Siêu thị PDFTải ngay đi em, trời tối mất

Thư viện tri thức trực tuyến

Kho tài liệu với 50,000+ tài liệu học thuật

© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Private Security
PREMIUM
Số trang
817
Kích thước
153.0 MB
Định dạng
PDF
Lượt xem
859

Private Security

Nội dung xem thử

Mô tả chi tiết

Private Security

An Introduction to Principles and Practice

Charles P. Nemeth

CRC Press

Taylor & Francis Group

6000 Broken Sound Parkway NW, Suite 300

Boca Raton, FL 33487-2742

© 2018 by Taylor & Francis Group, LLC

CRC Press is an imprint of Taylor & Francis Group, an Informa business

No claim to original U.S. Government works

Printed on acid-free paper

International Standard Book Number-13: 978-1-4987-2334-3 (Hardback)

This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reli￾able data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences

of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and

apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowl￾edged please write and let us know so we may rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by

any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in

any information storage or retrieval system, without written permission from the publishers.

For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.copyright.com/)

or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit

organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by

the CCC, a separate system of payment has been arranged.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and

explanation without intent to infringe.

Library of Congress Cataloging-in-Publication Data

Names: Nemeth, Charles P., 1951- author.

Title: Private security : an introduction to principles and practice / by

Charles P. Nemeth.

Description: Boca Raton : CRC Press, [2018] | Includes bibliographical

references and index.

Identifiers: LCCN 2017025019| ISBN 9781498723343 (hardback : alk. paper) |

ISBN 9781315157191 (ebook)

Subjects: LCSH: Private security services.

Classification: LCC HV8290 .N43 2018 | DDC 363.28/9--dc23

LC record available at https://lccn.loc.gov/2017025019

Visit the Taylor & Francis Web site at

http://www.taylorandfrancis.com

and the CRC Press Web site at

http://www.crcpress.com

To Mary Claire Nemeth—my youngest daughter—an artist who produces beauty. Soon to finish her MFA and make

her artistic mark in a world desperate for creative work that is not only a wonder to gaze upon but more importantly

uplifts and brings joy to those who encounter it.

To St. Thomas Aquinas No man is so wise as to be able to take account of every single case; wherefore he is

not able sufficiently to express in words all those things that are suitable for the end he has in view. And even if

a lawgiver were able to take all the cases into consideration, he ought not to mention them all, in order to avoid

confusion: but should frame the law according to that which is of most common occurrence.

