Full download Introduction to Security 10th edition Fischer Ph.D. pdf docx
Full download Introduction to Security 10th edition Fischer Ph.D. pdf docx
com
https://textbookfull.com/product/introduction-to-
security-10th-edition-fischer-ph-d/
OR CLICK BUTTON
DOWNLOAD NOW
https://textbookfull.com/product/introduction-to-criminal-
justice-10th-edition-bradley-d-edwards/
textboxfull.com
https://textbookfull.com/product/we-the-people-an-introduction-to-
american-politics-10th-edition-benjamin-ginsberg/
textboxfull.com
https://textbookfull.com/product/annex-17-to-the-convention-on-
international-civil-aviation-security-10th-edition-icao/
textboxfull.com
https://textbookfull.com/product/quantitative-human-physiology-second-
edition-an-introduction-joseph-j-feher-ph-d-cornell-university/
textboxfull.com
Understanding Global Conflict and Cooperation An
Introduction to Theory and History 10th Edition Joseph Nye
https://textbookfull.com/product/understanding-global-conflict-and-
cooperation-an-introduction-to-theory-and-history-10th-edition-joseph-
nye/
textboxfull.com
https://textbookfull.com/product/introduction-to-machine-learning-
with-applications-in-information-security-1st-edition-mark-stamp/
textboxfull.com
https://textbookfull.com/product/private-security-an-introduction-to-
principles-and-practice-1st-edition-charles-p-nemeth/
textboxfull.com
https://textbookfull.com/product/introduction-to-artificial-
intelligence-for-security-professionals-1st-edition-the-cylance-data-
science-team/
textboxfull.com
Robert J. Fischer
Edward P. Halibozek
David C. Walters
Butterworth-Heinemann is an imprint of Elsevier
The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, United Kingdom
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
Copyright © 2019 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or
mechanical, including photocopying, recording, or any information storage and retrieval system, without permission
in writing from the publisher. Details on how to seek permission, further information about the Publisher’s
permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the
Copyright Licensing Agency, can be found at our website: http://www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher
(other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our
understanding, changes in research methods, professional practices, or medical treatment may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any
information, methods, compounds, or experiments described herein. In using such information or methods they
should be mindful of their own safety and the safety of others, including parties for whom they have a professional
responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability
for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or
from any use or operation of any methods, products, instructions, or ideas contained in the material herein.
Robert James Fischer, PhD, is President of Assets Protection Associates, Inc., a security con-
sulting firm established in 1986. He has over 40 years of experience in the security/loss pre-
vention field. He is a member of ASIS International, and the Academy of Criminal Justice
Sciences. He has also served as the Director of the Illinois Law Enforcement Executive
Institute, retiring in 2001. He is also Professor Emeritus of Law Enforcement and Justice
Administration at Western Illinois University. He has published numerous articles, several
books, and served as the editor of two journals. He has also provided extensive consulting
services to major corporations, police departments, and schools.
Edward P. Halibozek, MBA, has over 38 years of security experience. This includes experi-
ence in assets protection, government security, contingency planning, executive protection,
and security management. He retired from Northrop Grumman Corporation where he was
the Vice President of Security. He is the former Chairperson for the Aerospace Industries
Association, Industrial Security Committee, and also served as a member of the National
Industrial Security Program Policy Advisory Committee (NISPPAC). He is a lecturer on secu-
rity and management issues and has written and published numerous assets protection
plans, policies and procedures, and position papers related to corporate and government
security. He also provides security consulting services in the health care industry and the
communications industry. He holds a Master of Science degree in Criminal Justice from
California State University and an MBA from Pepperdine University.
David C. Walters, MPA, is the Corporate Senior Director of Global Safety, Security &
Business Resiliency for a fortune 20 Internet technology company headquartered in San Jose,
California. He has 30 years of experience in industry-leading security, environmental
health/safety, risk management, executive protection, investigation, and brand protection.
He is a member of the Conference Board’s Global Executive Security Council. His experience
is complemented by extensive international business travel that focuses on situational aware-
ness training in a turbulent world.
xv
Preface
Only 5 years ago, we were writing the preface for the 9th edition. At that time we mentioned
how fast the profession was changing. That statement was prophetic, as changes in technol-
ogy are coming at such a rapid pace that it is impossible to keep up with all developments in
a written text. Most of what we said in the 9th edition preface is still relevant as we bring this
10th edition to conclusion. World events during the past 5 years such as growing use of ter-
rorist attacks throughout the world, as well as ever-increasing cyber-attacks, keep security
professionals on their toes, ready to mitigate the next threat. The Parkland, Florida high
school, the Boston Marathon, the Pulse nightclub and the Paris nightclub mass casualty
events, sometime prompted by individual agendas and other times terrorist inspired, make
many of us nervous.
The computer, which is a part of our everyday life, has made information available to
anyone with a simple Google inquiry. We can now monitor our homes in real time using our
cellular phones. Unfortunately, this same technology has been exploited by the criminal ele-
ment in society. Internet purchases, credit card scanners, and use of our cellular phones are
all vulnerable to hacking. Companies which maintain information, like EQUIFAX, as well as
most large firms, are even more at risk of thefts of information. The 2016 elections were tarn-
ished by claims of hacking (allegedly by Russians) of election databases and party emails.
The 10th edition, while maintaining its presentation of basic concepts of security as ini-
tially presented in the 1st edition, spends more time focusing on the changes that must be
recognized in the security field. Our newest coauthor, Dave Walters, deals with “brand pro-
tection,” which he first brought forth in the 9th edition. This concept brings together the
need for understanding the integration of all components of security within a firm along with
other divisions of operation.
In the last edition’s preface, we noted the growing tension created by world terrorism.
That tension has seen a twist with the birth of the Islamic State (ISIS). This group has been
successful in its terrorist approaches, claiming responsibility for all type of attacks on citi-
zens, business, and governments. This threat to companies continues to evolve. As this book
goes to press, the efforts, lead by the United States, to defeat ISIS have achieved success on
several fronts.
This new edition has refocused the chapter on Homeland Security. The new focus is the
impact of terrorism on the business world. We have also added one new chapter. This new
chapter comes from creating a separate chapter for Fire Prevention and Protection. The
chapter on computer security has been thoroughly revised, becoming Holistic Security
through the Application of Integrated Technology. This chapter covers the ever changing
technology field and the importance of understanding and integrating changes in security
operations. In Chapter 20, Security: Today and Tomorrow, we have added material on the
xvii
xviii Preface
need to understand the leadership skill set. This material presents the argument that today’s
security manager must be more than a manager, but must also be a leader if security is to be
integrated and marketed throughout the company operation.
As we finished this 10th edition, the reality of our times makes it impossible to assure
readers that we have presented all the latest in technology. However, we firmly believe that
within the pages of this edition, the reader will find the tools necessary to understand the
basics of security operations and how to apply changing technology to a loss prevention
program.
Acknowledgments
Ed and I would like to give special recognition to our co-author Dave and dedicate this book
to him. During the past year, Dave has faced a major health challenge. Although he was
often times quite sick, he continued to carry his share of this project without complaint. We
couldn’t have asked for a better writing partner. We are proud to know Dave as a fellow
security professional, writer, and friend.
In addition, we wish to acknowledge those individuals who took time to complete surveys
distributed by the publisher, providing us with suggestions for updating the book for this
10th edition. These individuals include:
• Daniel Barry, Campus College Chair, College of Security and Criminal Justice, University
of Phoenix, Las Vegas Campus.
