100% found this document useful (2 votes)
14 views

Introduction to Security 9th Edition Robert J. Fischer - The ebook in PDF and DOCX formats is ready for download now

The document promotes the 9th edition of 'Introduction to Security' by Robert J. Fischer, which addresses the evolving landscape of the security industry post-September 11, 2001. It highlights the importance of adapting to new technologies and global threats, while maintaining foundational security principles. Additionally, it offers various resources and links to other educational materials available for download on ebookname.com.

Uploaded by

lorinctolko
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
14 views

Introduction to Security 9th Edition Robert J. Fischer - The ebook in PDF and DOCX formats is ready for download now

The document promotes the 9th edition of 'Introduction to Security' by Robert J. Fischer, which addresses the evolving landscape of the security industry post-September 11, 2001. It highlights the importance of adapting to new technologies and global threats, while maintaining foundational security principles. Additionally, it offers various resources and links to other educational materials available for download on ebookname.com.

Uploaded by

lorinctolko
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Endless Ebook, One Click Away – Start Downloading at ebookname.

com

Introduction to Security 9th Edition Robert J.


Fischer

https://ebookname.com/product/introduction-to-security-9th-
edition-robert-j-fischer/

OR CLICK HERE

DOWLOAD EBOOK

Browse and Get More Ebook Downloads Instantly at https://ebookname.com


Click here to visit ebookname.com and download ebook now
Instant digital products (PDF, ePub, MOBI) available
Download now and explore formats that suit you...

Campbell s Psychiatric Dictionary 9th Edition Robert J.


Campbell

https://ebookname.com/product/campbell-s-psychiatric-
dictionary-9th-edition-robert-j-campbell/

California Real Estate Finance 9th Edition Robert J.


Bond

https://ebookname.com/product/california-real-estate-finance-9th-
edition-robert-j-bond/

An Undergraduate Introduction to Financial Mathematics


3rd Edition J. Robert Buchanan

https://ebookname.com/product/an-undergraduate-introduction-to-
financial-mathematics-3rd-edition-j-robert-buchanan/

Perchlorate Environmental Occurrence Interactions and


Treatment 1st Edition Baohua Gu

https://ebookname.com/product/perchlorate-environmental-
occurrence-interactions-and-treatment-1st-edition-baohua-gu/
International Mathematical Olympiads 1959 2000 1st
Edition Mircea Becheanu

https://ebookname.com/product/international-mathematical-
olympiads-1959-2000-1st-edition-mircea-becheanu/

Speaking of God in Thomas Aquinas and Meister Eckhart


Beyond Analogy 1st Edition Anastasia Wendlinder

https://ebookname.com/product/speaking-of-god-in-thomas-aquinas-
and-meister-eckhart-beyond-analogy-1st-edition-anastasia-
wendlinder/

Propagators in Quantum Chemistry Second Edition Jan


Linderberg

https://ebookname.com/product/propagators-in-quantum-chemistry-
second-edition-jan-linderberg/

The Wisdom of Alexander The Great Enduring Leadership


Lessons From The Man Who Created An Empire 1st Edition
Lance B. Kurke

https://ebookname.com/product/the-wisdom-of-alexander-the-great-
enduring-leadership-lessons-from-the-man-who-created-an-
empire-1st-edition-lance-b-kurke/

Sorghum and millets diseases 1st ed Edition John F


Leslie

https://ebookname.com/product/sorghum-and-millets-diseases-1st-
ed-edition-john-f-leslie/
Nanotechnology enhanced orthopedic materials
fabrications applications and future trends 1st Edition
Yang

https://ebookname.com/product/nanotechnology-enhanced-orthopedic-
materials-fabrications-applications-and-future-trends-1st-
edition-yang/
Introduction to Security

Introduction to Security Ninth Edition. DOI: 10.1016/B978-0-12-385057-7.00020-8 i


© 2013
2013 Elsevier Inc. All rights reserved.
Introduction to Security
Ninth Edition
Robert J. Fischer
Edward P. Halibozek
David C. Walters

