Search and Find
Service
Cover
1
Copyright Page
5
Contents
8
Contributing Authors
14
Preface
16
PART ONE: INTRODUCTION
18
Chapter 1. Risk Assessment and Management
20
PART TWO: LOSS PREVENTION AND CRIME PREVENTION METHODS
24
Chapter 2. Designing Security with the Architects
26
Designing Security with the Architects
26
Designing Security and Layout of Site
27
Building SiteSecurity and Contractors
27
Ironmongery
29
Closed Circuit TV Checklist
30
Card Access ControlChecklist
30
Storage Rooms, Safes, and Vaults Checklist
31
Exterior Lighting Checklist
31
CrimePrevention Awareness Points
32
Appendix 2.A. Model Residential and Commercial BuildingSecurity Ordinance
32
Appendix 2.B. Standards
34
Chapter 3. Security Surveys
36
The Best Time to Conduct the Survey
37
Classification of Survey Recommendations
37
DevelopingSecurity Points
37
Nine Points of Security Concern
38
Personality of the Complex
39
Positive andNegative Aspects of Making Recommendations
39
Crime Analysis
39
Key Control
40
Closed CircuitTelevision
40
Intrusion Alarms
40
Lighting and Security
41
Security SurveyFollow-Up
41
Residential Security
41
Alarms
43
Appendix 3.A. Site Survey and Risk Assessment
46
Appendix 3.B. Physical Security Survey
48
Appendix 3.C. Plant Security Checklist
52
Appendix 3.D.Guard Security Checklist
54
Appendix 3.E. Office Security Checklist
55
Appendix 3.F. Home SecurityChecklist
56
Appendix 3.G. Fire Safety Inspection
58
Chapter 4. Internal Theft Controls
61
Introduction
61
What Is Honesty?
61
The Dishonest Employee
62
Management Responsibility in Loss
64
Program for Internal Security
65
Procedural Controls
67
When Controls Fail
73
Case Study
74
Summary
75
Chapter 5. Executive Protection
76
Rise of Terrorism in the United States
76
Formulating a Protection Plan
77
Threat Assessment
77
Planning
77
Home and Office Survey
77
Procedural Vulnerability
78
Physical Vulnerability
78
Protection in Transit
79
Everyday Security Awareness
80
If an Abduction Occurs
81
Chapter 6. Awareness
83
Awareness and Knowledge Strategies
83
Neighborhood Watch Guidelines
84
How to AvoidBecoming the Victim of an Attacker
85
Safety Checklist for Apartments
86
Robbery Prevention„Tips for Small Business
87
Burglary Prevention„Tips for Small Business
88
Suspicious Situations toReport
90
Vehicle Theft„a Big Problem
90
Safety Skills for Children
92
Street Smarts„How toProtect Oneself
94
The Con Artist
95
Crime Prevention Tips for Senior Citizens
96
Protection fromTelemarketing Fraud
97
Crime Prevention Tips at ATMs
97
Chapter 7. Crime Prevention through Environmental Design Strategies and Applications
99
Crime Prevention through Environmental Design Strategies
99
CPTED Applications
100
Objectives for the Commercial Environment
100
Downtown Streets and Pedestrian Areas.Parking Lots and Structures
101
Office and Industrial Systems
112
Hallways and Restrooms
115
Malls and Shopping Centers
117
Convenience Stores
121
Branch Banks
126
Objectives forthe Residential Environment
127
Objectives for the School Environment
137
Convention Centers andStadiums
147
PART THREE: SECURITY OPERATIONS AND EQUIPMENT
150
Chapter 8. Approaches to Physical Security
152
Levels of Physical Security
152
The Psychology of Maximum Security
155
The Value of Planning
155
Physical Barriers
159
The Security Plan
161
Conclusion
163
Chapter 9. Physical Barriers
165
Doors
165
Roofs
172
Floors
174
Fences
175
Walls and Moats
178
Chapter 10. The Use of Locks in Physical Crime Prevention
182
Lock Terminology and Components
182
Key-Operated Mechanisms
182
Combination Locks
190
Lock Bodies
192
Door Lock Types
193
Strikes
199
Attacks and Countermeasures
200
Locks and the SystemsApproach to Security
210
Key Control
210
A New Standard Set for Exit Devices, Locks, and Alarms
211
Appendix 10.A. Key Control and Lock Security Checklist