Summa Theologica at I–II, Question 96, Reply Objection 3

v

Contents

Preface: Introduction to Security xiii

Acknowledgments xvii

About the Author xix

1 Security origins and development 1

1.1 Introduction 1

1.2 Security from ancient times 2

1.3 Private security in England 4

1.3.1 Middle ages 4

1.3.2 Eighteenth-century England and the rise of formal policing 6

1.3.3 Nineteenth-century England and the Peelian revolution 9

1.4 Private security in the United States 10

1.4.1 Railroads, commerce, and the railroad police 12

1.4.2 Industrialization, the labor movement, and Pinkertons 13

1.4.3 Private security and the expansion of the American West 14

1.4.4 Private security and World War II 15

1.5 The contemporary state of private security 16

1.6 Classifications and functions of the private security industry 19

1.6.1 Unarmed officers 21

1.6.2 Alarm companies 21

1.6.3 Private investigators 21

1.6.4 Campus law enforcement and educational institutions 21

1.6.5 Retail/industrial 21

1.7 Ethical issues endemic to the security industry 21

1.8 Conclusion 25

Keywords 26

Discussion questions 26

2 Concept, context, and definition: Security 27

2.1 Security in concept and definition 27

2.2 Security, terror, and homeland defense 30

2.3 Security: The balance of rightful demonstration and threat 32

2.3.1 Security: The challenge of domestic terrorism—Pre-9/11 33

2.3.2 Security: The challenge of international terrorism—Pre-9/11 34

2.4 Security: The challenge of 9/11 and homeland defense 35

2.5 Formalizing security in the homeland: Law, legislation, and executive decree 38

2.5.1 Executive Order 13228: The origin of DHS 39

2.5.2 Executive Order 12231: Protection of infrastructure 39

2.5.3 Executive Order 13493 of January 22, 2009 39

2.5.4 Executive Order 13567 of March 7, 2011 43

2.5.5 Executive Order 13691 of February 13, 2015: Promoting private sector cybersecurity

information sharing 43

2.5.6 Homeland Security Act of 2002 44

2.5.6.1 The Homeland Security Act and Posse Comitatus 45

2.5.7 USA Patriot Act 46

2.5.8 Specialized laws 47

2.5.8.1 The REAL ID program 47

2.5.8.2 Office of Biometric Identity Management 50

vi Contents

2.5.8.3 Chemical facilities 51

2.5.8.4 The SAFETY Act 51

2.6 Academic and training programs in homeland security 52

2.6.1 Office of Grants and Training 52

2.6.2 Center for Domestic Preparedness 54

2.6.3 Emergency Management Institute 54

2.6.4 The academic discipline of security management, security studies, and homeland security 55

2.7 The private sector and homeland security 57

2.8 Conclusion 63

Keywords 64

Discussion questions 64

3 Private security, public policing, and occupational roles 65

3.1 Introduction 65

3.2 Private versus public policing: A comparative analysis 65

3.3 Defining private security by career role and occupations 76

3.3.1 Guard companies/security agency and security firm 78

3.3.2 Guards and private patrol officers 78

3.3.3 Private investigators and detectives 78

3.3.4 Alarm services: Business and residential 81

3.3.5 Armed couriers 81

3.3.6 Loss prevention specialist 82

3.3.7 College/university and school security 86

3.3.8 Federal law enforcement and security 96

3.3.9 Moonlighting and merger: The public/private connection 97

3.4 Security education, training, certification, and regulations 100

3.4.1 Education and training standards 102

3.4.1.1 Minimum training standards for armed security officers 107

3.4.2 Licensing, regulatory, and hiring standards 110

3.4.2.1 Unarmed security officer training requirements 112

3.4.2.2 Armed security officer training requirements 112

3.4.3 Educational certifications and the private security industry 117

3.5 Conclusion 120

Keywords 121

Discussion Questions 121

4 Private security industry, organizational structure, and definition 123

4.1 Introduction 123

4.2 Individualized services in private security 124

4.3 Contract security services 127

4.4 Proprietary security services 132

4.5 Corporate security services and settings 133

4.5.1 Structure and hierarchy in the corporate security office 136

4.5.2 Professional role and duties of the CSO 137

4.6 Conclusion 138

Keywords 140

Discussion questions 141

5 Private security and the law 143

5.1 Introduction: Industry growth and the legal implications 143

5.2 Civil liability and the private security industry 145

5.2.1 Intentional torts 146

5.2.2 Negligence 148

5.2.2.1 Nature of duty 149

5.2.2.2 Duty and foreseeability 150

Contents vii

5.2.3 Negligence, personnel, and the security manager/director 152

5.2.3.1 Negligent retention 152

5.2.3.2 Negligent assignment and entrustment 153

5.2.3.3 Negligent supervision 155

5.2.3.4 Negligent training 157

5.2.4 Strict liability torts 158

5.2.4.1 Negligence and vicarious liability 159

5.3 Criminal liability and the private security industry 161

5.3.1 Criminal liability under the federal civil rights acts 161

5.3.2 Criminal liability and the regulatory process 162

5.3.3 Criminal acts: Felonies and misdemeanors by security professionals 163

5.3.3.1 Assault 166

5.3.3.2 Arson 167

