative plans
another investigator. This debriefing session is are developed by investigative teams. These consist
done for both operational reasons (making the of human resources, legal, security, IT, and so on.
interview better) and as part of Critical Incident The results of the investigation are reviewed by top
Stress Debriefing (CISD). CISD is designed to management. Obviously, thoroughness and precise
help the interviewer deal with stressful situa- documentation are required in these situations.
tions. The latter may occur after a focused inter- There is a greater need for investigators to have
view where the interviewee gets very emotional computer skills. MS Office software is used exten-
and/or discusses a traumatic event. sively. Research and intelligence functions are
Background investigations are becoming performed online. Access control and surveillance
more commonplace. Increasingly, there is a legal logs are reviewed; the latter is becoming more
requirement to conduct a preemployment check important as video surveillance increases. Analytic
such as with schoolteachers, child care workers, video is becoming more common in both work

IX. INVESTIGATIONS
RESOURCES 401

environments and public streets. Once the infor- investigative process. Obviously it is unfair for
mation is collected, there is a need for some man- a retail loss prevention agent to suddenly give
ner of human review. The information may also be a police detective 30 bad check cases all at once.
moved into separate files for reporting purposes. Managing the investigative workload must be
Liaison between different investigative enti- given some thought. We cannot “dump on” our
ties is increasing and is taking place earlier in the investigative partners.

References so that they may better perform investigative functions. It


also helps prepare the learner for future professional certi-
Bennett, W., & Hess, K. (2001). Criminal investigation. fication. There are two texts (this being one of them) and
Belmont, CA: Wadsworth. a series of online papers. The papers cover Surveillance,
Ferraro, E. (2007). Undercover investigations in the work- Intelligence, Background Investigation, and Interviewing.
place. In J. Fay (Ed.), Encyclopedia of security management. The Foundation also has membership opportunities avail-
Burlington, MA: Butterworth-Heinemann. able to protection officers and investigators.
The Loss Prevention Foundation offers a variety of courses
Resources and certification programs in Retail Loss Prevention.
Visit http://www.losspreventionfoundation.org/
ASIS International (703/522-5800 or www.asisonline.org) LPJOBS.COM features jobs, educational programs, and
has a Council on Investigations. ASIS also has an exten- articles about retail loss prevention in the magazine Loss
sive library of books and videos for members to bor- Prevention. The magazine has articles on interviewing
row (Information Resource Center) or purchase (ASIS and other aspects of investigation.
Bookstore). There is also the Professional Certified The National Association of Investigative Specialists
Investigator (PCI) designation for investigators who offers books and membership to private investigators.
have case management experience. Visit http://www.pimall.com/NAIS/dir.menu.html.
Association of Certified Fraud Examiners (800/245-3321 or The Professional Security Training Network (www.pstn
http://www.acfe.com/). The Association sponsors the Cer- .com or 800/624-2272) has an extensive array of instruc-
tified Fraud Examiner (CFE) designation and produces a tional programs dealing with investigation, interview-
number of computer-based home study programs. There ing, and testifying.
are also local chapter meetings and seminars in various John E. Reid and Associates specializes in interviewing
locations. Student membership is available to ACFE. So, and the detection of deception. Reid offers videos and
too, are a series of faculty discounts. training courses on interrogation. See www.reid.com
AST Corporation (http://hits.astcorp.com/) provides an or call 800/255-5747. Members of the International
array of CD-ROM and online programs for investiga- Foundation for Protection Officers receive a discount on
tive and security personnel. People who complete these Reid programs.
programs may receive certificates from the International Security Supervision and Management: Theory and Practice
Foundation for Protection Officers. of Asset Protection has chapters on Investigation,
Butterworth-Heinemann, an imprint of Elsevier Science, Report Writing, and Testifying. The Investigation chap-
offers numerous investigative texts such as Legal ter details how investigations can be managed and pro-
Guidelines for Covert Surveillance in the Private Sector, vides useful information on intelligence. The book is the
Corporate Crime Investigation, The Art of Investigative text for the IFPO Security Supervision and Management
Interviewing, The Process of Investigation, and many oth- Program and is available from Elsevier (http://www
ers. Visit http://stbooks.elsevier.com/security or call .elsevierdirect.com/index.jsp). Completion of the Sec-
800/545-2522. urity Supervision and Management Program is the
CRC Press Inc. (800/272-7737 or www.crcpress.com) offers first step toward designation as Certified in Security
several investigative texts. Supervision and Management (CSSM).
The International Foundation for Protection Officers Wicklander and Zulewski (www.w-z.com) offers a variety
(877/247-5984 or www.ifpo.org) offers a certificate program of investigative services. They specialize in interview
in Crime and Loss Investigation. This program is designed training and are highly regarded within the investiga-
to aid students in learning about key investigative topics tive industry.

IX. INVESTIGATIONS
402 31. INVESTIGATION: CONCEPTS AND PRACTICES FOR SECURITY PROFESSIONALS

S E C URI T Y QU IZ b. Thank people for their help


c. Summarize
1. Accident investigations can be investigated
d. Don’t allow the subject to sleep
by any of the following except:
6. All except which of the following is a key
a. Private investigators
step in preliminary investigation?
b. Insurance investigators
a. Attending to injured persons
c. Federal or state agency investigators
b. Preserving the crime scene
d. Security officers
c. Interviewing the suspect
2. The foundation of a good report lies in and d. Detaining those who have committed the
begins with: crime
a. Intelligence 7. Informants are a very expensive and risky
b. Notes and reports method to use:
c. Interviews a. True
d. Investigative logic b. False
3. Weingarten established the Exclusionary 8. An officer can testify in several different
Rule, which prohibits statements made in legal arenas for a single case:
violation of the law from being used in a a. True
criminal court: b. False
a. True 9. On-the-job visits can be used to evaluate
b. False investigations:
4. A case effort undertaken in cooperation with a. True
other organizations is called: b. False
a. Auditing 10. The single overarching goal of all
b. Intraintelligence investigations is:
c. Undercover investigation a. To discover facts about a situation, person,
d. Liaison or behavior
5. Which of the following is a good investigative b. To continue an ongoing process of collection
interviewing technique? c. To win the “credibility battle”
a. Request that the subject tell the story d. To analyze the behavior of the perpetrator
multiple times and/or victim

IX. INVESTIGATIONS
C H A P T E R

32
Crime and Incident Scene
Procedures
Dennis Shepp

Some incidents might merely require the record-


CHAPTER OBJECTIVES ing of information in an incident report for
● Define an incident that requires the investigation or statistical tracking. When an
protection officer’s attention incident occurs, it is important that the scene is
● Clarify the protection officer’s role at an protected so that evidence is not damaged or
incident scene lost. This chapter will relate valuable informa-
tion and skills the protection officer will require
● Define incident scene boundaries and to manage a scene until expert and professional
explain how to maintain them assistance arrives.
● Define evidence and explain how to
preserve it
● Emphasize the importance of the WHAT IS AN INCIDENT?
protection officer’s role in maintaining
the integrity of the incident scene An incident is a loss-event occurrence of some
● Provide guidelines on how to interact type that in some way impacts an organization.
and work with responding and This may be a loss (like stolen property) or some-
investigating law enforcement thing that happened that the organization wants
tracked through reporting (like false alarms).
Most organizations want to track the number of
incidents that happen for various reasons, mainly:
It is the protection officer’s objective to pro- ● To track the cost of a loss event (example:
tect assets through the prevention of loss. To do cost of lost property)
this, they will use the knowledge and skills they ● To analyze trends of loss costs (example:
have gained toward preventing incidents or “How much the organization loses to
crimes that cause losses. Nonetheless, incidents computer thefts in a year.” This is also
will occur and some of them will result in losses. referred to as statistical tracking.)

403
404 32. CRIME AND INCIDENT SCENE PROCEDURES

To track loss event information, the organiza- THE SCENE


tion needs to know:
An incident scene can be found in a variety
● What was lost? of locations. An incident scene can be an area of
● Who lost the property? land or property, such as a room where a bur-
● Who owns the property? glary has occurred and computers were stolen.
● Where was it lost? An example on an even larger scale could be
● When was it lost? an entire property where an explosion and fire
● Why was it lost? have occurred. In this case, the boundaries can
● How did it happen? be quite large and include a huge area within
The importance of effectively collecting the them. When the protection officer responds to
information needed to report and investigate the scene they must determine what the bound-
incidents cannot be emphasized enough. This aries are and what exactly needs to be pro-
is why protecting the area where an incident tected and why. For example, the scene could
has occurred is important. This enables a more involve an area as small as a notebook com-
effective investigative process. puter. In this example, the scene that requires
Some incidents involve criminal activities. Here protection could have narrow boundaries,
are some examples of typical criminal activities for example, the computer room and imme-
likely to occur: diate area around where the computer was
stored.
● Theft The important consideration is that when
● Vandalism responding to a call, or as part of a patrol, a
● Fraud protection officer may discover an incident
● Assault scene that will require security. In most cases,
● Homicide the expectation from management for the pro-
● Burglary tection officer will be to protect the scene until
someone with more expertise arrives to con-
As previously noted, many incidents, prob- duct an investigation. This is normally the case;
ably in most cases actually, an incident will not the responding officer will have an investiga-
involve a criminal situation. Some examples of tive role, however minor that may be. In almost
noncriminal incidents could be: all situations a successful conclusion of an inci-
dent will begin with protection of the incident
● Alarms (fire, HVAC) scene.
● Responding to an accident (vehicle,
workplace, recreational)
● Service requests such as responding to calls
for assistance to an employee or visitor as a HAZARDS TO AN INCIDENT
security escort SCENE
● Complaints of lost and/or found
property To protect the scene, the protection officer
● Insecure doors should understand what they are protecting the
● Fires scene from.
● Harassments The reason an incident scene needs bounda-
● Administrative breaches with organizational ries and protection is from contamination,
policy and procedures either deliberate or from accidental external

VIII. RISKAND THREAT MANAGEMENT


PROTECT AND PRESERVE THE SCENE 405
influences. Here is a partial list of common office door, posting a security officer, and post-
examples: ing notices may be sufficient.
In other situations where the scene needs a
● Weather conditions contaminating larger area protected, establishing a perimeter is
evidence more difficult and requires more resources. The
● Bystanders or witnesses inadvertently officer may need to obtain assistance from other
walking on, touching, or taking evidence security personnel to protect the area by posting
● Suspects tampering with evidence officers at strategic locations to deter access and
● Vehicles passing through the scene deploying temporary barricades (crime scene bar-
● Hazards associated with the incident that rier tape, temporary fencing, and Jersey barriers).
may contaminate or damage the scene (fire, Imagine the resources needed to protect an entire
electricity, chemical leaks, debris, water, city block from passing bystanders and traffic.
sewage, etc.)
● Assisting responders (security officers,
EMS, fire, and often police officers who are PROTECT AND PRESERVE
merely bystanders and not investigators or THE SCENE
connected to the incident)
The protection officer is likely to be the
first responder to the scene, assigning him the
responsibility to protect the scene immediately.
DETERMINING BOUNDARIES As soon as possible, establish the boundary or
perimeter and use whatever resources you have
Essentially, and as indicated by Martin A.
immediately available to protect the area. Some
Fawcett, CPO in the 7th edition of The Protection
other recommendations are to:
Officer Training Manual, the protection officer’s
objective when responding to a crime or inci- 1. Call your supervisor for assistance.
dent scene is to: 2. Request assistance from other officers to
protect the scene.
1. Establish the boundary (perimeter) 3. Keep bystanders away from the protected
2. Protect the scene area. Consider that some bystanders may
3. Preserve evidence and scene integrity be potential witnesses; therefore do not
4. Maintain detailed and accurate notes of immediately dismiss them from the area but
everything (Fawcett, 2003) keep them waiting a safe distance from the
perimeter.
These are similar rules established for law
enforcement personnel. To best protect the scene and preserve evi-
When establishing boundaries for a scene, dence, the protection officer should consider
the protection officer will need to consider how how they would investigate the incident. This
spread out the evidence seems to be around the will give them a better perspective on how best
scene. Although establishing a larger protected to protect the area.
or secured area is best, it may not be possible. Unauthorized personnel do not need to access
Determining the boundaries of a crime or inci- the protected area. This includes other security
dent scene may depend on already established personnel and even emergency responders, such
naturally existing barriers. For example, the pro- as the police. Unless the scene has officially been
tection officer needs to protect the office where taken over by the investigating authority, keep-
the notebook computer is located. Locking the ing people away from evidence and inside the

VIII. RISKAND THREAT MANAGEMENT


406 32. CRIME AND INCIDENT SCENE PROCEDURES

perimeter is a paramount responsibility of the Protecting the scene means the area must be
protection officer in charge of the scene. Unless preserved exactly as it was at the time of the inci-
a supervisor has taken responsibility for the dent. Nothing should be moved, removed, or
scene, the person responsible is typically the ini- altered in any way. Nothing should be introduced
tial responding officer. Ensure instructions are to the scene either (example: cigarette butts, gar-
clear when someone takes responsibility for the bage, foot- and fingerprints, or people). This
scene and make detailed notation of: includes touching anything at the scene (which
introduces fingerprints). In fact, the protection
1. The time and date
officer must not touch or walk in any area where
2. The name, rank, and authority of the person
evidence may be disturbed or inadvertently
who has taken responsibility
introduced to the scene. There are times, though,
Bystanders will need to be contained outside when the officer or a responder may need to
the perimeter while the protection officer is pro- move a person or object; here are some examples:
tecting the scene. Although there is a tendency
1. Remove a victim from a potential danger or
to have bystanders leave the area and carry on
hazard at the scene.
with their own business, the protection officer
2. Introduce a foreign substance (such as
does not want to dismiss potential witnesses to
chemicals) to a scene to extinguish a fire or
the incident. There is a delicate balance between
prevent an explosion from a fuel spill. For
having bystanders keep their distance from the
example, water or chemicals from a fire
perimeter yet remain in the area so they are
extinguisher.
accessible to the investigators for an interview.
3. Allow temporary access to the site to
Here are some recommendations:
evacuate bystanders or other victims because
1. To identify potential witnesses, ask if anyone it is the only path for an exit.
saw what happened.
When something like this happens, the protec-
2. Ask potential witnesses to remain in the area
tion officer needs to make detailed notes of what
to be interviewed by investigators.
was changed at the scene and how it was contam-
3. Make notes of contact details, including
inated. The protection officer must remember that
name, date of birth, address and phone
although protecting the scene is important, the
numbers of potential witnesses before
protection of life is paramount and takes priority.
allowing them to leave the scene.
Victims may need to be removed from the scene
The protection officer needs to be consider- so that no further harm comes upon them or the
ate with potential witnesses. People are typically responding protection officer.
busy and will not want to remain at the scene Eating, drinking, or smoking should never
and wait for investigators. It is a responsibility of be allowed at an incident scene (Schiro, n.d.), as
the protection officer to try to politely convince these activities provide other opportunities to
these people to wait. The protection officer has no contaminate the scene.
authority to detain a potential witness; therefore,
they may need to exercise discretion and be very
polite while attempting to convince a potential EVIDENCE
witness to wait until the investigators arrive. If the
circumstances permit, the officer may request the It is important to understand what could be
witness provide a written statement while they considered evidence. There are several types
wait. At the very least, the officer must obtain the of evidence, but for the purposes of protecting
name and contact details of the potential witness. the scene, the type of evidence most relevant is

VIII. RISKAND THREAT MANAGEMENT


EVIDENCE 407
known as real evidence. This is evidence that is evidence that is contained on a hard drive. You
directly involved in the incident (DiCarlo, 2001). may not know it is even there without expert
It is the physical evidence present at a scene assistance. This is extremely important to con-
that connects a suspect (person of interest) or sider when protecting a scene because it will be
helps explain what exactly happened. Physical difficult to protect something you cannot see.
evidence can have numerous forms, such as: Collecting and protecting evidence can be
a huge responsibility, considering the vast list
● Blood (including blood spatter patterns)
of potential items that could qualify as physi-
● DNA samples (blood, bodily fluids, skin,
cal evidence. The collection of evidence should
hair, bone, etc.)
only be conducted by a qualified person, but if
● Fiber samples (clothing, carpet)
somehow the protection officer is required to
● Markings or impressions from tools, tires,
take custody of a piece of evidence, it must be
footprints, handprints, etc.)
done so with extreme care. Often the officer has
● Fingerprints
no choice but to accept evidence if provided to
● A person (a body or evidence of an assault
them by a victim or suspect. If evidence is found
such as injuries, marks, or contact with an
while on patrol it may be necessary to collect
object or another person)
and preserve it so that it is not contaminated. If
● Documents (electronic and paper)
it is imperative that the evidence be collected by
● Computers and accessories (peripherals such
the Protection Officer, then here are some gen-
as hard drives, disks, memory sticks, CD/
eral recommended procedures to follow:
DVDs, MP3 devices, storage mediums, etc.)
● Pieces from a suspect vehicle (damage left ● Consider a piece of evidence as FRAGILE
behind, paint samples, glass, parts)
and handle it accordingly.
● Tools or items related to the incident, victim, ● Do not alter or adjust the evidence in any
or suspect
fashion—keep it as you find it.
● Chemicals ● Only one person should handle evidence.
● Digital or analog images (video, CCTV,
Assign one person to take responsibility for
photos, audio recordings, etc.)
the evidence and only allow that officer to
● Vehicles (automobiles, motorcycles, bicycles,
collect or handle the evidence.
etc.) ● Minimize the amount it is touched or
● Furniture
handled and use proper hand protection
● Anything that is associated to an incident
(gloves) appropriate for the type of evidence.
or crime that may be necessary for the
(Other pieces of personal protective
investigation, prosecution, or litigation
equipment may be required, such as
The previous list is only a sampling, as the eye protection, full body suit, breathing
types of physical evidence that can be rele- apparatus, hard hat, etc.)
vant to an incident are varied and can include ● Keep individual items separate so they do
almost anything. For example, most of the evi- not contaminate each other.
dence listed above is quite visible, yet the pro- ● If the item was brought to you in a container
tection officer needs to understand that many or package—keep the container and package
forms of evidence are invisible to the human as evidence.
eye. Fingerprints, for example, which are latent ● If the item needs to be repackaged (moist
or impossible to see without investigative aids items should never be kept in plastic
such as ultraviolet lights and detection pow- containers), use the appropriate package and
ders. Another example is electronic and digital keep the original as evidence.

VIII. RISKAND THREAT MANAGEMENT


408 32. CRIME AND INCIDENT SCENE PROCEDURES

● The new container or evidence should be of evidence could impact the outcome of a
marked with: criminal or civil trial, jeopardizing the appro-
● Protection officer’s name priate course of justice and/or costing the
● Date and time of possession organization additional losses or damages. The
● Reference number to incident best advice is to protect the scene and allow
● Prepare detailed notes outlining: the investigators to collect and handle the
● How you came in possession of the evidence.
evidence
● When you came in possession of the
evidence MAKING DETAILED AND
● Where you came in possession of the ACCURATE NOTES
evidence and where exactly it came from
at the scene The importance of detailed, neat, and com-
● Indicate who provided the evidence to you plete note taking and reporting cannot be
● Describe what the evidence is in detail emphasized enough. As already mentioned,
● Photograph the evidence the protection officer must keep detailed and
● Continuity of possession of the evidence accurate notes of everything that happens or
(chain of custody) is very important. that is observed at the scene. The notes may
Evidence needs to be stored in a proper take different forms, too. For example, draw-
manner and secured so that no one but the ing a sketch of the room or property layout can
protection officer who accepted the evidence help in a later description and report. Sketches
can access it. If the evidence needs to be also are a terrific way to refresh your memory
moved or changes possession, the change if you need to testify at a later time. Notes are
and chain of custody must be documented often also recorded using an audio recorder.
and continuity maintained. The portability of such devices has made the
● Maintain a detailed log of what happens to technology more convenient to use. Some cell
the evidence while it is in your possession. phones have a feature to record digitally using
● If possession changes, document in the log dictation. These notes can be saved and later
and your notes: transcribed into written form to be included in
● Time and date of change a report. The purpose of good notes is also to
● Who took possession of the evidence facilitate a good report. Reports are intended to
● The purpose of the change of custody inform the reader of the following essentials:
(transfer to police, laboratory for testing, ● Who
taken from evidence locker to court, etc.) ● What
● Where
The proper collection and preservation of evi- ● When
dence is a topic that should be further researched.
Additional resources can be found online at A reader should be able to read a report and
Crime and Clues: The Art and Science of Criminal develop a clear picture in their mind of exactly
Investigation: http://www.crimeandclues.com/ what the protection officer saw when at the
crimescene.htm. scene. Recreating the scene in written form will
It should be rather clear at this point that assist the investigators and make the protec-
the collection of evidence at a scene needs to tion officer a better witness. It is important to
be handled by professionals who are specially be a good “story teller,” but more important to
trained. The improper handling of a piece remember is that it is all about the facts. Reports

VIII. RISKAND THREAT MANAGEMENT


WORKING WITH LAW ENFORCEMENT AND INVESTIGATORS 409
should not contain predictions, opinions, or con- protection officer will be the first responder
cepts—just the facts of what was seen, heard, who arrives or discovers the scene. This places a
and experienced. tremendous responsibility on the individual to:
It is also important to realize that a protec-
1. Preserve life
tion officer’s notes are not confidential. There is
2. Protect property
a high probability the notes may be presented
to an open tribunal as evidence. Additionally, When the protection officer arrives at the
a protection officer’s notes could be copied scene, they will be responsible to provide first
and presented to the criminal defense or litiga- aid, call for assistance, be alert for hazards, pro-
tion plaintiff team and form part of their case. tect the scene, handle witnesses and bystanders,
Because of the potential of full disclosure, what- watch for evidence, handle hectic communica-
ever the Protection Officer writes in their notes tions, and coordinate other responders and offi-
should be in a very professional manner. Here cers who arrive. The stress level will probably
are some suggestions: be significant.
When the investigators and/or police arrive,
● Only write about factual information and
the protection officer will be a valuable resource,
avoid opinions.
as the investigators will want to interview and
● Do not write anything derogatory about
collect as much information about the incident
anyone.
as possible. This is in addition to the continued
● Write your notes neatly and if something is
support that will be expected from the protec-
written in error, stroke a single line through
tion officer to protect the scene and assist in
the notation and write the correction clearly.
other ways (rescue, traffic control, etc.) while
Someone should be able to decipher the
investigators collect evidence.
crossed-out mistake.
The protection officer is a member of the inci-
● Never tear out a page with notes—if it is
dent team and should act in a manner that will
necessary to tear an empty page from the
impress and instill confidence in the other mem-
book—make a note in the remaining margin
bers of the team. This also includes performing
of the time, date, and why the page was
in a professional manner when interacting with
removed.
the victim, suspect, and witnesses.
A good rule to follow when you maintain When law enforcement or internal inves-
your notebook is to consider the following tigators arrive, they will likely take charge of
rule: Whatever you write in your notes, you should the incident. There is a well-planned incident
be comfortable seeing someday written in a major command structure practiced in most commu-
newspaper like the New York Times. nities and organizations around the world that
will outline who takes command at an incident
scene. The incident commander could be a
member of law enforcement, EMS, or fire ser-
WORKING WITH LAW vice. In some cases, it could be a representative
ENFORCEMENT AND from the organization responsible for the site.
INVESTIGATORS As a member of the incident response team,
the protection officer will be required to take
It may seem as though the role a protection instructions and direction from someone from
officer has at a crime or incident scene may not a public agency (police, fire, EMS) or someone
be as critical as that of investigators or police, from the organization where the protection offi-
but that is not the case. It is highly likely the cer provides their service.

VIII. RISKAND THREAT MANAGEMENT


410 32. CRIME AND INCIDENT SCENE PROCEDURES

EMERGING TRENDS
Societies subjected to tougher economic responsibilities at crime and incident scenes. In
times and reduced public spending will expose particular, the private sector will be expected to
the security industry to increased responsibili- manage more of the investigation and reporting
ties that were traditionally reserved for public for incidents that could be considered minor.
law enforcement. Governmental budgets will The result of these trends will be the need for
undergo closer scrutiny by taxpayers, resulting in additional specific training for protection officers
reduced funding for police and government agen- to prepare them to better fulfill the nontradi-
cies. This reduction in available funds will impact tional roles and new responsibilities. These new
all resources, including personnel. Reduced man- quasi-governmental responsibilities will subject
power will mean security personnel and protec- protection officers to more regulation and scru-
tion officers will be required to undertake more tiny, holding them to a higher standard.

CONCLUSION
S E CURI TY QU I Z
The protection officer is an important 1. The security officer’s responsibilities when
resource when it is necessary to respond and arriving at a crime scene is which of the
protect a crime or incident scene. Often the out- following:
come of a crime or incident will not be imme- a. Establish a boundary
diately apparent when the officer arrives as the b. Protect the incident scene
initial responder. This means they have to act in c. Maintain detailed notes
a professional manner and practice the knowl- d. All the above
edge and skills gained in this chapter while 2. To track loss-event-occurrences, the
protecting a scene and preserving evidence. The organization needs to know all of the
final outcome of a criminal or civil court case following except?
could depend on how well the evidence was a. What was lost
protected, collected and managed. b. How long was it lost
c. When was it lost
d. Who lost it
References 3. Physical evidence found at the crime scene
Dicarlo, V. (2001). Summary of the rules of evidence, FindLaw; may explain what exactly happened and/
retrieved September 9, 2009, from http://library.findlaw or provide a list of suspects. Which of the
.com/2001/Jan/1/241488.html/.
following is not an item of physical evidence
Fawcett (2003)
Schiro, G. (n.d.). Protecting the crime scene, retrieved found at a crime scene?
September 9, 2009, from http://www.crime-scene-in- a. Blood
vestigator.net/evidenc1.html/. b. Fiber samples
c. Low levels of C02 in the soil samples
d. Fingerprints

VIII. RISKAND THREAT MANAGEMENT


SECURITY QUIZ 411

4. If it is imperative that evidence at a crime b. Do nothing until the security supervisor


scene is recovered and protected by the arrives
security officer, which of the following is a c. Start picking up items that look like they
recommended procedure? may be evidence
a. Keep individual items separate so they do d. Start taking pictures of the crime scene to
not contaminate each other create a record
b. Gloving up before touching evidence is not 7. Once the protection officer arrives on the
necessary scene, the first priority is to:
c. Wrapping evidence in sheets of newspaper a. Get the names of all those present
is a good way to keep the evidence from b. Lock all the doors and wait for the police
being contaminated c. Preserve evidence found at the scene
d. None of the above d. Provide first aid and call for assistance
5. When writing a report from your notes, 8. The scene of a crime or incident will always
which of the following will not be included: require a boundary using police tape.
a. The names, dates of birth, addresses and a. True
phone numbers of witnesses and suspects b. False
identified at the crime scene 9. The boundaries of a crime scene will be
b. A description of what happened immediately evident once the protection
c. Your best interpretation of why the officer arrives on the scene.
incident happened a. True
d. A description of the crime scene where the b. False
incident took lace 10. It is necessary to establish the boundaries
6. Which of the following is the first responding of a crime scene before an investigation can
officer responsible for at the crime scene: begin.
a. Take emergency actions necessary to a. True
preserve life and protect property b. False

VIII. RISKAND THREAT MANAGEMENT


This page intentionally left blank
C H A P T E R

33
Interviewing and Statements
Dennis Shepp

important that a protection officer understands


CHAPTER OBJECTIVES the importance of statements, whether written
● Explain the process of interviewing or verbal, and how to properly conduct oneself
witnesses, victims, and suspects when engaged in an interview while obtaining
● Provide examples of verbal and information or a statement.
nonverbal behavior
● List six recommendations for establishing WHAT IS INTERVIEWING?
rapport as a listener
● List five steps for conducting a successful Interviews are part of the investigative pro-
interview cess. An investigation is a systematic and thor-
ough examination or inquiry into something
or someone that involves the collection of facts
and information and the recording of that
INTRODUCTION examination in a report (ASIS International,
2006). Investigations can involve the police or
When an incident or crime occurs, the private security regarding administrative inci-
responding protection officer is expected to pro- dents (policy and/or procedural infractions)
tect the scene until investigators arrive to take and/or criminal matters. (Investigations are
over the investigation. The investigator can be examined in more detail in Chapter 31.)
from law enforcement or from the organization Interviews will review information that will
interested in the incident. often be vital to the investigation of an incident
It is the investigator’s duty to conduct inter- or crime. The most effective tool for gathering
views and obtain statements. However, the information about an incident is interviewing
protection officer will often be in a situation people (ASIS International, 2006). Therefore,
where persons will speak to them and reveal any information gained from an interview, typi-
information that is important to the incident or cally in the form of statements, will be consid-
crime. While performing duties to protect the ered evidence. This may form a type of evidence
scene, the officer will interact with the victim, known as testimonial evidence or if involving a
suspect, and potential witnesses. It is therefore written statement, documented evidence. The

413
414 33. INTERVIEWING AND STATEMENTS

detailed explanation of types of evidence is statement. The interviewer speaks and the
not important at this stage, what is important interviewee responds, or vice versa. This seems
for the protection officer is to understand that simple; however, in many situations the inter-
when interviewing someone, even if it appears viewer seeks to obtain information from people
casual and unofficial, will produce a statement, who are reluctant to speak or cooperate. This is
either verbal or written, and this statement where some insight into human behavior and
could become important evidence. That is why psychology helps the interviewer.
it is important to understand the procedures Research has shown that people form their
that should be followed when interviewing basic impressions of one another during the
someone and obtaining their statement. first few minutes of an interview (Quinn and
What is the difference between an interview Zunin, 1972). Therefore, it is very important
and an interrogation? Typically, interviews for the interviewer to always think about how
involve witnesses or victims and an interroga- they are presenting themselves to the other
tion is an interview of a suspect. The goal of person. If the officer does not initially conduct
an interrogation is not only to seek the facts himself or herself in a professional manner,
of what happened but also obtain a confes- this may create a negative relationship with the
sion. It is not likely that a protection officer interviewee. A negative mood will be counter-
will be required to conduct an interrogation as productive in an interview. The interviewer
part of their duties and only trained investiga- needs to be an active listener or someone who
tors skilled in the techniques of interviewing the interviewee would want to talk with. To do
should conduct interrogations. Trained inter- this, the interviewer needs to develop rapport or
viewers and interrogators spend years learning a relationship with the interviewee. This means
and practicing to become skilled in this art and the interviewer will attempt to establish a bond
science. between them that is a connection where the
Understanding people is another impor- interviewee perceives the interviewer to be a
tant aspect of interviews and statements. Many caring, impartial, and concerned individual.
studies have been conducted on human behav- Here are some recommendations:
ior and crime. Investigators have learned from
1. Be empathetic—show the person you
the research about how to effectively interact
understand and care about how they feel.
with individuals to facilitate useful communi-
This helps the interviewee accept and feel
cations which in turn can produce valuable
comfortable with the interviewer and will
information for the investigation. The protec-
facilitate open and honest communication.
tion officer can also benefit from understanding
2. Eliminate your prejudices—try to detach
human behavior.
yourself from any personal prejudices or bias
you may have against the interviewees:
• Actions—detach yourself from what the
THE POWER OF COMMUNICATION
accused may have done, no matter how
bad it was.
Interviewing someone involves communica-
• Race—do not discriminate against the
tion in two ways:
person based on race or ancestry.
1. Verbally • History—show the person that you are
2. Nonverbally not prejudging based on past history.
Verbal communication is the most com- Try to be nonjudgmental and do not place
monly understood form of interview and immediate blame.

IX. INVESTIGATIONS
THE POWER OF COMMUNICATION 415
3. Be patient—show the person you can wait state of mind. For example, someone who shows
to listen and understand their story of what by their nervous voice tone, shaking hands, and
happened and why. This is a sign of a very darting eyes that they are anxious and afraid
good listener when they can show they are should be recognized by the interviewer so that
patient. This is a sign to the interviewee of they can try to calm the interviewee and make
tolerance, acceptance, and understanding. them feel more relaxed. This helps toward devel-
4. Reflect feedback—repeat back to the oping rapport between the interviewer and
interviewee statements, facts, and comments interviewee. Additionally, changes in behavior
they have related. The interviewer acts like and body movements can indicate stress. Stress
a “mirror,” reflecting back to the interviewee is an important indicator for an interviewer. This
their words, feelings, and attitudes, showing can be the stress of the interview itself or from a
to them you are listening and care about specific and directed question such as: “Did you
what they say (Nirenberg, 1988). take the money?” A guilty person may show signs
5. Do not interrupt—it is rude to interrupt, just of “flight or fight syndrome.” Fight or flight is an
like in any communication or conversation, instinctual phenomenon, based on when humans
so do not interrupt the interviewee when relied on this instinct to help them either run
they are relating their story to you. Allow from danger (flight) or face it (fight). It actually
them to finish what they are saying. is a manifestation of bodily reactions to stress
6. Concentrate—interviewing someone that humans will experience even nowadays
requires complete concentration on what when confronted with stress. Asking a question
they are saying and how they are saying it. that may compel the interviewee to lie will often
Concentration can best be equated to playing cause this type of stress. A well-trained inter-
a game of chess—the interviewer needs to viewer can act as a human polygraph (lie detec-
concentrate on what is currently being said, tor) when someone attempts to deceive by telling
but also must think ahead to expect what the a lie or not revealing information. Many of these
interviewee might (or should) say. telltale signals come from nonverbal and verbal
responses to stress and are evident in clusters
Why would concentration be important and of observed body movements and reactions. As
matter when the interviewee is telling the story mentioned, it can take many years of training and
and relating the facts as they know it? This is experience for a skilled interviewer to recognize
because the interviewee will sometimes not these signals of deception and further specialized
tell the truth and attempt to deceive the inter- training is recommended before anyone attempts
viewer, for a variety of reasons. This is why the to seek or analyze verbal and nonverbal behav-
interviewer needs to concentrate on what is ior in an interview. Nonetheless, here are some
said and follow the story and attempt to detect examples of verbal and nonverbal behavior when
deception. Detecting deception is explained in subjected to stress:
more detail later.
“Nonverbal communication” is a type of ● Changes in voice and speech patterns,
communication between persons that involves such as changes in the types of words
written statements (discussed later) and bodily used.
movements which are considered a form of ● Changes in the rate and volume of speech
communication. This is important for an inter- (louder, softer, faster, or slower). Tension will
viewer to understand because how a person (this often cause speech to become more rapid
includes the interviewer, too) projects themselves and stammered, sometimes two to three
can relate significant information about their times the normal speed.

IX. INVESTIGATIONS
416 33. INTERVIEWING AND STATEMENTS

● Burst of anger (threats to sue you, complaints showing the right attitude to conduct the
of how the interviewee has been handled, interview?
comments about your incompetence). • Are you mentally prepared? Can you
● Pausing, stalling, or delaying tactics (the focus on the interview? Do you appear
interviewee suddenly needs to leave for an confident and prepared?
appointment, long pauses to try to think of 2. If possible, try to use a suitable location for
an answer, changing the topic in an attempt the interview.
to delay the interview, suddenly wants a • There can be many distractions to
lawyer). interviewing someone, especially if
● Nervous or false laughter (this is a form the interview occurs at the scene of the
of energy release when someone is under incident.
stress). • Try to find a quiet and private place
● Sudden shifts in body movement not to conduct the interview, away from
normally displayed by the interviewee potential distractions.
during the interview (some examples: • Avoid interviewing anyone in the
shifting body position, pacing, jumping out presence of other witnesses—their
of chair, waving hands and arms, shaking, testimony or account of observations
kicking legs and feet, coughing, yawning). can be tainted if they listen to another
These are also forms of energy release when witness’s account.
someone is feeling stressed. 3. Ask open-ended questions.
• Avoid closed-ended questions that will
It is vital for the protection officer to under-
typically require a simple “yes” or “no”
stand that nonverbal indicators need to be ana-
response.
lyzed by a trained investigator and interviewer.
• Open-ended questions are the type that
It is important to understand as a protection
prompt longer answers and compel
officer (interviewer) you will outwardly dis-
the interviewee to provide a narrative
play your feelings by how you present yourself.
response. For example:
Therefore, be careful and aware about how you
may appear to the interviewee. ● “Please tell me everything that happened.”
● “In detail, can you please explain what
occurred here today?”
THE INTERVIEW PROCESS ● “Please describe everything you saw
regarding what happened here.”
When interviewing anyone, the interviewer 4. Record the interview.
needs to consider the following: • The most common method is to write
detailed notes of what the person says.
“Do to others as you would have them do upon you” • If possible and the local legal system
(Yeske, 2002).
permits, audio- or videotape the
interview—this is the best method of
Here are some steps to consider when pre-
maintaining an accurate account of what
paring to conduct an interview:
exactly is stated.
1. Prepare yourself, physically and mentally. • When taking a statement, the best method
• Examine your appearance—how do is to obtain a “pure version” statement.
you look to the interviewee? Are you • Pure version statements allow the
professional in appearance? Are you interviewee to provide their version of

IX. INVESTIGATIONS
DECEPTION 417
an account in a narrative format without ● Date, time, and location of the interview
any prompting from the interviewer other ● Indicate if the statement is voluntary
than a request, similar to: “Please write ● Signed by the interviewee
in detail everything that happened from the
Other guidelines for written statements (Sen-
time you left your house to the time the police
newald and Tsukayama, 2006):
arrived at the scene.”
• If the person responds with: “What 1. Use lined paper and write margin to margin.
exactly do you want me to say?” the 2. The text should flow into additional pages
protection officer’s response should be: (if necessary).
“Please explain in as much detail as possible 3. If corrections are required, draw a line
everything that happened from the time you through the sentence or word and sign your
left your house to the time the police arrived at initials on the change.
the scene.” 4. Sign your initials next to the last word on a
• The pure version statement remains the page and where the page number is written:
best method to obtain the interviewee’s (Example: “Page 1 of 3” INITIALS).
account of what happened. This statement 5. Ensure the interviewee understands what
becomes the basis for further questions is written (if the statement is written for
that can be asked by the investigator them)—have the interviewee read back what
to complete a detailed account of what is written.
occurred. 6. Include a sentence acknowledging the
• Be careful what questions you ask. It is statement is voluntary, without the influence
part of the psychology of interviewing of drugs or alcohol, and is the account of the
that an interviewer needs to consider the interviewee.
questions they ask an interviewee—
the famed investigator, Avinoam
Sapir, who discovered through his DECEPTION
extensive research the process known
as “Statement Analysis,” has aptly There may be times where the interviewee
said: “Specific questions are not designed may provide inaccurate information or may try
to obtain information. Specific questions to deceive the interviewer. Deception can take
are designed to detect deception. The most additional forms other than what some may
serious disadvantage of questions is that one immediately think is a lie or untruthful state-
can ask only about what is already known. ment. Sometimes deception is avoiding facts
What is not known would not be explored that are known by the interviewee or changing
and therefore would remain unknown.” It is the account of how something happened. It is
also from an interviewer’s questions that not only a suspect that may try to deceive; wit-
an interviewee can learn how much the nesses and victims may often avoid facts for
interviewer already knows (or doesn’t various reasons.
know) about the incident. Detecting deception from an interviewee
5. Remember the elements for useful and knowing how to react properly while con-
statements (Sennewald and Tsukayama, tinuing the interview requires an investiga-
2006): tor’s skill. These skills will have developed
● Identify who wrote the statement from training and experience. This is where the
(interviewee’s name and identification interviewer becomes a “human polygraph” and
information) is able to react in an appropriate manner. The

IX. INVESTIGATIONS
418 33. INTERVIEWING AND STATEMENTS

best practice for the protection officer facing a The protection officer should continue with
deceptive interviewee is to make detailed notes a professional demeanor when dealing with
of the statements made by the person and have witnesses, victims, and persons of interest.
them commit to the statement in writing and Notwithstanding the fact that an interviewee
under their signature. This written statement may have confessed to a crime or committing a
can be used quite effectively by a skilled inves- breach of organizational policy, they should still
tigator during a subsequent interview. be treated with respect and dignity. This behav-
ior will benefit the officer in the long term.

CONCLUDING THE INTERVIEW CONCLUSION


When the protection officer concludes the
The protection officer will undoubtedly
interview he or she should make detailed notes
become involved in an incident where he or
of the following:
she will be required to conduct an interview. It
1. Name of the interviewee. is highly recommended that further training be
2. Contact details (residence and employment): obtained from recognized training organiza-
● Telephone numbers (mobile, work, tions such as John E. Reid and Associates Inc.,
residence, other) Laboratory for Scientific Investigation, and other
● E-mail addresses (work, residence, other) internationally recognized groups. Proper train-
● Addresses (work, residence, other) ing in the knowledge and skills needed to man-
3. Identification (date of birth, ID number, age effective interviews is essential. Any time
passport, etc.) the protection officer is faced with a situation in
4. A brief account of the interviewee’s which the interview may require these skills, the
involvement in the incident (witness, victim, officer should seek assistance from a professional
suspect, or person of interest) investigator qualified to conduct interviews.

EMERGING TRENDS
Although the process of interviewing has communications. Humankind has not been
been around for centuries, the methods have and investing new gadgets or technology to do this,
will continue to evolve considerably. Statement it has been improving traditional methods such
analysis is a relatively new science as applied to as verbal interviews, nonverbal kinetics, and
investigations, but it illustrates that the process written statements.
of investigative interviews will constantly evolve We will continue to learn more about human
and improve. behavior and how to apply our understand-
What seems most interesting is the improve- ing toward seeking truth from communications.
ments mainly involve learning more about lin- Technology will also improve and will likely
guistics and human psychology and applying provide more tools to investigators in their pur-
refined or new techniques to better interpret suit of the facts.

IX. INVESTIGATIONS
SECURITY QUIZ 419

References Resources
ASIS International. (2006). Protection of assets manual, Gordon, N. J., & Fleisher, W. L. (2006). Effective interviewing:
Chapter 1, Part 1, p. 8. Interrogation techniques (2nd ed.). Academic Press.
Quinn, L., & Zunin, N. (1972). Contact: The first four minutes. Reid technique: Interviewing and interrogation. (2005).
New York, NY: Ballantine Books, Inc. 2-CD-ROM Training Collection, http://www.reid.com/
Nirenberg, J. (1988). Getting through to people. Prentice Hall. store2/detail.html?skucd-rtiivs/.
Yeske, C. (2002). The art of investigative interviewing (2nd ed.). Yeschke, C. (2002). The art of investigative interviewing (2nd
Butterworth-Heinemann. ed.). Butterworth-Heinemann.
Sennewald, C., & Tsukayama, J. (2006). The process of investi- Zulawski, D. E., & Wicklander, D. E. (2002). Practical
gation: Concepts and strategies for investigations in the work- aspects of interviewing and interrogation (2nd ed.).
place (3rd ed.). Elsevier/Butterworth-Heinemann. CRC Press.

S EC U RI T Y QU IZ 7. Guidelines for written statements may


1. When an incident or crime occurs, the include:
responding protection officer is expected to a. Use lined paper and write margin to
protect the scene until investigators arrive. margin
a. True b. Text should flow into additional pages (if
b. False necessary)
2. It is important that a protection officer c. If corrections are required, draw a line
understands the importance of statements, d. All of the above
whether written or verbal. 8. Deception can take additional forms other
a. True than what some may immediately think is a
b. False lie or untruthful statement.
3. Interviewing people is NOT the best way to a. True
gather information as there are many other b. False
more effective methods and resources. 9. When the protection officer concludes the
a. True interview they should make detailed notes of
b. False the following:
4. Nonverbal communication is the most a. Name of the interviewee
commonly understood form of interviewing. b. Contact details
a. True c. Identification
b. False d. All of the above
5. Tension will often cause speech to become 10. The protection officer should continue with a
more rapid and stammered sometimes ______ professional demeanor when dealing with:
times the normal speed. a. Witnesses
a. 1—2 times b. Victims
b. 2—3 times c. Persons of interest
c. 5—6 times d. All the above
d. 10 times
6. Avoid close-ended questions that will
typically require a simple “yes” or “no”
response.
a. True
b. False

IX. INVESTIGATIONS
This page intentionally left blank
C H A P T E R

34
Foundations for Surveillance
Michael Stroberger

without violating legal restrictions, company


CHAPTER OBJECTIVES policy, or common sense.
● Define and describe the four types of
surveillance: covert, overt, personal, and
electronic GENERAL TYPES
● Explore the scope of equipment
requirements for surveillance Surveillance operations can be broken down
● Discuss legal ramifications of privacy into a matrix of sorts with the headers being
and retention issues covert and overt on one side, and personal and
electronic on the cross-referenced edge. As such,
it is only appropriate that the bulk of this dis-
cussion be framed within the four possible com-
binations of these types.
In most popular media, the concept of surveil- ● Covert operations are those done in secret
lance is either portrayed as a man in a wrinkled, without the knowledge of those being
coffee-stained suit or an extremely large, sophisti- observed. Blending with the surroundings is
cated, and complex electronic array that requires critical to the success of these operations.
three or more people to monitor. In reality, the ● Overt operations are out in the open, and can
typical surveillance operation falls between these. usually be easily identified as what they are.
The basic goal of surveillance is to obtain infor- ● Personal operations are those carried out in
mation that might not be immediately available person by individuals or teams of operatives.
without a concerted effort and a focused atten- Although the initial setup of such an
tion. In most cases, it is the watchful, knowledge- operation may not be overly expensive, the
able, and sometimes lucky selection of points of continued use of manpower quickly increases
focus that yield the best results. In other cases, it the amount of required funding and quickly
is the act of watching that produces results. outweighs the cost of electronic alternatives.
Of utmost importance in all surveillance ● Electronic operations can range from CCTV
operations is a proper understanding of privacy (Closed-Circuit Television) systems to
and the limits to which one can surveil another transmission interception and receipt of

421
422 34. FOUNDATIONS FOR SURVEILLANCE

other electronic information. Usually, the protection engage in this type of operation on
operators are well out of sight, even if the a regular basis without realizing that it falls
equipment is clearly visible. within this category. Overt personal surveil-
lance is the execution of visible and open
inspection, such as when on patrol. The act of
COVERT PERSONAL gathering information is shared in importance
SURVEILLANCE with the deterrent value of such an operation.
The person executing these duties may be
Covert personal surveillance is the act of looking for specific types of incidents or situa-
watching another from a location of conceal- tions. Through their presence, and the fact that
ment, or in a manner in which this act is not they are paying attention to their surround-
obviously being carried out. This is the main ings and the persons in those surroundings,
focus of the services of some investigators deal- this may cause those in the area to reconsider
ing with cases such as marital strife, insurance intentions of violating company policy or legal
fraud, and even law enforcement investigations. restrictions.
While this surveillance is personal rather than The performance of this type of operation is
electronic, it should be noted that some electron- most likely to alter the behaviors and responses
ics are usually involved, but this is often limited of persons in the observed environment due
to a camera, a voice recorder for the retention of to the fact that there is clearly a person paying
comments on the observations, and similar low- attention to those present.
end electronics. The primary advantage of this
method is that it provides for a human deci-
sion-making option as the situation evolves. By COVERT ELECTRONIC
being on the scene, the operative(s) can deter- SURVEILLANCE
mine how to refocus the operation to obtain
better results. The major drawback is that this is The use of hidden cameras, voice and elec-
extremely manpower intensive. In order to not tronic recording equipment, and similar devices
attract too much attention, it is best to randomly falls within this category. It is within this type
exchange operatives so that the same person is of operation that the surveillance agent must
not in the area for an extended period of time, pay the closest attention to privacy issues, as
drawing potential interest through being con- the unwelcome observation of persons, under
spicuous. When performing vehicle surveil- certain circumstances, may violate state or fed-
lance, this is even more of an issue, as specific eral restrictions on such actions. Care must be
vehicles are easily recognized if they continu- taken and counsel sought when designing such
ously pass into and out of view. operations, so that violation of such restrictions
These operations can yield interesting results does not occur.
stemming from the fact that, when properly Some equipment options might include pin-
executed, those observed are not aware that hole cameras; cameras concealed in sprinkler
others are paying attention to them. heads, clocks, books, and other nondescript
items; scanners tuned to permissible frequen-
cies; and even long-range audio amplifiers as
OVERT PERSONAL SURVEILLANCE permitted. The equipment selection, given the
right budget, can look very much like the prop-
This type of operation ranges widely in erty of a movie spy. The actual selection is often
its application. Most people in the field of limited only by the budget of the operation.

IX. INVESTIGATIONS
PRIVACY ISSUES 423
Much like personal covert operations, this as binoculars, a camera, a mini-recorder, and a
method often yields very interesting results. If notepad. The initial outlay might be as low as a
the operation is properly executed, those being few hundred dollars, and the equipment retained
watched are not aware that they are being over a period of many operations. In electronic
observed. As a result, they will act in a manner operations, the initial outlay may be thousands,
that is completely natural to them in the given or tens or hundreds of thousands, of dollars. This
environment. is based upon the scope and sophistication of the
intended operation. As an example, moderate
OVERT ELECTRONIC grade pan/tilt/zoom camera operations require
SURVEILLANCE not only the camera dome itself but also a con-
trol unit, video cabling, power sources and cable,
The classic example of overt electronic sur- and a method of recording the input. A single
veillance would be the pan/tilt/zoom camera PTZ (Pan/Tilt/Zoom) camera, in a stand-alone
domes found in most department stores. These system, could be thousands of dollars and would
provide a significant amount of information to still have to be manned at least occasionally.
a trained operator and are also a very visible The equipment must be appropriate to the
deterrent to certain types of crimes. Often, if nature and scope of the operation if it is to be of
the recordings of such a system are replayed, optimal effectiveness. Experience and common
persons can be seen behaving in one manner, sense will dictate the exact requirements.
looking up to find that a camera is in the area, Regardless of the nature and method of
and immediately altering the previous behav- the operation, the underlying goal of obtain-
ior to bring it more in line with the expectations ing information must also be addressed in the
of that environment. It is not that the devices equipment. If this information is to be used in
themselves have any potential to bring harm a truly effective manner, it must be recorded
to the individual. It is the concept that, absent in some way. Certainly, in cases of criminal
of a clear view of the operator of the system, and civil actions, the best possible method of
there is no way to know if the camera watch- recording the information should be sought.
ing that specific area is being paid attention to To appear in court without physical evidence
at the given moment. It is the fear of possibly would be of almost no use at all. In many cases,
being observed that provides the deterrent fac- simple still photographs can make a significant
tor in this case. It is because of this that CCTV impact. Videotape, made through camcorders
systems, in such setting as industrial locations or more complex systems, can often solve cer-
and employee-only areas of other types of busi- tain cases, such as insurance fraud.
nesses, should be placed in such a manner as
to make it plainly obvious that CCTV is in use, PRIVACY ISSUES
but without providing a view of the monitors
themselves. Those in the area should know that Although the pursuit of justice and the pro-
observation occurs but not be able to determine tection of personal or company property is
which area at any given time is being observed. highly important, it is also critical that the laws
protecting privacy be honored and protected. As
EQUIPMENT REQUIREMENTS such, it is essential to understand the basic con-
cepts and research laws that could have bearing
As previously stated, the equipment may on the specific operation to be undertaken. Do
vary widely. In the case of personal surveil- not ever assume that the privacy laws of one
lance, either covert or overt, it may be as simple area apply wholly to another area.

IX. INVESTIGATIONS
424 34. FOUNDATIONS FOR SURVEILLANCE

As an example, in some states, recording a or for the locally defined period of time that
telephone conversation may not be done with- those involved might be allowed to enter into
out the prior knowledge and consent of both a civil action, whichever is longer. In short, be
parties on that call. In other states, only one prepared to prove your case for however long
person must be aware that a recording is being it might be an issue, and be prepared to defend
made. In some cases, an employer may listen your operation against civil accusations. Some
in to employee telephone conversations, based companies have a policy that directs all closed
on legal permissions, specific content in the case materials to be destroyed after a certain
employee hiring agreement or employee hand- period of time, such as a 2-year retention policy.
book, or simply because the telephones are Research these directives before executing them.
owned by the employer and provided only for In some states, those involved are permitted up
the execution of work-related duties. Without a to 4 years to file civil suits. It would be in the
clear understanding of the laws and restrictions best interest of those involved that they have
that apply to the location in which you intend supporting evidence should this occur within
to perform a surveillance operation, it could be the allowed period of time. Again, research the
very easy to violate those laws. laws and restrictions that apply to not only your
Although there are many “rules of thumb” location, but also the specific location where the
on this issue, the fact is that local laws vary so operation takes place.
widely that the best guideline to follow is to Save everything if possible, especially in
research those that apply to your target area. retaining video and imagery evidence, as you
never know what might be seen in the secon-
dary areas of the image. Some cases have begun
RECORDING AND RETENTION and been proven based on the background
scene in video recordings. Even when the pri-
As already noted, it is best to make some
mary action, the focus of the video, did not
durable record of the surveillance operation’s
prove to be a violation as previously thought.
results. In some cases, this can prove a suspi-
Pay attention to your background, and review
cion; in others, it could be used to defend the
all materials with this in mind. If storage space
execution of practices of those involved in the
becomes an issue, it might be that noncritical
operation. The materials produced by such
materials have to be discarded. Review these
activities should be retained for a period of
materials prior to removal to ensure that there
time that is appropriate for the material and
is nothing of value in them.
actions identified through that investigation,

S E C URI T Y QU IZ
3. Equipment requirements vary depending
1. Covert operations are intended not to be on the location, nature, and goal of the
known or recognized. operation.
a. True a. True
b. False b. False
2. Personal operations are the least expensive in 4. A proper understanding of privacy issues is
the long run. only important if the case goes to court.
a. True a. True
b. False b. False

IX. INVESTIGATIONS
SECURITY QUIZ 425

5. Electronic surveillance could include: c. A cable and connections


a. CCTV d. All of the above
b. Interception of radio transmissions 9. In some states/provinces/countries,
c. Interception of other electronic information recording a telephone conversation may not
d. All of the above be done without the prior knowledge and
6. Considerations for the retention of records consent of both parties on that call.
could include: a. True
a. Company policy b. False
b. Statutes of limitation 10. If storage space becomes an issue, it might
c. Storage space be that noncritical materials have to be
d. All of the above discarded.
7. Overt personal surveillance: a. True
a. Relies on being properly concealed b. False
b. Could deter some incidents
c. Both of the above
d. Neither a nor b
8. A simple camera surveillance system will
often include:
a. A camera
b. A recorder

IX. INVESTIGATIONS
This page intentionally left blank
C H A P T E R

35
Report Writing and Field Notes
Rav-Zuridan Yisrael

IMPORTANCE OF REPORT
CHAPTER OBJECTIVES WRITING
● Explain the basics of report writing
● Emphasize the usefulness of report One of the most important issues of report
writing writing has to do with liability. Proper report
writing may significantly reduce the poten-
● Explain the purpose of field notes tial liability faced by security officers or their
● Identify the essentials of good report employers. Reports can aid in documenting
writing potential loss that an organization may face and
the response that the organization takes to miti-
gate the risk of loss. Additionally, reports may
aid in determining who is accountable for an
INTRODUCTION incident.
For example, if a security officer is working
As in many other professions, reports are for a contract security company and he/she
essential to the security industry. In fact, report notices a torn carpet that presents a trip haz-
writing is one of the most essential functions ard, that security officer has a duty to report the
for security officers. Some security profes- hazard. If the hazard is not repaired and some-
sionals list the primary directives of a security one is injured, the fact that the officer reported
officer as detecting, deterring, and reporting. it reduces the liability of both the officer and the
Other professionals state that the main duties officer’s company. Once the officer submits the
of security officers are observing and reporting. written report, it is now primarily the respon-
However, in any instance, it is widely accepted sibility of the property owner or property man-
that report writing is of the utmost importance ager to develop an adequate safety or security
in the security industry. Many reasons exist that measure to remedy the situation (i.e., repairing
explain the importance of report writing within the carpet). However, if no measures are taken
the security industry. to remedy the hazard and someone is injured,

427
428 35. REPORT WRITING AND FIELD NOTES

the owner of the property can likely be held lia- ● Names of witnesses
ble and accountable for their inaction. Therefore, ● Notes from interviews of witnesses
it is evident that reports are important in deter- ● Descriptions of vehicles
mining liability as well as accountability. ● List of items stolen
● List of items broken
● Names and contact information of
FIELD NOTES victims
● Time of incident
It is imperative that reports be accurate and fac- ● Arrival times for emergency service
tual. To ensure that reports meet this requirement,
personnel
field notes should be written while conducting ● Nonworking lights (security hazard)
one’s duty as a security officer. Field notes should ● Torn carpets (trip hazard)
be written in an easy-to-carry pocket-sized note- ● Leaking pipes (trip hazard or damaged fire
book. While on patrol or responding to incidents,
suppression system) or any other detail or
field notes are taken as the initial step in reporting
event that will be needed for a report at
incidents, unsafe conditions, and breaches in secu-
another time
rity, violations of policy, or any unusual events.
Field notes are useful in many situations. For
example, if an incident arises that requires the
police department, fire department, or ambu-
REPORTS SHOULD BE WRITTEN
lance to arrive at a work location, it is much
Considering that reports are critical to ade-
simpler to write down the necessary facts while
quately perform one’s duties as a security offi-
handling the incident. Handling certain events
cer, it is necessary to discuss reports in better
can be stressful; however, it will be more stress-
detail. Security officers should write all reports;
ful to have to search for a piece of paper to write
even if a verbal report of an incident is given,
down important details. Additionally, record-
written reports are necessary. Written reports
ing the information as soon as possible after the
are more dependable than verbal communi-
occurrence of the incident helps to ensure the
cation. For example, do you remember what
accuracy of the incident report. For example, if
you were wearing on the 13th day of last month?
an officer observes a vehicle crash into a parked
What did you have for lunch that day? What
vehicle and then drive off rapidly, it is easier to
was the description of the first person that you
write down the make and model of the car and
saw that day at work? The average individual
its license plate number in the field notebook
does not remember such specific details of past
than it is to remember the information 20 min-
events. Additionally, even with the best of inten-
utes later while writing an incident report. Field
tions, either party can forget a verbal report. If
notes provide a means of recording the intricate
there is a conflict regarding whether a verbal
and specific details of an event or unusual or
report was submitted, the issue becomes a mat-
unsafe circumstance. Information to record in
ter of hearsay or a case of “he-said/she-said.”
field notes may include:
A written report is a means to recall the intricate
● Descriptions of suspects details of an event and to verify submission of
● Names and badge numbers of emergency the report. Verification of submission of a docu-
services personnel ment can be via a signature on a traditional
● Vehicle numbers of emergency service report or by printing a copy of a report that has
vehicles been inputted into a database. Not only should

IX. INVESTIGATIONS
QUALITIES OF GOOD REPORTS 429
the report be in written format, it should be usage is important to create a clear and precise
written as soon as possible after an incident and report that is useful to others. An example of a
notes should be taken during the incident if pos- statement that demonstrates poor word usage
sible. This will ensure the most accurate record is “the subject is a short, white male.” That sen-
of the details that took place. tence is very vague and leaves the height of the
suspect to the interpretation of the reader. Better
reporting of the suspect’s description is that
WHAT SHOULD BE REPORTED “the subject is approximately 5 feet and 5 inches
tall.” This makes the description more concrete,
Determining which incidents require reporting as opposed to a subjective description, such as
may seem complicated to novice security practi- short, which may vary from person to person.
tioners. A good rule to follow is: if it is an uncom- Finally, punctuation, grammar, and spelling are
mon event, then report it. It is far better to have important to report writing. If you are unsure
an incident report that is not needed than to need how to spell a word, refer to a pocket dictionary.
a report and not have it. When there is doubt Remember that a report is a reflection of your
on whether a report should be written, it is bet- professionalism.
ter to err on the side of writing the report. Some Concise—A good acronym to remember
examples of events to report include broken when it comes to writing reports is K.I.S.S.
equipment or property, illegal activities, trespass, (Keep It Short and Simple). Conciseness has to
activities against company policies, accidents, do with the brevity of the report. It is not nec-
injuries, hazardous situations, fires, breaches in essary to expound extensively on an incident.
security, and vandalism. However, it is necessary to include all relevant
information and to ensure that this information
is factual and accurate. Additionally, reports
QUALITIES OF GOOD REPORTS are to be objective and impartial; never add your
opinions or assumptions to a report. Your opinions
There are certain qualities that all effective can be shared with necessary parties as needed;
reports should have. A good way to remem- however, they have no place in a report. If your
ber the qualities of a well-written report is the opinion is a likely truth, an objective party is
“Three (3) C’s of report writing.” The 3 C’s of probably going to reach the same conclusion
report writing are a guideline to the character- or consider your conclusion by an objective
istics of a good report. Reports are to be clear, review of your report. However, it is important
concise, and complete. Each of the 3 C’s will be to ensure that the conciseness of a report does
discussed in further detail. not affect its completeness.
Clear—Refers to the readability and under- Complete—This means ensure that all of
standability of the report. A report should be the details are included in the report. One
written legibly or typed to ensure that others method to accomplish this is to consider the
can read it, as it has little value if not understood. “5 W’s and 1 H of report writing,” which is a
Clear also relates to the words used and the sen- guide to ensuring that a report is complete. It
tence structure. It is best to write a report in the requires that you answer the following ques-
simplest and clearest terms, again, to ensure it tions as they relate to the incident: Who, What,
is easily understood. Reread the report, or have Where, When, Why, and How? Obviously, each
others read it, to make certain the correct mes- question is not applicable to every incident;
sage is being conveyed. Additionally, word however, this is a very thorough starting point.

