chapter three private security concepts, tools and systems convergence 1

46
Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Upload: domenic-lawrence

Post on 11-Jan-2016

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Chapter ThreePrivate Security Concepts, Tools

and Systems Convergence

1

Page 2: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Risk Management Criminal events and natural disasters

are often impossible to predict or prevent

Even the best security systems, operations, personnel and planning can’t foresee or prevent these tragic events from occurring

Mitigating the effects of an attack, is of paramount concern

2

Page 3: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Risk Management “Risk Management” is the process of

balancing the cost of security with the overall corporate goal of producing goods, services and profits

And, the essential tools of Risk Management are: Risk Analysis or Risk Assessment and The Security Survey

3

Page 4: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Risk Management “Risk Management” can also be defined

as the process involved in the anticipation, recognition, and appraisal of a risk and the initiation of action to eliminate the risk entirely or reduce the threat of harm to an acceptable level

4

Page 5: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Risk Management A good “Risk Management” program

involves four basic steps: The identification of risks or specific

vulnerabilities An analysis and study of these risks

The likelihoodThe degree of danger in the event

5

Page 6: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Risk Management A good “Risk Management” program

involves four basic steps: The optimization of risk management

alternatives The ongoing study of security programs

Not a one time programTest and retest the program Improving all the time

6

Page 7: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Risk Management Curtis & McBride define “Risk

Management” as: A comprehensive review of assets that

could be damaged, stolen or lost presenting countermeasures to

reduce such losses Predicting long term consequences

7

Page 8: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Risk Management Curtis & McBride suggest asking the

following questions What are the assets? How are these assets valuable? What are the threats to the assets? What is the probability that these

scenarios will occur?

8

Page 9: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Risk Management Curtis & McBride suggest asking the

following questions What is our liability if such events

occur? What do we do to get back to

business or restore services if an event occurs?

What is the effect on our business and leadership reputation?

9

Page 10: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Risk Management Curtis & McBride say that once the

major risks have been identified: Each risk must be ranked in terms of

probability that it could occur And then identify countermeasures to

deal with them

10

Page 11: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Risk Analysis or Risk Assessment Risk Analysis is the major tool in the Risk

Management Process The process of identifying potential

areas of security problems and loss The development and implementation of

effective measures or countermeasures to deal with these problems

11

Page 12: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Risk Analysis or Risk Assessment An effective “Risk Assessment”

Risk: What are the assets that can be subject to risk?

Vulnerability: How difficult is it to get to the high risk assets?

Probability: What are the chances that such a risk may occur?

Countermeasures: What can security do, given the resources available?

12

Page 13: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Risk Analysis or Risk Assessment “Risk Assessment” allows management to

design countermeasures that are effective, but do not interfere with the operations of the business

“Risk Assessment” allows management to make decisions that balance the cost v. the level of protection desired

But, managers can’t always make decisions based solely on a cost-benefit analysis

13

Page 14: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Risk Analysis or Risk Assessment The example of School Shootings

Metal detectors? Electronic video systems Security officers All of the above are not cost effective,

but when dealing with lives, you can’t put a price on a life!

14

Page 15: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

The Security Survey The “Security Survey” is a comprehensive

physical examination of a premise and a thorough inspection of all security systems and procedures

The object of the “Security Survey” is the analysis of a facility to determine the existing state of security, locate weaknesses in its defenses, determine the degree of protection needed and recommendations for establishing a total security program

15

Page 16: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

The Security Survey The “Security Survey” may be conducted

by “In House” personnel or contracted out to a security consulting firm

The “Security Survey” includes: A physical inspection of the facilities Examination of police and internal

reports Interview of all personnel familiar with

any aspects of the organization Organizational procedures

16

Page 17: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Proprietary and Contract Services “Proprietary Security Services” are “in

house” services performed by people employed directly by the organization for which they provide these services

“Proprietary Security Personnel” are regular employees of the firm and are paid by the firm

Fortune 1000 companies usually have their own “Proprietary Security”

