Search and Find

Book Title

Author/Publisher

Table of Contents

Show eBooks for my device only:

 

Handbook of Loss Prevention and Crime Prevention

Handbook of Loss Prevention and Crime Prevention

of: Lawrence Fennelly

Elsevier Trade Monographs, 2003

ISBN: 9780080495217 , 608 Pages

4. Edition

Format: PDF

Copy protection: DRM

Windows PC,Mac OSX Apple iPad, Android Tablet PC's

Price: 85,95 EUR



More of the content

Handbook of Loss Prevention and Crime Prevention


 

Cover

1

Copyright Page

5

Contents

8

Contributing Authors

14

Preface

16

PART ONE: INTRODUCTION

18

Chapter 1. Risk Assessment and Management

20

PART TWO: LOSS PREVENTION AND CRIME PREVENTION METHODS

24

Chapter 2. Designing Security with the Architects

26

Designing Security with the Architects

26

Designing Security and Layout of Site

27

Building SiteSecurity and Contractors

27

Ironmongery

29

Closed Circuit TV Checklist

30

Card Access ControlChecklist

30

Storage Rooms, Safes, and Vaults Checklist

31

Exterior Lighting Checklist

31

CrimePrevention Awareness Points

32

Appendix 2.A. Model Residential and Commercial BuildingSecurity Ordinance

32

Appendix 2.B. Standards

34

Chapter 3. Security Surveys

36

The Best Time to Conduct the Survey

37

Classification of Survey Recommendations

37

DevelopingSecurity Points

37

Nine Points of Security Concern

38

Personality of the Complex

39

Positive andNegative Aspects of Making Recommendations

39

Crime Analysis

39

Key Control

40

Closed CircuitTelevision

40

Intrusion Alarms

40

Lighting and Security

41

Security SurveyFollow-Up

41

Residential Security

41

Alarms

43

Appendix 3.A. Site Survey and Risk Assessment

46

Appendix 3.B. Physical Security Survey

48

Appendix 3.C. Plant Security Checklist

52

Appendix 3.D.Guard Security Checklist

54

Appendix 3.E. Office Security Checklist

55

Appendix 3.F. Home SecurityChecklist

56

Appendix 3.G. Fire Safety Inspection

58

Chapter 4. Internal Theft Controls

61

Introduction

61

What Is Honesty?

61

The Dishonest Employee

62

Management Responsibility in Loss

64

Program for Internal Security

65

Procedural Controls

67

When Controls Fail

73

Case Study

74

Summary

75

Chapter 5. Executive Protection

76

Rise of Terrorism in the United States

76

Formulating a Protection Plan

77

Threat Assessment

77

Planning

77

Home and Office Survey

77

Procedural Vulnerability

78

Physical Vulnerability

78

Protection in Transit

79

Everyday Security Awareness

80

If an Abduction Occurs

81

Chapter 6. Awareness

83

Awareness and Knowledge Strategies

83

Neighborhood Watch Guidelines

84

How to AvoidBecoming the Victim of an Attacker

85

Safety Checklist for Apartments

86

Robbery Prevention„Tips for Small Business

87

Burglary Prevention„Tips for Small Business

88

Suspicious Situations toReport

90

Vehicle Theft„a Big Problem

90

Safety Skills for Children

92

Street Smarts„How toProtect Oneself

94

The Con Artist

95

Crime Prevention Tips for Senior Citizens

96

Protection fromTelemarketing Fraud

97

Crime Prevention Tips at ATMs

97

Chapter 7. Crime Prevention through Environmental Design Strategies and Applications