AMSTERDAM • BOSTON • HEIDELBERG • LONDON


NEW YORK • OXFORD • PARIS • SAN DIEGO
SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO
Butterworth-Heinemann is an imprint of Elsevier

Introduction to Security Ninth Edition. DOI: 10.1016/B978-0-12-385057-7.00020-8 iii


© 2013
2013 Elsevier Inc. All rights reserved.
Butterworth-Heinemann is an imprint of Elsevier
225 Wyman Street, Waltham, MA 02451, USA
The Boulevard, Langford Lane, Kidlington, Oxford, OX5 1GB, UK

Copyright © 2013 Elsevier Inc. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical,
including photocopying, recording, or any information storage and retrieval system,without permission in writing
from the publisher. Details on how to seek permission, further information about the Publisher’s permissions
policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright
Licensing Agency, can be found at our website: www.elsevier.com/permissions.

This book and the individual contributions contained in it are protected under copyright by the Publisher (other than
as may be noted herein).

Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our
understanding, changes in research methods, professional practices, or medical treatment may become necessary.

Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any
information, methods, compounds, or experiments described herein. In using such information or methods they
should be mindful of their own safety and the safety of others, including parties for whom they have a professional
responsibility.

To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for
any injury and/or damage to persons or property as a matter of products liability,negligence or otherwise, or from any
use or operation of any methods, products, instructions, or ideas contained in the material herein.

Library of Congress Cataloging-in-Publication Data


Fischer, Robert J.
Introduction to security / Robert Fischer, Edward Halibozek, David Walters. -- 9th ed.
p. cm.
Includes index.
ISBN 978-0-12-385057-7
1. Private security services. 2. Private security services--Management. 3. Industries--Security measures.
4. Retail trade--Security measures. I. Halibozek, Edward P. II. Walters, David, 1963- III. Title.

HV8290.G74 2013
363.28'9--dc23
2012020446

British Library Cataloguing-in-Publication Data


A catalogue record for this book is available from the British Library.

For information on all Butterworth–Heinemann publications


visit our Web site at http://store.elsevier.com

Printed in the United States of America


12 13 14 15 16 10 9 8 7 6 5 4 3 2 1
Preface

As we write this ninth edition, we are reminded of how fast our profession has changed and
how global responsibilities of a security leader have now become commonplace. A new author,
David C. Walters, has joined our team, as we say a grateful goodbye to Gion Green, the origi-
nal author. A complete revolution in the security industry has occurred since Gion passed over
30 years ago. The aftermath of the September 11, 2001 attacks on the World Trade Center and
the Pentagon shocked the nation. Government involvement in certain areas of the security
business is now a daily reality.
Coupled with the security industry’s response to the threat of world terrorism is the
absolute need to keep up with an always rapidly changing technology used by the industry.
Unfortunately, this same technology is also used against persons and organizations by crimi-
nals. Protection of information, which was traditionally handled by placing it in vaults and
marking it proprietary or Top Secret, has become ever more complex as the information
is migrated to computer files and networks. Computer systems that now contain all types of
information, from personal identification to inventory records, are making life both easier and
more complex. Information exchange is made easy by the click of a computer key or a touch
on a smart phone. This exchange of information relies on the Internet, and there are plenty of
examples that clearly demonstrate the computer network is subject to attack by outside hack-
ers and other criminal enterprises.
This ninth edition continues to maintain the basic concepts developed by Gion Green,
covering the total picture and giving the reader a glimpse of various, diverse components that
make up the security function. However, much of the security industry is undergoing continu-
ous change. Former President George W. Bush’s call for an international coalition to wage war
against world terrorism put the world’s citizens on an alert status. The tension in the Middle
East and parts of Europe, focusing on religious conflicts, economic interests, and differences
in political beliefs, continues to provide both opportunity and fear for those in the security
industry. The world of security that changed dramatically on September 11, 2001 continues
to evolve. This new edition utilizes the same basic concepts that have made this text a basic
primer in the security field, while also focusing on current and future problems within the
basic framework of security theory.
This updated edition has one less chapter, but no less material. Two chapters are still
devoted entirely to the security issues created by the continuing presence of world terrorism.
In addition, the material on information security, identity theft, transportation, contingency
planning, retail security, and piracy has been completely updated.