IX. INVESTIGATIONS
430 35. REPORT WRITING AND FIELD NOTES

Examples of questions that should be answered Why:


in the report are listed below: ● Why did the incident occur?
Who: ● Why were the police called?
● Why did security respond?
● Who is the victim/complainant? ● Why did the alarm sound?
● Who is the culprit/accused?
● Who responded? How:
● Who was notified? ● How was the incident reported?
● Who witnessed the incident? ● How was the incident discovered?
What: ● How was the suspect apprehended?
● How was the issue resolved?
● What happened?
● What was the consequence? Writing a quality report is one of the most
● What was the response? important duties of a security professional. It
● What was the badge number of the police is essential to remember to remain truthful and
who arrived? honest in your reports. Security professionals
● What was the truck number of the are entrusted with the responsibility of pro-
ambulance that arrived? tecting the assets of others; are given access to
areas, items, and information only because of
Where (be exact: include address, floor, room
the responsibility of their position; and, there-
number, etc.):
fore, should act in an ethical and moral man-
● Where did the incident occur? ner. One’s ability to communicate effectively
● Where was the victim taken? through written reports may directly affect
● Where was the suspect taken? career advancement. Reports are a reflection
● Where in the building? of the author and in many ways reflect their
competency at performing their job functions.
When (this includes the date and time):
Additionally, reports may be used for legal mat-
● When did the incident occur? ters, recalling the details of incidents, and deter-
● When did the police or ambulance arrive? mining which security or safety issues must be
● When was the incident reported? addressed more thoroughly.

EMERGING TRENDS
Many organizations are moving toward hav- nature of the incident. The ability to sort a year’s
ing their incident reports compiled and stored in worth of incidents with the click of a button is
a database. The database allows various manag- of great benefit to managers conducting risk
ers to view incident reports without having to assessments on the facility as well as determin-
hand-deliver a hard copy. Additionally, the data- ing trends with certain types of incidents.
base allows users to sort incidents based on the

IX. INVESTIGATIONS
SECURITY QUIZ 431

References
c. Clear, Concise, Compartmentalized
Hess, M. E., & Wrobleski, H. M. (1996). Introduction to pri- d. Concise, Clear, Clever
vate security (4th ed.). New York, NY: West Publishing
5. It is important to state your opinion
Company.
International Foundation of Protection Officers. (2003). in incident reports to ensure that
Protection officer training manual (7th ed.). New York, NY: management can figure out what really
Butterworth and Heinemann. occurred.
Security Guard Management. (2004). Report writing [Motion a. True
Picture]. http://www.sgmnow.com/pages/videos.htm.
b. False
State of New York Division of Criminal Justice Services.
(1995). Eight hour pre-assignment training course for 6. Incident reports must be treated as legal
security guards. documents.
a. True
b. False
7. Field notes are equivalent to incident
S E C UR I TY QU IZ reports.
1. Incidents must always be written in a a. True
way that shows the organization in a b. False
favorable manner. 8. Writing a report is one of the most
a. True important duties of a security
b. False professional.
2. Verbal reports are equally as reliable as a. True
written reports. b. False
a. True 9. A good rule to follow is: If it is an
b. False uncommon event, then report it.
3. There are six (6) questions that every a. True
report must attempt to answer and they b. False
include: Who, What, Where, When, Why. 10. A good acronym to remember when it
What is the additional question? comes to writing reports is H.U.G.
a. If a. True
b. Could b. False
c. How
d. Summary
4. The three (3) Cs of report writing are:
a. Clear, Complete and Concise
b. Complete, Competent, Clear

IX. INVESTIGATIONS
This page intentionally left blank
U N I T X

LEGAL ASPECTS
OF SECURITY

36 Legal Aspects of Security


This page intentionally left blank
C H A P T E R

36
Legal Aspects of Security
David L. Ray

and they may also be based on other societal


CHAPTER OBJECTIVES concerns such as business and economics. For
● To provide an overview of the our purposes we will define laws as the rules
development of our current legal system governing society. These rules not only set
down our obligations to each other but estab-
● To reduce the liability of the security
lish penalties in the form of fines, judgments,
officer and the employer
or incarceration to punish the perpetrator who
● To explain how to avoid the costs of breached the obligation or to compensate the
litigation and damages for false arrest, victim for the breach. These rules would be inef-
illegal search, or failure to provide an fective if there were not also established proce-
appropriate level of security dures for enforcing the obligations, whether a
● To describe to the security officer what ruling by a tribal chieftain or more modern pro-
opportunities are available to minimize cedures that provide for search warrants, arrest,
risk of exposure to various actions by incarceration, probation, and so on.
acting within the law Protection officers often provide a role simi-
lar to law enforcement, wear a uniform, and are
viewed by the public as authority figures who
INTRODUCTION are there to look after their safety and the pro-
tection of their property. The protection officer
From the earliest times we have created laws is also involved in activities that are inherently
to ensure that others will keep their promises, dangerous, which may include protection
not cause us harm, and act in the best inter- from criminal activity and life-safety programs
ests of society. Laws may be written, verbal, such as bomb threats, fire, and evacuation pro-
or implied (e.g., when a customer walks into a cedures. Trespassers and criminals will view
restaurant and orders a meal the establishment the protection officer as someone who is there
can assume that the customer intends to pay to intervene if they commit a criminal act.
for that meal). Laws may be based on religious Protective duties may require the officer to make
requirements such as the Ten Commandments, decisions that raise questions of liability against
the Code of Hammurabi, Buddhist Dharma the officer, the property owner, or the employer.
teachings, the Koran, or other religious codes, In conducting enforcement duties, the protection

435
436 36. LEGAL ASPECTS OF SECURITY

officer may be required to arrest, detain, use there was no written record of the decision. In
force, seize property, and testify in court when fact, the decisions were far from consistent and
charges are laid. For all of these reasons, it is the feudal lords would often have difficulty
important that the protection officer under- resolving an issue and would order that the dis-
stand his or her duties and responsibilities and pute be settled by combat between the parties
the potential liabilities which could arise from (trial by combat). In other cases the feudal lord
them. Their role is complicated by the fact that would order that there be a trial by ordeal such
in some cases protection officers do not have the as drowning, under the assumption that the
same authority that law enforcement has, while decision would be made by a “higher power.”
in other cases they have more.
Protection officers may also be required, in
the course of their duties, to ensure that a per-
Case Law
son’s rights are protected under the U.S. Bill of After the establishment of the royal courts in
Rights or the Canadian Charter of Rights and England, judges would travel out to rural districts
Freedoms. For further information on author- to sit at trials and would return to meet at the Inns
ity in these areas refer to the chapters on Arrest of Court in London. They would discuss their
and Detention and Use of Force. recent decisions, which led to a greater degree of
consistency among them. Law students would
sit with the judges and would write reports of
the judges’ decisions and these became the first
THE DEVELOPMENT
instances of case law that are still used today.
OF OUR LAWS
Once cases were reported in books, it became
much easier to refer to those decisions and fol-
We tend to think of laws as being words
low universal principles. This “case law” is also
written in books and passed by a government
referred to as “precedent” or “the doctrine of stare
authority, but that is only one source of our
decisis.” The principle of case law is fairly simply
laws. There are actually three:
stated: A court must stand by previous decisions.
1. Common law and the civil code of France This case law provides influence in our pres-
2. Case law ent day courts and helps judges to interpret
3. Statutes statutes and arrive at decisions which are fair,
equitable, and consistent with previous court
decisions. Case law also provides defenses at
The Common Law criminal trials (e.g., self-defense) and proce-
The Common Law was developed in feu- dures that govern the police handling of search
dal England. At that time most people could and seizure processes.
not read or write and, therefore, written stat- The principle may sound fairly straight-
utes would not be of much benefit. In order to forward but the common law is still evolving
resolve issues between citizens they would go to adapt to changes within our society and, in
to the feudal lord with their disputes. There application, the doctrine can become extremely
was an expectation that the feudal lord would complex. The weight given to any previous
be consistent (or common) in resolving these decision of another court will depend on a
disputes from one issue to another. Citizens number of factors including whether the court
therefore believed that “laws” were common was within the same legal jurisdiction, the level
throughout the land, even though they were of the court where the decision was made, or
not written down as statutes and even though the similarity in the facts of the case.

X. LEGAL ASPECTS OF SECURITY


TYPES OF LAWS—CRIMINAL AND CIVIL 437

Statutes and the particular customs of the landowners


and nobles who adjudicated cases. The Justinian
Statutes are the law in black and white. As Code was similar to our present legal system
education became more commonplace in feu- and included differentiation between public
dal England, the government authorities began law, which is related to the relationship between
to pass statutes that would guide everyday life. the individual and the state (e.g., constitutional
Today statutes may be passed by any one of law or criminal law) and private law, which is
several levels of government from municipal concerned with the relationship between indi-
right up to federal. Statutes are also continually viduals (e.g., commercial law, family law, and
being amended, new statutes are passed, and torts). The dominance of Roman Law declined
old ones are repealed. Our society is constantly in continental Europe but by the 11th century,
changing, and so it is necessary that statutes with the development of international trade
change as well to meet new requirements or to and more complex business arrangements, the
fill a need in our society. Sometimes the need Justinian Code returned as a standard. This sys-
is economic (e.g., an amendment to income tem of laws is referred to as civil law.
tax laws, to “plug a loophole”) and sometimes When William the Conqueror occupied
the need arises as a result of changes in society England in 1066, he was astute enough to real-
(e.g., new computer crime legislation). ize that the English Common law system should
Regulations on the private security indus- not be replaced entirely by the civil code. He
try have been passed in most jurisdictions. The established royal courts which allowed the sys-
regulations may address areas of the industry tem of precedent to continue, but developed
including uniformed staff, private investigators, consistency in the application of laws and intro-
locksmiths, security guard dog handlers, or duced written statutes based on the Roman law
armored car services. The regulations may cover or civil code principles which could clarify the
training requirements, age restrictions, educa- common law. Our legal system today is a mar-
tion, licensing, or criminal background checks. riage of those two traditions.
The authority of the protection officer may come In 1804 the Napoleonic Code was created in
from these regulations and from other statutory France; it addressed issues of equality of the
authority such as extended rights of arrest when classes and was the predecessor of modern
acting on behalf of a property owner. human rights legislation. The civil law system
and the Napoleonic Code still have an effect
The Effect of the European Civil Code on today on many of the states that were originally
settled by the Spanish and on the Canadian
Our Legal System
Province of Quebec. Today, the term “civil law”
Prior to feudal times, laws developed differ- not only refers to the system of laws found in
ently in continental Europe. The Roman empire’s Europe and other noncommon law jurisdictions,
early dominance in this part of the world but also to our system of private law that allows
brought a higher degree of literacy, and writ- one citizen to recover damages from another.
ten Roman Law was codified by the Emperor
Justinian in A.D. 533. After the fall of the Roman
empire, the legal system was entrenched in TYPES OF LAWS—CRIMINAL
European society. This Roman codified law dif- AND CIVIL
fered from the English Common Law because
it had been reduced to written statutes whereas Protection officers may be involved in the
the English law comprised the verbal decisions enforcement of laws or as a witness in both civil

X. LEGAL ASPECTS OF SECURITY


438 36. LEGAL ASPECTS OF SECURITY

and criminal proceedings and should understand imprisoned in a state institution. The prosecu-
the fundamental difference between the two. tor will act on behalf of the state, not on behalf
of the victim (although in some cases, there are
provisions for private prosecutions or compen-
Criminal Law sation for victims of crime).
Criminal laws appear to be established to Types of criminal offenses vary from jurisdic-
protect people, but they are actually passed tion to jurisdiction but they are generally divided
to ensure peace and good order in society. For into those that are more serious (felonies in the
example, it is an offense to assault someone United States and indictable offenses in Canada)
but criminal law treats assault as an offense and those that are less serious (misdemeanors
against society and it is the state which will ini- in the United States and summary conviction
tiate prosecution against the offender and will offenses in Canada). Table 36-1 details examples
impose the punishment. If a fine is imposed it of criminal offenses and Table 36-2 lists the differ-
will be paid to the state or the offender may be ent powers of police, security and prosecutors.

TABLE 36-1 Examples of Some Types of Criminal Offenses*

Crime Description

Murder Intentional and unlawful taking of the life of another and may include a death resulting
from the commission of another crime (felony murder)

Manslaughter Causing the death of another as a result of negligence or a reduced level of intent

Assault Deliberately causing menace or bodily harm to another

Kidnapping Unlawful confinement of another and may include false imprisonment

Sexual offenses Sexual interference with another without their consent

Arson Unlawful and deliberate destruction of property by fire

Burglary Breaking into a premises with the intent to commit a criminal offense

Robbery Unlawfully obtaining the property of another through threats or infliction of bodily harm

Theft Unlawful taking of the property of another. There are also offenses for possession of
property obtained by crime

Forgery Creating a false document for the purposes of depriving another

Disorderly conduct Causing a public disturbance

Willful damage Unlawfully causing damage to the property of another

Computer crime There are a number of computer crimes related to the unlawful altering or deletion of data
or the unauthorized use or misuse of a computer

Bribery Providing or receiving an unlawful benefit in return for doing or forbearing to do


something in relation to employment or office

Police, security, and prosecutors have different powers under the criminal code. Table 36-2 details some of those powers.

*
Note that some criminal offenses may be called by different names; e.g., burglary may be called breaking and entry.

X. LEGAL ASPECTS OF SECURITY


TYPES OF LAWS—CRIMINAL AND CIVIL 439

Civil Law Warranties—A special type of promise or


statement. For example, a guarantee that a fire
Unlike criminal laws, the purpose of civil extinguisher is effective on a certain type of fire.
law is to protect private rights and not public Agency—An important concept in the
rights. In civil cases, it is the individual who security industry. Agency raises a question
has been wronged who will undertake the of whether one person is acting on behalf of
civil action. The public prosecutor will not be another. For example, a protection officer uses
involved and the individual must pay for his excessive force in subduing a suspected shop-
own attorney and hire an investigator if one is lifter. Is the protection officer an agent of the
required. Any award that the court orders the retail establishment and is the establishment
defendant to pay will go to the victim (plaintiff) therefore responsible for damages (vicarious
and not to the state, as it would in the case of liability) that may have been inflicted in the
a fine. course of the arrest?
Any particular cause of action may be both The authority of the protection officer comes
civil and criminal. If someone is assaulted, the from the agency relationship with the prop-
police may investigate the matter as a crimi- erty owner, occupier, or employer that they
nal assault and the person responsible may are assigned to assist. That authority may be
be charged with that criminal offense. At the addressed in the contracts issued or by inter-
same time, however, the person assaulted may nal policies set up by the customer or employer.
decide to sue civilly for damages for the assault There may also be a number of written pro-
and battery. Both cases may proceed at the same cedures, manuals, or post orders that provide
time, although through a different court system instructions on the completion of duties whether
(see Table 36-3). The person responsible may be the protection officer is contracted or in-house.
fined or sentenced to jail in the criminal court These written instructions give the officer
but also ordered to pay damages in a civil court. authority as directed by the property owner or
Some areas of the civil law include: employer but can also make them vicariously
Contracts—The law covering binding agree- liable for the actions of the protection officer.
ments between two or more parties. For exam- Torts—A tort is a civil action that may be an
ple, a contract to provide security personnel to intentional wrong (e.g., assault, battery, wrong-
protect a property. ful imprisonment, or defamation) or it may be

TABLE 36-2 Criminal Law Powers

Private Security Public Police Prosecutor

Investigate Investigate on behalf of private Investigate on behalf of public May have investigative authority
party

Seize Some seizure authority on behalf Criminal powers to seize or obtain May have some power to obtain
of private party search warrants search warrants

Arrest Citizen’s power of arrest Criminal law powers May have some powers of arrest

Indict Only when by private May lay charges May authorize or lay charges
prosecution

Prosecute Only when by private Usually turned over to prosecutor Yes


prosecution

X. LEGAL ASPECTS OF SECURITY


440 36. LEGAL ASPECTS OF SECURITY

negligence (e.g., the failure to provide an appropri- Negligence may result in liability during the
ate level of security in an employee parking lot). performance of or failure to provide security
Many intentional torts are closely aligned to duties. Negligence is an actionable cause under
criminal offenses but Table 36-4 shows some common law so that someone who suffers dam-
others. ages as a result of the negligence of another may
Civil liability has caused increasing concern sue to recover their losses. Negligence may be
for the business community, and damages in due to failure to provide an appropriate level of
court actions have increased insurance pre- security, failure to have a contingency or evacu-
miums; hence, some types of liability insur- ation plans in place, or failure to warn someone
ance have become prohibitive to organizations. who is at risk as a result of a security exposure.
Executives and property owners have found Negligence can also be established through stat-
it necessary to defend against these crippling utes such as occupiers’ liability or occupational
costs by increasing security measures and health and safety legislation. Those statutes
through stringent screening and training. The require that the occupiers of premises provide a
protection officer has a strong role to play in safe work environment not only for employees,
protecting businesses against civil liabilities. but also visitors to the property and sometimes
even trespassers. It is the security officer’s duty
to assist the property owner in reducing risks
TABLE 36-3 Crime and Civil Law Comparisons
on the property and to recommend appropriate
Crime Civil Wrong methods of handling those risks. It is also the
security officer’s duty to ensure that emergency
Theft Conversion
procedures are properly followed, that training
Assault Assault or battery takes place to ensure those procedures work,
Trespass Nuisance and that everyone is familiar with them.

Administrative Law and


TABLE 36-4 Examples of Some Types of Torts Other Standards
Tort Description The security industry is also regulated by a
number of other rules and these, together with
Intentional infliction of Often initiated in conjunction
mental suffering with torts of assault, battery, or quasi-governmental standards, may create
false imprisonment. Causing liability if not properly followed. In the United
fear, shame, embarrassment, or States, these regulations include those passed
other emotional distress by the Offices of Homeland Security and the
Malicious prosecution Knowingly initiating a legal Inspector General or any one of a number of
proceeding that does not have federal, state, or local authorities. Both Canada
cause and the United States have federal regulatory
Defamation Making or publishing a requirements such as defense, air and commer-
statement that is untrue and cial transport, port security, and government
causes damage to another operational security regulations. There are
Invasion of privacy Unreasonable and offensive also a number of other standards that are not
intrusion on the private affairs regulated, such as those from the International
of another. Note that this may Organization of Standardization or Canada
also be regulated by privacy
Standards Association, that have recommended
statutes
standards for the security industry. Many trade

X. LEGAL ASPECTS OF SECURITY


TYPES OF LAWS—CRIMINAL AND CIVIL 441
associations such as ASIS International have action for recovery of damages or the employer
published security standards, as have industry from terminating the offending employee for
groups (e.g., the chemical industry’s security the workplace infraction. In fact, there may
code). Despite these standards not being regu- be other parallel regulatory actions such as an
lated by law, organizations should be aware of occupational health inquiry or an arbitration
them as they may be used in a civil or crimi- hearing to assess the grounds for termination.
nal action to suggest that the organization did
not meet a generally accepted industry norm.
Insurers may also publish standards (e.g., ter- Young Offenders
rorism security requirements) that affect pre- Legislation exists requiring special treat-
mium rates or the insurer may assess whether ment of juveniles (they may also be referred to
the organization is meeting some of the stan- in legislation as minors or young offenders) in
dards indicated above to assess premiums, risk, the course of interviews, detention, or arrest
and liability. and the protection officer should be famil-
iar with legislation for their local jurisdiction.
Legislation will vary in terms of the age prereq-
Labor Laws uisite, may require the presence or notification
Labor laws are established to set parameters of a parent or guardian, or may include liability
for employers and employees or their counsel, for failure to properly protect the confidentiality
associations, and unions to develop and enforce of the young offender’s personal information.
employment contracts. Table 36-5 delineates dif-
ferences among criminal, civil, and labor laws.
Search and Seizure
What are the rights of the protection officer to
Interaction of Criminal, Civil,
conduct searches and seize property at the work
and Labor Laws
site? Many employers have policies that estab-
It is a common misconception that initiation lish procedures for searches of vehicles, lockers,
of procedures in one sphere of the law will pre- or personal effects in order to deter theft, mis-
clude or forestall action in another. For example, use of company property, or the possession of
if one employee assaults another at the work illicit drugs or alcohol on site. When these poli-
site the police may be called in to initiate a crim- cies are challenged by labor unions or through
inal investigation, but this does not preclude the courts, the company may be required to
the assaulted employee from initiating a civil establish that the search was reasonable, that

TABLE 36-5 Criminal, Civil, and Labor Law

Criminal Laws Civil Laws Labor Laws

Purpose Protect the public good Compensate for damages Imposition and enforcement
of employment contracts

Applies to Whole community Private parties Employers and employees

Responsibility for handling Public prosecutor Attorneys for the parties Management and union

Potential outcome Fine or incarceration Damages or court order Court or arbitration award

X. LEGAL ASPECTS OF SECURITY


442 36. LEGAL ASPECTS OF SECURITY

there was some evidence to believe an employ- while on the property and may refuse to comply
ment offense had taken place, and that the with the search when leaving. The protection
search would result in the discovery of further officer should not force the issue and should sim-
evidence. The company may also be required ply report the matter. Management then has the
to show that the policy is applied consistently opportunity to treat it as a disciplinary infraction
within the workforce or facility and that it does if it is an employee, or has the right to refuse fur-
not target specific individuals or groups. Courts ther entry if it is a contractor or visitor.
and arbitrators will try to strike a balance During the course of a consented search, the
between the rights of the employer or visitor protection officer has the right to seize items
and the right to privacy of the individual. They found, such as the following:
may also look at whether the company consid-
1. Property of the employer or property owner
ered all other reasonable investigative means
that the officer is required to protect and for
before embarking on search procedures. This is
which the subject has no obvious permission
especially true in cases where searches are con-
to possess
ducted on employees or their personal effects,
2. Evidence of the commission of a crime (i.e.,
as the company will be required to show that
company property, burglar tools, controlled
they established procedures to protect the pri-
substances, etc.)
vacy of its employees.
3. Weapons that could be used to injure the
The Private Security Advisory Council*
officer, an innocent third party, or the subject
advises that the following are instances where
4. Items that could help the subject escape
there may be legitimate grounds for a search:
detention
1. Where there is consent by the person being
If no consent exists, the protection officer
searched
has no right to conduct a search. Any items
2. Where there is implied consent as a
found as the result of an illegal search cannot
condition of employment
be seized and may not be accepted in judicial
3. Where it is incidental to a valid arrest
proceedings. However, any of the previously
(although some jurisdictions require
listed items that are in plain view may be
probable grounds for the conduct of the
seized because the seizure is not the result of
personal search)
a search. All authorized searches and seizures
4. Where it is incidental to valid conditions
must strictly comply with established proce-
(e.g., as a condition of boarding a commercial
dures developed by the employer or property
aircraft)
owner. Additionally, protection officers should
Many companies also have policies requiring be familiar with statutes for their jurisdic-
people to submit their vehicles or personal effects tion concerning search and seizure by private
to search on leaving the property. These are usu- persons. This will minimize the possibility of
ally in conjunction with a notice at the entrance criminal or civil actions against the officer and
indicating that these items may be subject to the employer or property owner. Familiarity
search. Even though an employee or visitor may with the local laws will also help assure that the
imply that they will allow their vehicle or per- employer’s or property owner’s policies and
sonal effects to be searched by entering the prop- procedures concerning search and seizure are
erty, they have the right to change their mind in compliance with the statutes. Searches are

*Private Security Advisory Council, Scope of Legal Authority of Private Security Personnel, Law Enforcement Assistance
Administration, U.S. Department of Justice, 3 (1979).

X. LEGAL ASPECTS OF SECURITY


TYPES OF LAWS—CRIMINAL AND CIVIL 443
very personal and can cause great embarrass- to the trial can be several months or even years
ment, especially if the subject has committed no and the importance of notes cannot be over-
crime. Searches should be conducted discreetly emphasized. The protection officer should also
to minimize public embarrassment for the sub- ensure that reports are accurate and detailed. The
ject and adverse public/employee reaction to report itself may be entered into evidence and the
the officer conducting the search. officer may be required to explain discrepancies.
Likewise, statements taken from witnesses should
be accurate and detailed. The officer should prop-
Evidence
erly prepare for any trial or discovery hearing
Evidence is the proof that is required to and questions should be answered as clearly and
establish the guilt or innocence of the accused. directly as possible. Many witnesses lose credibil-
Evidence may be one of the following: ity because they are afraid to answer a question
by saying “I don’t know” or by trying to answer a
1. Real—a physical object, a gun, a piece of
question that has not been properly clarified.
stolen property
Any one of the forms of evidence indicated
2. Documentary—a contract, a photograph
above may be direct or circumstantial. Direct
3. Testimony—the oral statement of a witness
evidence proves the facts in issue directly.
while under oath
Circumstantial evidence proves the facts in
Evidence must meet certain requirements in issue indirectly. A smoking gun does not prove
order to be admissible in court. For example, a that the person holding it pulled the trigger, but
protection officer seizes a stolen computer from the inference may be drawn and it is therefore
an accused, but fails to secure the evidence circumstantial evidence that may be admissible
before it is turned over to the police. Several in court. It is a common misconception that a
months later, the officer is called to testify in person cannot be convicted on circumstantial
court. He is presented with the computer and evidence alone. If the evidence is admissible
asked if it is the same one that was taken from and the case is strong enough, then it does not
the accused. He is forced to admit that he can- matter whether it is circumstantial or direct.
not be certain. The judge refuses to admit the The common law developed a rule making
evidence and the accused goes free. Chain of hearsay evidence (assertions of someone other
custody requires that real evidence remain basi- than the witness who is testifying) inadmissi-
cally unchanged since time of acquisition and ble in court, but exceptions to the hearsay rule
this is best achieved with chronological tracking are as important as the rule itself. The rule was
of custody and transfer of anything that may be developed so that the court would hear from the
required for court purposes. person who uttered the words rather than hav-
Any real or documentary evidence must be ing those words repeated by someone else. One
protected from the time that it is obtained. If pos- important exception to the hearsay rule is testi-
sible, an identifying mark (e.g., initials and the mony from expert witnesses. Normally a witness
date) should be put on it so that the officer can is only allowed to testify about matters that they
later identify it in court. Extensive notes should saw or heard but, where a court accepts a wit-
also be taken during the inquiry, or immediately ness as an expert on a certain matter, that witness
after, while it is still fresh in the mind of the inves- can testify based on their education and profes-
tigator. The judge will place a great deal more sional experience. Another exception is busi-
weight on testimony where a witness’s memory ness and banking documents that, depending
can be refreshed from notes made at the time of on evidentiary statutes for the jurisdiction, may
the inquiry. The time that passes from the event be accepted as proof of their content.

X. LEGAL ASPECTS OF SECURITY


444 36. LEGAL ASPECTS OF SECURITY

Another important exception to the hearsay investigation. A bad interview during the prelimi-
rule is the admissibility of confessions in court. A nary investigation can cause information obtained
protection officer would not normally be allowed during later interviews to be unusable. The pro-
to repeat (in court) a statement made by a suspect, tection officer should know what he or she legally
but if the statement is accepted as a confession, can and cannot do during interviews.
it may be admitted as long as it was voluntary. Under the Miranda rule in the United States
A confession cannot be admitted in court as and Charter of Rights requirements in Canada,
evidence if there were threats, intimidation, or the police are required to advise an accused of
promises that induced the accused to make the their right to counsel, that they are not required to
statement. A threat does not necessarily have to make a statement, and that the statement may
be a threat of violence. A threat to terminate some- be used at trial. There is no duty to “Mirandize”
one’s employment if they don’t tell the employer or Charter Caution the private individual
what happened may be enough to question who gives a confession. There have been some
whether the accused confessed because he really attempts to argue that private security may be in
did it or whether he confessed because he wanted a “position of authority” in conducting investiga-
to keep his job. Similarly, a simple promise that tions and interviews and therefore the U.S. Fifth
“things will go better for you if you tell us what Amendment or Canadian Charter rights apply.
happened” may be sufficient to question the reli- These challenges have been largely unsuccess-
ability and admissibility of a confession. ful, although in Canada it has been held that an
Usually the police will be involved in inter- employer in a governmental function (e.g., fed-
viewing an accused to receive a confession, but eral, provincial, or municipal government bodies)
there may be occasions where a statement made must follow Charter provisions in conducting
to a protection officer will amount to a confession investigations. Generally, the protection officer
and may later be used as evidence in court. A con- need only ensure that the confession was will-
fession is simply a written or oral statement made ingly given. A confession need not be a lengthy
by an accused. Even a denial by the accused may written statement; it may be a simple oral state-
amount to a confession if the prosecutor is able to ment such as “I shouldn’t have taken it.” The
prove that the accused lied in making the denial officer should accurately note any statements by
(e.g., an attempt to set up an alibi). The protection the accused so that there will be no confusion
officer should keep detailed notes of anything that later in court as to exactly what was said.
an accused says because it may later contradict a If the officer has occasion to interview a sus-
statement made to the police. For example, an pect, the following steps will help ensure the
accused may tell the protection officer that he admissibility of a confession:
wasn’t in the area when the offense was commit-
ted and he may later tell the police that he was in 1. The suspect must be offered a chance
the area but he didn’t do it. The two statements to contact counsel and should be given
constitute a lie and may be admissible in court as the opportunity to carry on a private
proof of guilt. conversation with counsel.
Interviewing witnesses and suspects requires 2. The object of the interview is to learn the truth,
techniques that not everyone can master to the not to induce a pattern of deceit or obtain
same degree. Generally, the protection officer will answers that the questioner wants to hear.
interview witnesses, victims, and/or suspects dur- 3. There should be no actual or implied threats
ing a preliminary investigation. More thorough or promises.
interviews may be done later by investigators or 4. The accused should be given the opportunity
law enforcement personnel during the follow-up to give a full explanation.

X. LEGAL ASPECTS OF SECURITY


TYPES OF LAWS—CRIMINAL AND CIVIL 445
5. The accused should be questioned in property. The employer or property owner des-
a language and phraseology that they ignates the protection officer as their agent to
understand—“legalese” or technical terms protect the property and enforce their guide-
not known to the accused should be avoided. lines concerning it. Many protection officers are
6. The interviewer should not ask ambiguous responsible for property with public access for
questions. business or recreation purposes and, as a result,
7. The interviewer should not be aggressive or it may seem difficult to determine when a tres-
abusive to the person being interviewed. pass occurs. Generally, one or more of the fol-
8. Where possible, a signed statement should lowing must be present for a trespass to occur:
be obtained and a second witness should be
present. 1. The subject does not own or have other legal
rights to access the property.
The Burden of Proof 2. The subject must know this.
3. The subject does not have the permission
The burden of proof is different in a civil
of the property owner or agent (i.e., the
action than it is in a criminal matter. In a civil
protection officer, tenant, etc.) to enter upon
action the plaintiff need only prove their case
or remain on the property.
on a balance of probabilities, while in a crimi-
4. The property is posted in accordance with
nal trial the prosecutor is required to prove guilt
local ordinances with signs prohibiting
beyond a reasonable doubt. This is why a plain-
trespass or fences and/or other barriers
tiff may be successful in a civil matter while the
present that would cause a reasonable person
same defendant may be found not guilty in crim-
to believe they are not to enter the property.
inal court for the same set of circumstances. As an
5. The property owner or agent has lawfully
example, O.J. Simpson was found not guilty in
requested the subject to leave the property.
criminal court, but the families of his victims were
6. The subject enters the property, or refuses to
successful in a civil action for wrongful death.
leave, after seeing posted notices or physical
Some jurisdictions apply a burden of proof some-
barriers, or after receiving a lawful request to
where between the two in labor arbitration cases
leave.
involving moral turpitude (e.g., workplace theft).
They may use terms such as “clear and convinc-
The protection officer should be familiar with
ing evidence” or “a preponderance of evidence.”
the statutes and local regulations concerning
In a criminal trial in common law jurisdic-
trespass to assure that he or she is acting within
tions, the burden is always on the prosecutor to
the law when dealing with a possible trespass.
prove that the accused is guilty beyond a rea-
Generally, the protection officer will not have to
sonable doubt. The onus is not on the accused to
arrest a trespasser unless the subject is suspected
show that he is innocent. This has been referred
of or known to have committed, other crimes on
to as the “golden thread” that runs through our
the property or unless the suspect had been previ-
judicial system. Because of this rule, the secu-
ously evicted from the property and has returned
rity officer must take steps to protect the admis-
when instructed not to do so. In most cases, the
sibility of any evidence that is collected.
subject will leave when advised that they are tres-
passing. In others, the subject may not leave unless
Trespass
the protection officer tells them the local police
Both the common law and statutes recognize will be contacted to arrest the individual for tres-
the property owner’s right to control access pass. However, if the protection officer must make
to, use of, activity on, and protection of their an arrest, he or she must know the statutes and

X. LEGAL ASPECTS OF SECURITY


446 36. LEGAL ASPECTS OF SECURITY

regulations for that jurisdiction concerning arrests


c. Licensed
by private citizens, property owners, or agents.
d. Acting in the best interests of the store
e. Did not use excessive force
CONCLUSION 3. A person can be convicted on circumstantial
evidence alone.
A review of the development and current status a. True
of our legal system reveals two important trends. b. False
The first is the ever-increasing number of laws, 4. If a law is not written down and passed by
regulations, and standards being imposed on government it is not law.
industry. These include legal requirements directly a. True
related to protective services or requiring adapta- b. False
tions to the way we undertake business because of 5. The purpose of our legal system is to:
legislation such as human rights, privacy require- a. Set down our obligations to each other
ments, or occupational health and safety regula- b. Set penalties for breaching those obligations
tions. This increased complexity has necessitated c. Establish procedures to enforce those
protection officers to undergo constant training, obligations
updating, and research to stay abreast of the legal d. All of the above
requirements to undertake protection work. 6. The common law is not used in North
The second trend is the shrinking world and America today.
increased globalization of business. One of the a. True
consequences of this trend is the accessibility of b. False
terrorists to businesses in North America and 7. You cannot sue someone and press criminal
abroad and the resulting increase in the number charges. It is double jeopardy.
of regulatory requirements to properly protect a. True
organizations and people. The second conse- b. False
quence is the requirement that organizations and 8. At criminal trials, the prosecutor must prove
the security industry be cognizant of the require- the accused guilty:
ments of foreign governments in order to do a. On a balance of probabilities
business abroad and to engage in international b. Beyond a reasonable doubt
trade. These sometimes result in a conflict of laws c. By a preponderance of evidence
or cultures that ultimately produce more regula- d. Without a shadow of doubt
tions, such as foreign corrupt practices laws. 9. The police will investigate:
a. Civil matters
b. Criminal matters
S E C URI T Y QU IZ c. Whatever the prosecutor asks them to
1. A protection officer may force a search of an investigate
employee where there is a company policy. d. All of the above
a. True 10. A confession may not be admissible in court
b. False unless it can be shown that (check all that apply)
2. A store can be liable for the actions of its a. There was no threats
protection officer if it can be proven that the b. It was made to the police
officer was: c. There was no promises
a. Their contractor d. There was a witness present
b. Their agent e. A signed statement was provided

X. LEGAL ASPECTS OF SECURITY


U N I T XI

OFFICER SAFETY AND


USE OF FORCE

37 Use of Force
38 Defensive Tactics and Officer Safety
39 Industrial Hazards, Safety, and the Security Patrol Officer
40 Apprehension and Detention Procedures
This page intentionally left blank
C H A P T E R

37
Use of Force
Charles T. Thibodeau and
Christopher A. Hertig

the corporate culture,” management’s representa-


CHAPTER OBJECTIVES tive, charged with keeping an orderly, safe, and
● List general concepts for use of force productive environment in accordance with
● Explain when force is justified the organizational philosophy of our employer.
We are the ambassadors of the organization
● Indicate when to retreat and serve a substantial public relations role. We
● Define excessive force liability enforce rules, extend ourselves to help others,
● Reinforce importance of officer safety and assist in making the organization run more
while using force smoothly. We touch all parts of the organization
● Reinforce importance of maintaining and help it to function.
self-control Unfortunately, though, there are times when
protection officers must use force. We have a
● Describe use of force alternatives right to protect ourselves from physical assault
● Explain the escalation/deescalation and we have a duty to protect others from harm
continuum as well.
● Define verbal deescalation Obviously, the use of force is something that
● Lethal and less-than-lethal weapons is unpalatable, yet at times very necessary. As
management much as possible, we need to decrease the fre-
quency and degree of force used, without creat-
ing a personal safety hazard. As a general rule,
the more proficient the officer is at their duties,
USE OF FORCE the less that force is needed. Professional pro-
tection officers understand how to manage the
The legally and socially acceptable use of behavior of others with firmness and diplo-
force by protection officers is a key issue in our macy. They know that the ideal security person
contemporary—and future—society. As secu- is “the iron fist in the velvet glove.”
rity personnel, we enforce rules and ensure If we find ourselves resorting more and more
compliance with them. We are the “preservers of to the use of force, it is indicative of a systemic

449
450 37. USE OF FORCE

failure. It could be that we are not following USE OF FORCE IN GENERAL


instructions, we are a little shortsighted in our
planning, or we have failed to be alert enough A definition that attempts to describe the
to observe imminent danger. When this hap- reasonable use of force as “an amount of force
pens in private security settings, the potential equal to or just slightly greater than the force
exists for extensive damage, injury to people, used by the aggressor” is sometimes mislead-
and loss of expensive assets. The potential also ing. Use of force is much better defined with
exists for increased legal liability and expen- respect to the concepts of belief, reasonable-
sive court litigation. Simply put: “If you have ness, and necessity. For instance, an officer may
to force it, you’re doing something wrong.”— choose to use pepper spray to disarm a per-
H. H. Thibodeau son with a knife. In that case, the officer actu-
“Security,” at least ideally, implies a stable, ally uses less force than the aggressor does. At
relatively predictable environment in which an the same time, the choice of a less-than-lethal
individual, group, or community may pursue defensive weapon supports the assertion that
its ends without disruption or harm and with- the officer’s use of force was reasonable.
out fear of disturbance or injury. This definition Use of force is any tactic used to control, dis-
necessarily includes personnel safety, fire safety, arm, capture, restrain, or otherwise physically
and emergency medical response, as well as manage an aggressive or uncooperative subject.
safe and secure streets, homes, commercial Force is any touching of a person. Force is predi-
businesses, parking areas, and work sites. cated on the security officer’s reasonable belief
To accomplish our society’s need to maintain that the choice of weapon(s) and the amount of
order, we have formed governments based on force used were necessary, reasonable, and the
laws, which express the desires of its citizens. only alternative.
In addition, we rely on physical security, which Each use of force must accomplish a legiti-
consists of those countermeasures required to mate and lawful purpose. At the same time,
promote a state of well-being, to protect life and each use of force must appear, to a prudent and
property, and to avoid or minimize the risks judicious person under identical circumstances,
of natural or man-made disasters and crimes. to be reasonable and necessary. Reduced to its
Unfortunately, from time to time, we have no lowest common denominator in a court of law,
other alternative than to use force to accomplish the appropriateness of each use of force will be
a legal goal. This may occur when we have no measured by an “objective reasonableness and
ability to retreat. Or we have tried verbal per- necessity standard” versus whether the use of
suasion, set limits, used loud-verbal commands, force was a “deliberate and wanton infliction
and all attempts have failed. We can only of pain.”
accomplish the required goal by using force. In use of force litigation, the following
The information in this unit of study will motives will most likely not help acquit the
deal with this important aspect of the security security officer: fear, retaliation, punishment,
officer’s responsibilities. It is presented as a gen- accident, or loss of control. If the officer claims
eral educational guideline; specific procedures that the subject was inadvertently injured while
must be developed and adopted by the officer’s in custody, that admission may be viewed in
employer. This chapter is a starting point on a court as an indication of negligence. All force
lengthy journey. Each officer is strongly recom- used by security personnel must be based on
mended to obtain additional education and the officer’s belief that the assaulter was show-
training in this important area of a protection ing a manifest intent to cause the officer or a
officer’s professional development. third party severe bodily harm or death, or that

XI. OFFICER SAFETY AND USE OF FORCE


JUSTIFYING THE USE OF FORCE 451
the subject of an arrest would escape if force to retreat, and preclusion. These questions should
was not used. Even under these conditions, be asked after the officer’s use of force:
that use of force must be a reasonable and nec-
1. Did the aggressor have the ability to cause
essary solution, and the execution of force was
harm or injury? Were they able to hurt the
calculated, measured, deliberate, and at all times
officer or others?
controlled. Failure in any one of these tests could
2. Did the aggressor exhibit a manifest intent
lead to discipline by the employer, a civil suit,
to cause harm or injury? Did the aggressor
and possible criminal prosecution. The protec-
display intent to injure?
tion officer can lose their job, get tied up in an
3. Was the officer or others in imminent
expensive lawsuit, or potentially go to prison.
(immediate) jeopardy of harm or injury?
The above rules apply to any use of force.
4. Did the officer or others have the ability to
This can include restraining an overzealous fan
retreat and avoid harm or injury?
at a concert, holding down a mental patient in
5. Was the officer in preclusion? In other words,
a hospital, or apprehending a shoplifter. Use of
were they precluded or prevented from taking
force may also occur during the removal of a
actions other than using force? Was there no
person who is trespassing or causing other kinds
other alternative than the use of force?
of disturbances (i.e., in bars, taverns, and clubs).
The reasonableness of any force used by a If the officer cannot answer all of these ques-
security officer is largely dependent upon the tions in the affirmative, that officer may have
totality of the circumstances of the incident. In serious trouble justifying his or her use of force.
simple terms this means that every aspect of There are five primary justifications for using
the situation must be examined. Where the sub- force. These justifications consist of the officer’s
ject presents no threat to the officer, no attempt reasonable belief:
to escape an arrest, and no resistance to ejection
1. That harm would come to the officer or to
from a building, no use of force is permitted.
someone else if force was not used
For example, several cases have held that the
2. That the actions taken were necessary
use of force during interrogation of a suspect is
3. That the actions taken were reasonable
not justified in the absence of evidence that the
4. That the actions taken conformed to
suspect attacked the officer. Note: Interrogation
employer policy and training
(or focused interviewing) should never involve
5. That the officer was precluded from escaping
touching the suspect or witness being inter-
or taking other defensive/control actions and
viewed. A simple rule is: “When touching
as a result had to use force
starts—interviewing ends!”
It is always better, of course, if force is used
under the definition of an assault described
above. Using force to defend property may be
JUSTIFYING THE USE OF FORCE legally permissible, but it is generally frowned
upon by the courts. Courts prefer that prop-
The primary defense in a charge of excessive erty owners utilize legal options, such as civil
use of force will have to do with the question recovery “replevin” actions and injunctions to
of assault. That is, did the subject trigger a use retrieve property. When using force to protect
of force due to their assault of the officer or the property it is wise to remember the following:
assault of others? It is therefore helpful to know Property can be replaced; people cannot.
that the claim of assault consists of five parts: If a security officer is arrested or sued for use
ability, manifest intent, imminent jeopardy, ability of force, there are several additional factors that

XI. OFFICER SAFETY AND USE OF FORCE


452 37. USE OF FORCE

will have an impact on the outcome of that case. necessarily connotes the use of verbal deescala-
Courts will consider the following issues: tion, removing persons from the “conflict zone,”
negotiating conflict resolution, maintaining a
1. Did the officer act under a reasonable belief?
noncombative atmosphere, and calling in public
2. Did the officer have a duty to retreat?
law enforcement. These are some of the many
3. Did the officer give the aggressor a request
alternatives that should be attempted before
or command to desist?
using force.
4. Did the officer follow department policy
and procedure?
1. Take time—slow down the action. Haste
5. Did the officer follow department training?
gets people hurt! Haste makes casualties.
6. Did the force used produce the desired
2. Awareness—recognize potential threats.
results?
Being alert is a key issue.
7. Did the officer place any third party in
3. Evaluate—get all the facts and pieces of
jeopardy?
evidence that are available. Understand the
8. Will the truth be relevant?
problem before acting to solve it.
9. Will the witnesses tell the truth?
4. Never respond in anger! Take a step back.
10. What or who will the jury believe?
Take a few deep breaths. Take your time.
11. What or who will the judge believe?
5. Be an actor—preclude (prevent) the problem
12. What or who will the public believe?
from escalating and erupting—not a reactor.
6. Maintain a safe distance.
RETREAT 7. Smile. Be as pleasant as appropriate under
the circumstances.
The basic rule is: “If you can retreat without 8. Be polite—show respect to everyone,
injury to yourself or others, you must retreat.” The including the aggressor.
word “retreat” does not mean to run away and 9. Really care about people! Caring is
go hide somewhere. It means to move to a safe projected in an officer’s demeanor.
place, remaining in view of the conflict zone, 10. Apply active listening techniques to show
but at a safe distance. It includes being behind interest in what another is saying.
cover (objects or materials that protect the offi- 11. Call for backup before acting, using force
cer) and calling for backup. including the police when necessary.
If, while under attack, the officer sees an 12. Recruit assistance from nearby persons if
opportunity to retreat, that officer must ter- necessary.
minate the use of force and retreat, but only if 13. Ask the perpetrator’s friends and relatives
he/she is not placing him/herself, or others, to speak to the perpetrator.
in jeopardy. In deadly force confrontations, the 14. Be slow to speak, slow to anger, quick to
officer has no alternative but to retreat if that listen.
option is available. 15. If all else fails, expect to be hit or grabbed.
16. Expect any hit to hurt, but brush it off. It is
not the end of the world.
FORCE ALTERNATIVES DEFINED 17. Engage in tactical retreat; when things get
hot, back off and get behind cover.
Alternatives to the use of force amount to any 18. Use loud assertive commands: “STOP!” and
method or tactic that can be used to deescalate “NO!” Hit him with your voice.
incidents without the use of defensive weap- 19. Use repeated commands: “DROP THE
ons, threats, or aggressive action. This definition KNIFE!” “DROP IT.” “DROP IT.” “DROP IT!”

XI. OFFICER SAFETY AND USE OF FORCE


ARREST AND DETENTION SEARCH AND SEIZURE 453
“DO IT NOW!” “DO IT NOW!” “DO IT diabetic shock with alcoholic disorientation
NOW!” Hard verbals are effective in certain (both can include staggering and slurred
circumstances. speech). First aid training and constant
20. Continue verbal deescalation. Be patient monitoring of the subject are necessary for
for as long as it takes. Remember: Managing his or her safety.
human behavior is lot like fishing. It takes time.

INJURIES TO OFFICERS ARE


EXCESSIVE FORCE LIABILITY AVOIDABLE
An examination of use of force cases, that If we were to analyze the last 100 injuries to
resulted in injury and/or liability, shows that security officers, we would probably find that
these cases commonly involve the following: the officer was not the victim, he or she was a
1. Use (or threat) of any force where the participant. Most injuries occur due to the offi-
subject offers no resistance. cer’s own failure to follow their training and
2. Negligent use of normally nonlethal force, common sense. The following are some exam-
resulting in death or serious injury. ples of how security officers become partici-
3. Excessive force as an overreaction to subject’s pants in their own injuries:
resistance to officer commands (force 1. The officer is injured by taking a bad position,
continued past the point of no resistance). such as standing directly in front of the subject,
4. Intentional infliction of pain (excessive too close to the subject, or not using cover.
force) considered summary punishment. 2. The officer is injured by having the wrong
5. Use of deadly force in a situation in which attitude. Carelessness, overconfidence,
it is not permitted. demeaning tone of voice, cockiness, and so
6. Failure to provide medical treatment for on all cause problems with others.
injuries from an officer’s use of force. 3. The officer is injured by relaxing too soon.
7. An officer deliberately strikes or inflicts “It’s not over till it’s over.” Do not turn your
pain upon a subject after the subject is back on a subject too soon.
placed in restraint—using force to punish. 4. The officer is injured by failing to search
Obviously any force used after a person a suspect—always do a visual search at a
has been restrained will be looked at very minimum!
critically. 5. The officer is injured by failing to watch the
8. An officer entices or provokes a subject into suspect’s hands—look at the palms of each
reacting aggressively, so as to create cause hand. The palms will be where a weapon
for using force. Poor interpersonal skills is held.
create crises!
9. Death of a subject under the officer’s
control due to positional asphyxia (also ARREST AND DETENTION
known as “restraint asphyxia”). Use of SEARCH AND SEIZURE
proper restraint techniques, which do not
impede breathing, is critical! All persons An arrest is completed whenever the security
restrained must be continuously monitored officer detains a subject and refuses to let that
for health problems and escape attempts. person leave, over the subject’s objections. The
10. Officer mistakenly reacts to a subject with a hold may technically be a “detention” accord-
severe medical problem, such as confusing ing to state or provincial law. The civil tort that

XI. OFFICER SAFETY AND USE OF FORCE


454 37. USE OF FORCE

will be filed, however, is for false arrest. All question is: “Who is the person we most earnestly
stops where the subject is not allowed to leave want to control?” Is it the drunk, the jealous
are by definition an arrest in a civil suit. spouse, the angry employee? No, it is us! In order
In addition, there is no room in the law on to maintain control of others, we first must find
arrest for cuffing someone for officer safety a way to control ourselves when under pressure.
like the police do, with the intent of uncuffing Remembering the formula set out below might
them and letting them go after the danger has help keep everything in perspective when faced
passed. Putting the cuffs on, no matter the rea- with high-stress, potentially aggressive situations.
son, implies the subject is under arrest. Taking
the cuffs off later and “unarresting” the person The Control Formula
will require a lot of explaining! In most cases a
citizen, who is not a sworn peace or police offi- C ⴝ I/E
cer, has no qualified immunity (protection from 1. CONTROL ⴝ INTELLECT over
suit under certain circumstances, such as hav- EMOTIONS
ing “reasonable suspicion” or “probable cause”) 2. Add a Problem: I/E ⴙ P ⴝ E/I
and is subject to suit. 3. Add Training: E/I ⴙ T ⴝ I/E
If you do not intend to follow through with 4. I/E ⴝ CONTROL
calling the police and having the subject taken to
jail, never put cuffs on him or her in the first place. Key:
The only reason to cuff a subject is to prevent C  Control/I  Intellect
them from escaping during your citizen’s arrest, E  Emotion/P  Problem
and for the protection of the officer and others T  Training
while waiting for the police to come. Remember,
only the police can remove those handcuffs! If the The above formula means that control is
security officer removes the handcuffs for any equal to “I” (intellect) over “E” (emotions). Thus,
reason, other than a medical emergency, they are we are in control when our intellect rules our
becoming a “liability initiator.” emotions. When we introduce “P” (problem) to
During the arrest process, searches are the equation, it may have the effect of turning
allowed, but only weapons searches. These are the equation upside down. Thus, I/E  P  E/I.
searches of the outer clothing for hard items Emotions then are in control of our intellect!
which could reasonably be expected to be a When running on raw emotions, we can get
weapon. Generally speaking, security officers hurt or we lose control and hurt someone else.
should not be searching purses, backpacks, Without realizing it, we might use excessive
pockets, fanny packs, or any other part of the force, which might lead to getting sued.
person or property of the person during a citi- However, adding “T” (training) to the equa-
zen’s arrest. It is probably best to secure these tion tends to reverse the negative effects of “P.”
out of the reach of the arrestee and have the At this point the equation is E/I  T  I/E.
police search them when they arrive. In addition, as is pointed out above, I/E  Control.
What all of this means is that by developing a
trained response to perceived use of force situa-
A FORMULA FOR SELF-CONTROL tions, emotions can be held in check. With the
intellect in charge, officers can more effectively
Use of force is all about control. Sometimes maintain control. That is why verbal deescalation,
pro-active preventive security plans break down, if practiced regularly, has proven to be an excellent
and force is required to maintain control. The nonlethal defensive weapon to use in aggressive

XI. OFFICER SAFETY AND USE OF FORCE


RESPONSE TO AGGRESSIVE BEHAVIOR 455
situations. Verbal deescalation can eliminate the of this continuum in use today. These exist in
use of physical force in the vast majority of situ- corporate and contract security as well as in the
ations and can also help the officer to get along ranks of public law enforcement. The follow-
better with those in the work environment. ing outline is only a basic model. It represents a
Resolving conflict amiably is the essence of a pro- continuum that the security officer might want
tection officer’s job and those who excel at it have to follow.
long and rewarding careers, absent of all sorts of Realize when reading the following steps
trouble, including lawsuits. Conflict resolution is that individual circumstances will necessitate
the cornerstone of officer survival. modifying them. The steps used in the applica-
tion of force change when the aggressor skips
CONFLICT RESOLUTION FORMATS some of the lower level steps. Keep in mind that
each step does not have to be taken in every
Most contract and proprietary security depart- situation. The escalation/deescalation contin-
ments adhere to a form of security called “hands- uum outlined can best be thought of as a gen-
off” security. That means that we must do the eral guide that changes with the circumstances
job outlined for us without touching anyone. of each situation. In the final analysis, security
Generally speaking, after an unsuccessful attempt officers must always follow the use of force pol-
at resolving a conflict by use of verbal deescala- icy established by their employers!
tion, we just call the police and let them handle it.
In other security groups the use of hands-on The Escalation/Deescalation
security tactics is not only allowed but expected. Continuum Content
For instance, an officer assigned to secure a bar,
tavern, or nightclub where drinking of alco- The word “continuum” as used here means
holic beverages is taking place can expect that to follow a set path or series of steps in a par-
from time to time the use of force will be neces- ticular order. These steps can be flexible, as men-
sary. Working in any hostile environment such tioned above, but Steps 1 and 2 must be present
as hospital emergency rooms, some concerts, in every use of force, no matter what. In addi-
and sporting events will require a hands-on tion, notice there is no step for sneaking up on a
approach. So, too, will some retail stores where subject and taking advantage of the element of
arrest of shoplifters is a common experience. surprise. The tactic of surprise may work well
Gang-infested apartment projects will also call for sworn law enforcement officers but it will
for a hands-on security contingent. probably create lawsuits for security personnel.
Thus, keep in mind that these two types of Step 1. Officer presence or “uniform presence”
security, hands-off and hands-on, exist for a rea- is the first step in the continuum. The mere
son and the officer must follow the standard oper- presence of an authority figure establishes a
ating procedures of the one they are assigned to. degree of psychological deterrence. In some
cases that is all it takes to terminate a potential
RESPONSE TO AGGRESSIVE conflict. The hostile atmosphere may break
BEHAVIOR down and the participating parties may walk
away if they realize the potential for the police
The Escalation/De-escalation Continuum being called and going to jail if they continue.
To help guide the security officer’s use of Step 2. The second step in the escalation/
force we turn to a process called the escalation/ deescalation continuum is verbal deescalation.
deescalation continuum. There are many forms Offering help and asking questions of

XI. OFFICER SAFETY AND USE OF FORCE


456 37. USE OF FORCE

the subject, as the initial communication logical step. By contrast, if a nonphysical


approach, will give the officer an edge. By hands-off escort is working, keep it going
asking questions, the officer is increasing his/ until the subject leaves the area.
her psychological control over the situation. Hands-on security: Soft, empty-hand control,
The first sign of this working is when the such as grasping the subject’s elbow and wrist,
action slows down and the participants direct and leading them away (or any other escort
their communication to the officer. Persuasion hold) may be required to remove the subject
and limit setting can be part of this step. from the conflict zone and out of the public eye.
Informing the aggressors that the officer This maneuver is done for two purposes. First
will call the police if the aggression does not it will add incentive for the subject to cooperate
stop can be a great tool only if the officer is and leave the area. Second, it will give the secu-
actually willing to follow through and call the rity officer an immediate response, and indicate
police. Bear in mind that any limits set must if the aggression is truly over or if the subject
be realistic. The officer must be ready, willing, needs more coaxing. That is, at the first point
and able to enforce them. of touching the subject, the subject may react
Many times, commands are necessary. aggressively and engage in a fight. If the sub-
“Heavy control talk” or “hard verbals” used to ject complies and does not complain about the
direct the subject, such as “Stop,” “Back off,” physical contact, then it is a pretty good indica-
“Drop it,” “Do it now,” and so on, provide a tion the aggression is over. It must always be
psychological control factor. Note that there borne in mind, however, that “it is not over until
should be short, simple, emphatic, loud verbal it is over.” Be on alert the entire time for a rever-
commands given to a subject who is physically sal in the subject’s behavior.
resisting or aggressive. Doing so ensures that WARNING: With the first touch of the
the use of force follows a logical, and justifi- subject in a soft empty-handed escort, it is
able, continuum. It also dramatically increases reasonable to expect to be hit and anticipate
the effectiveness of any physical force exerted. it to hurt. Officers should not allow
Additionally, witnesses to the event will hear themselves to be surprised by a “sucker
the command and will be better able to place punch.” Additionally, emotional responses
the use of force in its proper perspective. are counterproductive. No revenge response
Once the verbal deescalation effort starts, it is allowed. Force must always be used to
must continue throughout all continuing escala- prevent harm or injury, not to “get even”
tion of physical efforts, all the way up to deadly with an aggressor. Whenever touching any
force. Protection officers should not stop verbal- subject, expect an immediate response and
izing until the aggressive behavior and partici- an escalation of aggression. Being punched,
pants are gone. kicked, stabbed, hit with an object, or shot
Step 3. Hands-off security: In hands-off are possibilities. It is best to evaluate the
security departments (which most security situation carefully before attempting to
departments are), the department does not intervene at this stage in the continuum.
allow the officer to touch anyone unless The officer MUST BE 95% CERTAIN that
they are attacked by the subject. In these the aggression is over and the control tactics
departments, this third stage necessitates a being used are working.
911 call to the local police. Since soft, empty- A rule-of-thumb practice in the protective
hand physical escort is not allowed, calling services industry is that the officer should never
the police if verbal deescalation fails is the approach the aggressor alone. Having one

XI. OFFICER SAFETY AND USE OF FORCE


RESPONSE TO AGGRESSIVE BEHAVIOR 457
more officer than the number of persons being compliance. As set out in number 4, it will
approached is a good rule of thumb. Generally be necessary to arrest the aggressor for some
speaking, the more bodies the officer brings to specific crime, handcuff the aggressor, and
an intervention, the less likely hostility will be call the police. Keep the subject restrained
directed at the officer. until the police arrive. Monitor and assess
the subject for medical problems, escape
Step 4. In some cases, officers will be forced attempts, or violent behavior. The crime the
to use a less-than-lethal incapacitation aggressor was arrested for should have a lot
device, such as an oleoresin capsicum aerosol to do with self-defense or defense of others.
(pepper spray), on the subject to protect There should be a very clear observation of
themselves or others, or to obtain compliance the aggressor being assaultive.
with restraint techniques. Weapon retention
and spray-back are key concerns, however, WARNING: The above should not be
bringing a weapon to a confrontation that attempted without documented, professional
can be used creates problems for protection training. Get lots of help; never approach
officers. It complicates the situation in alone.
that officers must protect themselves and Step 6. The next level of escalation is the
others. Regular practice of weapon retention empty-hand impact. Delivery of stunning
techniques is a wise course of action. techniques to motor points and other soft
tissue targets.
After spraying the individual, it will be
necessary to arrest the aggressor for a specific As with Step 5, cautions from Step 4 are appli-
crime, handcuff the aggressor, and call the cable: arresting the aggressor for a specific crime
police. The crime the aggressor was arrested related to officer self-defense or defense of others;
for should have a lot to do with “self-defense” handcuffing the aggressor; calling police; observ-
or “defense of others.” There should be a very ing the aggressor make a threatening assault.
clear observation of this aggressor making a This step can be bad choice based on a mis-
threat of assault. Be aware, it is required that the match with the aggressor and the officer’s abil-
officer administer first aid to the subject imme- ity to effectively use unarmed defense. Also,
diately after they have been restrained. the more punches and kicks that are used by
The aggressor must display the ability to per- the officer, the more difficult it will be for the
form the threatened assault by showing a mani- witnesses to decide who the aggressor is in the
fest intent to carry through on it. There must incident. It may be much better to move on to
be a clear and obvious presence of imminent Step 7 at this point.
jeopardy. Retreat must not be an option and WARNING: The above should not be
there must be a clear and obvious preclusion of attempted without well-documented,
the officer or others. If all these conditions are professional training. In addition to training,
present, then the officer should use the weapon there must be continuous practice in order
level needed to accomplish a legal purpose. The to do this effectively. The best advice is to for
officer must always restrict the amount of force the officer to get lots of help, never approach
necessary to reach the goal of “just enough alone, continue verbal deescalation, and
force, no more.” keep retreat as an option.
Step 5. The next level of defensive escalation Step 7. The next level of escalation is the use
is hard, empty-hand control, such as joint of intermediate weapons such as batons and
manipulation, restraint, and/or pain other impact weapons, stun guns, and tasers.