• Ryan Baggett, Associate Professor of Homeland Security, Eastern Kentucky University.
• Thomas Foley, Assistant, College of Security and Intelligence, Embry-Riddle Aeronautical
University.
• Simon King, Senior Lecturer and Course Leader, Department of Security and Resilience,
Bucks New University.
• Phillip Wood, Security and Resilience Advisory to the Vice Chancellor and Council,
Buckinghamshire New University.
We also wish to thank Bob’s longtime professional associate, Richard Janoski, John Deere
Corporate Security, ret., and Instructor of security at Western Illinois University, for his
insightful and thorough review of the 9th edition.
In particular, special thanks to the content experts who reviewed and at times made sub-
stantial updates to materials contained in various chapters. These include: James Falk,
Security Director, Ace Hardware, and Alan Saquella, Director Safety and Investigations, Cox
Communications, both of whom updated substantial portions of Chapter 15, Retail Security;
Steven C. Babb, retired Deputy General Counsel for Northrop Grumman Corporation, who
reviewed and updated our chapter on security and the law; Dr. Deborah Pavelka, CPA,
retired Professor Roosevelt University, for revising our chapter on cyber security; Steve
Martino, VP Information/Cyber Security, Cisco Systems, who provided an informative inter-
view for the update to Chapter 17, Holistic Security Through the Application of Integrated
Technology Objectives.
We also thank Tom Stover, Elsevier Publishing for initiating the project. Nate McFadden,
Sr. Content Development Specialist, Butterworth-Heinemann, Elsevier, gets special thanks
for his constant and consistent support while we worked on this 10th edition. Without his
support we would have had a much harder time updating our materials.
xix
xx Acknowledgments
Bob, once again, thanks those at Assets Protection Associates, Incorporated, who pro-
vided support services during his work on this revision, as well as comments and edits of
various drafts. Special thanks go to Dr. Kathy Fischer, who reviewed each chapter prior to
submission. As a retired Professor of Health Sciences, Western Illinois University, who taught
“Drug Use and Abuse” for over three decades, Dr. Fischer also finished revising the drug
section in Chapter 14, Violence and Drug Use in the Workplace. Finally, we give special
thanks to our partners in life, Kathy, Phillis, and Lola, who have supported us in our outside
interests.
PART
I
Introduction
The chapters in Part I provide an overview of the security and loss prevention industry.
Chapter 1, Origins and Development of 21st Century Security, is a brief history of the devel-
opment of the field in Europe and America, ending with a quick, crisp summary of the status
of security in the 21st century. Chapter 2, Defining Security’s Role, identifies the roles of
security, whether contract, proprietary, or hybrid. Chapter 3, Career Opportunities in Loss
Prevention, covers career options. Chapter 4, Security Education, Training, Certification, and
Regulation, discusses the development of security as a profession. Issues discussed include
training, certification, and regulation. Chapter 5, Terrorism as a Threat to Business defines
how current terrorist activities impact business in the 21st Century.
As noted in the preface, the events of September 11, 2001 and subsequent terrorist attacks
throughout the world changed the face of security operations. Security is a common theme
considered by almost every person in the developed and developing world. Yet, as security
professionals know, the basic concepts and theories of security and loss prevention are not
changed by a single event. The most significant changes are in the innovative tools that pro-
fessionals use to achieve their goals. What is important in looking at the past is that we learn
the lessons that are presented in the development of past security operations. We can then
apply those lessons to the present situation, modify those that have potential to assist us in
our efforts, and discard outdated and outmoded ideas and technology.
The information presented in Part I, along with recommendations just presented,
will serve as a basis for understanding and applying the specific materials presented in
Parts II and III.
1
Origins and Development of
21st Century Security
OBJECTIVES
Introduction
Security implies a stable, relatively predictable environment in which an individual or group
may pursue its ends without disruption or harm and without fear of disturbance or injury.
The concept of security in an organizational sense has evolved gradually throughout the his-
tory of Western civilization, shaped by a wide variety of institutional and cultural patterns.
In examining the origins and development of security, it should be noted that security
holds a mirror up, not to nature, but to society and its institutions. Thus, in medieval
England, there were programs to clear brush and other concealment on either side of the
king’s roads as a precaution against robbers, and to protect citizens from night thieves, there
were night watchmen. In the United States in modern times, these rudimentary security
measures find their counterparts in the cleared areas adjoining perimeter fences and build-
ings, in security patrols, and in intrusion alarms. Throughout history, it is possible to trace
the emerging concept of security as a response to, and a reflection of, a changing society,
mirroring its social structure and its economic conditions, its perception of law and crime,
and its morality. Thus, security remains a field of both tradition and dramatic change. The
introduction of high-tech systems and computers has changed the nature of the job of the
21st century security professional. Security today must be directed toward modern problems
including computer crime and world terrorism, yet we cannot forget the basic foundations
on which the field has developed. While there are many large companies that have invested
in modern security systems, there are also homes and small businesses that rely on the stan-
dard lock and key or guard dog for their basic protection. But, even the home security indus-
try is seeing significant changes with the introduction of new technology allowing home
owners to monitor their property in real time.
Security in England
The development of systems of protection (security) and law enforcement in England began
to come with greater rapidity and sophistication beginning in the 14th through the 18th cen-
turies. Seeds for this development were planted during the social revolution that heralded
the end of the remaining elements of the feudal structure in the latter half of the 13th
century.
Security was one thing in a largely rural society controlled by kings and feudal barons; it
was another thing entirely in a world swept by enormous changes. The voyages of explora-
tion, which opened new markets and trade routes, created a new and increasingly important
merchant class whose activities came to dominate the port cities and trading centers.
Concurrently, acts of enclosure and consolidation drove displaced small tenants off the land,
and they migrated to the cities in great numbers.
By 1700, the social patterns of the Middle Ages were breaking down. Increased urbaniza-
tion of the population had created conditions of considerable hardship. Poverty and crime
increased rapidly. No public law enforcement agencies existed that could restrain the mount-
ing wave of crime and violence, and no agencies existed that could alleviate the causes of
the problem.
Different kinds of police agencies were privately formed. Individual merchants hired men
to guard their property. Merchant associations also created the merchant police to guard
shops and warehouses. Night watchmen were employed to make their rounds. Agents were
engaged to recover stolen property, and the people of various parishes into which the major
cities were divided hired parochial police.
Attention then turned to the reaffirmation of laws to protect the common good. Although
the Court of Star Chamber, which gave the English monarchy all control over decisions of
law, had been abolished in 1641, its practices were not officially proscribed until 1689 when
Parliament agreed to crown William and Mary if they would reaffirm the ancient rights and
privileges of the people. They agreed, and Parliament ratified the Bill of Rights, which for all
time limited the power of the king, as well as affirming and protecting the inalienable rights
of the individual.
scope of their protection. The resulting heterogeneous group, however, was too much at
odds. It proved ineffective in providing any satisfactory level of protection.
In 1748 Henry Fielding, magistrate and author (most notably of the
unforgettable Tom Jones), proposed a permanent, professional, and adequately paid security
force. His invaluable contributions included a foot patrol to make the streets safe, a mounted
patrol for the highways, the famous “Bow Street Amateur Volunteer Force” of special investi-
gators, and police courts. Fielding is credited with conceiving the idea of preventing crime
instead of seeking to control it.