Introduction to Security Ninth Edition. DOI: 10.1016/B978-0-12-385057-7.00023-3 xiii


© 2013
2013 Elsevier Inc. All rights reserved.
xiv PREFACE

Even as we put the final touches on this 2012 edition, the reality of the times may make
some of the materials already outdated. However, we maintain the belief that the basic prin-
ciples of loss prevention and security remain intact. The tools that allow us to apply the prin-
ciples have become more complex and constantly changing. We still lock our valuables. Some
use traditional locks and keys, others have sophisticated electronic tools that operate elec-
tronic locks, while still other information is locked into databases using information technol-
ogy security including encryption and dynamic passwords.
Acknowledgments

We wish to thank those individuals who took time to complete surveys distributed by the publisher
providing us with suggestions for updating the book for this ninth edition. These individuals
include:
Robert B. Iannone, CPP
President
Iannone Security Management
Fountain Valley, California
Lennart E. Long
Adjunct Professor
Criminal Justice and Criminology Department
University of Massachusetts, Lowell
Lowell, Massachusetts
Dr. James S.E. Opolot
Professor
Administration of Justice
Texas Southern University
Houston, Texas
Chelsey Rennard
West Palm Beach, Florida
Rafael Rojas, Jr., DPA
Assistant Professor
Justice Studies Department
Southern New Hampshire University
Manchester, New Hampshire
Allen R. Sondej, Esq.
Adjunct Professor
New Jersey City University
Jersey City, New Jersey
Michael H. Witt
Director, Program Security
Ball Aerospace & Technologies Corp.
Boulder, Colorado
We also appreciate the occassional note we receive from those who use our book. Thank you
to Klas Nilsson, Security Manager, Vanadisvagen 24, Stockholm, Sweden, for taking the time to com-
ment on the materials on “Deciding on a Contract Security Firm.”
In particular, special thanks to the content experts who reviewed and at times made sub-
stantial updates to materials contained in various chapters. These experts include: Dr. Sharon
Introduction to Security Ninth Edition. DOI: 10.1016/B978-0-12-385057-7.00024-5 xv
© 2013
2013 Elsevier Inc. All rights reserved.
xvi ACKNOWLEDGMENTS

Larson, Department of Health Science, Western Illinois University, who reviewed the information
on drugs in the workplace; James Falk, Security Director, Ace Hardware, who reworked the Retail
chapter; Steven C. Babb, retired Deputy General Counsel for Northrop Grumman Corporation, who
reviewed and updated our chapter on security and the law; Deon Chatterton, Sr. Manager Systems
& Technology at Cisco as well as Whitney Stein, Esq, of the Insurance Law Group, who helped with
the rewriting of the insurance materials for this ninth edition.
We also thank Pam Chester, Acquisitions Editor, Butterworth-Heinemann, for her encouragement
to update this classic text. Pam’s understanding of the changing security climate inspired Ed and Bob to
tackle a ninth edition and bring David in as a third author. Acknowledgments also go to Gregory Chalson
and Amber Hodge at Elsevier, who kept us on task during the production of the manuscript.
Bob thanks those at Assets Protection Associates, Incorporated, who provided support ser-
vices during his work on this revision, as well as comments and edits of various drafts. David would
like to give special thanks to Deon Chatterton, Sr. Manager Systems & Technology at Cisco as well as
Whitney Stein, Esq, of the Insurance Law Group.
Finally, we thank our dear wives Kathy and Phillis, who have always been understanding of
the time needed to complete this project.

Chapter Acknowledgments
Terrorism
While this chapter has been thoroughly updated by the authors, the outline and original composi-
tion is primarily the work of Dr. Vladimir Sergevnin, Editor, Illinois Law Enforcement Executive Form
Journal, and professor of Law Enforcement and Justice Administration at Western Illinois University.