5.3.3.3 Burglary 168

5.3.3.4 Robbery 169

5.3.3.5 Theft or larceny 169

5.3.3.6 Theft by deception/false pretenses 170

5.3.3.7 Theft by extortion 170

5.3.3.8 Theft of property lost, mislaid, or delivered by mistake 171

5.3.3.9 Receiving stolen property 171

5.3.3.10 Theft of services 171

5.3.3.11 Retail theft 171

5.3.3.12 Related property offenses: Fraudulent behavior 172

5.3.3.13 Forgery 172

5.3.3.14 Simulating objects of antiquity or rarity 173

5.3.3.15 Fraudulent destruction, removal, or concealment of recordable

instruments or their tampering 173

5.3.3.16 Bad check and credit card violations 173

5.3.4 Defenses to criminal acts: Protection of self, third parties, and property 174

5.3.4.1 Personal self-defense and the proportionate use of force 174

5.3.4.2 Protection of other persons 175

5.3.4.3 Defense of property 176

5.4 Legal challenges to private security safe harbor 177

5.4.1 Platinum platter doctrine 180

5.4.2 Private action as state action 181

5.4.3 Public function of private security 183

5.4.4 Color of state law: A legislative remedy 184

5.4.5 Private security and Miranda warnings 186

5.4.6 The law of citizen’s arrest: The private security standard 187

5.4.6.1 Time of the arrest 188

5.4.6.2 Presence and commission 188

5.5 Conclusion 190

Keywords 190

Discussion questions 191

6 Risk management 193

6.1 Introduction 193

6.2 Risk management 195

6.2.1 Nature of risk 196

6.2.2 Risk assessment 197

6.3 Various risk assessment tools 199

6.3.1 CARVER + Shock assessment tool 200

6.3.2 Threat assessment 203

6.3.2.1 Preincident indicators: A tool for threat assessment 207

viii Contents

6.4 Threats and hazards 209

6.4.1 Evolutionary concept of threat and hazard 209

6.4.2 Weapons of mass destruction 212

6.4.2.1 Nuclear 213

6.4.2.2 Radiological 217

6.4.2.3 Biological 218

6.4.2.4 Chemical 222

6.4.2.5 Improvised explosive devices 223

6.5 Computer security and risks to the information infrastructure 226

6.6 Conclusion 229

Keywords 229

Discussion questions 230

7 Physical security 231

7.1 Introduction: The physical nature of security 231

7.2 Physical security: Exterior applications 232

7.2.1 Perimeter security measures 237

7.2.2 Perimeter design and planning 240

7.2.2.1 Bollards 240

7.2.2.2 Fencing 241

7.3 Physical security: Interior applications 247

7.3.1 Doors 247

7.3.2 Access control 251

7.3.2.1 Keys 251

7.3.2.2 Keypad entry 253

7.3.2.3 Access control by alternative keyless systems 253

7.3.2.4 Access control by sensor detection 258

7.4 Video surveillance 259

7.4.1 What are the steps of surveillance? 260

7.4.2 What is the exact objective of surveillance? 260

7.4.3 Where is the location of surveillance? 261

7.4.4 When will surveillance occur? 261

7.4.5 Who or what will be surveilled? 261

7.4.6 Surveillance equipment 261

7.4.6.1 CCTV equipment 261

7.4.6.2 Photographic/video equipment 264

7.5 Physical security and CPTED 265

7.6 Conclusion 270

Keywords 271

Discussion questions 271

8 Security: Human resources and personnel 273

8.1 Private security industry: Protection of people 273

8.2 Preemployment screening and background checks 276

8.2.1 General recommendations on background and employment investigations 276

8.2.2 Background issues 279

8.2.2.1 Establishing identity 279

8.2.2.2 Employment history 280

8.2.2.3 Credit history 284

8.2.3 Additional methods of background investigation 289

8.2.3.1 References for character, competency, and reputation 289

8.2.3.2 Testing and consultative services 293

8.2.3.3 Polygraph and lie detector technology 295

8.3 Executive protection 296

Contents ix

8.4 Special security problems in the workplace environment 308

8.4.1 Harassment in its various forms 313

8.4.2 Stalking 316

8.4.3 Protection from abuse/domestic/spousal abuse 316

8.4.4 Hate crimes and the workplace 318

8.4.5 Terroristic threats 320

8.4.6 Assault: From simple to aggravated 323

8.4.6.1 Assault 323

8.4.6.2 Simple assault 323

8.4.6.3 Aggravated assault 324

8.4.6.4 Mayhem 324

8.5 Active shooter programs for the private security industry 325

8.6 Conclusion 331

Keywords 332

Discussion questions 332

9 Investigations and investigative reporting for the security professional 333

9.1 Introduction 333

9.2 Essential investigative characteristics for the security professional 333

9.2.1 Objectivity and investigative practice 334

9.2.2 Logic and investigative practice 335

9.2.3 Perseverance, diligence, and investigative practice 338

9.2.4 Human relations skills and investigative practice 340

9.3 Private police investigative practice as compared to public police 344

9.3.1 Investigative practice and protocols for private security: Distinct legal dimensions 347

9.4 Investigations and investigative procedure 348

9.4.1 Types of investigations in the security industry 353

9.5 Private security and investigative applications 355

9.5.1 Theft by shoplifting 355

9.5.1.1 Rationalizations and justifications for shoplifting 356

9.5.1.2 Shoplifting methods 358

9.5.1.3 Practice suggestions: Forms to detect and report shoplifting 361

9.5.2 Theft by employees 363