As the settlers moved west in Massachusetts, along the Mohawk Valley in New York, and
into central Pennsylvania and Virginia, the need for protection against hostile Indians and
other colonists—French and Spanish—was their principal security interest. Settlements gen-
erally consisted of a central fort or stockade surrounded by the farms of the inhabitants. If
hostilities threatened, an alarm was sounded and the members of the community left their
homes for the protection of the fort, where all able-bodied persons were involved in its
defense. In such circumstances, a semimilitary flavor often characterized security measures,
which included guard posts and occasional patrols.
Protection of people and property in established towns again followed English traditions.
Sheriffs were elected as chief security officers (CSOs) in colonial Virginia and Georgia;
constables were appointed in New England. Watchmen were hired to patrol the streets at
night. As Private Security: Report of the Task Force on Private Security notes, “These watch-
men remained familiar figures and constituted the primary security measures until the estab-
lishment of full-time police forces in the mid-1800’s.” [1]
Such watchmen, it should be pointed out, were without training, had no legal authority,
were either volunteer or else paid a pittance, and were generally held in low regard—
circumstances that bear a remarkable similarity to observations in the RAND report on
private security in 1971 [2].
FIGURE 1.1 Allan Pinkerton, President Lincoln, and Major General John McClellan. Photographed October 1862,
Antietam, Md. Courtesy of National Archives.
yards and industrial concerns. President Lincoln recognized Pinkerton’s organizational skills
and hired the agency to perform intelligence duties during the Civil War. Pinkerton is also
credited with hiring the first woman to become a detective in this country, well before the
women’s suffrage movement had realized its aims [3].
In 1850, Henry Wells and William Fargo were partners in the American Express
Company, chartered to operate a freight service east of the Mississippi River; by 1852 they
had expanded their operating charter westward as Wells Fargo and Company. Freight trans-
portation was a dangerous business, and these early companies usually had their own detec-
tives and security personnel, known as “shotgun riders.”
Washington Perry Brink founded Brinks, Inc., in 1859 as a freight and package delivery
service in Chicago. More than 30 years later, he transported his first payroll—the beginning
of armored car and courier service. By 1900, Brinks had a fleet of 85 wagons in the field [4].
Brinks, Wells Fargo, and Adams Express were the first major firms to offer security for the
transportation of valuables and money.
William J. Burns, a former Secret Service investigator and head of the Bureau of
Investigation [forerunner of the Federal Bureau of Investigation (FBI)], started the William J.
Burns Detective Agency in 1909. It became the sole investigating agency for the American
Bankers’ Association and grew to become the second largest (after Pinkerton) contract guard
and investigative service in the United States. For all intents and purposes, Pinkerton and
8 INTRODUCTION TO SECURITY
Burns were the only national investigative bodies concerned with nonspecialized crimes in
the country until the advent of the FBI.
Another 19th century pioneer in this field was Edwin Holmes, who offered the first bur-
glar alarm service in the country in 1858. Holmes purchased an alarm system designed by
Augustus Pope. Following Holmes, American District Telegraph (ADT) was founded in 1874.
Both companies installed alarms and provided response to alarm situations as well as main-
taining their own equipment. Baker Industries initiated a fire control and detection equip-
ment business in 1909.
From the 1870s, only private agencies had provided contract security services to indus-
trial facilities across the country. In many cases, particularly around the end of the 19th cen-
tury and during the Great Depression of the 1930s, the services were, to say the least,
controversial. Both the Battle of Homestead in 1892, during which workers striking that
plant were shot and beaten by security forces, and the strikes in the automobile industry in
the middle 1930s, are examples of excesses from overzealous security operatives in relatively
recent history [5].
With few exceptions, proprietary, or in-house, security forces hardly existed before the
defense-related “plant protection” boom of the early 1940s. The impetus for modern private
security effectively began in that decade with the creation of the federal Industrial Security
Program [today named the National Industrial Security Program (NISP)], a subordinate com-
mand within the Department of Defense. The NISP is the nominal authority in the United
States for managing the needs of private industry to access classified information. The NISPs’
Operating Manual (NISPOM/DoD 5220.22-M) today consists of 11 chapters and 3 appendi-
ces totaling 141 pages. The 2006 manual included The Intelligence Reform and Terrorism
Prevention Act of 2004 and other changes taking effect since September 11, 2001 [6]. The
manual was updated in March 2013 and most recently in May 2016. The changes reflect the
continuing changes in federal agencies involved in national security as well as relationships
with our international partners.
their property and personnel. Security officers were the first line of defense, but it was not
long before that
Through out this book the authors will use the term “security officer”. We chose to use
this term in lieu of other terms such as “guard” or plant protection officer since “security
officer” is a more common title for security personnel performing traditional guard or
plant protection duties.
important function was being overchallenged by the increasing complexity of fraud, arson,
burglary, and other areas in which more sophisticated criminal practices began to prevail.
Security consulting agencies and private investigation firms were founded in increasing
numbers to handle these special types of cases. From among these, another large contractor
was to emerge and join the field alongside Pinkerton, Burns, Globe, and Brinks. In 1954,
George R. Wackenhut formed the Wackenhut Corporation in company with three other for-
mer FBI agents. In July 2015 Guardsmark, a giant in the US security business, merged with
competitor Universal Protection Service, now jointly employing over 60,000, making the firm
the largest American owned security firm. In 2002, Wackenhut was purchased by the British
firm G4S Secure Solutions. At the time, Wackenhut was the second largest security firm oper-
ating in the United States.
In 2015, G4S rebranded as G4S Security Integration. Pinkerton became part of Securitas,
the largest security firm operating globally. Securitas acquired Diebold, known for their safes,
in February 2016. In 2000, Burns became a subsidiary of Borg Warner Protective Services. As
security becomes more reliant on technology, firms such as CISCO become more important
in designing systems that utilize and protect digital security operations. In addition, many
regional firms such as Per Mar Security, located in Davenport, Iowa, continue to develop
and provide quality security services.
data are usually maintained also, and can be accessed by members. These groups serve the
private sector in its effort to survive against crime, and make their collected intelligence
available to law enforcement.
Some presently existing groups are the National Insurance Crime Bureau (NICB) (www.
nicb.org), founded in 1992; the International Association of Arson Investigators (IAAI)
(http://firearson.com), founded in 1951; the Property and Liability Research Bureau (PLRB)
(www.plrd.org); and the Jewelers Security Alliance (JSA) (www.jewelerssecurity.org), founded
in 1883—to name a few. Still other groups serve similar functions by collecting records of
insurance claims and spotting fraud, issuing periodic records of defaulted or dubious credit
cards, and so on. The measures taken by these and other business associations to limit their
losses and protect their members have spread to other areas in which there is today an
increasing concern about excessive risk. Some of these areas include computer and other
high-tech industries, and antiterrorism and executive protection alliances. The need for
information for employment background checks has also led to the creation of information
bureaus. The Internet has added its own twist in providing fast service for those looking for
information ranging from criminal histories to credit checks. A number of websites sell infor-
mation for fees ranging from a low of US$35 to more than US$100 for each search request.
The Costs
Just as the anti-Vietnam War protest created a demand for additional security services during
the 1960s and 1970s, the threat of terrorism against US business throughout the world, the
kidnaping of executives assigned outside the United States by various extremist groups, and
drugs and violence in the workplace create a demand for the 21st century. With this dynamic
growth have come profits, problems, and a need for increasing professionalism. Each is a sig-
nificant part of the picture of security today.