Retail
This completely revised chapter is primarily the work of James Falk, Director, Loss Prevention/
Property Administration, Ace Hardware Corporation, and his colleagues, Theresa Tapella, Manager of
Retail LP and BC Planning at Ace Hardware and Bill Cafferty, Retail Loss Prevention Consultant. James
and his team rewrote 90 percent of the chapter to reflect the many changes that have occurred in retail
security over the past decade. These include the predominant use of “chain management” principles
and the growing use of many types of technology, including the growing trend for web-based sales.

Violence/Drug Use
This chapter is a combination of two chapters. The violence materials are the work of David, who
wrote the original chapter titled “Violence in the Workplace.” The drug materials have been com-
pleted reworked by Dr. Sharon Larson, Health Sciences Department, Western Illinois University. Dr.
Larson is an experienced practitioner in the health field, having served as a nurse in the U.S. Army,
and a Health Education Specialist at the Beau Health Center in Macomb, Illinois before joining the
faculty at Western.

Security and the Law


This chapter was thoroughly reviewed and updated by Steven C. Babb, retired Deputy General
Counsel for Northrop Grumman Corporation. Steve's expertise in Human Resources and Labor
Law, along with his extensive work with the Northrop Grumman Security Council on all security
related legal issues and problems, made him the perfect contributor to this chapter.
PA RT

1
Introduction

The chapters in Section I provide an overview of the security and loss prevention industry.
Chapter 1 is a brief history of the development of the field in Europe and America, ending
with a quick, crisp summary of the status of security in the 21st century. Chapter 2 identifies
the roles of security, whether contract, proprietary or hybrid. Chapter 3 covers career options.
Chapter 4 discusses the development of security as a profession. Issues discussed include
training, certification and regulation. Chapter 5 provides the reader with an overview of the
development and the important role of the Department of Homeland Security as it relates to
the private sector.
As noted in the preface, the events of September 11, 2001 changed the face of security oper-
ations. Security is a common theme considered by almost every person in the developed and
developing world. Yet, as security professionals know, the basic concepts and theories of secu-
rity and loss prevention are not changed by a single event. The most significant changes are in
the innovative tools that professionals use to achieve their goals. What is important in looking
at the past is that we learn the lessons that are presented in the development of past security
operations. We can then apply those lessons to the present situation, modify those that have
potential to assist us in our efforts, and discard outdated and outmoded ideas and technology.
The information presented in Part I, along with recommendations just presented, will serve
as a basis for understanding and applying the specific materials presented in Parts II and III.
1
Origins and Development of
21st Century Security

OBJECTIVES

The study of this chapter will enable you to:


1. Outline the historical development of security in America.
2. Discuss changing crime trends over the past decades.
3. Understand the role of professional associations/organizations in the development of a professional
security industry.
4. Consider the changing role of security in our 21st century world.

Introduction
Security implies a stable, relatively predictable environment in which an individual or
group may pursue its ends without disruption or harm and without fear of disturbance or
injury. The concept of security in an organizational sense has evolved gradually through-
out the history of Western civilization, shaped by a wide variety of institutional and cultural
patterns.
In examining the origins and development of security, it should be noted that security
holds a mirror up, not to nature, but to society and its institutions. Thus in medieval England
there were programs to clear brush and other concealment on either side of the king’s roads
as a precaution against robbers, and to protect citizens from night thieves there were night
watchmen. In the United States in modern times, these rudimentary security measures find
their counterparts in the cleared areas adjoining perimeter fences and buildings, in security
patrols, and in intrusion alarms. Throughout history it is possible to trace the emerging con-
cept of security as a response to, and a reflection of, a changing society, mirroring both its
social structure and its economic conditions, its perception of law and crime, and its morality.
Thus, security remains a field of both tradition and dramatic change. The introduction of high-
tech systems and computers has changed the nature of the job of the 21st century security
professional. Security today must be directed toward modern problems including computer
crime and world terrorism, yet we cannot forget the basic foundations on which the field has
developed.