212
Appendix 10.B. Terms and Definitionsfor Door and Window Security
213
Chapter 11. Safes, Vaults, and Accessories
224
Choose the Right Container
224
UL-Rated Combination Locks
225
Relocking Devices
225
Locking Dials
226
Lockable Handles
227
Time Locks
227
Time-Delay Combination Locks
227
Alarmed Combination Locks
228
Vision-Restricting and Shielded Dials
228
Combination Changing
228
Safe Burglaries
229
OvercomingSafe-Opening Problems
231
Appendix 11.A. Rating Files, Safes, and Vaults
232
Chapter 12. Security Lighting
235
Illumination
235
Lamps
236
Twenty-Five Things You Need to Know about Lighting
237
Energy Management
238
Lighting Checklist
238
Protective Lighting Checklist
239
Chapter 13. Alarms: Intrusion Detection Systems
240
Components of Alarm Systems
240
Application
247
Alarm Control
247
Alarm Transmission/Signaling
248
Alarms Deter Crime
249
False Alarms
249
Alarm Equipment Overhaul
250
Additional Resources
250
Conclusion
251
Appendix 13.A. Smoke Detectors
251
Chapter 14. CCTV Surveillance
253
Protection of Assets: An Overview
253
History
254
Role of CCTV in Asset Protection
255
CCTV asPart of the Emergency and Disaster Plan
256
Emergency Shutdown and Restoration
257
SecurityInvestigations
258
Safety
258
The Security Officer’s Role
258
Training and Education of Employees
258
Synergythrough Integration
259
CCTV’s Role and Applications
260
Problems Solved by CCTV
261
Choice of Overt orCovert CCT
261
Security Surveillance Applications
261
Safety Applications
262
CCTV Access Control
262
TheBottom Line
262
Appendix 14.A. Glossary
264
Appendix 14.B. Designing Effective CCTV Systems
267
Chapter 15. Guard Service in the Twenty-First Century
270
Liabilities Connected with Guard Force
270
Power and Authority of the Security Guard
271
Training
271
Report Writing
271
Weapons Safety
272
Safety
273
Safety Checklist
273
Bomb Threats
274
Bomb Search
274
Fire Protection
275
Fire Prevention
275
Emergency Medical Assistance
276
Reporting a Medical Case
277
Guard Supervision
277
Conclusion
282
Chapter 16. Bomb and Physical Security Planning
283
Bombs
283
Bomb Threats
283
Why Prepare?
284
How to Prepare
284
Security against Bomb Incidents
284
Responding to Bomb Threats
286
Decision Time
286
Evacuation
287
Search Teams
287
Search Technique
287
When a Suspicious Object Is Located
289
Handling the News Media
289
Summary
289
Appendix 16.A.Suspect Package Alert
290
Appendix 16.B. Bomb Threat Checklist
291
Appendix 16.C. Mail Handlers andSuspicious Mail Procedures
292
PART FOUR: SECURITY AND CRIME PREVENTION APPLICATIONS
294
Chapter 17. Cargo Security: Intermoda/Logistics„The Complete Overview
296
Prevention Plan
297
Pilferage
298
Theft
298
Organized Crime
300
Cargo Package and Movement Controls
301
Trucking Operations
301
Appendix 17.A. Cargo Security Checklist
315
Appendix 17.B. PersonnelSecurity Checklist
320
Appendix 17.C. Physical Security Checklist
323
Appendix 17.D. InspectionReport Forms
324
Appendix 17.E. Documentation
326
Appendix 17.F. The Role of Private Security
328
Chapter 18. Lodging (Hotel/Motel) Security
329
Security Department Structure
329
Size of the Department
330
Reporting Level in the Organization
331
Role of Security
332
Training
334
Theft
336
Opportunities and Trends
339
Legal Issues
342
The Future ofLodging Security
346
Chapter 19. Retail Security: Lessons Learned from Convenience Store Research
347
New Challenges
347
Increase in Crime
347
The Research
349
Research Underway
354
The RecommendedProgram
354
Conclusions
355
Chapter 20. Putting an Extra EYE/IŽon CCTV: Managing Risk in Retail
358
Old Tech to New Tech
358
Rationale for Technology
358
Definition of Interactive
358
How InteractiveMonitoring Reduces Risk
359
How to Evaluate the Service Provider
359
Why Isn’t This Everywhere:Cost versus Availability?