The attack on the World Trade Center in 2001 has continued to fuel expenditures and
growth in the private security sector. The Freedonia Group projected that the demand for
contracted security services would continue to increase at an annual rate of 5.4% from 2012
through 2016. The annual expenditure in 2016 would be approximately US$64.5 billion [7].
Conflicting data were presented by ASIS International and the Institute of Finance and
Management, which found that the US security market exceeds US$350 billion annually with
a projected annual growth in 2013 of 6.59% [8]. The disparity in data is common in most
studies of the security field due to differences in definition of what is being studied and the
lack of required reporting for the security industry.
increase in crimes of all types until 1981. Then, for the first time, the UCRP reflected a mod-
est overall decrease that has continued through the beginning of the 21st century [9].
However, in 2005, there was a slight upward trend of 0.2%. The most troubling data
showed a 7.3% increase in arrests for murder. The trend continued over the next 2 years, but
at a declining rate [9]. Why this 2 year increase occurred will be a topic of discussion for
many years. However, the downward trend resumed in 2007 and continued through 2011.
Data for 2011 showed a 6.4% decrease in violent crime during the first 6 months, while prop-
erty crimes decreased 3.7% during the same period [10].
The latest data from the FBI’s Uniform Crime Reports for 2015 reveal a 3.9% increase in
violent crimes, but a 2.6% decrease in property crimes. While the increase in violent crimes
is worth noting, the overall trend is still downward. Comparing the violent crime
figures from 2011, the rate is 7% less and in comparison to 2006, it is 16.5% lower [11].
Although the statistical crime data trend indicates less crime, the problem with crime is
the perception that the public holds. Gallup polls taken each year indicate that the fear of
crime is an even greater problem than the crime rate itself would indicate. The consistency
of survey results indicating that crime touched 25% of all American households during the
year preceding each survey led Gallup to conclude that “the actual crime situation in this
country is more serious than official governmental figures indicate.” The most recent
National Crime Victimization Survey (NCVS) data (for 2015) show no significant difference
from 2014 for violent crimes, and a decline in property crime [12]. This continuing trend
over the past 30 years is inconsistent with the general perception held by the American pub-
lic. It is likely that much of this inconsistency is fueled by regular media presentation of
news worthy events. To summarize, the data actually show that during the first decade of the
21st century, violent crime had declined 41% while property crime rates fell by 32% [13].
concluded that the amount of “dirty money” worldwide topped US$3 trillion. They identified
the following as the most serious of economic crime problems:
• Money laundering
• Identity fraud
• E-commerce crime
• Insurance crime
• Victim services
• Terrorism [17]
More categories may be added as other types of electronic crime become more prevalent.
For example, Anne Fisher noted in a 2015 Fortune article that employees are taking advan-
tage of company-owned software and intellectual property. She believes that “borrowing”
software from work for personal use may account for US$33 billion lost to software piracy
worldwide [18]. The National White Collar Crime Center also recognized the following in
addition to the list above.
• Crypto ransomware
• Cyber intrusion
• Cyberstalking
• Health care fraud [19]
The 2002 conference of the National White Collar Crime Center and the Coalition for the
Prevention of Economic Crime figure is double the US$1.5 trillion estimate for money launder-
ing suggested by the International Monetary Fund. Sadly, the US Department of Treasury esti-
mated that 99.9% of foreign criminal and terrorist money the United States attempts to stop
gets deposited into secure accounts [20]. Obviously, figures vary, principally because satisfac-
tory measures of many crimes against business and industry have not yet been found. In addi-
tion, much internal crime in particular is never reported to the police. Often, businesses have
not reported crime because internal disciplinary action has already been taken. In other situa-
tion, management wants to avoid bad publicity and embarrassment that could result from
exposing the business’s lack of security controls. Nevertheless, such questions, as may exist,
concern only the degree, not the fact of the dramatic escalation of crimes against business in
our society. Security concerns remain constant for employee theft, property crime, and issues
related to life safety. The newest problems revolve around fraud, computer crime, workplace
violence, and terrorism. The National Computer Security Survey in 2005 found that 67% of
businesses detected at least one cybercrime. Yet, most did not report the attack to law enforce-
ment [21].
cited for criminal behavior in this era. Among them are an erosion of family and religious
restraints, the trend toward permissiveness, the increasing anonymity of business at every
level of commerce, the decline in feelings of worker loyalty toward the company, and a gen-
eral decline in morality accompanied by the pervasive attitude that there is no such thing as
right and wrong, but rather only what is in the person’s best interest.
In addition, the rapidly changing technology of business and personal lives is often far
out ahead of security measures used to protect personal and business intellectual property.
The dominance of the computer and related technology in business has improved worldwide
business efficiency, but not without a price. The Internet, while providing the path for infor-
mation transfer, has also provided unheard of opportunities to steal or manipulate intellec-
tual property. Who had heard of a computer virus in the 1970s? And no one likely imagined
Facebook and Twitter would be a new means of global community in 2000.
These changes in attitudes, personal values, and technology have created a new problem
for security managers. In the wake of the Enron scandal, the government passed the
Sarbanes-Oxley Act of 2002 to combat corruption in public companies. This regulation has
aided the typical CSO by hopefully minimizing scandal and requiring greater financial disclo-
sures, better scrutiny by corporate boards and their audit committees, and tighter overall
accounting controls. Oversight by Security Exchange Commission (SEC) regulators, coupled
with stronger internal control mechanisms, clearly define white collar crimes as being preva-
lent and a security challenge that cannot be overlooked. Since the stock market crash of
2008, additional regulation of the financial sector by the federal government has been grow-
ing. New legislation, as well as major amendments to existing regulatory rules, has been
ostensibly enacted to make sure that further financial instability in the markets will not hap-
pen in the future. It is far beyond the scope of this book to attempt to analyze or even to cat-
alog all of the factors involved in the trend toward increasing crime, even if we restricted the
study to crimes against business and industry. What is important here is to make clear note
of the fact of such increases—and of their impact on society’s attempts to protect itself.
Most significant is the realization that “the sheer magnitude of crime in our society pre-
vents the criminal justice system by itself from adequately controlling or preventing crime.”
In spite of their steady growth, both in costs and in numbers of personnel, public law
enforcement agencies have increasingly been compelled to be reactive and to concentrate
more of their activities on the maintenance of public order and the apprehension of crim-
inals. Even community-oriented policing rests on the need for a cooperative approach to law
enforcement. The approximately 650,000 local law enforcement personnel in this country
cannot possibly provide protection for all those who need it [22]. Sadly, cooperation with law
enforcement has taken a setback in the last 10 years with the growing belief that at least
some law enforcement officials are biased in their enforcement of the law.
14 INTRODUCTION TO SECURITY
The efforts at federalization often fail due to heavy lobbying efforts by some contract com-
panies who oppose anything that raises their costs and cuts into profits. It is sad that only
36 states regulate security officer training. Of those that do, none come close to meeting the
recommended 80 hours supported by the International Foundation of Protection Officers [24].
Professionalism
Despite the lack of federal regulation, today private security has moved toward a new profes-
sionalism. In defining the desired professionalism, most authorities often cite the need for a
code of ethics and for credentials including education and training, experience, and
membership in a professional society.
Professional Organizations
This continuing thrust toward professionalism is observable in the proliferation of active pri-
vate security professional organizations and associations. It is promoted by such organiza-
tions as ASIS International (which has a membership of more than 30,000 security
managers), the Academy of Security Educators and Trainers (ASET), the International
Association for Healthcare Security and Safety (IAHSS), the National Association of School
Security Safety and Law Enforcement Officers (NASSLEO), the International Foundation of
Protective Officers (IFPO), and the Security Industry Association (SIA). It finds its voice in
the library of professional security literature—magazines, Internet sites, and books. And it
looks to its future in the continued development of college-level courses and degree pro-
grams in security.
