Private Sector Issues - State University of New York

Download Report

Transcript Private Sector Issues - State University of New York

Chapter Three
Private Security Concepts, Tools
and Systems Convergence
1

Risk Management
Criminal events and natural disasters are
often impossible to predict or prevent
 Even the best security systems, operations,
personnel and planning can’t foresee or
prevent these tragic events from occurring
 Mitigating the effects of an attack, is of
paramount concern

2

Risk Management
“Risk Management” is the process of
balancing the cost of security with the overall
corporate goal of producing goods, services
and profits
 And, the essential tools of Risk Management
are:
 Risk Analysis or Risk Assessment and
 The Security Survey

3

Risk Management

“Risk Management” can also be defined as
the process involved in the anticipation,
recognition, and appraisal of a risk and the
initiation of action to eliminate the risk
entirely or reduce the threat of harm to an
acceptable level
4

Risk Management

A good “Risk Management” program
involves four basic steps:
 The identification of risks or specific
vulnerabilities
 An analysis and study of these risks
 The likelihood
 The degree of danger in the event
5

Risk Management

A good “Risk Management” program
involves four basic steps:
 The optimization of risk management
alternatives
 The ongoing study of security programs
 Not a one time program
 Test and retest the program
 Improving all the time
6

Risk Management

Curtis & McBride define “Risk Management”
as:
 A comprehensive review of assets that
could be damaged, stolen or lost
 presenting countermeasures to reduce such
losses
 Predicting long term consequences
7

Risk Management

Curtis & McBride suggest asking the
following questions
 What are the assets?
 How are these assets valuable?
 What are the threats to the assets?
 What is the probability that these scenarios
will occur?
8

Risk Management

Curtis & McBride suggest asking the
following questions
 What is our liability if such events occur?
 What do we do to get back to business or
restore services if an event occurs?
 What is the effect on our business and
leadership reputation?
9

Risk Management

Curtis & McBride say that once the major
risks have been identified:
 Each risk must be ranked in terms of
probability that it could occur
 And then identify countermeasures to deal
with them
10

Risk Analysis or Risk Assessment

Risk Analysis is the major tool in the Risk
Management Process
 The process of identifying potential areas of
security problems and loss
 The development and implementation of
effective measures or countermeasures to deal
with these problems
11

Risk Analysis or Risk Assessment

An effective “Risk Assessment”
 Risk: What are the assets that can be subject to
risk?
 Vulnerability: How difficult is it to get to the
high risk assets?
 Probability: What are the chances that such a
risk may occur?
 Countermeasures: What can security do, given
the resources available?
12

Risk Analysis or Risk Assessment
“Risk Assessment” allows management to
design countermeasures that are effective, but
do not interfere with the operations of the
business
 “Risk Assessment” allows management to make
decisions that balance the cost v. the level of
protection desired
 But, managers can’t always make decisions
based solely on a cost-benefit analysis

13

Risk Analysis or Risk Assessment

The example of School Shootings
 Metal detectors?
 Electronic video systems
 Security officers
 All of the above are not cost effective, but
when dealing with lives, you can’t put a price
on a life!
14

The Security Survey
The “Security Survey” is a comprehensive
physical examination of a premise and a
thorough inspection of all security systems and
procedures
 The object of the “Security Survey” is the
analysis of a facility to determine the existing
state of security, locate weaknesses in its
defenses, determine the degree of protection
needed and recommendations for establishing a
total security program

15

The Security Survey
The “Security Survey” may be conducted by “In
House” personnel or contracted out to a security
consulting firm
 The “Security Survey” includes:
 A physical inspection of the facilities
 Examination of police and internal reports
 Interview of all personnel familiar with any
aspects of the organization
 Organizational procedures

16

Proprietary and Contract Services
“Proprietary Security Services” are “in house”
services performed by people employed directly
by the organization for which they provide
these services
 “Proprietary Security Personnel” are regular
employees of the firm and are paid by the firm
 Fortune 1000 companies usually have their own
“Proprietary Security”