99

Crime Prevention through Environmental Design Strategies

99

CPTED Applications

100

Objectives for the Commercial Environment

100

Downtown Streets and Pedestrian Areas.Parking Lots and Structures

101

Office and Industrial Systems

112

Hallways and Restrooms

115

Malls and Shopping Centers

117

Convenience Stores

121

Branch Banks

126

Objectives forthe Residential Environment

127

Objectives for the School Environment

137

Convention Centers andStadiums

147

PART THREE: SECURITY OPERATIONS AND EQUIPMENT

150

Chapter 8. Approaches to Physical Security

152

Levels of Physical Security

152

The Psychology of Maximum Security

155

The Value of Planning

155

Physical Barriers

159

The Security Plan

161

Conclusion

163

Chapter 9. Physical Barriers

165

Doors

165

Roofs

172

Floors

174

Fences

175

Walls and Moats

178

Chapter 10. The Use of Locks in Physical Crime Prevention

182

Lock Terminology and Components

182

Key-Operated Mechanisms

182

Combination Locks

190

Lock Bodies

192

Door Lock Types

193

Strikes

199

Attacks and Countermeasures

200

Locks and the SystemsApproach to Security

210

Key Control

210

A New Standard Set for Exit Devices, Locks, and Alarms

211

Appendix 10.A. Key Control and Lock Security Checklist

212

Appendix 10.B. Terms and Definitionsfor Door and Window Security

213

Chapter 11. Safes, Vaults, and Accessories

224

Choose the Right Container

224

UL-Rated Combination Locks

225

Relocking Devices

225

Locking Dials

226

Lockable Handles

227

Time Locks

227

Time-Delay Combination Locks

227

Alarmed Combination Locks

228

Vision-Restricting and Shielded Dials

228

Combination Changing

228

Safe Burglaries

229

OvercomingSafe-Opening Problems

231

Appendix 11.A. Rating Files, Safes, and Vaults

232

Chapter 12. Security Lighting

235

Illumination

235

Lamps

236

Twenty-Five Things You Need to Know about Lighting

237

Energy Management

238

Lighting Checklist

238

Protective Lighting Checklist

239

Chapter 13. Alarms: Intrusion Detection Systems

240

Components of Alarm Systems

240

Application

247

Alarm Control

247

Alarm Transmission/Signaling

248

Alarms Deter Crime

249

False Alarms

249

Alarm Equipment Overhaul

250

Additional Resources

250

Conclusion

251

Appendix 13.A. Smoke Detectors

251

Chapter 14. CCTV Surveillance

253

Protection of Assets: An Overview

253

History

254

Role of CCTV in Asset Protection

255

CCTV asPart of the Emergency and Disaster Plan

256

Emergency Shutdown and Restoration

257

SecurityInvestigations

258

Safety

258

The Security Officer’s Role

258

Training and Education of Employees

258

Synergythrough Integration

259

CCTV’s Role and Applications

260

Problems Solved by CCTV

261

Choice of Overt orCovert CCT

261

Security Surveillance Applications

261

Safety Applications

262

CCTV Access Control

262

TheBottom Line

262

Appendix 14.A. Glossary

264

Appendix 14.B. Designing Effective CCTV Systems

267

Chapter 15. Guard Service in the Twenty-First Century

270

Liabilities Connected with Guard Force

270

Power and Authority of the Security Guard

271

Training

271

Report Writing

271

Weapons Safety

272

Safety

273

Safety Checklist

273

Bomb Threats

274

Bomb Search

274

Fire Protection

275

Fire Prevention

275

Emergency Medical Assistance

276

Reporting a Medical Case

277

Guard Supervision

277

Conclusion

282

Chapter 16. Bomb and Physical Security Planning

283

Bombs

283

Bomb Threats

283

Why Prepare?

284

How to Prepare

284

Security against Bomb Incidents

284

Responding to Bomb Threats

286

Decision Time

286

Evacuation

287

Search Teams

287

Search Technique

287

When a Suspicious Object Is Located

289

Handling the News Media

289

Summary

289

Appendix 16.A.Suspect Package Alert

290

Appendix 16.B. Bomb Threat Checklist

291

Appendix 16.C. Mail Handlers andSuspicious Mail Procedures

292

PART FOUR: SECURITY AND CRIME PREVENTION APPLICATIONS

294

Chapter 17. Cargo Security: Intermoda/Logistics„The Complete Overview

296

Prevention Plan

297

Pilferage

298

Theft

298

Organized Crime

300

Cargo Package and Movement Controls

301

Trucking Operations

301

Appendix 17.A. Cargo Security Checklist

315

Appendix 17.B. PersonnelSecurity Checklist

320

Appendix 17.C. Physical Security Checklist

323

Appendix 17.D. InspectionReport Forms

324

Appendix 17.E. Documentation

326

Appendix 17.F. The Role of Private Security

328

Chapter 18. Lodging (Hotel/Motel) Security

329

Security Department Structure

329

Size of the Department

330

Reporting Level in the Organization

331

Role of Security

332

Training

334

Theft

336

Opportunities and Trends

339

Legal Issues

342

The Future ofLodging Security

346

Chapter 19. Retail Security: Lessons Learned from Convenience Store Research

347

New Challenges

347

Increase in Crime

347

The Research

349

Research Underway

354

The RecommendedProgram

354

Conclusions

355

Chapter 20. Putting an Extra EYE/IŽon CCTV: Managing Risk in Retail

358

Old Tech to New Tech

358

Rationale for Technology

358

Definition of Interactive

358

How InteractiveMonitoring Reduces Risk

359

How to Evaluate the Service Provider

359

Why Isn’t This Everywhere:Cost versus Availability?