ASIS International has adhered to a professional code of ethics, one mark of a true profes-
sion, since its inception. The group established the CPP program, which requires security
managers desiring certification to be nominated by a CPP member and to complete a rigor-
ous test. This program and others are discussed in more detail in Chapter 4, Security
Education, Training, Certification, and Regulation.
see the need for paying for costly security programs. Thus they often opt for the lowest-
priced solution whether it affords real protection or not.
Considering the importance of private security personnel in the anticrime effort and their
quasilaw enforcement functions, it is ironic that they receive so little training in comparison
to their public-sector contemporaries. According to a 2005 study by Associated Criminal
Justice and Security Consultants, the median number of hours of basic police training is
720 hours prior to licensing or certification by state police training boards. The same study
found that many security officers, on average, receive less than 8 hours of prejob training
[25]. Often this training is completed merely through an orientation video. Still, there are
contract and proprietary security operations that provide very good training programs. Some
contract security companies, such as G4S Security Integration, have established client con-
tracts that provide from 40 to 120 hours of prepost assignment training requirements, depen-
dent upon the designated officer’s position. This does not include on-the-job training(OJT).
In addition, a specified 16 hours annualized training requirement to refresh officers and
avoid complacency can be established. Security managers must not overlook the value of
maximizing training opportunities and requirements.
The traditional business emphasis on profit will always be foremost in priorities for secu-
rity contractors as well as proprietary security operations concerned with the companies
“bottom line.” Fortunately, this kind of thinking is undergoing a change as industry realizes
that the adage “you get what you pay for” very definitely applies to the quality of security.
This realization should in turn add pressure to industry to upgrade the position of the secu-
rity officer. Current standards, codes of ethics, and educational courses need to be supported
by industry participation.
One development in the evolution of training for line security staff is the Certified
Protection Officer (CPO) program, established in 1986 by the International Foundation for
Protection Officers, a nonprofit organization. The CPO program is being offered at a number
of colleges in the United States and Canada. Additional information on this program is pre-
sented in Chapter 4, Security Education, Training, Certification, and Regulation.
New Thinking
A systematic approach to security is appropriate today, as more and more businesses are giv-
ing the responsibility for protecting all aspects of company assets to the security and loss-
prevention department. Security and loss prevention has evolved well beyond the officer at
the gate. Though that post is still vital, today’s business assets comprise an almost infinite
variety of protection needs. Moreover, security increasingly includes protection against con-
tingencies that might prevent normal company operation from continuing and from making
a profit. And as the concept of risk management is further integrated into a comprehensive
loss-prevention program, the security function focuses less and less on enforcement and
more on anticipating and preventing loss through proactive programing. Security is now
more about protection, including brand or company identity protection, than about solving
Chapter 1 • Origins and Development of 21st Century Security 17
Summary
Although modern security relies heavily on technology, the basic theory of protection has
changed little over the past centuries. Only the tools to implement the theory have changed.
Where moats were once used, we have high-tech sensors and fences. Where warded locks
once protected buildings and rooms, we see state-of-the-art, computer-controlled, electronic
locking mechanisms. Where watchmen once walked the beat, we now find sophisticated
camera systems.
Still, not every security measure has kept pace with the development of technology. Old
techniques and technology are still commonplace in many operations. The one thing that
has changed in the 21st century is the need to consider terrorism as a significant threat to
our country and its businesses. Homeland Security and Terrorism are discussed in
Chapter 17. Our government and public businesses are now targets of individuals who
choose to use terrorist tools to make their positions known. The potential has always been
present, as noted by many security experts. However, the use of terrorist tools was not seen
as likely given the ability of most individuals to find other means to express their positions.
18 INTRODUCTION TO SECURITY
We have entered a new era where the security professional must give full consideration
to potential terrorist threats, just as they would to theft of intellectual property, burglary, rob-
bery, shoplifting, fire, and other loss risks commonly associated with security/loss-prevention
strategies. Add to this list, the threats against the computer, now one of business’s most
prominent tools, and the mix becomes very interesting!
In sum, the security industry of the 21st century is moving toward a model of single solu-
tion security integrating all areas and operation of the firm. Although, there are many parts
to the plan, in the final plan, there is convergence. Technology, information, human compo-
nents, design, etc. must all be considered in the final operation. The following chapters
discuss specific areas of interest, but in the end, a good security program must consider all
elements in order to succeed in today’s world.
▪ ▪ Critical Thinking ▪
Why should a security professional have any interest in the historical development of
the discipline?
Review Questions
1. What events in medieval England brought about the creation and use of private night
watches and patrols?
2. How did World War II affect the growth of modern private security?
3. How do you believe the events of September 11, 2001 impacted the changes occurring in
the private security/law enforcement relationship?
4. Discuss the extent of security’s growth in this country. What are some of the reasons for
the professionalization of the field of private security?
5. What do you believe are the greatest challenges facing private security in the 21st
century?
References
[1] C. Van Meter, Private Security: Report of the Task Force on Private Security, National Advisory
Committee on Criminal Justice Standards and Goals, Washington, DC, 1976.
[2] J.S. Kakalik, S. Wildhorn, Private Police in the United States: Findings and Recommendations, The RAND
Corporation, Santa Monica, CA, 1971.
[3] S.A. Levine, Allan Pinkerton: America’s First Private Eye, Dodd, Mead, New York, 1963.
[4] J.S., Kakalik, S., Wildhorn, Private Police, pp. 94 95.
[5] W. Cunningham, J.J. Strauchs, C.W. Van Meter, The Hallcrest Report II: Private Security Trends
1970 2000, Butterworth-Heinemann, Boston, 1990.
[6] ,www.dss.mil.odda/mspm06.htlm., (downloaded 9.17.2010).
[7] Private Security Services, Industry Study 2944, October 2012.
Chapter 1 • Origins and Development of 21st Century Security 19
[8] The United States Security Industry: Size and Scope, Insights, Trends, and Data, ASIS International and
the Institute of Finance and Management, 2012.
[9] Federal Bureau of Investigation, U.S. Department of Justice. Uniform Crime Reporting Program.
Government Printing Office, Washington, DC.
[10] ,www.fbi.gov/about-us/cjis/ucr/crime-in-the-u.s./2011/preliminary., (downloaded 3.10.2012).
[11] Latest Crime Statistics Released, September 26, 2016, ,www.fbi.gov/news/stories/latest-crime-statistics-
released..
[12] BJS’s Crime Victimization Survey Shows Rate of Overall Villent Crim Remained Flat from 2014 to 2015:
Property Crime Rate Decreased, Advance for Relaease, October 20, 2016. ,http://www.bjs.gov/..
[13] Criminal Victimization 2008, BJS Bulletin, September 2009.
[14] Report to the Nations on Occupational Fraud and Abuse, ACFE, 2014.
[15] Brookings Institute. Brookings Study Details Economic Cost of Recent Corporate Crises. ,www.brook-
ings.edu/comm/news/20020725graham.htm..
[16] Three New Federal Lawsuits Against Madoff Family Business. ,www.dailyfinance.com/story/investing/
court-appointed-trustee-madoff-family-lawsuit., (downloaded 9.4.2010).