XI. OFFICER SAFETY AND USE OF FORCE


458 37. USE OF FORCE

WARNING: Weapons should not be carried officer has reported the incident and taken a
or used without documented, professional safe position.
training.
2. Verbal de-escalation. After getting the
Step 8. The next level of escalation is the attention of the subjects involved in the
use of deadly force such as firearms, impact aggression, the officer commences a
weapon strikes to the head or neck, or communication with them. This verbal
empty-hand blows to the head, neck, throat, communication can be anything from a
and so forth. This level of force must be friendly greeting to a loud verbal command.
the absolute last resort. There is only one The officer should never be alone; one to
acceptable justification for the use of deadly three others should be with the officer for
force, and that is the protection of human life. safety when possible. Always bring one more
Use of deadly force to protect property will backup person than the number of people that
open the officer and their employer up to must be confronted. This may not be possible
both civil and potential criminal prosecution. in all cases but it does offer a safer approach
WARNING: Taking a human life or causing to a dangerous situation.
serious injury carries a heavy cost. It is an If the officer is within the grasp of the aggres-
act the officer will remember for the rest of sor, the officer should use force to break away,
his/her life and will most likely result in a give space, put something between the officer
civil suit. These drag on for years and cost and the aggressor, and then continue the dia-
massive amounts of money. Additionally, logue at a safer distance.
there may be criminal charges filed. The officer must ensure that the aggressor
Obviously, avoiding this is advisable. Retreat is not forcing him or her into a state of preclu-
if at all possible, always verbalize, and know sion, where maximum force will be necessary to
where cover is and get behind it. escape. At the same time, the officer must ensure
Escalation/Deescalation Continuum that the aggressor has a back door or escape
Applications route, and is not being backed into a corner. If
the aggressor escapes from the area, the security
To better understand the applications of the officer should not give chase but should secure
Escalation/Deescalation Continuum, the fol- the area and the individuals in that area. Note:
lowing scenarios have been prepared: Chasing suspects may be appropriate but it is
1. Uniform presence. The officer arrives on the filled with risks, including injuries to the offi-
scene, observes the situation, and makes his cer, the suspect, and most importantly, innocent
or her presence known to all those involved. bystanders. Employer policy must be followed
This is known as “uniform presence” and it regarding pursuit.
is a very powerful tactic, correcting 25% to
3. Soft empty-hand tactics. After the initial
50% of aggressive situations.
introduction of uniform presence, the
The officer radios for help if needed, iden- aggression may suddenly stall out for a
tifies escape routes, identifies items to use to short while. During verbal de-escalation
block aggression if needed, identifies weap- communications the officer should offer to
ons of opportunity that could be used against help the subjects, ask questions, and give
the officer, and evaluates each person in the advice. If the truce holds longer, the officer
immediate vicinity of the aggressor. The com- and support personnel attempts to remove
munication stage will commence as soon as the the aggressors one at a time by use of a

XI. OFFICER SAFETY AND USE OF FORCE


RESPONSE TO AGGRESSIVE BEHAVIOR 459
soft empty-hand tactic. The officers must deescalation back-and-forth will continue
be extremely careful when first touching a until the aggressor succumbs to the force of
subject. At this point, officer safety becomes the officer or retreats from the area.
job number one! The officer depends on
The officer must win every round of aggres-
backup assistance for his personal safety. If
sion and call for police assistance. The officer
the officer is successful and the subject starts
must also call for medical assistance and admin-
to move out of the area, the officer will escort
ister first aid immediately after the subject has
the subject out, keeping a constant vigil on
been restrained. The officer must provide secu-
the subject’s behavior. The subject’s apparent
rity for the aggressor, assuring the aggressor is
cooperation could change at any time into a
safe from injury by third parties. These can be
second round of aggressive behavior but this
persons who the aggressor was fighting with,
time it may be directed at the officer.
angry onlookers, or the aggressor’s spouse or
4. Control and compliance. When the
family members.
aggressor escalates aggression, the officer
backs off and takes cover, keeping a safe 6. Deadly force: The two main weapons to
distance. The officer combines verbal watch out for are guns and knives. When
deescalation techniques with his move to confronted by one of these two types of
safety. The only justification for an officer’s weapons, it is important to retreat; get away
escalation of aggression at this point would from the attacker; move away from the
be to break the aggressor’s physical hold on attacker on the attacker’s weapon side (this
the officer. The officer must break the hold makes it harder for the attacker to adjust their
and get to safety. Restraining a subject until attack); or get behind cover! It is always good
help arrives may be the best course of action, policy to continually look for cover, as cover
but officers should not engage in a situation may eliminate the need for deadly force. In
where they will lose. Breaking away and those cases where it is necessary to employ
creating distance is the best option if losing it, the cover may provide a little more time
the encounter. to assess the situation before using deadly
5. In these situations, the armed security officer force. Always verbalize using loud, forceful,
will escalate choice of defensive weapons and repeated commands while moving out
in response to the aggressor’s choice of of harm’s way and creating distance. Use a
offensive weapons. If the aggressor uses weapon if no other alternative is viable. Use
hands and feet, the officer will want to use the weapon to stop the assailant and stop
pepper spray, a taser, or an impact weapon. using the weapon once the assault has ended.
If the aggressor threatens with a club or Warning: make sure that the aggressor is not
weapon of opportunity, the officer may armed before approaching them. It may well
use a weapon of opportunity, a shield of be better to stay behind cover and/or at a
opportunity, or just retreat from the conflict distance rather than approach someone who
zone to a place of safety. An escalation and may start the fight all over again.

SAFETY TIP
Remember that when applying a soft, empty-hand tactic there is no pain compliance applied. The
touching is merely a gesture to get movement started in the direction the officer wants the subject to take.

XI. OFFICER SAFETY AND USE OF FORCE


460 37. USE OF FORCE

In most cases, protection officers are not center of thought, feeling, and behavior, which
armed with firearms. There is not a lot of advice is consciously or unconsciously adjusting and
that can be given beyond verbal deescalation. relating the body to its social and physical envi-
Sometimes, using logic works when nothing else ronment. Some identifying characteristics of
will. If talking buys a few seconds of time and this phenomenon are the following:
seems to be working, keep it going. Hopefully, ● Rapid heartbeat
the aggressor will see the error of his or her ● Rapid mental processing
ways and drop the weapon or flee from the ● Sweating
conflict zone. ● Dilated pupils
Summary: Obviously, officer safety is job ● Tunnel vision
number one. Retreat tactics are essential when ● Auditory occlusion blocking out sound
experiencing imminent jeopardy. Avoiding ● Numbness and heaviness felt in extremities
physical confrontations at all costs is as essen- ● Loss of dexterity in fingers, arms, legs
tial as avoiding preclusion. In addition, the best ● Shortness of breath
nonlethal defensive weapon an officer carries ● Everything perceived in slow motion
(and they all carry this one) is their commu- ● Loss of bodily functions—stopping breathing,
nications skills. Verbal deescalation skills are
bladder release, passing out, or paralysis
of paramount importance. This is the essence of
defensive tactics. Assignments with a lot of vio- If this happens to the officer as he/she
lent, aggressive incidents should be manned approaches an aggressive person, there is no
by officers who are devoted students of hostile telling what might result. Either the officer will
communications mitigation. In this way, most be rendered defenseless or he/she may respond
uses of force can be averted. with excessive force. Those who feel this hap-
pening should make a tactical retreat until they
can regain their composure. Only deep relax-
OFFICER SAFETY ISSUES ation can counter this condition and alleviate
the symptoms. Unfortunately, in most critical
There are four individuals or groups who incident situations, there is not enough time to
the security officer is concerned with protect- retreat. The only way to prevent this condition
ing. They are the security officer him-/herself, is through training. An officer who is trained to
the apparent victim, the general public, and the handle critical incident situations and aggressive
perpetrator. It is critical to understand that the persons is not as prone to these symptoms. One
order of importance is as listed; officer safety is other helpful option is to call the police for assis-
primary, because if the officer is taken out, there tance if the officer is alone and/or the symptoms
may be no hope for the victim or anyone else. of tachypsychia appear. The symptoms could be
As pointed out above, self-control is the most a warning sign that the officer is overwhelmed
important factor when engaging in the use of by the incident and needs to retreat.
force. It is not unusual, when faced with an
aggressor, for the officer to become extremely
nervous, tense, and shaky. These signs are the OPTIMAL DISTANCE
body’s warnings that it is approaching a fearful
situation. Left unabated, this shaking and fear While approaching an aggressive subject, an
may escalate into something called tachypsy- officer can inadvertently set off an act of aggres-
chia. “Tachy” means rapid or accelerated and sion simply by getting too close to the aggres-
“psyche” means the mind, functioning as the sor. Entering the aggressor’s private space can

XI. OFFICER SAFETY AND USE OF FORCE


DEFANGING THE SNAKE 461
make the aggressor so uncomfortable that he/ when it comes to guns: it is very difficult to out-
she strikes out in anger. run a bullet! However, every increase in distance
Optimal distance is a term that defines that away from the gun increases the chance of a
area which extends out in all directions from miss. Running in a zigzag path will also increase
an individual, within which the person feels the chance of the shooter missing. The more
safe and secure. Invasion of this personal space movement of the target, the less accuracy the shooter
will result in a reflex reaction. This space is has with the weapon. Taking shelter and running
also known as a person’s “comfort zone” or might work, depending on a number of vari-
“epheric zone.” Unwelcome invasion of a per- ables. Let the circumstances guide the approach.
son’s optimal distance will result in escalation Never rush in and attempt to touch the aggres-
of tension. Most people don’t like others to “get sive subject. To escort the subject, approach from
in their face.” It is important that security offi- the side, not the front or the rear. These are the
cers respect this optimal distance. Our job is to most sensitive areas of someone’s personal space
be part of the solution at all times and never zone. Even then, unless the aggressor is hand-
part of the problem. cuffed, try to control the subject without bodily
One reason, other than for officer safety, that contact. Verbal communications, commands and
we recommend communication at 10 feet or gestures should be employed.
more from the subject, is to respect the subject’s
personal space. While this is a great distance,
violent persons often have an extended per- DEFANGING THE SNAKE
sonal zone. They need lots of space—in some
cases it is as much as 15 feet. “Defanging the snake” is a term that refers
As for additional safety, the officer must be to eliminating the means of aggression from an
aware of the different distances that the officer aggressive person. It could include the removal
must honor to keep safe, called the “reactionary of weapons; the rendering of arms and/or legs
gap.” This gap is the distance between the sub- useless, by pain, paralysis, or breakage, or the
ject and the officer, within which, if the subject use of restraints. The fangs of the snake are
decides to punch, stab, or hit the officer, the offi- where the poison that can hurt us is located. In
cer may, or may not, be able to defend against our case, the knife blade, the bullet, the club,
the attack. The officer should be aware that a the feet, the knee, the elbow, and the fists are
reactionary gap of 8-10 feet away from the sub- the fangs that can cause us harm.
ject would provide some added reaction time Another way to defang the snake is to elimi-
for the officer to defend against the punch, kick, nate the fuel of the aggression. Separating war-
or lunging attack. However, the reactionary gap ring parties, or removing the combatants from
for defense against the knife is approximately the conflict zone, could have the same effect as
22 feet. This is the distance that an officer armed pouring water on a fire. Take away the fuel and
with a firearm must be, in order to draw and the fire goes out. Thus, in many cases, remov-
accurately fire two shots into the attacker’s torso. ing the less aggressive of the two combatants
The reactionary gap, to defend against the can achieve the same effect as taking the weapon
gun, works in just the opposite way. In fact, the away from the aggressor. A word of caution
closer to the gun the better, to allow for disarm- here, though: Only do this with backup present.
ing techniques that may be necessary, but ideally Always keep officer safety in mind. Remember
officers should only try them if they are trained the rule one more officer than the number of aggres-
in those techniques. Other than in a disarming sors being considered. A lone officer should
attempt, reactionary gaps are fairly irrelevant never intervene in a fight. He or she should yell,

XI. OFFICER SAFETY AND USE OF FORCE


462 37. USE OF FORCE

use hard verbals, clear bystanders, and remove 1. Recognize your own emotions. In itself,
dangerous items, but they should never attempt this causes the professional to calm down.
to separate people who are fighting. In most people, violence is reached in
stages—from anxiety, to defensive behavior,
ELEMENTS OF AGGRESSION to physically acting out violent behavior.
Cooling off the escalating violence-prone
An aggressive situation is usually more com- situation is best done by remaining calm
plex than a simple case of one person being and professional.
upset with another. There are usually highly 2. Remember that when a person is in a rage,
charged emotions driving the aggression. The options cannot be seen. As people grow
trick is to attend to the business of assisting, angrier, they fail to realize that they have
without getting dragged into one side or the several options. They usually only see their
other of the controversy. It is important to rec- options of fleeing or fighting. Other options,
ognize that aggression has two parts: the fuel such as discussing the problem and seeking a
of aggression and the means of aggression. The solution, may not be considered. Rage takes
fuel of aggression consists basically of the emo- over cognition. The formula for rage is clearly
tional side of the confrontation and may include C  E/I (Control  Emotion/Intellect).
any number of the following: 3. Avoid humiliating subjects. Some officers
create problems when speaking to a subject
● Perceptions/attitudes in a sensitive situation. When this happens,
● Belief systems the subject will shut down communication,
● Rebellion a condition that could become explosive.
● Mental/medical conditions The best policy is to play it low key. Say as
● Chemical abuse problems little as possible. Protect your space and be
● Revenge, jealousy, passion ready to execute self-defense plans at the
● Feelings of inadequacy first indication of aggression. Remember
The means of aggression consists basically that everybody—even the serene, little old
of the weapons of the confrontation and may lady—is potentially violent under the proper
include any number of the following: circumstances.
Slowing down the action, respecting the
● Hands, feet, elbows, and head subject’s personal space, and using empathic
● Nonlethal weapons (aerosol or chemical listening skills help to deescalate the
sprays) situation.
● Lethal weapons (knife, gun) 4. If the encounter becomes tough, get or give
● Vehicles space. As the aggression level escalates,
● Weapons of opportunity (things lying around) the best relaxant is space. Clear the conflict
zone! If two people are exchanging heated
DEALING WITH AGGRESSION words, both should take a walk—in
opposite directions. Immediate separation
Violence-prone situations can easily lead to of antagonists can prevent a confrontation;
injury of the officer or others. In addition, a law- they both should be “out of sight” and “out
suit could result. What can be done in violence- of sound” of each other. Get them turned
prone situations to reduce the risk of using around and as far away from each other as
excessive force? The following are a few ideas is practical. If possible, use walls to separate
on safely managing violence-prone encounters: the subjects.

XI. OFFICER SAFETY AND USE OF FORCE


APPLYING VERBAL DE-ESCALATION TO AGGRESSIVE SITUATIONS 463
5. Proactive prevention works better than Subject’s finger pointing
reaction. Officers must be receptive to Subject moving in and out of other people’s
warning signs of violence, rather than personal space
reactionary. Understand that people who are Subject’s belligerence, yelling, cursing
antagonized by others may go from calm to Subject’s pounding fist on walls and tables
rage in seconds. Subject’s verbal threats
6. Sharpen observation skills. Observing
alcohol use and levels of intoxication can
provide obvious warning signs, as can VERBAL DEESCALATION
playful pushing and shoving and loud
“in-your-face” types of communications. Verbal deescalation is just about anything
Boyfriend/girlfriend jealousy situations and an officer can say that fits the situation at the
domestic problems can sometimes develop incident scene. The successful deescalation
into a volatile level. will be more a product of officer attitude and
level of professionalism than that of the actions
Some instigators will try to provoke a hos- taken.
tile, angry response from protection personnel. At some point, a protection officer may be
This is often done with an ethnic or racial slur surprised by an aggressor or overwhelmed
or other derogatory statement. It is essential to by more than one aggressor. They will be in a
recognize that the “button pusher” is trying to fight/flee/flow situation. That is, if fighting
cause the officer to lose control, thus creating and fleeing are not options, flowing is. “Flow”
an escalation of violence. Many hostile persons means verbal de-escalation. The officer will have
will try to push one “button” after another. to talk their way out of the predicament. Note:
Protection officers who are wise and wish to There cannot be a prepared list of canned ver-
have a lengthy career realize that: When you lose bal communication that will fit every situation.
your temper, someone else has control over you. The officer will be more successful drawing on
Remember the formula for control: C  I/E. their own words, customized for the particular
Remember, whoever loses control—loses! circumstance. The key to a successful verbal
Therefore, it is in one’s best interest to identify deescalation is in the level of professionalism.
the indicators of aggression, which we call “red There must be an appropriate amount of care,
flags” of aggression: empathy, command of the language, personal
sincerity, and candor.
Weapons of opportunity
WARNING: When practicing verbal
Disguised weapons
de-escalation it is imperative to keep
Weapons in plain sight
alert. Always keep in mind officer safety.
All edged weapons
Remember: “Safety first”!
All piercing weapons
Perpetrator’s hands
Relatives, friends, others in close proximity
Subject’s red face APPLYING VERBAL
Subject’s direct prolonged eye contact DE-ESCALATION TO AGGRESSIVE
Subject’s quick and deep breathing SITUATIONS
Subject’s head and shoulders back
Subject standing as tall as possible If called to a routine confrontation where
Subject’s hands pumping the participants appear to be reasonable and

XI. OFFICER SAFETY AND USE OF FORCE


464 37. USE OF FORCE

the likelihood of injury is low, then the officer ● Keep hands on the preferred weapon, or
may wish to follow some of these deescalation have weapons drawn.
suggestions: ● Call for backup before entering the conflict.
● Respect the subject’s dignity. Be as polite as
● Give subject directives to reach a solution.
possible and never demean people.
● Keep talking and negotiating a solution.
● Do not shout commands.
● Listen intently to subject’s words.
● Be careful not to become part of the problem.
● Project empathy with subject’s cause.
● Assume officer safety distance (10 to 15 feet).
● Observe his hands and body language.
● Provide a pleasant greeting such as “May I
● When backup arrives conduct a search for
help you?” or “How can I help you?” weapons.
● Assume a noncombative attitude.
● Cuff and search for officer safety.
● Use nonthreatening questions, and avoid
● Continue dialogue with subject.
“Why?” These tend to put someone’s
● Listen to witnesses; take names, addresses,
reasoning process “on trial.” and phone numbers.
● Slow everything down. Speak a little slower
● Take notes of what witnesses say. Use quotes
and move a little slower. Just a little. from the witnesses.
● Be calm, as “calmness is contagious.”
● Make the decision to detain, arrest, or release.
● Keep hands chest-high and ready to react.
● Use deadly force only when a life is
● Attempt to move subject away from conflict threatened or serious bodily injury is
zone. imminent.
● Listen intently to subject’s words.
● Project empathy with subject’s cause.
● Observe subject’s hands and body language. LETHAL AND LESS-THAN-LETHAL
● Conduct a visual frisk; and check for WEAPONS MANAGEMENT
observable weapons.
● Look for weapons of opportunity. The employment of weapons is often grasped
● Listen to peripheral persons. They can be at by protection officers in the wake of a fright-
witnesses, “cheerleaders,” or assailants. ening experience. Fear is usually the primary
● Keep talking and negotiating a solution. motivator for protection officers asking man-
● Practice officer safety at all times. agement if they can be armed. Unfortunately,
● Make the decision to arrest or release. weapons do not solve the threat problem all by
themselves. They are tools that are necessary in
Procedures for dealing with a violence-prone certain circumstances. They require increased
individual differ somewhat from dealing with responsibility and skill to be employed in an
the average aggressive situation. If the likelihood acceptable manner. Handcuffing a resistant sub-
of injury is certain or extremely high, the officer ject is difficult, and must be done tactfully and
may wish to follow some of these suggestions. tactically. Spraying an assailant does not negate
● Subject’s dignity is not the main priority. the threat; it merely helps to control the person.
“Defanging the snake” is the priority! The officer must still step out of the way of the
● Try to respect the subject’s dignity even aggressor and take appropriate follow-up mea-
though this is not the main priority. sures. The same is true with impact weapons
● Respect officer safety distance. and even firearms. Protective movement out of
● Assume a self-defense attitude. the danger zone, employment of the weapon,
● Use loud, clear, directive commands for and proper follow-up must be done for any
officer safety. weapon.

XI. OFFICER SAFETY AND USE OF FORCE


LETHAL AND LESS-THAN-LETHAL WEAPONS MANAGEMENT 465
Regarding weapons in general, it is impor- 3. All weapons should be thoroughly checked by
tant to remember that: the officer carrying them prior to starting duty.
4. The supervisor should check weapons on a
Weapons are only useful when in the hand of someone regular basis.
proficient at using them, in the correct situation where 5. A maintenance system should be in place for
they are the appropriate tools to use.
all weapons to include routine maintenance,
as per the manufacturer’s instructions, as
Weapons offer added protection—if properly well as work by armories or manufacturers
selected and employed—but they also dramati- when needed.
cally increase the professional obligations of the 6. Weapons should be supplied by the
protection officer. Their use involves substan- employer. The employer must exercise and
tial judgment and skill on the part of the officer. retain control over the weapons.
Such judgment and skill only come after exten- 7. Weapons, ammunition, holsters, and so
sive instruction and practice in interpersonal on should not be modified except by a
communication, deescalation, interviewing, manufacturer’s representative or certified
unarmed defensive tactics, legal considerations, gunsmith.
and so on. These are some of the proficiency 8. All laws, property owners’ wishes, and
areas that must be mastered prior to the effec- insurance carrier regulations on the carrying
tive use of weapons. The following saying helps and use of weapons must be respected.
to put this into perspective:
Unfortunately, weapons are occasionally
You can’t use a weapon if you can’t use your hands. “sold” by someone to management without
You can’t use your hands if you can’t use your voice. management completing a full assessment of the
In addition, you can’t use your voice if you can’t use product. A seemingly impressive demonstration
your brain. of a weapon’s capability, put on by an expert
who stages the demonstration, is not the reason
Whatever weapons are being employed, to select a weapon for a protective force. Neither
be they handcuffs, pepper spray, firearms, or is following a fad or the securing of a “bargain”!
impact weapons, the following guidelines will Weapons selection is a serious decision, which
help to maintain that they are handled in a pro- must be made only after extensive research.
fessional manner: On the other extreme, vacillating on a weap-
ons decision—and not arming security officers
1. Weapons should only be handled by persons
when this is needed—raises unacceptable levels
who have been trained in how to use them.
of risk to protection forces and to those they are
Training must be refreshed periodically.
employed to protect. The following is a list of
In some states and provinces, certification
considerations, which managers should review
and/or licensing must be attained before
when selecting a weapon/weapons system:
any weapons, including handcuffs, can be
carried by a security officer. All weapons 1. For what specific need is the weapon
training must be thoroughly documented. required?
2. Weapons should remain holstered or locked 2. How is the weapon most likely to be used
up unless they are to be employed in an (tactical research)?
actual confrontation, cleaned, or used during 3. What selection process will be used for
formal, supervised training. There must be adopting the weapon?
no showing of weapons to curious persons a. Why is the specific weapon being chosen
and absolutely no playing with weapons. over other weapons?

XI. OFFICER SAFETY AND USE OF FORCE


466 37. USE OF FORCE

b. Who made the decision? truthful facts of the case. Unfortunately, in our
c. What is the decision-making process litigious society, where cash-hungry lawyers
based on? and an aggressive media lie in waiting for the
• Independent research studies? next abuse of force case, the officer cannot be
• Medical research? carefree. The report must be written, taking
• Comparative bids? into consideration the technical requirements of
4. What type of initial training is required? criminal and civil liability, in both state and fed-
5. Who can provide this training? eral court.
6. What type of refresher training is given? Know the audience! Assume that the paper
7. Who can provide this training? about to be written will be in the hands of an
8. Can instructor qualifications be clearly opposing attorney, and that you, the officer, will
demonstrated to the satisfaction of a court? be in front of a judge in the near future. If the
9. Is training adequately documented? use of force required a firearm, drawdown, or
10. Is a continuous tactical review of the shooting, a pain compliance tactic, a chemical
weapon’s use in place, which shows how or electronic incapacitation device deployment,
it is actually being used? This must be as use of a baton, fists or feet confrontation, the
detailed as possible so that it is possible to report must be timely, thorough, concise, and
create effective procedures on the use of the accurate. Above all, the report must be true. The
weapon. facts are what is important to record.
11. What training have supervisors had in the While writing the report, the officer must
use of the weapons? cover the following:
a. Initial training?
b. Periodic training? 1. NECESSITY (What the subject did)
c. Training or education above and beyond a. Self-defense.
what line officers receive? b. Defense of others.
12. Are reasonable and enforceable policies c. Incident to arrest and escape prevention.
governing the use of the weapons in effect? d. Incident to ejection from the property.
13. Are weapons carried by, or accessible to, e. Protection of property.
officers who are off-duty? 2. REASONABLENESS (What the officer did)
14. Is weapon retention addressed? a. Followed department policy.
15. What is the skill level required for the use b. Followed department training.
of the weapon? c. Followed supervisor’s instructions.
16. Does the weapon fit in with other weapons d. Deployed each tactic with restrained,
used by the organization or other agencies measured, intentional and minimal force.
that the organization may interact with e. Assured no offensive moves were made
during an emergency? and that all tactics were defensive as
applied.
f. Provided medical follow-up (first aid,
REPORT WRITING IN USE-OF- 911 call, etc., as needed).
FORCE CASES
3. THE REPORT MUST BE BALANCED AND
What is involved in writing the report of COORDINATED
an incident where use of force was reasonable a. The report is clear, concise, and
and necessary? It should be enough to just sit complete.
down and write, in chronological order, the b. The report follows a chronology of events.

XI. OFFICER SAFETY AND USE OF FORCE


REPORT WRITING IN USE-OF-FORCE CASES 467
c. The report has synergy, meaning that all the judge should be able to read the report and
parts of the report connect to make the form a mental picture of what actually took
whole greater than any individual part. place. From that picture, he or she should be
d. The report has no contradictions. able to determine what their own actions would
e. Times stated are close to other reports and have been under exactly the same circum-
other records. stances. If the report follows the above guide-
f. Facts stated are reasonably supported by lines, it should lead that person to the logical
other reports and records. conclusion that the officer acted in a reasonable
Any one of the above components that are and necessary fashion.
lacking in the report will provide an oppor-
tunity for the opposing attorney to attack the
integrity of the report and ultimately the offi-
cer’s testimony could fall apart. The officer may Emerging trends
have performed perfectly, followed all the rules, Protection officers are increasing in number
provided a truthful report, and still lose the case and society expects more of them. Where public
over the fact that there was failure to provide police were once the principal protective force,
one or more of the above items. privately employed security officers are now
In reviewing the report, it is useful to play stepping in. With the constriction of govern-
“devil’s advocate.” The writer should try to ment budgets coupled with the extensive cost
anticipate what the lawyers or media might try for police, security forces will continue to grow.
to make out of what is about to be written. Many of these forces have some type of police
Astute report writers review their employ- authority. They also are carrying more and dif-
er’s policy before writing. Leave no gaps in the ferent types of weapons.
report to be filled in later. Don’t assume any- Society also has a lower tolerance for acts of
thing. Never leave out a fact because it seems violence, coupled with a greater fear of crime
obvious that everyone would understand it. and terrorism. The expectation of employees,
Being specific and detailed is critical. What may shoppers, students, and guests is that they will
seem to be common sense or common knowl- be protected. As a result, security forces must be
edge may not be to the reader. And an omission more reactive than in the past. Security officers
or careless statement may be distorted by the are expected to step in and help those facing the
opposing attorney to appear as if it is a careless threat of violence more than in the past.
mistake or a deliberate attempt at deception. Post-traumatic stress disorder (PTSD) is rec-
Keep in mind that the main thrust of the ognized as a hazard today. PTSD affects not only
defense lawyer, or the plaintiff’s lawyer, is to those directly involved in a traumatic event, such
present their client as the victim in the case, not as use of force, but it impacts those who witness
the perpetrator. They will work hard to accuse it. Protective services personnel need be aware
the officer of being the perpetrator and using the of this and seek help. Employers of protection
“but for” test; they will say, “but for the illegal officers have an obligation to address this issue.
or negligent acts or omissions of the officer, this Officers who are adversely affected by major use
plaintiff would not have sustained the injuries of force incidents need help. And their employ-
that he did.” It is wise to be sure that nothing in ers need a system to deliver that assistance.
the report supports the false assertion that offi- Training in communication skills is becoming
cer’s actions were illegal or negligent. more critical to manage aggression and deal with
The officer’s report should pass the “rea- violent persons. Enhanced communication ability
sonable person” test. That is, either the jury or

XI. OFFICER SAFETY AND USE OF FORCE


468 37. USE OF FORCE

books, and videos covering a vast array of officer sur-


also aids in dealing with public events and persons vival topics.
higher in the organizational food chain than the The Crisis Prevention Institute (800)558-8976 (www
officer (top management, clients, VIPs). Enhanced .crisisprevention.com) is a leader in violence man-
agement instruction. CPI provides certification in
communication skills are also necessary so officers
Nonviolent Crisis Intervention for both officers and
can relate to and manage diverse populations. As instructors.
a result, more officer survival and defensive tactics The International Law Enforcement Educators and
instructors are emphasizing communications in Trainers Association (www.ileeta.org). ILEETA offers
their classes. This trend will likely continue. membership to those who instruct police, security, and
corrections professionals. There are extensive member-
The employment of weapons has also grown.
ship benefits, including an online journal, discounts
There are more weapon options available than in on instructional materials, and an outstanding annual
the past and this trend will continue. Less-than- conference.
lethal weapons provide protection officers a wider MOAB® Training International offers Management of
range of options. At the same time, they require Aggressive Behavior (MOAB) instructional programs.
MOAB Training also offers Oleoresin Capsicum Aerosol
additional training and practice. More initial and
Training (“pepper spray”), and Practical and Tactical
refresher training is required for officers who are Handcuffing (PATH). www.moabtraining.com (215)
armed than for those who are not. Armed officers 723-2533.
are also more likely to be subject to governmen- The Military Book Club (www.militarybookclub.com) offers
tal regulation. Armed security officers and those books at a discount on a variety of military-related topics.
Some titles, such as Loren Christensen’s excellent work far
employed by security service firms are the most
beyond defensive tactics, are of use for protective services
likely industrial sector to be licensed. personnel.
The merits of force continuums are also being
debated. They are one-dimensional and perhaps a
bit simplistic. There is also a danger that persons
reviewing a use-of-force event mistakenly believe
that all steps in the continuum must be followed
S E CURI TY QU I Z
in sequential order. As a result, new models that
depict the exercise of force are being developed. 1. Force is any touching of another person.
a. True
b. False

References 2. Using force is generally the first option


that an officer chooses when managing the
Fisher, R. J., & Green, G. (1992). Introduction to security.
Stoneham, MA: Butterworth-Heinemann. behavior of others.
The American Heritage Dictionary, 2nd ed. a. True
Ouellette, R. (1993). Management of aggressive behavior. b. False
Powers Lake, WI: Performance Dimensions Publishing. 3. Persons that force is used against must
demonstrate that they have the _____ to cause
Resources injury, that they manifest intent to do so, and
that they are placing the officer in imminent
Butterworth-Heinemann, an imprint of Elsevier Science, is jeopardy.
the largest publisher of Security texts. There are numer-
ous titles available; many of these relate to the use of
a. Means
Force and Defensive Tactics. Visit www.elsevierdirect b. Ability
.com or call (800) 545-2522, ext. 200. c. Plans
Calibre Press (calibrepress.com or (800)323-0037) is the d. Weapons
leading officer survival concern. They provide seminars,

XI. OFFICER SAFETY AND USE OF FORCE


SECURITY QUIZ 469

4. ______ means that officers must show that d. That the actions taken conformed to
they had no other alternative than to use employer policy and training
force. 9. The following are three recommendations
a. Jeopardy on how to safely manage violence-
b. Retreat prone encounters. There is also one
c. Preclusion recommendation that you should never
d. Manifest intent try. Which one is the recommendation you
5. Objects or materials that protect one from should never do?
bullets or other projectiles such as rocks that a. Recognize your own emotions
are thrown is: b. Remember that when a person is in a rage,
a. Concealment options cannot be seen by the aggressor
b. Cover c. Do not waste time evaluating the situation;
6. Control  _______ /emotions. react immediately before anyone gets hurt
a. Training d. If the encounter becomes tough, get or
b. Experience give space
c. Problems 10. Report writing after a use of force is very
d. Intellect important. What the officer writes or fails
7. The security officer must use alternative to write can get that officer in trouble if the
use of force whenever possible. Which of subject decides to bring a lawsuit. Therefore,
the following is an alternative to the use of remember that you may be writing to the
force: lawyers, a judge, or a jury in a civil lawsuit.
a. Take time, be patient, and slow down the While writing the incident report, the officer
action must include all the following, except:
b. Evaluate the situation, gather facts a. Be sure to describe the facts in such a way
c. Call for backup before approaching as to support a case for NECESSITY
d. All of the above b. If the subject was injured, be sure to state
8. There are five primary justifications for using that you accidentally injured the subject;
force. Which of the following is not one of it was not intended
them? c. Be sure to explain how the officer
a. That the aggressor was known to be a followed training, policy, procedure, and
troublemaker supervision
b. That harm would come to the officer or a d. Be sure to describe the facts in such a way
third party if force was not used you can prove REASONABLENESS
c. That the actions taken were necessary

XI. OFFICER SAFETY AND USE OF FORCE


This page intentionally left blank
C H A P T E R

38
Defensive Tactics and Officer
Safety
Inge Sebyan Black

CHAPTER OBJECTIVES like a Hollywood movie. Getting punched, or


for that matter, punching someone, can result
● Explain why safety is the security in serious injury or even death. Size, the size
officer ’s responsibility of an opponent, and the physical condition of
● Indicate the appropriate times/situations both parties will determine the extent of harm
when defensive tactics should be used done. Avoiding physical contact is ALWAYS
● Emphasize why training is so critical preferable.
Defensive tactics are subject to individual
● Discuss the importance of one’s own state, federal, or provincial laws. They are also
limitations defined by the organization one works for.
● Explore the role of weapons in defensive Furthermore, use of certain defensive tactics
tactics should be strictly subject to the level of training
received and competency in that area. Training
and continual retraining are what will determine
THE PROFESSIONAL SECURITY the confidence and skill being used.
OFFICER’S ROLE This chapter will look at officer safety, what
situations warrant using defensive tactics, vari-
A critical review of the subject of defensive tac- ous options of defense tactics, training, weapons,
tics is necessary in the litigious world in which alternatives to weapons, and current trends.
we live, where the actions taken will have others Protection officers, are trained to observe,
quick to be the “Monday morning quarterback” report, and, in certain circumstances, resolve
(to criticizes with hindsight). In addition, those conflicts. Officers are taught that their job is to
actions will indeed have numerous, if not serious, protect people, property and assets. Most impor-
consequences, including criminal charges in addi- tantly, however, is the officer’s personal safety.
tion to lawsuits for actions not justified. This is each officer’s responsibility. To do this,
It is important to stress the use of good judg- each officer must understand that they are in
ment and common sense. Real life is not at all the best position to provide for their own safety.

471
472 38. DEFENSIVE TACTICS AND OFFICER SAFETY

Every person’s primary goal is to avoid being lights, so that they illuminate the area of
injured. Secondary to that would be the protec- observation and not highlight the officer.
tion of others, and then protection of property or 4. The security officer should use all senses.
assets. Officers need to be aware of basic conflict Often, the sense of smell or hearing will give
resolution concepts and must be prepared to use away a potential threat long before it is seen.
them if the situation calls. While it is impossible
Of course, the underlying theme is that
to train for every given scenario, it is important
potential threats should be watched for and
to emphasize the necessity of training. Training
responded to accordingly. Do not rush into
is the single most important factor in preventing
potential conflicts, as this does not allow time
an officer from being injured or killed.
for consideration of additional threats, or a full
understanding of the incident itself. There are
AVOIDING POTENTIAL times that training will help in choosing the
SITUATIONS appropriate response if the officer or others are
in imminent danger.
In most cases, avoiding direct conflict is the
ideal tactic. Officers are often told to “observe
KNOW YOUR LIMITATIONS
and report,” yet they rush into conflict despite
this. The execution of duties can be achieved,
A thorough understanding of what can
in most cases, without being directly in harm’s
be done, and what is permitted to be done, is
way. Observing an intruder, while calling the
absolutely essential. Without this, any combat
incident in to dispatch or local law enforcement,
situation can result in extreme physical injury,
is the ideal response, and provides the relative
followed by emotionally painful litigation.
safety of distance from the subject. Trying to
The security officer should become famil-
apprehend an intruder can quickly escalate
iar with his or her own physical conditioning.
the situation.
Most people do not know how quickly they tire
Words are the most effective tool for over-
when faced with a prolonged combat encounter.
coming resistance and hostility; however, there
Certainly a fight which ends up on the ground in
are clearly situations when force appears to be
a grappling situation is extremely tiring. Regular
the only remedy. At those times, officers must
cardiovascular conditioning, within a physician-
be prepared to use some type of force, within
approved program, will not only benefit one’s
appropriate limits.
ability to endure such stressors, but will give a
While at a post, officers often encounter situ-
far better understanding of what the officer is
ations where circumstances require use of a
physically capable of sustaining.
defensive tactic. Surprisingly, one of best defen-
On the legal side, it is imperative to study
sive tactics is the avoidance of unnecessary con-
local laws and determine what is permitted
flicts. When performing protective duties, one
in the area with regard to responses to aggres-
should do the following:
sion, observed crimes, and similar situations.
1. Use caution at all times. Do not rush into One must act within these guidelines to reduce
areas that provide concealment for potential the likelihood of litigation. If a person is injured
aggressors. as a result of one’s actions, or an incident in
2. Call for assistance. which the security officer participated, chances
3. Use lighting to the best advantage. When are good that litigation will follow. If the officer
patrolling an area at night, a security officer has acted within the guidelines of that juris-
should walk behind any ground-mounted diction, the charge will be easier to defend. In

XI. OFFICER SAFETY AND USE OF FORCE


THREAT ASSESSMENTS 473
many cases, a lesser level of force, applied with no use if the direct responders cannot find the
more thought and preparation, will effectively location.
defend against an aggressor. The security offi- There will be times when security officers are
cer should find out his or her limits and prepare faced with dangerous situations where there is no
accordingly. retreat or possibility of safe haven. In these situa-
tions, surviving an attack may come down to some
very basic and commonsense tactics. Analyzing
FOCUS ON PREVENTION these possibilities ahead of time may enable one
to react more quickly and appropriately.
Being properly equipped will greatly enhance Something as simple as the way the body is
defensive abilities and lessen the ways in which positioned may prevent injury. Be aware of the
an aggressor can do harm. threat being faced when unavoidably out in the
The following items are suggested as equip- open. When face-to-face with a potentially vio-
ment worthy of serious consideration. The appli- lent person, do not stand facing them; instead
cations of some are self-explanatory, while other stand at a 90% angle. This protects more of the
items will be discussed in a future section: body and gives the attacker less of a target. If
facing gunfire with no place to retreat, the offi-
● Flashlight
cer should crouch or lie down, with the head
● Two-way radio/cell phone (with fully
away from the shooter as much as possible, and
charged batteries)
make the body drawn-up into as small a target
● Bulletproof vest
as possible.
● Kevlar gloves
Improvisation for defensive tactics is also a
● Helmet
protection that may help. A garbage can lid, for
● Proper footwear with nonslip tread
example, can act as a shield to fend off projectiles.
● Binoculars
A fire extinguisher, or anything close at hand,
● Night vision equipment
can be considered an appropriate defensive
Using the environment to the best advan- weapon in extreme circumstances.
tage is another effective defensive tactic. It is Certain weapons, such as an axe or a bat, are
not inappropriate to consider retreating from simply not as effective when used at extremely
a dangerous situation while awaiting response close quarters, so when faced with this type of
from law enforcement or others. It is imperative armed attacker, the officer may actually want to
to know at all times what options are available position within inches of the assailant. This is
for a safe place to avoid attack or other danger. something that needs to be assessed at the time,
Some suggestions for safety are: giving consideration to the attacker ’s size and
condition in comparison with with the officer ’s
● Guard hut
size and abilities.
● Secure building
● Fenced and locked compound
● Vehicle
THREAT ASSESSMENTS
Each of the above may be a place of safety to
avoid aggressors. Be aware of all options and A threat assessment is a tool used by law
escape routes at all times. It is also important enforcement, government, industry, and most
that the officer you knows his or her location security professionals. These can be very detailed
at all times and does not become complacent. and comprehensive written documents, or sim-
Calling for help on a radio or cell phone is of ply an awareness of the potential threats faced

XI. OFFICER SAFETY AND USE OF FORCE


474 38. DEFENSIVE TACTICS AND OFFICER SAFETY

in various situations. Security guards can utilize kill or injure to fully understand defensive tactics.
this information at the beginning of their duty. Some of these are broken bottles, Molotov cock-
When a threat assessment is done, it may be tails, rocks, and miscellaneous projectiles. Also,
shared with the security force or the security an unplanned attack may result in the use of
guard may have to mentally perform his or weapons of opportunity, such as a pipe or board.
her own assessment. Some of the threats that If a security officer has at least some of the equip-
may be faced are listed below. To repeat, know- ment listed earlier in this chapter and has learned
ing what is being protected will help deter- to conduct a threat assessment, he or she has a
mine which of the threats are most likely to be much improved likelihood of a long and safe
encountered. The next step in a formal threat career in the security profession.
assessment is to examine the risks. This chap- The possession and use of a weapon are
ter will not go into great detail about this, but it typically controlled by the employer, client,
needs to be understood that once the threat has and local law enforcement. In many cases, pos-
been identified, it is imperative that a security session of a weapon is prohibited; in others,
officer understand the risks associated with that required. In any case, a thorough understanding
particular threat. of the policies and laws that apply to a specific
Simply put, a threat assessment is likely some- situation is critical.
thing every security officer does daily without One of the greatest liabilities an organiza-
realizing exactly what they are doing. It means tion can face involves issuing deadly weapons
knowing in detail what it is that is being pro- to security officers. This is true for both propri-
tected and what the value of that asset is to oth- etary and contract officers. Obtain and review
ers. This will help in identifying where threats all legal, company- or client-imposed regula-
may come from and the type of attack that may tions prior to carrying any form of weapon.
be encountered. Each post that is assigned will The expectations of all involved parties must
have its own unique challenges. For example, be clearly understood, if one is to follow them.
one might reasonably assume that an attack Once this is achieved, the regulations must
from organized crime might involve firearms, be followed at all times. They are typically
while the threat from a radical group might be designed to protect the weapon carrier from
bomb-related. Potential threats include: increased liability related to improper usage. If
any questions arise related to those regulations,
● Terrorists it is essential that proper explanation and clari-
● Organized crime fication are sought.
● Common criminals Once the security officer understands the reg-
● Disgruntled employees ulations in which a weapon will be carried and
● Radical groups (i.e., animal rights, anti- used, one must then be properly trained to do so.
abortion extremists) Just as training for unarmed techniques, the level
● Vandals of realism in weapons training must be high,
with numerous repetitions. Continued training,
to retain a skill level, is also critical. Having been
DEFENSIVE TACTICS considered an expert at one time does not guar-
AND WEAPONS antee that the skill will remain high over time.
Constant review and practice are required if one
Some of the weapons that might be faced in is to retain an achieved level of proficiency.
today’s world are guns and bombs. It is impor- It is also essential to know and understand
tant to be vigilant about other weapons that may the specific functions and abilities of any

XI. OFFICER SAFETY AND USE OF FORCE


USE OF FORCE 475
weapon that may be carried. For example, offi- as to their policies regarding confrontations,
cers issued a firearm should be aware of their tools that will be at the officer’s disposal, pos-
own level of accuracy at various ranges, as well sible threat risks (such as disgruntled employ-
as the penetration abilities of the ammunition ees), and updated management lists. Be sure to
they will carry. This knowledge will help an be familiar with these orders.
officer, when deciding whether to shoot or not,
be aware of potential penetration risks in the
areas behind the target or even over-penetration SPECIAL CIRCUMSTANCES
of the target itself.
When dealing with firearms, learn what can Some security officers will be assigned to
be used for cover in the environment and what posts where they face daily challenges, while
might just provide simple concealment. Objects others will have relatively safe and mundane
that provide refuge are those that will block duties. However, anyone in the security field
or significantly reduce the level of threat from is potentially going to encounter situations
an attack, such as brick and cement walls that that are beyond the norm and may pose much
make great cover. Concealment simply reduces greater threat to the safety of the security offi-
one’s ability to be seen. Shrubs are an exam- cer and those they are assigned to protect.
ple of concealment. It is difficult to see a per- Labor disputes can be one of the most stressful
son through a shrub, but a firearm will still be and dangerous situations to be encountered.
effective if fired through the bush. Some things Removing a person’s ability to earn a living can
might seem to be cover when dealing with a turn the most peaceful and law-abiding citi-
certain level of force but may become less effec- zens into unruly and unpredictable crowds. The
tive if the level of force escalates. A car door, for “mob mentality” can affect labor disputes and
example, might provide reasonable cover against violence can erupt without notice. The same is
an assailant with a .22 but might barely slow a true of sporting events, political demonstra-
shot from an assault rifle. Familiarity with the tions, and concerts. Be proactive and analyze the
environment is essential when identifying these potential threats and the best way to respond if
areas. It is essential to constantly look around; they become reality. Hospitals, inner-city posts,
identify where to go for cover and which of the and various other assignments can put security
areas will only provide concealment. officers in proximity to substance abusers and
Carrying a weapon is a great responsibility. mentally unstable individuals. It is highly rec-
The proper and effective use of that weapon is ommended that officers have special training
an even greater one. Ensure that all restrictions for dealing with this segment of the population.
are known and followed, that all properties of The skills discussed here and in Chapters 23,
the weapon and its use are understood, and that 26, and 37 should give some guidance as to the
sufficient training is obtained and maintained. proper response needed in these situations.

POST ORDERS USE OF FORCE

Another valuable tool at an officer’s post is By definition, the purpose of force is to per-
post orders. Again, this chapter will not exam- suade, to seek compliance, to impede actions,
ine all the particulars about post orders; how- or to stop actions. When the purpose is any
ever, it is important to know that these orders, of these, the force to be used should be deter-
written by management, may give some insight mined by the perceived threat. Critical to the

XI. OFFICER SAFETY AND USE OF FORCE


476 38. DEFENSIVE TACTICS AND OFFICER SAFETY

understanding of how one responds to a threat level of force for which they represent. When
is the concept of a relative level of force. Levels following this progressive chart, one should
of resistance can be summarized as: note that the responses appearing at the top
are generally perceived to be less forceful than
● Psychological intimidation those that appear near the bottom. With this in
● Verbal threat and/or resistive dialogue mind, it is essential that any response to a situa-
● Passive resistance tion falls as close to the top of this chart as pos-
● Defensive resistance sible, while still allowing those responding to
● Active aggression protect themselves or others from great bodily
● Aggravated active aggression harm. In most cases, any response should start
The actions of the persons that is not comply- at the top of this progressive flow, and then
ing will determine the level of force used. move toward more forceful responses. If the
It is critical that company policies regard- current level of force is insufficient, this will
ing use of force are adhered to. Some compa- show that as the responder, there was no intent
nies require that before officers can physically to cause great harm and the less forceful options
restrain an individual, the subject must first be were first applied. Often, it is the attempt to do
placed under arrest by either the security officer less harm initially that convinces a court that an
or a certified peace officer. The only exception officer responded to an existing threat with only
to this is when an officer defensively uses phys- due care and required force. It is the officer that
ical force to create space between him-/herself immediately jumps to the bottom of the chart
and the subject, or when separating individuals when responding to a threat who more often
who are engaged in a verbal altercation. find himself/herself on the losing end of a civil
Other policies may limit the use of force, suit or facing criminal charges.
to the least amount reasonably necessary to In Table 38-1, you will note that the situation
accomplish the intended objective, to overcome and perceived level of force are indicated in the
any resistance encountered, and for protecting following ways:
the safety of others. In determining the amount Control of Cooperative Persons—
of force reasonably necessary, the following Individuals who do not carry out a lawful
guidelines should be considered: order but are not threatening or resistive
● Officers do not attempt to use types in their actions. They may require some
and degrees of force which appear to be convincing to do as they are ordered.
inadequate to accomplish the officer’s Control of Passive-Resistive Persons—
intended objective. People who refuse a lawful order and
● Officers do not become involved in attempt to pull away from being led in the
protracted struggles or protracted hand-to- right direction. These persons do not attempt
hand combat, which can frequently result to harm or manipulate the officer but refuse
in an increased risk of injury to the person to cooperate.
being arrested. The officer is encouraged to Control of Active-Resistive Persons—
use a type and degree of non-deadly force A situation in which the subject is not
which appears reasonably necessary to bring only refusing a lawful order, but is
the person under control quickly. intentionally pushing the officer away,
trying to manipulate the officer’s hands or
In Table 38-1, the various types of defensive arms in such a manner as to make low force
responses are ranked, based upon the relative options ineffective. These persons may make

XI. OFFICER SAFETY AND USE OF FORCE


USE OF FORCE 477
TABLE 38-1 Use of Force Continuum

Situation Perceived Level of Force Officer Response or Actions

Control of Cooperative Persons No Force Verbal Persuasion

Control of Cooperative Persons No Force Body Language and Positioning

Control of Cooperative Persons Low Force Physical Contact Controls

Control of Passive-Resistive Persons Low Force Joint Control Techniques


Control of Passive-Resistive Persons Low Force Pressure Point and Pain Controls

Control of Passive-Resistive Persons Medium Force Chemical Controls

Control of Active-Resistive Persons Medium Force Weapon-Assisted Controls

Control of Active-Resistive Persons Medium Force Weapon-Assisted Pressure Point and Pain Controls

Control of Active-Aggressive Persons High Force Striking Techniques

Control of Active-Aggressive Persons High Force Weapon-Striking Techniques

Control of Active-Combative Persons Deadly Force Striking Techniques to Critical Targets

Control of Active-Combative Persons Deadly Force Firearms

occasional aggressive movements or lash out The specific responses can be explained as
in a disorganized and relatively ineffective follows:
manner.
Verbal Persuasion—Describing the lawful
Control of Active-Aggressive Persons—
order to the subject without placing the
Subjects who, through their verbally or
officer’s body in their intended line of
physically expressed intentions, intend
movement, or in any manner intimidating
to inflict harm upon those attempting to
or directing them through physical motion
impose a lawful order upon them or others
or presence. In most cases, this is the first
who are nearby.
moment of contact with a subject. Often, if
Control of Active-Combative Persons—
handled properly, the level of force does not
Subjects who, through verbal or physical
need to progress beyond this point!
intentions, intend to inflict great harm,
Body Language and Positioning—Placing
including an attempt to kill, on those
an officer in a doorway that the subject is
attempting to impose a lawful order upon
attempting to enter. Position an outstretched
them, or to others who are nearby.
hand, palm forward, to indicate that entry
The perceived level of force would be an would be resisted if attempted. There is
indication of how the average reasonable per- absolutely no physical contact at this level of
son, upon witnessing the techniques performed, response!
might assess the aggressiveness of the officer’s Physical Contact Controls—By making
response. In general, it is better to respond with contact with the body of the subject, the
as low a level of force as possible, while still act- officer is now utilizing perceived force. This
ing to preserve the health and safety of all per- level of contact would include actions as
sons involved. simple as a hand on the arm to guide the

XI. OFFICER SAFETY AND USE OF FORCE


478 38. DEFENSIVE TACTICS AND OFFICER SAFETY

subject to the proper exit door. Any contact case the subject has an unusual reaction to the
made with the subject will fall into this, or a chemicals.
higher level, of force.
Weapon-Assisted Controls—Use of an
expandable baton, nightstick, or even a radio
ALL FORCE BEYOND THIS POINT to physically manipulate the subject falls into
REQUIRES TRAINING BEYOND this level of force or a higher level. Through
THE INTRODUCTORY the introduction of a weapon or tool, the
OFFICER LEVEL officer has increased the overall level of
force in the situation. This phase would
include not only directing a person with the
Joint Control Techniques—These techniques
use of a tool or weapon, but also the use of
rely on manipulation of limbs to entice
these to increase the effectiveness of joint
the subject to move in a desired direction,
manipulation techniques.
cease or initiate a desired action, or comply
Weapon-Assisted Pressure Point and Pain
with the wishes of the person executing the
Controls—Use of a weapon to increase the
technique. An example would be grasping
level of pain that a subject experiences, as a
the arm at the wrist and elbow and turning
result of applying it to critical points such
the arm in such a manner that the subject is
as nerve bundles. In many cases, observers
inclined to walk forward.
could perceive this type of response to be
Pressure Point/Pain Controls—Applying
excessive, unless the subject has clearly made
pressure to key parts of the body with the
a reasonable attempt to cause physical harm.
intent to cause pain. These are usually
Striking Techniques—Use of techniques,
nerve bundles or muscle and connective
without the assistance of any weapon or tool,
tissue locations, which cause an inordinate
to strike the subject on areas of the body that
amount of pain if manipulated properly. In
are not critical in nature. It is essential that
contrast to the previous level, where joints
these areas of the body are well understood.
are manipulated to produce the expectation
A strike to the head or neck will usually be
of pain, if the desired order is not complied
considered “deadly force” and would thus
with in this phase, the actual sensation of
be a higher level of force.
pain is the motivator.
Weapon-Striking Techniques—Use of
Chemical Controls—Use of such tools as
weapon- or tool-assisted striking techniques
chemical sprays or OC sprays, commonly
to strike the subject in areas of the body
referred to as “pepper spray,” which cause
which are not critical in nature. As with the
a great deal of pain and limit vision and the
“striking techniques” phase, targeting areas
ability to resist in a coordinated manner.
which could have life-threatening effects
These are the limit of what most observers will be considered a higher level of force. As
would call “low force” responses. In fact, some weapon-striking techniques tend to produce
observers might rank the chemical controls more impact energy, critical areas of the body
response higher in the use of force continuum are expanded to include the torso of the
when noting the extreme level of pain that the body. For example, a strike to the lower area
subject suffers. In most cases, these tools do of the ribcage with an expandable baton is
not result in permanent harm, although any likely to cause fragmentation of the floating
officer utilizing them should have some form ribs, and punctures to the internal organs
of decontaminating wash or spray available in as those fragments travel inward. Weapon,

XI. OFFICER SAFETY AND USE OF FORCE


TRAINING FOR SUCCESS 479
striking techniques, in this phase, should be either be working toward a goal that will prove
limited to the long bones of the limbs in an ineffective, or unable to execute the techniques
attempt to limit the subject’s ability to inflict due to lack of effective experience.
injury upon others. Design the training around the types of threats
Striking Techniques to Critical Targets— that are perceived to be likely within the working
Intentional targeting of critical areas of the environment. It does no good to practice hand-
subject’s body in response to a reasonable gun skills if the client does not allow firearms.
perception that they intend to inflict great Likewise, when designing a program for a loca-
bodily harm or death upon the officer tion that will be staffed with armed officers that
or others. These techniques should only have a history of exchanges with firearms, but
be employed when no other, lesser force rarely involves physical contact with subjects,
options exist. the training program should be divided between
Firearms—Use of firearms, in any form, is the armed and unarmed response techniques.
final phase of the continuum. In the eyes of It is essential that this training be conducted
most courts, firearms are designed and used with a strong sense of reality. Training should
simply to kill the intended target. They should be in the actual environment when possible and
only be deployed in response to situations under less-than-ideal conditions. Does it make
where it is believed the subject’s intent is to kill sense to train in loose clothing on a floor with
or cause great bodily harm to others, that the good traction when instead the security offi-
perpetrator has the ability to do this, and is in cer wears a bulky uniform and patrols an area
a position to do so imminently. This is the “last that frequently ices over? The training pro-
chance” response. gram must mimic the actual environment if it
In all interactions with subjects, it must be the is to be effective. Again, different environments
officers’ goal to utilize the least amount of force may require handling irate persons or persons
possible while continuing to protect the lives and with behavioral issues and the skills for these
safety of themselves and others. When officers requires special training.
find they are engaged at a level of force greater Training programs should stress how impor-
than the “no force” levels, options to reduce the tant it is to avoid becoming careless and compla-
level of force and deescalate the conflict should cent. Oftentimes, officers will work for long hours
be sought. Officers facing a potentially danger- with great stress, causing them to tire, which in
ous subject should consider disengaging from turn can cause carelessness or apathy. Remaining
the conflict as an alternative to escalating the constantly alert is necessary for safety reasons.
level of response, but only if by doing so they do When dealing with physical techniques, the
not increase the danger to others in the area. ideal training program will provide repetition
As a general rule, the subject will not typi- sufficient that the specific techniques will be a
cally attempt to deescalate the level of force. It reflexive response. Without a reflexive response,
is up to the responding officer to try to reduce the decision making may be delayed enough
the level of threat reasonably. to be fatal. Developing the necessary level of
response requires extensive repetition. As many
as 7,000 repetitions may be required before the
TRAINING FOR SUCCESS technique begins to be performed reflexively. It
is also essential that these repetitions be tech-
When designing an effective training pro- nically sound. It is highly counterproductive
gram, the most critical factors should be realism to do the first thousand repetitions with incor-
and repetition. Without these, the officer will rect technique. Vast amounts of time and energy

XI. OFFICER SAFETY AND USE OF FORCE


480 38. DEFENSIVE TACTICS AND OFFICER SAFETY

will be wasted, not to mention the time necess- FOCUS ON PREVENTION


ary to retrain the reflexes. Once a specific level
of skill is achieved, regular review and practice There are prevention steps that each pro-
will be required for retention. tection officer should know and understand.
A training program should include a com- Although ideally we want to solve any matter
ponent that focuses on an understanding of with words, at some point, greater force may be
the flow and dynamics of combat. The more required. This is when the officer must rely on
realistic the training, the better the trainee will training and judgment. Whatever actions are
be able to handle the actual situations if they taken, be prepared to justify them.
occur. This is why it is essential that some train- The focus should be on preventing confron-
ing time be spent learning to confront multiple tations by encouraging:
opponents. This type of encounter is common ● Continuous training
and can prove to be far more dangerous than ● Good communication skills
a single aggressor. Effective training in con- ● Maintaining a safe distance
fronting multiple opponents will allow one to ● Physical conditioning
understand how to use movement and speed ● Site-specific (industry-specific) training
to shift position effectively. Despite the pres- ● Post-incident training
ence of multiple aggressors, a combatant with
a superior understanding of movement and a
good use of the environment can find ways of
interacting with only one person at a time. CONCLUSION
Documentation of all training is extremely
important to track dates of training, progres- Safety is paramount, and training, along
sion, frequency, and skill level, along with the with good judgment and common sense, will
instructor’s credentials. In the event of scrutiny help in taking the appropriate actions in any
or any legal consequence, the documentation is given situation. The use of force, whether for
even more important. self-defense or to make an arrest, should always
State regulations and security guidelines should be the last resort. It is hoped that the material in
be studied, frequently revisited, and understood, this chapter will provide the reader with some
allowing the security officer to make better insight into the alternatives that should be con-
informed decisions when faced with aggression. sidered first.