17

Page 18: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Proprietary and Contract Services “Contract Security Services” are provided

by other agencies and private practitioners for a fee

“Contract Security Services” lease or rent their services to the agency

The officers and other security personnel are paid by the contract agency

Malls, sporting events or other organizations employ ‘Contract Security Services” (Wackenhut…)

18

Page 19: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Proprietary and Contract Services Proprietary officers receive benefits from

the company and are seen as “Company Men” and are therefore are more trustworthy than Contract officers

Proprietary officers have less turnover, can be used at important posts, executive escorts, supervise “contract officers”, more caring, better appearance…

19

Page 20: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Proprietary and Contract Services Managers must also be concerned with

“Liability Issues” Inappropriate or unlawful actions of a

contract officer can be a liability for the contract company and the employing organization

Managers can find “Contract Services” online by the use of “Reverse Auctions” where Contract Security Services bid on services (services must be stated in advance)

20

Page 21: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Overt and Covert Security “Overt Security” is using observable

methods to provide security Visual patrols designed to provide

protective and loss prevention “Covert Security” is using undercover

methods to provide security Undercover surveillance to detect

lawbreakers, prevent espionage, protection of trade secrets

21

Page 22: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

The Command or Control Center Large organizations establish a formal

“Command Centers” to monitor all security operations, including alarms, electronic video surveillance and security officer operations

Automated systems can reduce personnel costs, improve response times and improve operations from the “Command Center”

22

Page 23: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Crisis Management Teams Large, well managed organizations have

policies and procedures in place for dealing with any crisis or disaster that might arise from crimes or environmental disasters (floods, storms, hurricanes…) Y2K, FEMA, Department of Homeland

Security The “Crisis Management Team” coordinates

all activities with organizational, emergency and governmental personnel

23

Page 24: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Security Officers The first concept of a security officer may

have been when people posted members of their clan to protect them from other humans and animals

One of the earliest forms of contract officer security service was the use of the Swiss Guard at the Vatican (Michelangelo designed their uniforms)

Look at the numbers employed on Exhibits 3.2 and 3.2, page 66

24

Page 25: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Security Officers The concept of managing security officers

is called “Guard Force Management” Effective “Officer Management” supports

all the technical security that a company uses in its security operations

25

Page 26: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Security Officers A 2003 article in USA Today reported that

most of the nation’s 1 million plus security officers are unlicensed, untrained, not subject to background checks and that this $12 billion a year industry is marked by high turnover, low pay, few benefits and little oversight

Review Exhibit 3.3, Security Guard Company Information, page 67

26

Page 27: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Security Officers Armed or Unarmed?

The most important is whether or not the protective value of guns is greater than the dangers they can pose to innocent parties and whether firearms intimidate customers and employees

Officers should be armed in financial institution, around moneys and places like nuclear power plants

27

Page 28: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Security Officers Armed or Unarmed?

Officers should not be armed around people

Insurance companies are worried about liabilities

Armed officers should be more carefully screened, more rigorously trained, and better paid

The National Association for Convenience and Petroleum Retailing (NACS) recommends that convenience store employees not be armed

28

Page 29: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Security Officers Turnover

Turnover occurs when an employee resigns, is involuntarily terminated or retires

Security officer turnover is estimated between 100 and 400% a year

This costs the company thousands of dollars per year in advertising, interviewing, background checks, new employee training, lost hours (overtime), productivity (knowledge)

29

Page 30: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Security Officers Turnover

McNally advises that managers should determine and monitor their turnover rates and then conduct written, anonymous surveys to gather officers opinions on issues that they believe contribute to their retention or voluntary separation

Most of the research has revealed the top reason for dissatisfaction is compensation

Read over Exhibits 3.4 and 3.5, pages 69-70

30

Page 31: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Security Officers Computerized Officer Tour Systems

Computerized Officer Tour Systems record the foot patrol activities of officers and the time and location of each visit they make

A mobile workforce management Global Positioning Tracking System (GPS) is installed in each officers cell phone and patrol vehicle

