Introduction to Security 9th Edition Robert J. Fischer - The ebook in PDF and DOCX formats is ready for download now
Introduction to Security 9th Edition Robert J. Fischer - The ebook in PDF and DOCX formats is ready for download now
com
https://ebookname.com/product/introduction-to-security-9th-
edition-robert-j-fischer/
OR CLICK HERE
DOWLOAD EBOOK
https://ebookname.com/product/campbell-s-psychiatric-
dictionary-9th-edition-robert-j-campbell/
https://ebookname.com/product/california-real-estate-finance-9th-
edition-robert-j-bond/
https://ebookname.com/product/an-undergraduate-introduction-to-
financial-mathematics-3rd-edition-j-robert-buchanan/
https://ebookname.com/product/perchlorate-environmental-
occurrence-interactions-and-treatment-1st-edition-baohua-gu/
International Mathematical Olympiads 1959 2000 1st
Edition Mircea Becheanu
https://ebookname.com/product/international-mathematical-
olympiads-1959-2000-1st-edition-mircea-becheanu/
https://ebookname.com/product/speaking-of-god-in-thomas-aquinas-
and-meister-eckhart-beyond-analogy-1st-edition-anastasia-
wendlinder/
https://ebookname.com/product/propagators-in-quantum-chemistry-
second-edition-jan-linderberg/
https://ebookname.com/product/the-wisdom-of-alexander-the-great-
enduring-leadership-lessons-from-the-man-who-created-an-
empire-1st-edition-lance-b-kurke/
https://ebookname.com/product/sorghum-and-millets-diseases-1st-
ed-edition-john-f-leslie/
Nanotechnology enhanced orthopedic materials
fabrications applications and future trends 1st Edition
Yang
https://ebookname.com/product/nanotechnology-enhanced-orthopedic-
materials-fabrications-applications-and-future-trends-1st-
edition-yang/
Introduction to Security
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical,
including photocopying, recording, or any information storage and retrieval system,without permission in writing
from the publisher. Details on how to seek permission, further information about the Publisher’s permissions
policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright
Licensing Agency, can be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher (other than
as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our
understanding, changes in research methods, professional practices, or medical treatment may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any
information, methods, compounds, or experiments described herein. In using such information or methods they
should be mindful of their own safety and the safety of others, including parties for whom they have a professional
responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for
any injury and/or damage to persons or property as a matter of products liability,negligence or otherwise, or from any
use or operation of any methods, products, instructions, or ideas contained in the material herein.
HV8290.G74 2013
363.28'9--dc23
2012020446
As we write this ninth edition, we are reminded of how fast our profession has changed and
how global responsibilities of a security leader have now become commonplace. A new author,
David C. Walters, has joined our team, as we say a grateful goodbye to Gion Green, the origi-
nal author. A complete revolution in the security industry has occurred since Gion passed over
30 years ago. The aftermath of the September 11, 2001 attacks on the World Trade Center and
the Pentagon shocked the nation. Government involvement in certain areas of the security
business is now a daily reality.
Coupled with the security industry’s response to the threat of world terrorism is the
absolute need to keep up with an always rapidly changing technology used by the industry.
Unfortunately, this same technology is also used against persons and organizations by crimi-
nals. Protection of information, which was traditionally handled by placing it in vaults and
marking it proprietary or Top Secret, has become ever more complex as the information
is migrated to computer files and networks. Computer systems that now contain all types of
information, from personal identification to inventory records, are making life both easier and
more complex. Information exchange is made easy by the click of a computer key or a touch
on a smart phone. This exchange of information relies on the Internet, and there are plenty of
examples that clearly demonstrate the computer network is subject to attack by outside hack-
ers and other criminal enterprises.
This ninth edition continues to maintain the basic concepts developed by Gion Green,
covering the total picture and giving the reader a glimpse of various, diverse components that
make up the security function. However, much of the security industry is undergoing continu-
ous change. Former President George W. Bush’s call for an international coalition to wage war
against world terrorism put the world’s citizens on an alert status. The tension in the Middle
East and parts of Europe, focusing on religious conflicts, economic interests, and differences
in political beliefs, continues to provide both opportunity and fear for those in the security
industry. The world of security that changed dramatically on September 11, 2001 continues
to evolve. This new edition utilizes the same basic concepts that have made this text a basic
primer in the security field, while also focusing on current and future problems within the
basic framework of security theory.
This updated edition has one less chapter, but no less material. Two chapters are still
devoted entirely to the security issues created by the continuing presence of world terrorism.