EMERGING TRENDS
Society is becoming more complex and as it include focus on site-specific training, such as
changes the role of the security officer will also terrorism training for all nuclear sites and other
have to change. This will mean an increased utility locations. Security officers will surely
need for additional staffing and training. The need to increase their human interaction skills,
demand for increased professionalism, along as current economic limitations on public police
with the need to better trained officers in weap- forces are causing security personnel to take on
onry, report writing, communications, and legal more traditional policing roles.
issues, will grow in importance. The future will

XI. OFFICER SAFETY AND USE OF FORCE


SECURITY QUIZ 481
The world is changing rapidly and security
c. Neither a nor b
officers must maintain professionalism and keep
d. Both a and b
abreast of new technology, legal precedents, and
6. The possession and use of weapons are
training. Failure to do so, allows for vulnerability
dependent upon which policies?
to litigation, criminal prosecution, or public scru-
a. The employer
tiny. Thus, education and training are keys to a
b. The client
long and safe career, attaining retirement without
c. Applicable law
encountering the need to justify actions to superi-
d. All of the above
ors, clients, the public, or the courts.
7. The three basic factors of combat include:
a. Weapon selection
S EC U RI T Y QU IZ b. Control over space
1. Caution should be used at all times. c. Body armor
a. True d. None of the above
b. False 8. Points of consideration when entering into
2. Additional support will never be required if physical confrontation include:
you are cautious. a. Limits of physical ability
a. True b. Number of potential opponents faced
b. False c. Legal restrictions
3. It is always wrong to withdraw from a d. All of the above
situation. 9. Never get close to an aggressor, no matter
a. True what the weapon.
b. False a. True
4. Firearms are the final phase (highest level) of b. False
the range of response. 10. Training that is going to help every day in a
a. True security job is:
b. False a. Communication skills
5. The critical factors when designing a b. Maintaining physical fitness
training program are: c. Written documentation
a. Realism d. Knowing the company policies and law
b. Repetition e. All of the above

XI. OFFICER SAFETY AND USE OF FORCE


This page intentionally left blank
C H A P T E R

39
Industrial Hazards, Safety, and the
Security Patrol Officer
Brian D. Baker

the role of security personnel should also be


CHAPTER OBJECTIVES focused on identifying those risks that may
● Define potential hazards and risks evolve into a critical safety condition.
associated with working in an industrial While the security officer is tasked with the
or manufacturing setting mission of facility safety, there are often signifi-
● Outline the various forms of workplace cant circumstances where the officer’s patrol
violence and motives that influence the duties expose him or her to direct and serious
risk of criminal violence in the workplace hazards. These can be industrial hazards that
are taken for granted by those workers who
● Show how the security officer can function in a facility for many hours during a
conduct security risk assessments and routine work week, such as maintenance, pro-
self-assessments to identify hazards in duction, supervisors, or quality control person-
the industrial workplace nel. However, the risk posed by these hazards
● Suggest methods to minimize workplace multiplies for the security officer who may only
hazards and threats patrol certain areas occasionally or for a limited
● Explain basic fitness, health, and number of hours per week, often alone and out-
wellness issues relating to an officer’s side of normal facility operating hours. Statistics
duties in an industrial setting from the U.S. Bureau of Labor Statistics rein-
force that potential injuries to security officers
are more likely to result from falls, exposure to
unhealthy materials, and industrial accidents
Much attention is placed on the role of the secu- than from violence or assault.
rity officer as a member of a facility safety team. The security officer, by virtue of his or her
Indeed, this role is critical for prevention, report- position, assumes certain risks in the workplace
ing, and investigation of workplace accidents where he or she patrols. Foot patrol of an indus-
and the overall maintenance of a secure work- trial facility is a common responsibility for many
place. As other chapters in this book emphasize, professional security officers. This duty post is

483
484 39. INDUSTRIAL HAZARDS, SAFETY, AND THE SECURITY PATROL OFFICER

not often seen as challenging, technologically create unique considerations for officers who
engaging, or even social or exciting. In fact, it is must complete their patrol and duties while
not too bold to refer to this duty post as less than preventing personal injury, avoiding short-term
glamorous. Yet, the need for an industrial security and long-term health problems, and reducing
patrol will always be present. Whether an indus- potential risks to the facility and other officers.
trial facility is in full operation, vacant, or tran- By observing certain practices, security officers
sitioning, the employment of a skilled security can safely enhance their performance and enjoy-
patrol person remains a necessity. The following ment of their duties at industrial hazard posts.
chapter is aimed at providing the industrial secu- To further expand on the distinction between
rity officer with information to perform indus- threats and hazards, a threat definition should
trial security duties safely while recognizing, and focus on the term “criminal,” as in criminal attack
avoiding potentially life-threatening hazards. or criminal event. Workplace violence as defined
above is a significant and common type of
threat, although the theme and emphasis of this
DEFINITION OF INDUSTRIAL chapter are that this is an overall rare occurrence.
HAZARDS Some common examples of workplace vio-
lence threats include:
The topic of security officer safety in the work- ● Domestic violence/ex-spouse or lover
place generally calls to mind the use of self-
violating a protection order
protection and defensive tactics. Any act of ● Terminated employee enacting revenge on a
violence or aggression against a security offi-
supervisor or manager
cer falls into the category of workplace vio- ● Drug dealing or gambling debts being
lence. The FBI Critical Incident Response Group
collected
(2004) categorized workplace violence into four ● Disgruntled worker sabotaging equipment
typologies:
to injure workers
1. Violent acts by criminals with no connection
Other types of criminal threats include:
to the workplace (such as robbery or other
crimes) ● Burglary of office areas
2. Violence directed at employees or others ● Theft of copper or other valuable metals
committed by clients or service consumers ● Car theft
3. Violence between employees, including ● Vandalism, trespassing, drug use, or
against supervisors or executives underage drinking
4. Violent acts against an employee by a
These events are termed “threats” because
nonemployee, particular to domestic or
they involve individuals on the facility property
relationship issues
committing acts that a security officer is most
While the threat and danger of criminal likely to detect, encounter, and provide response
attack (human threat) is present in every work- to. The threat of violence toward the officer
place, the industrial security officer will likely is present should the criminal decide to fight
also encounter hazards—those conditions existing instead of flee the scene or surrender coopera-
because of the physical and natural environment of tively to the lawful interventions of the officer.
the facility that may pose risk to the personal health The professional security officer should observe
and safety of those who come into contact with them. the event, position him- or herself safely, and
Industrial hazards are a form of risk that must make an immediate notification to police or
be managed by the security force. These hazards to a supervisor according to the post orders.

IX. INVESTIGATIONS
INDUSTRIAL HAZARDS, ACCIDENTS, INJURY, AND ILLNESS 485
Unfortunately, some criminals will respond to TABLE 39-1 Industrial Hazards
any form of detection with violence. Among
Oil Field Vehicle accidents caused by
the many theories for aggression include cogni- poor roads
tive links between authority figures and equip-
ment (such as a security officer with radio or Attack from wild animals
handcuffs) and discomfort caused by block- Slippery walking conditions
age of goals (such as escape or monetary gains from rain or oil spills
of a burglary). This linkage may cause certain Urban Parking Garage Speeding cars
people to act quickly on the basis of emotions
Loose handrails
and without deliberation or forethought; such
actions may result in violence (Bartol & Anne, Greasy or oil-coated surfaces
2008). Again, the Bureau of Labor Statistics Ski Resort Severe weather
reinforces that this is often a low probability for
Fire in lodges, cabins, or villas
industrial security officers yet it is a threat that
officers assume and must be trained to handle. Avalanche or ice storms
Threats may exist in remote oil fields, urban Logistic Center Heat exhaustion
parking garages, retail stores, or logistic centers.
Deteriorating building
One can’t automatically assume that a ware- construction
house in Guatemala or an electric sub-station in
Montana is less vulnerable to crime than a pipe- Falling boxes
line in Nigeria or a hospital in Washington, DC. Hospital Radiological waste
The volume of human contact and the value of Wet floors
assets are possible factors that raise or lower the
likelihood of criminal violence upon a security Poor lighting
officer; however, no site must be assumed to be
without threat. Certain crimes require certain
settings and the officer must recognize the pos- vigilant but not fearful of these hazards. The
sibilities for his or her specific location. officer must be respectful of the hazard and not
In the industrial setting, however, the risk of take further actions that increase his or her risk
serious personal injury to a security officer lies of injury. This respect not only applies to the
in the conditions existing by virtue of the indus- immediate steps taken on every foot patrol but
trial and natural environment. also to exposures and hazards that may affect
Table 39-1 outlines how the threats mentioned the officer’s long-term health. To achieve this,
above and other common types of security posts one must rely on the components that make an
can translate into industrial hazard examples. excellent security officer in the first place: five
Indeed, these nonspecific examples cover only senses, personal instinct, and understanding
a few areas of industrial hazards. The hazards one’s own health and fitness.
exist in the environment of the site—either man-
made conditions or natural conditions—but do
not directly involve criminal or violent actions INDUSTRIAL HAZARDS,
of humans upon the security officer. These ACCIDENTS, INJURY, AND ILLNESS
environmental risks, known as hazards, may
be managed through commonsense awareness, While factories, foundries, and heavy equip-
training, and officer self-evaluation. The profes- ment manufacturing are a few examples we
sional security officer must concentrate on being consider with the term “industrial,” the types

IX. INVESTIGATIONS
486 39. INDUSTRIAL HAZARDS, SAFETY, AND THE SECURITY PATROL OFFICER

of hazards present are not specific to only the complex. Without adequate sleep, he drank
typical assembly, production, or raw material several caffeine energy drinks to cope with
processing activities of these sites. Schools, hos- his exhaustion. Following a strenuous foot
pitals, logistic/distribution centers, high rises, patrol of a parking lot area he returned to the
shopping malls, chemical storage, energy facili- command center and suddenly collapsed.
ties, parking garages, office/commercial, and His head struck the floor, causing a severe
high-tech research facilities are all examples of concussion that immediately resulted in a
potentially hazardous environments. seizure. His body convulsed and his head
Hazards can result in obvious slips and falls, again struck the floor, causing lacerations
poisoning, blunt force trauma, burns, heat stroke, and significant blood loss. He was rescued
hypothermia, frostbite, and broken limbs. Aside by a fellow patrol officer and rushed to a
from potentially fatal injuries, especially when trauma center by ambulance.
an officer is working alone, industrial hazards 2. An experienced 60-year-old officer was
can result in long-term health problems such as working a mobile patrol post at a retail
hypertension and cancer. Disruption to an offi- complex in the late evening. He exited his
cer’s natural sleep habits and exhaustion are patrol truck briefly to check on an illegally
common problems with officers working night parked car. Upon returning to his vehicle, he
shift or a second job. Abuse of caffeine, stimu- slipped on grease leaked from a tractor-trailer
lants, and tobacco to cope with fatigue, will fur- that had been parked in the same spot for
ther detract from an officer’s health. Abuse of several days. The officer fell hard on his right
alcohol to counteract stimulants, or to help with side and then managed to crawl back into
sleep problems, can lead to even further physi- his patrol vehicle and return to the security
cal deterioration. The officer should always strive station. He was working alone at the time and
to achieve the right amount of sleep, relaxation, the management of the site had not provided
and exercise necessary to perform his or her the officer with a cell phone or radio. The
duties comfortably and safely. This is challeng- officer was in severe pain and went into shock
ing to manage in our busy world, but it is pos- from a fractured hip. His relief officer arrived
sible to establish a sleep schedule that can be an hour later and summoned an ambulance.
coupled with exercise and a healthy diet in order In addition to the officer working without any
to reduce blood pressure and other unhealthy communications, it was later determined that
effects. In the event that an officer cannot effec- he did not have a flashlight and was wearing
tively achieve the sleep necessary to perform the a hard-sole dress shoe with no tread.
duties at an industrial facility, he or she should 3. A healthy 40-year-old officer suffered lung
seek a change of assignment before being injured injuries while patrolling through an area
or possibly disciplined for poor performance. containing ammonia gas storage tanks. The
Consider some of the following scenarios of tanks had recently vented, and a warning
actual hazards and how the security officers alarm in the area had been disconnected for
could have prevented or mitigated the resulting repair. She was working alone inside the
injuries. With many facilities employing mul- facility and was away from her command
tiple officers per post, the teamwork and super- center, where a working alarm indicator
vision roles should not be ignored when also would have alerted her to the hazardous
protecting fellow security officers. condition. The security officer on the prior
shift had also failed to document the verbal
1. A healthy 30-year-old officer started on instructions from the maintenance director
a new night shift post at a 35-acre office that patrols in that area should be avoided

IX. INVESTIGATIONS
INDUSTRIAL HAZARDS, ACCIDENTS, INJURY, AND ILLNESS 487
due to safety issues. She was quickly rescued peer officers should have recognized that he
by cleaning personnel who recognized her was not rested and alert and assigned another
distressed breathing. Her injuries terminated officer to that patrol. The officer in the second
her ability to work. example was not provided with the necessary
4. An overweight and diabetic young contract basic communication tools and flashlight, and
security officer returned to the reception was not wearing the proper footwear. In the
post after completing a walking patrol third example, the officer entered an area that
and lockdown of three warehouse and should have had a warning sign posted and
production buildings. It was a hot summer her prior officer did not properly document
day and the officer began to experience chest and pass down the safety instructions. She was
pains. He was relatively new to the post and working alone inside a facility and was without
had difficulty locating the phone number for proper communications or monitoring. In the
the command center that he was required fourth example, the officer was unfit for duty at
to call if there were any emergencies. He this post and by not taking steps to pace himself
instead phoned his branch office, located an or drink enough water, he further exaggerated
hour away, and reported that he felt ill. He his health situation. The fact that he was poorly
was unable to transmit further information trained and also in distress, further hampered
and it took the office personnel nearly his ability to obtain assistance quickly.
twenty minutes until they could confirm his The cost to each officer was significant but
location and dispatch a patrol officer/EMT there was also a latent cost to the facility or
to assist him. It took the patrol officer nearly contract security company through worker’s
40 minutes to reach the site, and he soon compensation payments and overtime to fill
determined that neither the officer in distress the shifts left vacant from the injured officers.
nor the receptionist at the branch office had Consider these additional hazards that were
summoned an ambulance. Fortunately, a fire clearly recognized by the security officer and
station was less than half a mile away and therefore should have been avoided:
within 1 minute of calling 911, the patrol ● Officer bitten by ticks on two occasions while
officer and firefighters managed to stabilize
patrolling a perimeter fence line with heavy
the patient. His condition was directly
grass and vegetation
attributed to his health and the exertion of ● Officer injured her back while holding open
the post.
a heavy steel door at a bank
● Officer slipped on a tiled floor in an elevator
The above examples are only a few situations
because he had snow packed into the tread
of hazards that could impact a security officer.
on his boots
Additionally, all of these situations could have ● Officer suffered carbon monoxide poisoning
been prevented by a combination of proper
while using a kerosene heater inside a guard
training, equipment, and personal vigilance by
shack with poor ventilation
the officer and his or her peers. While none of ● Officer stepped on a loose metal floor plate
these incidents involved gruesome injury or
that tipped, causing the officer’s leg to
horrific death, the events all had a significant
plunge into a drainage channel, resulting in
life-changing impact on the officer. Again, these
ankle, knee, and back muscle injuries
incidents were preventable.
The officer in the first example should have An officer should not assume that the employer
prepared for the new shift by adjusting his or supervisor would clearly recognize all haz-
sleep cycle and reducing his caffeine intake. His ards. Events that result in injury will not always

IX. INVESTIGATIONS
488 39. INDUSTRIAL HAZARDS, SAFETY, AND THE SECURITY PATROL OFFICER

result in corrective action. Unfortunately this is known as a whole hazards approach, incorporat-
the nature of business and industry. However, ing crime along with the numerous other possible
the officer should utilize all legitimate means to events and risks beyond crime that can impact a
report new and potentially unrecognized hazards facility. Risk assessment should address any event
to his or her supervisor through the proper chain or condition that could create a loss to the facility.
of command. While some facilities do not allow Human life should always be considered the
security officers to take corrective action on safety most important asset at a facility. Secondary
or maintenance matters, the security officer must to human life, risk assessment should identify
recognize his or her responsibility to the protec- those assets that are critical to the operation of
tion of others, including fellow security officers. If the facility. Certain employees within the facil-
a loose floor plate can be safely repositioned, for ity, such as executives or plant engineers, may
example, the officer should take action. The officer be particularly valuable assets as well.
should also provide for his or her own safety and The whole hazards approach seeks to iden-
comfort through a minimal investment in comfort tify the negative things that can occur to the
or safety supplies. A good insect repellent could key assets as well as the likelihood that specific
prevent tick bites. A small pocket flashlight could events will occur to those assets. For example,
have helped the officer recognize the loose metal the assets listed above are all obviously critical
floor plate. The self-protection section of this chap- to the facility and post duties and instructions
ter will further discuss personal equipment for the in many ways refer to crime prevention and
security officer. crime detection priority for the patrol officer.
But assuming that industrial environmental
hazards are more likely than crime, consider
RISK ASSESSMENT some potential events that could cause a loss
aside from crime:
Risk assessment is a thorough, comprehen- ● Smoke and fire.
sive, and ongoing evaluation of the key assets, ● Water leaks and flooding.
threats, hazards, vulnerabilities, and procedures ● Vehicle accidents and vehicle fires.
in place to protect a facility from loss. While risk ● Medical emergencies.
assessment sounds like a huge task that should ● Structural failure and building collapse.
be undertaken by a security supervisor or direc- ● Fuel leaks.
tor, it is actually an important skill that should ● Dangerous debris, vegetation, tree limb
be developed and practiced by the industrial
hazards.
security patrol officer as well. Security manag- ● Weather-related conditions.
ers and consultants utilize customized checklists ● Smells from chemicals, solvents,
and formulate formal reports when conduct-
malfunctions.
ing a facility risk assessment. The patrol officer, ● Asbestos and airborne contaminants.
by direction of post orders and patrol duties, is ● Hydraulic leaks.
an extension of the risk assessment, particu- ● Appliance failures such as office,
larly in the ongoing evaluation stages (known as
refrigeration, or cooking equipment.
auditing).
Much of what is written about risk assessment
actually pertains to threat assessment and the SELF-ASSESSMENT
determination of crime probability, or likelihood
of criminal attack or events. The more accurate The professional security officer should recog-
definition of risk assessment takes on what is nize the value and process of the risk assessment

IX. INVESTIGATIONS
SELF-ASSESSMENT 489
and practice this daily while patrolling the facil- ● Overhead hazards such as ventilating gases
ity. When viewing the facility from a crime or falling pipes.
prevention angle, security officers should ask ● Unnecessary patrol through active areas not
themselves, “What are some things a thief might requiring security presence.
want to steal inside this facility? Where are some
places that I would hide if I were a burglar? If There is also a distinction between officer-
I wanted to bomb or sabotage this operation, created hazards—being in the wrong place
what target would I choose?” at the wrong time or just being in the wrong
But when viewing the facility from the broader place—and the officer’s hazardous behavior.
whole hazards vantage point, the questions an While the former assumes that the officer is
officer should ask are elemental: attempting to do his or her job thoroughly,
and may become inadvertently entangled or
● Where are the fire alarms and emergency exits?
exposed to a hazard, the latter engages in risky
● Do I have a flashlight and is there emergency
or consciously unsafe or foolish behavior.
lighting if the power goes off?
A significant number of workplace injuries
● Where is the safest place for me in a tornado?
result from unsafe acts, showing off, or other-
● Do I know how to shut off the water supply
wise blatant disregard for personal safety.
if a pipe bursts?
Among these is the hazard of driving a vehicle
● Can I get locked inside any rooms?
on patrol. Mechanical failures, accidents caused
● Who do I call if this machine malfunctions?
by the other driver, and that aside, we all have
● What labs should I avoid because of the
a tendency to sometimes push the abilities of a
chemicals?
vehicle. The definition of vehicle can vary from
● Where is it dangerous for me to walk?
a Segway to bicycle, to pickup truck to motor-
● Is it necessary to check the outside perimeter
boat. It is easy to forget, or ignore, basic safety
at night if there are video cameras?
equipment such as a helmet or seatbelt. The use
This self-assessment process assumes a higher of cell phones and text messaging devices is
order of thought and should be undertaken also another factor that contributes to accidents.
regularly once the officer is oriented to his or Speeding, choosing impractical routes, and lazi-
her site and knows the patrol routes and proce- ness are major causes of preventable accidents.
dures. Much of this becomes common sense and Other hazardous behavior includes oper-
second nature to the officer and within a few ating forklifts, cranes, or equipment without
months it may become subconscious. An impor- proper training or authorization. Officers must
tant aspect of the self-assessment must be for the overcome their curiosity about such equip-
officer to recognize what hazards exist by virtue ment in order to avoid injury. In a complex
of the officer’s presence in the facility. industrial setting, many machines may be linked
through one electrical system. The key or switch
● Rooftop patrols. that is used to start or activate a particular piece
● Climbing scaffolding. of equipment may not be the same key or switch
● Improper monitoring by command center. that turns the equipment off or shuts down the
● Lack of training regarding weak spots on process.
walkways or paths. Exploring electrical switching rooms or con-
● Traversing through active production areas fined and underground spaces is extremely haz-
or maintenance activity. ardous, as is climbing or descending ladders.
● Vulnerabilities from torches, demolition, or Another bad practice, with good intentions, is
vehicles. exercising while on patrol. Officers who jog,

IX. INVESTIGATIONS
490 39. INDUSTRIAL HAZARDS, SAFETY, AND THE SECURITY PATROL OFFICER

Smoking while on patrol is extremely unwise because it interferes with one’s ability to smell
smoke, gas, or other olfactory hazards.

use raw materials as free weights, or hang from ● Never enter or tamper with vehicles, storage
scaffolding to do pull-ups are at significant risk areas or tool cribs.
of injury. ● Be careful of stairs, catwalks, and
Just as the risk assessment process prepares scaffolding.
the officer for knowledge of key assets and ● Padlock controls are important tools for loss
potential hazards, the officer should also under- prevention but also to control access and
stand what could happen to the facility and oth- preserve housekeeping. Report all padlock
ers if he or she is injured or killed as the result issues immediately.
of a hazard. More important, the officer should ● Avoid confined spaces.
recognize the impact if he or she is unable to ● Avoid walking on uneven floor plate steel
perform the duties as a result of a hazard they decking or areas where the floor is concealed
created or from hazardous behavior. by wood or cardboard.
The following are generic suggestions for ● Always know the work area and location of
minimizing hazards and threats (this list is not emergency exits.
specific to any particular environment): ● Avoid dusty areas or enclosures where
known pollution cleanup work is being
● Use caution when approaching partly open performed.
doors or overhead loading doors. ● Avoid forklift traffic areas such as ramps and
● Do not eat or drink except in approved areas blind corners. Give the forklift the right of
to avoid risk of food poisoning. way unless the operator stops, makes eye
● Turn off coffee pots and appliances when contact, and motions you by.
empty or not in use. ● Observe foreign object debris (FOD) and
● Always use a handrail when ascending or make sure that the walkway is clean before
descending stairs. making access or others approach.
● Move slowly and carry a flashlight. ● Avoid treacherous walkways, bridges, or
● Watch out for open areas that may not be paths with no railings or over deep holes.
marked and areas that were closed or sealed ● Never cross or walk on bent or bowed
yesterday that could be open today. Avoid flooring.
falling into pits and drainage tunnels. ● Know what hazards exist to the exit
● Avoid the curiosity of patrolling in restricted doors. There may be machinery, FOD, and
or marked danger areas. protruding raw materials. Attempt to keep
● Stand clear of high-speed roll-up doors and exit pathways clear.
forklift traffic. ● Avoid overhead cranes, tilting loading
● Avoid greasy areas that are slip hazards. docks, or walking under elevated lift trucks
Also, avoid wearing greasy shoes into your and boom lifts.
home or vehicle. ● Don’t approach trenches and other areas
● Be aware that some work areas are where work is in progress.
abandoned when the shift ends as workers ● Be aware of doors that are welded closed,
will leave tools and parts lying on the floor, bolted shut, or temporarily barricaded with
posing a trip hazard. 2  4 boards.

IX. INVESTIGATIONS
SELF-PROTECTION 491
● Be cautious of steep ramps and pitted or The walking patrol is not an efficient method
uneven walkways. to cover a large amount of territory if there are
● Unexplained water may not be a concern, numerous duties such as meeting visitors or con-
but running water/flooding areas and tractors, or repetitively unlocking gates or storage
water running onto electrical panels could be areas. However, during off-production hours a
treacherous. walking patrol has fewer random demands and
● Be familiar with HAZMAT areas and also by walking through a facility, the security officer
with HAZMAT signs that no longer apply. can check for unlocked doors, listen and smell
This may be needed in case of an emergency for unusual conditions, and become comfortable
to guide the fire department. in the environment. This allows a thorough and
● Avoid entering work areas from narrow careful evaluation of the many types of industrial
hidden walkways. hazards previously discussed.
● Never walk through any liquid if it can be When walking at a moderate pace for several
avoided. hours, it is possible to cover many miles and
● Choose to walk over concrete flooring rather for the body to burn hundreds of calories. You
than temporary flooring or wood or metal should eat wisely to avoid food that is filling to
grates. the point of discomfort. Carbohydrates such as
● Be aware that diamond plate steel flooring is bread and grains are a good source of energy.
designed for traction but when it is wet, or Fruit and plenty of water or electrolyte drinks
coated with grease, it becomes very slick and are important in both hot and cold weather.
dangerous. Getting in shape for a walking post is not
● Be careful of patches in flooring, cracks in always possible but once walking becomes part
concrete, and areas of new construction of your job, you should consider walking and
where walkways may be unfinished. exercising during your days off as well. If you
have medical issues that impact your ability to
SELF-PROTECTION walk or your fitness for duty, discuss these with
your supervisor to see if accommodations are
In addition to awareness of site hazards and possible. Some industrial sites have an electric
the ongoing evaluation as described in the risk cart available to save the officer from fatigue. At
assessment section above, there are two areas other sites it is not possible to use a cart or other
where the professional industrial security offi- conveyance and walking is required.
cer must take personal responsibility: fitness for Remember that when on a foot patrol your
duty and personal safety equipment. primary responsibility is to protect the facil-
Fitness for duty refers to an officer’s personal ity from all types of losses. When encounter-
physical and mental ability to perform the duties ing workers, be pleasant and professional but
of the post. As mentioned in the beginning of not overly social. It is best not to develop close
this chapter, much of the patrol duties involve relationships with people outside of the secu-
walking. In fact, a patrol can involve significant rity department as this will allow you to act
amounts of walking at a slow and steady pace. objectively and appear fair and impartial. The
In large industrial facilities, the officer may use a relationship that employees have with secu-
combination of foot patrols inside buildings and rity officers varies by the culture of the facility
vehicle patrols between buildings. Some sites may and the size of the workforce. You will want to
require an officer to walk as many as 6 or 7 miles appear approachable should someone need your
per shift. This requires some stamina, especially if assistance but do not treat the workplace as your
the patrols require ascending stairs or hills. social network.

IX. INVESTIGATIONS
492 39. INDUSTRIAL HAZARDS, SAFETY, AND THE SECURITY PATROL OFFICER

As the first line of defense between the facil- contains details on exposure risks, health effects,
ity and the public, you should appear alert, well legal updates, and products and locations where
groomed, and physically capable. You are not a asbestos can be located. It is the employer’s
police officer, however, and if you wear a uni- responsibility to protect workers from expo-
form and a shield or ID badge, the purpose is to sure health risks, so the industrial security offi-
make you recognizable but not to intimidate or cer should pay attention to such information. It
project law enforcement authority. If there are is the officer’s duty, to himself or herself, to be
individuals on the property that do not appear vigilant and self-protective. If an environment
to belong, your confident presence and polite becomes harmful or the officer notices signifi-
request for identification according to the post cant unhealthy symptoms, they should consult
orders, should go a long way in preventing loss. their supervisor as well as a physician.
If you appear to be out of shape or intimidated, The final piece of advice for the comfort and
you will negate the effectiveness of the entire safety of every security patrol officer is regard-
security department and may also lead yourself ing footwear. As previously mentioned, an offi-
into a dangerous situation. cer is far more likely to be injured from a fall
In addition to the physical demands of foot than from a violent assault. Boots and shoes can
patrol, the industrial facility has significant dif- be an expensive investment for many officers.
ferences from other, more open, posts. These Discounts and copayments for footwear by the
include the presence of equipment, running employer or contractor should be considered,
air compressors that start and stop depending along with recommendations and on-site safety
on pressure or demand from other parts of the policies regarding foot protection. Steel toe and
plant, humming electrical transformers, random safety shoes can be heavy and uncomfortable
buzzers signaling break times, dead silence, if not properly fitted and broken in. In many
pigeons and rodents, and loud clanks and bangs cases, the ideal style may not be available in a
as metal buildings expand and contract. Several color that matches the officer’s uniform or in a
excellent and free health tips may be found on style that is personally preferable. Consider that
the Internet or via your local YMCA or private in an industrial setting, most boots will become
fitness center, but fitness for duty is a com- severely worn and blemished and that fashion-
mitment that can be achieved through a daily able appearance must be sacrificed for safety.
20-minute workout and a low-fat, vitamin- Law enforcement and military-style boots
charged diet. can cost over $100 but may not be durable in
Perhaps one of the most heavily broadcast some industrial settings. These boots should
industrial health hazards has been asbestos fit comfortably and provide a flexible tread
exposure. Asbestos cancer, known as mesothe- with reinforced shank protection. Most of these
lioma, is caused by a scarring of the deep lungs boots are waterproof, insulated and enhanced
or stomach due to asbestos exposure. Accor- with special vapor barriers and breathing mem-
ding to the Mesothelioma Center (http:www. branes. With proper care and careful walking,
mesotheliomacenter.org), not all exposures will the officer may be pleased with the investment
result in illness or cancer; nonetheless, once if he or she understands that exposure to grease,
a person believes they have been exposed to oil, dust, and metal will challenge the upkeep
asbestos, they should report this to their phy- and appearance.
sician for further monitoring. Asbestos is a Sneakers and dress shoes should be avoided
mineral product that has been used in mining, in an industrial setting. This includes the popu-
milling, foundry operations, and other manu- lar black tennis shoes often acceptable in uni-
facturing. The Mesothelioma Center’s website formed professions, including security posts in

IX. INVESTIGATIONS
SELF-PROTECTION 493
less hazardous settings. Tennis shoes typically a low- to mid-cost black leather boot with either
are comfortable for walking moderate distances a 6- or 8-inch ankle, typically found in discount
but do not afford the protection or support nec- retail stores. These boots are usually waterproof
essary for industrial settings. Uniform dress and insulated with 200 grams of Thinsulate. To
shoes may also be comfortable, but the soles compensate for the low-cost comfort, the boot
of these shoes are far less safe for industrial can be greatly improved with a full insole and
patrols. If a patrol officer spends over 7 hours arch insert, as well as a heavy-duty appropri-
behind a console, but must be prepared to leave ate length bootlace. Effectively, this inexpensive
that post for 1 hour to cover a patrol, escort, or boot can be transformed into the comfort, safety,
inspection elsewhere, the minimum choice for and performance necessary for the officer’s
footwear should be for the most hazardous pos- duties. When the boot is blemished or dam-
sibility. If the officer’s duties involve significant aged with oil or solvents, the insoles and boot-
walking, the boot or footwear selection must laces can be transferred to replacement boots.
provide sturdy comfort or the result will be If footwear damage and expense are concerns,
severe knee and back pain. the security officer may find this option to be a
Layering or doubling socks can help add minimum of three times more economical than
comfort and absorb perspiration. A frugal option investing in a law enforcement or military-style
that many officers choose involves purchasing boot.

EMERGING TRENDS
Security in the industrial and manufacturing such as notifying a security officer or sounding
setting relies on the same protection concepts as an alarm. For example, video analytics can detect
other locations, namely, deter, deny, delay, and motion along a remote fence line, but instead of
detect. Technology continues to help us with simply recording the activity, the software moni-
these objectives and if properly implemented, tors the activity and can detect if the subject
technology can accomplish these goals while is moving parallel to the fence or crossing the
decreasing the risk of harm to the security patrol fence as an intruder. Video analytics holds the
officer. Digital video analytics, computerized potential for detecting industrial accidents, for
guard tour matrixes, and unmanned or robotic instance, workers who may be unmoving and
patrols are just a few examples of future security injured on the floor, or detecting changes in the
technology that could be used to save lives and number of persons in a specific area, as in a fight
increase efficiency. or disturbance in a cafeteria. Video analytics
Among these, digital video analytics holds may even be programmed to detect the absence
the greatest potential to improve the detection of required personal protection equipment such
capabilities of the weakest link in the security as hard hats or safety lines, not only indicating a
program—the human security officer. Instead risk to workers but also the potential presence of
of a security officer walking through a hazard- an intruder.
ous industrial setting, the computer can detect Digital video analytics allows the security
changes or predesignated conditions within the officer to detect activity around high value assets
video camera field of view, interpret those condi- while also providing clear real-time images of
tions, and begin a preprogrammed response plan the activity that can be later retrieved for use in

IX. INVESTIGATIONS
494 39. INDUSTRIAL HAZARDS, SAFETY, AND THE SECURITY PATROL OFFICER

an investigation. The need for a security officer locks, signage, fences, and lighting will remain
to sit for long hours and view monitors with no important for facility protection, but the potential
activity is also eliminated, therefore freeing the of technology will help improve detection abilities
officer for other patrol functions, such as a visible for the industrial security officer while reducing
perimeter patrol that may serve as a deterrent. In his or her risk of harm or exposure to danger-
the event of an incident or alarm, the system can ous circumstances. More information on video
transmit information to a remote security officer analytics is available on the Internet or at http://
for his or her attention. Digital video analytics www.pelco.com/software/videoanalytics/
has the potential to monitor movement of people (offering no particular affiliation or bias regard-
and materials in specific directions, as well as in ing Pelco).
predetermined zones that are off-limits. Physical

References 4. Most injuries to security officers are a result


Bartol, C. R., & Anne, M. (2008). Criminal behavior: A psycho- of falls.
social approach (8th ed.). Upper Saddle River, NJ: Pearson a. True
Education Inc.
The Mesothelioma Center. http:www.mesotheliomacenter
b. False
.org. 5. The security officer must make personal
U.S. Bureau of Labor Statistics. http://stats.bls.gov. choices in health and fitness to help them
adjust to a hazardous environment.
a. True
b. False
6. A security officer’s supervisor or a member
S E C URI T Y QU IZ of facility management should be relied upon
1. The definition of a hazard specifies those to identify and communicate all hazardous
conditions in the physical or natural conditions.
environment which can harm the security a. True
officer. b. False
a. True 7. Risk Assessment is a thorough,
b. False comprehensive, and ongoing evaluation
2. An example of workplace violence may of the key assets, threats, hazards,
include when a security officer is surprised vulnerabilities, and procedures in place to
and attacked by a burglar in a warehouse. protect a facility from loss.
a. True a. True
b. False b. False
3. Environmental risks are unavoidable 8. Risky behavior or improper operation of
regardless of the officer’s training and self equipment by the security officer are a few
awareness. examples of environmental hazards.
a. True a. True
b. False b. False

IX. INVESTIGATIONS
SECURITY QUIZ 495

9. The most important asset that should be 10. Durable, safe, comfortable footwear is a key
protected within a facility is the security piece of personal safety equipment for the
command post. industrial security officer.
a. True a. True
b. False b. False

IX. INVESTIGATIONS
This page intentionally left blank
C H A P T E R

40
Apprehension and Detention
Procedures
Richard P. Fiems

CHAPTER OBJECTIVES even death, that could result from a misunder-


standing of just how much authority a security
● Explore definitions of arrest and officer really has to control the movements of
implications for security professionals another person. For that reason we have to start
● Emphasize importance of authority and from the beginning. We need to look at a few
jurisdiction basic definitions.
● Explore perception of arrest and Black’s Law Dictionary defines an arrest as: “To
submission to authority deprive a person of his liberty by legal author-
ity.” Note the use of the word “authority.” That
● Explain importance of reasonableness implies that the person making the arrest has
● List civil and criminal laws that can get the legal ability to do what they are attempting
officers in trouble to do. Black’s goes on to define an arrest by say-
● Provide a methodology for approaching ing, “Taking, under real or assumed authority,
apprehension and detention custody of another for the purpose of holding
or detaining him to answer to a criminal charge
or civil demand.”
The second portion of that definition has two
There is probably no topic in the security big components. First, assuming the authority
profession that generates as much discussion to do something does not necessarily mean that
and misunderstanding as apprehension and the authority really exists. The person could
detention. It is not only the source of many be basing the assumption on bad information
complaints by the clients we serve, it can also or they could just be mistaken about the level
be the beginning of a very lengthy and costly of authority they have been given. Either way,
legal action. For these two reasons alone, it is the end result could be problematic for the offi-
worth a long look by people in the business. cer. Second, all arrests have to be made with the
But there are other, more critical reasons: we intention of bringing the arrested person before
also have to look at the possibility of injury, and a judge of some type. An arrest of any kind is

497
498 40. APPREHENSION AND DETENTION PROCEDURES

never made to inconvenience someone, delay A “citizen’s arrest” is defined by Black’s Law
their departure, or as a way to get even for Dictionary as follows: “A private person as con-
some perceived wrong. If there was no intent trasted with a police officer may, under certain
to take them before a judge, the arrest is unlaw- circumstances, make an arrest, generally for a
ful. Black’s goes on to further define an arrest by felony or a misdemeanor amounting to a breach
saying, “Arrest involves the authority to arrest, of the peace.”
the assertion of that authority with the intent to Security officers generally fall into the cat-
effect an arrest, and the restraint of the person egory of private citizen. There may be certain
to be arrested.” instances, such as a local ordinance, that grants
What this means is that in order for an arrest certain police and/or arrest authority to a secu-
to be legal and binding, the person making the rity officer. Your obligation as a professional is
arrest and the person being arrested both must to find out what laws and ordinances apply in
know the following: the place where you are working.
1. The authority to arrest is real.
2. That authority is being intentionally used.
3. The person being arrested must be restrained DEVELOPING A
in some way. WORKING MODEL
So what does it mean to be restrained? Black’s
The law in most jurisdictions allows for a secu-
definition of an arrest goes on to say: “All that
rity officer to detain people when such a deten-
is required for an ‘arrest’ is some act by an offi-
tion is for a reason that falls within the security
cer indicating his intention to detain or take a
officer’s authorized duties. Authorization can
person into custody and thereby subject that
come from one or more of three basic places.
person to the actual control and will of the offi-
cer; no formal declaration of arrest is required.” 1. The law can outline the statutory authority
In other words, if someone who assumes the of a security officer within the arena that
authority to make an arrest indicates by words they are working. That can be a federal,
or by actions that they are taking another per- state, or local law. Look for phrases in the
son into custody, and that other person believes law like “special officer,” “auxiliary officer,”
that they are being taken into custody, an arrest “special police,” or “special deputy.” Be sure
has happened. to be very clear of the definition as stated in
This is why police officers are told to make the law. They can be very specific.
their intention to take someone into custody as 2. The security company that the officer works
clear as possible to the person being arrested. for can have a contractual agreement with
They are trained to tell the person that they are the client for the officers to exercise a certain
under arrest and then give them clear orders level or degree of authority on their property.
and commands about what they want them to The source of this authority then is the
do in order to submit to the custody. contract that exists between the client and
Since citizens are legally required to sub- the security company.
mit to an arrest by a police officer, this places 3. Authority can also come from a job description
the citizen in the position of facing charges for security personnel in a proprietary
for resisting if they don’t comply. But security department. The contract of a particular
officers are not police officers. Security officers company or the handbook from a human
have the same authority to make an arrest as a resources department might contain language
citizen, unless some special circumstances exist. that establishes the authority of the officer, too.

XI. OFFICER SAFETY AND USE OF FORCE


THE IMPORTANCE OF REASONABLENESS 499
The bottom line is simple. It is, and always under the circumstances for her to feel the way
will be, the responsibility of the individual secu- she did.
rity officer to get totally familiar with the basis Contrast that with a small change in loca-
for the authority that they carry with them onto tion and subjects. You are on motor patrol in
the job. Ask questions, check around, and, by the same facility and you happen across three
all means, get the verification in writing. This is young boys who are riding skateboards in a
one area of the job where it will pay huge divi- clearly posted restricted parking lot. You are on
dends to do your homework. the opposite side of a chain link fence. You stop
the boys and tell them to stay where they are.
You then drive down the road and through the
WHAT CONSTITUTES AN ARREST? gate to get into the lot and by the time you get
there the three boys are long gone. They took
Being arrested is one of those situations off as soon as you drove away from them to get
where the perceptions of the arrested person are to the gate. If you did happen to locate them
what really matter. In short, an arrest does not later, you would have a very difficult time get-
really happen unless the person being arrested ting them charged with trespassing or resisting
submits to the authority of the person making your authority in any way. They took off like
the arrest. A few examples might help make jackrabbits because they did not believe for one
this point. second that they were under arrest. There was
Let’s assume that you are working as a secu- no arrest because there was no submission to
rity officer in an area that gives you limited authority.
authority to detain trespassers. While you are
on walking patrol you meet an elderly lady
who has gotten separated from a group that THE IMPORTANCE OF
was taking an escorted tour of the facility. You REASONABLENESS
question her about how she came to end up
in a restricted area and she is cooperative, but As with most things legal we find the word
very nervous. While you are trying to sort out reasonable popping up in any discussion about
the problem so you can locate the rest of the apprehension and detention. It is the common-
group, you get an emergency call to respond to sense standard that you are going to be held to
an accident where someone has been injured. in almost everything that you do as an officer. It
You take off running to the accident after tell- has particular application here because we are
ing the woman to “Wait here!” Forty-five min- talking about taking an action that essentially
utes later, you are just finishing up the accident deprives another person of their liberty, even if
call and you remember the elderly lady. You only for a short time. That is something that has
go back to the restricted area and find her never been taken lightly in a free society. While
still standing there. She stayed there because it may be true that the security profession does
she thought she had been arrested. Her back- not have the same restrictions placed on it as
ground and experiences in life have taught her our counterparts on the police department, the
to respect authority figures and do what they standards are still the same.
told her to do. The determining factor here is When we take an action that limits the free-
that she reasonably believed that she was not free dom of another person, we have to make sure
to leave. She submitted to your authority. You that we are acting in a manner that would seem
may not have intended to give the impression logical and obvious to a reasonable and cau-
that she couldn’t leave, but it was reasonable tious person.

XI. OFFICER SAFETY AND USE OF FORCE


500 40. APPREHENSION AND DETENTION PROCEDURES

WHAT GETS SECURITY be reasonable for them to think that you were
OFFICERS IN TROUBLE? going to do what you said. You have the means
and the proximity. If you do not have cause to
When a security officer is placed in the posi- take them into custody, you could be looking at
tion of having to take control of another per- an assault charge.
son, a world of opportunity for trouble begins
to open up. It has to be stressed that the secu- Battery
rity officer who acts in a reckless or indefensible
Battery is the actual physical touching of
way will be in for a rough ride. This fact stresses
a person that is either hurtful or insulting in
the importance of documentation. Whenever
nature. A reasonable person would think that
physical contact is made with a citizen, for
being taken into custody, which involves being
any reason, the security officer should sit
stopped, searched, secured in some way, and
down as soon as possible after the event and
not permitted to leave, would be a hurtful or
write a detailed report about what happened
insulting set of circumstances. Once again, this
and why they felt that they had to do what
stresses the importance of being right in your
they did. Basically, the laws that can cause the
assessment of the situation and reasonable in
problems come from two directions: criminal
taking the actions that you take.
and civil.

False Arrest
Criminal laws that can get a security This involves taking someone into custody
officer in trouble without the legal authority to detain. Most juris-
dictions, and it is your responsibility to find out
Assault the law in the one where you work, will allow
Contrary to popular belief, at least in most for a citizen to take another citizen into custody
jurisdictions, you do not have to touch someone for an offense, other than a misdemeanor or an
to be charged with criminal assault. You only ordinance violation, that is committed in the
have to place another person in a reasonable fear arresting person’s presence. In other words, the
of being battered. Attempting to lay hands on violation must be a serious one and the person
someone and failing to do so can still be classi- who makes the arrest must have direct knowl-
fied as an assault. In many cases, all you have to edge of the commission of the violations. You
do is have the means at your disposal to commit cannot rely on hearsay or rumors. You can only
a battery and communicate to the other person act on firsthand knowledge.
that you intend to do just that. For example, if
you yell across a football field that you are going
Civil law violations that can get a
to put someone on the ground and handcuff
them, the court would probably not consider
security officer in trouble
that an assault. You were too far away to actu- (Note: A civil violation, also known as a
ally take control of the person and it would not tort, does not carry with it the same burden or
be reasonable for them to think that you could amount of proof necessary to establish responsi-
reach all the way across the field and grab them. bility in court. In criminal court, the State must
However, if you were standing right in front of prove its case “beyond a reasonable doubt.”
the person, with the handcuffs in your hand, In civil court, the plaintiff must prove their case
and you made the same statement, it would by a “preponderance of the evidence.” Stated

XI. OFFICER SAFETY AND USE OF FORCE


DETENTION AND APPREHENSION METHODOLOGY 501
another way, guilt in criminal court requires you did what you had to do in a tactful and
99% proof. Guilt in civil court requires 50.1% professional manner.
proof. Torts are somewhat easier to prove than 3. Keep detailed notes and records about what
crimes.) happened. It is no secret that memories fade
over time. Complaints are seldom filed about
1. Assault. Once again, the act of placing an officer’s actions right after the incident
someone in reasonable fear of being battered. occurs. It is not unusual for a period of
The belief of the victim must be reasonable. several months to lapse between an incident
2. Battery. This is the intentional touching and a complaint. There is no such thing as
of someone in a non-consensual, non- too much information in a report describing
privileged manner. Consensual touching an apprehension or detention. Be specific
means that you have the other person’s and be thorough.
permission. Privileged touching would be 4. Keep your supervisor informed. Any contact
the act of giving someone first aid if they between you and a citizen or employee that
were unconscious. could be looked upon as confrontational or
3. False imprisonment. This is the unlawful potentially explosive needs to be reported
detention of someone else for no reason, to the people in your up line (the sooner,
within fixed boundaries. the better). Supervisors are not particularly
4. Malicious prosecution. This happens when fond of surprises in the first place and late
a security officer detains someone with information about what a security officer did
no intention of bringing criminal charges or said in a confrontation with someone else
against them, or filing criminal charges will not help your cause at all.
without probable cause.
5. Invasion of privacy. This is an unjustified
intrusion into the privacy or personal DETENTION AND APPREHENSION
business of another person. METHODOLOGY
What are the keys to avoiding criminal and
civil liability? Good human relations and com- What follows is a discussion that centers
munication skills are a crucial part of the pro- on tactics. As you know, there is no way that a
cess. But, basically, you can go a long way trainer or teacher can outline a set of tactics that
toward avoiding problems by following these will work in every situation you will encounter
simple guidelines: as a security officer. So, these are going to be
presented to you as tactical guidelines and are
1. Do your job in a reasonable manner. Know intended to get you to think about the situation
your responsibilities and know your before things get to the point of having to take
limitations. Get familiar with the laws and physical control of another person. A good team
regulations in your area and stick to the rules. never goes to the competition without a game
2. Conduct yourself in a reasonable manner. plan. A good security officer never goes to a sit-
You are doing a job in an arena full of uation without a tactical response in hand.
spectators. It is your responsibility to behave Let’s assume that the situation you are deal-
as if someone is watching every move that ing with has developed, or degenerated, to the
you make. If the time ever comes that you do point that you have made the determination,
have to take control of a person, it would be based on the totality of the circumstances, that
a great benefit to have the witness testify that you have to take physical control of another

XI. OFFICER SAFETY AND USE OF FORCE


502 40. APPREHENSION AND DETENTION PROCEDURES

person. As with most things on the job, the first verse. Just be clear about what you saw them
rule of security work comes into play: Go home do and your intention to hold them there
healthy at the end of your shift! until the arrival of the police or a supervisor.
4. Give the person simple, direct commands.
1. Get some backup headed your way. The Do not yell or threaten. Use a calm and
Latin term non solis (never alone) should clear tone of voice and tell the person what
be the first thing that comes to your mind. you expect them to do. If you want them in
Often the presence of another security officer a chair, ask them to “Sit down, please.” If
will deter someone from resisting or causing you want them to move to another spot in
further problems. Some departments like to the room, point to the location and simply
use what is called a “swarming technique” say, “Over here, please.” If they start to
that involves getting as many officers there shout or become loud say, “Lower your
as they can to aid in the situation. At the very voice, please.” You have to maintain a cool
least you should be communicating with your and professional demeanor throughout
department and should also contact the local the entire process. The people who are
police as soon as possible. Remember, non solis. watching should be able to testify that you
2. Maintain a safe distance and good were not the problem, the other person was.
positioning. You should know what your In the interest of your safety, you should
reactionary gap is. That is the minimum not hesitate to say, “Keep your hands
amount of distance that you need to respond where I can see them, please.” if they start
to a threatening move made by someone to reach inside a coat or a pocket. There
else. Blade your body so that you are is not a requirement that I have ever seen
balanced and ready and hold your hands up that stipulates or even encourages you to
in front of you with your palms facing the do anything that would compromise your
person you are dealing with, about shoulder safety. So don’t.
high. This will allow you to protect yourself 5. Move in with extreme caution. If you
and deflect an object or a blow if you need make the determination that the person
to. Leave yourself a way out of the area if needs to be placed in handcuffs, you must
you can and try to avoid cornering the other proceed with a great deal of caution. The
person. You could be injured if they feel that closer you get to them, the more vulnerable
the only way out is through you. you are. Handcuffs should only be used
3. Communicate your intentions. Tell the when you are convinced that not using
person that they are under arrest or them poses a greater threat to your safety
apprehension, whichever is appropriate or someone else’s than letting them stand
for your jurisdiction. In many states, the there until the police arrive. In any event,
intention to arrest or detain someone must you must remember that handcuffs are
be communicated clearly to the person being temporary restraining devices. They in no
detained. It is also possible that they could way guarantee your safety once they are put
be held responsible for resisting the arrest on another person. Caution is still the rule.
if it is made clear to them exactly what the Have the person turn around and face away
situation is. If the person demands to know from you. Tell them to place their hands
why you are detaining them, tell them in behind their back with the backs of their
as few words as possible. It is not generally hands touching. Grasp their right hand with
necessary for you to be able to quote the your right hand and place the handcuff on
law they have violated to them chapter and their right wrist with your left hand. Then

XI. OFFICER SAFETY AND USE OF FORCE


DEALING WITH THE AFTERMATH 503
grasp the loose cuff in your right hand and In other words, you have to ask yourself some
grab their left hand with your left hand. questions:
Using your right hand, place the remaining
1. Was I in imminent (immediate) jeopardy?
cuff on their left wrist. DO NOT strike their
This has to be clearly established by the
wrist with the handcuff. It looks cool in the
circumstances known to you at that point in
movies but it really seldom works without
time.
causing harm to the subject you are cuffing.
2. Was someone whom I have a duty to protect
Tighten the cuffs until they are snug, but not
in imminent physical jeopardy? What,
so tight as to reduce the person’s circulation.
exactly, is your duty under your orders and
ALWAYS lock the cuffs in place! Always!
rules and regulations?
Handcuffing techniques should be practiced 3. Was my mission as a security officer in
under the watchful eye of a trained instructor. imminent jeopardy? Was the action taken to
Your goal is to restrain the person as quickly protect property in proportion to the value
as possible. This is one of those situations or criticality of the property itself? In other
where you will most definitely play the way words, did you behave in a reasonable way
you practice. given what you were protecting?
4. Did I have any alternatives to using the force
that I did? Force can only be used if there is no
other way to respond and solving the problem
THE USE OF FORCE is something that must be done immediately.
5. Is the harm I am trying to prevent greater
The most critical time of your professional
than the harm I might cause? Property is
life will come when you or someone you are
replaceable, people are not. Deadly force is
protecting is in imminent danger from the
NEVER permitted to protect property.
actions of another and you have to use force
6. How will the actions that I took be viewed
of some kind to protect yourself or them. It is
by others? Was I reasonable? Did I do what
never an easy situation to be in or an easy deci-
needed to be done and nothing more?
sion to make. Common sense tells you that the
only time you can use force against another per- These are hard questions. That is why they
son is when there is absolutely no other choice. need to be thought about and mulled over
Security professionals are trained to use the before you find yourself in a situation where
escalating scale, starting with voice commands force may be required. Your head will need to be
and moving upward in the scale to physical clear if the situations call for you to go tactical.
force if nothing else will work, or clearly would
not have worked under the circumstances.
Remember, too, that security officers are not DEALING WITH THE AFTERMATH
authorized to use overpowering force like
police officers are. We can use the same kind of If you are careful and reasonable in your
force that a citizen can—neutralizing force, and apprehension and detention procedures, you
nothing more. When the person we are deal- are going to be able to justify what you do. But
ing with stops using force, we have to stop, too. if a complaint is made or a lawsuit is filed, you
Neutralize; don’t overpower. need to know that you are not going to go into
Prior to the development of that kind of a cir- litigation defenseless. The law does provide
cumstance, you need to be comfortable with the some rationale for you in building your case.
decision-making process that you have used. This is called “affirmative defense.”