[17] Funny Money. The Economist Global Agenda, May 3, 2002. ,www.economist.com/agenda/
displayStory.cfm?story_id 1 1116239..
[18] A. Fisher, U.S. retail workers are No. 1 . . . in employee theft, Fortune (January 26, 2015).
[19] ,www.nw3c.org/services/research/whitepapers., (accessed 11.19.16).
[20] Dealing with Dirty Money. Hellenic Communication Service. ,www.helleniccomserve.com/dirtymoney.
html., (downloaded 9.4.2010).
[21] Cybercrime Against Business, National computer crime survey, Bureau of Justice Statistics (2005).
Available from: , www.bjs.gov/index.cjf?ty 5 tp&tid 5 41 . (accessed 11.18.16).
[22] BLS Occupational Employment Statistics, 33-3051 Police and Sheriff’s Patrol Officers, May 2009.
[23] , data.bls.gov/search/query/results., (accessed 11.19.2016).
[24] S. Walter, Why legislative efforts to improve security guard training keep failing, Reveal (December 9,
2014). Available from: , www.revealnews.org/why-legislative-eforts-to-improve-security-guard-training-
keep-failing . .
[25] Associated Criminal Justice & Security Consultants, PLACE Project, Kaplan University, Evaluation of
Basic Training Programs in Law Enforcement, Security and Corrections for Academic Credit, June 2005.
2
Defining Security’s Role
OBJECTIVES
The study of the chapter will enable you to:
1. Define the concept of private security.
2. List various services offered by private security operations.
3. Understand the differences among proprietary, contract, and hybrid security operations.
4. Discuss the issues that contribute to continued relations issues between private security operations
and public law enforcement.
Introduction
During the 19th and 20th centuries, public police operated only on a local basis. They had
neither the resources nor the authority to extend their investigations or pursuit of criminals
beyond the sharply circumscribed boundaries in which they performed their duties. When
the need arose to reach beyond these boundaries or to cut through several of these jurisdic-
tions, law enforcement was undertaken by such private security forces as the Pinkerton
Agency, railway police, or the Burns Detective Agency.
As the police sciences developed, public agencies began to assume a more significant
role in the investigation of crime and, through increased cooperation among government
agencies, the pursuit of suspected criminals. Concurrent with this evolution of public law
enforcement, private agencies shifted their emphases away from investigation and toward
crime prevention. This led to an increasing use of security services to protect property and to
maintain order. Today, in terms of numbers, surety forces are by far the predominant
element in private security.
But what other protective measures are available? Who provides them? Who is responsi-
ble for planning and executing these procedures? Where do the roles of private and public
police overlap, and where do they diverge? What are the particular hazards for which private
security is now held responsible, and how is it determined that threats are sufficient to justify
the adoption of protective procedures? To answer these questions, it is necessary to define
private security and its role more exactly.
arguments have been made, for example, for substituting the term loss prevention for
security.
The RAND report defines private security to include all protective and loss-prevention
activities not performed by law enforcement agencies. Specifically,
the terms private police and private security forces and security personnel are used gener-
ically in this report to include all types of private organizations and individuals provid-
ing all of security-related services, including investigation, staffing key posts, patrol,
executive protection, alarm monitoring and response, and armored transportation [1].
The Task Force on Private Security takes exception to this definition on several grounds.
The task force argues that “quasi-public police” should be excluded from consideration on
the grounds that they are paid out of public funds, even though they may be performing
what are essentially private security functions. The task force also makes the distinction that
private security personnel must be employees of a “for-profit” organization or firm as
opposed to a nonprofit or governmental agency. The complete task force definition states:
Private security includes those self-employed individuals and privately funded business
entities and organizations providing security-related services to specific clientele for a
fee, for the individual or entity that retains or employs them, or for themselves, in order
to protect their persons, private property, or interests from varied hazards [2].
The task force argues that the profit motive and the source of profits are basic elements
of private security. While this definition might be suitable for the specific purposes of the
report, it hardly seems acceptable as a general definition. Many hospitals and schools, to
name only two types of institutions, employ private security forces without for-profit orienta-
tion. Yet it would be difficult to contend, for example, that the members of the International
Association for Healthcare Security and Safety (IAHSS) are not private security personnel.
The Hallcrest reports never formally defined the terms security or loss prevention but
relied on the earlier definitions of these terms. These reports consider, however, the security
or loss-prevention field in its broadest application and thus avoid getting bogged down in
discussions of profit motive or specific tasks. The reports focus on the functional aspects of
security, recognizing that the functions of security and loss prevention are performed by
both the public law enforcement sector and private agencies.
Thus, neither the profit nature of the organization being protected nor even the source of
funds by which personnel are paid holds up as a useful distinction. A security officer at a
public school is engaged to protect a nonprofit institution and is paid out of public funds.
The function, however, is clearly different from that of a public law enforcement officer. The
officer is—and is universally accepted as—a private security officer. How then should private
security be defined for the purpose of this text?
The opening lines of Chapter 1, Origins and Development of 21st Century Security sug-
gest that “security implies a stable, relatively predictable environment in which an individual
or group may pursue its ends without disruption or harm and without fear of disturbance or
Chapter 2 • Defining Security’s Role 23
injury.” Such security can be effected by military forces, by public law enforcement agencies,
by the individual or organization concerned, or by organized private enterprises. Where the
protective services are provided by personnel who are paid out of public funds and also
charged with the general responsibility for the public welfare, their function is that of public
police. Where the services are provided for the protection of specific individuals or organiza-
tions, they normally fall into the area of private security.
Security Functions
Security practices and procedures cover a broad spectrum of activities designed to eliminate
or mitigate the full range of potential hazards (loss, damage, or injury). These protection
measures may include but are by no means limited to the following:
1. Building and perimeter protection, by means of barriers, fences, walls, and gates;
protected openings; lighting; and surveillance (security officers and video).
Other documents randomly have
different content
makes the loose part of the world generally make a jest of those that
are thus seemingly devout; not altogether it may be because they
are really devoted to God, but because they appear to have no other
devotion, but that of occasional prayers.
Our blessed Saviour and his Apostles did not spend their whole
ministry in recommending the duties of public and private prayers;
though by their example and precepts they recommended and
enforced both; but it is worthy our observation, that after they had
laid down a lively faith in God’s mercy through Jesus Christ, as the
foundation, they were chiefly taken up in delivering doctrines which
relate to common life. For they call upon us “to renounce the world,
so as not to be conformed to it: To fear none of its evils, to reject its
joys, and have no value for its happiness: To be as new-born babes,
that are born into a new state of things; to live as pilgrims, in spiritual
watching, in holy fear, and heavenly aspirations after another life: To
take up our daily cross, to deny ourselves, to profess the
blessedness of holy mourning, and poverty of spirit: To reject the lust
of the flesh, the lust of the eye, and the pride of life, so as not to
follow or be led by them: To take no anxious thought for the morrow;
to live in the profoundest state of humility; to rejoice in worldly
sufferings and injuries, when it pleases God to bring them upon us;
to forgive and bless our enemies, and to love mankind in the same
manner, though not degree, as God loves them. In short, to give up
our whole hearts and affections to God, even a God in Christ, and
to strive to enter through the strait gate of a sound conversion into a
life of eternal glory.”
This is the common devotion, which our blessed Saviour and his
Apostles taught, in order to make it the common life of all christians.