Introduction to Security Ninth Edition. DOI: 10.1016/B978-0-12-385057-7.00001-4 3


© 2013
2013 Elsevier Inc. All rights reserved.
4 INTRODUCTION TO SECURITY

Security in England
The development of systems of protection (security) and law enforcement in England began
to come with greater rapidity and sophistication beginning in the 14th through the 18th cen-
turies. Seeds for this development were planted during the social revolution that heralded the
end of the remaining elements of the feudal structure in the latter half of the 13th century.
Security was one thing in a largely rural society controlled by kings and feudal barons; it
was another thing entirely in a world swept by enormous changes. The voyages of explo-
ration, which opened new markets and trade routes, created a new and increasingly impor-
tant merchant class whose activities came to dominate the port cities and trading centers.
Concurrently, acts of enclosure and consolidation drove displaced small tenants off the land,
and they migrated to the cities in great numbers.
By 1700 the social patterns of the Middle Ages were breaking down. Increased urbaniza-
tion of the population had created conditions of considerable hardship. Poverty and crime
increased rapidly. No public law enforcement agencies existed that could restrain the mount-
ing wave of crime and violence, and no agencies existed that could alleviate the causes of the
problem.
Different kinds of police agencies were privately formed. Individual merchants hired men
to guard their property. Merchant associations also created the merchant police to guard shops
and warehouses. Night watchmen were employed to make their rounds. Agents were engaged
to recover stolen property, and the people of various parishes into which the major cities were
divided hired parochial police.
Attention then turned to the reaffirmation of laws to protect the common good. Although
the Court of Star Chamber, which gave the English monarchy all control over decisions of
law, had been abolished in 1641, its practices were not officially proscribed until 1689 when
Parliament agreed to crown William and Mary if they would reaffirm the ancient rights and
privileges of the people. They agreed, and Parliament ratified the Bill of Rights, which for all
time limited the power of the king as well as affirming and protecting the inalienable rights of
the individual.

The 18th Century


By the 18th century, it is possible to discern both the shape of efforts toward communal secu-
rity and the kinds of problems that would continue to plague an increasingly urban society into
modern times.
In 1737, for instance, a new aspect of individual rights came to be acknowledged: For the
first time, tax revenues were used for the payment of a night watch. This was a significant
development in security practice because it was a precedent-setting step that established for
the first time the use of tax revenues for common security purposes.
Eight years later, Parliament authorized a special committee to study security problems.
The study resulted in a program employing various existing private security forces to extend
the scope of their protection. The resulting heterogeneous group, however, was too much at
odds. It proved ineffective in providing any satisfactory level of protection.
Chapter 1 l Origins and Development of 21st Century Security 5

In 1748 Henry Fielding, magistrate and author (most notably of the unforgettable
Tom Jones), proposed a permanent, professional, and adequately paid security force. His
invaluable contributions included a foot patrol to make the streets safe, a mounted patrol for
the highways, the famous “Bow Street Amateur Volunteer Force” of special investigators, and
police courts. Fielding is credited with conceiving the idea of preventing crime instead of seek-
ing to control it.

The Impact of Industrial Expansion


The Industrial Revolution began to gather momentum in the latter half of the 18th cen-
tury. Like the migrations off the land 200 years earlier, people again flocked to the cities—not
pushed this time, as they had been earlier, by enclosure and dispossession, but rather lured by
promises of work and wages.
The already crowded cities were choked with this new influx of wealth seekers. What they
found were long hours, crippling work, and miserly wages. Family life, heretofore the root of all
stability, was virtually destroyed in this environment. Thievery, crimes of violence, and juve-
nile delinquency were the order of the day. All the ills of such a structure, as we see in analo-
gous situations today, overtook the emerging industrial centers.
Little was done to alleviate the growing problems. Indeed the prevailing philosophy of the time
argued against doing anything. In this new age in which statements of laissez-faire were generally
accepted, industrial centers became the spawning grounds for crimes of all kinds. At one time,
counterfeiting was so common that it was estimated that more counterfeit than government-issue
money was in circulation. More than 50 false mints were found in London alone.
The backlash to such a high crime rate was inevitable and predictable. Penalties were
increased to deter potential criminals. At one time, more than 150 capital offenses existed,
ranging from picking pockets to serious crimes of violence. Yet no visible decline in crime
resulted. It was a “society that lacked any effective means of enforcing the criminal laws in gen-
eral. A Draconian code of penalties that proscribed the death penalty for a host of crimes failed
to balance the absence of efficient enforcement machinery.”1
Private citizens resorted to carrying arms for protection, and they continued to band
together to hire special police to protect their homes and businesses.
For a more detailed consideration of the development of security and policing in England
see an introductory text on law enforcement.

