chapter three private security concepts, tools and systems convergence 1
TRANSCRIPT
Chapter ThreePrivate Security Concepts, Tools
and Systems Convergence
1
Risk Management Criminal events and natural disasters
are often impossible to predict or prevent
Even the best security systems, operations, personnel and planning can’t foresee or prevent these tragic events from occurring
Mitigating the effects of an attack, is of paramount concern
2
Risk Management “Risk Management” is the process of
balancing the cost of security with the overall corporate goal of producing goods, services and profits
And, the essential tools of Risk Management are: Risk Analysis or Risk Assessment and The Security Survey
3
Risk Management “Risk Management” can also be defined
as the process involved in the anticipation, recognition, and appraisal of a risk and the initiation of action to eliminate the risk entirely or reduce the threat of harm to an acceptable level
4
Risk Management A good “Risk Management” program
involves four basic steps: The identification of risks or specific
vulnerabilities An analysis and study of these risks
The likelihoodThe degree of danger in the event
5
Risk Management A good “Risk Management” program
involves four basic steps: The optimization of risk management
alternatives The ongoing study of security programs
Not a one time programTest and retest the program Improving all the time
6
Risk Management Curtis & McBride define “Risk
Management” as: A comprehensive review of assets that
could be damaged, stolen or lost presenting countermeasures to
reduce such losses Predicting long term consequences
7
Risk Management Curtis & McBride suggest asking the
following questions What are the assets? How are these assets valuable? What are the threats to the assets? What is the probability that these
scenarios will occur?
8
Risk Management Curtis & McBride suggest asking the
following questions What is our liability if such events
occur? What do we do to get back to
business or restore services if an event occurs?
What is the effect on our business and leadership reputation?
9
Risk Management Curtis & McBride say that once the
major risks have been identified: Each risk must be ranked in terms of
probability that it could occur And then identify countermeasures to
deal with them
10
Risk Analysis or Risk Assessment Risk Analysis is the major tool in the Risk
Management Process The process of identifying potential
areas of security problems and loss The development and implementation of
effective measures or countermeasures to deal with these problems
11
Risk Analysis or Risk Assessment An effective “Risk Assessment”
Risk: What are the assets that can be subject to risk?
Vulnerability: How difficult is it to get to the high risk assets?
Probability: What are the chances that such a risk may occur?
Countermeasures: What can security do, given the resources available?
12
Risk Analysis or Risk Assessment “Risk Assessment” allows management to
design countermeasures that are effective, but do not interfere with the operations of the business
“Risk Assessment” allows management to make decisions that balance the cost v. the level of protection desired
But, managers can’t always make decisions based solely on a cost-benefit analysis
13
Risk Analysis or Risk Assessment The example of School Shootings
Metal detectors? Electronic video systems Security officers All of the above are not cost effective,
but when dealing with lives, you can’t put a price on a life!
14
The Security Survey The “Security Survey” is a comprehensive
physical examination of a premise and a thorough inspection of all security systems and procedures
The object of the “Security Survey” is the analysis of a facility to determine the existing state of security, locate weaknesses in its defenses, determine the degree of protection needed and recommendations for establishing a total security program
15
The Security Survey The “Security Survey” may be conducted
by “In House” personnel or contracted out to a security consulting firm
The “Security Survey” includes: A physical inspection of the facilities Examination of police and internal
reports Interview of all personnel familiar with
any aspects of the organization Organizational procedures
16
Proprietary and Contract Services “Proprietary Security Services” are “in
house” services performed by people employed directly by the organization for which they provide these services
“Proprietary Security Personnel” are regular employees of the firm and are paid by the firm
Fortune 1000 companies usually have their own “Proprietary Security”
17
Proprietary and Contract Services “Contract Security Services” are provided
by other agencies and private practitioners for a fee
“Contract Security Services” lease or rent their services to the agency
The officers and other security personnel are paid by the contract agency
Malls, sporting events or other organizations employ ‘Contract Security Services” (Wackenhut…)
18
Proprietary and Contract Services Proprietary officers receive benefits from
the company and are seen as “Company Men” and are therefore are more trustworthy than Contract officers
Proprietary officers have less turnover, can be used at important posts, executive escorts, supervise “contract officers”, more caring, better appearance…
19
Proprietary and Contract Services Managers must also be concerned with
“Liability Issues” Inappropriate or unlawful actions of a
contract officer can be a liability for the contract company and the employing organization
Managers can find “Contract Services” online by the use of “Reverse Auctions” where Contract Security Services bid on services (services must be stated in advance)
20
Overt and Covert Security “Overt Security” is using observable
methods to provide security Visual patrols designed to provide
protective and loss prevention “Covert Security” is using undercover
methods to provide security Undercover surveillance to detect
lawbreakers, prevent espionage, protection of trade secrets
21
The Command or Control Center Large organizations establish a formal
“Command Centers” to monitor all security operations, including alarms, electronic video surveillance and security officer operations
Automated systems can reduce personnel costs, improve response times and improve operations from the “Command Center”
22
Crisis Management Teams Large, well managed organizations have
policies and procedures in place for dealing with any crisis or disaster that might arise from crimes or environmental disasters (floods, storms, hurricanes…) Y2K, FEMA, Department of Homeland
Security The “Crisis Management Team” coordinates
all activities with organizational, emergency and governmental personnel
23
Security Officers The first concept of a security officer may
have been when people posted members of their clan to protect them from other humans and animals
One of the earliest forms of contract officer security service was the use of the Swiss Guard at the Vatican (Michelangelo designed their uniforms)
Look at the numbers employed on Exhibits 3.2 and 3.2, page 66
24
Security Officers The concept of managing security officers
is called “Guard Force Management” Effective “Officer Management” supports
all the technical security that a company uses in its security operations
25
Security Officers A 2003 article in USA Today reported that
most of the nation’s 1 million plus security officers are unlicensed, untrained, not subject to background checks and that this $12 billion a year industry is marked by high turnover, low pay, few benefits and little oversight
Review Exhibit 3.3, Security Guard Company Information, page 67
26
Security Officers Armed or Unarmed?