360
How ICCTV Works
360
CCTV versus ICCTV
361
Chapter 21. Perspectives on Safe School Administration
362
Emphasize Crime and Deviance Prevention during Teacher Education
363
Maintain a Sense ofOwnership in School Grounds and the Surrounding Neighborhood
363
Conduct Periodic RiskAssessments or Security Surveys
363
Clearly State Rules and Regulations
363
Conduct a Crime andDeviance Analysis
363
Develop an Incident Mapping System
363
Utilize Parent Volunteers asMonitors and Student Aides
363
Institute After-School Programs
364
Security Considerations ShouldBe Incorporated from the Ground Up.Ž
364
Establish In-Class Communication between Teachersand Administration
364
Institute a Safety and Security Committee
364
Value the Contributions ofCustodial Personnel
364
Train Personnel in Graffiti Interpretation
364
Schools Need Central OfficeSupport
364
Value Aesthetics
365
Foster Students’ Beliefs They Are Connected to the School
365
DoNot Use Student Monitors
365
The Combustible EngineŽ Model of School Communities
365
Createa Crisis Management Plan
365
Train Personnel in Conflict Resolution
365
Implement CharacterEducation Curricula
366
Create Law-Related Education Modules to Be Incorporated in SocialStudies Courses
366
Establish Communities within Schools.Ž
366
Avoid Peer-Group Counseling
366
Instill an Awareness of the Dangers of Terrorism
366
Chapter 22. Campus Security and Crime Prevention
367
Communication
367
Key Elements in a Campus Crime Prevention Program
367
Commitment
368
Cycle of Activity
368
Specific Programs
369
The Campus Security Act of 1990
370
Neighborhood Watch on the the College Campus
371
Phones on Campus
372
Thefts in the Library
372
Bicycle Theft Prevention
372
Administration Office Security Programs
372
Operation Identification
372
Intrusion Alarms
373
Conclusion
373
Chapter 23. Hospitals and the Health-Care Security Environment
374
Categories of Health Care
374
Types of Hospitals
375
The Foundation of Health-Care Security: Risks
375
Basic Health-Care Security Risk and Areas of Vulnerability
375
Chapter 24. Library Security
379
Risk Assessment Terminology
380
Identifying Risks
380
Assessing Likelihood
381
Assessing Consequences
381
Qualifying Risks
382
Managing the Risk
382
The Scope of Security Problems in
383
Security Risk Management Strategies
384
Dealing with Specific Threats
385
Conclusion
386
Security Management Resources
386
Chapter 25. High-Rise Security and Fire Life Safety
387
High-Rise Assets
387
Threats to Security and Fire Life Safety
387
Security of Modern High-Rise
389
Fire Safety of Modern High-Rise Buildings
390
Summary
392
Chapter 26. Multiresidential Security
393
Apartments
394
Condominiums
394
Levels of Security
395
Personnel
395
Physical Security and Hardware
398
Procedures
400
The Elderly
401
Some Special Areas of Vulnerability
401
Disasters
402
Legislation
402
Basic Steps to Remember in Multiresidential Security
403
Chapter 27. Workplace Violence: Anticipation through Process, Not Prediction of Results Revisited
404
Causes and Avoidance of Claims of Inadequate Security
405
Job Applicant
406
Narrowing the Focus of the Workplace Violator Profile
406
Case Studies in Workplace Violence
407
OrganizationalDynamics
409
The TeamŽ Concept and Shared Expectations as an Approach to WorkplaceMotivation
409
Why Dont Subordinates Do What They Are Supposed to Do?Ž
410
Steps to Reducethe Opportunity for Workplace Violence
410
The Predatory Prevention Matrix
410
Process versusOutput, or the Difference between High CrimeŽ and High Profit.Ž
411
Uses of the PredatoryPrevention Matrix
412
An Apartment Case Study
414
The Magic Chair
416
Defense against WorkplaceViolence: Possible or Probable?