XI. OFFICER SAFETY AND USE OF FORCE


504 40. APPREHENSION AND DETENTION PROCEDURES

1. Self-defense. There is no requirement under all right. Murphy’s Law has been around since
law that you have to allow yourself to be before laws were written. Be ready.
attacked. Under law everyone has the right
to defend themselves. Just be sure that when
you defend yourself, you don’t go too far
and become the aggressor.
2. Necessity. If you shove someone out of the S E CURI TY QU I Z
path of a speeding car you have committed 1. Black’s Law Dictionary defines an arrest as:
a battery. You had to in order to protect them “To deprive a person of his liberty by legal
from great harm or death. No court in the authority.”
world would hear a charge against you for a. True
that. b. False
3. Mistake of fact. If you are acting in good 2. In order for an arrest to be legal and binding,
faith and believe that you are doing the person making the arrest and the person
something legal and aboveboard, and it being arrested have to know:
turns out that you were misinformed, you a. The authority to arrest is real
have made a mistake of fact. Ignorance of the b. Specifically why the person is being arrested
law has never been an excuse for violating c. The person being arrested is not allowed
the law, but a good faith mistake defense to leave
can still protect you if the circumstances are d. All of the above
believable. 3. Security officers do not have the same
The defenses listed above have the effect of authority to make an arrest as a citizen unless
taking “intent” out of the equation. If you did not some special circumstances exist.
do something in a criminal state of mind you can a. True
defend yourself from a claim that you violated a b. False
law or committed a tort. The concept of reason- 4. Based on the circumstances a private
ableness still applies. person may make an arrest for which of the
following offenses:
a. Felonies
b. Misdemeanors
CONCLUSION c. Breech of the peace
d. All the above
No one really likes the thought of having to 5. Authorization to make an arrest will come
take someone else into custody. Hopefully, we from all the following places except:
can be proactive enough in the way that we a. Statutory authority
do our jobs and we will avoid having to deal b. The local Police Department
with this kind of situation. However, it is your c. The contract between the client and the
job to be prepared. Keep up with the changes guard company
in the law and be very conversant in the rules, d. The security officer’s job description
regulations, guidelines, and policies of your 6. Contrary to popular belief, at least in most
department when it comes to this subject. You jurisdictions, you do not have to touch
cannot go into one of these situations half pre- someone to be looking at a criminal assault
pared and expect that everything is going to be

XI. OFFICER SAFETY AND USE OF FORCE


SECURITY QUIZ 505

charge. You only have to place another 9. Malicious prosecution happens when a
person in a reasonable fear of being battered. security officer detains someone with the
a. True full intention of bringing criminal charges
b. False against them, or filing criminal charges
7. Assault is the intentional touching of without probable cause.
someone in a non-consensual, non-privileged a. True
manner. b. False
a. True 10. Under law everyone has the right to defend
b. False themselves.
8. Guilt in civil court requires what percentage a. True
of proof? b. False
a. 99%
b. 75%
c. More than 51%
d. 100%

XI. OFFICER SAFETY AND USE OF FORCE


This page intentionally left blank
U N I T XII

RELATIONS WITH OTHERS

41 Human Relations in a Global Environment


42 Public Relations
43 Community Relations: Making the Strategy Come Alive
44 Networking and the Liaison Function
45 Ethics and Professionalism
This page intentionally left blank
C H A P T E R

41
Human Relations in a Global
Environment
Christopher A. Hertig and
Darrien Davenport

we can always grow from human relations, as


CHAPTER OBJECTIVES long as the participants can be open about the
● Define human relations as it relates to the experience.
security industry In a practical sense, human relations is the
● Provide relevant advice from Dale application of knowledge about human behav-
Carnegie ior to enhance one’s job performance. Human
relations also aids in one’s personal relation-
● Explain the importance of understanding ships. Within the broad spectrum of human
and respecting diversity service (teaching, social work, corrections, law
● Outline important practices regarding enforcement, and security) human relations is a
women in protection and sexual core competency. Protection officers who mas-
harassment ter it are more effective on the job, as they have
● Provide tips for effective communication an easier time dealing with people.
and ethical behavior To be effective investigators, to fulfill the
intelligence agent role, protection officers must
have excellent human relations skills. They
must be approachable. People must feel com-
HUMAN RELATIONS fortable talking with them. Maintaining hon-
est and open relations with others is one key
Human relations is the study of how humans to this. There must be trust in the relationships
interact with one another and the residual effect officers have with others. Trust is the glue that
of those interactions. It is based on the contin- holds civilization together.
ual evolution of human relationships and the Being optimistic and positive is very impor-
ability to extract value from those relationships, tant. The old saying “no one buys anything that
whether good or bad. We must understand that is negative” is very true. In a crisis, protection

509
510 41. HUMAN RELATIONS IN A GLOBAL ENVIRONMENT

officers must be the ones inspiring others. Principle 6. Make the other person feel
Overall, having a positive attitude and making important—and do it sincerely.
positive remarks will aid an officer.
Carnegie’s principles may be applied to
Greeting employees and others in the work-
virtually any human interaction. Certainly
place is generally a good policy. The slight-
interviewers will want to employ them to
est acknowledgment of others helps to form a
develop rapport with the interviewee.
bond with them and these are the people that
Additionally, developing a relationship with
officers must convince to follow the rules, obey
people in one’s work environment, where the
commands in emergencies, and provide infor-
people will feel comfortable talking to the offi-
mation when something is amiss.
cer, is very important. Such a relationship facili-
Part of good human relations involves think-
tates the employee, student, or guest informing
ing before speaking. Know what to say before
the officer about unusual conditions or situa-
saying anything. This is especially important
tions. Protection officers may find that when
when dealing with others who are in crisis,
employees talk about their job functions, they
when addressing a group of people (a crowd
provide valuable information. Principles 4, 5,
of some sort), or when enforcing rules. Also,
and 6 may all relate to discussion about job
avoid flaunting your background. Some people
functions. By understanding what occurs on
in the protection business have a tendency to
the job for employees, the officer is better able
boast or brag about their job qualifications. It
to see if something is out of the ordinary.
is not uncommon to hear people mentioning
their prior job experience in the military or law
enforcement while they are employed within
the security industry. DIVERSITY

The concept of diversity refers to recognizing


differences in others and embracing the ways
ADVICE FROM THE MASTER these differences can enrich us as individuals.
People who experience other cultures gain a
Dale Carnegie could easily be called the
tremendous amount of understanding. They
“Master of Human Relations.” His time-tested
see “the other side” of things. They can begin to
principles have been taught to untold numbers
appreciate the different perspectives that other
of people. Salesmen, managers, coaches, and
cultures bring.
many others who must work with people have
Too often, society focuses on the negative
taken his advice and benefited from it. His prin-
aspect of diversity and the differences that
ciples are as follows:
drive us apart, instead of focusing on those dif-
Principle 1. Become genuinely interested in ferences which complement us and bring value
other people. to the overall community. Diverse experiences
Principle 2. Smile. aid in seeing situations from various perspec-
Principle 3. Remember that a person’s name tives. A fuller, more complete view of things is
is to that person the sweetest and most achieved. Diverse perspectives aid in creative
important sound in any language. problem solving.
Principle 4. Be a good listener. Encourage Successful leaders value diversity. They use
others to talk about themselves. it to their advantage, channeling the creativity
Principle 5. Talk in terms of the other that comes with it to aid in planning and prob-
person’s interests. lem solving. Strong, successful leaders thrive

XII. RELATIONS WITH OTHERS


DIVERSITY 511
on diverse input from subordinates. They real- woolen pakol hat was not allowed in the class-
ize the value it holds and are not intimidated room. He saw his roommates, naked bodies in
or alienated by it. One example of a leader who the shower, something that would not occur in
valued diverse opinion was the American World Afghanistan.
War II General George Patton, Jr. General Patton Farivar’s experience illustrates the adjust-
sought diverse perspectives from among his ments necessary in dealing with two very differ-
staff. A quote that has been attributed to him is: ent cultures. He learned from the experience of
“If everyone is thinking alike, someone isn’t studying and working in the United States. From
thinking.” this experience, he was able to launch a career
As good leaders value diversity, so, too, do as a successful journalist, weaving together his
many employers. Organizations in the public, Afghan and American experiences.
private, and nonprofit sectors are attempting to Name-calling is significantly negative and
hire a diverse segment of people. Many orga- represents a substantial step toward the develop-
nizations now have a Director of Diversity or ment of extensive prejudice. Derogatory names
Multiculturalism who develops diversity within represent the prejudice that is behind their use.
the workplace. Using them also tends to shape our views of the
Unfortunately, we all inherently have preju- people we use them about. Obviously, there is no
dices. We tend to feel most comfortable with place in a professional setting for name-calling.
people who are most like us. We usually associ- Doing so can set the stage for further negative
ate with those who look, talk, and dress like we behavior.
do. Those who share our physical and cultural Be careful to avoid the “us versus them”
characteristics are those we understand. Those syndrome. This can develop when dealing with
who are different from us are those we do not distinctly different cultures, as well as the cul-
understand. Those things that we have not seen tural differences between various groups in the
before, or which we do not understand, can work environment. It can also develop when
frighten us. The more unfamiliar the culture is to enforcing rules upon a specific cultural group.
us, the more we are likely to misunderstand it. Members of the group might not obey the
Farivar (2009) discusses his exposure to rules, or may give the protection officer a hard
American society, a culture that was in stark time, leading to conflict that can be deemed
contrast to his native Afghanistan. He grew up cultural conflict. If there is the slightest incli-
in a tribal society where there were close family nation of prejudice present, it gets magnified
relationships. His cousins were his best friends. through daily interactions. Continuously expe-
Outsiders were viewed with suspicion. Religion riencing problems, such as noncompliance from
was a very large part of life, with prayers a particular group, builds upon the existing
said several times per day. Men wore beards. prejudice.
Women’s arms and legs were covered; there Protection personnel in a shopping cen-
was no exposed skin. ter may encounter elderly persons on a regu-
Once he became a college student in lar basis. Conflict may result when the elderly
America, the culture clash was quite extensive. persons have different expectations than the
In Afghanistan, men would hold each other’s younger security personnel. Security person-
hand. In America, this was not done, and such nel at that same shopping center may also deal
behavior was considered a sign of homosexual- with youths who are members of particular
ity. People wore shorts in warm weather with ethnic groups. When the youths are of another
their arms and legs exposed. Few men had ethnicity, it is quite easy to attribute any ado-
beards, and at his college, the wearing of his flat lescent misbehavior as a product of that ethnic

XII. RELATIONS WITH OTHERS


512 41. HUMAN RELATIONS IN A GLOBAL ENVIRONMENT

background, rather than a general conflict due supervisors can play a role. So, too, can work-
to age and immaturity. ing long hours where one becomes tired and
Other groups within the work environ- irritable. Intense exposure to uncooperative
ment may be those established not due to race, persons is another. An obvious example of this
ethnicity, age, or gender, but, rather, their job would be a protection officer working at a dem-
status or function. Students, guests, contractor onstration or strike.
employees, visitors, and so on are all categories Another concern regarding the development
of facility/environment users that may be the of an “us versus them” workplace subculture is
subject of prejudice by security personnel. the abuse of force. When one does not under-
There are many negative behaviors that stand another and is frustrated, there may be a
may occur due to discrimination. A concern for temptation to use more force than is necessary.
American police and security forces is racial When one dislikes someone due to their mem-
profiling. This is the targeting of an individual bership in a particular group, there is a tendency
because of their race, skin color, religion, or to use force. And when one is afraid of someone
appearance. Police officers have been accused of because of what they do not understand, applied
stopping a disproportionate number of African force may be driven by fear of the unknown—not
American men for traffic violations, which has for any legitimate reason.
come to be known as the offense of “driving while All of these factors may magnify prejudice
Black.” Retail loss prevention agents have also the officer has. Without the presence of preju-
been known to focus on African American shop- dice in the first place, the factors may not be as
lifters. An old scheme used by some professional significant. Quite simply, the presence of preju-
shoplifters was the “salt and pepper” team. This dice is where the problem begins.
consisted of a white and a black shoplifter. The An individual must recognize that they have
African American shoplifter was watched by the prejudice concerning different groups of peo-
retail security personnel. This served as a diver- ple. Once they recognize their preconceived
sion and allowed the white team member to steal. notions, they can take the time to educate them-
Magill (2003) found that racial profiling by selves to break that mental barrier. We live in an
retail loss prevention staff was counterproductive age where knowledge and education are readily
for several reasons. One was that, if customers available to us, and for free! There is no excuse
from a certain demographic group felt as though for not knowing or understanding those who
they were discriminated against, they would may be different than we are, be they of differ-
avoid shopping in that store. Many good cus- ent races, religions, ages, or cultures.
tomers would be lost. Additionally, there is the An individual can prepare for encounter-
threat of a civil suit due to discrimination claims. ing another culture by doing homework on that
This can be a substantial loss, as the attendant culture. This will help the individual to become
legal costs and negative publicity may be quite comfortable with it and know what is or is not
extensive. Perhaps more importantly, focusing offensive. Cultural awareness is the key to good
on a particular ethnic group deprives the inves- human relations. Studying the history of other
tigator of professional objectivity. The reality is cultures is a good start. History helps to explain
that people from all cultures steal. Focusing on why a group of people think as they do, and
only one group takes the agent’s attention away why they have the customs they do. Holidays
from those who are actually stealing. and celebrations generally mark an event of his-
Obviously, prejudice against one group of torical significance. Knowing about the holidays
people is due to the convergence of many factors. and what they represent offers a clue to under-
Reinforcement of prejudice by coworkers and standing a culture.

XII. RELATIONS WITH OTHERS


GLOBALIZATION 513
GLOBALIZATION places around the globe. Raw materials may
come from one country. They are then shipped to
Globalization is the inevitable intertwining of another, where they are processed or refined and
cultural expansion and economic development. even assembled. They may then go to a third
It is also the generational relative of industrialism country, where the distribution chain begins.
and colonialism, which preceded it and had a Obviously, there are innumerable opportuni-
similar impact on the world. Globalization, then, ties for interruptions in the global supply chain.
is not entirely new, but it is taking a new form. Cargo theft, hijacking, piracy, major storms, civil
The search for global markets has meant that unrest, labor disputes, and so on are all con-
business has moved into different countries. cerns. They move the focus of business—and
This was initiated to a large degree by the devel- security—to an international level.
opment of standard-size shipping containers. Corporations have sought out partnerships
These containers became increasingly common with foreign entities. There are varied reasons
in the decades after the 1950s. Their use revolu- for doing this besides reduced shipping costs.
tionized commercial shipping. Before the advent Better service of a local market may be one factor.
of containers, shipping was expensive in terms Cheaper manufacturing costs may be another. The
of man-hours and time in rail terminals, truck- presence of large markets and economic growth
ing facilities, and ports. Once all of the cargo was also propels global trade. Economies in some
handled in a container, moving it from truck to countries are expanding quite rapidly. Some
rail car, or ship to truck, was much simpler. Note Asian countries offer a steadily increasing num-
that the use of the containers also reduced the ber of customers for various goods and services.
incidence of pilferage. Loss due to both waste Businesses see the future customers and reach out
(time) and crime (theft) was reduced. to them. Partnerships, contracts, and the opening
Once the use of standard-size containers of overseas facilities are the natural consequence.
became a universal practice, the cost of ship- Globalization is not limited to the commercial
ping dropped dramatically (Krepinevich, 2009). arena. Politically and militarily, there is a global-
Just-in-time manufacturing also took hold. This ization trend taking place. The need for energy
method works by only manufacturing items sources, such as oil and natural gas, fuels an
when they are needed. Waste in warehousing international interest by foreign countries that
costs was reduced. Combined with the just-in- depend on those commodities. Precious miner-
time manufacturing, reduced shipping costs also als also create a need for stable relations between
increased the efficiency of supply and manufac- the countries that have the minerals and those
ture. Inventory levels and costs were reduced. who use them in manufacturing. As one coun-
Manufacturers began to shop around to see try develops an interest in what is occurring
where they could obtain parts more cheaply. in another country, it may station troops there,
As a result, global supply chains developed. train the host country’s armed forces, and so on.
This pushed the world toward a global econ- The fight against terrorism requires some degree
omy. The Internet pushed it even further, with of military presence in other countries so that
electronic commerce occurring almost instanta- the local situation can at least be monitored.
neously throughout the world at a very low cost. Failed states that are rife with poverty, large
A global economy creates a series of interde- numbers of unemployed young men, and the
pendencies. One aspect of asset protection is a right motivation (religious, political, charismatic
focus on supply chains. Supply chains are increas- leadership, etc.) may become breeding grounds
ingly complex. The finished product consumed for terrorism. The upsurge in piracy on the seas is
by an end user is manufactured in different also caused, in large part, by high unemployment;

XII. RELATIONS WITH OTHERS


514 41. HUMAN RELATIONS IN A GLOBAL ENVIRONMENT

indeed, pirates have historically been out-of-work detail. Females can also assume planning roles
mariners. With globalization, there will be eco- in executive/VIP protection. They can coordi-
nomic growing pains underwritten by cultural nate trips, do advance work, and so on.
differences. There are also the wounds inflicted Women have faced discrimination, but are
by industrialism and colonialism. Some devel- increasingly taking on leadership positions
oping countries have a bad taste in their mouths in protective service. There have been recent
from the days when they were exploited by movements to utilize women in protective
another power. We must study their history and roles. One of these is as door supervisors in
appreciate their perspective. nightclubs. While the traditional brawny male
is what most people expect, a woman can easily
check identification, greet customers, and con-
WOMEN IN PROTECTION trol access. In a similar vein, women can relate
to females better than men. The U.S. Army has
Women have played some significant roles in
developed a female unit in Afghanistan for this
policing and security over the years. They have
very purpose. The female unit can obtain bet-
also, however, faced a tremendous amount of
ter intelligence than a male unit would if they
prejudice. In policing, women were often given
attempted to converse with women. In 2009, the
jobs dealing with female prisoners or juveniles.
International Foundation for Protection Officers
In some security applications, they were used
trained the first female security officers in the
as receptionists. They have experienced “the
Kingdom of Saudi Arabia.
glass ceiling” in terms of promotion: failing to
rise in the ranks due to discrimination and lack
of access to male colleagues in personal social SEXUAL HARASSMENT
settings (the men’s room, the locker room, etc.).
Child care responsibilities have also impeded One type of discrimination that females face is
their progress, in some instances. sexual harassment. Sexual harassment in the
Fortunately, women have made tremen- workplace is nothing new. In years past, the
dous strides within society as a whole, assum- classic type of harassment, known as quid pro
ing leadership positions in both government quo, occurred quite often. It was where sexual
and corporate organizations. Nonprofit orga- favors were requested in exchange for a pro-
nizations often have women at the helm. The motion, pay raise, better assignment, improved
International Association of Chiefs of Police work resources, and so on.
has had a female president. Over the years, Obviously, this was and is wrong. What has
ASIS International has had several female transpired is that another, more common type of
presidents. sexual harassment, known as “hostile environ-
Allan Pinkerton, founder of the Pinkerton ment” has emerged. This occurs when someone
National Detective Agency, employed the first is subjected to offensive language, drawings,
female investigator in the Western world. Kate and so on. They may get offensive e-mails or see
Warne worked for the agency beginning in the pornographic Web sites being viewed by others
late 1850s. She was instrumental in solving in the workplace. Sometimes, a hostile environ-
many cases and was Pinkerton’s “right-hand ment takes the form of jokes and banter around
man,” so to speak. Pinkerton saw that women the workplace. In traditionally male-dominated
could play roles that men could not. He used workplaces, this is a common problem. People
women in surveillance and undercover opera- say things that are offensive, sometimes with the
tions. A woman can pose as a secretary or knowledge that they are doing so, and some-
administrative assistant in a protective service times unintentionally. In some cases, the creation

XII. RELATIONS WITH OTHERS


ETHICAL BEHAVIOR 515
of a hostile environment is unintentional, and in EFFECTIVE COMMUNICATION
other cases, it is deliberate.
A simple test of whether or not behavior Effective communication is a useful tool
or language is offensive is to ask these four for any protection officer who wants to fur-
questions: ther their professional development. Effective
communication can serve to resolve a conflict,
1. Would I feel comfortable if my behavior was provide personal direction, or educate others.
on the six o’clock news? Educating personnel in the work environment
2. Would I want my wife, sister, or mother to becomes increasingly important as new con-
hear what I am about to say? cerns and threats emerge. Security and safety
3. Would I want the joke or remark I am about awareness is a dynamic, ongoing process that
to say to be written down or videotaped? calls on officers to send the right messages.
4. Would I be embarrassed to discuss my When communication is used correctly, an
language or behavior with my supervisor or officer can gain the trust and respect of their
someone else in management? audience, while delivering a message that may
It is sound practice to become familiar with be detrimental to the receiver. This is what
your organization’s sexual harassment policy makes the communication “effective.” Officers
and complaint procedure. This helps to prevent do not have to be the most articulate, charis-
violating the policy, as well as being able to matic individuals in order to communicate
play the proper role with the policy. Someone effectively, but must exhibit confidence while
may tell a security officer about an incident of communicating their message. In a multicul-
sexual harassment. It may also occur that some- tural environment, it is important that the offi-
one will mention a suspected sexual harass- cer also use inclusive language, which means
ment that they think has happened to someone using language or speech that is comprehen-
else. Knowing the policy is essential. Following sive and makes the audience feel comfortable
proper procedure is the next step. with the communicator. This will build a level
Sexual harassment is a civil wrong under fed- of comfort with the audience. The officer also
eral and state laws. It is a form of discrimination, must use a filter when communicating with one
but may also be pursued as a tort action (assault or multiple individuals. In other words, com-
and/or battery) in some extreme cases. While, in municate with a sense of impartiality and use
general, the liability attaches to the employer as terminology that is not offensive or discrimi-
a form of discrimination, in some instances, the natory. The protection officer’s ability to effec-
person doing the harassing can also be charged tively communicate will also be enhanced by
with one of the above-named tort actions. active listening. It is imperative that an officer
Note that in cases in which the harassment is able to listen to their audience attentively in
has been ongoing and the employer did not take order to communicate properly. If not, either
adequate steps to resolve it, the amount of mon- the officer or the audience might misunder-
etary damages can be quite extensive. Judgments stand what is being communicated, which can
in the millions of dollars have been awarded in lead to distrust of parties on either side.
cases in which there has been a long-standing
or widespread pattern of harassment going on. ETHICAL BEHAVIOR
The negative publicity surrounding such large
awards drives employee recruitment costs The concept of ethics is valuable in the security
higher. It also negatively impacts attracting new industry, and displaying ethical behavior in the
customers to the organization. workplace will provide a protection officer with

XII. RELATIONS WITH OTHERS


516 41. HUMAN RELATIONS IN A GLOBAL ENVIRONMENT

a reputation of being respected, both internally The customer does not always have to be right,
and externally. This does not mean that any given but the customer must always be protected.
outcome will always be positive in nature, but it There is a vast difference between an officer
does imply that the officer will take the appropri- who manages situations and an officer who leads
ate ethical steps to determine the outcome. through situations. Often, an officer who man-
Ethical behavior is also important to be suc- ages attempts to apply the same systematic
cessful in a multicultural workforce. A protection approach to each customer’s issue; an officer
officer will benefit by following the ethical code of who leads is able to assess a situation, explore
their organization, or cultivating their own beliefs, various options, and then come to a solution to
so long as they are in line with the value system of fit that particular issue.
their employer or client. They should be discour- The officer must listen well, assess the
aged from using a personal ethical code if those issue, and then find a path toward resolving it.
“ethics” will result in discrimination against a class They must lead the customer to a solution.
of people. Ethical behavior takes professional cour- Leadership, particularly when applied to cus-
age, self-accountability, and the ability to manage tomer service, is partnership. True leadership is
relationships on all levels. Ethical behavior does for the benefit of the followers, not that of the
not only mean self-governance; a protection officer leaders (Ortmeier, 1999).
may find him or herself in a situation where he or Solving a problem for some protection offi-
she has to account for a colleague’s ethical (or cers can be an issue in itself. If you find your-
unethical) actions. The ability to provide ethical self in a situation where your experience and/
sustenance to coworkers may also be a measure- or training still do not provide you with the
ment of an officer’s own ethical behavior. solution to an issue, find someone who can
One particular aspect of ethics and diversity help lead you to the solution. Part of being a
revolves around the “war on terror.” Persons leader means locating resources to make up for
suspected of terrorist activity, or of simply sym- one’s own deficiencies. By no means does this
pathizing with terrorists, may be mistreated. negate who the officer is, as a leader or protec-
Police and security personnel believe that they tion officer, but it demonstrates that they have
are involved in helping society at large, and gen- the wherewithal to provide their customer with
erally, they are. Unfortunately, they may use this the service that they committed to.
concept of the greater good to justify discrimi- Another key to customer service leadership is
natory, unethical, or illegal actions. At times, a availability. Due to silos, it can be difficult for a
dose of empathy can be applied to gain perspec- protection officer to meet the needs of his or her
tive. Putting oneself in the other person’s shoes customer. A silo is an intangible barrier created
may help provide some perspective of fairness. by an individual that prohibits them from being
exposed to new ideas or experiences. Silos can
create barriers in communication between indi-
CUSTOMER SERVICE LEADERSHIP viduals or departments, which can lead to impo-
tent and ineffective relationships. Often, silos
Countless individuals will rely on a protec- are created to protect traditional processes, pro-
tion officer to provide them with some form of cedures, or beliefs, but unbeknownst to the silo
protection. The greatest asset is the customer, as builder(s), they are stymieing their own develop-
they are the sole reason for an officer’s profes- ment. It is important to remember that silos can
sional existence. In a multicultural world, lead- lead to individuals or departments becoming
ership ability can determine if the officer has obsolete as they willingly reject what is necessary
the aptitude and capacity to protect that asset. for personal or professional preservation.

XII. RELATIONS WITH OTHERS


SUMMARY 517
Security is the “grease in the machine”—it cannot prejudge people or discriminate against
touches all parts of the organization and helps them. A customer is a customer, an employee is
it to run more smoothly. When assets are pro- an employee, and a victim is a victim. A person
tected, investigations are initiated, or emergen- needing assistance is just that; they need help.
cies are responded to, security personnel work It must be given promptly and professionally.
across department lines. Obviously, there is no That is what professional protection officers do:
room for a silo. they help.
Discriminatory behavior toward others is
SUMMARY unprofessional and unproductive. It is therefore
unacceptable. The bottom line of human rela-
Security personnel are obligated to help and tions is: Treat people the way that you would want
protect all persons in their work setting. They to be treated.

EMERGING TRENDS
More employers want a diverse workforce. one example of expanded legal consequences
This is evidenced by recruitment efforts, the for discriminatory behavior. After the assassina-
establishment of positions such as Diversity tion of Martin Luther King Jr. in 1968, laws were
Director, and so on. At the end of the day, most enacted in almost all states that increased penal-
of us will work in or with organizations that are ties for crimes committed as a result of hatred
more diverse than at present. against people based on ethnicity or religion.
Protection officers, particularly those employed U.S. President Barack Obama signed hate
by security service firms, are expected to be bet- crime legislation that extended coverage to peo-
ter at customer service. There is a greater appre- ple based on sexual orientation in October 2009.
ciation of the role that protection officers play This legislation expands federal hate crimes to
in dealing with the public, specifically diverse include those committed against people due to
groups of people. Immigration trends demand their gender, sexual orientation, gender identity,
that officers be able to work with groups from or disability.
other countries. Demographic trends mandate With the increasing demand for professional
that protection officers be able to relate to the officers in metropolitan settings, it is necessary
elderly and the disabled. for today’s protection officer to be well educated
Legal protection for members of certain and astute to the issues surrounding the audience
groups is expanding, and will likely continue to that they protect. To maximize their skills, officers
do so. This protection may take various forms, will have to acknowledge that “future policing in
such as recognizing a new minority as a pro- large part will depend on the type of society being
tected group. It may occur at the municipal policed—the social, economic, and political reali-
or state level, as well as the national or federal ties and, in more-developed countries, the techno-
level. A city may add gay persons as a protected logical sophistication of the populace” (Stephens,
group. A state human relations commission may 2005, p. 51). Awareness of this will help profes-
begin to recognize discrimination against those sional officers to better oversee populations that
with disabilities. Hate crime legislation is but they protect, especially those that are culturally

XII. RELATIONS WITH OTHERS


518 41. HUMAN RELATIONS IN A GLOBAL ENVIRONMENT

diverse. Education is the key and is an emerging have to envision, create, incorporate, and learn”
trend in today’s security society. The educational (Stephens, 2005, p. 51). This will be of importance
standard for professional officers is increasing, as protection officers identify trends and cultural
and more training is being provided to profes- similarities in order to protect the innocent. This
sional officers to prepare them for their roles in should, by no means, provide a protection officer
the community. This includes diversity training. with a “license” to culturally profile individu-
When it comes to emerging trends, some als; technology should be used as a tool to secure
experts focus specifically on growing technolo- those investing in the services of professional offi-
gies. The use of technology in a multicultural cers. The new tools must be used ethically.
world will impact many areas, whether used for Supply chain security is a rapidly growing
protecting the public, educating officers, or pre- area for both corporations and governments.
venting crime. According to law enforcement In a global economy, supply chains become lon-
professional Tom Cowper, “Technology will cre- ger and more complex. Security personnel work-
ate a rapidly changing social environment to ing in some aspect of supply chain protection are
which police will have to adapt. At the same likely to increase in number due to the effects
time, technology will permit radical new policing of terrorism, organized crime, piracy, political
methods, systems, and processes that police will upheaval, and natural disasters.

References multicultural relations. The Society of Human Relations


Management (www.shrm.org) may also be able to assist
Carnegie, D. (1936). How to win friends and influence people. in the research effort.
New York, NY: Simon & Schuster. There are a number of books that may aid in studying
Farivar, M. (2009). Confessions of a mullah warrior. New York, diversity and multiculturalism. A few of them are:
NY: Atlantic Monthly Press. The World’s Religions (Huston Smith)
Feller, B. (2009, October 29). New law a victory for gay com- The Diversity Toolkit (William Sonneschein)
munity. York Daily Record 2A (October 29). Kiss, Bow, or Shake Hands (Terri Morrison and Wayne A.
Kaplan, R. D. (2005). Imperial grunts: The American military Conaway)
on the ground. New York, NY: Random House. Diversity Consciousness: Opening our Minds to People, Cultures
Krepinevich, A. F. (2009). 7 Deadly scenarios: A military futurist and Opportunities (Richard Bucher and Patricia Bucher)
explores war in the 21st century. New York, NY: Bantam Dell. Understanding and Managing Diversity (Carol Harvey and M.
Magill, M. (2003). Racial profiling in retail—Myth or reality. June Allard)
New Orleans, LA: ASIS International (September 15). The Web site (www.DiversityInc.com) has various resources
Ortmeier, P. J. (1999). Public safety and security administration. relating to diversity issues.
Woburn, MA: Butterworth-Heinemann. AST Corporation (www.hits@astcorp.com) has online
Purpura, P. P. (2002). Security and loss prevention: An intro- instructional programs for law enforcement and secu-
duction. Woburn, MA: Butterworth-Heinemann. rity personnel. Some of these programs discuss diversity
Stephens, G. (2005). Policing the future: Law enforcement’s and multicultural issues.
new challenges. The Futurist, 39(2), 51. 360 Training (www.360training.com) offers programs for
security personnel dealing with diversity and related
issues.
Resources The Professional Security Training network provides pro-
The Human Resources Department in most organiza- grams on sexual harassment, diversity, etc. Visit www.
tions will have information related to diversity and pstn.com.

XII. RELATIONS WITH OTHERS


SECURITY QUIZ 519

S EC U RI T Y QU IZ 5. Globalization has grown largely due to the


1. In a multicultural world, what type of lowering of shipping costs.
language must a protection officer use to gain a. True
the trust of their audience? b. False
a. Invasive 6. Sexual harassment has traditionally taken
b. Inclusive the form of a hostile environment.
c. Inquisitive a. True
d. Terse b. False
7. Women in protection are taking on more
2. The protection officer’s ability to effectively
leadership roles than ever before. There is,
communicate will also be enhanced by _____
however, a _____ ceiling that prevents them
listening.
from being promoted beyond a certain level.
a. Active
a. Raised
b. Effective
b. Glass
c. Selective
c. Plastic
d. All of the above
d. Acoustic
3. In a multicultural world, leadership ability 8. The first female investigator was Kate Warne.
can determine if a protection officer has a. True
the aptitude and capacity to protect their b. False
customer. 9. Racial profiling in retail is counterproductive
a. True as it:
b. False a. May alienate customers who belong to the
4. Future policing will depend in large part on group being watched
the type of society being policed—the ______, b. Take the loss prevention agent’s attention
________, _____________ realities and, in away from actual thieves
more developed countries, the technological c. May result in civil litigation
sophistication of the populace. d. All of the above
a. Situational, intellectual, and familial 10. Supply chain security is a rapidly growing area
b. Ethical, political, and multicultural for both corporations and government.
c. Legal, societal, and personal a. True
d. Social, economic, and political b. False

XII. RELATIONS WITH OTHERS


This page intentionally left blank
C H A P T E R

42
Public Relations
Charles T. Thibodeau, Christopher A. Hertig, and
George A. Barnett

of people sharing a common interest relative


CHAPTER OBJECTIVES to our work environment, plus the general
● Definition of public relations public. The actual people we come in contact
● Importance of projecting a positive image with changes from work site to work site, with
the exception of one constant—the general
● List ten qualities of public relations public.
officers If we are working in entertainment security,
● Promoting effective customer relations in where crowd management is the main responsi-
the department bility, we have a very broad and diverse constit-
● Being other-people-centered, not uency. If we are working in executive protection,
self-centered we deal with a much more restricted group of
● Having a “can-do” attitude people. However, no matter what the primary
responsibility is, and no matter who our pri-
● Positive media relations mary constituency is, the general public has an
● Risk analysis and public relations interest in how we perform our duties.
For the sake of example, assume we are
security at a factory. Our primary constituency
would be the employees who work for the com-
PUBLIC RELATIONS DEFINED pany, and any number of vendors, repair per-
sons, and other visitors. However, we cannot
Public relations consists of a mutual under- forget the general public. The factory is located
standing between an organization and its con- in a community, and is an integral part of that
stituent publics (Encyclopedia Americana, 1995). community. The community has a number of
The term “publics” is defined as the general interests, including health interests, financial
community, the people as a whole, or a group interests, image interests, and so on.
of people sharing a common interest (American Health interests can be in the form of work-
Heritage Dictionary, 1973). With respect to secu- ing conditions within the factory that may make
rity, we define the term “public” as a group employees from the community sick or injured.

521
522 42. PUBLIC RELATIONS

There may be toxic smoke belching from the with a pleasant and polite voice inflection, and
factory, reducing air quality in the community. show respect. The officer must make the person
Either of these conditions would be of great being served feel like his or her needs are very
concern to those affected by the factory, and important, and that they are about to receive
would result in very poor public relations. superior service. Most importantly, the officer
The financial interest might be in form of a must come to the job equipped with the skills to
paycheck for employees who live in the com- deliver what is promised. All of these things are
munity, resale of the products made in the fac- part of a well-planned public relations program.
tory to members of the community, or sales of Alone, the security department cannot carry
raw materials to the factory by other businesses out a successful public relations program. The
in the community. This would have a positive entire parent or client organization must be
impact on the community, and therefore, would involved. However, the security contingent has
result in very good public relations. no control over the entire company, and is not
As for image, if a factory is making bombs responsible for what other departments in the
for the military, it projects a different image in company do. Security officers can only be respon-
a community than a factory that is making baby sible for their own conduct. In the area of public
formula or toys for children. The community relations, the security contingent must conduct
may become quite disturbed having a bomb themselves in a planned and organized fashion,
factory in their backyard, and they may revolt. sometimes with blinders on. It would be most
Thus, the venture of the business will have unfortunate if the security contingent followed
either a positive or negative image in the com- bad examples set by those in other departments.
munity that reflects directly on public relations. To accomplish the goal of projecting a
No matter what the business is involved in, positive image, the security contingent must
the security officer is many times the “out front” first have a quality program in place. Image
person for that company, frequently the first is meaningless if it is a false veneer. Once this
contact that anyone will have with the company, is done, the Ten Rules of Public Relations in
and therefore must pay particular attention to Private Security can be applied.
the topic of public relations. Based on the wide
variety of responses the general public may 1. “The customer is not always right or
have to your company, first contact could be wrong.”
anything from very friendly to very unfriendly. While you may disagree with this from a
Therefore, a sincere “How can I help you?” security perspective, the most important thing
must be permanently at the ready when making to remember is to never tell the person with
first contact. Being a helper, a pleaser, and a whom you are dealing that they are wrong. It is
“can-do” problem solver are the traits of a to the benefit of all concerned that the security
successful public relations-minded security officer work toward a position of mutual coop-
professional. eration and prevent all situations from escalat-
ing into a win-lose proposition. The person you
are dealing with must be skillfully redirected
PUBLIC RELATIONS PLANNING into appropriate behavior, not bullied. This per-
son must, as often as possible, leave a situation
In maintaining a good public image, the secu- feeling that they were well served by the advice
rity officer must not only look professional and and assistance they received from the attending
perform in a reasonable and necessary manner, officer. This is not to say that self-defense and
but must also appear truly concerned, speak defense of others will never be the case for the

XII. RELATIONS WITH OTHERS


PUBLIC RELATIONS PLANNING 523
officer. We mean to say here that you will prob- 4. Use tact.
ably go in the “direction your nose is pointed,” 5. Be discreet.
so keep things upbeat and positive. The officer 6. Respect confidences.
must be a part of the solution, not a part of the 7. Be impartial.
problem! 8. Be calm.
9. Be patient.
2. Know your department’s capabilities, as
10. Be helpful.
well as other departments’ capabilities.
Successful salespeople always know their
5. Remember that the most powerful
product inside and out. They are then in the
advertising is negative customer
position to continuously fit the product and
service.
service to the needs of the purchaser. A good
People who are dissatisfied with an organiza-
security officer should be able to do the same.
However, it is not good enough for the security tion’s service tell their friends and associates—-
officer to only know his or her products and ser- lots of them! This interpersonal message send-
vices; the truly successful protection officer will ing is very powerful. You can achieve 10 great
know every other departments’ products and tasks of service in a day, but one cross word
services as well. This will be a valuable asset in or failure to satisfy someone will be the ser-
situations where a referral to another department vice task remembered far into the future. You
is required. Thus, the successful public relations- cannot afford to fail in the arena of public
minded security officer will spend many hours relations. You may not be successful in every
studying the inner workings of the organization attempt to help, but the person you were try-
he or she is assigned to protect. ing to serve must be convinced that you did
everything possible. If you can achieve this
3. Always accentuate the positive. level of success, you have not failed that
People do not want to hear negative things; person.
in many cases, the negative is obvious and
needs no introduction. If you emphasize the 6. Be attentive to the other person’s needs.
positive aspects of your service or the situation, Each person has his or her own individual
you will seldom go wrong. If you emphasize needs. Find out what they are, and do what you
the negative, you will be treated accordingly. can to address them. You may feel that this is a
4. Image is a valuable asset. bit like soliciting work and you have enough to
Organizations spend considerable amounts do already without asking people to give you
of time and money developing and maintain- more. However, with a little gentle coaxing, you
ing a certain image. Single negative events can can get a reluctant person to express what it is
destroy that image. Chronic unprofessional job they are really after. Serving their needs will be
behaviors can erode it. The image you project very well received and a great boost to the pub-
as a representative of the company you work lic relations record of the department.
for can, and will, help to mold the company’s
7. Never “cut someone off cold.”
image. Included in the image-building perspec-
When someone asks for assistance or infor-
tive of a security officer are the following 10
mation, and you are not able to help that person
behavioral goals (PSTN, nd):
immediately, ask the person to let you get back
1. Be dependable. to him or her after you have researched the
2. Be courteous. problem. Then do so. Ask others for assistance,
3. Show interest and concern. do the research, and solve the problem. Help

XII. RELATIONS WITH OTHERS


524 42. PUBLIC RELATIONS

that person. Remove the following phrases PROMOTING EFFECTIVE


from your vocabulary: CUSTOMER RELATIONS WITHIN
● “No, we do not do that.” THE SECURITY FORCE
● “No, we cannot help you with that.”
● “It is not security’s job.” There are a number of steps that security
supervisors can take to enhance the customer
8. When you can help someone, seize the relations capabilities of their subordinates.
opportunity and do it.
Whenever possible, help others. If necessary, 1. To start with, the supervisor’s basic
volunteer to help them. This can make a lasting personnel management skills should be
impression. It can also be a deterrent to crime, effective enough to minimize the “malcontent
as it puts would-be criminals on notice that syndrome.” Security officers should not be
someone is aware of their presence and behav- forced to work long hours without relief, miss
ior. Be friendly; do not be afraid to speak with out on vacations or days off, or be constantly
those who seem to be in need. If helping some- given less-than-desirable assignments.
one will not create other problems, then there is 2. Security supervisors should conduct an
no acceptable reason for not doing so. inspection and briefing of each shift prior
to that shift going on duty and “on stage.”
9. Have something tangible to give
Security supervisors should take this
the person.
opportunity, whether it is done formally
People like to receive things. Even if the tan-
in groups or informally with individual
gible item is of little consequence, people seem
officers. This inspection should include a
to be pleased whenever you put something
physical inspection of equipment, officer
in their hands. Just as the salesman is able to
appearance, and officer demeanor. It
respond to requests for literature on the product
should also include an evaluation which
he is selling, so must the security officer have
shows that each officer knows what has
brochures, maps, phone books, or even hand-
happened during previous shifts and what is
written instructions. No good salesman would
happening that day on the work site.
do any less, and neither should you.
3. Brief each department member on current
10. Have a “can-do” attitude. events within the work site, as well as on
The U.S. Navy Seabees have a motto: current problems and changes in procedures.
“Can-do.” They say they can do anything if This helps to make the protection force
given enough time, and the impossible takes members function as ambassadors for the
just a little longer. What a great motto for your organization.
department to follow. Eliminate the words “can’t 4. In addition to this daily refresher training,
do”, and replace them with the words “can do.” supervisors should make certain that the
Whenever a person comes to you with a request, following work behaviors are adopted by all
just say “Yes!” Then figure out how you will security force members during periodic staff
serve that person’s needs. Pride yourself in being meetings or other methods of professional
able to do the impossible when it comes to serv- development:
ing others. This does not eliminate the need for a. Have necessary references at the ready.
referral of some requests to other departments. These may include staff directories,
However, always try to check back to see if the maps, telephone books, procedures, and
person received adequate service from your anything else that the person you serve is
referral. likely to inquire about.

XII. RELATIONS WITH OTHERS


PROMOTING EFFECTIVE CUSTOMER RELATIONS WITHIN THE SECURITY FORCE 525
b. Be ready and capable of responding g. Be especially attentive to the security
to security problems, such as fires, officer’s breath. They should be instructed
bomb threats, disorderly persons, and to never ingest alcohol, garlic, tobacco,
other critical incidents, in a prompt onions, or other items that might leave
and professional manner. Developing an offensive odor when speaking to
proficiency in dealing with people in someone. Breath mints are a necessary
crisis is a good investment for anyone tool for the public relations-minded
in security. security officer. Making it a rule that no
c. Present a professional appearance at all one on the security team be allowed to
times. Neatness and precision should be drink alcoholic beverages 8 hours prior
obvious attributes of all security officers, to a shift, and no smoking or tobacco
easily seen by even the most casual chewing be allowed during the hours
observer. Alertness, openness, and concern of work, will go far in ensuring that the
must be radiated by posture and behavior. officer’s breath will be pleasant.
d. Be prepared to do the job by having the h. Encourage the officers to be “professionally
necessary tools for the job. Always have a connected.” This means that officers
pen—or better yet, two pens—and a small should complete certification programs
notepad to write down important notes or that clearly demonstrate to other
to give someone directions. Never come members of the parent organization, and
to work without a watch, a small pocket customers alike, the officer’s professional
knife, and a pocket flashlight. If your job achievement. Seniority alone is not the
calls for other hardware, such as keys, answer to this; neither is experience from
handcuffs, mace, or defensive weapons, be previous employment.
sure they are all in place on the utility belt i. Aside from certification programs, the
and in top operating condition. officers should belong to professional
e. Two additional pieces of equipment organizations for security and safety
that project the image of security are the professionals. There should be
officer’s ID card and two-way radio. The ID professional literature available for
card should be worn in an obvious location officers to read: something which
on the front of the uniform. Avoid using generally comes automatically
a strap around the neck to hold the card, with membership in professional
for this would place the officer in jeopardy organizations.
during physical confrontations. Likewise, j. In addition to the above suggestions,
the two-way radio should be worn in a the officers must be introspective
holster or fastened to the belt by a belt clip. regarding their own worldviews, beliefs,
This leaves the officer’s hands free. fears, suspicions, biases, prejudices,
f. The officers should be instructed to make and insecurities toward dealing with
personal introductions properly. A smile, a certain categories of individuals (Hess &
look in the eye, and a firm handshake are Wrobleski, 1996).
all important aspects of human relations k. The International Chiefs of Police
that security personnel must master. Training Key 94 contains suggestions for
Security personnel must be salespeople. As improving one-on-one communications,
representatives of management, they must which would be greatly helpful during
sell themselves, the department, and the attempts to serve the needs of others.
work site to everyone who enters the site. The following recommendations are

XII. RELATIONS WITH OTHERS


526 42. PUBLIC RELATIONS

adaptations taken from those suggestions ● Avoid giving the impression that your
(Fay, 1993): presence should be interpreted as a
● Officers should always remain polite, threat. Your demeanor should project
respectful, and sensitive to the needs of your concern and care for the needs of
the person being served. Use empathy, the person you are interacting with. A
not sympathy, in dealing with people. great opening statement is “How can I
Remember that you have no more help you?”
power than that of any other citizen; ● Even if the person you come in contact
you are not a police officer (even sworn with is being aggressive, avoid physical
officers must realize that power struggles contact if at all possible. Use verbal
are unproductive). Remain detached, deescalation whenever possible. If
and ignore personal insults. You are physical contact is necessary, be sure
only enforcing your employer’s policies that your physical response is in self-
and procedures; they are not your defense, reasonable, and necessary.
policies and procedures. The insults are Most of all, remember that your
actually directed at your employer or physical response may be witnessed by
the situation, not at you. the general public, and therefore, must
● Be businesslike at all times. Treat the look professional. It must appear that
person you are interacting with the you are in control.
way you would want to be treated ● You are under no obligation to disarm
under similar circumstances. Anger, an assailant with a knife or a gun, or
impatience, contempt, dislike, sarcasm, to chase down an assailant. Officer
and similar attitudes have no place in safety comes first. Instead of disarming
public relations. or capturing the bad guy, evacuate
● Treat each contact as a process, the area, create a safety zone, and
consisting of several phases, instead keep your distance until assistance
of a happening. Slow everything can arrive. This will look a lot more
down, and take time to evaluate the professional to the media and will keep
environment you are about to enter. everyone safe.
Size things up as accurately as possible
before making contact.
● Remember that although you intend HANDLING CUSTOMER
to deliver customer satisfaction with COMPLAINTS
each contact, be it conflict resolution, or
While constant practice of the principles of
simple assistance, it must be resolved
customer relations will preclude most com-
within the guidelines of civil law,
plaints from occurring, there are still times when
criminal law, administrative law, policy,
security officers must play the role of ambassa-
procedure, and ethics. Be sure not to
dor or diplomat. In some cases, they must even
stray outside these parameters.
act as “referees.” A few points to remember
● Avoid arguing at all times. Never back
about handling complaints are:
the person you are dealing with into a
corner. If the situation becomes heated, 1. Treat all complainants with respect.
give or get space, and continue to Every complaint or objection should be han-
use verbal deescalation to defuse the dled with respect for the complainant, no mat-
situation. ter how absurd it is. Always treat the person

XII. RELATIONS WITH OTHERS


TRAINING 527
with dignity. Never argue. There are no winners ● Whole facility intercom communication
in an argument. systems
● Two-way intercom access controls at each
2. Allow the complainant an opportunity to
perimeter door
save face. ● Use of tape dialers, with sensitive equipment
Do not embarrass a person who has been
to enunciate system failures
abusive or mistaken. Say, “I can understand ● Utilization of computerized remote dial-up
why you misunderstood. This policy is very
networking for critical system diagnosis
confusing!” This rule is integral to conflict reso- ● Emergency call stations in remote parts of
lution, as well as situations where actual physi-
the facility tied to the CCTV system
cal restraint may be necessary. ● Two-way intercoms installed near all
3. Build the ego of the complainant. overhead CCTV cameras
Give them credit for their contribution. “You
have a good point there. Not many people Transportation
would have thought of that,” is a technique that
can be applied. ● Employee transport within the work site
complex
4. Show genuine courtesy and respect to the ● Visitor transport within the work site complex
complainant. ● Administering the parking garage
Be respectful and considerate to the com-
plainant. Interview the person and allow for
venting of frustrations. Use active listening
Risk Analysis
techniques to demonstrate your concern about A risk analysis is a detailed evaluation of
the person’s irritation and the problem. identified threats, probability and criticality
hypotheses, vulnerability studies, and security
surveys of facilities and systems (man-made
SERVICE THAT CAN MAKE THE and natural crises, critical incident responses,
DIFFERENCE sensitive information losses, and so on). By per-
forming a risk analysis, the security department
Protective service departments must be just is placing itself in a consulting relationship with
that: service departments. Persons who wish to the parent organization. Risk analyses also help
survive in contemporary security/safety envi- in the loss control effort, and pay for themselves
ronments must be willing and able to take on many times over. A risk analysis can be per-
new responsibilities. In essence: formed for the following:
● Executive/employee homes
Security Only Exists for the Services It ● Work site offices
Can Provide ● Satellite facilities
Some service options that may be feasible ● New construction/renovation
within a security/safety department include ● Proposed property acquisitions
those listed here.

TRAINING
Communication
● Administration of a central operator/voice- Training and educational services help to
mail system integrate the security department within the

XII. RELATIONS WITH OTHERS


528 42. PUBLIC RELATIONS

organization and make it more visible. Here are unexciting, or lacks titillation, the media will fill
some options for providing training services: the gap. They are more than willing to create
● New employee orientation filler to make their stories more appealing to the
general public.
● Periodic safety/security training
If you have ever been quoted by the media,
● Nonviolent crisis intervention
you probably found that the words you said
● Employee college tuition reimbursement
during the interview and the words that were
programs for security officers
attributed to what you said, do not match
● Security officer cost reimbursement
exactly. Something has been deleted. Something
programs for attainment of certifications
has been added, and sometimes, the entire
● Employee tuition reimbursement for security
quote is a fabrication. You wonder how that can
officer CEU attainment
be since you spoke into a tape recorder during
the interview!
THE MEDIA: GOOD DREAM/BAD Now imagine that you have an incident at
DREAM your place of employment. The media shows
up, and they stop at the first person they see.
With respect to the media, it can be the Who would that be on most occasions? You!
thing you have been dreaming of, there to pro- The security officer. They want to interview you
mote the good work the security department is regarding the incident. Do you give them an
doing, or to send the message that your secu- interview or direct them to the public informa-
rity department is not soft on crime, or to help tion officer for the client company? The answer
at budget time to make your department look is that you have no choice; you cannot give
good, or to send any number of helpful mes- them an interview. However, you must refuse
sages. In today’s society, no organization can the interview in the right (professional, courte-
survive without positive media relations. ous) way. Here are some ideas of what to do:
If you save someone’s life, intervene in an
assault and arrest the bad guy, or drag some-
● Use your very best public relations skills, as
one from a burning vehicle at a crash scene just pointed out previously.
moments before the vehicle blows up, the media
● Be polite, and give the media the number to
wants to know. They will break their necks to reach the public information officer (PIO).
get to the scene and start looking for heroes to
● If they press you for a statement, be polite,
interview. They will usually arrive with the first and continue to refer them to the PIO.
responders because they are out there listening
● If the PIO is on site, direct them or take them
to the emergency scanner frequencies. to the PIO.
On the other side of the ledger, if you mess
● If they press you further, call in your
up, the media can be your worst nightmare. supervisor, who will repeat the above.
That negative story will hit the media with big-
● NEVER, NEVER, NEVER give an interview!
ger headlines, more repeat stories and sidebars,
● NEVER say, “No comment!”
than anything positive you can do. The negative
● NEVER be discourteous.
story will seem to last forever. From that day Other problems with the media that are of a
on, your security department will be known by security nature can be anticipated at the scene
the negative story line. Unfortunately, bad news of a critical incident. These include:
sells better than good news.
Regardless of the story the media finds a. Access control
when they arrive at the scene, if it is too bland, b. Disruption of business operations

XII. RELATIONS WITH OTHERS


CONTRACT SECURITY CONTINGENT ACCESS CONTROL 529

ACCESS CONTROL AT THE SCENE is of such a nature, like a murder or rape or other
OF A CRITICAL INCIDENT crime, that the place of business is intact and con-
tinues to operate, the valuable security processes
Access control is an absolute priority at the must also remain intact. Patrols must be main-
scene of a critical incident. However, access con- tained, property must be protected, alarms must
trol can set up a power struggle between secu- be responded to, restricted traffic control within
rity and the media. Under most circumstances the business must be maintained, and so on. This
and for any number of reasons, mainly safety is true even if the business is shut down due to
and legal reasons, security must deny access a fire, explosion, or accident. What this means is
to anyone who is not a public assistance pro- that there must be a contingency plan to meet the
fessional: police, medical, or fire professionals. needs of all types of incidents. For this purpose,
This includes the media. the company has two alternatives:
The media will sometimes utilize devious ● Create a plant emergency organization (PEO).
means to attain a story. They may try to sneak in ● Call in a contract security contingent.
a back door or simply walk in when you are not
looking. They may even be involved with divert-
ing your attention to allow a reporter to scoot in PLANT EMERGENCY
the front door. They may overwhelm you with ORGANIZATION CONTROL
numerous reporters attempting to gain access at
the same time, on the theory that some will get The plant emergency organization (PEO) is
through the lines. Fortunately, in most cases, after a group of people who work in other depart-
meeting a modicum of resistance, the media will ments and are trained to respond to emergen-
back off and revert to other ways of getting the cies. Usually, a group of a dozen to two dozen
story. Once they have made contact with the PIO, individuals, scattered over all shifts, will make
the pressure is usually off the security department. up the PEO. During critical incidents, this group
The “feeding frenzy” of reporters at the criti- stops what they are doing and reports immedi-
cal incident scene relates back to what we pointed ately to a predetermined assignment or location.
out in the beginning of this unit. We told you that This immediately expands the private security
the public has a “right to know” because they capabilities so that both the critical incident and
have an interest in what businesses are doing in the critical security procedures continue to be
their community. The media are the keepers of serviced at the same time.
that public right to know, and they doggedly go These trained PEO members are under the
after the facts to get the story. The key for security direction of the security director, regardless of
is to know where to draw the line. However, you who they work for in the company. The best
cannot reduce perimeter access control to appease candidates for this detail are usually the mainte-
the media. That is why it is so important that the nance and facilities workers. However, anyone
public relations department of your company can be used in the PEO, and they sometimes
appoints a public information officer to take the take volunteers from all departments.
pressure off security during critical incidents.

CONTRACT SECURITY
DISRUPTION OF BUSINESS CONTINGENT ACCESS CONTROL
Disruption of business operations is another Your security department will want to iden-
area of concern for security. If the critical incident tify a local contract security company to be called

XII. RELATIONS WITH OTHERS


530 42. PUBLIC RELATIONS

in during certain emergency situations. The con- special instructions to keep out of the public
tract security company will commit to a certain eye until the issues are resolved. Public disclo-
number of emergency staff, each hour, until the sure of information vital to the prosecution may
required number of personnel can be assembled. destroy the prosecutor’s case.
Special pricing will be established to ensure The preceding security measures are not
immediate response. For instance, during the exclusively set up to control the media. Relatives
first hour of the emergency, the contract security of injured parties, children, and other innocent
company will ensure that at least six security offi- parties may be placing themselves in danger
cers will respond. Another six officers will arrive by gaining access to an emergency scene under
within the next 2 hours, and the remainder of certain circumstances. Your job is to prevent
individuals required will arrive within the next that from happening. However, your primary
3 hours. At that point, three shift contingents will responsibility is to do your job while main-
be set up until the emergency is over. Flexibility taining good public relations, and that means
will be built into the plan, so that the security maintaining good relations with the media. The
director can control the number of individuals media must be accommodated—they need to
sent by the contract security company. do their job. They must also be managed so that
With these PEO and/or contract security they do not jeopardize that asset which is valu-
people available, they can block all the perim- able to every organization’s image.
eter doors and set up emergency access con-
trol to help control the media. In addition, the
security department will have large, special, CONCLUSION
color-coded tags for everyone to wear during
the emergency. If the employees are sent home, The overwhelming majority of the rule-
everyone who enters the building will have to keeping practices of security officers consists
enter through one door and receive their spe- of public relations. We are not bossy, disre-
cial tag at that door. These tags will signify spectful, or discourteous. We are the “goodwill
times and levels of access, and whether or not ambassadors” of the clients we serve. We are
escort is required. Large, brightly colored tags mostly hands-off practitioners. Verbal deescala-
with the word “MEDIA” printed on them are tion is our first and most successful tool. At the
reserved for use by the media, and these tags same time, when necessary, we can become the
should always require escort. defender of people and assets, capable of miti-
Anyone found without a tag, except public gating threats. Hopefully, this chapter will help
service personnel, should be required to report the reader understand how important public
to the main door and log in or leave the prop- relations is to security.
erty. If the employees are not sent home, then Performing public relations involves being
they should be required to show a badge for other-person-centered. We do not spend our
access, and should be asked to remain in the day finding ways to make our jobs easier for
building and avoid talking with the media. All ourselves at the expense of others. It is our duty
employees who are also witnesses to the events to spend our time designing ways of helping
surrounding the incident should be asked to others, even if the only way to accomplish that
go to a debriefing room set up by security, and goal causes us to work harder, longer hours, or
they should be asked to give statements of what to exert more energy. Providing superior cus-
they have witnessed. Public law enforcement tomer service is the best way to greatly improve
may want to be in that room under certain cir- public relations because the public truly values
cumstances. These witnesses should be given good customer service.

XII. RELATIONS WITH OTHERS


SECURITY QUIZ 531

EMERGING TRENDS
With respect to public relations as a major part There is also a trend in the security industry to
of a security officer’s job description, the main emphasize public relations and customer service
emerging trend is to expect that standard oper- in mandatory training curriculums set up by state
ating procedures will, in the future, place a very licensing boards. In as much as there exists a cur-
high emphasis on public relations through effec- rent trend in the United States toward mandatory
tive customer service. It has been our experience pre-assignment and continuing training for secu-
that where we find good public relations and rity guards, a trend is developing for additional
good customer service, those two attributes are learning and practice in numerous prime topic
followed by a high level of safety and security. areas. One of these prime topic areas of study
That is, proactive prevention is operating through is public relations through providing top-notch
all that contact with the people the security offi- customer service. In the future, an even stronger
cers meet and serve every day. The security bond between these two concepts will continue;
officer’s presence announces to all who see it public relations through customer service will
that this facility is a hard target. Criminal activi- continue to be a primary, critical, proactive, pre-
ties should not be practiced in this hard target ventive safety and security strategy.
area, less the perpetrators are willing to experi-
ence harsh consequences.

References a. The local public law enforcement


American Heritage Dictionary of the English Language, 1973 department
edition, p. 1057. b. The general public
Encyclopedia Americana, 1995 edition, Vol. 22, p. 760.
Fay, J. J. (1993). Encyclopedia of security management: Techniques
c. The licensing board that licenses security
& technology. Stoneham, MA: Butterworth-Heinemann officers
p. 592. d. All of the above
Hess, K. M., & Wrobleski, H. M. (1996). Introduction to pri- 2. There is more to department of the security
vate security (4th ed.). St. Paul, MN: West Publishing Co. officer than looking professional, and
p. 328.
PSTN (Professional Security Television Network). “Basic
performing in a reasonable and necessary
Security Officer Training Series, Public Relations.” manner. The security officer must have all the
See Media section, this unit, below. following characteristics but one. Which one
of the following is not mentioned in the text?
a. The security officer must appear to have
real concern for others
b. The security officer must also keep the
S EC U RI T Y QU IZ patrol vehicle clean to make a good
1. No matter what the security officer’s primary impression
duties and responsibilities are, and no c. The security officer must speak with
matter who the security officer’s primary pleasant and polite voice inflection
constituency is, which of the following people d. The security officer must show respect
groups have a legitimate interest in how those for anyone he or she comes in contact
duties and responsibilities are carried out? with

XII. RELATIONS WITH OTHERS


532 42. PUBLIC RELATIONS

3. To accomplish the goal of projecting a d. Assure that security officers are not
positive image, the security department “shafted” out of vacations and days off
must first have a quality program in place. 6. In addition to daily refresher training,
Once this is done, the Ten Rules of Public supervisors should make certain that the
Relations in Private Security can be applied. security officers in his or her command adopt
Which of the following is not one of these favorable work behaviors. Of the following
rules? work behaviors, which is not included in the
a. The Security Officer must select the text?
persons he or she will serve a. The security officer should be schooled in
b. The Security Officer must be attentive to money management so they will be able
the other person’s needs to live very comfortably on the wages they
c. The Security Officer must believe that receive from being a guard
image is a valuable asset b. The security officer should be encouraged
d. The Security Officer must have a “Can-Do” to belong to professional organizations that
attitude serve safety and security practitioners
4. In addition, the Ten Rules of Public Relations c. The security officer should wear the
in Private Security instruct the security picture ID in a conspicuous location on the
officers in the following ways. Which one of front of the uniform
the following rules is incorrect? d. The security officer should be instructed
a. When you see someone looking around to watch his or her breath, excluding garlic
like they are lost, approach them and ask if or onions before work to prevent offensive
you can help them smelling breath when talking to those
b. Realize that public relations is not about being served on the job
being right all the time; the customer is 7. Handling customer complaints is not always
sometimes wrong. However, being right or fun. In some cases, the security officer
wrong is not what is important. Service is. may wind up acting like a referee. Of the
c. When the person you are serving only wants following, which is a good recommendation
to be argumentative, you must cut them off for how to handle complaints?
cold and take over the conversation a. Treat all complainants with respect, and
d. When approached by someone for help, never allow yourself to be dragged into an
say “yes” even before they tell you argument
what they want. You work in the “Yes” b. Allow the complainant an opportunity to
department. YOU have a “Go-to attitude.” save face. Do not embarrass them in front
5. There are many actions that a security of others
supervisor can take to motivate their c. Give the complainant credit for their
subordinates to do a better job at public contribution, with a compliment like, “You
relations. Which of the following is not one of have a good point there. I can see how
those actions? others have made this same mistake.”
a. Brief each security officer on current events d. All of the above
within the work site daily 8. Security departments are service
b. Give each officer extended smoke breaks as departments. The personnel in security
a reward for a job well done departments can be found doing all kinds of
c. Conduct a personal inspection of each jobs to help their companies. Of the following
officer before the shift starts activities that security officers might be asked

XII. RELATIONS WITH OTHERS


SECURITY QUIZ 533

to do, which is not likely a task they will c. Work site offices
follow? d. None of the above
a. Lining up catering services for the CEO’s 10. Whenever a facility has a critical fire, explosion,
annual vice presidents’ meeting and golf or other cataclysmic event, the media is sure to
outing be there. When they arrive, they will attempt to
b. Administering of a central operator/voice- interview the first person they see so they can
mail system get the story on the evening news. Many times,
c. Employee transport within the confines of that person is the security officer. Which of the
the facility following is a good idea of how the security
d. Training new recruits and providing officer should respond?
orientations for new hires a. Be very, very polite and direct the media
9. By performing a risk analysis, the security to the designated media liaison person
department is placing itself in a security b. If media presses you for a statement,
consulting relationship with the company. contact your supervisor, and let the
Risk analysis can also help with loss control supervisor deal with the media in that case
efforts. Which of the following is not a c. Just put your hand over the camera lens
setting where a risk analysis would be very and say: “No comment; you have to
helpful? leave now.”
a. New construction/renovation d. Never, never, never, under any
b. Executive/employee homes circumstances, give an interview.