In addition, the material on information security, identity theft, transportation, contingency
planning, retail security, and piracy has been completely updated.
Even as we put the final touches on this 2012 edition, the reality of the times may make
some of the materials already outdated. However, we maintain the belief that the basic prin-
ciples of loss prevention and security remain intact. The tools that allow us to apply the prin-
ciples have become more complex and constantly changing. We still lock our valuables. Some
use traditional locks and keys, others have sophisticated electronic tools that operate elec-
tronic locks, while still other information is locked into databases using information technol-
ogy security including encryption and dynamic passwords.
Acknowledgments
We wish to thank those individuals who took time to complete surveys distributed by the publisher
providing us with suggestions for updating the book for this ninth edition. These individuals
include:
Robert B. Iannone, CPP
President
Iannone Security Management
Fountain Valley, California
Lennart E. Long
Adjunct Professor
Criminal Justice and Criminology Department
University of Massachusetts, Lowell
Lowell, Massachusetts
Dr. James S.E. Opolot
Professor
Administration of Justice
Texas Southern University
Houston, Texas
Chelsey Rennard
West Palm Beach, Florida
Rafael Rojas, Jr., DPA
Assistant Professor
Justice Studies Department
Southern New Hampshire University
Manchester, New Hampshire
Allen R. Sondej, Esq.
Adjunct Professor
New Jersey City University
Jersey City, New Jersey
Michael H. Witt
Director, Program Security
Ball Aerospace & Technologies Corp.
Boulder, Colorado
We also appreciate the occassional note we receive from those who use our book. Thank you
to Klas Nilsson, Security Manager, Vanadisvagen 24, Stockholm, Sweden, for taking the time to com-
ment on the materials on “Deciding on a Contract Security Firm.”
In particular, special thanks to the content experts who reviewed and at times made sub-
stantial updates to materials contained in various chapters. These experts include: Dr. Sharon
Introduction to Security Ninth Edition. DOI: 10.1016/B978-0-12-385057-7.00024-5 xv
© 2013
2013 Elsevier Inc. All rights reserved.
xvi ACKNOWLEDGMENTS
Larson, Department of Health Science, Western Illinois University, who reviewed the information
on drugs in the workplace; James Falk, Security Director, Ace Hardware, who reworked the Retail
chapter; Steven C. Babb, retired Deputy General Counsel for Northrop Grumman Corporation, who
reviewed and updated our chapter on security and the law; Deon Chatterton, Sr. Manager Systems
& Technology at Cisco as well as Whitney Stein, Esq, of the Insurance Law Group, who helped with
the rewriting of the insurance materials for this ninth edition.
We also thank Pam Chester, Acquisitions Editor, Butterworth-Heinemann, for her encouragement
to update this classic text. Pam’s understanding of the changing security climate inspired Ed and Bob to
tackle a ninth edition and bring David in as a third author. Acknowledgments also go to Gregory Chalson
and Amber Hodge at Elsevier, who kept us on task during the production of the manuscript.
Bob thanks those at Assets Protection Associates, Incorporated, who provided support ser-
vices during his work on this revision, as well as comments and edits of various drafts. David would
like to give special thanks to Deon Chatterton, Sr. Manager Systems & Technology at Cisco as well as
Whitney Stein, Esq, of the Insurance Law Group.
Finally, we thank our dear wives Kathy and Phillis, who have always been understanding of
the time needed to complete this project.
Chapter Acknowledgments
Terrorism
While this chapter has been thoroughly updated by the authors, the outline and original composi-
tion is primarily the work of Dr. Vladimir Sergevnin, Editor, Illinois Law Enforcement Executive Form
Journal, and professor of Law Enforcement and Justice Administration at Western Illinois University.
Retail
This completely revised chapter is primarily the work of James Falk, Director, Loss Prevention/
Property Administration, Ace Hardware Corporation, and his colleagues, Theresa Tapella, Manager of
Retail LP and BC Planning at Ace Hardware and Bill Cafferty, Retail Loss Prevention Consultant. James
and his team rewrote 90 percent of the chapter to reflect the many changes that have occurred in retail
security over the past decade. These include the predominant use of “chain management” principles
and the growing use of many types of technology, including the growing trend for web-based sales.
Violence/Drug Use
This chapter is a combination of two chapters. The violence materials are the work of David, who
wrote the original chapter titled “Violence in the Workplace.” The drug materials have been com-
pleted reworked by Dr. Sharon Larson, Health Sciences Department, Western Illinois University. Dr.