416
Chapter 28. Domestic Violence: Everyone’s Problem
419
What Is It
419
Who Are the Victims
420
Why Abusers Abuse
420
What We Do Know
420
Law EnforcementResponse
421
Options for Protection
422
Government Involvement
423
Conclusion
423
Chapter 29. Personal Safety and Self-Defense
424
Introduction
424
Violent Crimes
424
Self-Defense
426
Chapter 30. Designing Crime Risk Management Systems
427
Understanding Crime Risk Management
427
Who Is the Client?
428
The Client-PractitionerRelationship
429
Crime Pattern Analysis
429
Conducting the Security Survey
430
Determination ofProbable Maximum Loss
431
Making Recommendations to Clients
433
Conclusion
434
Chapter 31. Planning, Management, and Evaluation
435
The Concepts Defined
435
Statistical Information: The Backbone for Design of a PreventionProgram
437
Crime Statistics
437
Demographic Data
440
Efficiency Analysis: Measuring Activity
441
Effectiveness Analysis: Measuring Program Impact
442
Attitudinal Analysis: Gathering Opinionson the Program Impact
443
A Strategy to Facilitate Implementation of the Evaluation
444
Chapter 32. Financial Institution Security
448
The Bank Protection Act of 1968
448
The Role of the Security Department
450
Current RisksAffecting Financial Institutions
450
Criminal Reporting
454
Bank Security Devices
455
Security Trainingin Financial Institutions
456
Other Federal Regulations with an Impact on Banking
457
Critical Issuesin Financial Institution Security
458
Chapter 33. Automatic Teller Machines (ATMs)
459
Responsibility of an ATM Owner
459
Case Study from Ann Arbor Police Department: LawEnforcement and ATM Safety
459
Ann Arbor, Michigan’s Guidelines for Automatic Teller Machines User Safety
460
Appendix 33.A.ATM Safety Tips
462
Appendix 33.B.ATM SafetyChecklist
463
Chapter 34. Telecommunications Fraud
464
How Does It Happen?
464
How to Find Out
464
How to Reduce Vulnerability
465
How to Stop It
465
Chapter 35. Electronic Surveillance and Wiretapping
466
Countermeasures
467
Economic Espionage Act of 1996
468
Chapter 36. Safety Websites
470
Introduction
470
Safety Websites
470
Chapter 37. Homeland Security
471
Gov. Ridge Announces Homeland Security Advisory System
471
National Framework for Federal,State, and Local Governments, Private Industry, and the Public
471
Factors for Assignment ofThreat Conditions. Unified System for Public Announcements
471
A Tool to Combat Terrorism.Homeland Security in 2002
472
HITS and IFPO Computer-Based and Web-Based Security OfficerTraining
472
Final Comments
473
Chapter 38. Security of Information Systems
474
Conclusion
476
Security Organizations
477
Chapter 39. Counterespionage and Information Security Management
478
Reasons for Attacking Computers
478
Methods of Attacking Computer Systems
479
Methods ofDefense
479
Roots of Industrial Espionage
479
Historic Attacks on Computers and Networks
480
RecentLawsuits
480
Covert Action
481
Theft
481
Other Causes of Information Loss
481
Why People StealInformation
482
Types of Attacks
482
Espionage Methods
482
Rogue Use
483
Competitive Intelligence
483
Human Error
483
The WAECUP Human Factors Protocol
484
Human Factor Training Practices
485
Electronic Surveillance and Countermeasures
485
Telecommuting
487
Wireless Mike Dangers: AnExample
488
Computer Passwords
488
Current Security Issues
488
Host-Based Perimeter Defense
489
EMail
490
Local Area Network
491
Radio Links
492
Encryption
492
Investigations
494
Trade Secrets
496
Chapter 40. Emergency Management
498
Crisis, Disaster, Catastrophe„Are You Ready?
498
The Emergency Management Plan Is Only asGood as the Last Drill
500
Chapter 41. The Security Professional, Terrorism, Bio-Terrorism, and the Next Level
504
The Security Professional and Terrorism
504
Terrorism and the Terrorist
505
UnderstandingTerrorism
506
Terrorist Groups and Organizational Structure
507
Mechanism of Violence andAssociated Risk Factors
508
Assessing Threats from Terrorism and Developing EffectiveCountermeasures
508
The Security Manager’s Responsibilities
518
Conclusion
519
Index
521
All prices incl. VAT