But yet, though it is thus plain, that this, and this alone, is true
christianity, yet it is as plain, that there is little or nothing of this to be
found, not only among professed rakes, but even among the better
and more sober sort of people. You may see them often at public
worship, and the Lord’s table, and hear them talking of grace and
religion, and find them pleased with orthodox preachers; but look into
their lives, and you see them just the same sort of people as others
are, who make no pretences to devotion at all. So that the difference
that you find between them, seems to be only the difference of
natural tempers, or the effect of a polite and civilized education.
Leo has a great deal of good nature, has kept what they call good
company, hates every thing that is false and base, is very generous
and brave to his friends, but has concerned himself so little with
religion, that he hardly knows the difference between a Jew and a
christian.
Here you see, that one person has religion enough, according to
the way of the world, to be reckoned a pious christian; and the other
is so far from all appearance of religion, that he may fairly be
reckoned an heathen; and yet if you look into their common life, you
will find Eusebius and Leo exactly alike; seeking, using, and
enjoying, all that can be gotten in this world, in the same manner,
and for the same ends, even to please themselves, without any
prevailing habitual regard to the glory of God. You will find that
riches, prosperity, pleasures, indulgences, state, equipage, and
honour, are just as much the happiness of Eusebius, as they are of
Leo.
And must not all who are capable of any reflection, readily
acknowledge, that this is generally the state even of what we
commonly term devout people, whether men or women? You may
see them different from some others, as to times and places of
worship, receiving the sacrament, and with a doctrinal knowledge of
the form of sound words; but usually like the rest of the world in all
the other parts of their lives. Is it not notorious, that christians are
now not only like other men in their frailties and infirmities, (this might
be in some degree excusable, since the scriptures inform us, that
Elijah was a man of like passions with others) but are they not like
heathens, in all the main and chief articles of their lives? Do they not
enjoy the world, and live every day with the same indulgence as they
did who knew not God, nor of any happiness in another life?
And yet, if christianity has not changed a man’s mind and temper,
with relation to these things, what can we say that it has done for
him? For if the doctrines of christianity were universally practised,
they would make a man as different from other people, as to all
worldly tempers, sensual pleasures, and the pride of life, as a wise
man is different from an ideot; and it would be almost as easy a thing
to know a true professor of christianity, by his outward course of life,
as it is now difficult to find any body that lives it.
CHAPTER II.
Persons free from the necessities of labour and
employments, are to consider themselves as devoted to
God in a higher degree.
A slave can only live unto God in one particular way; that is, by
religious patience and submission in his state of slavery; but all ways
of holy living, all instances, and all kinds of virtue lie open to those,
who are masters of themselves, of their time, and their fortune.
For the manner of using our money, and spending our estate,
enters so far into the business of every day, that our common life
must necessarily be much of the same nature as our common way of
spending our estate. If we waste it, we do not waste a trifle, that
signifies little; but we waste that which might be made as eyes to the
blind, as a husband to the widow, as a father to the orphan; and
which, if given in faith, and out of love to Jesus Christ, would
greatly increase our reward in a future state. “Make to yourselves
friends (says our Saviour) of the mammon of unrighteousness, that
when you fail, they may receive you into everlasting habitations.”
What still adds weight to these arguments, is this, if we waste our
money, and do not improve our fortunes for the glory of God, and
the good of our fellow-creatures, we are not only guilty of wasting a
talent which God has given us, and making that useless which might
be so powerful a means of doing good, but we turn this useful talent
into a powerful means of corrupting ourselves. For so far as it is
spent wrong, so far it is spent in the support of some wrong temper,
in gratifying some vain and unreasonable desires, in conforming to
those fashions, and that pride of the world, which as reasonable men
and christians we are obliged to renounce. If therefore, you do not
spend your money in doing good to others, you must spend it to the
hurt of yourself. And you will act like a man that refuses to give that
as a cordial to a sick friend, though he could not drink it himself,
without not only inflaming, but corrupting his whole mass of blood.
Flavia, and Miranda, are two maiden sisters, that have each of
them two hundred pounds a year. They buried their father twenty
years ago, and have since that time spent their estate as they
pleased.
Flavia has been the wonder of all her friends, for her excellent
management, in making so surprizing a figure with so moderate a
fortune. Several ladies that have twice her fortune, are not able to be
always so genteel, and so constant at all places of what she calls
innocent pleasure and expence. She has every thing in the fashion,
and is in every place where there is any diversion. Flavia is very
orthodox; she talks warmly against heretics and schismatics, is
generally at church, and often at the sacrament. She once
commended a sermon that was against the pride and vanity of
dress, and thought it was very just against Lucinda, whom she takes
to be a great deal finer than she need to be. Should any one ask
Flavia to do something in charity; if she likes the person who makes
the proposal, or happens to be in a right temper, she will toss him
half a crown or a crown, and tell him, that if he knew what a long
millener’s bill she had just received, he would think it a great deal for
her to give. A quarter of a year after this, she hears a sermon upon
the necessity of charity; she thinks the man preaches well, that it is a
very proper subject, and that people want much to be put in mind of
it; but she applies nothing to herself, because she remembers that
she gave a crown some time ago, when she could so ill spare it.
You would think that Flavia had the tenderest conscience in the
world, if you was to see how scrupulous and apprehensive she is of
the guilt and danger of giving amiss.
She buys all books of wit and humour, and has made an
expensive collection of all our English Poets; for she says, one
cannot have a true taste of any of them, without being very
conversant with all.
If you visit Flavia on the Lord’s day, you will always meet good
company; you will know what is doing in the world, and who is meant
by every name that is in it. You will hear what plays were acted that
week, and which is the finest song in the opera; who was intolerable
at the last assembly, and what games are most in fashion. Flavia
thinks they are Atheists who play at cards on the Sunday; but she
will tell you the nicety of all the games, what cards she held, how she
played them, and the history of all that happened at play, as soon as
she comes from church. If you would know who is rude and ill-
natured, who is vain and foppish, who lives too high, and who is in
debt; if you would know what is the quarrel at a certain house, or
who and who are in love; if you would know how late Belinda comes
home at night, what cloaths she has bought, how she loves
compliments, and what a long story she told at such a place; if you
would know how cross Lucius is to his wife, and what ill-natured
things he says to her, when no body hears him; if you would know
how they hate one another in their hearts, though they appear so
kind in public; you must visit Flavia on the Sunday. But still, she has
so great a regard for the holiness of the Sunday, that she has turned
a poor old widow out of her house, as a prophane wretch, for having
been found once mending her cloaths on the Sunday night.
Thus lives Flavia; and if she lives ten years longer, she will have
spent about fifteen hundred and sixty Sundays after this manner;
and she will have worn about two hundred different suits of cloaths.
Out of these thirty years of her life, fifteen of them will have been
disposed of in bed; and of the remaining fifteen, about fourteen of
them will have been consumed in eating, drinking, dressing, visiting,
conversation, reading and hearing plays and romances, and
attending at operas, assemblies, balls and diversions. For you may
reckon all the time she is up, to be thus spent, except about an hour
and a half, that is disposed of at church, most Sundays in the year.
With great management, and under mighty rules of œconomy, she
will have spent six thousand pounds upon herself, except some few
shillings, crowns or half crowns, that have gone from her in
accidental charities.
If you was to hear her say, that she had lived all her life like Anna
the prophetess, “who departed not from the temple, but served God
with fastings and prayers night and day,” you would look upon her as
very extravagant; and yet this would be no greater an extravagance,
than for her to say, that she had been “striving to enter in at the strait
gate,” or making any one doctrine or precept of the gospel, a rule of
her life.