XII. RELATIONS WITH OTHERS


This page intentionally left blank
C H A P T E R

43
Community Relations: Making
the Strategy Come Alive
Mark E. Puetz and K.C. Poulin

programs, on-the-job training, or even through


CHAPTER OBJECTIVES certification programs like this one. It is not
● Discuss the concept of an experience enough, though, to focus solely on those “hard
economy as it applies to private security skills.” In order to be truly effective, you must
● Give a list of options and identify the understand and appreciate how your efforts fit
five areas necessary in creating a positive into and support the overall strategy of your
experience security operation, whether a contract agency
or an in-house department. You must also be
● Discuss the concept of costs of quality as able to employ the “soft skills” of interacting
it applies to private security with people to create positive outcomes. Being
● Discuss branding and how it is an able to work with others in a manner consistent
important part of a security operation’s with your operation’s strategy is the mark of a
business strategy true professional.
● List the three phases of relationship In this chapter we will explore some ideas
building within a community about how what you do fits into the business
● Convey the importance of contact success of your security operation. We will con-
protocols in managing the relationship sider the experience you provide to those who
with the client or users of security use or benefit from your services, followed by
services a look at how what you do impacts the costs to
the operation. How all of this is important to,
or supports, the strategy and branding of the
security operation, and your role in that, makes
INTRODUCTION up the third section. The last section examines
the idea of engaging the community itself as
When you arrive for work, you know what part of the security effort. When all of these are
is expected of you. The skills of your profes- aligned, the effects can be powerful.
sion are learned through education or training Before we get started, consider …

535
536 43. COMMUNITY RELATIONS: MAKING THE STRATEGY COME ALIVE

Two teenagers stand before a gumball machine at the they called an “experience economy” (Pine &
mall. They insert a coin and watch one of many colored Gilmore, 1999). From the earliest days until
gumballs fall through a dizzying array of chutes and slots
on its way to being dispensed at the bottom. The machine
fairly recently, most of our economic activity
lights up and plays music as the gumball makes its was designed to get the things we need directly
journey. Neither teenager takes any of the gumballs they from the earth through hunting and gathering
purchased. Instead, they just laugh and giggle. They seem or farming. Ours was an agrarian economy. In
simply to enjoy the show. the 19th century, we moved into an industrial
You purchase a new gadget from the local electronics
store. When you get home, you find out it does not work.
economy where most of our effort was dedi-
You call the store and they ask that you return it. When cated to making things. We used raw materials
you do, your defective gadget is exchanged for a brand pulled from the earth and mass-produced all
new one, no questions asked. manner of goods. As recently as the 1980s and
In July 1969, Neil Armstrong became the first man 1990s we started to see more businesses geared
to set foot on the moon. NASA folklore says President
Kennedy visited NASA sometime months before the
not toward making things, but in doing things
launch. He spoke with a number of people on his tour. At for others. In this service economy we saw com-
one stop he asked a janitor what his role was in the space panies built around personal assistants, dog
program. “Mr. President,” the janitor responded proudly, walkers, international shipping corporations,
“I am helping to put a man on the moon.” and so on. According to Pine and Gilmore, the
experience economy is evolving as the next step.
What do these short stories have in common? To be sure, there is still a significant amount of
How do they relate to what you do? If you are agrarian economic activity going on, and ser-
the suspicious type, you may think to watch vice businesses of one sort or another have
the teenagers more closely, or wonder if you existed for a very long time. However, overall,
are being watched for making a bad return as the notion that our economies have evolved or
part of a larger scam, or maybe you wonder if can be broken into categories is interesting and
the janitor was a plant. Indeed, a certain amount informative.
of suspicion is necessary to be successful in our The notion of the experience economy sug-
business. However, we are going to consider gests that people are buying not only because
these anecdotes a bit differently. We are going they need this or that, or they need something
to look at them from a larger, business perspec- done, but because they want a particular thrill.
tive, one of how you fit into ensuring busi- The teens putting money into the flashy gum-
ness success. As suggested above, how these ball machine wanted the “experience” of watch-
tales are interpreted is the difference between ing the gumballs fall through the maze and
a security officer and a practitioner, between listening to the music. We go to concerts or the
one who merely punches a clock and a true theater because we want the “experience” of
professional. the music or the show, something we cannot get
with just a CD or video. We go bungee jumping
or hang gliding or even skydiving because we
want the thrill of our stomachs in our throats,
SECURITY AND THE EXPERIENCE the adrenaline rush. Business leaders have
ECONOMY learned the lessons here. Look at advertising
today. How many car commercial messages, for
In the 1990s, B. Joseph Pine II and James H. example, are based on the qualities of the car
Gilmore took a close look at how businesses and itself and how many are based on a “feeling”
economies have evolved through human history you will get when you drive that particular car:
and suggested we were then moving into what the “experience”?

XII. RELATIONS WITH OTHERS


SECURITY AND THE EXPERIENCE ECONOMY 537
In an environment where the basic good or the success of the operation for which he works,
service is rather common, not all that different and ensuring the security of those he protects,
from any other, or is more or less a commodity, will make every effort to do his part as well.
we have to stand out from the crowd somehow Create a Consistent Theme: Have you ever
if we are to be competitive. Think about what taken a road trip and stopped at your favorite
this means for the business of security. Almost fast food chain for a quick bite to eat? Did you
anyone can check a door to ensure it is locked, notice that it looked almost like every other you
or read a gauge to ensure it is within certain have seen? Maybe the physical layout of the
parameters. It does not take specialized train- building was a bit different, but the signage,
ing to read an ID badge or check a name against the menu, the uniforms, the countertops, and
a list at an access control point. The ultimate tables all looked and “felt” essentially the same,
“buyers” of our services (where security is part right? What makes that fast food chain differ-
of a service economy) know this and they pres- ent from all others, and competitive against all
sure our agencies or departments for more ser- others, is just that. Every one you enter reminds
vices, higher standards, or lower prices or costs. you where you are, that you are in their place
If security is provided by a contract agency, they and no other. This builds a sense of familiarity,
may threaten to buy from a competitor. If secu- comfort, and trust. Every interaction any user
rity is provided in-house, they may threaten to of your services has with your operation or
decrease our budgets or outsource the security you should “feel” the same. If your operation’s
function. Whether contract or in-house, this strategy involves providing highly competent
can cause downward pressure on our wages. antiterrorism officers at critical areas such as
Sure, we may require licensing or certification, nuclear or power plants, then every time the cli-
personal discipline, and even some expertise in ent or overseeing authority calls, meets in your
identifying security risks before they become office, sees your duty vehicles, or talks with you
security threats. Sure, the costs to our users if or one of your fellow officers, he should “sense”
we do not do our jobs can be extensive, sug- that he is dealing with highly competent antiter-
gesting we should be compensated accordingly. rorism officers. If your operation’s strategy is to
But the end user may not dwell on all of this provide professional security officers for access
when he makes his buying decision, when he control in high-end office buildings, then every
chooses our agency over any other, or sets our interaction should have that feel to it as well.
department’s budget. We will consider these An effective security operation will likely
perceptions below. For now, though, how can a develop a focused strategy, one that allows it
security operation, whether a contract agency, to dedicate its resources to maintaining that
in-house department, or some other differen- consistency. If there is no such strategy, and
tiate itself from every other option and offer the operation falls into the trap of taking on
an “experience”? How can the experience be any business it can, the consistent theme will
built into the relationship we have with the com- not be there. Security officers working differ-
munity or setting in which we operate and be ent sites will “look” different. Where an estab-
employed as part of the overall security effort? lished operation identifies different strategies
Creating a positive experience involves that are complementary, a slightly different
being effective in five areas. Any security oper- look may be acceptable here and there, but the
ation seeking to do so should make it a part of overall theme should remain the same. This
its strategy and management infrastructure to also means the operation should create a pow-
develop processes that address each area. Any erful and consistent brand in the marketplace.
security officer, committed to professionalism, Whenever anyone sees that operation’s logo or

XII. RELATIONS WITH OTHERS


538 43. COMMUNITY RELATIONS: MAKING THE STRATEGY COME ALIVE

one of its officers or vehicles, there should be no accidental. They are designed to send those mes-
doubt as to who they are. The brand follows the sages to you. More often than not, they work!
strategy. A well-armed security officer wearing Your operation should develop a series of cues
a distinctive uniform with a clear logo on his that send positive messages, and reinforce the
truck or utility vehicle fits well as an antiterror- strategy and brand. Sticking with our antiterror-
ism officer, less so as the access control officer ism versus access control officer example, what
in the professional building. Conversely, a secu- cues can be seen between the two? The antiter-
rity officer wearing a blazer and tie or a crisp rorism officer, protecting critical infrastructure,
uniform does fit well in the professional envi- may carry an assault rifle, a very powerful cue.
ronment, and maybe not so much so in an anti- He might be dressed in a manner that appears
terrorism deployment. militaristic and combat ready, with helmet, tac-
You are part of that strategy and branding. tical vest, heavy boots, and so on. To the poten-
You should wear your uniform, whatever it tial attacker, he sends a very powerful message
may be, correctly. You should endeavor to look of “Do not come here!” which translates to a
sharp, according to your operation’s rules for positive set of cues for those in the community
uniform wear. The uniform is not an exercise in or environment he protects, “This security offi-
self-expression. It is designed, by definition, to cer is very well equipped to protect us.” The
make everyone wearing it appear “uniform.” It security officer working in the high-end pro-
is designed as part of a consistent theme. Part of fessional building might be dressed in pressed
this, too, is your demeanor and how you pre- trousers and shirt, with a conservative tie, a
sent yourself to your superiors, those you pro- classy looking blazer with a distinctive patch
tect, and other users. You should maintain an on the pocket. Or maybe he will wear a uniform
even temperament, be well reasoned, and think shirt and trousers reminiscent of law enforce-
clearly and critically. Your reports should be ment or military dress. The message he sends
thorough, yet concise. You should be an image of is that he is a professional and fully capable of
competence at being an antiterrorism officer, an interacting in this environment. If he wears a
access control officer, or whatever sort of security uniform, an added duty belt may send an addi-
officer fits your operation’s strategy and brand. tional message that, while professional, he has
When others in the community or environment tools available to support him when he needs to
see you, you are your operation’s brand! be stern (as in when denying access to those not
Layer the Theme with Positive Cues: When authorized to enter). Even the security officer at
you visit an amusement park you are teased that amusement park can send those positive
almost as soon as you enter the parking lots. cues. He may interact proactively and person-
Signs with images of the park’s characters ably with guests. While he is making the guests
direct you through traffic. As you get closer feel welcome, he is also letting them know he
to the front gate, you may hear the screams of is there and that he is watching out for them.
guests already inside as they fly by on one of This sort of “preventive interaction” can be very
the twists and turns of a rollercoaster. Once at powerful, as we will see later.
the gate, you hear theme music, you see cos- Positive cues sent by the security opera-
tumed characters walking around, and park tion may consist not only of the deliverable
employees are all “on stage” doing everything of regular reporting, but also of having a key
they can to make you feel welcome and want- manager or account representative contact the
ing more. Everywhere you turn you see or hear client or supervising executive and reinforcing
another “something” sending you the message whenever a positive security event occurs. This
that this is a fun place to be. These cues are not point of contact may or may not read all of the

XII. RELATIONS WITH OTHERS


SECURITY AND THE EXPERIENCE ECONOMY 539
operation’s reporting as often or in as timely a workplace or some other area. When you
a manner as he may like. He may have other become aware of a potential issue, address it.
work or issues he needs to address. When the You may or may not have the authority to ad-
account representative makes a proactive call dress it directly, but you should at least have the
and informs him that the operation’s officers ability to pass it on to the correct person. When
coordinated with law enforcement the previous people recognize you as a professional, person-
night to have arrests made of subjects attempt- able, and proactive security officer, imagine the
ing a burglary, or that they found an impor- comfort level, the “experience,” you create for
tant area unsecured and were able to secure it, them. Imagine the sense of community you can
what is the cue sent? He may see all of this in build. That is the goal.
the operation’s report when he gets to it, but Eliminate/Manage Negative Cues: Nothing
the message sent is that the security operation ever goes right all the time. When it seems
understands and cares about his security con- like it does, we likely have been grossly mis-
cerns and wants to be sure he is aware of key informed. Although it is always important to
issues. A proactive reporting process may also address things that go wrong, our concern is
offer commentary on the rhythms of the envi- to eliminate or manage the negative message
ronment, beyond simply noting events. For others may get from us. When a security offi-
example, imagine how useful it may be for a cer is found to be dressed or behaving inap-
factory to learn the night shift employees seem propriately, it sends a negative message to all
to be suffering from low morale or that a par- who interact with him. A dirty patrol car or
ticular employee recently suffered a loss in her messy work area sends a similar message. One
family. Factory management could investigate of the largest amusement parks in the world
further the cause of the low morale, a leadership does a full inspection of its property, inspect-
issue, and resolve it in order to inspire more ing every single ride, replacing any burned-
efficient production, a management issue. Or out lightbulbs, cleaning the park thoroughly,
they could reach out to the distraught employee … every night. They invest a great deal into
with compassion, sometimes an incredibly an entire secondary workforce that never sees
powerful leadership technique in and of itself. a guest. Their only purpose is to ensure the
The security operation should communicate negative cues of a malfunctioning or closed-for-
not only when there is an issue, but also when service ride or even the silly small things like a
there is not. If things seem to be quiet and run- burned-out lightbulb are never sent.
ning smoothly, regular contact should continue. Communicating openly about the bad news
Positive cues build strong relationships, which with a client contact or supervising executive is
allow for presenting more positive cues. The important. The security operation should make
process can feed on itself and grow. the first notification wherever possible to ensure
As the security officer working at a given he hears it from the source. He should never get
site, you must interact professionally and per- such information secondhand, and be left won-
sonably with everyone. Interacting profession- dering about what the security operation may
ally sets in the minds of others that you are or may not have done. When a breach occurs
competent and fully capable. Being personable, or a threat becomes an incident, an informative
or friendly, lets them know you are approach- call lets the contact know security personnel are
able. You end up conveying that they can come addressing the issue directly. The damage may
to you with their concerns, that you are avail- be done, a negative cue. But the account repre-
able to assist them in their worries about safety sentative called, informed, and has taken direct
or security in the environment, whether it be action to address the matter. This can be a very

XII. RELATIONS WITH OTHERS


540 43. COMMUNITY RELATIONS: MAKING THE STRATEGY COME ALIVE

powerful positive cue. The agency has negated, t-shirt? Have you ever eaten at a restaurant and
or managed, the negative cue in doing so. The left with a toy for the kids, a commemorative
security operation should be ahead of the point of glass, or some other such gift? Have you ever
contact wherever possible, too, in developing solu- gone anywhere and come back with a souve-
tions for any security worry he may have. When nir? These items are designed to trigger your
the business plans an expansion, for example, he memory every time you see them, to serve as
may have myriad other things on his mind, only “mementos” of the “experience” you had when
to find out later that he missed something impor- you first got them. They act as “positive cues”
tant. If the security operation knows about the long after the experience is over.
expansion and makes suggestions as to potential Many companies send birthday or holiday
security risks that can be addressed, the contact cards to clients. When personally signed, these
can see them as an operation interested in solving show a “human touch” and often are displayed
his problems before they become headaches. on the recipient’s desk or wall for a few days or
On the ground, day or night, you should through the season. A lot of companies also
adopt a similar approach. When issues or wor- offer pens or pads or mugs or any manner of
ries are identified, address them. Act within things with their logo emblazoned on them.
your scope of authority and do whatever you Military or law enforcement organizations may
can to solve the problem. When the solution is give certificates, special plaques, or even chal-
outside your scope of authority, refer it to the lenge coins. Offering a memento that is unique
appropriate party, whether your supervisor to the agency can go a long way in reminding
or a point of contact, depending on your own clients of the security operation even when its
operation’s rules for such things. Never let an personnel are not in front of them or reaching
issue fester unattended, though. They have a out to them to follow up on an issue or maintain
surprising knack for growing well beyond mere the relationship of the account.
headaches then, and tend to become cancers Where you, as the security officer, may be
that can seriously infect your operation and authorized by your operation to do so, pass out
those you protect. Your challenge, as a security mementos as appropriate. While some security
officer, is to educate yourself so you can iden- operations create related literature, brochures
tify what is or is not an issue. Some things are with security tips, for example, many of us on
easy; an unsecured external door after hours is the front lines do not have this available to us. If
likely a concern. Some things are not so easy; these are available, pass them out freely. If you
what do you do when a day shift employee have nothing like this available to you, you can
wants to get into the building on a weekend to offer compliments or affirmations, recognizing
get something from his desk so he can work on or encouraging those you contact in their efforts.
a project at home? Policies and procedures can What stays in the person’s mind is when you greet
offer valuable guidance, but they cannot predict everyone with something like a simple, “Good
every possible circumstance. At some point, morning, Mr. Jones, good to see you again,”
you must make a decision. When you address versus, “Good morning, Mr. Jones. I certainly
such issues fairly and responsibly, your super- appreciate having alert people like you around.
visors and the client contact or supervising It makes the whole place a lot safer when every-
executive see them being addressed—a positive one is paying attention.” If possible and appro-
cue—before those issues become real concerns priate in your environment, engage Mr. Jones in
for them—a negative cue. simple conversation when you see him. It may
Offer Memorabilia: Have you ever gone to sound trite, but Mr. Jones now feels welcomed
a concert or event and come home with a tour as part of the security effort and appreciated for

XII. RELATIONS WITH OTHERS


COST OF QUALITY 541
who he is (something all people secretly want). work. We can easily imagine that our client, or
Over time, that relationship will grow, as will the larger business of which our department is
the relationship you have with all others you a part, will lose faith in our operation and us
greet or with whom you talk. The message will should such things occur. Those who work, live,
eventually get back to your supervisors and or play in the areas we protect will suffer a sim-
maybe even your client contact or the supervis- ilar loss of confidence where they are affected.
ing executive himself. Our fellow officers are embarrassed and may
Consider All Five Senses: As humans, we become disheartened to work alongside us.
take in everything we know about the world Indeed, our operation may even lose some of its
around us through use of our five senses. If competitive position in the marketplace. What
we want to send, or reinforce, the message of client wants to contract with a security agency
creating a positive experience for others, we that cannot keep things secure, after all? What
should try to do so through every sense we executive wants to keep an in-house team that
can. While there may not be many messages cannot do so?
we want to send through smell, for example, Back in the 1950s, engineers and manag-
we can at least consider these in the abstract. ers in industry, particularly in manufacturing,
Look at Table 43-1 below. We have summa- began looking at what has since become known
rized the suggestions made in this section so as the “cost of quality” or “quality costs.”
far and offer some bullets as to how you might They noticed, for example, that when making
think about the five senses. None of this is set a particular item, a widget, there was a certain
in stone. It is limited only by the security opera- amount of raw material that went into the pro-
tion’s strategy, branding, and the imagination of duction of that widget. That raw material was
those who make it happen … you, the security purchased at a price. The wages paid to the
officer. workers who made the widget were paid at a
Creating a positive experience involves given rate. The cost of running the machines
being effective in five areas. The security oper- was calculated as well. Should there be a defect
ation will likely make it a part of its strategy in a widget, it would have to be fixed or perhaps
and management infrastructure to develop even scrapped. If fixed, additional costs would
processes that address each area. Any security be incurred: materials, wages, use of machines.
officer, committed to professionalism, the suc- If scrapped, the costs already incurred would
cess of the operation for which he works, and now have been effectively wasted. These addi-
ensuring the security of his customers and end tional or lost costs, separate from what it actu-
users, will make every effort to do his part ally costs to make the widget in the first place,
as well. are the costs of poor quality.
Mistakes happen, though. So these same
engineers and managers started to put fail-safes
COST OF QUALITY into their processes. They used inspections at
multiple phases to catch defects early. They
As security officers, we are aware of what wrote manufacturing guidelines for frontline
might happen if things go wrong. We know personnel to minimize human error. They even
breaches in security are not acceptable; com- spent more time trying to design the manufac-
promises of our client’s or business’s interests turing process itself to be more efficient and
are to be avoided. Aside from the damages have fewer opportunities for error. The inspec-
of the loss itself resulting from the breach, we tors had to be paid, of course, so their wages
lose the goodwill of those who benefit from our represented a cost. The time it took to write out

XII. RELATIONS WITH OTHERS


542 43. COMMUNITY RELATIONS: MAKING THE STRATEGY COME ALIVE

TABLE 43-1 Creating a Positive Experience

Security Agency Security Officer

Create a Consistent ● Focus the strategy and all following ● Wear the agency uniform correctly and look
Theme actions. sharp.
● Create a powerful and consistent brand. ● Maintain an even temperament.
● Write all reports and communiqués
professionally.

Layer the Theme with ● Provide regular reporting. ● Interact professionally and personably with
Positive Cues ● Talk about the successes. everyone.
● Reach out often. ● Be proactive when faced with problems or
● Be accessible. challenges.

Eliminate/Manage ● Communicate openly about the bad (bad ● Do not let issues fester. Address them.
Negative Cues news must travel fast). ● Be liability conscious.
● Develop solutions for worries the client
or oversight authority may have.

Offer Memorabilia ● Remember key events (birthdays, ● Use affirmations and positive reinforcement in
holidays, etc.). all interactions.
● Offer agency mementos. ● Distribute agency-approved literature.

Consider All Five ● Sight: Ensure everything (uniforms, ● Sight: Ensure your uniforms, grooming, and
Senses materials and literature, vehicles, etc.) is bearing always appear professional and inspire
visually appealing. confidence.
● Sound: Keep all conversations ● Sound: Speak clearly and authoritatively.
professional, yet friendly.
● Smell: Pass the “smell test” with ● Smell: Keep yourself clean and well groomed,
all actions (contacts, reporting, with no offensive body or perfume odors.
investigations, etc.).
● Touch: Make every “touch point” a ● Touch: Use firm handshakes. Take excellent care
positive experience. of client equipment.
● Taste: Never leave a “bad taste in ● Taste: Never leave a “bad taste in the mouth” of
the mouth” of the client or oversight anyone.
authority.

more detailed procedures represented a cost. a cost. It was returned and sent back to be fixed
Even redesigning processes represented costs. or scrapped, costs. The only saving grace in this
It does not stop there. Remember that elec- example is that they made the exchange with
tronic gadget you purchased in the second no questions asked which, hopefully, meant for
example at the very beginning of the chapter? a positive experience and well-managed nega-
Imagine that as the widget. Now you have a tive cues for you.
defective widget. You took time out of your All of these costs are known as the “total
day to complain. That is time you could have quality costs.” Whole disciplines and count-
been doing something else, a cost to you. The less consultants have sprung up to help compa-
person who took your call probably had to be nies reduce these costs. Keep in mind that the
paid either way, but he could have been doing money spent in these areas is money that cannot
something else, too, another cost. You took be spent elsewhere, such as in business expan-
more time out of your day to return the widget, sion or on wages and benefits for you and your

XII. RELATIONS WITH OTHERS


COST OF QUALITY 543
fellow security officers. So you, the security that cannot be spent elsewhere, such as in busi-
officer, have a significant interest in ensuring ness expansion or on wages and benefits. In a
the quality of your services is the highest pos- service-related business, such as security, these
sible. This is not just a question of ensuring there costs can be significantly reduced by providing
are no breaches or compromises. For the true a positive experience for the customer.
professional and practitioner, it is also a matter Remember the old adage from Ben Franklin,
of ensuring the “experience” is always a posi- “An ounce of prevention is worth a pound of
tive one. Every complaint, similar to your return cure”? The same concept certainly applies here.
of the widget, must be addressed somehow and The costs incurred to ensure a high-quality
that means costs will be incurred. Minimizing the security effort before the service is ever deliv-
need for those complaints also minimizes costs. ered are often much less than the costs incurred
Consider Table 43-2 (Campanella, 1999, p. 5). after a breach, compromise, complaint, or other
Imagine how you, as the security officer, can loss.
do your part to reduce these costs by creating Prevention Costs: Prevention costs, the costs
a positive experience. All of these costs, consid- incurred up front to create a high-quality expe-
ered together, are known as the “total quality rience or ensure an error or failure does not
costs.” The money spent in these areas is money occur, ideally are accepted or even encouraged

TABLE 43-2 Total Quality Costs

Prevention Costs Failure Costs


The costs of all activities specifically designed to prevent poor The costs resulting from products or services not
quality in products or services. Examples are the costs of new conforming to requirements or customer/user needs.
product review, quality planning, supplier capability surveys, Failure costs are divided into internal and external
process capability evaluations, quality improvement team failure cost categories.
meetings, quality improvement projects, quality education and
training.

Appraisal Costs Internal Failure Costs


The costs associated with measuring, evaluating, or auditing Failure costs occurring prior to delivery or shipment
products or services to assure conformance to quality standards of the product, or the furnishing of a service, to the
and performance requirements. These include the costs of customer. Examples are the costs of scrap, rework,
incoming and source inspection/test of purchased material; re-inspection, retesting, material review, and
in-process and final inspection/test; product, process, or service downgrading.
audits; calibration of measuring and test equipment; and the costs
of associated supplies and materials.

External Failure Costs


Failure costs occurring after the delivery or shipment
of the product, and during or after the furnishing of
a service, to the customer. Examples are the costs of
processing customer complaints, customer returns,
warranty claims, and product recalls.

Total Quality Costs


The sum of the above costs. It represents the difference between the actual cost of a product or service and what the reduced
cost would be if there were no possibility of substandard service, failure of products, or defects in their manufacture.

XII. RELATIONS WITH OTHERS


544 43. COMMUNITY RELATIONS: MAKING THE STRATEGY COME ALIVE

as part of doing business. A security operation checklist, an appraisal cost, may be useful in
often incurs the additional cost of conducting a avoiding this, for example?
threat assessment or other security review prior External Failure Costs: Some failures occur
to taking on a new account or new responsi- after our services have already been delivered.
bility for just this reason. Similarly, they hold Just as with all the costs incurred when you
managers’ or supervisors’ meetings to ensure returned your defective widget in the opening
the regular flow of information and early iden- example above, complaints from any party and
tification of issues. Licensure, certification, and all that must be done to address their concerns
training may also be counted as prevention represent failure costs. Even though some can-
costs. As the security officer, you can ensure not be avoided, since mistakes do happen or
you are aware of the layout and security issues because some people seem simply to enjoy com-
of the facility or property you are assigned to plaining, our efforts to create a positive experi-
protect. You should also communicate regu- ence at the point of service delivery, when we
larly with your supervisors just as they do with are on our rounds and interacting with others,
theirs. Most important, you should be proac- can go a long way to minimize them.
tive in your patrols and duties, especially in
building relationships, thus creating a positive
experience for those who live and work in the FROM STRATEGY TO BRAND TO
environment you protect. OFFICER
Appraisal Costs: Appraisal costs, the costs
associated with checking up on ourselves, are At its most basic, business strategy is about
an important part of anything our agency does, who, what, when, where, why, and how. Who
or we do if we are serious about ensuring a are the buyers or primary users of our services
positive experience for those who use our ser- and who are the other users? What product or
vices. Reporting and statistics allow the secu- service do we provide for them? When do we
rity operation to identify concerns or trends and get it to them? Where do we compete, either
address them proactively. Inspections of secu- geographically or in the marketplace? Why
rity officers and sites do the same. Even security do we provide that product or service? What
drills and performance tests may be appraised. problem are we trying to solve? How does our
You should always be conscious of the quality product or service solve that problem? Another
of your patrols and inspections, to ensure you question that may be added is one of how we
have covered and considered everything for prepare for or deal with change (Davidson,
which you are responsible. 1996). Although far beyond the scope of this
Internal Failure Costs: Failure costs, those work, answering these questions in detail and
incurred as a result of some shortcoming on our exploring them fully can lead a business into
part, are to be avoided or minimized wherever developing a powerfully competitive strategy.
possible. Not doing a thorough threat assess- With some tweaking, even an in-house opera-
ment, and thus failing to consider a material tion will probably address these questions, con-
security risk or a security officer not making sidering everyone to whom it is accountable
complete rounds and missing an unsecured and what their concerns may be.
door, are incidents representing failure costs. For our purposes, though, let us consider
Even not connecting with the members of the these questions briefly, in a different order, in
community you patrol and missing something terms of three different hypothetical security
they could have told you about could be con- operations: one contract agency that provides
sidered a failure cost. Can you see where a electronic access control and camera monitoring

XII. RELATIONS WITH OTHERS


FROM STRATEGY TO BRAND TO OFFICER 545
systems (see Table 43-3); an in-house operation how they do what they do are so different, how
that provides security personnel at high-end they present themselves is also very different.
vacation resorts (see Table 43-4); and the last, How they present themselves is “branding.”
another contract agency that patrols factories The operation’s brand is a function of all
and industrial complexes (see Table 43-5). of the “experiences,” as we explored above,
It is easy to see that each of these security perceived by the various users of its services
operations provides a very different type of ser- with whom the operation comes in contact. It
vice to different primary users with different is a lot more than just a logo on a letterhead.
needs. All provide security solutions, but are It is the uniform, the way its officers present
distinctly different from one another. At some themselves and the security operation. It is
point, the first agency decided it would provide the make, model, and livery on its vehicles.
technological solutions and not officers. The Branding is about the image of the operation
second operation works in resorts only and has at every touch point, at every single place
to be responsive as a department of the entire anyone has any contact whatsoever with the
business. The last agency made a decision to operation, even down to how the phones are
serve industrial facilities. Because where and answered, e-mails are written, or the timeliness

TABLE 43-3 Strategy Summary for E-Security

Strategy Question Answer (Example)

Who: Who are our customers? Our customers are private businesses or commercial
interests who need to provide controlled access to
restricted areas, and document who enters or exits those
areas.

Where: Where do we compete, or find our customers, either in We service customers in the greater metro area and up
terms of geography or the marketplace? to 25 miles outside the city limits. We service customers
who have office buildings or gate access to outside
areas. We do not service private homes or government
facilities.

Why: Why do we provide a product or service to them? What We allow our customers to keep unauthorized people
problem do we solve for them? out of restricted areas, and to track who does enter and
when.

What: What product or service do we offer? We offer electronic key card, biometric scans, and video
surveillance with internal monitoring. As an additional
offering, we provide external monitoring.

When: When do we provide this product or service to the Our products provide real-time monitoring and
customer? customizable reports with frequency and distribution
determined by the customer.

Change: How do we prepare for and deal with change? Executives attend trade shows. Executives, account
representatives, and senior supervisors subscribe to
trade magazines. Our board and executives consider
trends in our industry and threats at least annually.
Key clients are invited to participate in our strategy
board meeting.

XII. RELATIONS WITH OTHERS


546 43. COMMUNITY RELATIONS: MAKING THE STRATEGY COME ALIVE

TABLE 43-4 Strategy Summary for Resort Security

Strategy Question Answer (Example)

Who: Who are our customers? Our customers are the owners and executives of the resort
chain.

Where: Where do we compete, or find our customers, We service the entire range of resort properties in our
either in terms of geography or the marketplace? company throughout the southeastern United States,
particularly along the coastlines. Our resorts serve exclusive,
high-profile clientele and boast five-star facilities.

Why: Why do we provide a product or service to them? Our resorts want their clientele to enjoy their vacations
What problem do we solve for them? without the hassle of outsiders, whether paparazzi or news
media.

What: What product or service do we offer? We offer highly professional, concierge-type security officers
who dress in casual resort attire so as not to offend guests,
but with distinctive uniforms to make their roles clear. We
also partner with a provider of CCTV and other technological
solutions to monitor perimeters and gates.

When: When do we provide this product or service to the Our security personnel are present 24/7 on all of our sites.
customer?

Change: How do we prepare for and deal with change? We coordinate closely with our executives and operating
managers and attend resort conventions to fully understand
our business and its many issues.

TABLE 43-5 Strategy Summary for Industrial Security

Strategy Question Answer (Example)

Who: Who are our customers? Our customers are factories, industrial complexes, and similar
businesses.

Where: Where do we compete, or find our customers, We service customers in the midwestern United States. Our
either in terms of geography or the marketplace? customers are manufacturers or raw material extractors.

Why: Why do we provide a product or service to Our customers are worried about safety conditions for their onsite
them? What problem do we solve for them? employees and monitoring of gauges and readouts after hours.

What: What product or service do we offer? Our security officers are highly trained in government regulations
about workplace safety, particularly in industrial or factory settings.
We check key readouts or indicators to ensure critical equipment
is operating within acceptable parameters. We also assist in
developing safety training programs.

When: When do we provide this product or service Our security personnel are available day and night for our clients.
to the customer?

Change: How do we prepare for and deal with Our senior staff regularly watches legislative changes and keeps
change? abreast of regulations about workplace safety issues that affect the
business of our clients.

XII. RELATIONS WITH OTHERS


BUILDING A COMMUNITY OF SUBSTANCE 547
of when invoices or budgets are sent. One bad remain focused on what it does best and not
experience in the mind of anyone we meet can become watered down trying to do too many
affect the brand negatively. Most businesses different things for too many people, then
work very hard to ensure the integrity of their developing a strong brand allows the business
brands and guard them jealously. The security to solidify its position in the minds of others.
operation’s brand should lend itself to sup- The stronger the brand, the greater the value
porting the cues it wants to send. The brand of perceived by the clients or the parent business.
an in-house security operation is often consid- The greater the value perceived by the client
ered and designed, too, to be consistent with or parent business, the more they are willing
the overall brand of the business within which to pay or allocate to the budget. It may even
it operates. be argued that a stronger brand reduces com-
When President Kennedy spoke with the plaints (i.e., negative experiences) because it
janitor at NASA, we do not know if the janitor engenders trust. The more the client or parent
was wearing a fancy uniform or not. The story business is willing to pay or allocate to the bud-
that has been handed down does not include get and the fewer costs incurred as a result of
that tidbit. But his response indicated, without poor quality, the more your operation has avail-
doubt, that he knew he had a place in the larger able for reinvestment or wages.
scheme of things. He knew he was incredibly Notice that a large part of the burden falls
important to a most honorable effort. He knew on you! A security operation can brag all it
that without his efforts, others would be hin- wants about how good it is. They can dress
dered. He was part of an amazing team lead- everyone in excellent uniforms and buy the
ing up to one of the greatest achievements in newest and most advanced equipment. These
human history. As the security officer on the sorts of cues lend themselves to strong percep-
front lines, or even as a supervisor, you are part tions of professionalism and competence in
of the more important effort of keeping people the mind of the various users. But if the exter-
and physical assets safe. While you may not nal perception is greater than the internal real-
always know the finer points of your agency’s ity, it will not take long before the difference is
or department’s strategy, you probably do noted and the complaints start coming in. You
know that your operation provides technologi- have a responsibility to meet those standards,
cal solutions, works in-house in resorts, services to ensure the internal reality meets the external
industrial clients, or competes in some other perception. You are the face of your operation
strategic niche. Whatever the case, your role is to the customer and others most of the time.
an essential part of ensuring those very impor- You are the brand.
tant things are protected. You also know that
you have a uniform, a work area, and certain
equipment to maintain. You have rules or poli- BUILDING A COMMUNITY OF
cies about how to interact with those around SUBSTANCE
you. If strategy leads to branding, which is a
composite of the experience presented, and you Business leaders have long recognized the
are at the front line of providing some of the competitive edge to be gained in doing more
most important elements of that experience and than merely meeting a customer’s needs but
being the brand, you are also integral to making in going beyond them and surprising the
the strategy come to life. customer with additional thrills. Marketing
If deciding where and how to compete, as professionals refer to this as offering “satis-
questions of strategy, allows the business to ficers” versus “delighters.” Anything we do

XII. RELATIONS WITH OTHERS


548 43. COMMUNITY RELATIONS: MAKING THE STRATEGY COME ALIVE

that merely meets the customer’s needs at How can we build relationships with our pri-
any touch point is a “satisficer.” Whereas, any- mary users and others that go beyond the tradi-
thing we do that goes above and beyond the tional client/contractor or business/department
customer’s needs and makes his “experience” satisficer and into a partnership/community
that much more interesting and positive is a delighter? If all we want to do is sell hamburg-
“delighter.” ers or cars or museum tickets, we can probably
Most of the other chapters in this book are get away with rather superficial efforts like
about the various technical aspects of security: those already noted. But if we want to get peo-
how to patrol, current technologies available, ple involved in making their community safer,
risk or threat assessments, and so on. Mastery whether they are in an apartment complex,
of these is absolutely essential to success and a factory, a resort, or almost any other place
cannot be shortchanged if the operation or the where people gather, we need to be able to offer
officer is to be taken seriously. Without these, something much more substantive than com-
everything else is little more than illusion, memorative t-shirts and special club patches.
smoke and mirrors. That being said, the chal- How can we build an “experience” that leads
lenge of a security operation, or its officers, to “community” and really goes to the heart of
is to find ways to make these satisficers into security and making people feel safe? A deeper
delighters. By now it should be abundantly question might be, “How can we build a com-
clear that the key to this in our business likely munity with substance?”
lies in the “experience” perceived by those who Primary User Relations: We have already
benefit most from our services. In developing a hinted at some of the things we can do to bring
focused strategy, maintaining a strong brand, our primary user, the one who contracted with
and in creating positive experiences we move us or is responsible for allocating budget dollars
away from simply checking doors and rattling or issuing directives to our department, into
windows and into developing relationships the fold; a dedicated key manager or account
with our various users that serve to delight representative, proactive communication, or
them. We want them to become part of the secu- memorabilia, as examples. Ideally, the primary
rity effort, active participants. user always feels as though he has easy access
Aside from all of the examples we have to key personnel with the security operation for
already given about building an experience, any issues or concerns he may have. But how
how many other successful businesses use simi- can we really bring him in and make him more
lar tactics in building a strong sense of com- than just a “user”? How can we develop the
munity among those who use their products or client relationship into more of a partnership?
services? High-end car dealers offer rallies or Or, in the case of in-house operations, how can
car shows. Motorcycle manufacturers merchan- we “manage” the primary user so he sees us as
dise jackets, hats, t-shirts, and so on. Theme valuable contributors rather than another non-
parks and museums offer memberships and revenue-generating cost center?
special events for members only, so their cli- The partnership concept often begins at the
entele feel part of the “club.” If you think about very beginning. That is, we must impress upon
it, you can probably come up with even more the primary user, before he even becomes one,
examples. All of these create the “experience” that we are not merely to be contractors or just
and serve as delighters, inviting the client or another cost center, but partners in the security
parent business into a relationship that goes effort. The language of our contracts and any
well beyond that of simply being a buyer or related literature should express the responsi-
user of our services. bilities of both parties in this partnership. Our

XII. RELATIONS WITH OTHERS


BUILDING A COMMUNITY OF SUBSTANCE 549
conversations from then on should be held any negative cues they may receive and keep
on equal footing. While we strive to meet the costs of poor quality at a minimum. The key to
needs of our primary user, just like any rela- your success lies in your ability to build positive,
tionship, he has his part to play, too. We are his meaningful relationships with the communities
partner, not his servant, as contractors or in- in which you serve.
house departments are sometimes viewed or You must adopt a holistic approach. That is,
treated. Our account representative, our execu- you must consider the community as a whole,
tives, even our officers should interact with him not just as a random collection of individual
as though “we are in this together.” In-house parts or even as a sum of parts. All of those var-
operations may have key managers or directors, ious parts of the community interact to give the
possibly even executives, who are able to inter- community its particular “personality.” Together,
act at the highest levels of the business. Policies the property management (very likely the per-
and directives, all communication, is written in son who is your primary point of contact), the
language that recognizes the importance of the employees of the property, every resident and
security operation in the overall business suc- guest, law enforcement and other public and
cess. The security operation should develop social services in the area, the businesses in the
protocols, management infrastructure, policies, neighborhood, and even the surrounding proper-
and training that support these ideas. The offi- ties, all interact to shape the community. To build
cer should be very aware of his role in making the partnership, you must network with and
this partnership work. It may be greater with coordinate the positive efforts of these various
some operations than others, depending on the elements wherever possible. This is done through
strategy. a combination of “proactive intervention” and
Community Relations: This is it. This is “preventive interaction,” and can usually be seen
where the rubber meets the road. If you come working in different ways depending on how
away with nothing else from this work, focus positively organized the particular community
on this section. No matter what type of strat- may be.
egy your operation has chosen, no matter what “Proactive intervention” involves tactics
type of business you are in, it is a people busi- whereby the external sources of crime and com-
ness. That is, at some point, somewhere along munity predation are removed from the equa-
the line, with everything you do, there are other tion. Overt criminal acts, such as gang activity
people involved. You may or may not ever and open drug sales or prostitution, are dis-
see all of them, or any of them. But they are couraged from the property. Nuisance issues,
there. They are the ones who benefit from your such as noise complaints, loitering in parking
efforts, either directly or indirectly. They are the lots and stairwells, people who have no legiti-
community in which you operate, whether they mate business on the property, are managed
are part of a business, a housing development, and minimized wherever possible. The physical
a construction site, a government complex, or assets of the property, such as perimeter walls,
wherever. They need you. exterior lighting, landscaping, and facilities, are
Consider, as an example, how you might work improved. “Preventive interaction” then sows
to build a sense of community in a residential the seeds for long-term growth. Relationships
property, an apartment complex. You are part of are built, networking is encouraged, and the
a strategy that services living communities, with community takes a positive interest in its own
many different people. Remember, your goal is well-being. As a practical matter, you must
to provide positive experiences for all those who be able to change your mind-set at any given
belong on the property, to minimize or manage instant between proactive intervention and

XII. RELATIONS WITH OTHERS


550 43. COMMUNITY RELATIONS: MAKING THE STRATEGY COME ALIVE

preventive interaction or some combination of build very strong relationships with the parents
the two. Everything you learn in the other chap- in the community, which will assist greatly in
ters in this book are now brought to bear. managing the many juvenile issues that almost
Imagine your relationship-building process undoubtedly will arise.
in three phases: networking, anchoring, and Community Integration: As an extension of
community integration. anchoring, you take the next step and reach
Networking: Networking, at its core, is out to the community as a whole, rather than
about building positive relationships based on as separate parts. You become an active par-
trust. It is more than merely waving at or chat- ticipant in, or organizer of, community events
ting with residents and getting to know the specifically designed to further the community-
neighborhood, but also involves you introduc- building effort. These are often limited only by
ing the neighborhood to itself again. Ideally, your creativity and initiative, as well as your
you are the one who leads the charge in get- organizational talents, and may appear as trash
ting residents involved in their own community clean-up days, field days, cookouts, and so on.
through a variety of initiatives, such as par- The security operation for which you work may
ticipating in or organizing community events, even encourage you to coordinate such events
being a positive role model, playing with chil- and will ensure appropriate resources can be
dren so they and their parents can enjoy the allocated to assist or participate.
common areas and amenities, and encouraging Consider on your own how this paradigm
residents to interact positively with one another, for community building can be used in differ-
with you and your fellow officers, with local ent settings, different strategies. What sorts of
law enforcement, and with other community networking or anchoring might be fitting in an
resources. industrial setting? How can security personnel
At this stage, residents see you as a resource. be active participants in community integra-
You are friendly, supportive, and encouraging tion efforts in a professional building or luxury
in assisting them in addressing their challenges. resort? Do not underestimate the value of this
You are aggressive and tireless in driving away concept. Take some time and seriously consider
the negative influences that have impacted how this may be used in the environments
the community in the past. This phase tends to where you usually work (see Table 43-6).
see a lot of proactive intervention and preven- The community-building concepts of net-
tive interaction, with you displaying an agile working, anchoring, and community inte-
mind-set mastering both, as described above. gration can be applied to any setting, any
Can you grasp the power of this sort of “experi- environment. This table presents only a few
ence” for the various users of your services yet? ideas for the three environments sampled. How
Do you see the positive cues? can your operation or you apply these concepts
Anchoring: As the community recognizes its to the environment you serve?
own strengths and asserts itself positively in con- As you think through the tactics inside
trolling its own destiny, you work to “anchor” community relations, keep in mind the vari-
the community. More of your efforts are spent ous types of people you may encounter. Each
in preventive interaction as you assist the com- one, each type, has some interest or stake in
munity in building those skills necessary to the community. We refer to these as “stake-
maintain control. Relationships are built across holders.” Your primary user, the person who
the community to encourage long-term posi- contracted with you or who oversees your
tive growth. Indeed, many who employ these department certainly has an interest, and is thus
sorts of community building tactics work to a stakeholder. Executives or managers of the

XII. RELATIONS WITH OTHERS


BUILDING A COMMUNITY OF SUBSTANCE 551
TABLE 43-6 Community Relations in Other Environments

Hospital Setting Industrial Facility Retail Environment

Stakeholders (examples): ● Doctors, nurses, orderlies, and ● Upper management ● Store manager
Each stakeholder will other hospital staff ● Line or floor employees ● Store employees
have a different interest. ● EMS personnel ● Contractors and vendors ● Customers
● Patients ● EMS personnel ● Law enforcement
● Family members of patients responding to safety personnel responding to
incidents thefts

Proactive Intervention ● Keep the public areas clean and ● Seek out and resolve ● Be clear that thefts
uncluttered. safety issues. and shoplifting are
● Use layered access control ● Use layered access prosecuted; use signage
throughout the hospital. control throughout the and visible camera
● Manage the ER and other waiting facility. systems.
areas to prevent disturbances. ● Deploy loss prevention
personnel.
● Use visible security
personnel to show a
presence and remove
problem customers.

Preventative Interaction Build relationships and encourage Build relationships and Build relationships and
the staff and others to take an encourage the workers and encourage personnel,
interest in safety and security at the others to take an interest in customers, and others to
hospital. safety and security at the take an interest in safety
facility. and security at the store.

Networking Interact proactively and Interact proactively and Interact proactively and
professionally with staff and others. professionally with workers professionally with store
Ensure they see you as a resource. and others. Ensure they see personnel and others.
you as a resource. Ensure they see you as a
resource.

Anchoring ● Use networking to develop ● Use networking to ● Use networking to


relationships beyond those with develop relationships develop relationships
whom you normally interact. beyond those with whom beyond those with
● Encourage staff and others you normally interact. whom you normally
to take charge of their own ● Encourage workers and interact.
environments. others to take charge of ● Encourage store
their own environments. personnel and others to
take charge of their own
environments.

Community Integration Develop or coordinate training or Develop or coordinate Develop or coordinate


awareness programs and initiatives. training or awareness training or awareness
programs and initiatives. programs and initiatives.

facility, or the employers or residents, have property or area you are there to protect. Your
interests. They are stakeholders too. Others efforts should be focused on creating a positive
may be visitors or vendors. Law enforcement or experience for each of these stakeholder groups,
emergency fire and medical personnel are stake- according to what they may need or expect
holders, as are any other legitimate user of the from your operation and you. The security

XII. RELATIONS WITH OTHERS


552 43. COMMUNITY RELATIONS: MAKING THE STRATEGY COME ALIVE

operation probably has protocols for interact-


position in order to speak or make a presenta-
ing with each stakeholder group, how to inter-
tion to a client or business unit director. If you
act, who may interact at what levels, and so on.
work in one of these types of organizations, you
Through your efforts, the protocols support the
will probably be required to make any issues
idea of building the community and doing so
known to your supervisor and trust him/her
with substance.
to carry the matter forward. On the other hand,
some operations encourage open communica-
tion among security officers and client or busi-
ness points of contact. More likely than not,
Contact Protocols you work in an operation that falls somewhere
Regardless of where any relationship is in between. There are some people you are
intended to go in the end, it begins somewhere. expected to contact regularly, with whom you
There is always a first contact. Your agency’s should communicate openly, and others who
contact protocols very likely include some refer- only your supervisors should address. If not
ence to that first contact and require you to be already clearly spelled out for you, your super-
professional, address everyone with a certain visor should be able to explain these particular
degree of formality (i.e., “Sir” or “Ma’am”), and protocols and where you fit in.
perhaps even stand up or smile, depending on For those with whom you are expected to
the particular environment. As the saying goes, communicate regularly, you probably have pro-
you only get one chance to make a first impres- tocols around what is or is not to be discussed.
sion. Many protocols require similar interac- Certain types of security issues, such as blocked
tions all the time. Less common among agency fire exits, exposed tools or valuables, or day-to-
rules, though, are protocols that address the rest day operations of an access control point may be
of the relationship. acceptable for you. The times of shift changes or
Many of us are already adept at building rela- the exact patrol routes or coverage areas may be
tionships. We do so with our friends and loved reserved for your supervisors to discuss. Again,
ones, after all. However, as part of a strategy to if you do not already have clear protocols avail-
support the overall security effort, relationship able to you, ask your supervisors for guidance.
building is a lot more focused and purpose- Whenever you do interact with others,
ful. To be sure, there is a considerable amount regardless of who they may be, how you present
of sheer personality that comes into play, but yourself will go a long way to establishing what
guiding that relationship to support the security sort of relationship is built. You should consider
effort requires specific protocols. Protocols serve your body language as a very important part
as rules for who in the security team should of how you communicate with others. How is
interact with whom on the client or business your posture? Is it straight and professional,
side. What types of issues are you expected and or relaxed? Where are your hands? Are they
empowered to address on your own and which at your sides or behind you, or are they in front
should you refer to someone else? How should of you as part of an “interview stance”? How do
the front line security officer interact with the you position your feet? Are they square to your
line employee, plant manager, doctor or depart- shoulders or are you angled slightly to the other
ment head, member of the public, and so on? person with your strong foot slightly behind
Some security operations observe a very you and ready to react? When you present a
strict chain of command or supervisory hierar- relaxed or lackadaisical image, people imagine
chy. An officer must be of a particular rank or this to be how you approach your work. When

XII. RELATIONS WITH OTHERS


BUILDING A COMMUNITY OF SUBSTANCE 553

you present a crisp image and a commanding emergency? Are you required to call a supervi-
bearing, people will see you that way. sor, or are you empowered by your agency to
Similarly, how you speak to people and manage your part of the incident without them?
engage in conversation with them is an important Under what conditions should you request law
part of building rapport and relationship. Do enforcement or fire/EMS? Are you able to make
you speak in clear English or whatever language that request on your own, or must you defer to
is most common for your environment? Or do someone else?
you use slang terms and phrases? Do you treat Established protocols, written guidance as
other people with respect, or even deference if part of a policy manual, would be ideal for you
they are senior to you, or are you insulting or as you determine your role in contact protocols
degrading? It can be a considerable challenge and relationship building to support the over-
to be respectful to those who challenge you, be all security effort. You will know which client
they malefactors, criminals, or otherwise decent or business contacts you may approach directly
people who are being redirected for some policy and about what, and which should be reserved
issue you have to enforce. for your supervisors. You will know what sorts
Sensitivity to the needs or issues of oth- of issues are your responsibility to address and
ers in how we interact with them can be very which should be referred to someone else. You
important. Employees or residents, for example, will also have some guidance on what is accept-
generally have a right to be in the area doing able interaction with various stakeholders you
whatever they do. Even when redirecting them, may encounter. If you do not have written guid-
you should do so in a way that respects this. In ance and you encounter others with any fre-
some cases you will need to be very sensitive quency, ask your supervisors how they want
to race, gender, ethnic, political, or other issues. you to interact.
What you may say in one such setting may be Remember, despite any apparent informal-
wholly inappropriate in another. Even when ity in interacting with others in the environment
the policy remains the same and your job is to you protect, your role there is part of a greater
ensure the safety and security of those people strategy. Your job as a professional security
and assets you protect, how you interact with practitioner is to recognize this and conduct
one person or group of people in a given situa- yourself in a manner that supports that strategy.
tion may be very different from how you inter-
act with another person or group of people in
essentially the same scenario. We would like to
believe we treat everyone similarly. In terms of
holding them all to the standards of safety and
security, or whatever rules we are charged to
Media relations is addressed elsewhere in
enforce, we do. However, everyone is different.
this book. As a strategic tool, though, the media
Motivating different people to follow those rules
can be employed as powerful allies in com-
or comply with your directives may require an
munity building. In-house operations may be
awareness of those differences and considerable
able to use internal business media. Whether
people skills on your part. Protocols from your
external or internal, positive stories with lots
operation and guidance from your supervisors
of background video or pictures can build the
can support you here.
reputation of the security operation and
What should you do when law enforcement
its efforts in the minds of the stakeholders.
or fire/EMS personnel are on site for some
Whenever a new and interesting deployment
or event presents itself, the media should be

XII. RELATIONS WITH OTHERS


554 43. COMMUNITY RELATIONS: MAKING THE STRATEGY COME ALIVE

invited to attend. Having dedicated person- of the complaint into a very positive cue of lis-
nel available to respond to any media inquiries tening and relationship building.
not planned is a good idea too. Those person-
nel should have some media savvy and be able
to field tough questions with dignity and class. THE TRANSFORMATION
Imagine the positive cues sent to your stake-
holders when they see your agency presented So what happens when a focused strategy is
well on the evening news; for that new contract determined, the brand established, the systems
or deployment, as subject matter experts on are in place to ensure positive experiences and
personal security in the workplace, or respond- manage total quality costs, and there is a com-
ing to a significant event like true professionals! munity relations effort in place? What happens
Complaints: Despite our best efforts, some- when you, similar to the janitor at NASA, can
one somewhere will still complain. Aside from say, “I make sure people can sleep at night”?
what we have already mentioned about how With all of the techniques of modern secu-
complaints represent costs of quality, they rity in the mix, and you bringing in the com-
should also be considered for what they are. munity of stakeholders as well, the entire
Almost every complaint presents some opportu- process becomes unimaginably more power-
nity for improvement. Some complainants do so ful. When you bring them the tools, and peo-
because they express a genuine concern. Perhaps ple are taught how and encouraged to assume
the complaint is about a real security risk. responsibility for the safety of their own com-
Maybe a point of contact called because an offi- munities or workplaces, or at least to play a
cer did not notice a key area was left unsecured more active role, complete transformations can
the night before. That is an important matter be seen. Crime-ridden neighborhoods become
and should be addressed decisively. The com- places where children can play without worry,
plaint presents an opportunity for the operation because the residents look out for each other.
to review its systems and ensure they are built to Workplaces with lots of machines and safety
prevent such things. Remember appraisal costs? hazards around become safer because fellow
Complaints like this inform the security opera- employees pay more attention. High-security
tion of some liability exposure that needs to be areas become less vulnerable to attack because
managed. We should appreciate them as such. those who work in and around them are more
Many times complainants just want to be aware of threats and threat indicators.
heard. The substance of their complaint may not Interestingly, Pine and Gilmore (1999) sug-
be such that it contains a material risk or any gest the next type of economy, after the expe-
exposure. But it is important to them. As they rience economy, will be the “transformation
are part of the community, we should make economy.” People will buy because they want
every effort to “hear” their complaint. Even if to become something else. They want to better
there is no reasonable resolution to be offered, themselves. As a competitive security opera-
more often than not, simply listening to the tion, can you build a transformation strategy
complaint, letting the complainant know that into your offering? As a security officer, can you
his concerns are important to us, and taking the play a role in transforming the community into
time to talk with them and explain matters fully a safer place? If so, then welcome. You are the
can go a long way to turning the negative cue professional practitioner of the future!

XII. RELATIONS WITH OTHERS


SECURITY QUIZ 555

EMERGING TRENDS
Over the past several years, businesses have as licensure and training requirements respec-
assumed more and more responsibility for the tively. The days of “observe and report” are fad-
safety and security of their facilities. Part of this ing away and being replaced with an expectation
shift may be attributed to perceptions of new to act, indeed even to be proactive.
threats from which assets must be defended, and As seductive as the technology is, however, it
the recognition that law enforcement agencies is significantly limited. Technology can be used
simply cannot do it all. Part may be a reaction well as a tool to supplement a security effort, but
to an increasingly complex legal environment it must never be used to replace the decision-
and an interest in mitigating liability exposures. making component that necessarily comes with
Governments have also made efforts to privatize operating a “people business.” A security officer
services where possible and have been reach- in the area, even when supported by technology,
ing out to private security agencies and service simply serves many environments better.
providers. Whatever the cause, we have seen our The private security officer is becoming less
industry grow quite a bit and it continues to do so. and less the “night watchman” rarely seen by
As more is being asked of us, we rise to the most of the public, or a figure behind a desk or
challenge to ensure the needs of our clients discreetly making rounds and barely noticed
or users are met. New technologies allow us by others in the area. The role is moving into a
to control access with greater certainty, moni- highly visible component of the security effort,
tor our areas of responsibility more efficiently, where the officer interacts with others and makes
or detect intrusions or variances more effec- decisions on the ground. As this continues, that
tively. Associations such as the International officer will have to understand his role within the
Foundation for Protection Officers and some reg- strategy of the agency or department for which
ulatory authorities continue to develop and pro- he works and he will have to develop a strong
mote professional standards or regulations such set of “people skills” in order to be successful.