9.5.2.1 Reasons and rationales for employee theft 364

9.5.2.2 Employee theft tactics 365

9.5.2.3 Investigating internal theft 366

9.5.2.4 Employee theft tests and protocols 367

9.5.3 Theft by burglary 374

9.5.4 Theft by fraud in insurance cases 376

9.5.4.1 Fraudulent property claims in arson 377

9.5.4.2 Theft by fraud in workers’ compensation 379

9.5.4.3 Theft and fraud in disability claims 389

9.5.4.4 Theft and fraud in auto liability claims 390

9.6 Reporting and memorializing the investigative method 404

9.7 Conclusion 406

Keywords 406

Discussion Questions 407

10 Crisis planning and prevention of accidents, emergencies, and disasters 409

10.1 Introduction 409

10.2 Private security industry: Occupational safety and health—OSHA 413

10.3 Private security industry: Accidents and emergencies 417

10.4 Emergencies in the workplace 422

10.5 Fire protection and life safety 426

x Contents

10.6 Private security industry: Hazmat and WMD 434

10.6.1 Weapons of mass destruction 440

10.6.1.1 Nuclear 442

10.6.1.2 Radiological 442

10.6.1.3 Biological 444

10.6.1.4 Chemical 448

10.6.1.5 Bomb threats 451

10.7 Natural disasters 455

10.8 Pandemic threats 461

10.8.1 Infectious diseases 465

10.9 Emergency crisis management and response 467

10.9.1 National Response Framework 476

10.9.2 Continuity and resiliency and the security industry 478

10.9.3 Evacuation plan 480

10.10 Conclusion 481

Keywords 482

Discussion questions 485

11 Critical infrastructure security 489

11.1 The critical infrastructure and the private security industry 489

11.2 Critical infrastructure: Transportation 492

11.2.1 Cargo and port security 492

11.2.1.1 Secure Freight Initiative 494

11.2.1.2 Container Security Initiative 494

11.2.1.3 Container inspection 496

11.2.1.4 Vessel inspection 498

11.2.1.5 Customs Trade Partnership against Terrorism 500

11.2.1.6 Automated Commercial Environment 501

11.2.2 Airline transportation: A short history 504

11.2.2.1 Transportation Security Agency 505

11.2.2.2 Private security industry and the Screening Partnership Program 510

11.2.3 Rail and mass transit 511

11.2.3.1 Private security for rail and transit 515

11.2.3.2 Amtrak: The National Passenger Rail Corporation 517

11.2.3.3 CSX: The freight line 518

11.2.3.4 Southeastern Pennsylvania Transit Authority: Rail mass transit 521

11.3 Critical infrastructure: Food, agriculture, and water 522

11.3.1 Strategic Partnership Program on Agroterrorism 529

11.3.2 Water 533

11.4 Critical infrastructure: Energy 537

11.5 Critical infrastructure: Nuclear 545

11.6 Critical infrastructure: Chemical plants 550

11.7 Conclusion 553

Keywords 553

Discussion questions 554

12 Private security and art and cultural, educational, religious, and medical institutions 555

12.1 Introduction 555

12.2 Private security and cultural institutions: Art, museums, and libraries 556

12.2.1 Security tactics and protocols in the protection of art, museum, and special collections 560

12.3 Private security and educational institutions 562

12.3.1 How the security industry serves educational institutions 565

12.3.2 Security officers in the educational marketplace: Searching for the best model 574

12.3.2.1 COPS program 575

Contents xi

12.3.2.2 Congressional Research Service 576

12.3.3 Professional associations and groups in school security 582

12.4 Private security and religious centers 587

12.4.1 State of the problem: Worship, violence, and terror 587

12.4.2 Private security tactics and strategies in worship locations 589

12.4.3 Special templates and protocols for churches 593

12.4.3.1 Risk assessment template for churches 593

12.4.3.2 Fire prevention checklist 593

12.5 Private security industry, hospital and other medical institutions 593

12.5.1 Background and context 593

12.5.2 Career projections and professional associations 599

12.5.3 Special forms and templates for hospital security 605

12.5.3.1 Risk assessment template for hospitals 605

12.5.3.2 Hospital planning and continuity 605

12.5.3.3 Hospital hazard planning 606

12.6 Conclusion 606

Keywords 611

Discussion questions 611

13 Private security: Hospitality, gaming, event, and mall property 613

13.1 Introduction 613

13.2 Private security and the hospitality industry 616

13.2.1 Special protocols for hotel and hospitality security 621

13.2.1.1 Risk assessment in hotels and hospitality 623

13.2.1.2 Bomb assessment in hotel and hospitality facilities 623

13.2.1.3 Special training and licensure for nightclub operators and licensees 623

13.2.2 Certifications for security specialist in hospitality 629

13.2.2.1 Certification: National Host Security Training 630

13.2.3 Professional associations in hospitality, hotel, and lodging industry 632

13.2.3.1 American Hotel and Lodging Association 632

13.2.3.2 The International Lodging Safety and Security Association 632

13.2.3.3 International Tourism Safety Association 633

13.3 Event security 633

13.3.1 Professional certifications in event security 640

13.4 Private security industry and malls 643

13.4.1 Special protocols in mall security 646