17

Proprietary and Contract Services
“Contract Security Services” are provided by
other agencies and private practitioners for a fee
 “Contract Security Services” lease or rent their
services to the agency
 The officers and other security personnel are
paid by the contract agency
 Malls, sporting events or other organizations
employ ‘Contract Security Services”
(Wackenhut…)

18

Proprietary and Contract Services

Proprietary officers receive benefits from the
company and are seen as “Company Men” and
are therefore are more trustworthy than
Contract officers

Proprietary officers have less turnover, can be
used at important posts, executive escorts,
supervise “contract officers”, more caring, better
appearance…
19

Proprietary and Contract Services
Managers must also be concerned with
“Liability Issues”
 Inappropriate or unlawful actions of a contract
officer can be a liability for the contract
company and the employing organization
 Managers can find “Contract Services” online
by the use of “Reverse Auctions” where
Contract Security Services bid on services
(services must be stated in advance)

20

Overt and Covert Security
“Overt Security” is using observable methods to
provide security
 Visual patrols designed to provide protective
and loss prevention
 “Covert Security” is using undercover methods
to provide security
 Undercover surveillance to detect
lawbreakers, prevent espionage, protection of
trade secrets

21

The Command or Control Center
Large organizations establish a formal
“Command Centers” to monitor all security
operations, including alarms, electronic video
surveillance and security officer operations
 Automated systems can reduce personnel costs,
improve response times and improve
operations from the “Command Center”

22

Crisis Management Teams
Large, well managed organizations have
policies and procedures in place for dealing
with any crisis or disaster that might arise from
crimes or environmental disasters (floods,
storms, hurricanes…)
 Y2K, FEMA, Department of Homeland
Security
 The “Crisis Management Team” coordinates all
activities with organizational, emergency and
governmental personnel

23

Security Officers
The first concept of a security officer may have
been when people posted members of their clan
to protect them from other humans and animals
 One of the earliest forms of contract officer
security service was the use of the Swiss Guard
at the Vatican (Michelangelo designed their
uniforms)
 Look at the numbers employed on Exhibits 3.2
and 3.2, page 66

24

Security Officers
The concept of managing security officers is
called “Guard Force Management”
 Effective “Officer Management” supports all the
technical security that a company uses in its
security operations

25

Security Officers
A 2003 article in USA Today reported that most
of the nation’s 1 million plus security officers
are unlicensed, untrained, not subject to
background checks and that this $12 billion a
year industry is marked by high turnover, low
pay, few benefits and little oversight
 Review Exhibit 3.3, Security Guard Company
Information, page 67

26

Security Officers

Armed or Unarmed?
 The most important is whether or not the
protective value of guns is greater than the
dangers they can pose to innocent parties and
whether firearms intimidate customers and
employees
 Officers should be armed in financial
institution, around moneys and places like
nuclear power plants
27

Security Officers

Armed or Unarmed?
 Officers should not be armed around people
 Insurance companies are worried about
liabilities
 Armed officers should be more carefully
screened, more rigorously trained, and better
paid
 The National Association for Convenience and
Petroleum Retailing (NACS) recommends that
convenience store employees not be armed
28

Security Officers

Turnover
 Turnover occurs when an employee resigns, is
involuntarily terminated or retires
 Security officer turnover is estimated between
100 and 400% a year
 This costs the company thousands of dollars per
year in advertising, interviewing, background
checks, new employee training, lost hours
(overtime), productivity (knowledge)
29

Security Officers

Turnover
 McNally advises that managers should
determine and monitor their turnover rates
and then conduct written, anonymous surveys
to gather officers opinions on issues that they
believe contribute to their retention or
voluntary separation
 Most of the research has revealed the top
reason for dissatisfaction is compensation
 Read over Exhibits 3.4 and 3.5, pages 69-70 30

Security Officers

Computerized Officer Tour Systems
 Computerized Officer Tour Systems record
the foot patrol activities of officers and the
time and location of each visit they make
 A mobile workforce management Global
Positioning Tracking System (GPS) is installed
in each officers cell phone and patrol vehicle
31