Security in the United States


Security practices in the early days of colonial America followed the patterns that colonists had
been familiar with in England. The need for mutual protection in a new and alien land drew
them together in groups much like those of earlier centuries.
As the settlers moved west in Massachusetts, along the Mohawk Valley in New York, and
into central Pennsylvania and Virginia, the need for protection against hostile Indians and
other colonists—French and Spanish—was their principal security interest. Settlements
6 INTRODUCTION TO SECURITY

generally consisted of a central fort or stockade surrounded by the farms of the inhabitants.
If hostilities threatened, an alarm was sounded and the members of the community left
their homes for the protection of the fort, where all able-bodied persons were involved in its
defense. In such circumstances, a semi-military flavor often characterized security measures,
which included guard posts and occasional patrols.
Protection of people and property in established towns again followed English traditions.
Sheriffs were elected as chief security officers in colonial Virginia and Georgia; constables
were appointed in New England. Watchmen were hired to patrol the streets at night. As Private
Security: Report of the Task Force on Private Security notes, “These watchmen remained famil-
iar figures and constituted the primary security measures until the establishment of full-time
police forces in the mid-1800’s.”2
Such watchmen, it should be pointed out, were without training, had no legal author-
ity, were either volunteer or else paid a pittance, and were generally held in low regard—
circumstances that bear a remarkable similarity to observations in the RAND report on
private security in 1971.3

Development of Private Security


The development of police and security forces seems to follow no predictable pattern other
than that such development was traditionally in response to public pressure for action.
Outside of the establishment of night watch patrols in the 17th century, little effort to
establish formal security agencies was made until the beginnings of a police department
were established in New York City in 1783. Detroit followed in 1801, and Cincinnati in 1803.
Chicago established a police department in 1837; San Francisco in 1846; Los Angeles in 1850;
Philadelphia in 1855; and Dallas in 1856.
New York, influenced by the recent success of the police reforms of Sir Robert Peel, adopted
his general principles in 1833. By and large, however, police methods in departments across
the country were rudimentary. Most American police departments of the early 19th century, as
a whole, were inefficient, ill trained, and corrupt.
In addition, the slow development of public law enforcement agencies, both state and fed-
eral, combined with the steady escalation of crime in an increasingly urban and industrialized
society, created security needs that were met by what might be called the first professional pri-
vate security responses in the second half of the 19th century.
In the 1850s Allan Pinkerton (see Figure 1-1), a “copper” (police officers who were identi-
fied by the copper badges they wore) from Scotland, and the Chicago Police Department’s first
detective, established what was to become one of the oldest and largest private security opera-
tions in the United States, Pinkerton. Pinkerton’s North West Police Agency, formed in 1855,
provided security and conducted investigations of crimes for various railroads. Two years later
the Pinkerton Protection Patrol began to offer a private watchman service for railroad yards
and industrial concerns. President Lincoln recognized Pinkerton’s organizational skills and
hired the agency to perform intelligence duties during the Civil War. Pinkerton is also cred-
ited with hiring the first woman to become a detective in this country, well before the women’s
suffrage movement had realized its aims.4
Chapter 1 l Origins and Development of 21st Century Security 7

FIGURE 1-1 Allan Pinkerton, President Lincoln, and Major General John McClellan. (Photographed October 1862,
Antietam, Md. Courtesy of National Archives.)

