Private Sector Issues - State University of New York
Download
Report
Transcript Private Sector Issues - State University of New York
Chapter Three
Private Security Concepts, Tools
and Systems Convergence
1
Risk Management
Criminal events and natural disasters are
often impossible to predict or prevent
Even the best security systems, operations,
personnel and planning can’t foresee or
prevent these tragic events from occurring
Mitigating the effects of an attack, is of
paramount concern
2
Risk Management
“Risk Management” is the process of
balancing the cost of security with the overall
corporate goal of producing goods, services
and profits
And, the essential tools of Risk Management
are:
Risk Analysis or Risk Assessment and
The Security Survey
3
Risk Management
“Risk Management” can also be defined as
the process involved in the anticipation,
recognition, and appraisal of a risk and the
initiation of action to eliminate the risk
entirely or reduce the threat of harm to an
acceptable level
4
Risk Management
A good “Risk Management” program
involves four basic steps:
The identification of risks or specific
vulnerabilities
An analysis and study of these risks
The likelihood
The degree of danger in the event
5
Risk Management
A good “Risk Management” program
involves four basic steps:
The optimization of risk management
alternatives
The ongoing study of security programs
Not a one time program
Test and retest the program
Improving all the time
6
Risk Management
Curtis & McBride define “Risk Management”
as:
A comprehensive review of assets that
could be damaged, stolen or lost
presenting countermeasures to reduce such
losses
Predicting long term consequences
7
Risk Management
Curtis & McBride suggest asking the
following questions
What are the assets?
How are these assets valuable?
What are the threats to the assets?
What is the probability that these scenarios
will occur?
8
Risk Management
Curtis & McBride suggest asking the
following questions
What is our liability if such events occur?
What do we do to get back to business or
restore services if an event occurs?
What is the effect on our business and
leadership reputation?
9
Risk Management
Curtis & McBride say that once the major
risks have been identified:
Each risk must be ranked in terms of
probability that it could occur
And then identify countermeasures to deal
with them
10
Risk Analysis or Risk Assessment
Risk Analysis is the major tool in the Risk
Management Process
The process of identifying potential areas of
security problems and loss
The development and implementation of
effective measures or countermeasures to deal
with these problems
11
Risk Analysis or Risk Assessment
An effective “Risk Assessment”
Risk: What are the assets that can be subject to
risk?
Vulnerability: How difficult is it to get to the
high risk assets?
Probability: What are the chances that such a
risk may occur?
Countermeasures: What can security do, given
the resources available?
12
Risk Analysis or Risk Assessment
“Risk Assessment” allows management to
design countermeasures that are effective, but
do not interfere with the operations of the
business
“Risk Assessment” allows management to make
decisions that balance the cost v. the level of
protection desired
But, managers can’t always make decisions
based solely on a cost-benefit analysis
13
Risk Analysis or Risk Assessment
The example of School Shootings
Metal detectors?
Electronic video systems
Security officers
All of the above are not cost effective, but
when dealing with lives, you can’t put a price
on a life!