31

Page 32: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Canine Security Bomb sniffing dogs are “Passive

Response” dogs (they back away from the identified substance, sit down and look at their handler) as opposed to “Aggressive Response” dogs, such as drug, arson, tracking and cadaver dogs that bark and scratch to signal an alert of positive response

32

Page 33: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Canine Security Bomb sniffing dogs are expensive

$8,500 for a fully trained dog $125/hour

Dogs are used at sporting arenas and other entertainment facilities to create an added sense of security

But at the same time there are little if any government regulations

33

Page 34: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Access Control “Access Control” is the use of qualifying

devices or identification methods at various points to control the passage of people and vehicles into or out of an area of structure

“Access Control” limits access to people who have authorization to enter through selected points

“Access Control” controls who goes where and when

34

Page 35: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Access Control How is “Access Control” accomplished?

Security officers (slow and expensive) Mechanical locks Keys Turnstiles Barricades

35

Page 36: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Access Control How is “Access Control” accomplished?

Electronic Access ControlCard readers, keypads, biometric devices…Digital memory can keep track of which doors are used, how frequently, and by whom

The ID database is tied into the Human Resources database (promotions, reassignments, terminations, deprogrammed)

36

Page 37: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Access Control How is “Access Control” accomplished?

Biometric Access Control System“Biometric Identification Systems” automatically recognize individuals by physiological characteristics

The first “Biometric System” and the one most widely used is fingerprint identification

Others include, palm prints, hand prints, retinal scans, voice and facial recognition…

37

Page 38: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Access Control How is “Access Control” accomplished?

Smart Cards“Smart Cards” are computerized identification cards with barcodes that enable the card to be used for numerous purposes, including photo ID, access entry and charging purchases

But “Smart Cards” can ensure that the person swiping the card is the person authorized assess

38

Page 39: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Access Control How is “Access Control” accomplished?

Microprocessor Cards“Microprocessor Cards” include chips that are actually microcontrollers built into them

“Applets” are tiny programs, contained within the cards, that carry out individual applications

39

Page 40: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Alarm Systems “Alarm Systems” are electronic warning or

intruder alert systems Motion detectors on fences, windows, doors

90% of today’s alarm systems rely on telephone lines as their method of signal transmission

40

Page 41: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Alarm Systems The problem is that they can fail if the

signal to the central monitoring station is interrupted by nature or human tampering w/the telephone lines

Today, these systems can be backed up by a wireless transmission system that kicks in whenever the telephone lines are down

41

Page 42: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Alarm Systems Attempts to protect against baby

abductions from maternity wards included uniform security officers, alarms, electronic video surveillance, electronic access control, automatic closing and locking door systems, ID bracelets worn by babies and parents, infant abduction response plan

42

Page 43: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Alarm Systems Alarms are now being used to address the

problem of abduction of babies from hospital maternity wards

The latest technology also allows hospital maternity personnel to attach an alarm device to the umbilical cords of newborns that activates an alarm whenever a baby is brought near the doors of the maternity ward

43

Page 44: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Alarm Systems The National Burglar and Fire Alarm

Association (NBFAA) is a professional association dedicated to representing, promoting and supporting the electronic life safety, security and systems industry

44

Page 45: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Alarm Systems According to the NBFAA a major problem and

issue regarding alarms is the false alarm Too many false alarms places an unnecessary

drain on police resources The answer is a “Verified Response” system,

which requires alarm companies to confirm break ins or security breaches before officers will be deployed to the scene of a ringing alarm (panic, distress, or robbery alarms still have a response)

45

Page 46: Chapter Three Private Security Concepts, Tools and Systems Convergence 1

Electronic Video Surveillance “Electronic Video Surveillance” systems allow

the recording of events, including surveillance and security cameras and closed circuit television systems

These systems can passively record or play back video at certain intervals, be actively monitored or be used in a combination of these methods

The use of electronic video surveillance has been consistently held by the Courts to be Constitutional and not a violation of privacy

46