Larson is an experienced practitioner in the health field, having served as a nurse in the U.S. Army,
and a Health Education Specialist at the Beau Health Center in Macomb, Illinois before joining the
faculty at Western.
1
Introduction
The chapters in Section I provide an overview of the security and loss prevention industry.
Chapter 1 is a brief history of the development of the field in Europe and America, ending
with a quick, crisp summary of the status of security in the 21st century. Chapter 2 identifies
the roles of security, whether contract, proprietary or hybrid. Chapter 3 covers career options.
Chapter 4 discusses the development of security as a profession. Issues discussed include
training, certification and regulation. Chapter 5 provides the reader with an overview of the
development and the important role of the Department of Homeland Security as it relates to
the private sector.
As noted in the preface, the events of September 11, 2001 changed the face of security oper-
ations. Security is a common theme considered by almost every person in the developed and
developing world. Yet, as security professionals know, the basic concepts and theories of secu-
rity and loss prevention are not changed by a single event. The most significant changes are in
the innovative tools that professionals use to achieve their goals. What is important in looking
at the past is that we learn the lessons that are presented in the development of past security
operations. We can then apply those lessons to the present situation, modify those that have
potential to assist us in our efforts, and discard outdated and outmoded ideas and technology.
The information presented in Part I, along with recommendations just presented, will serve
as a basis for understanding and applying the specific materials presented in Parts II and III.
1
Origins and Development of
21st Century Security
OBJECTIVES
Introduction
Security implies a stable, relatively predictable environment in which an individual or
group may pursue its ends without disruption or harm and without fear of disturbance or
injury. The concept of security in an organizational sense has evolved gradually through-
out the history of Western civilization, shaped by a wide variety of institutional and cultural
patterns.
In examining the origins and development of security, it should be noted that security
holds a mirror up, not to nature, but to society and its institutions. Thus in medieval England
there were programs to clear brush and other concealment on either side of the king’s roads
as a precaution against robbers, and to protect citizens from night thieves there were night
watchmen. In the United States in modern times, these rudimentary security measures find
their counterparts in the cleared areas adjoining perimeter fences and buildings, in security
patrols, and in intrusion alarms. Throughout history it is possible to trace the emerging con-
cept of security as a response to, and a reflection of, a changing society, mirroring both its
social structure and its economic conditions, its perception of law and crime, and its morality.
Thus, security remains a field of both tradition and dramatic change. The introduction of high-
tech systems and computers has changed the nature of the job of the 21st century security
professional. Security today must be directed toward modern problems including computer
crime and world terrorism, yet we cannot forget the basic foundations on which the field has
developed.
Security in England
The development of systems of protection (security) and law enforcement in England began
to come with greater rapidity and sophistication beginning in the 14th through the 18th cen-
turies. Seeds for this development were planted during the social revolution that heralded the
end of the remaining elements of the feudal structure in the latter half of the 13th century.
Security was one thing in a largely rural society controlled by kings and feudal barons; it
was another thing entirely in a world swept by enormous changes. The voyages of explo-
ration, which opened new markets and trade routes, created a new and increasingly impor-
tant merchant class whose activities came to dominate the port cities and trading centers.
Concurrently, acts of enclosure and consolidation drove displaced small tenants off the land,
and they migrated to the cities in great numbers.
By 1700 the social patterns of the Middle Ages were breaking down. Increased urbaniza-
tion of the population had created conditions of considerable hardship. Poverty and crime
increased rapidly. No public law enforcement agencies existed that could restrain the mount-
ing wave of crime and violence, and no agencies existed that could alleviate the causes of the
problem.
Different kinds of police agencies were privately formed. Individual merchants hired men
to guard their property. Merchant associations also created the merchant police to guard shops
and warehouses. Night watchmen were employed to make their rounds. Agents were engaged
to recover stolen property, and the people of various parishes into which the major cities were
divided hired parochial police.
Attention then turned to the reaffirmation of laws to protect the common good. Although
the Court of Star Chamber, which gave the English monarchy all control over decisions of
law, had been abolished in 1641, its practices were not officially proscribed until 1689 when
Parliament agreed to crown William and Mary if they would reaffirm the ancient rights and
privileges of the people. They agreed, and Parliament ratified the Bill of Rights, which for all
time limited the power of the king as well as affirming and protecting the inalienable rights of
the individual.