In 1850 Henry Wells and William Fargo were partners in the American Express Company,
chartered to operate a freight service east of the Mississippi River; by 1852 they had expanded
their operating charter westward as Wells Fargo and Company. Freight transportation was a
dangerous business, and these early companies usually had their own detectives and security
personnel, known as “shotgun riders.”
Washington Perry Brink in Chicago founded Brinks, Inc., in 1859 as a freight and package
delivery service. More than 30 years later, in 1891, he transported his first payroll—the begin-
ning of armored car and courier service. By 1900 Brinks had a fleet of 85 wagons in the field.5
Brinks, Wells Fargo, and Adams Express were the first major firms to offer security for the
transportation of valuables and money.
8 INTRODUCTION TO SECURITY

William J. Burns, a former Secret Service investigator and head of the Bureau of
Investigation (forerunner of the Federal Bureau of Investigation [FBI]), started the William
J. Burns Detective Agency in 1909. It became the sole investigating agency for the American
Bankers’ Association and grew to become the second largest (after Pinkerton) contract guard
and investigative service in the United States. For all intents and purposes, Pinkerton and
Burns were the only national investigative bodies concerned with nonspecialized crimes in the
country until the advent of the FBI.
Another 19th-century pioneer in this field was Edwin Holmes, who offered the first bur-
glar alarm service in the country in 1858. Holmes purchased an alarm system designed by
Augustus Pope. Following Holmes, American District Telegraph (ADT) was founded in 1874.
Both companies installed alarms and provided response to alarm situations as well as main-
taining their own equipment. Baker Industries initiated a fire control and detection equipment
business in 1909.
From the 1870s, only private agencies had provided contract security services to industrial
facilities across the country. In many cases, particularly around the end of the 19th century
and during the Great Depression of the 1930s, the services were, to say the least, controversial.
Both the Battle of Homestead in 1892, during which workers striking that plant were shot and
beaten by security forces, and the strikes in the automobile industry in the middle 1930s are
examples of excesses from overzealous security operatives in relatively recent history.
With few exceptions, proprietary, or in-house, security forces hardly existed before the
defense-related “plant protection” boom of the early 1940s. The impetus for modern private
security effectively began in that decade with the creation of the federal Industrial Security
Program (today named the Defense Industrial Security Program [DISP]), a subordinate com-
mand within the Department of Defense. The National Industrial Security Program (NISP)
is the nominal authority in the United States for managing the needs of private industry to
access classified information. The National Industrial Security Programs’ Operating Manual
(NISPOM/DoD 5220.22-M) today consists of 11 chapters and 3 appendices totaling 141 pages.
The most recent 2006 revisions include The Intelligence Reform and Terrorism Prevention Act
of 2004 and other changes taking effect since September 11, 2001.6

The Beginning of Modern Security


By 1955 security took a major leap forward with the formation of the American Society for
Industrial Security (ASIS). Today the organization is the American Society for Industrial
Security International, reflecting the global emphasis on security operations. For most prac-
titioners, 1955 signifies the beginning of the modern age of security. Before 1955 there were
no professional organizations of note, no certifications, no college programs, and no cohesive
body to advance the interests of the field.
Today’s changed climate for increased security services came as businesses undertook
expanded operations that in turn needed more protection. Retail establishments, hotels, res-
taurants, theaters, warehouses, trucking companies, industrial companies, hospitals, and
Discovering Diverse Content Through
Random Scribd Documents
THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the free


distribution of electronic works, by using or distributing this work (or
any other work associated in any way with the phrase “Project
Gutenberg”), you agree to comply with all the terms of the Full
Project Gutenberg™ License available with this file or online at
www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand, agree
to and accept all the terms of this license and intellectual property
(trademark/copyright) agreement. If you do not agree to abide by all
the terms of this agreement, you must cease using and return or
destroy all copies of Project Gutenberg™ electronic works in your
possession. If you paid a fee for obtaining a copy of or access to a
Project Gutenberg™ electronic work and you do not agree to be
bound by the terms of this agreement, you may obtain a refund
from the person or entity to whom you paid the fee as set forth in
paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only be


used on or associated in any way with an electronic work by people
who agree to be bound by the terms of this agreement. There are a
few things that you can do with most Project Gutenberg™ electronic
works even without complying with the full terms of this agreement.
See paragraph 1.C below. There are a lot of things you can do with
Project Gutenberg™ electronic works if you follow the terms of this
agreement and help preserve free future access to Project
Gutenberg™ electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law
in the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name associated
with the work. You can easily comply with the terms of this
agreement by keeping this work in the same format with its attached
full Project Gutenberg™ License when you share it without charge
with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the
terms of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.