360

How ICCTV Works

360

CCTV versus ICCTV

361

Chapter 21. Perspectives on Safe School Administration

362

Emphasize Crime and Deviance Prevention during Teacher Education

363

Maintain a Sense ofOwnership in School Grounds and the Surrounding Neighborhood

363

Conduct Periodic RiskAssessments or Security Surveys

363

Clearly State Rules and Regulations

363

Conduct a Crime andDeviance Analysis

363

Develop an Incident Mapping System

363

Utilize Parent Volunteers asMonitors and Student Aides

363

Institute After-School Programs

364

Security Considerations ShouldBe Incorporated from the Ground Up.Ž

364

Establish In-Class Communication between Teachersand Administration

364

Institute a Safety and Security Committee

364

Value the Contributions ofCustodial Personnel

364

Train Personnel in Graffiti Interpretation

364

Schools Need Central OfficeSupport

364

Value Aesthetics

365

Foster Students’ Beliefs They Are Connected to the School

365

DoNot Use Student Monitors

365

The Combustible EngineŽ Model of School Communities

365

Createa Crisis Management Plan

365

Train Personnel in Conflict Resolution

365

Implement CharacterEducation Curricula

366

Create Law-Related Education Modules to Be Incorporated in SocialStudies Courses

366

Establish Communities within Schools.Ž

366

Avoid Peer-Group Counseling

366

Instill an Awareness of the Dangers of Terrorism

366

Chapter 22. Campus Security and Crime Prevention

367

Communication

367

Key Elements in a Campus Crime Prevention Program

367

Commitment

368

Cycle of Activity

368

Specific Programs

369

The Campus Security Act of 1990

370

Neighborhood Watch on the the College Campus

371

Phones on Campus

372

Thefts in the Library

372

Bicycle Theft Prevention

372

Administration Office Security Programs

372

Operation Identification

372

Intrusion Alarms

373

Conclusion

373

Chapter 23. Hospitals and the Health-Care Security Environment

374

Categories of Health Care

374

Types of Hospitals

375

The Foundation of Health-Care Security: Risks

375

Basic Health-Care Security Risk and Areas of Vulnerability

375

Chapter 24. Library Security

379

Risk Assessment Terminology

380

Identifying Risks

380

Assessing Likelihood

381

Assessing Consequences

381

Qualifying Risks

382

Managing the Risk

382

The Scope of Security Problems in

383

Security Risk Management Strategies

384

Dealing with Specific Threats

385

Conclusion

386

Security Management Resources

386

Chapter 25. High-Rise Security and Fire Life Safety

387

High-Rise Assets

387

Threats to Security and Fire Life Safety

387

Security of Modern High-Rise

389

Fire Safety of Modern High-Rise Buildings

390

Summary

392

Chapter 26. Multiresidential Security

393

Apartments

394

Condominiums

394

Levels of Security

395

Personnel

395

Physical Security and Hardware

398

Procedures

400

The Elderly

401

Some Special Areas of Vulnerability

401

Disasters

402

Legislation

402

Basic Steps to Remember in Multiresidential Security

403

Chapter 27. Workplace Violence: Anticipation through Process, Not Prediction of Results Revisited

404

Causes and Avoidance of Claims of Inadequate Security

405

Job Applicant

406

Narrowing the Focus of the Workplace Violator Profile

406

Case Studies in Workplace Violence

407

OrganizationalDynamics

409

The TeamŽ Concept and Shared Expectations as an Approach to WorkplaceMotivation

409

Why Dont Subordinates Do What They Are Supposed to Do?Ž

410

Steps to Reducethe Opportunity for Workplace Violence

410

The Predatory Prevention Matrix

410

Process versusOutput, or the Difference between High CrimeŽ and High Profit.Ž

411

Uses of the PredatoryPrevention Matrix

412

An Apartment Case Study

414

The Magic Chair

416

Defense against WorkplaceViolence: Possible or Probable?