References
S E CURI TY QU I Z
Campanella, J. (Ed.). (1999). Principles of quality costs, prin-
ciples, implementation and use (3rd ed.). Milwaukee, WI: 1. The society that wants to buy what they buy
ASQ Quality Press. based on the thrill derived from the item
Davidson, M. (1996). The transformation of management. purchased is an example of which of the
Boston, MA: Butterworth-Heinemann. following types of economy:
Pine, J. B., & Gilmore, J. H. (1999). The experience economy,
a. Agrarian economy
work is theater and every business is a stage. Boston, MA:
Harvard Business School Press. b. Service economy
c. Experience economy
d. Credit-based economy

XII. RELATIONS WITH OTHERS


556 43. COMMUNITY RELATIONS: MAKING THE STRATEGY COME ALIVE

2. Creating a positive experience involves being single place anyone has any contact
effective in which of the following: whatsoever with the operation.
a. The security officers must maintain an a. True
even temperament b. False
b. The security officers must be proactive 7. Our account representative, our executives,
when faced with problems or challenges even our officers should interact with our
c. The security officers must be liability client or overseeing executive as though:
conscious a. We know security
d. All the above b. We are in this together
3. Total quality costs include all the following c. We are in charge of the security effort
except: d. All the above
a. Prevention costs 8. Almost every complaint presents some:
b. High Federal tax cost a. Opportunity for improvement
c. Failure costs b. Issue that must be corrected
d. Appraisal costs c. Threat to the relationship with the client
4. In a service-related business, such as security, d. Evidence that someone is not doing the
total quality costs can be significantly job correctly
reduced by providing which of the following: e. Challenge that must be managed
a. A positive experience 9. The key to your success lies in your ability
b. A relaxation of rules and regulations to build which of the following with the
c. A self-inspection every five years communities in which you serve.
d. All the above (Choose the one best answer.)
5. The operation’s brand is a function of all a. A sense of profit for your company
of the experiences, as we explored above, b. A strong coalition of police and security
perceived by the various users of its services officers in the neighborhood
with whom the operation comes in contact. It c. Positive, meaningful relationships
is more than just a logo on a letterhead, it is between the company and the neighbors
also which of the following: d. Developing anti-crime strategies and
a. The uniform perimeter security for the company
b. The way the security officers present 10. The next type of economy, after the
themselves experience economy, will be the
c. The image of the operation at every transformation economy.
touch point a. True
d. All the above b. False
6. Branding is about the image of the operation
at every touch point, at every

XII. RELATIONS WITH OTHERS


C H A P T E R

44
Networking and the Liaison
Function
Brion P. Gilbride

(Reference.com, 2009). Most people, however,


CHAPTER OBJECTIVES refer to these relationships as “networking.”
● Describe the various types of liaison and Contacts made with other professionals can
networking activities enhance both the security operation as a whole
● Provide scenarios describing interactions as well as the security professional working for
that present networking opportunities it. Bear in mind that these liaison relationships
can also come from membership in professional
organizations, academic institutions, and even
organizations that sponsor events such as the
local Chamber of Commerce.
The security professional is often the pub- Although it may seem commonplace, the
lic face of an organization, whether working importance of networking cannot be overstated.
directly for that organization or under a con- As an employee in a proprietary security or pub-
tract assigned to it. Each day, security personnel lic safety department, retail loss prevention oper-
deal with people, especially fellow company/ ation, contract guard service, or law enforcement
client employees, management, law enforcement agency, the security officer is the guardian of
officials, emergency response personnel, and the interests of the company that he/she serves;
government inspectors or agents. Professional the security officer protects the company’s
relationships with these people can potentially assets, its personnel, its reputation, and its inter-
impact the security professional in a variety of ests. It is also in the security professional’s own
positive ways. The best description of these interest to establish and maintain these relation-
relationships comes to us from the term “liaison.” ships. For example, if a job requires a security
According to Reference.com, liaison is defined practitioner to conduct a preliminary investiga-
as “the contact or connection maintained by tion into something—be it a fire alarm, shoplift-
communications between units of the armed ing report, suspicious person, fake identification,
forces or of any other organization in order or a stolen credit card—professional relationships
to ensure concerted action, cooperation, etc.” can be key to providing timely and actionable

557
558 44. NETWORKING AND THE LIAISON FUNCTION

information to the appropriate authorities or that combines access control, CCTV, fire control
even resolving the situation entirely. Through and suppression, and environmental monitor-
professional success, one proves the value of ing systems.
maintaining the security operation. In a tight
economy, this could mean the difference between
walking on patrol versus walking the unemploy- FIRST SCENARIO: FIRE
ment line.
Most important to the security professional A fire occurred at a manufacturing facility,
will be the opportunities that liaison relation- on the manufacturing floor. Some equipment
ships may bring. With the post-9/11 and post- was damaged when the sprinkler system was
Katrina emphasis on the Incident Command activated and two employees were treated for
System (FEMA, 2009) and the interchangeable smoke inhalation because it took several min-
roles involved, the security professional will utes to put the fire out. The responding security
likely be the first-on-scene presence at an inci- professionals did one or more of the follow-
dent, meaning that he/she will function at least ing: assisted in moving injured people to safety,
temporarily as Incident Commander as other extinguished the fire, cleared and secured the
assets are called up. That will bring the secu- area, or reported the incident to management.
rity practitioner into contact with police, fire, As a result, those security practitioners probably
EMS, local, state, and even federal officials as met with and assisted police, firefighters, and
the response is organized. Contacts made in EMTs. If the manufacturing operation involved
that situation could lead to proposing or even HAZMAT, the security practitioners may also
organizing a tabletop exercise among various have been in contact with the local HAZMAT
entities for future responses. Such a gathering unit or the company’s internal HAZMAT-trained
would likely be noticed by company manage- staff regarding possible dangers or containment
ment or possibly the local media, and in turn scenarios. They may have written a report on the
could lead to promotion, training opportunities, incident for presentation to the security manager
or a new position elsewhere. Although promo- or director. Because equipment was damaged
tion or new positions also heavily depend on and people were injured, a variety of entities will
a security professional’s performance, the net- take an interest in the report and will likely want
working possibilities and what they could offer to interview the security professionals regarding
are quite real. the events. The corporate insurance company’s
Many liaison contacts will be formal profes- representatives may be interested, as well as
sional relationships (i.e., those that are built corporate counsel, OSHA or its state-level coun-
through one organization interacting with the terpart, local fire department investigators, and
security team at a particular location). There are perhaps local code enforcement officials (see
a multitude of scenarios through which these Figure 44-1). That is a sizeable group to be faced
relationships could be built. For the purposes with as a security practitioner, especially over
of this chapter we will examine five scenarios one incident.
that could occur, irrespective of location or dis- Each one of these subsets is a potential contact,
cipline within the security profession. Three of even if it might not seem so at the outset. Local
these scenarios are incidents: a fire, a vehicle law enforcement, firefighters, and EMTs are good
break-in, and a special event such as a VIP fac- contacts because security professionals are likely
tory tour. The fourth scenario involves normal to see them more than once; accordingly they
security operations at a seaport facility. The fifth offer the best opportunity to form relationships.
scenario is the installation of a central station Their benefit to the security professional will be

XII. RELATIONS WITH OTHERS


SECOND SCENARIO: VEHICLE BREAK-IN 559
FIGURE 44-1 Investigation of
Fire occurs. a fire—networking possibilities.
Officer
responds.

Fire
Company EMS
department
investigation met and assisted
met and assisted

Insurance Fire
OSHA
company department
investigation
investigation investigation

one of familiarity—ideally the security practi- insurance or legal departments could mean
tioner will be recognized as competent and not increased responsibility; the manager might task
prone to frivolous use of emergency response the security professional with addressing such
services. In turn, emergency response services incidents in the future or drafting/revising the
personnel will recognize and pass on to their company’s Standard Operating Procedures for
coworkers that a call from the security profes- critical incidents. Such accomplishments might
sional is likely to be legitimate. Whether this is also lead to other opportunities within the com-
morally appropriate is debatable; however, the pany. Finally, contacts within OSHA could be
company/client’s interests are paramount here, valuable in terms of both potential training oppor-
and a quick and professional response from tunities and information-sharing capabilities.
emergency services is in the company/client’s Helping to address safety issues with knowledge
best interest. The HAZMAT specialists are valu- of OSHA requirements can be a career enhancer,
able resources for inquiries about specialized particularly if an inspection or audit is coming up.
training or for information on responding to haz- OSHA is a regulatory agency that seeks compli-
ardous material issues in their absence or before ance; therefore OSHA contacts can provide criti-
they can be mobilized. cal information or referrals to other contacts who
In a similar vein to the HAZMAT personnel, can answer questions or help resolve dilemmas.
valuable networking contacts may be encoun-
tered after the incident. Positive meetings with
internal company officials could lead to conside- SECOND SCENARIO: VEHICLE
ration for other career opportunities within the BREAK-IN
company. Doing well in front of those that make
promotional decisions is important. The favor- Consider another scenario that can occur
able opinion of representatives from the corporate at a large shopping mall with several parking

XII. RELATIONS WITH OTHERS


560 44. NETWORKING AND THE LIAISON FUNCTION

garages. The mall security officers receive a and in recent weeks has faced protests at every
report that a vehicle has been found with a public appearance. In this situation there are
smashed driver’s side window and items numerous entities and individuals that are
appear to be missing from the car. The vehi- potential networking contacts. Let’s begin with
cle owner wants to file a report with the local the smallest group and work outward.
police. The mall security officer will likely meet The governor will likely have a protective
the responding police officer and share infor- detail—in this case they will be state police
mation for both the police officer and mall troopers on assignment. That protective detail
security’s own internal report. The mall secu- will handle arrival and departure arrange-
rity officer may have secured the scene and ments for the governor. They will have advance
interviewed the vehicle owner and/or poten- staff coming before the event to assess the best
tial witnesses. As with the fire scenario, mall routes, the layout of the facility, entry and
security personnel are likely to encounter the egress points, and other issues. Contract secu-
responding police officer(s) on other occasions, rity guards may meet with these people, escort
hence forging positive relationships with them them throughout the facility, explain the secu-
will help the mall security officer to do his/ rity precautions normally in place, or assist in
her job. For this incident, investigators from the other ways. These individuals can be valuable
police department may follow up on the com- connections for a variety of reasons—their
plaint. Detectives might request surveillance experience in law enforcement, their experience
camera footage, time-stamps on the time the as protective details, and their proximity to a
vehicle entered the garage if it is a pay-to-park senior government official. Aside from the gov-
facility, information on other similar incidents ernor’s protective detail, there will be officials
in recent days that may not have generated from the local and/or state police jurisdiction
a police report, or something else. A relation- involved in a variety of functions—traffic con-
ship with local investigators might lead to trol, crowd control, vetting functions, counterin-
training opportunities or even participation in telligence, and K-9 operations. Law enforcement
multiple-agency operations related to auto theft officials have considerable training in these
and similar crimes. Depending on the situation, functions and have access to a wide spectrum
the National Insurance Crime Bureau (NICB, of information. Networking relationships here
2009) may also be involved in an investigation. could lead to potential training opportunities,
That entity deals with vehicle theft and fraud access to open-source information systems not
of all kinds, and contacts there could lead to previously utilized, and contacts within the var-
training opportunities or beneficial information ious disciplines. In addition, the fire department
regarding theft and fraud issues. will be involved with capacity issues, fire safety
and inspections, and other functions. Local
EMS units will also be involved to determine
THIRD SCENARIO: SPECIAL staging and/or triage locations, the number
EVENT of personnel necessary to cover the event, and
other functions. As with the fire scenario men-
The third scenario involves a state governor tioned earlier, working side-by-side with fire
giving a speech at a large multifunction sports and EMS officials provides perspective as well
facility staffed by contract security guards. At as ideas for future trainings or multiple-agency
the conclusion of opening remarks, the governor operations. Company management officials will
will give a 30-minute speech. The governor was be involved at all levels, providing support and
recently the subject of an ethics investigation guidance. The contract guard company may

XII. RELATIONS WITH OTHERS


FOURTH SCENARIO: SEAPORT OPERATIONS 561
Protective detail

Access control

Grounds and parking lot

Access roads

FIGURE 44-2 Elements of VIP security scenario. Regardless of your role, these four rings represent the major roles that
would be covered with regard to physical security in the event of a VIP visit at your location. Each of these rings represents
a different skill set and different types of personnel/agencies involved, all of whom could be potential liaison contacts.

supplement existing security staffing by hiring to mind first—the port security officer works
additional staff for various duties, such as park- directly for them. There are many networking
ing lot patrols, escort duties, access control at opportunities there; seaports are always being
the doors, or other functions. The liaison possi- toured or visited by the various agencies that
bilities in an event like this are tremendous (see work within it. There is usually a represen-
Figure 44-2). tative of the Port Authority involved during
these events. Performing duties professionally
when these representatives are in the area cre-
FOURTH SCENARIO: SEAPORT ates an opportunity for security personnel to be
OPERATIONS noticed. The Port Authority usually maintains
business offices, warehousing facilities, trans-
Even without an incident occurring, some portation equipment, and other infrastructure
security operations offer considerable net- involved in operating a seaport. The port secu-
working opportunities by their very nature. rity officer will deal with a variety of unique
Consider a port security officer working for a issues relating to warehouse security, container-
Port Authority. The port security officer’s job ized cargo, security seals, bonded warehouses,
is to provide security for the seaport and all of crew members detained on board their vessel,
the various facilities within it. How many dif- and other issues.
ferent entities could be encountered in a situ- Beyond the Port Authority officials, a variety
ation like that? Port Authority officials come of agencies in the United States, for example,

XII. RELATIONS WITH OTHERS


562 44. NETWORKING AND THE LIAISON FUNCTION

have jurisdiction over a seaport, particularly draw from regarding everything from naviga-
one receiving foreign-arriving vessels. With tion laws, security bolt seals, container safety,
regard to the vessels themselves, two agencies confined space and HAZMAT training, law
have jurisdiction: the U.S. Coast Guard and enforcement techniques, concealment methods,
U.S. Customs and Border Protection (CBP), document fraud, knowledge of immigration
both of whom are under the U.S. Department laws relating to crew members, and more.
of Homeland Security. Their duties differ some- It is likely that in a seaport environment the
what: the Coast Guard is more interested in port security official will encounter these state
vessel and port facility safety while CBP is more officials on a daily basis and will get to know
interested in the immigration and customs pro- them professionally. For those that are willing
cessing of the people and cargo onboard the to share, there will be much for the port security
vessel. CBP’s interest also covers the ware- officer and state official to learn from and teach
houses operated by the Port Authority that each other. The utility in this type of network-
receive the offloaded cargo. On the state level, ing is largely knowledge-based. It is doubtful
most states have a Division of Waterways or that these individuals impact hiring decisions;
Natural Resources or something similar. Those however, what they can share is knowledge of
agencies will have an interest in the port facili- the hiring processes, time frames, and qualifica-
ties as well as the vessel and its cargo. These tions involved should one seek a career change
agencies have a diverse array of experience to (see Figure 44-3).

FIGURE 44-3 Relationship


diagram—the security officer.
Federal
regulatory:
OSHA
EPA

Emergency Law
services: enforcement:
Firefighters Police
Medics Officers
HAZMAT Detectives
The
security
officer

Company or Federal
client enforcement:
management CBP
officials Coast Guard

XII. RELATIONS WITH OTHERS


PROFESSIONAL ORGANIZATIONS AND TRAINING 563

FIFTH SCENARIO: INSTALLING A tens of thousands in lost productivity. Someone


CENTRAL STATION who is not proficient with the CCTV equip-
ment may not know that a still picture can be
The final scenario involves installation of printed on the thermal printer of a particular
a central security location at a big-box store. It frame of CCTV video, much less how to print it.
will be equipped with computers and moni- That lack of knowledge could be the difference
tors for the proximity card access control sys- between a closed theft case versus an unsolved
tem, a fire detection and suppression system, one. It is in the loss prevention agent’s best
CCTV with digital storage and thermal printer, interest to know as much about the equipment
and an environmental monitoring system. This they use in their daily work as possible. The
means that loss prevention agents at the store best people to explain what the various systems
will need to be trained on using and maintain- do are the people who install them.
ing this equipment. It is likely that a different
company handles each system, meaning mul-
tiple training sessions, different troubleshooting PROFESSIONAL ORGANIZATIONS
techniques, and different contacts should a sys- AND TRAINING
tem malfunction.
In terms of networking, there is opportunity These five scenarios are not in any way an
here. The technicians who install the equip- exhaustive list of opportunities for establishing
ment and/or set up monitoring systems to networking relationships with outside individu-
work with existing equipment will likely be the als or groups. Professional development groups
same people the loss prevention agents would can also introduce a wide variety of profession-
call in the event of equipment malfunction or als with whom a liaison-type relationship is
damage. Technicians may not come to the store beneficial. There are a variety of professional
for relatively minor problems, but will likely organizations out there for security officers. For
talk through minor equipment issues with the example, there is the International Foundation
loss prevention agents. The more issues that for Protection Officers (IFPO, 2009), which spe-
can be resolved without a service call, the more cializes in entry-level and intermediate security
money loss prevention agents could potentially officer training and certification. There is the
save the organization. Those savings are usu- American Society for Industrial Security (ASIS,
ally quantifiable and therefore would likely be 2009), which specializes in advanced train-
of benefit to the security operation as a whole. ing and certification for security officers. There
The more knowledge loss prevention agents is the International Association of Healthcare
can obtain regarding how the equipment in Safety & Security (IAHSS, 2009), which spe-
their facility functions, the more valuable they cializes in entry-level and intermediate secu-
will be in general. Someone who is only profi- rity officer training and certification within the
cient with the CCTV equipment may not know health care field.
what to do if the access control system requires Networking opportunities within these orga-
security personnel to produce and issue security nizations are numerous. ASIS, for example,
badges. Someone who is only proficient with holds monthly chapter meetings in many loca-
the access control equipment may not know tions. The meetings may include guest speakers
how to deal with a fire panel; knowing the dif- or discussions on issues affecting the security
ference between a ground fault and a legitimate profession. ASIS members, due to the advanced
alarm condition may be the difference between training the organization offers, are often former
hundreds of dollars in minor damage versus military or law enforcement officials and as such

XII. RELATIONS WITH OTHERS


564 44. NETWORKING AND THE LIAISON FUNCTION

have a variety of contacts throughout the profes- off-duty law enforcement officer, needs to be
sion. The IFPO has numerous training offerings, aware of the regulations pertaining to their
culminating in the Certified Protection Officer work as well as those of the agencies and indi-
(CPO) and Certified in Security Supervision viduals who enforce them.
and Management (CSSM) designations. The For example, in the United Kingdom the secu-
IFPO has instruction manuals for its programs rity industry is regulated by the Security Industry
that are written by authors from various disci- Authority (SIA). The SIA was established by the
plines throughout the security profession and Private Security Industry Act of 2001 (SIA, 2009)
are updated periodically to keep the material and has subsequently been amended several
fresh and to keep up with the tremendous tech- times. The SIA deals primarily with the licens-
nological advances of the past 10–15 years. The ing of security industry employees working in
IAHSS has regions and meetings as well as certi- the following job classifications: CCTV, close
fication programs geared toward guard and offi- protection, door supervision, event security, key
cer positions or management, such as Certified holding, private investigation, security consul-
Healthcare Security Officer (CHSO) and Certified tancy, security guarding, and vehicle immobi-
Advanced Healthcare Security Officer (CAHSO). lizing. In addition, companies hiring personnel
In addition to professional organizations, there for these activities are able to check the license
are a variety of educational institutions offering status of employees and/or job applicants. The
associate’s, bachelor’s, and even master’s degrees SIA maintains a registry of current, revoked,
in security-related disciplines. These degree pro- and suspended licenses. Companies may apply
grams, although considerably more expensive for accreditation by the SIA as “Approved
and time-consuming than a certification or train- Contractors” by meeting certain standards. They
ing program, also offer networking opportuni- must renew this designation periodically, are
ties. Many institutions employ instructors and subject to independent assessment annually, and
professors in the security discipline that have there exists a mechanism to report malpractice
had real-world experience in the field as security by an “Approved Contractor” (SIA, ACS, 2009).
professionals, law enforcement, or prior mili- Those regulated by the SIA are required to
tary personnel. Many students also have diverse provide documents or information relating
backgrounds that could provide networking pos- to any matter regulated by the SIA. Persons
sibilities. As with the professional organizations, who are regulated by the SIA include security
these individuals will have diverse contacts as contractors and their employees, managers and
well as capabilities of their own that may posi- supervisors of contract security providers, direc-
tively impact one’s career. tors of companies and partners even if they do
not carry out security functions themselves,
and vehicle immobilizers as well as employ-
INDUSTRY REGULATION BY ers or managers of them. It should be noted
GOVERNMENT that under the Private Security Act of 2001,
proprietary staff, even if supervising contract
In an increasing number of countries, the employees, are generally not subject to licen-
private security industry as a whole is sub- sure (SIA, License Requirements, 2009).
ject to regulation by governmental or quasi- South Africa has a similar arrangement.
governmental bodies. Accordingly, the security Their licensing apparatus is maintained by the
professional, whether a mall security officer, Private Security Industry Regulatory Authority
loss prevention agent, contract security guard, (PSIRA). The PSIRA’s mandate derives from
armored car driver, night watchman, or even the Private Security Industry Regulatory Act

XII. RELATIONS WITH OTHERS


INDUSTRY REGULATION BY GOVERNMENT 565
of 2001. Those regulations require that any per- both the employer and the employee and does
son seeking to be a “security service provider” so via the Department of Criminal Justice
must apply for such a designation through the Services. A person applying for a position as a
PSIRA. In doing so, the applicant must provide security officer (armed or not), private investi-
proof of South African citizenship or perma- gator, armored car operator, personal protection
nent residency, fingerprints, a clearance certifi- specialist, canine handler, or electronic security
cate regarding the applicant’s criminal record, provider/technician must be 18 years of age
and documented proof that the applicant has at the time of application, must have proof of
completed security training courses recognized completion of the necessary training courses (to
by the PSIRA. The PSIRA also requires that DCJS standards) for the type of application they
any applicant, if a former member of a military seek, proof of U.S. citizenship or legal permanent
force, intelligence service, police, or security resident status, and must submit fingerprints
agency, must obtain a clearance certificate from (Regulations Relating … 6 VAC 20-171-120).
that entity as well, if possible. Businesses pro- Security service providers in Virginia are regu-
viding security services must also be designated lated in a somewhat more stringent fashion than
and must provide a list of shareholders or part- their personnel. To apply for a business license
ners in the venture, tax clearance certification, under any of the aforementioned positions, all
trust deed, and information pertaining to the principals and supervisors of the business must
company’s ability to provide a security service submit fingerprints, must obtain a $100,000 surety
(Regulations Made … 2001 2(1) through 2(8)). bond, a Virginia corporate identification number,
The PSIRA, by virtue of their regulations proof of a physical location in Virginia, and they
under the Act, regulates the operation of security must designate a compliance agent (Regulations
service providers in a variety of ways. Issues Relating … 6 VAC 20-171-50). A security service
falling under their purview include infrastructure provider in Virginia must maintain all documen-
of regulated companies. This includes the physi- tation on any employee during that employee’s
cal facilities, telephone and facsimile equipment, entire tenure plus 3 years beyond the date they
sufficient security equipment, vehicles, and fire- separate. Such information includes date of hire,
arms (Regulations Made … 2001 5(1) through any training documentation, proof of U.S. citi-
5(3)). Security service providers are required to zenship or legal permanent residence status, and
provide information on the business and all of its proof of their fingerprint submission. If any prin-
subsidiaries and offices, employees, all applicable cipal, supervisor, or employee of a security service
licenses, and all firearms permits held (Regulations provider is found guilty, pleads guilty or nolo con-
Made … 2001 6(1) and 6(2)). Record keeping is tendere, or is convicted of a misdemeanor or a fel-
also covered, to include an electronic list of all ony, the provider must notify DCJS (Regulations
security personnel, ID numbers, all wages and Relating … 6 VAC 20-171-220).
pay stubs, attendance records for all locations, The security professional, the loss preven-
duties performed at all locations, the names of tion agent, or the armored car operator are all
personnel on duty at any location at any time, and impacted by the regulatory regime in what-
any disciplinary actions taken against security staff ever jurisdiction they work. It is also possible
(Regulations Made … 2001 10(1) through 10(8)). that local, state, or federal regulations overlap.
In the United States these arrangements are Regardless, the security professional must make
largely regulated on a state-by-state basis, if at all. sure that he/she meets the necessary legal
For example, the state of Virginia has regulations requirements to work in their chosen field. That
enacted for security officers and providers. As will require compliance with the bureaucracy
with the previous examples, Virginia regulates that oversees the field. Any relevant applications

XII. RELATIONS WITH OTHERS


566 44. NETWORKING AND THE LIAISON FUNCTION

should be completed properly and submitted in Author Unknown. International Foundation for Protection
a timely manner—it behooves the applicant to be Officers (Naples, FL: International Foundation for
Protection Officers). Available: http://www.ifpo.org.
sure everything is ready before submitting mate- Accessed June 30, 2009.
rials. All three examples of regulated security Author Unknown. American Society for Industrial Security
positions might be subject to an audit or a valida- (Alexandria, VA: American Society for Industrial
tion conducted by the licensing entity. A security Security). Available: http://www.asisonline.org.
officer could be tasked with assisting auditors, Accessed June 30, 2009.
Author Unknown. International Association of Healthcare
which provides potential networking opportu- Security & Safety (Glendale Heights, IL: International
nities. The security professional who has a good Association of Healthcare Security & Safety). Available:
working relationship with the auditing agency http://www.iahss.org. Accessed June 30, 2009.
or is knowledgeable about the process will be Author Unknown. Welcome to the SIA (London, UK: Security
noticed. Any audit that is completed without Industry Authority). Available: http://www.the-sia
.org.uk/home. Accessed July 1, 2009.
problems is a successful one. Author Unknown. License Requirements (London, UK:
Security Industry Authority). Available: http://www
.the-sia.org.uk/home/about_sia/legislation/psia_3-6.
CONCLUSION htm. Accessed July 1, 2009.

The liaison function, better understood as net-


working, is a critical part of day-to-day perfor- SECURITY QUIZ
mance as a security professional, contract guard, 1. Contacts made outside your company
loss prevention agent—any security practitioner. with other professionals tend to enhance
The relationships formed during the course of a both the security operation as well as the
security professional’s work, from membership security professional. Professional liaison
in professional organizations or due to academic relationships can come from all the following
interests, will sustain the security professional except:
as well as his/her career for years to come. With a. Taking classes in academic institutions
the proliferation of social networking Web sites, b. Memberships in professional association
e-mail, and technology in general, it is far easier c. Colleagues you work with on the job every
to build and foster these relationships than it day
was in the past. However, nothing can substi- d. Organizations that sponsor events
tute for face-to-face contact and a good reputa- 2. The elements of VIP protection include
tion. Networking is just acknowledgment that protective detail, access control, armored
everyone can use a little help. limousines, and fire arms proficiency.
a. True
References b. False
3. Performing duties professionally when VIPs
Author Unknown. Liaison. (Dictionary.com, LLC). Available:
 http://dictionary.reference.com/browse/Liaison  . are in the area creates an opportunity for
Accessed June 23, 2009. security personnel to be noticed by some very
Author Unknown. Incident Command System Overview influential observers.
(Washington, DC: Federal Emergency Management a. True
Agency). Available: http://www.fema.gov/emergency/
b. False
nims/IncidentCommandSystem.shtm. Accessed June 30,
2009. 4. When emergency situations occur, the first
Author Unknown. National Insurance Crime Bureau (Des responding security officer is expected to
Plaines, IL: National Insurance Crime Bureau). Available: take certain emergency steps. When public
 https://www.nicb.org/cps/rde/xchg/nicb/hs.xsl/
index.htm. Accessed June 30, 2009.

XII. RELATIONS WITH OTHERS


SECURITY QUIZ 567

assistance arrives, what they find can bring may arrive asking for additional help
recognition for that first responding security providing even a further opportunity for
officer. Which of the following is one of those valuable contact development. Which of the
recognition tasks: following are ways to be of assistance:
a. Immediately move injured people to safety a. Providing surveillance camera footage to
regardless of injuries the investigators
b. Immediately commence using emergency b. Time-stamp information on garage parking
rescue equipment to reach victims c. Incident reports from the past that did not
c. Clear the area of all non-emergency generate a police report
persons, secure the incident scene d. All the above
providing an unobstructed work area, and 8. A relationship with police investigators might
report conditions to management lead to which of the following:
d. None of the above a. Participation in multi-agency operations
5. Which of the following are good contacts for b. Training opportunities
the security professional to make contact with c. Both a & b
because they offer the best opportunity to d. None of the above
form long lasting relationships with: 9. Professional development groups, like
a. Local firefighters the IFPO and ASIS International, can also
b. Local law enforcement introduce a wide variety of professionals with
c. Local EMTs whom a liaison-type relationship is beneficial.
d. All the above a. True
6. Networking relationships are valuable b. False
because they can lead to training 10. Every large company in the United States
opportunities. employs instructors in the security discipline
a. True that have had real-world experience. This
b. False provides future opportunities for security
7. As for fire emergencies, security personnel professionals with good networking
might be in a position to assist the responding capabilities.
police officers hence forging positive a. True
relationships with local law enforcement. b. False
Detectives from that same police department

XII. RELATIONS WITH OTHERS


This page intentionally left blank
C H A P T E R

45
Ethics and Professionalism
Christopher A. Hertig

organizations that are stricken by serious scan-


CHAPTER OBJECTIVES dal, there are legal costs, increased personnel
● List and define key terms and concepts turnover, and lowered efficiency by a demora-
● Provide a guide to ethical decision lized workforce.
making An additional concern regarding ethics and
professionalism is the role that protection offi-
● Review ethical issues in protection cers play for the public at large. As protection
● Discuss reasons why unethical behavior officers increase in number and take on an
occurs increasing array of functions that place them
in contact with the public, it becomes readily
apparent that there is an acute need for higher
standards of professionalism. Consider the fol-
lowing trends:
The business realities of contemporary man- ● A steady increase in the number of security
agement require that security (asset protection)
personnel, particularly in the contract service
efforts provide protection for all of an organiza-
sector.
tion’s assets, including people, property, infor-
mation, and image. Asset protection should ● Increased contact with the public.
incorporate Bottom and Kostanoski’s WAECUP Contemporary protection officers are more
model in order to address these concerns. This commonly found in shopping centers, office
model asserts that losses stem from waste, acci- buildings, and parks, than they are in the
dent, error, crime, and unethical/unprofessional warehouses and industrial facilities that
practices. Under unethical/unprofessional prac- were guarded by their predessors.
tices are dissemination of confidential informa- ● Gradual—yet often unrecognized—
tion, lying to clients, discrimination, profanity assumption of duties formerly performed
in public, poor relations with law enforcement, by public entities, such as maintaining
EMS and other security organizations, and order at special events, transporting
slovenly dress. Most of this loss relates to nega- prisoners, and responding to alarms
tive public/client image. Additionally, within (privatization).

569
570 45. ETHICS AND PROFESSIONALISM

Obviously, the role played by security officers V. Dress to create professionalism.


is changing. When one looks at future trends, it VI. Enforce all lawful rules and regulations.
becomes apparent that: VII. Encourage liaison with public officers.
VIII. Develop good rapport within the
profession.
The Greatest Issue in Public Safety Is IX. Strive to attain professional competence.
Private Security X. Encourage high standards of officer
From a personal perspective, officers should ethics.
realize that those individuals who are unethi- Duty: a professional obligation to do a certain
cal and unprofessional do not have rewarding thing. Protection officers have a duty to protect
careers. They are snubbed by colleagues and the lives and property of employees, conduct pro-
superiors, passed over for promotion, and ter- fessional investigations, maintain order, and assist
minated from employment in the more serious visitors/employees/customers. Duties may be
cases. The most extreme cases result in revoca- established by statute, custom, or contract.
tion of licenses that the officer may possess, and
civil and criminal liability.

Professionals Think in Terms of Their


Those Who Make the Wrong Choices Do Duties and Obligations, Not Their
Not Last Authority!
Protection officers must be equipped with the Professional: one who practices a profession;
decision-making skills and professional knowl- one who has special knowledge and skill that
edge to make the right choices. For too long, results from advanced training and education.
words such as “professional” have been used Often, an apprenticeship is required, such as
indiscriminately, without a complete examina- for the experience qualifications necessary for
tion of their meaning. Understanding what the professional certification (Certified Protection
terms represent is a necessary step toward adopt- Officer, Certified in Security Supervision and
ing and implementing professional behavior. Management, Certified Protection Professional,
and so on). Professions have professional codes
of ethics and professional organizations to
KEY TERMS AND CONCEPTS which members belong. A professional is loyal
to his or her chosen profession. A true profes-
Ethics: the study of good and bad conduct sional has the following:
within a profession. Ethics deals with the exam-
1. Education relating to the profession.
ination of moral philosophy, combined with the
2. Training for the tasks and duties that must
duties and obligations within a certain profes-
be performed.
sion. Ethical behavior results when the correct
3. Experience within the profession. Sometimes,
ethical decisions have been made and carried
an apprenticeship or internship is served.
out. The International Foundation for Protection
4. Collegiality with coworkers. This includes
Officers Code of Ethics is:
aiding and assisting those they work with;
I. Respond to employer’s professional needs. never demeaning colleagues.
II. Exhibit exemplary conduct. 5. Exclusivity. There are requirements that
III. Protect confidential information. must be met to be a professional. Not just
IV. Maintain a safe and secure workplace. anyone can do it! These may be in the form

XII. RELATIONS WITH OTHERS


KEY TERMS AND CONCEPTS 571
of a license, certification, or completion The acronym DEPORTMENT provides add-
of challenging, professional development itional insight into the meaning—and practical
(education and training). application—of the term.
6. A commitment to the profession, marked by D—dress as a representative of your
continuously striving for excellence. employer and/or client.
7. Recognition from the public being served E—efficient in performing both routine and
that the individual is a professional. emergency job duties.
The acronym PROFESSIONAL outlines the P—precision. Ironed shirts, neatly combed
attributes of a professional: hair; all buttons, zippers, and pins
properly secured.
P—precise, exact, detailed O—organized on the job.
R—responsive to clients and the public R—responsive to customers, clients, visitors,
O—objective in thought, free of prejudice and community members; approachable.
and preconceived notions T—talk as a professional does, using proper
F—factual in all reporting processes, honest English.
E—ethical M—manners—respect for others—exhibited
S—sincere about doing the best job possible at all times.
S—striving for perfection by constantly E—edit and review interviews and notes
trying to improve one’s job performance before concluding these segments of an
I—informed about events and trends within investigation.
one’s profession N—nurture professional growth and
O—observant of people and the work development at all times; strive to learn!
environment T—timely; being on time is essential.
N—neat and orderly in dress and work “Fashionably late” is out of style in
A—accommodating and helpful to others professional settings.
L—loyal to one’s employer, clients, and Manners: manners are simply accepted means
profession of conducting oneself in public (i.e., politeness).
They consist of consideration and respect for oth-
Deportment: how one carries oneself,
ers. They are social graces. A few basic tenets of
bearing, outward manifestation of attitude,
proper manners are:
and image. A few things to bear in mind about
deportment are: ● Allow people to talk and express their views;
DO NOT INTERRUPT! Not only does this
● Dress should be neat, precise, and conservative. reflect good manners, but it is effective
● Shoes should match belt. interviewing. The truly professional protection
● No purses for women. officer makes every conversation an interview.
● Socks should always match the pants and ● Be respectful of people’s input. Compliment
cover the calf. rather than criticize.
● Conservative ties, properly tied; silk is a ● Praise others when appropriate. Be genuine
good choice of material. in doing so.
● Jewelry worn judiciously. ● Stand up to greet people entering the room,
● “Less is more” with makeup and cologne. especially women, clients, or VIPs. This is
● Uniforms should be worn uniformly. All a sign of respect and consideration. It is an
officers should have the same placement of opportunity to create a personal bond that
insignia and equipment. no true professional can afford to pass up.

XII. RELATIONS WITH OTHERS


572 45. ETHICS AND PROFESSIONALISM

ETHICAL DECISION MAKING Ethical decision making must be real. It must


exist in everyday work situations. Using the
Protection officers must be equipped with the PORT acronym can help to maintain ethical con-
ability to make professional judgments. They need duct by protection professionals.
to be proficient at decision making as it applies
to ethics. Basic decision making involves prob-
lem solving. Problem solving consists of the ETHICAL ISSUES IN PROTECTION
following steps:
There are a number of ethical issues that
1. Identify the problem. There should be are pertinent to the protection of assets. These
a descriptive definition of the problem. include the following.
Inadequate problem definition often results Both police and security personnel have had
in poor decisions being made. a historic involvement in class struggles. These
2. Determine if a decision needs to be made include labor disputes during the 19th and early
immediately or if it can wait. 20th centuries (in North America). Today, both
3. Research the various options that are public law enforcement and private protection
available; many poor decisions stem from officers face the ethical issue of removing home-
a failure to fully explore all of the options. less persons looking for a place to sleep, often
Professional knowledge of law, technology, in areas under officer patrol.
and organizational structure/chain of Violation of privacy by using privileged
command is important in understanding all information they have obtained from police. In
of the options. some cases, people use their “networks” to tap
4. Choose an option. Pick the one which seems into restricted databases. Private security and
best. private investigative personnel may have con-
5. Implement the decision. Put it into effect. tacts with public law enforcement personnel
6. Evaluate the decision and follow through. who provide them with restricted information.
This means seeing how it works and In other cases, public law enforcement person-
reporting/documenting it. Keeping nel who are moonlighting use these databases
superiors informed is always important! to run their own investigative and security
Soliciting feedback from them is essential. services.
A practical, “real-world” method of dealing Another information issue involves celebrities.
with ethical dilemmas can make use of simple, Some protection officers exploit their position as
easy-to-remember acronyms. Once the problem Personal Protection Specialists (PPS) to acquire,
has been identified, the ethical dilemma can be and then divulge, confidential information. In a
managed by use of the PORT acronym: society that is obsessed with celebrities, this is
difficult to control. Being able to trust someone
P—problem—define and describe it. If to guard a principal and their family and not vio-
possible, write a sentence or two describing late their privacy will be an increasing challenge.
it. While the major risk is with close protection PPS
O—options—what are they? Be sure to list personnel, there are also uniformed officers who
all of them. guard the estates, offices, and dressing rooms of
R—responsibilities to employers, family, the celebrities.
public, the profession, and so on. Another issue with celebrities and/or VIPs is
T—time; the test of—“How will I feel about when protection staff subjugate themselves to
my decision in 20 years?” the principal or their family. They become more

XII. RELATIONS WITH OTHERS


WHY UNETHICAL BEHAVIOR OCCURS 573
like servants than professionals. PPS personnel cannot be sold. Criminal prosecution costs mer-
are not housekeepers or babysitters. They are chants money, so we have enacted laws in most
protection professionals. states that enable a merchant to have a civil
There is also abuse of force in protecting celeb- demand letter sent to a shoplifter. Collecting on
rities. It may be easy for a PPS or an event secu- the civil demand is a temptation for merchants.
rity staffer to use force liberally when in a crowd They may see this as a way to defray their loss
situation. Some celebrities actually may encour- prevention expenses, rather than as a means of
age such displays of aggression, and there may making them whole when victimized by shop-
not be good witnesses to file civil or criminal lifters.
charges against the protection staff that do this.
Covering up or facilitating the bad behavior of
the principal. Some principals do things which are
illegal or unethical. PPS must determine whether
WHY UNETHICAL BEHAVIOR
they can tolerate such conduct. Examples might
OCCURS
include the rock star who uses drugs, or the CEO
It is important to understand why unethi-
who has an extramarital affair that is overtly or
cal and unprofessional behavior occurs so that
covertly funded by the company. Protection staff
it can be prevented. Some of the more common
may be asked to lie or even aid in the commission
causes of ethical lapses are:
of such activities.
Abuse of force in restraining patients is ● Protection officers—or any other person
another concern. In some instances, there is in a position of trust—must possess good
a great degree of legal leeway for using force character. As past behavior is the most
when restraining patients—especially mental reliable indicator of future behavior, it is
patients. Persons who have been involuntarily necessary to do a check of prior employment.
committed to an institution must be restrained There can be no substitute for screening!
in many cases. However, protection officers ● Taking the “path of least resistance.”
do not have moral license to abuse patients or Unfortunately, doing what is easy does not
use force when it is merely convenient, but not always solve the problem. Taking a “short
really necessary, to do so. cut” usually means problem avoidance, where
Public police may, in some cases, exploit their the person confronting the dilemma just
positions by getting involved in security func- hopes the problem will either go away or
tions. Police operating for profit always raises solve itself. It won’t! Avoiding the problem
questions. This may occur either by individual almost always causes the problem to become
officers moonlighting, or police departments larger and more damaging over time.
charging fees for services that have been formerly ● Conflict with full-time and part-time
offered for free, such as alarm response or traffic employment. The practice of moonlighting,
direction. Any time that a public servant gener- with its inherent division of loyalties
ates a revenue stream due to their office, it must between the full-time and part-time
be questioned. employers, can create a breeding ground for
Civil recovery presents ethical questions. unethical conduct.
Obtaining payments from shoplifters through ● Fatigue. People often make the wrong
civil demand is intended to compensate the mer- choices simply because they are tired.
chant for his loss. Criminal prosecution of shop- Fatigue and stress impede good decision
lifters is expensive and time consuming; the stolen making. This can set up a vicious cycle
merchandise must be held as evidence, and so it where poor decisions are made, and more

XII. RELATIONS WITH OTHERS


574 45. ETHICS AND PROFESSIONALISM

stress is the result. The world of asset CONCLUSION


protection is filled with shades of gray, so it
is important to have your wits about you. Ethical and professional conduct by protec-
● “Traditionalism” and a resistance to change. tion officers is necessary for all concerned—the
Just because protection officers have not officer, the organization they represent, and the
been trained in first-aid and CPR does not public that they protect. Officers who wish to
mean that the practice should continue. Just have long and fulfilling careers need to be above
because protection officers have not had a full reproach. They need to be ethical. And they
and complete orientation to the organization need to perform in a professional manner at all
they are protecting does not mean that this times.
should remain standard practice. A per- Employers and clients benefit from ethical
tinent example of “traditionalism” is the and professional behavior by being able to trust
practice of handcuffing. Handcuffs are rarely the protectors. They can have faith in them. They
double-locked. Not doing so can cause the can be assured that those who protect them are
cuffs to cinch tightly on the subject’s wrists, acting in their best interest.
which can potentially cause permanent nerve The employees, visitors, students, patients,
damage. Another example is traffic control. patrons, or customers—the public that offi-
Some organizations do not train their officers cers serve—place an extensive amount of trust
to direct and control traffic, in spite of the fact in protection personnel. And professional
that this is a key safety issue, not to mention a protection officers both earn and deserve that
crucial juncture in public relations. trust.

EMERGING TRENDS
Protecting a society from the concerted have made this even more so. One answer to this is
actions of criminals and terrorists, as well as ethics and respect for privacy.
disasters, is a challenging undertaking. While Perhaps an adoption of an ethics of care philos-
respect for individual rights must be paramount ophy is appropriate for those who protect. Ethics
in a free society, the common good must also be of care means being concerned with the welfare
considered. Homeland security has ushered in of others. It means having empathy, participat-
an era of utilitarianism: we protect the greater ing in other’s feelings, and understanding how
good, even if individual rights are curtailed to a they view things. The ethics of care fits in with
degree. the community policing model to a significant
What is essential is that we respect individual degree. Care, concern, and partnering with a
rights and make every attempt to preserve them. community to solve its crime-related problems
As an information-based economy becomes more are what community policing is all about.
firmly established, so, too, do concerns with how that An ethics of care philosophy helps to prevent
information is handled. While adhering to the basic an “us versus them” syndrome from occurring.
principle of “need to know” affords some protection As protection officers become better educated,
against abuse, there is still an increasing potential for they are becoming more sensitive to their ethical
confidential and proprietary information to be dis- obligations. Ultimately, they will become more
closed. Recent advances in Internet communications professional.

XII. RELATIONS WITH OTHERS


SECURITY QUIZ 575

Resource a. True
The National Institute of Ethics has been established to b. False
further integrity and ethics in America. The Institute 5. Professionals think in terms of their
offers a variety of seminars which can be customized
authority.
to specific organizational needs. There is also an array
of instructional materials available, as well as instructor a. True
certifications. Visit http://www.ethicsinstitute.com/. b. False
6. Using the _______ acronym can assist one in
dealing with ethical dilemmas.
a. PROFESSIONAL
S EC U RI T Y QU IZ b. DEPORTMENT
1. What is the greatest issue in public safety? c. ETHICS
a. Private investigation d. PORT
b. Policing 7. _____ may be established by statute, custom,
c. Private security or contract.
d. Animal control a. Rights
2. _________ are how one carries themselves, b. Duties
conduct, and one’s attitude of image. c. Choices
a. Manners d. Practices
b. Deportment 8. Taking shortcuts are one reason why
c. Ethics unethical behavior occurs.
d. Duty a. True
3. Where do most poor decisions emerge from? b. False
a. Lack of commitment 9. “Traditionalism” is ________ to change.
b. Misunderstanding of what is being asked a. Devotion
of you b. Willingness
c. Failure to explore all potential options c. Resistance
d. Exposure to unethical behavior 10. The world of asset protection is black and
4. There is substantial legal leeway concerning white. There is no gray area.
the amount of force that can be used to restrain a. True
a patient. This is an ethical issue in protection. b. False

XII. RELATIONS WITH OTHERS


This page intentionally left blank
Index

A Active-combative persons, use of nuisance alarms, 187–188


Absenteeism, substance abuse costs, force, 477 operator interface, 185–186
271 Active-resistive persons, use of force, overview, 183
Abuse of force 476–477 response to, 188–189, 203
ethical issues, 571 Active shooter, emergency situation sensors, 186–187
human relations, 512 case study, 334 technology trends, 189
Access control Adaptability, PO leadership skills, 305 Alcohol
audit/record keeping, 193 Administrative controls, accident and disruptive behavior, 296
authorization, 193–194 definitions, 225 patrol preparation, 122
basic function, 92–93 Administrative law serving, and crowd management,
biometric technologies, 196–197 characteristics, 440–441 146–147
contract security, 529–530 overview, 30–31 signs/symptoms, 280–281
electronic systems, 195–196 ADT, see American District Telegraph All hazards approach, security risk
emergency access control, 192 (ADT) management trends, 328
emerging trends, 197 Advanced Level Supervisory and Amenhotep, 117
examples, 35, 192–193 Managerial Protection Officers, American District Telegraph (ADT)
hostage incident management, 374 protection staff levels, 43 alarm systems history, 90–91
in information age, 197 Advanced Protection Officer, duties, founding, 32
locks/key control, 194–195 49 Amphetamines, signs/symptoms,
media relations, 529 Advertising 279–280
overview, 191–192 investigation history, 384 Analog radio equipment, central alarm
via physical security, 194 public relations rules, 523 station, 101
sensor types, 96 Aerosol lubricants, as hazardous Anchoring, community relations, 550,
strike procedures, 306 materials, 231 551t
system database management, 196 Affirmative defensives, apprehension/ Anger, and disruptive behavior, 296
terrorism activities, 365 detention, 503–504 Anti-Hijacking and Air Transportation
Accidents Agency, civil law, 439 Security Act, 22
definition, 224 Aggressive behavior Antiterrorism, see also Terrorism
as emergency situations, 332 dealing with, 462–463 emerging trends, 376–377
industrial hazards, 485–488 use of force, 455–460 hostage incident management,
investigation, 225 verbal deescalation, 463–464 374–375
key facts, 223–227 Air sampling detectors, fire alarm hostage negotiation, 375
OSH report, 221 sensors, 97 hostage situations, 373
prevention, 225 Air transport, security history, 22 hostage threat receipt, 373
substance abuse costs, 271 Alarm printers, as operator interface, 185 overview, 363
terminology, 224–227 Alarm systems, see also Central alarm security officer hostages, 374
types, 224 station (CAS) security techniques, 367–370
Accountants, audits, 389 basic function, 91–92 Stockholm Syndrome, 375
ACFE, see Association of Certified components, 183–184 strategy, 365–366
Fraud Examiners (ACFE) duress alarms, 187 suicide attacks, 375–377
Acquisitive crowd, definition, 140 emerging trends, 102 techniques, 366–367
Action identification, CCTV, 173 examples, 35 Appraisal costs
Active-aggressive persons, use of integrated, 94–95 definition, 544
force, 477 monitoring, 184–185 total quality, 543t

577
578 INDEX

Apprehension and demographics, 23–24 Biometrics


affirmative defenses, 503–504 economic/marketing trends, 22–23 access control systems, 92, 96,
assault issues, 500, 501 fire protection, 20–21 196–197
battery issues, 500, 501 law codification, 29–31 facial recognition, 98
civil law issues, 500–501 overview, 13–14 BMSs, see Balanced magnetic switches
criminal law issues, 500 Association of Certified Fraud (BMSs)
false arrest, 500 Examiners (ACFE), 34 Bodyguard, see Personal protection
invasion of privacy, 501 Attitude specialists (PPS)
malicious prosecution, 501 patrol preparation, 122 Body language, use of force, 477
methodology, 501–503 public relations rules, 524 Bomb threats, as emergency situations,
overview, 497 Attrition, substance abuse 333
problems areas, 500 perpetuation, 273 Bonds insurance, definition, 9
reasonableness, 499 Audible alarm devices, alarm system Boredom, patrol principles, 127
use of force, 503 interfaces, 185 Bow Street Runners, 18–19, 118
Arbitration, labor relations, 310 Audience, effective communications, Branding, business strategy, 545–547
Area protection 76 Brinks Armored, founding, 32
alarm systems, 186 Auditing British Security Industry Association,
intrusion alarms, 35 access control, 193 66–67
Arrest, see also Apprehension auditor jobs, 35–36 Brother visitor management tools, 109
definition, 497 investigations, 389–390 Building automation systems (BAS)
examples, 499 Authority assignment basic function, 94
use of force, 453–454 detention, 498–499 sensor types, 97–98
Arrowhead formation, riot control, Occupational Safety and Health, 219 Building security, strike procedures,
144–145 Automatic sprinklers, characteristics, 213 307
Arson, fire protection, 214–215 Automatic traffic signals, 131–132 Bullet resistive material, as physical
Asbestos exposure, industrial hazards, Automation, see Protection operation security, 167–168
492 automation Burden of proof, legal issues, 445
Assault, apprehension/detention Burglar alarms, invention, 90
issues, 500, 501 Burglar/vandal-resistive glazing, as
Assessment B physical security, 167
defensive tactics, 473–474 Background investigations, emerging Burglary insurance, definition, 9
industrial hazards, 488–491 trends, 400 Burglary-resistive equipment
security risk management, 316–317 Backscattering technology, 201 safes, 175
Asset protection, general Backup, during arrests, 502 vaults, 177
antiterrorism strategies, 365 Balanced magnetic switches (BMSs) Burns, William J., 32
asset definition, 3 alarm systems, 186 Business interruption
basic concept, 3 as physical security, 168 insurance, 9
classifications, 15 Barbed tape, as physical security, 178 workplace violence, 289
contemporary careers, 34–36 Barbiturates, signs/symptoms, Business strategy
CPTED, 6–7 280–281 branding, 545–547
emerging trends, 9–10 Basic Level Protection Officer community relations, 544–547
insurance, 7–9 duties, 48 e-security, 545t
and investigation, 383 protection staff levels, 42 industrial security, 546t
layered protection, 5–6 Battery, apprehension/detention resort security, 546t
mitigation, 4–5 issues, 500, 501
physical security, 6 Battle of the Overpass, 28
physical security planning, 162 Beam detectors, fire alarm sensors, 97 C
risk management, 7–9, 318 Behavioral management, see Crisis Callahan, Edward, 90–91
risks, 4 intervention Call boxes, invention, 91
safety, 7 Behavior analysis, investigations, Caller ID
valuation, 4 396–397 central alarm station operator/
Asset protection, history Behavior level, crisis intervention, 297, dispatcher, 100
class struggles/terrorism, 24–27 297t telephone communications, 77
commerce, 21–22 Biological agents, terrorism trends, Cameras, see also Closed-circuit
cyclical nature, 14–15 358–359 television (CCTV)
INDEX 579
CCTV components, 174 Central station monitoring Clearness, good report writing, 429
substance abuse policies, 276 alarm systems, 184 Client, security risk management, 327
Campus Security and Student Right to liaison function, 563 Client violence, definition, 288
Know Act, 31 Certification Closed-circuit television (CCTV)
Canada Standards Association, physical security, 180–181 basic function, 94
administrative law, 440–441 protection professionals, 68 central station installation, 563
Canine detection, overview, 202 Certified Protection Officer Instructor components, 174
Cannabis, signs/symptoms, 278–279 (CPOI), establishment, 33–34 in CPTED, 7
Capacitance sensors, alarm systems, Certified Protection Professional fixed posts, 128
187 (CPP), establishment, 33 intelligent video, 173
CAP Index, as crime mapping system, Certified Security Supervision and main views, 173
110 Management (CSSM), 33–34 overt electronic surveillance, 423
Carbon dioxide extinguishers, CFLs, see Compact fluorescent lights as physical security, 173–175
characteristics, 212 (CFLs) practical applications, 174
Card access Chain of command sensor types, 98
functional operation, 172f audits, 390 typical system, 175f
as physical security, 170–171 strike procedures, 306 video analytics, 189
Card-based credential, access control Chain-link fence, as physical security, video motion detection, 169
systems, 92 178 Clowery, R. C., 90–91
Career planning Channing, William, 90 Coated glass, as physical security, 168
advancement, 69–70 Charismatic leaders, and radical Cocaine, signs/symptoms, 279–280
education, 66 Islamic fundamentalists, 27 Code of ethics, PO professionalism, 45
emerging trends, 70 Checkpoint, as access control, 191–192 Collection methods
experience, 67–68 Chemical analysis, substance abuse evidence, 406–408
importance, 65–66 policies, 277 information asset protection, 244
job search, 69 Chemical controls Comfort zone, use of force, 460–461
licensing/certification, 68 disruptive behavior, 300 Command-control-communications
networking, 68–69 use of force techniques, 478 center, 35
training, 66–67 Chemiluminescence detectors, Commerce
Carnegie, Dale, 510 characteristics, 201 asset protection history, 21–22
CARVER model, terrorism target Chief Security Officer (CSO), and protection relationship, 14
selection, 356–357 convergence, 180 security trends, 37
CAS, see Central alarm station (CAS) Circumstantial evidence, legal issues, Commercial-off-the-shelf (COTS)
Case law 443 software, ESRL GIS, 110–111
definition, 29 Civil disturbances Commercial system monitoring,
development, 436 emergency situation case study, 335 physical security, 170
CCTV, see Closed-circuit television as emergency situations, 333 Common law
(CCTV) and fencing innovations, 178 burden of proof, 445
Cell, terrorism definition, 354 physical security planning, 162 definition, 29
Cell phones Civil law development, 436
central alarm station operator/ apprehension/detention issues, evidence, 443
dispatcher, 100 500–501 trespass, 445
as communication devices, 78 burden of proof, 445 Communication
as transmission media, 99 characteristics, 439–440 apprehension/detention
Central alarm station (CAS) vs. criminal, 440t methodology, 502
communications equipment, 100–101 and criminal/labor, 441, 441t audits, 390
emerging trends, 102 overview, 30 central alarm station operator/
history, 90–91 Civil liability, civil law, 440 dispatcher, 100–101
monitoring system types, 91–95 Clarity, theft reporting, 262 command-control-communications
overview, 89–90 Class struggles center, 35
patrol purpose, 120 asset protection history, 24–27 effective, see Effective
as protection career, 35 and radical Islamic fundamentalists, communications
sensor types, 95–98 26 hostage incident management, 374
transmission media, 98–99 Clean agent extinguishers, human relations, 515
visitor management systems, 99–100 characteristics, 212–213 interviewing, 414–416
580 INDEX