In 1748 Henry Fielding, magistrate and author (most notably of the unforgettable
Tom Jones), proposed a permanent, professional, and adequately paid security force. His
invaluable contributions included a foot patrol to make the streets safe, a mounted patrol for
the highways, the famous “Bow Street Amateur Volunteer Force” of special investigators, and
police courts. Fielding is credited with conceiving the idea of preventing crime instead of seek-
ing to control it.
generally consisted of a central fort or stockade surrounded by the farms of the inhabitants.
If hostilities threatened, an alarm was sounded and the members of the community left
their homes for the protection of the fort, where all able-bodied persons were involved in its
defense. In such circumstances, a semi-military flavor often characterized security measures,
which included guard posts and occasional patrols.
Protection of people and property in established towns again followed English traditions.
Sheriffs were elected as chief security officers in colonial Virginia and Georgia; constables
were appointed in New England. Watchmen were hired to patrol the streets at night. As Private
Security: Report of the Task Force on Private Security notes, “These watchmen remained famil-
iar figures and constituted the primary security measures until the establishment of full-time
police forces in the mid-1800’s.”2
Such watchmen, it should be pointed out, were without training, had no legal author-
ity, were either volunteer or else paid a pittance, and were generally held in low regard—
circumstances that bear a remarkable similarity to observations in the RAND report on
private security in 1971.3
FIGURE 1-1 Allan Pinkerton, President Lincoln, and Major General John McClellan. (Photographed October 1862,
Antietam, Md. Courtesy of National Archives.)
In 1850 Henry Wells and William Fargo were partners in the American Express Company,
chartered to operate a freight service east of the Mississippi River; by 1852 they had expanded
their operating charter westward as Wells Fargo and Company. Freight transportation was a
dangerous business, and these early companies usually had their own detectives and security
personnel, known as “shotgun riders.”
Washington Perry Brink in Chicago founded Brinks, Inc., in 1859 as a freight and package
delivery service. More than 30 years later, in 1891, he transported his first payroll—the begin-
ning of armored car and courier service. By 1900 Brinks had a fleet of 85 wagons in the field.5
Brinks, Wells Fargo, and Adams Express were the first major firms to offer security for the
transportation of valuables and money.
8 INTRODUCTION TO SECURITY
William J. Burns, a former Secret Service investigator and head of the Bureau of
Investigation (forerunner of the Federal Bureau of Investigation [FBI]), started the William
J. Burns Detective Agency in 1909. It became the sole investigating agency for the American
Bankers’ Association and grew to become the second largest (after Pinkerton) contract guard
and investigative service in the United States. For all intents and purposes, Pinkerton and
Burns were the only national investigative bodies concerned with nonspecialized crimes in the
country until the advent of the FBI.
Another 19th-century pioneer in this field was Edwin Holmes, who offered the first bur-
glar alarm service in the country in 1858. Holmes purchased an alarm system designed by
Augustus Pope. Following Holmes, American District Telegraph (ADT) was founded in 1874.
Both companies installed alarms and provided response to alarm situations as well as main-
taining their own equipment. Baker Industries initiated a fire control and detection equipment
business in 1909.
From the 1870s, only private agencies had provided contract security services to industrial
facilities across the country. In many cases, particularly around the end of the 19th century
and during the Great Depression of the 1930s, the services were, to say the least, controversial.
Both the Battle of Homestead in 1892, during which workers striking that plant were shot and
beaten by security forces, and the strikes in the automobile industry in the middle 1930s are
examples of excesses from overzealous security operatives in relatively recent history.
With few exceptions, proprietary, or in-house, security forces hardly existed before the
defense-related “plant protection” boom of the early 1940s. The impetus for modern private
security effectively began in that decade with the creation of the federal Industrial Security
Program (today named the Defense Industrial Security Program [DISP]), a subordinate com-
mand within the Department of Defense. The National Industrial Security Program (NISP)
is the nominal authority in the United States for managing the needs of private industry to
access classified information. The National Industrial Security Programs’ Operating Manual
(NISPOM/DoD 5220.22-M) today consists of 11 chapters and 3 appendices totaling 141 pages.
The most recent 2006 revisions include The Intelligence Reform and Terrorism Prevention Act
of 2004 and other changes taking effect since September 11, 2001.6
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the
terms of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or
expense to the user, provide a copy, a means of exporting a copy, or
a means of obtaining a copy upon request, of the work in its original
“Plain Vanilla ASCII” or other form. Any alternate format must
include the full Project Gutenberg™ License as specified in
paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
1.F.4. Except for the limited right of replacement or refund set forth
in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookname.com