416

Chapter 28. Domestic Violence: Everyone’s Problem

419

What Is It

419

Who Are the Victims

420

Why Abusers Abuse

420

What We Do Know

420

Law EnforcementResponse

421

Options for Protection

422

Government Involvement

423

Conclusion

423

Chapter 29. Personal Safety and Self-Defense

424

Introduction

424

Violent Crimes

424

Self-Defense

426

Chapter 30. Designing Crime Risk Management Systems

427

Understanding Crime Risk Management

427

Who Is the Client?

428

The Client-PractitionerRelationship

429

Crime Pattern Analysis

429

Conducting the Security Survey

430

Determination ofProbable Maximum Loss

431

Making Recommendations to Clients

433

Conclusion

434

Chapter 31. Planning, Management, and Evaluation

435

The Concepts Defined

435

Statistical Information: The Backbone for Design of a PreventionProgram

437

Crime Statistics

437

Demographic Data

440

Efficiency Analysis: Measuring Activity

441

Effectiveness Analysis: Measuring Program Impact

442

Attitudinal Analysis: Gathering Opinionson the Program Impact

443

A Strategy to Facilitate Implementation of the Evaluation

444

Chapter 32. Financial Institution Security

448

The Bank Protection Act of 1968

448

The Role of the Security Department

450

Current RisksAffecting Financial Institutions

450

Criminal Reporting

454

Bank Security Devices

455

Security Trainingin Financial Institutions

456

Other Federal Regulations with an Impact on Banking

457

Critical Issuesin Financial Institution Security

458

Chapter 33. Automatic Teller Machines (ATMs)

459

Responsibility of an ATM Owner

459

Case Study from Ann Arbor Police Department: LawEnforcement and ATM Safety

459

Ann Arbor, Michigan’s Guidelines for Automatic Teller Machines User Safety

460

Appendix 33.A.ATM Safety Tips

462

Appendix 33.B.ATM SafetyChecklist

463

Chapter 34. Telecommunications Fraud

464

How Does It Happen?

464

How to Find Out

464

How to Reduce Vulnerability

465

How to Stop It

465

Chapter 35. Electronic Surveillance and Wiretapping

466

Countermeasures

467

Economic Espionage Act of 1996

468

Chapter 36. Safety Websites

470

Introduction

470

Safety Websites

470

Chapter 37. Homeland Security

471

Gov. Ridge Announces Homeland Security Advisory System

471

National Framework for Federal,State, and Local Governments, Private Industry, and the Public

471

Factors for Assignment ofThreat Conditions. Unified System for Public Announcements

471

A Tool to Combat Terrorism.Homeland Security in 2002

472

HITS and IFPO Computer-Based and Web-Based Security OfficerTraining

472

Final Comments

473

Chapter 38. Security of Information Systems

474

Conclusion

476

Security Organizations

477

Chapter 39. Counterespionage and Information Security Management

478

Reasons for Attacking Computers

478

Methods of Attacking Computer Systems

479

Methods ofDefense

479

Roots of Industrial Espionage

479

Historic Attacks on Computers and Networks

480

RecentLawsuits

480

Covert Action

481

Theft

481

Other Causes of Information Loss

481

Why People StealInformation

482

Types of Attacks

482

Espionage Methods

482

Rogue Use

483

Competitive Intelligence

483

Human Error

483

The WAECUP Human Factors Protocol

484

Human Factor Training Practices

485

Electronic Surveillance and Countermeasures

485

Telecommuting

487

Wireless Mike Dangers: AnExample

488

Computer Passwords

488

Current Security Issues

488

Host-Based Perimeter Defense

489

EMail

490

Local Area Network

491

Radio Links

492

Encryption

492

Investigations

494

Trade Secrets

496

Chapter 40. Emergency Management

498

Crisis, Disaster, Catastrophe„Are You Ready?

498

The Emergency Management Plan Is Only asGood as the Last Drill

500

Chapter 41. The Security Professional, Terrorism, Bio-Terrorism, and the Next Level

504

The Security Professional and Terrorism

504

Terrorism and the Terrorist

505

UnderstandingTerrorism

506

Terrorist Groups and Organizational Structure

507

Mechanism of Violence andAssociated Risk Factors

508

Assessing Threats from Terrorism and Developing EffectiveCountermeasures

508

The Security Manager’s Responsibilities

518

Conclusion

519

Index

521