Canine Security

Bomb sniffing dogs are “Passive Response”
dogs (they back away from the identified
substance, sit down and look at their handler) as
opposed to “Aggressive Response” dogs, such
as drug, arson, tracking and cadaver dogs that
bark and scratch to signal an alert of positive
response
32

Canine Security
Bomb sniffing dogs are expensive
 $8,500 for a fully trained dog
 $125/hour
 Dogs are used at sporting arenas and other
entertainment facilities to create an added sense
of security
 But at the same time there are little if any
government regulations

33

Access Control
“Access Control” is the use of qualifying devices
or identification methods at various points to
control the passage of people and vehicles into
or out of an area of structure
 “Access Control” limits access to people who
have authorization to enter through selected
points
 “Access Control” controls who goes where and
when

34

Access Control

How is “Access Control” accomplished?
 Security officers (slow and expensive)
 Mechanical locks
 Keys
 Turnstiles
 Barricades
35

Access Control

How is “Access Control” accomplished?
 Electronic Access Control
 Card readers, keypads, biometric devices…
 Digital memory can keep track of which doors
are used, how frequently, and by whom
 The ID database is tied into the Human
Resources database (promotions,
reassignments, terminations, deprogrammed)
36

Access Control

How is “Access Control” accomplished?
 Biometric Access Control System
 “Biometric Identification Systems”
automatically recognize individuals by
physiological characteristics
 The first “Biometric System” and the one most
widely used is fingerprint identification
 Others include, palm prints, hand prints,
retinal scans, voice and facial recognition…
37

Access Control

How is “Access Control” accomplished?
 Smart Cards
 “Smart Cards” are computerized identification
cards with barcodes that enable the card to be
used for numerous purposes, including photo
ID, access entry and charging purchases
 But “Smart Cards” can ensure that the person
swiping the card is the person authorized
assess
38

Access Control

How is “Access Control” accomplished?
 Microprocessor Cards
 “Microprocessor Cards” include chips that are
actually microcontrollers built into them
 “Applets” are tiny programs, contained within
the cards, that carry out individual
applications
39

Alarm Systems

“Alarm Systems” are electronic warning or
intruder alert systems
 Motion detectors on fences, windows, doors

90% of today’s alarm systems rely on telephone
lines as their method of signal transmission
40

Alarm Systems
The problem is that they can fail if the signal to
the central monitoring station is interrupted by
nature or human tampering w/the telephone
lines
 Today, these systems can be backed up by a
wireless transmission system that kicks in
whenever the telephone lines are down

41

Alarm Systems

Attempts to protect against baby abductions from
maternity wards included uniform security
officers, alarms, electronic video surveillance,
electronic access control, automatic closing and
locking door systems, ID bracelets worn by
babies and parents, infant abduction response
plan
42

Alarm Systems
Alarms are now being used to address the
problem of abduction of babies from hospital
maternity wards
 The latest technology also allows hospital
maternity personnel to attach an alarm device to
the umbilical cords of newborns that activates an
alarm whenever a baby is brought near the doors
of the maternity ward

43

Alarm Systems

The National Burglar and Fire Alarm Association
(NBFAA) is a professional association dedicated
to representing, promoting and supporting the
electronic life safety, security and systems
industry
44

Alarm Systems
According to the NBFAA a major problem and
issue regarding alarms is the false alarm
 Too many false alarms places an unnecessary
drain on police resources
 The answer is a “Verified Response” system,
which requires alarm companies to confirm break
ins or security breaches before officers will be
deployed to the scene of a ringing alarm (panic,
distress, or robbery alarms still have a response)

45

Electronic Video Surveillance
“Electronic Video Surveillance” systems allow the
recording of events, including surveillance and
security cameras and closed circuit television
systems
 These systems can passively record or play back
video at certain intervals, be actively monitored
or be used in a combination of these methods
 The use of electronic video surveillance has been
consistently held by the Courts to be
Constitutional and not a violation of privacy

46