13.5 Private security industry: Casino and gaming 648

13.5.1 Private security industry, gaming and occupational outlook 652

13.5.2 Oversight and control boards and commissions 653

13.5.3 Professional associations and certifications 655

13.5.3.1 Certificate in casino management 657

13.6 Conclusion 662

Keywords 662

Discussion questions 662

14 Information, IT, and computer security 663

14.1 Introduction 663

14.2 INFOSEC 664

14.2.1 Physical security 664

14.2.2 OPSEC 664

14.2.2.1 Social engineering 665

14.2.3 COMSEC 666

14.2.4 COMPUSEC 666

14.2.4.1 Cybercrime 667

xii Contents

14.2.4.2 Cybersecurity measures 669

14.2.5 Defense in depth 673

14.2.5.1 NIST Cybersecurity Framework 674

14.3 Chapter summary 675

Keywords 677

Discussion questions 677

15 The future of the private security industry: A philosophical outlook 679

15.1 Introduction 679

15.1.1 History of private security and the American experience 679

15.1.2 Private security industry and the constitutional advantage 680

15.1.3 Privatization of the public sector 680

15.1.4 A customer/consumer-based mentality 681

Appendix A 683

Appendix B 697

Appendix C 715

Appendix D 741

Appendix E 759

Burdeau v. McDowell

Appendix F: Physical security survey checklist 765

Index 773

xiii

Preface: Introduction to Security

Before commencing this authorship, especially after so many years of involvement in the private security industry, in

research, consulting, practice, and teaching, I thought I knew a great deal about the private security industry. After

completing this text, I am not humbled into thinking otherwise. For sure, I had a strong experiential and intellectual

base to work from in tackling this text—and considering my long advocacy of privatized services both as to inevita￾bility and efficiency; I fully realized that the demand had long legs to run with. This was an industry not merely in

growth mode—rather in a frenetic sort of dynamism that was unstoppable. Private security has now become a central

player in nearly every facet of protection in terms of both people and assets. To be simplistic, the industry is every￾where and with everyone! So, tackling this industry is a major undertaking from every imaginable angle and sector.

As a result, the text seems to know no bounds because the industry lacks boundaries as we project outward over the

next decade or so. It is a growing organism and shows no signs of limitation. Therefore, the book that unfolds over

the next 800 pages tries its best to cover everything and everyone, but it is ludicrous to think this even be realistic.

However, the reader will be exposed to all the major threads of a powerful industry assuming more critical roles in

the life and safety of a nation.

Chapter 1 lays out a full historical survey of private security with some provocative realities: first, that self-help and

self-protection are more natural in the American experience than public policing, and second, that it appears that

while public policing expanded over the last 100 years, that expansion appears to be coming to halt—while privatiza￾tion and privatized services—the actual legacy of private security, is making a fierce comeback. The chapter delivers

an overview on how the industry comes to play in the American historical experience and how industrialization,

Western expansion, and social complexities triggered new models of policing.

Chapter 2 defines the idea of security from a host of perspectives such as private self-help, terror and defense, pro￾tection of the homeland, and the contrast between protection of assets and people. Special emphasis is given to the

myriad of programs and protocols that provide security to business, industry, and individuals, and equal stress is

evident when discussing how our homeland is now dependent on both public and private participation. The nature of

security is viewed too through the eyes of an academic discipline, occupation’s roles and functions, publications and

professional journals, and its tendency to partner with public, governmental bodies.

Chapter 3 continues that definitional analysis by a comparative assessment of public policing and private security

operations. Precisely what are the missions? Are they compatible or antagonistic? Is there cross-over and collabora￾tion? To be succinct, the similarities are far greater than the contrasts in these two worlds and the text stresses the

symbiotic relationship. Finally, the chapter targets the more dominant security positions witnessed in the occupa￾tional marketplace. In this way, we look to the common occupations that intersect with public policing and the pri￾vate justice model and find a separation of the two impossible. The last portion of the chapter defines private security

by its training and regulatory requirements both experientially and academically. Special attention is given to the

many certifications and licensure programs for private security professionals. Only by these measures will a true

understanding of the private security industry unfold.