14
The Security Survey
The “Security Survey” is a comprehensive
physical examination of a premise and a
thorough inspection of all security systems and
procedures
The object of the “Security Survey” is the
analysis of a facility to determine the existing
state of security, locate weaknesses in its
defenses, determine the degree of protection
needed and recommendations for establishing a
total security program
15
The Security Survey
The “Security Survey” may be conducted by “In
House” personnel or contracted out to a security
consulting firm
The “Security Survey” includes:
A physical inspection of the facilities
Examination of police and internal reports
Interview of all personnel familiar with any
aspects of the organization
Organizational procedures
16
Proprietary and Contract Services
“Proprietary Security Services” are “in house”
services performed by people employed directly
by the organization for which they provide
these services
“Proprietary Security Personnel” are regular
employees of the firm and are paid by the firm
Fortune 1000 companies usually have their own
“Proprietary Security”
17
Proprietary and Contract Services
“Contract Security Services” are provided by
other agencies and private practitioners for a fee
“Contract Security Services” lease or rent their
services to the agency
The officers and other security personnel are
paid by the contract agency
Malls, sporting events or other organizations
employ ‘Contract Security Services”
(Wackenhut…)
18
Proprietary and Contract Services
Proprietary officers receive benefits from the
company and are seen as “Company Men” and
are therefore are more trustworthy than
Contract officers
Proprietary officers have less turnover, can be
used at important posts, executive escorts,
supervise “contract officers”, more caring, better
appearance…
19
Proprietary and Contract Services
Managers must also be concerned with
“Liability Issues”
Inappropriate or unlawful actions of a contract
officer can be a liability for the contract
company and the employing organization
Managers can find “Contract Services” online
by the use of “Reverse Auctions” where
Contract Security Services bid on services
(services must be stated in advance)
20
Overt and Covert Security
“Overt Security” is using observable methods to
provide security
Visual patrols designed to provide protective
and loss prevention
“Covert Security” is using undercover methods
to provide security
Undercover surveillance to detect
lawbreakers, prevent espionage, protection of
trade secrets
21
The Command or Control Center
Large organizations establish a formal
“Command Centers” to monitor all security
operations, including alarms, electronic video
surveillance and security officer operations
Automated systems can reduce personnel costs,
improve response times and improve
operations from the “Command Center”
22
Crisis Management Teams
Large, well managed organizations have
policies and procedures in place for dealing
with any crisis or disaster that might arise from
crimes or environmental disasters (floods,
storms, hurricanes…)
Y2K, FEMA, Department of Homeland
Security
The “Crisis Management Team” coordinates all
activities with organizational, emergency and
governmental personnel
23
Security Officers
The first concept of a security officer may have
been when people posted members of their clan
to protect them from other humans and animals
One of the earliest forms of contract officer
security service was the use of the Swiss Guard
at the Vatican (Michelangelo designed their
uniforms)
Look at the numbers employed on Exhibits 3.2
and 3.2, page 66
24
Security Officers
The concept of managing security officers is
called “Guard Force Management”
Effective “Officer Management” supports all the
technical security that a company uses in its
security operations
25
Security Officers
A 2003 article in USA Today reported that most
of the nation’s 1 million plus security officers
are unlicensed, untrained, not subject to
background checks and that this $12 billion a
year industry is marked by high turnover, low
pay, few benefits and little oversight
Review Exhibit 3.3, Security Guard Company
Information, page 67
26
Security Officers
Armed or Unarmed?
The most important is whether or not the
protective value of guns is greater than the
dangers they can pose to innocent parties and
whether firearms intimidate customers and
employees
Officers should be armed in financial
institution, around moneys and places like
nuclear power plants
27
Security Officers
Armed or Unarmed?
Officers should not be armed around people
Insurance companies are worried about
liabilities
Armed officers should be more carefully
screened, more rigorously trained, and better
paid
The National Association for Convenience and
Petroleum Retailing (NACS) recommends that
convenience store employees not be armed
28
Security Officers
Turnover
Turnover occurs when an employee resigns, is
involuntarily terminated or retires
Security officer turnover is estimated between
100 and 400% a year
This costs the company thousands of dollars per
year in advertising, interviewing, background
checks, new employee training, lost hours
(overtime), productivity (knowledge)
29
Security Officers
Turnover
McNally advises that managers should
determine and monitor their turnover rates
and then conduct written, anonymous surveys
to gather officers opinions on issues that they
believe contribute to their retention or
voluntary separation
Most of the research has revealed the top
reason for dissatisfaction is compensation
Read over Exhibits 3.4 and 3.5, pages 69-70 30
Security Officers
Computerized Officer Tour Systems
Computerized Officer Tour Systems record
the foot patrol activities of officers and the
time and location of each visit they make
A mobile workforce management Global
Positioning Tracking System (GPS) is installed
in each officers cell phone and patrol vehicle
31
Canine Security
Bomb sniffing dogs are “Passive Response”
dogs (they back away from the identified
substance, sit down and look at their handler) as
opposed to “Aggressive Response” dogs, such
as drug, arson, tracking and cadaver dogs that
bark and scratch to signal an alert of positive
response
32
Canine Security
Bomb sniffing dogs are expensive
$8,500 for a fully trained dog
$125/hour
Dogs are used at sporting arenas and other
entertainment facilities to create an added sense
of security
But at the same time there are little if any
government regulations
33
Access Control
“Access Control” is the use of qualifying devices
or identification methods at various points to
control the passage of people and vehicles into
or out of an area of structure
“Access Control” limits access to people who
have authorization to enter through selected
points
“Access Control” controls who goes where and
when
34
Access Control
How is “Access Control” accomplished?