The most important is whether or not the protective value of guns is greater than the dangers they can pose to innocent parties and whether firearms intimidate customers and employees
Officers should be armed in financial institution, around moneys and places like nuclear power plants
27
Security Officers Armed or Unarmed?
Officers should not be armed around people
Insurance companies are worried about liabilities
Armed officers should be more carefully screened, more rigorously trained, and better paid
The National Association for Convenience and Petroleum Retailing (NACS) recommends that convenience store employees not be armed
28
Security Officers Turnover
Turnover occurs when an employee resigns, is involuntarily terminated or retires
Security officer turnover is estimated between 100 and 400% a year
This costs the company thousands of dollars per year in advertising, interviewing, background checks, new employee training, lost hours (overtime), productivity (knowledge)
29
Security Officers Turnover
McNally advises that managers should determine and monitor their turnover rates and then conduct written, anonymous surveys to gather officers opinions on issues that they believe contribute to their retention or voluntary separation
Most of the research has revealed the top reason for dissatisfaction is compensation
Read over Exhibits 3.4 and 3.5, pages 69-70
30
Security Officers Computerized Officer Tour Systems
Computerized Officer Tour Systems record the foot patrol activities of officers and the time and location of each visit they make
A mobile workforce management Global Positioning Tracking System (GPS) is installed in each officers cell phone and patrol vehicle
31
Canine Security Bomb sniffing dogs are “Passive
Response” dogs (they back away from the identified substance, sit down and look at their handler) as opposed to “Aggressive Response” dogs, such as drug, arson, tracking and cadaver dogs that bark and scratch to signal an alert of positive response
32
Canine Security Bomb sniffing dogs are expensive
$8,500 for a fully trained dog $125/hour
Dogs are used at sporting arenas and other entertainment facilities to create an added sense of security
But at the same time there are little if any government regulations
33
Access Control “Access Control” is the use of qualifying
devices or identification methods at various points to control the passage of people and vehicles into or out of an area of structure
“Access Control” limits access to people who have authorization to enter through selected points
“Access Control” controls who goes where and when
34
Access Control How is “Access Control” accomplished?
Security officers (slow and expensive) Mechanical locks Keys Turnstiles Barricades
35
Access Control How is “Access Control” accomplished?
Electronic Access ControlCard readers, keypads, biometric devices…Digital memory can keep track of which doors are used, how frequently, and by whom
The ID database is tied into the Human Resources database (promotions, reassignments, terminations, deprogrammed)
36
Access Control How is “Access Control” accomplished?
Biometric Access Control System“Biometric Identification Systems” automatically recognize individuals by physiological characteristics
The first “Biometric System” and the one most widely used is fingerprint identification
Others include, palm prints, hand prints, retinal scans, voice and facial recognition…
37
Access Control How is “Access Control” accomplished?
Smart Cards“Smart Cards” are computerized identification cards with barcodes that enable the card to be used for numerous purposes, including photo ID, access entry and charging purchases
But “Smart Cards” can ensure that the person swiping the card is the person authorized assess
38
Access Control How is “Access Control” accomplished?
Microprocessor Cards“Microprocessor Cards” include chips that are actually microcontrollers built into them
“Applets” are tiny programs, contained within the cards, that carry out individual applications
39
Alarm Systems “Alarm Systems” are electronic warning or
intruder alert systems Motion detectors on fences, windows, doors
90% of today’s alarm systems rely on telephone lines as their method of signal transmission
40
Alarm Systems The problem is that they can fail if the
signal to the central monitoring station is interrupted by nature or human tampering w/the telephone lines
Today, these systems can be backed up by a wireless transmission system that kicks in whenever the telephone lines are down
41
Alarm Systems Attempts to protect against baby
abductions from maternity wards included uniform security officers, alarms, electronic video surveillance, electronic access control, automatic closing and locking door systems, ID bracelets worn by babies and parents, infant abduction response plan
42
Alarm Systems Alarms are now being used to address the
problem of abduction of babies from hospital maternity wards
The latest technology also allows hospital maternity personnel to attach an alarm device to the umbilical cords of newborns that activates an alarm whenever a baby is brought near the doors of the maternity ward
43
Alarm Systems The National Burglar and Fire Alarm
Association (NBFAA) is a professional association dedicated to representing, promoting and supporting the electronic life safety, security and systems industry
44
Alarm Systems According to the NBFAA a major problem and
issue regarding alarms is the false alarm Too many false alarms places an unnecessary
drain on police resources The answer is a “Verified Response” system,
which requires alarm companies to confirm break ins or security breaches before officers will be deployed to the scene of a ringing alarm (panic, distress, or robbery alarms still have a response)
45
Electronic Video Surveillance “Electronic Video Surveillance” systems allow
the recording of events, including surveillance and security cameras and closed circuit television systems
These systems can passively record or play back video at certain intervals, be actively monitored or be used in a combination of these methods
The use of electronic video surveillance has been consistently held by the Courts to be Constitutional and not a violation of privacy
46