1.E. Unless you have removed all references to Project Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project Gutenberg™
work (any work on which the phrase “Project Gutenberg” appears,
or with which the phrase “Project Gutenberg” is associated) is
accessed, displayed, performed, viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this eBook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is derived


from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is posted


with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning
of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.

1.E.5. Do not copy, display, perform, distribute or redistribute this


electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the Project
Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or
expense to the user, provide a copy, a means of exporting a copy, or
a means of obtaining a copy upon request, of the work in its original
“Plain Vanilla ASCII” or other form. Any alternate format must
include the full Project Gutenberg™ License as specified in
paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or providing


access to or distributing Project Gutenberg™ electronic works
provided that:

• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™


electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for


the “Right of Replacement or Refund” described in paragraph 1.F.3,
the Project Gutenberg Literary Archive Foundation, the owner of the
Project Gutenberg™ trademark, and any other party distributing a
Project Gutenberg™ electronic work under this agreement, disclaim
all liability to you for damages, costs and expenses, including legal
fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR
NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR
BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK
OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL
NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT,
CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF
YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you


discover a defect in this electronic work within 90 days of receiving
it, you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or
entity that provided you with the defective work may elect to provide
a replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.

1.F.4. Except for the limited right of replacement or refund set forth
in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.

1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation,


the trademark owner, any agent or employee of the Foundation,
anyone providing copies of Project Gutenberg™ electronic works in
accordance with this agreement, and any volunteers associated with
the production, promotion and distribution of Project Gutenberg™
electronic works, harmless from all liability, costs and expenses,
including legal fees, that arise directly or indirectly from any of the
following which you do or cause to occur: (a) distribution of this or
any Project Gutenberg™ work, (b) alteration, modification, or
additions or deletions to any Project Gutenberg™ work, and (c) any
Defect you cause.

Section 2. Information about the Mission


of Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-profit
501(c)(3) educational corporation organized under the laws of the
state of Mississippi and granted tax exempt status by the Internal
Revenue Service. The Foundation’s EIN or federal tax identification
number is 64-6221541. Contributions to the Project Gutenberg
Literary Archive Foundation are tax deductible to the full extent
permitted by U.S. federal laws and your state’s laws.

The Foundation’s business office is located at 809 North 1500 West,


Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up
to date contact information can be found at the Foundation’s website
and official page at www.gutenberg.org/contact

Section 4. Information about Donations to


the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission of
increasing the number of public domain and licensed works that can
be freely distributed in machine-readable form accessible by the
widest array of equipment including outdated equipment. Many
small donations ($1 to $5,000) are particularly important to
maintaining tax exempt status with the IRS.

The Foundation is committed to complying with the laws regulating


charities and charitable donations in all 50 states of the United
States. Compliance requirements are not uniform and it takes a
considerable effort, much paperwork and many fees to meet and
keep up with these requirements. We do not solicit donations in
locations where we have not received written confirmation of
compliance. To SEND DONATIONS or determine the status of
compliance for any particular state visit www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states where


we have not met the solicitation requirements, we know of no
prohibition against accepting unsolicited donations from donors in
such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot make


any statements concerning tax treatment of donations received from
outside the United States. U.S. laws alone swamp our small staff.

Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.

Section 5. General Information About


Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could be
freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose network of
volunteer support.
Project Gutenberg™ eBooks are often created from several printed
editions, all of which are confirmed as not protected by copyright in
the U.S. unless a copyright notice is included. Thus, we do not
necessarily keep eBooks in compliance with any particular paper
edition.

Most people start at our website which has the main PG search
facility: www.gutenberg.org.

This website includes information about Project Gutenberg™,


including how to make donations to the Project Gutenberg Literary
Archive Foundation, how to help produce our new eBooks, and how
to subscribe to our email newsletter to hear about new eBooks.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

ebookname.com

You might also like