She may as well say, that she lived with our Saviour when he
was upon earth, as that she has lived in imitation of him, or made it
any part of her care to live in such tempers, as he required of all
those that would be his disciples. She may as truly say, that she has
every day washed the Saints feet, as that she has lived in christian
humility and poverty of spirit; and as reasonably think, that she has
taught a charity school, as that she has lived in works of charity. She
hath as much reason to think, that she has been a centinel in an
army, as that she has lived in watching and self-denial. And it may as
fairly be said, that she had lived by the labour of her hands, as that
she had given all diligence to make her calling and election sure.
Whilst she was under her mother, she was forced to live in
ceremony, to sit up late at night, to be in the folly of every fashion,
and always visiting on Sundays; to go patched, and loaded with a
burden of finery, to the holy sacrament; to be in every polite
conversation; to hear prophaneness at the play-house, and wanton
songs and love intrigues at the opera; to dance at public places, that
fops and rakes might admire the fineness of her shape, and the
beauty of her motions. The remembrance of this way of life is very
grievous to her, and makes her exceeding careful to give evidences
of her unfeigned repentance, by a contrary behaviour.
Miranda does not divide her duty between God, her neighbour,
and herself; but she considers all as due to God, and so does every
thing in his name and for his sake. This makes her consider her
fortune as the gift of God, that is to be used as is every thing that
belongs to God, for the wise and reasonable ends of a christian and
holy life: her fortune therefore is divided between herself and the
poor, and she has only her reasonable part of relief from it. For she
thinks it the same folly to indulge herself in needless, vain expences,
as to give to other people to spend in the same way.
This is the spirit of Miranda, and thus she uses the gifts of God. If
you was to see her, you would wonder who it was that was so
surprizing and unaffectedly neat and clean; for every thing about her
resembles the purity of her soul, and she is always clean without,
because she always studies to be pure within.
Every morning sees her early at her prayers; she rejoices in the
beginning of every day, because it begins all her pious rules of holy
living, and brings the fresh pleasure of repeating them. She seems to
be as a guardian angel to those that dwell about her, with her
watchings and prayers blessing the place where she dwells, and
making intercession with God for those that are asleep.
Her devotions have had some intervals, and she has had reason
to think that God hath answered several of her private prayers,
before the light hath entered into her sister’s room. Miranda does not
know what it is to have a dull half-day; the returns of her hours of
prayer, and her religious exercises, come too often to let any
considerable part of time lie heavy upon her hands.
When you see her at work, you see the same wisdom that
governs all her other actions; she is either doing something that is
necessary for herself, or necessary for others, who want to be
assisted. Her wise and pious mind neither wants the amusement,
nor can bear with the folly of idle and impertinent work; she can
admit of no such folly as this in the day, because she is to call herself
to an account for all her actions in her secret retirement at night.
Miranda once passed by a house, where the man and his wife
were cursing and swearing at one another in a most dreadful
manner, and three children crying about them; this sight so much
affected her compassionate mind, that she went the next day, and
even bought the three children, that they might not be ruined by
living with such wicked parents. They now live with Miranda, are
blessed with her care and prayers, and all the good works that she
can do for them. They hear her talk, they see her live, and join with
her in psalms and prayers. The eldest of them has already been an
instrument of converting his parents from their wicked life, and
shews a turn of mind so remarkably pious, that Miranda intends him
for holy orders; that being thus saved himself, he may be zealous in
the salvation of souls, and do to other miserable objects, as she has
done to him.
She has a great tenderness for old people that are grown past
their labour. The parish allowance (Miranda says) to such people, is
very seldom a comfortable maintenance. For this reason, they are
the constant objects of her care; she adds so much to their
allowance, as somewhat exceeds the wages they got when they
were young. This she does to comfort them under the infirmities of
their age, that being free from trouble and distress they may serve
God in peace and tranquillity of mind. She has generally a large
number of this kind, who by her charities, and exhortations to
holiness, spend their last days in great piety and devotion.
It may be, says Miranda, that I may sometimes give to those who
do not deserve it. But where, says she, has the scripture made merit
to be the rule or measure of my charity? On the contrary, does not
the scripture speak on this wise, “if thine enemy hunger, feed him; if
he thirst, give him drink.” And if I am to love and do good to my worst
enemies, surely I am not to deny alms to poor beggars, whom I
neither know to be bad people, nor any way my enemies? Does not
God make his sun to rise on the evil and on the good? Is not this the
very goodness that is recommended to us in scripture? that by
imitating it, “we may be children of our father who is in heaven, who
sendeth rain on the just and the unjust.”
This is the spirit, and this is the life of the devout Miranda; and if
she lives ten years longer, she will have spent six-thousand pounds
in charity; for that which she allows herself, may fairly be reckoned
amongst her alms.
When she dies, she must shine amongst Apostles, saints and
martyrs, she must stand amongst the first servants of God, and be
glorious amongst those that have fought the good fight, and finished
their course with joy.
Further, let a tradesman but have such a faith, and it will make
him a saint in his shop; his every day business will be a course of
wise and reasonable actions, made holy to God, by flowing from
faith, proceeding from love, and by being done in obedience to his
will and pleasure. He will therefore not chiefly consider, what arts or
methods or application will soonest make him greater and richer than
his brethren, that he may remove from a shop, to a life of state and
pleasure; but he will chiefly consider, what arts, what methods, and
what application can make worldly business most conducive to
God’s glory, and his neighbour’s good; and consequently make a life
of trade, to be a life of holiness, devotion, and undissembled piety.
It was this faith that made the primitive christians such eminent
instances of religion; and that made the goodly fellowship of the
saints in all ages, and all the glorious army of confessors and
martyrs. And if we will stop and ask ourselves, why we are not as
pious as the primitive christians, and saints of old were? our own
hearts must tell us, that it is because we never yet perhaps earnestly
sought after, and consequently were never really made partakers of,
that precious faith, whereby they were constrained to intend to
please God in all their actions, as the best and happiest thing in the
world.
A little before his death, when the doctors had given him over,
some of his neighbours came one evening to see him; at which time
he spake thus to them.
I see, (says he) my friends, the tender concern you have for me,
by the grief that appears in your countenances, and I know the
thoughts that you now have of me. You think how melancholy a case
it is, to see so young a man, and in such flourishing business,
delivered up to death. And perhaps, had I visited any of you in my
condition, I should have had the same thoughts of you. But now, my
friends, my thoughts are no more like your thoughts, than my
condition is like yours. It is no trouble to me now to think that I am to
die young, or before I have raised an estate. These things are sunk
into such mere nothings, that I have no name little enough to call
them by. For if in a few days, or hours, I am to leave this carcase to
be buried in the earth, and to find myself either for ever happy in the
favour of God, or eternally separated from all light and peace; can
any words sufficiently express the littleness of every thing else?
Is there any dream, like the dream of life, which amuses us with
the neglect and disregard of these things? Is there any folly like the
folly of our manly state, which is too wise and busy to be at leisure
for these reflections?
This is the wisdom of our manly thoughts. And yet what folly of
the silliest children, is so great as this? For what is there miserable
or dreadful in death, but the consequences of it? When a man is
dead, what does any thing signify to him, but the state he is then in?
The greatness of the things which follow death, makes all that
goes before it sink into nothing.
Now, that judgment is the next thing which I look for, and
everlasting happiness or misery is come so near to me, all the
enjoyments and prosperities of life seem as vain and insignificant,
and to have no more to do with my happiness, than the cloaths that I
wore when I was a little child.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com