Security officers (slow and expensive)
Mechanical locks
Keys
Turnstiles
Barricades
35
Access Control
How is “Access Control” accomplished?
Electronic Access Control
Card readers, keypads, biometric devices…
Digital memory can keep track of which doors
are used, how frequently, and by whom
The ID database is tied into the Human
Resources database (promotions,
reassignments, terminations, deprogrammed)
36
Access Control
How is “Access Control” accomplished?
Biometric Access Control System
“Biometric Identification Systems”
automatically recognize individuals by
physiological characteristics
The first “Biometric System” and the one most
widely used is fingerprint identification
Others include, palm prints, hand prints,
retinal scans, voice and facial recognition…
37
Access Control
How is “Access Control” accomplished?
Smart Cards
“Smart Cards” are computerized identification
cards with barcodes that enable the card to be
used for numerous purposes, including photo
ID, access entry and charging purchases
But “Smart Cards” can ensure that the person
swiping the card is the person authorized
assess
38
Access Control
How is “Access Control” accomplished?
Microprocessor Cards
“Microprocessor Cards” include chips that are
actually microcontrollers built into them
“Applets” are tiny programs, contained within
the cards, that carry out individual
applications
39
Alarm Systems
“Alarm Systems” are electronic warning or
intruder alert systems
Motion detectors on fences, windows, doors
90% of today’s alarm systems rely on telephone
lines as their method of signal transmission
40
Alarm Systems
The problem is that they can fail if the signal to
the central monitoring station is interrupted by
nature or human tampering w/the telephone
lines
Today, these systems can be backed up by a
wireless transmission system that kicks in
whenever the telephone lines are down
41
Alarm Systems
Attempts to protect against baby abductions from
maternity wards included uniform security
officers, alarms, electronic video surveillance,
electronic access control, automatic closing and
locking door systems, ID bracelets worn by
babies and parents, infant abduction response
plan
42
Alarm Systems
Alarms are now being used to address the
problem of abduction of babies from hospital
maternity wards
The latest technology also allows hospital
maternity personnel to attach an alarm device to
the umbilical cords of newborns that activates an
alarm whenever a baby is brought near the doors
of the maternity ward
43
Alarm Systems
The National Burglar and Fire Alarm Association
(NBFAA) is a professional association dedicated
to representing, promoting and supporting the
electronic life safety, security and systems
industry
44
Alarm Systems
According to the NBFAA a major problem and
issue regarding alarms is the false alarm
Too many false alarms places an unnecessary
drain on police resources
The answer is a “Verified Response” system,
which requires alarm companies to confirm break
ins or security breaches before officers will be
deployed to the scene of a ringing alarm (panic,
distress, or robbery alarms still have a response)
45
Electronic Video Surveillance
“Electronic Video Surveillance” systems allow the
recording of events, including surveillance and
security cameras and closed circuit television
systems
These systems can passively record or play back
video at certain intervals, be actively monitored
or be used in a combination of these methods
The use of electronic video surveillance has been
consistently held by the Courts to be
Constitutional and not a violation of privacy
46