Communication (Continued) Compromise, information security Corruption, and reward systems,


patrol techniques, 125 definition, 243 384–385
PO leadership skills, 305 Computed tomography (CT), Cost/benefit analysis, risk mitigation, 5
security service options, 527 detection equipment, 201–202 COTS, see Commercial-off-the-shelf
strike procedures, 306 Computers (COTS) software
telephone security concerns, 22 access control systems, 93 Counterfeiting, as contemporary
terrorism, 356, 364 laptop theft, 244 problem, 22
use of force trends, 467–468 protection automation, 108 Counterintelligence
Communication devices terrorism activities, 364 as asset protection, 22
police radios, 91 Concealment, and theft prevention, definition, 243
proper use, 77–80 260–261 PO role, 249–250
protection automation, 108 Conciseness, good report writing, 429 terminology, 241–243
Community culture, second- Condition analysis, investigations, Counterspy dials, safes, 176–177
generation CPTED, 158 396–397 Covert electronic surveillance,
Community relations Conduct, patrol preparation, 123 characteristics, 422–423
anchoring, 550, 551t Confessions, as evidence, 444 Covert personal surveillance, 421, 422
appraisal costs, 544 Confidentiality, undercover CPOI, see Certified Protection Officer
approach, 549 investigations, 395 Instructor (CPOI)
business strategy, 544–547 Conflict, PO leadership skills, 305 CPTED, see Crime Prevention Through
community integration, 550, 551t Conflict resolution, formats, 455 Environmental Design (CPTED)
complaints, 554 Connectivity, second-generation Credential, access control systems, 92
contact protocols, 552–553 CPTED, 157 Crime analysis, workplace crime
emerging trends, 555 Consented search, basic trends, 266
e-security strategy, 545t considerations, 442 Crime identification, physical security
experience economy Consoles, CCTV components, 174 planning, 162
memorabilia, 540 Construction sites, traffic control, 135 Crime mapping, protection
negative cues, 539 Contact protocols, community automation, 110
overview, 536–541 relations, 552–553 Crime pattern theory, environmental
positive experience, 542t Containment, fires, 213–214 crime control, 156
senses, 541 Contingency plans, hazardous Crime prevention
theme and cues, 538 materials response, 235 environmental vs. social, 152
industrial security strategy, 546t Continuous lighting, as physical situational techniques, 154t
networking, 550, 551t security, 166 via urban design, 158
overview, 535–536 Continuous wave devices, metal Crime Prevention Through
positive experience, 537 detection, 200 Environmental Design (CPTED),
prevention costs, 543–544 Contract clauses, and IAP, 248 see also Environmental crime
preventive interaction, 549–550, 551t Contract security control
primary user relations, 548 access control, 529–530 components, 6–7
proactive intervention, 549–550, 551t civil law, 439 definition, 15
quality cost, 541–544 and DOD, 17 GIS, 111
resort security strategy, 546t security services history, 31 key concepts, 156–157
stakeholders, 550–553, 551t Control and compliance, escalation/ practical applications, 158
substantive community, 547–554 deescalation continuum, 459 second-generation, 157–158
total quality costs, 543t Control forces, history, 14 Crime scene
transformation economy, 554–555 Control formula, use of force, 454–455, basic considerations, 404
Compact fluorescent lights (CFLs), as 463 boundaries, 405
hazardous materials, 231 Controllable use, substance abuse emerging trends, 410
Competitive intelligence perpetuation, 273 evidence, 406–408
as asset protection, 22 Controlled substances, uses and and investigators/law enforcement,
definition, 242–243 effects, 283f 409–410
Complaints, community relations, 554 Controls, CCTV components, 174 note-taking, 408–409
Completeness, good report writing, Convergence, physical security, overview, 403
429–430 179–180 protection/preservation, 405–406
Compliance agent, protection officer Cooperative persons, use of force, 476 Criminal acts
roles, 44 Copper wire, as transmission media, 98 incident definition, 404
INDEX 581
workplace violence, 288 Cues Defensible space
Criminal intelligence/analysis tools, negative, 539, 542t access control, 192
protection automation, 111–112 positive, 538, 542t environmental crime control, 158
Criminal law Cultural awareness practical applications, 158
and apprehension/detention, 500 ethical behavior, 516 Defensive tactics
burden of proof, 445 human relations, 512 avoidance, 472
characteristics, 438 Cultural-difference theories, and asset emerging trends, 480
vs. civil, 440t protection, 23 officer limitations, 472–473
and civil/labor laws, 441, 441t Culture of warfare, and radical Islamic post orders, 475
offence types, 438t fundamentalists, 27 prevention, 473, 480
overview, 29 Customers security officer role, 471–472
Criminology, definition, 255 effective relations, 524–526 special circumstances, 475
Crisis intervention handling complaints, 526–527 threat assessments, 473–474
behavior modules, 297–298 public relations rules, 522 training, 479–480
disruptive behavior causes, 296 security risk management, 327 use of force, 475–478
disruptive behavior control, 299–300 violence definition, 288 use of force techniques, 478–479
emerging trends, 302 Customer service and weapons, 474–475
empathic listening, 299 leadership, 516–517 Deicing materials, as hazardous
ethics, 571–572 public relations trends, 531 materials, 231
nonverbal communications, 299 Customs and Border Protection (CBP), Delay tactics, as layered protection, 11
overview, 295 seaport operations scenario, Demographics
PO guidelines, 298 561–562 and asset protection, 23–24
safety considerations, 301–302 and radical Islamic fundamentalists,
stages of management, 296–297 26
team intervention, 300–301 D security history, 14
verbal/physical disruptive Damage, hazardous materials Demonstrations
behavior, 298 response, 235 crowd definitions, 138
Critical incident stress, crisis Danger zone, accident definitions, 225 security at, 142–143
intervention trends, 302 Data issues Denial, substance abuse perpetuation,
Criticality, risks, 4 collection system, 221 273
Crowd management database management, 196 Department of Defense (DOD)
actions/countermeasures, 140–142 datamining, 246 information security definition, 242
alcohol serving considerations, surveillance records, 424 security contractor procedures, 17
146–147 technology and IAP, 246 terrorism definition, 350
assessment, 145 Day/time generators, CCTV Department of Homeland Security
basic definitions, 138 components, 175 (DHS)
crowd formation, 138 Deadbolt locks, as physical security, 171 administrative law, 440–441
crowd formation causes, 138–139 Deadly force, escalation/deescalation hazardous materials trends, 236
crowd psychological factors, 139–140 continuum, 458, 459 security risk management trends,
crowd types, 140 Debs, Eugene, 28 328
demonstration security, 142–143 Deception, interviewing, 417–418 Deportment, definition, 569
emerging trends, 146–147 Decision-making Depository, safes/vaults, 175–176
mob formation, 143 and ethics, 570 Depressants, signs/symptoms,
overview, 137 and professionalism, 568 280–281
personal behavior, 144 Deductive reasoning, investigations, Depression, crisis intervention trends,
planning considerations, 143–144 383–384 302
protective group duties, 143 “Defanging the snake,” use of force, Detection
riot control, 144–145 461–462 fire, 211
verbal communication failures, 142 Defense in depth as layered protection, 11
Crystal meth, signs/symptoms, definition, 16 Detection equipment
279–280 effectiveness, 184 alarm response, 203
CSSM, see Certified Security overview, 5–6 best types, 199–200
Supervision and Management physical security planning, 164, 165 electronic article surveillance,
(CSSM) risk mitigation strategy, 323f 202–203
CT, see Computed tomography (CT) security risk management, 325–326 emerging trends, 204
582 INDEX

Detection equipment (Continued) methods, 155t characteristics, 187


metal detection, 200 Disruption of business, media definition, 35
as physical security, 168–169 relations, 529 Duress sensors, intrusion sensors, 96
X-ray technology, 200–201 Disruptive behavior Duty, definition, 568
Detention causes, 296 DVRs, see Digital video recorders
affirmative defenses, 503–504 controlling, 299–300 (DVRs)
assault issues, 500, 501 crisis development, 297–298
authorization, 498–499 stages of management, 296–297
battery issues, 500, 501 verbal and physical, 298 E
civil law issues, 500–501 Distributed processor, access control EAPs, see Employee assistance
criminal law issues, 500 systems, 92–93 programs (EAPs)
false arrest, 500 Diversity EAS, see Electronic article surveillance
false imprisonment, 501 emerging trends, 517 (EAS)
invasion of privacy, 501 human relations, 510–512 EasyLobby, 109
malicious prosecution, 501 and war on terror, 516 Economic espionage, definition, 242–243
methodology, 501–503 DMT, signs/symptoms, 281–282 Economic Espionage Act (EEA), 245,
overview, 497 Documentary evidence 248
problems areas, 500 definition, 443 Economic trends, and asset protection,
reasonableness, 499 legal issues, 443 22–23
use of force, 453–454, 503 Documentation Education, see also Training
Deter-deny-detect-delay principle audits, 390 career planning, 66
antiterrorism techniques, 366–367 disruptive behavior management, emergency response plan, 344
security risk management, 325 297 networking, 563–564
Deterrence, as layered protection, 11 patrol techniques, 125 patrol preparation, 124
Deviance, see Workplace crime picket lines, 307–308 physical security planning, 180
DHS, see Department of Homeland Dogs PO trends, 51
Security (DHS) for detection, 202 protection automation, 112
Diamond designation, hazardous substance abuse policies, 276–277 public relations, 527–528
materials, 233 Domestic terrorism, overview, 354 security jobs, 36
Diffusion of benefits, environmental Doors, safety hazards, 223 substance abuse policies, 275
crime control, 155–156 DOT, hazardous materials, 232, 234 Effective communications
Digital radio equipment Double loop learning, security audience considerations, 76
central alarm station operator/ awareness, 85–86 communication channels, 76
dispatcher, 101 Drills definition, 75
emerging trends, 102 audits, 390 devices for, 77–80
Digital video analytics, industrial emergency response plan, 344 and due diligence, 75–76
hazard trends, 493 Drug dependency, development, 272 emerging trends, 80
Digital video recorders (DVRs), CCTV Drug paraphernalia, definitions, 277 and feedback, 77
components, 174–175 Drug screening, and IAP, 248 myths/misconceptions, 77
Dilaudid, signs/symptoms, 281 Drugs of abuse, definitions, 277 requirements, 76
Direct evidence, legal issues, 443 Drug testing, substance abuse policies, Elderly persons, human relations,
Direct fire monitoring, alarm systems, 275 511–512
184 Drug trafficking, substance abuse Electrical switching rooms, industrial
Dirty bombs, terrorism trends, 358–359 policies, 276 hazards, 489–490
Disasters Dry chemical extinguishers, Electric eye, intrusion sensors, 95
crowd definition, 138 characteristics, 212 Electric locks, as physical security, 172
as emergency situations, 334 Dual-technology sensors Electronic access control systems
physical security planning, 162 alarm systems, 186 overview, 195–196
Discrimination as physical security, 169 RF technology, 196
human relations, 512 Due diligence Electronic article surveillance (EAS),
women in protection, 514 accident definitions, 225 detection equipment, 202–203
Disinformation, definition, 22 and effective communication, 75–76 Electronic detection, fires, 211
Displacement of crime and IAP, 247 Electronic Security Association, 66–67
environmental crime control, Due process, concept creation, 29 Electronic security systems
153–155 Duress alarms automation trends, 113
INDEX 583
vs. human element, 108 Employee issues EPL, see Employment practices
Electronic surveillance discipline and labor relations, 309 liability (EPL)
characteristics, 422–423 discipline types, 309–310 Equipment
in CPTED, 7 labor relations, 309 analog radio, 101
definition, 421–422 screening and IAP, 248 antiterrorism security techniques,
overt, 423 theft prevention, 259–260 367–370
Emergency access control, overview, theft response, 264 burglary-resistive equipment, 175,
192 Employment law, overview, 31 177
Emergency alarms, definition, 35 Employment practices liability (EPL), defensive tactics, 473
Emergency exit devices, as physical definition, 9 detection, see Detection equipment
security, 172 Empty-hand control digital radio equipment, 101, 102
Emergency exits, safety hazards, 223 escalation/deescalation continuum, electronic article surveillance (EAS),
Emergency lighting, as physical 457 detection equipment, 202–203
security, 166 safety tip, 459 patrol preparation, 122
Emergency management soft tactics, 458–459 personal protection specialists,
emerging trends, 70 Empty-hand impact, escalation/ 370–371
Occupational Safety and Health, 221 deescalation continuum, 457 personal surveillance, 423
Emergency Operations Centers (EOC), End users, information asset PPE, 223, 226, 234
emergency planning, 340–341 protection, 245 traffic control, 135
Emergency planning Enforcement agent, protection officer workplace violence impact, 290
accident definitions, 225 roles, 44 Erasing fluid, substance abuse,
considerations, 336–338 Engineering controls, accident 282–284
Emergency Operations Centers, definitions, 225 Ergonomics, accident definitions, 225
340–341 English as a Second Language (ESL), Escalation/deescalation continuum
emerging trends, 345 effective communications, 76 applications, 458–460
Incident Command System, 338–340 Enterprise Risk Management, content, 455–460
media relations, 341–342 definition, 227 overview, 455
National Incident Management Environment use of force trends, 468
System, 340 accident definitions, 225 Escape crowd, definition, 140
overview, 331–332 community relations, 551t Escorts, strike procedures, 306
plan development, 342–343 defensive tactics, 473 E-security, strategy, 545t
plan evaluation, 344–345 risk-mitigation strategy, 326 ESL, see English as a Second Language
plan review/integration, 343–345 Environmental crime control, see (ESL)
problem scope, 335–336 also Crime Prevention Through Espionage, definition, 15
terminology, 336f Environmental Design (CPTED) ESRL, as GIS provider, 110–111
training/testing, 343–344 CPTED, 156–157 Ethanol-enhanced fuels, as hazardous
vulnerability analysis, 338–342, 338t crime pattern theory, 156 materials, 230
Emergency response, patrol purpose, defensible space, 158 Ethics
120 diffusion of benefits, 155–156 bad behavior, 571–572
Emergency Response Guide, 232 displacement of crime, 153–155, 155t basic considerations, 567
Emergency situations overview, 151–152 competitive intelligence, 242–243
case studies, 334–335 practical applications, 158 decision-making, 570
characteristics, 331–332 rational choice theory, 152–153 definition, 568
impact areas, 332f routine activity theory, 156 emerging trends, 572
types, 332–335 second-generation CPTED, 157–158 human relations, 515–516
Emergency vehicles, traffic control, situational techniques, 154t investigations, 385
134–135 vs. social crime prevention, 152 patrol principles, 127
Emotions theories, 152–156 PO leadership skills, 300
and crowd formation, 139–140 Environmental Protection Agency protection issues, 570–571
and disruptive behavior, 296 (EPA), hazardous materials, 232 Ethnicity, and employing industry,
violence-prone situations, 462 EOC, see Emergency Operations 23
Empathic listening, crisis intervention, Centers (EOC) European Civil Code, and law
299 EPA, see Environmental Protection development, 437
Employee assistance programs (EAPs), Agency (EPA) Evacuations, as emergency situations,
substance abuse policies, 275 Epheric zone, use of force, 460–461 332–333
584 INDEX

Evaluation stage, disruptive behavior Feedback Fitness for duty, and industrial
management, 296 in effective communications, 77 hazards, 491
Evidence security awareness, 86–87 Fixed duress devices, characteristics,
collection procedures, 407–408 FEMA, see Federal Emergency 187
crime/incident scene, 406–408 Management Agency (FEMA) Fixed lens, CCTV components, 174
legal issues, 443–445 Fencing Fixed posts
Excessive force, liability issues, as access control, 192 patrol principles, 127–128
453 as physical security, 177–179 as protection career, 34
Experience, protection professionals, Fidelity bond insurance, definition, 9 Flame detectors, fire alarm sensors, 97
67–68 Field controller, access control systems, Fleet safety, safety hazards, 223
Experience economy 92–93 Flood, emergency situation case study,
definition, 536 Fielding, Henry, 118 335
experience economy, positive Field notes Floor anchoring, safes, 176
experience, 537 characteristics, 428 Foaming agent extinguishers,
memorabilia, 540 overview, 427 characteristics, 213
negative cues, 539 Fight or flight syndrome, interviewing, Focused interviews, techniques, 391–393
overview, 536–541 415–416 Focus groups, security awareness
positive experience, 542t Financial interest, public relations, 522 feedback, 86–87
senses, 541 Fire Follow-up investigations, steps,
theme, 537 arson, 214–215 385–386
theme and cues, 538 components, 209–211 Foot patrols
Exploitability, vulnerabilities, 320 containment, 213–214 industrial hazards, 491
Explosives, detection equipment, detection methods, 211 overview, 121
201–202 as emergency situation, 332–333 Footwear, industrial hazards, 492
Expressive crowd, definition, 140 extinguishers, 212–213 “Four Ds” principle
External failure costs hazard areas, 210 antiterrorism techniques, 366–367
definition, 544 liaison function, 558–559, 559f security risk management, 325
total quality, 543t Occupational Safety and Health, 220 Frankpledge, definition, 17
Extinguishers overview, 209 Fraternization, patrol principles, 127
hazardous materials, 231 permanent extinguishing hardware, Fraud examiners, audits, 389
permanent hardware, 213 213 Frequency
types, 212–213 safety hazards, 222–223 patrol techniques, 125
Extra weight, safes, 176 types, 211–212, 212f risks, 4
Fire alarms Frick, Henry Clay, 27–28
basic function, 93–94 Frustration, and disruptive behavior,
F definition, 35 296
Facial recognition, CCTV, 98 integrated systems, 94–95
Fact-finding, investigations, 383 sensor types, 96–97
Failure costs, total quality, 543t Fire alarm telegraph, 90 G
False arrest, apprehension/detention Firearms, use of force techniques, 477t, Gang activity, crowd management
issues, 500 479 trends, 146–147
False imprisonment, detention issues, Fire insurance, definition, 9 Garbage containers, and theft
501 Fire plans, characteristics, 214 prevention, 261
Fatigue Fire protection, history, 20–21 Gas detectors, building automation
ethical issues, 571–572 Fire-resistive containers, as physical sensors, 97
patrol principles, 127 security, 177 Gaseous discharge lamps, security
Federal Bureau of Investigation (FBI) Fire safety, strike procedures, 306–307 lighting, 166
espionage protection steps, 248 Fire Triangle Gasoline, substance abuse, 282–284
information asset protection, 244 definition, 209–210, 210f Gate duty, traffic control, 135
terrorism definition, 350 fire types, 211 General deterrence theory, workplace
Federal Emergency Management First aid crime, 256
Agency (FEMA) accident definitions, 225 Geospatial information systems (GIS),
emergency planning procedures, Occupational Safety and Health, 221 protection automation, 110–111
337–338 First line of defense, physical security GIS, see Geospatial information
NIMS, 340 planning, 165 systems (GIS)
INDEX 585
Glass, as physical security, 167–168 common types, 222–223 customer service leadership,
Glass-break sensors, 95, 186 incident scene, 404–405 516–517
Glazing, as physical security, 167–168 industrial, see Industrial hazards diversity, 510–512
Globalization, and human relations, security risk management trends, 328 effective communication, 515
513–514 types, 333f emerging trends, 517–518
Glue, substance abuse, 282–284 HAZMAT Team ethical behavior, 515–516
Goodfellas, 23 fire scenario, 558–559 and globalization, 513–514
Gottlieb, Mark, 112 initial response, 234–236 overview, 509–510
Government regulation, security Health care, substance abuse costs, 271 sexual harassment, 514–515
industry, 564–566 Health interests, public relations, women in protection, 514
Graphical user interface (GUI), CCTV 521–522 Human resource management
video recorders, 174–175 Health and safety policy, definition, (HRM)
Guardianship, and workplace crime, 225 security services history, 31
257 Health and safety program, definition, shipping issues, 22
Guard station, as access control, 225 HVAC, see Heating-ventilating-air
191–192 Health-safety-security-environment- conditioning (HVAC)
GUI, see Graphical user interface (GUI) quality (HSSEQ), PO role, 46
Health surveys, Occupational Safety
and Health, 220 I
H Hearsay rule, evidence, 443 IACP, see International Association of
Hallucinogens, signs/symptoms, Heat detectors, fire alarm sensors, 97 Chiefs of Police (IACP)
281–282 Heated glass, as physical security, 168 IAP, see Information asset protection
Halogenated extinguisher units, Heating-ventilating-air conditioning (IAP)
characteristics, 212–213 (HVAC), BAS control, 94 IC, see Incident commander (IC)
Hammurabi, 117 Heroin, signs/symptoms, 281 ICS, see Incident Command System
Handcuffing techniques, 503, 572 HMR, see Hazardous Materials (ICS)
Hand signals, traffic control, 132–133 Regulations (HMR) Identification systems, access control,
Hands-off security, 455, 456 Hollerith badge, as physical security, 193
Hands-on security, 455, 456 171 Identity theft/fraud
“Harmless” theory, substance abuse Holmes, Edwin, 32, 90 as problems, 22
perpetuation, 273 Homeland Security, requirements, 17 security trends, 37–38
Hashish, signs/symptoms, 278–279 Homestead Strike, 27–28 IEDs, see Improvised explosive devices
Hashish oil, signs/symptoms, 278–279 Homicide/suicide bomber, asset (IEDs)
Hate crime legislation, human protection trends, 9–10 IFPO, see International Foundation for
relations trends, 517 Honesty, PO leadership skills, 297 Protection Officers (IFPO)
Hazardous materials Hospitals, theft prevention, 260 Illegal walkout, definition, 305
all hazards approach, 229 Hostage situations Illness
contingency plans, 235 handling, 373 accident definitions, 226
damage assessment, 235 incident management, 374–375 and disruptive behavior, 296
definition, 225 negotiation, 375 industrial hazards, 485–488
diamond designation, 233 security officer hostages, 374 Image
emerging trends, 236 Stockholm Syndrome, 375 as asset, 15
incidents, 231–232 Hostage threat receipt, procedures, 373 public relations rules, 523
initial incident response, 234–236 Hostile crowd Immigration, and asset protection, 23
PO role, 230–231 actions/countermeasures, 140 Impact, risks, 4
response models/templates, definition, 140 Implementation stage, disruptive
233–234 Hostile environment, sexual behavior management, 296
site security, 235–236 harassment, 514–515 Improvised explosive devices (IEDs),
substance identification, 234 Housekeeping, safety hazards, 223 asset protection trends, 10
substance quantity, 234–235 Housings, CCTV components, 174 Inadvertent threats, risk management,
tools and resources, 232–233 HRM, see Human resource 320
Hazardous Materials Regulations management (HRM) Incandescent lamps, security lighting,
(HMR), as resource, 232 Huffing, definition, 282 166
Hazards Human relations Incident commander (IC),
accident definitions, 225 Carnegie’s principles, 510 vulnerability analysis, 339–340
586 INDEX

Incident Command System (ICS) Industrial security Integration, protection automation


hazardous materials, 233 business strategy, 546t trends, 113
organizational chart, 339f definition, 15 Integrity, PO leadership skills, 297
vulnerability analysis, 338–340 establishment of field, 108 Intellectual property rights,
Incident investigation, definition, government regulation, 564–566 information asset protection, 242
225–226 The Industrial Security Manual, 17 Intelligence, investigations, 386–387
Incident management systems Informants, investigations, 393–394 Intelligence agent
automation trends, 113–114 Information investigations, 382
protection automation, 108–109 access control, 197 protection officer roles, 43
Incident Reporting and Information as asset, 15 Intelligence analysis, workplace crime
Management System (IRIMS), hostage incident management, trends, 266
108–109 374–375 Intelligent video, purpose, 173
Incidents investigations, 386–387 Intentional threats, risk management,
accident definitions, 225 PO leadership skills, 305 319–320
behavior/condition analysis, terrorism activities, 364 Intercoms, as communication devices,
396–397 Information asset protection (IAP) 79–80
definition, 403–404 categories, 246–249 Interiors, safes/vaults, 175
hazardous materials, 231–232 definition, 242 Intermediate Level Protection Officer
overview, 403 emerging trends, 250 duties, 48–49
report writing, see Report writing legal measures, 247–248 protection staff levels, 42–43
workplace violence categories, management measures, 248–249 Internal failure costs
287–288 security measures, 246–247 definition, 544
workplace violence investigation, threats, 243–245 total quality, 543t
290–291 Information assets International Association of Chiefs of
Incident scene definition, 241–242 Police (IACP), 66–67
basic considerations, 404 threats, 243–245 International Association of
boundaries, 405 Information brokers, technology and Emergency Managers, emergency
emerging trends, 410 IAP, 246 planning procedures, 337–338
evidence, 406–408 Information officer, ICS structure, 339 International Foundation for
hazards, 404–405 Information security Protection Officers (IFPO)
and investigators/law enforcement, PO role, 249–250 formation, 33–34
409–410 terminology, 241–243 PO education, 51
media access control, 529 Information technology (IT) security jobs, 36
note-taking, 408–409 emerging protection trends, 250 training, 66–67
overview, 403 information asset protection, 242 International Organization of
protection/preservation, 405–406 Infrared detectors, as physical security, Standardization, administrative
Individuals, and terrorism, 355 169 law, 440–441
Inductive reasoning, investigations, Inhalants, substance abuse, 282–284 International terrorism, overview,
383–384 Injury 353–354
Industrial disasters, physical security accident definitions, 226 Internet commerce security, 22
planning, 162 and disruptive behavior, 296 Internships, protection professionals,
Industrial hazards industrial hazards, 485–488 68
accidents/injury/illness, 485–488 officers during use of force, 453 Interpersonal skills
definition, 484–485 workplace causes, 489 as enforcement component, 45
emerging trends, 493–494 Insurance policies PO leadership, 302
examples, 485t, 487 coverage types, 9 Interrogations
minimization, 490–491 overview, 8 vs. interviews, 414
overview, 483 Insurance pool, insurance overview, 9 legal obligations, 393
risk assessment, 488 Intangible assets techniques, 391–393
scenarios, 486–487 definition, 242 Interviewing and statements
self-assessment, 488–491 emerging protection trends, 250 communication methods, 414–416
self-protection, 491–493 threats, 243–245 concluding interviews, 418
and smoking, 490 Integrated sensors deception, 417–418
workplace injury causes, 489 building automation sensors, 98 definition, 413–414
Industrial hygiene, definition, 226 CCTV, 98 emerging trends, 418
INDEX 587
as evidence, 444 Job searching, protection professionals, physical security planning, 164, 165
investigations, 390–391 69, 70 risk mitigation strategy, 323f
investigation trends, 400 Job status, human relations, 512 security risk management, 325–326
investigative/focused, 391–393 Joint control techniques, use of force LEAA, see Law Enforcement
labor relation arbitration, 310 techniques, 478 Assistance Administration
overview, 413 Juveniles, legal issues, 441 (LEAA)
process, 416–417 Leaderless resistance, terrorism, 355
substance abuse policies, 276 Leadership
Intrusion alarms, definition, 35 K as agent of change, 302
Intrusion detection, as physical Key control, as access control, 194–195 critical skills, 300
security, 168 Keypad locks, access control sensors, customer service, 516–517
Intrusion sensors, basic function, 95–96 96 development, 298
Invasion of privacy, apprehension/ Kidnap and ransom (K&R) insurance, and diversity, 510–511
detention issues, 501 definition, 9 expectations, 300
Investigations Kinesics, crisis intervention, 299 Occupational Safety and Health, 219
agent/consultant roles, 382 Knock-off products, and reputational overview, 297
and asset protection, 383 damage, 4 pitfalls, 302
auditing, 389–390 K&R, see Kidnap and ransom (K&R) steps to, 301
behavior/condition analysis, insurance team crisis intervention, 301
396–397 team member skills, 299
crime/incident scenes, 409–410 Left flanking formation, riot control,
emerging trends, 400–401 L 145
follow-up, 385–386 Labor law Legal consultant
history, 384–385 characteristics, 441 as enforcement component, 45
identity theft/fraud trends, 38 and criminal/civil, 441, 441t investigations, 382
informants, 393–394 overview, 31 Legal fees, workplace violence, 289–290
information, 386–387 Labor relations Legal issues
interviews, 390–391 arbitration, 310 administrative law, 440–441
investigative/focused interviews, defensive tactic issues, 475 burden of proof, 445
391–393 and early security operations, case law, 436
investigator jobs, 35–36 107–108 civil law, 439–440
legal testifying, 397–398 employee discipline, 309–310 common law, 436
liaison, 387–388 employee misconduct/dishonesty, criminal/civil/labor law
logic, 383–384 309 interaction, 441, 441t
managing, 398–399 overview, 305 criminal law, 438
notes and reports, 388–389 searches, 308–309 criminal offence examples, 438t
overview, 381 security history, 27–28 development of laws, 436–437
preliminary, 385 strikes, 305–308 European Civil Code, 437
private investigators, 382 Laminated glass, as physical security, evidence, 443–445
shopping services, 395 167 human relations trends, 517
surveillance, 395–396 Laptop computer theft, information labor laws, 441
type/entity, 382t asset protection, 244 overview, 435–436
undercover, 394–395 Latimer Massacre, 28 search and seizure, 441–443
Ionization detectors, fire alarm Law codification, asset protection statutes, 437
sensors, 97 history, 29–31 trespass, 445–446
Islamic fundamentalists, radicalism Law enforcement, and crime/incident types of law, 437–446
issues, 26–27 scenes, 409–410 young offenders, 441
IT, see Information technology (IT) Law Enforcement Assistance Legal liability, physical security risks,
iTrak, 109 Administration (LEAA), creation, 161
iViewSystems, 108–109 18 Legal measures, IAP, 247–248
Lawful strike, definition, 305–306 Legal proceedings, testifying, 397–398
Layered protection Legislation, workplace violence, 292
J definition, 16 Lens, CCTV components, 174
Job design, definition, 226 effectiveness, 184 Level indicators, building automation
Job enrichment, definition, 226 overview, 5–6 sensors, 97
588 INDEX

Liability issues Lookalike drugs disruption of business, 529


excessive use of force, 453 drug definitions, 277 emergency planning, 341–342
insurance, 9 stimulant signs/symptoms, investigation history, 384
weapons, 474 279–280 Medical events, as emergency
Liaison function Loss control, definition, 226 situations, 332, 335
central station monitoring, 563 Loss events Medical fees, workplace violence,
fire scenario, 558–559, 559f antiterrorism strategy, 365 289–290
investigations, 387–388 physical security planning, 162 Medical surveillance, definition, 226
investigation trends, 401 Loss prediction, crime mapping Medical systems, Occupational Safety
overview, 557 systems, 110 and Health, 221
professional organizations, 563–564 LSD, signs/symptoms, 281–282 Medication reaction, and disruptive
seaport operations scenario, 561–562 behavior, 296
security officer relationship Memorabilia, experience economy,
diagram, 562f M 540, 542t
special event, 560–561 Magnetic coded cards, as physical Mental illness, and disruptive
undercover investigations, 395 security, 171 behavior, 296
vehicle break-in scenario, 559–560 Magnetic contact switches Metal detection, devices for, 200
VIP security scenario, 561f access control sensors, 96 Metal halide lamps, security lighting,
Liaison officer, ICS structure, 339 intrusion sensors, 95 166
Licensing, protection professionals, 68 as physical security, 168 Metallic foil detector, as physical
Light discipline Magnetic resonance imaging (MRI), security, 168–169
fixed post work, 128 204 Microwave detectors
patrol techniques, 126 Magnetic strip readers, access control alarm systems, 186
Lighting sensors, 96 as physical security, 169
as physical security, 166–167 Magnetometers, metal detection, Military forces
strike procedures, 307 200 and globalization, 513
Likelihood vs. Consequence matrix, MagViz, detection technology trends, security history, 14
321–322, 322f 204 Millimeter wave scanning, access
Line formation, riot control, 145 Maintenance control trends, 197
Lines of defense in CPTED, 7 Miniaturization of media, technology
industrial hazards, 492 machinery safety, 223 and IAP, 245
physical security planning, 164 Malicious prosecution, apprehension/ Minors, legal issues, 441
terrorism preparation, 357–358 detention issues, 501 Miranda rule
Listening skills Management measures, IAP, 248–249 evidence, 444
crisis intervention, 299 Management representative, investigative/focused interviews,
PO leadership, 305 protection officer roles, 43 392
Lithium ion batteries, as hazardous Manners, definition, 569 vs. Weingarten Rule, 392t
materials, 230–231 Marching watch, 118 Mission focus, PO leadership skills,
Litigation defense, crime mapping Marijuana, signs/symptoms, 278–279 300
systems, 110 Marketing Mitigation functions
LobbyGuard, 109 and asset protection, 22–23 PO duties, 48
Local system monitoring security history, 21 security risk management, 316–317,
alarms, 184 Markings, theft prevention, 260–261 323f, 326
physical security, 170 Martial arts skills Mitigation strategy, security risk
Lockdown incidents, as emergency job applicants, 67 management, 322
situations, 333 PPS, 371 Mixed messages, substance abuse
Lockout, definition, 306 Material Safety Data Sheet (MSDS), perpetuation, 273
Locks 226, 232 Mobile patrols, overview, 121–122
as access control, 194–195 Matewan, 27 Mobs, formation, 143
emerging trends, 181 McIlravey, Brian, 111, 113–114 The Molly Maguires, 23
as physical security, 171–172 Mechanical security locks, 171 Monitoring systems
safes/vaults, 175 Media relations access control systems, 92–93
Logging devices, alarm system access control, 529 alarm systems, 91–92, 184–185
interfaces, 185 basic considerations, 528 building automation systems, 94
Logic, investigations, 383–384 and community relations, 553–554 CCTV, 94
INDEX 589
central station, 184 Network attacks, terrorism trends, 359 vulnerabilities, 320
direct fire/police, 184 Networking workplace violence prevention, 290
fire alarms, 93–94 central station monitoring, 563 Occupational health, definition, 226
integrated systems, 94–95 community relations, 550, 551t Occupational illness, definition, 226
local, 184 fire scenario, 558–559, 559f Occupational risks, overview, 221–222
proprietary, 185 overview, 557 Occupational safety, definition, 226
types, 91–95 professional organizations, 563–564 Occupational Safety and Health
Monitors, CCTV components, 174 protection professionals, 68–69 Administration (OSHA)
Moonlighting seaport operations scenario, 561–562 hazardous materials, 232
associated security problems, 20 for security jobs, 36 hazardous materials response, 234
ethical issues, 571 special event, 560–561 workplace violence, 287
Morale, and theft potential, 264 vehicle break-in scenario, 559–560 Occupational Safety and Health (OSH)
Motion sensors VIP security scenario, 561f accident record/data collection
CCTV, 98, 174 Network video recorders (NVRs), system, 221
intrusion sensors, 95 CCTV components, 174–175 accidents, 223–227
as physical security, 169 Neutralization techniques, workplace accident terminology, 224–227
Motivated offender, workplace crime, crime, 257–258, 258t accident types, 224
256–257 NFPA, see National Fire Protection authority assignment, 219
Movable lighting, as physical security, Association (NFPA) basic elements, 218–221
166 NIMS, see National Incident common hazards, 222–223
MRI, see Magnetic resonance imaging Management System (NIMS) emergency management/first aid/
(MRI) Noise discipline, patrol techniques, medical systems, 221
126 emerging trends, 227
Nonprotection employees, protection management leadership, 219
N staff levels, 42 occupational risks, 221–222
Name-calling, human relations, 511 Nonverbal communication overview, 217
Narcotics, signs/symptoms, 281 crisis intervention, 299 protection officer role, 222–223
National Burglar and Fire Alarm interviewing, 415–416 training, 220
Association, 66–67 PO leadership skills, 305 work and health, 218
National Emergency Management Notes working conditions, 219
Association, emergency planning crime/incident scenes, 408–409 Once Upon a Time in America, 23
procedures, 337–338 field notes, 427, 428 Openness, PO leadership skills, 297
National Fire Protection Association investigations, 388–389 Operator interface, alarm systems,
(NFPA), 233, 337–338 NQR, see Nuclear quadrupole 185–186
National Incident Management resonance (NQR) Optical fiber, as transmission media,
System (NIMS), 233, 340 NRF, see National Response 99
National Industrial Recovery Act, 28 Framework (NRF) Optimal distance, use of force, 460–461
National Labor Union, formation, 27 Nuclear materials, terrorism trends, Organized crime, workplace crime
National Response Framework (NRF), 358–359 trends, 266
233, 340 Nuclear quadrupole resonance (NQR), Organized Retail Theft (ORT),
Natural access control 204 definition, 22
CPTED, 157 Nuisance alarms Organized surveillance, in CPTED, 7
defensible space, 158 characteristics, 187–188 ORT, see Organized Retail Theft
Natural disasters problems, 188–189 (ORT)
emergency situation case study, 334 NVRs, see Network video recorders OSH, see Occupational Safety and
physical security planning, 162 (NVRs) Health (OSH)
Natural hazard types, 333f OSHA, see Occupational Safety and
Natural surveillance Health Administration (OSHA)
CPTED, 6–7, 156–157 O Outsourcing
defensible space, 158 Observation PO trends, 51
Natural threats, risk management, 320 audits, 390 security services history, 31
Negligence, civil law, 440 fire detection, 211 Overt electronic surveillance,
Negotiation, hostage situations, 375 patrol principles, 127 characteristics, 423
Network attached storage (NAS), and theft response, 262 Over-the-counter (OTC) medications,
CCTV, 94 violence-prone situations, 463 273
590 INDEX

Overt personal surveillance Personal problems, patrol principles, safes/vaults, 175–177


characteristics, 422 127 system controls, 169–170
definition, 421 Personal protection specialists (PPS) system monitoring, 170
ethical issues, 570 Underwriters Laboratories, 177
principal protection, 372–373 Physical security planning
P professional development, 370–371 asset identification, 162
Pagers, as communication devices, 79 security services history, 31 continuing education, 180
Pain controls, use of force techniques, VIP protection, 371–372 countermeasure selection, 163
478 Personal protective equipment (PPE) lines of defense example, 165f
Panic alarms, definition, 35 definition, 226 loss event exposure, 162
Panic sensors, intrusion sensors, 96 hazardous materials, 234 occurrence impact, 163
Pan/tilt/zoom, CCTV components, safety hazards, 223 occurrence probability factors, 163
174 Personal relationships, workplace overview, 161–166
Passive infrared (PIR) violence, 288 risk categories, 161
alarm systems, 186 Personal space, crisis intervention, 299 security-in-depth, 164
in CPTED, 7 Personal surveillance steps, 162
Passive-resistive persons, use of force, covert, 422 systems approach, 165–166
476 definition, 421 threat level matrix, 164f
Patient violence, definition, 288 overt, 422 Physical Security Professional (PSP),
Patrol officer, as protection career, Personnel security knowledge domains, 180
34–35 definition, 15 Physical training, personal protection
Patrol principles terrorism activities, 365 specialists, 372
effectiveness factors, 126–127 Personnel Security Research Center Picket line
fixed posts, 127–128 (PERSEREC), 244–245 crowd definitions, 138
history, 117–119 Peterson, Marilyn, 111 strike procedures, 307–308
patrol purpose, 119–121 Photoelectric sensors, as physical Pinkerton, Allan, 18–19, 23, 31–32, 384,
performance aspects, 129 security, 169 514
preparation, 122–124 Photoelectric smoke detectors, fire PIR, see Passive infrared (PIR)
techniques, 124–126 alarm sensors, 97 Piracy
types, 121–122 Physical agent, definition, 226 and globalization, 513–514
unethical/unprofessional practices, Physical control techniques, 300, security trends, 37
127 477–478 Pisistratus, 117–118
Patrols, as physical security, 6 Physical dependence, drug definitions, Plan-Do-Check-Act Cycle, definition,
Patterned glass, as physical security, 277 47
168 Physical disruptive behavior, Planning stage, disruptive behavior
PBX, telephone communications, 78 characteristics, 298 management, 296
PCP, signs/symptoms, 281–282 Physical evidence, examples, 406–407 Plant emergency organization (PEO),
Pedestrians, traffic control, 134 Physical security control, 529
Peel, Robert, 17–18, 118 in access control, 194 PO, see Protection officer (PO), general
Pennsylvania State Police, formation, 28 application considerations, 167 POA, see Protection of Assets Manual
PEO, see Plant emergency organization card access, 170–171 (POA)
(PEO) CCTV as, 173–175 Point protection, intrusion alarms, 35
People certification, 180–181 Police assistance, strike procedures,
as assets, 15 convergence, 179–180 306
physical security risks, 161 definition, 15 Police monitoring, alarm systems,
Perception, patrol principles, 127 detectors/sensors, 168–169 184
Percodan, signs/symptoms, 281 emerging trends, 181 Policing
Performance incentives, and IAP, 248 fencing, 177–179 private vs. public, 18–20
Perimeter protection glazing, 167–168 security history, 17–18
fencing, 179 intrusion detection, 168 Policy and procedure
intrusion alarms, 35 layered, effectiveness, 184 and IAP, 248
PERSEREC, see Personnel Security lighting, 166–167 patrol purpose, 120
Research Center (PERSEREC) locking hardware, 171–172 search policy, 263–264
Personal behavior, crowd patrol purpose, 120 security awareness, 84–85
management, 144 planning process, 6 sexual harassment, 515
INDEX 591
substance abuse, 275 Private protection definition, 41–42
Politics, and globalization, 513 history, 14 emerging trends, 50–51
Pope, Augustus Russell, 90 vs. public police, 18–20 ethical issues, 570–571
Portable duress devices, Private security expectations, 300
characteristics, 187 ethical issues, 570 global work, 49
Port Authority, seaport operations post-WWI work, 29 hazardous materials role, 230–231
scenario, 561–562 strike forces, 28 information asset protection,
Positive activity support, in CPTED, 7 Private Security Industry Regulatory 249–250
Post orders, defensive tactics, 475 Authority (PSIRA), 564–565 leadership, 297
Post-traumatic stress disorder (PTSD), Proactive intervention, community leadership development, 298
302, 467 relations, 549–550, 551t leadership skills, 300
Potentiation, drug definitions, 277 Probability major roles, 43–45
Power failure sensors, building antiterrorism strategy, 365 mitigation functions, 48
automation sensors, 98 physical security planning, 163 OSH role, 222–223
Power outages, as emergency risks, 4 preventative functions, 48
situations, 334 Problematic behavior, substance professionalism, 45–47
PPE, see Personal protective equipment abuse, 272 protection officers, 302
(PPE) Procedure definitions relationship diagram, 562f
PPM 2000, 108–109 accidents, 227 response functions, 48
PPS, see Personal protection specialists enforcement, 45 staff levels, 42–43
(PPS) Process alarms, definition, 35 steps to leadership, 301
Predictability, PO leadership skills, 298 Productivity substance abuse, 282–284
Prejudices, human relations, 511, 512 substance abuse costs, 271 team member skills, 299
Preliminary investigations, steps, 385 workplace violence impact, 290 workplace violence prevention, 290
Prescription drugs, substance abuse Professionalism Protection operation automation
trends, 284 asset protection trends, 10 contemporary environment, 108–112
Pressure mats, alarm systems, 187 bad behavior, 571–572 crime mapping, 110
Pressure points, use of force basic considerations, 567 criminal intelligence/analysis tools,
techniques, 478 decision-making, 568 111–112
Pressure sensors, intrusion sensors, deportment, 569 emerging trends, 113–114
95–96 emerging trends, 572 geospatial information systems,
Pressure switches, alarm systems, 187 fixed post work, 128 110–111
Pressurized fire extinguishers, as manners, 569 history, 107–108
hazardous materials, 231 patrol principles, 127 incident management systems,
Prestrike vandalism, strike procedures, professionals, 568–569 108–109
306 protection officers, 45–47 officer role, 112–113
Prevention security history, 33–34 visitor management tools, 109–110
defensive tactics, 473, 480 Professional organizations, for Proxemics, crisis intervention, 299
PO duties, 48 networking, 563–564 Proximity card readers
theft response, 263 Property access control sensors, 96
workplace violence, 290 as asset, 15 as physical security, 171
Prevention costs physical security risks, 161 Psychoactive substances, 122, see also
definition, 543–544 Proprietary system monitoring Substance abuse
total quality, 543t alarm systems, 185 Psychological dependence, drug
Preventive interaction, community physical security, 170 definitions, 277
relations, 549–550, 551t Protection of Assets Manual (POA) Psychological factors, crowd
Preventive maintenance, definition, criminal intelligence analysis, 111 formation, 139–140
226 information assets definition, PTSD, see Post-traumatic stress
Primary user relations, community 241–242 disorder (PTSD)
relations, 548 Protection officer (PO), general Public police, vs. private security,
Privacy issues, surveillance, 423–424 as agent, 46–47 18–20
Private investigators as agent of change, 302 Public relations
ethical issues, 570 and automation, 112–113 contract security contingent access
investigations, 382 core functions, 47 control, 529–530
as security job, 36 crisis intervention guidelines, 298 customer complaints, 526–527
592 INDEX

Public relations (Continued) Range-hood systems, characteristics, substance abuse, 274–277


customer relations, 524–526 213 theft, 262–264
definition, 521–522 Rank and compare, crime mapping Resumes, protection professionals, 69
emerging trends, 531 systems, 110 Retail loss prevention agent, as
media considerations, 528, 529 Rational choice theory, environmental protection career, 35
PEO control, 529 crime control, 152–153 Retail stores, theft prevention, 260
planning, 522–524 Razor ribbon, as physical security, 178 Retreat, use of force, 452
rules, 522 Readers Return on investment (ROI), crime
search policy, 264 for access control, 96, 195 mapping systems, 110
service options, 527 as physical security, 171 Review stage, disruptive behavior
training, 527–528 Real evidence management, 297
Pullman Strike, 28 definition, 443 Reward systems, and corruption,
Pull stations, fire alarm sensors, 97 legal issues, 443 384–385
Pulse-field detectors, metal detection, Reasonableness, apprehension/ REX, see Request-to-exit devices (REX)
200 detention, 499 RFID, see Radio frequency
Punishment celerity, definition, 256 Reasoning, investigations, 383–384 identification (RFID)
Punishment certainty, definition, 256 Record keeping Right flanking formation, riot control,
Punishment severity, definition, 256 access control, 193 145
Purchasing department, strike surveillance data, 424 Riot
procedures, 307 theft reporting, 262 control formations, 144–145
Recovery, drug dependence, 272 crowd definitions, 138
Red phone, as communication devices, Risk acceptance, risk management
Q 77–78 pathways, 324
QR, see Quadrupole resonance (QR) Regulatory law, overview, 30–31 Risk analysis
Quadrupole resonance (QR), detection Religion, and radical Islamic risk management process, 321
technology trends, 204 fundamentalists, 27 security service options, 527
Quaestores, 117–118 Relocking devices, safes/vaults, 176 Risk assessment, industrial hazards, 488
Qualitative assessment, risk Remote computing environments, 246 Risk assumption, definition, 8
management process, 318 Remote monitoring, automation Risk avoidance
Quality costs, community relations, trends, 113 antiterrorism strategy, 365
541–544 Reporting mechanisms definition, 7
Quantitative assessment, risk and IAP, 248 risk management pathways, 323
management process, 318 investigations, 386, 388–389 Risk management, see also Security risk
Quartz lamps, security lighting, 166 theft response, 262–263 management (SRM)
Quasi-legal proceedings, testifying, Report printers, as operator interface, in asset protection, 15–16
397–398 185 definition, 317
Report writing process, 317–321, 317f
dependability, 428–429 risk severity levels, 318f
R emerging trends, 430 strategies, 7–9, 317
Racial profiling, human relations, 512 good reports, 429–430 Risk mitigation
Radio communications importance, 427–428 definition, 8
central alarm station operator/ incident determination, 429 strategies, 4–5
dispatcher, 100 overview, 427 Risk reduction
emerging trends, 102 use-of-force cases, 466–468 antiterrorism strategy, 365
first police use, 91 Reputational damage, definition, 4 definition, 8
as transmission media, 99 Request-to-exit devices (REX), access risk management pathways, 324
Radio frequency identification (RFID) control sensors, 96 Risks
detection equipment, 203 Research, investigations, 383 accident definitions, 227
electronic access control, 196 Resort security, business strategy, 546t mitigation strategies, 4–5
Radiological materials, terrorism Response functions occupational, 221–222
trends, 358–359 aggressive behavior, 455–460 overview, 4
Railroads, security history, 21–22 alarm systems, 188–189, 203 and physical security planning, 161
Rally, crowd definitions, 138 crisis intervention, 297–298 practical exercise, 8
Randomness, patrol techniques, hazardous materials, 233–236 Risk spreading
124–125 PO duties, 48 antiterrorism strategy, 365
INDEX 593
definition, 8 feedback tools, 86–87 Self-insure, insurance overview, 9
risk management pathways, 323 lessons learned, 87 Self-protection, industrial hazards,
Risk transfer overview, 83 491–493
antiterrorism strategy, 365–366 partner approach, 84, 85f Senses, experience economy, 541, 542t
definition, 7–8 policy and procedure, 84–85 Sensitive information, definition, 243
risk management pathways, 324 resources, 87 Sensor systems
Roadway positions, traffic control, 132 technology trends, 87 access control sensors, 96
Robbery insurance, definition, 9 Security-in-depth alarms, 186–187
Rohypnol, signs/symptoms, 280–281 definition, 16 building automation systems, 97–98
ROI, see Return on investment (ROI) effectiveness, 184 CCTV, 98
Root cause, accident definitions, 227 overview, 5–6 fire alarms, 96–97
Rotating barbed wire fence, as physical security planning, 164, 165 intrusion sensors, 95–96
physical security, 178 risk mitigation strategy, 323f as physical security, 168–169
Rough glass, as physical security, 168 security risk management, 325–326 technology trends, 189
Routine activity theory Security history transmission media, 98–99
environmental crime control, 156 cyclical nature, 14–15 types, 95–98
workplace crime, 256–257 labor relations, 27–28 Sequential switches, CCTV
policing, 17–18 components, 174
professionalism, 33–34 Sexual harassment, human relations,
S security definition, 15 514–515
Sabotage, as workplace crime, 265–266 security services, 31–32 Shelter in place, as emergency
Safes, as physical security, 175–177 wartime growth, 16–17 situation, 333
Safety Security Industry Authority (SIA), 564 Shipping
crisis intervention, 301–302 Security measures, IAP, 246–247 containers, and globalization, 513
defensive tactics, 473 Security risk management (SRM) security history, 22
empty-hand tactics, 459 addressing, 323–325, 324f SHOCK factor, CARVER terrorism
fire, strike procedures, 306–307 assessment/mitigation, 316–317 model, 357
officers during use of force, 460 defense in depth, 325–326 Shopping services, investigations, 395
WAECUP Theory, 7 definition, 316 SIA, see Security Industry Authority
Safety/fire glass, as physical security, emerging trends, 328 (SIA)
167 “Four Ds” principle, 325 Signs, traffic control, 131–132
Safety officer, ICS structure, 339 historical basis, 315–316 Silos, customer service leadership, 516
SANs, see Storage area networks (SANs) mitigation strategy, 322, 323f, 326 Sit-down strike, crowd definitions, 138
“Satisficer vs. delighter” marketing, PO role, 326–328 Site selection, crime mapping systems,
547–548 process, 317–321 110
Scatter chart, security risk scatter chart, 321–322 “Sixth sense,” patrol techniques, 125
management, 321–322 strategic approach, 317 Sleeper cells, terrorism, 355
Scene view, CCTV, 173–174 tailoring of program, 326 Smart locks, as emerging trend, 181
Seaport operations, liaison function, Security services Smoking, and industrial hazards, 490
561–562 automation offerings, 112 Social cohesion, second-generation
Search policy at demonstrations, 142–143 CPTED, 157
and labor relations, 308–309 emerging trends, 37–38 Social crime prevention, vs.
substance abuse policies, 276–277 history, 31–32 environmental crime control, 152
theft response, 263–264 IAP services, 250 Social learning theory, workplace
Search and seizure provider growth, 51 crime, 257
legal issues, 441–443 security risk management, 328 Social networking media, technology
use of force, 453–454 Security supervisors, and customer and IAP, 246
Second line of defense, physical relations, 524–526 South Africa, security industry
security planning, 165 Security systems, security of, 246 regulation, 564–565
Security allocation, crime mapping Seismic sensors, intrusion sensors, 95 Special event, liaison function, 560–561
systems, 110 Self-assessment, industrial hazards, Special event planning, see also Crowd
Security awareness 488–491 management
definition, 83–84 Self-control basic considerations, 143–144
development, 86f officer safety, 460 emerging trends, 146–147
double loop learning, 85–86 use of force, 454–455 overview, 137
594 INDEX

Specialization, asset protection trends, stimulant signs, 279–280 central alarm station operator/
10 workplace effect, 274 dispatcher, 100
Specific deterrence theory, workplace Substances, hazardous materials devices for, 77–78
crime, 256 response, 234–235 security concerns, 22
Spectator crowd, definition, 140 Suicide attacks, and antiterrorism, TEMPbadge, 109
Spot protection, alarm systems, 186–187 375–377 Temperature sensors, building
SRM, see Security risk management Suitable target, workplace crime, automation sensors, 97–98
(SRM) 256–257 Tempered glass, as physical security,
Stakeholders, community relations, Supply chains, and globalization, 513, 167
550–553, 551t 518 Territoriality
Standby lighting, as physical security, Supportive stance, crisis intervention, CPTED, 6, 157
166 299 defensible space, 158
Stand pipes, characteristics, 213 Surveillance Terrorism, see also Antiterrorism
State Department, terrorism definition, basic goal, 421 actions/activities, 363–365
350 covert electronic, 422–423 asset protection history, 24–27
State police forces, security history, 18 covert personal, 422 cell, 354
Statutes in CPTED, 6–7 communications, 356
law development, 437 equipment, 423 defensive measures, 357–358
trespass, 445 investigations, 395–396 defensive strategies, 366
Statutory law, definition, 29 overt electronic, 423 definition, 349–352
Stimulants, signs/symptoms, 279–280 overt personal, 422 domestic, 354
Stockholm Syndrome, characteristics, picket lines, 307–308 as emergency situation, 334
375 privacy issues, 423–424 emerging trends, 358–359
Storage area networks (SANs), and recording/retention, 424 ethics and diversity, 516
CCTV, 94 substance abuse policies, 276 and fencing innovations, 178
Stress, and disruptive behavior, 296 types, 421–422 and globalization, 513–514
Strikes Surveys, security awareness feedback, hazardous materials trends, 236
crowd definitions, 138 87 individuals, 355
instances, 305–308 Survival, patrol techniques, 125 international, 353–354
security procedures, 306 Suspicious packages, as emergency leaderless resistance, 355
Striking techniques situations, 333 organizational structure, 354–356
critical targets, 479 System controls, as physical security, overview, 349
use of force, 478 169–170 practical exercise, 26
weapons, 478–479 System monitoring, physical security protection automation, 108
Subject identification, CCTV, 173 systems, 170 purpose, 353–354
Substance abuse security preparations, 357–358
associated definitions, 277 sleeper cells, 355
cannabis signs, 278–279 T target selection, 356–357
controlled substances lists, 283f Taft-Hartley Act, 28 and violence, 352–353
definition, 270 Target selection, terrorism, 356–357 Testifying, legal proceedings, 397–398
depressant signs, 280–281 Task, accident definitions, 227 Testimonial evidence
and disruptive behavior, 296 Task analysis, accident definitions, 227 definition, 443
drug dependency, 272 Team crisis intervention legal issues, 443
emerging trends, 284–285 leadership aspects, 301 Testing
hallucinogen signs, 281–282 overview, 300 emergency response plan, 343–344
indicators/signs, 278 positive factors, 300–301 substance abuse policies, 275
industry/business impact, 270–271 Team member skills Text-based communication, emerging
industry response, 274–277 PO leadership, 299 trends, 102
inhalants, 282–284 security awareness, 84 Theft, substance abuse issues, 271, 276
motivation, 271–272 Technical security, definition, 243 Theft insurance, definition, 9
narcotics signs, 281 Technical surveillance Theft prevention
overview, 269 countermeasures (TSCM), concealment examples, 260–261
people/asset protection, 282–284 definition, 243 concealment issues, 261
perpetuation, 273–274 Technological hazards, types, 333f employee dishonesty, 259–260
signs/symptoms, 278–282 Telephone communications first steps, 260
INDEX 595
markings, 260–261 Training, see also Education Urban design, and crime prevention,
objective, 259 customer relations, 524–526 158
overview, 258–259 defensive tactics, 479–480 Urbanization theories, and asset
WAECUP, 258 emergency response plan, 343–344 protection, 23
Theft response and IAP, 247 Use of force
employee liaison, 264 networking, 563–564 aggressive behavior response,
preventive actions, 263 Occupational Safety and Health, 220 455–460
reporting, 262–263 patrol preparation, 124 alternatives, 452–453
search policy, 263–264 public relations, 527–528 apprehension/detention, 503
Theme substance abuse policies, 275 arrest, 453–454
experience economy, 537, 542t use of force techniques, 478–479 continuum, 477t
and positive cues, 538 use of force trends, 467–468 control formula, 454–455
Third line of defense, physical security workplace violence, 291 dealing with aggression, 462–463
planning, 165 Tranquilizers, signs/symptoms, “defanging the snake”, 461–462
Third party agreements, and IAP, 248 280–281 defensive tactics, 475–478
Threat assessment, defensive tactics, Transformation economy, community definition, 450–451
473–474 relations, 554–555 detention, 453–454
Threatening phone calls, strike Transmission media, sensor systems, emerging trends, 467–468
procedures, 307 98–99 empty-hand control, 459
Threat level matrix, example, 164f Transparent mirror glass, as physical escalation/deescalation continuum,
Threats, risk management, 319 security, 168 455–460
Threshold capacity, second-generation Transportation, security service excessive force liability, 453
CPTED, 158 options, 527 justification, 451–452
Threshold limit value (TLV), Trash containers, and theft prevention, officer injury, 453
definition, 227 261 officer safety, 460
Time-delay locks, safes/vaults, 176 Trespass, legal issues, 445–446 optimal distance, 460–461
Time locks, safes/vaults, 176 Trust, PO leadership skills, 305 overview, 449–450
Timely reporting, theft response, 262 Two-way radios report writing, 466–468
Tithing central alarm station operator/ retreat, 452
definition, 17 dispatcher, 101 search and seizure, 453–454
patrol history, 118 as communication devices, 78–79 self-control, 454–455
TLV, see Threshold limit value (TLV) techniques, 478–479
Tolerance, drug definitions, 277 verbal deescalation, 463–464
Torts U weapons management, 464–466
apprehension/detention issues, UC, see Undercover (UC) “Us vs. them” syndrome
500–501 investigations and ethics, 572
civil law, 439–440 UHF transceivers, as communication human relations, 511
types, 440t devices, 79
Total quality costs Ultrasonic detectors, as physical
definition, 542–543 security, 169 V
examples, 543t Unauthorized activity, patrol purpose, Vandalism, strike procedures, 306
Trade secret 119–120 Varifocal lens, CCTV components, 174
definition, 243 Unbalanced switches, as physical Vaults, as physical security, 175–177
and IAP, 247–248 security, 168 Vehicles
Traditionalism, and bad behavior, Undercover (UC) investigations break-in, 559–560
572 characteristics, 394–395 safety hazards, 223
Traffic control substance abuse policies, 276 Verbal communication
equipment, 135 Underwriters Laboratories Inc. (UL) and crowd management, 142
gate duty, 135 physical security criteria, 177 disruptive behavior control, 300
hand signals, 132–133 safes, 176 interviewing, 414
responsibilities, 133–135 Uniform presence, escalation/ PO leadership skills, 305
roadway positions, 132 deescalation continuum, 455, 458 theft reporting, 262
signs/automatic signals, 131–132 Uniforms, patrol preparation, 122 use of force, 477
traffic direction rules, 135–136 United Kingdom, security industry Verbal deescalation
whistle, 133 regulation, 564 aggressive situations, 463–464
596 INDEX

Verbal deescalation (Continued) Incident Command System, 338–340 Working conditions, Occupational
escalation/deescalation continuum, media relations, 341–342 Safety and Health, 219
455–456, 458 National Incident Management Workplace, substance abuse effects,
use of force, 463 System, 340 274
Verbal disruptive behavior, Workplace crime
characteristics, 298 emerging trends, 265–266
VHF transceivers, as communication W general deterrence theory, 256
devices, 79 Wackenhut Corporation, 32 neutralization techniques, 257–258,
Vibration detectors, as physical WAECUP Theory 258t
security, 169 definition, 126–127 overview, 255
Video analytics, CCTV trends, 189 overview, 7 routine activity theory, 256–257
Video motion detection (VMD) theft prevention, 258 social learning theory, 257
CCTV, 98 Wagner Act, 28 theft response, 262–264
as physical security, 169 Warne, Kate, 514 theories, 255–258
Video recorders, CCTV components, Warranties, civil law, 439 Workplace inspection, definition, 227
174–175 Water-based extinguishers, Workplace violence
Vigiles, 117–118 characteristics, 212 business impact, 289
Violence Weapons crisis intervention trends, 302
behavior control, 299–300 assisted controls, 478 emerging trends, 292
and terrorism, 352–353 and defensive tactics, 474–475 examples, 484
use of force, 462–463 escalation/deescalation continuum, incident categories, 287–288
workplace, see Workplace violence 457 overview, 287
VIP protection management during use of force, pervasiveness, 288
emerging trends, 376–377 464–466 prevention programs, 290
liaison function, 561f pressure point/pain controls, 478 training, 291
overview, 363 striking techniques, 478–479 typologies, 484
PPS professional development, use of force trends, 468 warning signs, 291
370–371 Web sites, for protection professionals, World Health Organization (WHO),
PPS skills, 371–372 68 health definition, 218
principal protection, 372–373 Weight, safes, 176 Writing skills
Virtual attacks, terrorism trends, 359 Weingarten Rule, 392, 392t investigation history, 384
Visitor management systems, 99–100, “What if?” game, patrol techniques, investigations, 386
109–110 125–126 PO leadership, 305
Visual displays, alarm system Whistle, traffic control, 133 Written reports, theft response,
interfaces, 185 “Who-What-Where-When-Why-How,” 262–263
VMD, see Video motion detection good report writing, 429–430
(VMD) Wiegand card readers, 96, 171
Volumetric protection, alarm systems, Wild, Jonathan, 18–19 X
186 Wildcat strike, definition, 305 X-ray technology, 200–202
Volunteering, protection professionals, Wired glass, as physical security, 167
68 Wireless computing environments,
Vulnerability 246 Y
risk management, 320 Withdrawal, drug definitions, 277 Young offenders, legal issues, 441
risk reduction, 324 Women protection officers, 514–515
Vulnerability analysis Workers’ compensation, 9, 271
Emergency Operations Centers, Worker-on-worker violence, definition, Z
340–341 288 Zoom lens, CCTV components, 174
emergency planning, 338–342, 338t Working Alone Legislation, 292

Você também pode gostar