Chapter 4 further defines the industry by its organizational structure—how it delivers its services, whether by con￾tract or agreed proprietary services. In this light, a close look at the nature of an independent contractor status—a

common event in the industry—is provided. The chapter additionally provides advice on how individual services are

provided by consultancy or company and then features the usual deliverables. The last portion of the chapter focuses

on corporate security with major emphasis on the CSO in the company decision-making.

In Chapter 5, the reader is exposed to the full array of legal principles applicable to the private security industry.

Aside from minimizing legal liability, as to negligence, intentional torts, crimes, vicarious liability, and civil rights

violations, the typical security company must be forever mindful of legal challenges. While not governed by consti￾tutional principles as applied to public policing, this constitutional advantage does not negate all of the other forms

of legal liability the industry can be slapped with. The chapter defines the many elements and components of these

xiv Preface: Introduction to Security

legal actions, and provides case law examples to edify the principles and factual scenarios to apply these legal theories

to private security situations.

Chapter 6 expends all of its efforts on the nature of risk, hazard, threats, and vulnerabilities—constant preventive

and mitigated realities for security managers and directors. Exactly what is risk and how do we measure it? What

types of threats have the greatest significance for private security operatives? Is there any difference between natural

or man-made threats and how does that impact company preparation? On top of these questions, the chapter looks

at the typical natural disasters that both people and companies encounter; looks to ways of preventing, mitigating,

responding to, and recovering from these disasters; and at the same time, calculates the reality of risks and threats

aligned to terror—especially WMD challenges from the nuclear to the biological.

Chapter 7 targets the many facets of physical security—long-standing private sector responsibility. To protect people

and assets, physical security plays a crucial and continuous role. The said security commences from the exterior—the

perimeter—and ventures into the nooks and crannies of home and facility. The many types of physical security tools,

from locks to lights, fencing to bollards, sensors to motion trackers, all are covered. The end part of the chapter looks

to how crime prevention and environmental design go hand in hand and how surveillance is now part of the security

fabric of protection.

The scope of chapter 8 rests firmly in the world of human personnel practices and the security that is so essential to

assure integrity and safety in the workplace. The stresses in the chapter are many but mainly focused on background

investigations—a province of the private security world for many generations—prevention and deterrence of crime

and harm in the workplace with special emphasis on new and emerging challenges such as domestic violence, sexual

harassment, and stalking as well as full coverage of active shooter protocols. Other coverage includes the world of

executive and celebrity protection—another area of significant private sector involvement.

Chapter 9 targets the skills, characteristics, and both general and specific protocols for the private security operative

conducting investigations. First in will be a full examination of the investigative method—precisely how and in what

manner effective investigations can be done. Then, the chapter turns to specific applications in investigative practice,

including but not limited to theft in its many forms, fraud in the retail and commercial exchange, employee scrutiny,

and oversight for loss prevention purposes and other employee misconduct in need of particular proof. In the final

portion of the chapter, the reader is exposed to investigative protocols that deal with workers’ compensation, disabil￾ity, and other insurance cases.

Covered next in Chapter 10 is the world of crisis and emergency response—a growing interplay for the security pro￾fessional whose security work is now part and parcel of emergency planning and response. The thrust of the chapter

is to lay out the more typical emergencies, accidents, and natural or man-made crises witnessed in the workplace,

community, or other locale. Precisely how to plan for and respond to these events are central to the overall aim of the

discussion. Hence, the reader is exposed to the myriad of potential harms and accidents encountered by employees,

staff, or visitors to a location, including hazmat and contamination situations, accidents in the work environment,

pandemic threats to communities and their infrastructure, natural disasters such as hurricane, flooding, and fire,

and the full scope of WMD—whether biological or radiological, chemical, or bomb or other explosive.

Chapter 11 addresses the protection and care of critical infrastructure—a burgeoning area for private security profes￾sionals and companies. The broadest reach of critical infrastructure is part of the delivery, including the transporta￾tion sector, both air and rail; the maritime sector, which deals with ports, cargo, and shipping; food and agro-industry;

and various utilities, including water, energy, and power and chemical plants. The overarching trend of the material

highlights the significant role that private security plays in the protection of our critical infrastructure.

Moving to particular institutional practices encompasses the chief goal of Chapter 12. By institutional, we mean what

the private security industry delivers to institutions such as art and cultural settings, educational facilities whether

K-12 or at the college and university level, religious congregations and their respective houses of worship, and the

full range of medical and hospital settings. Part of the chapter’s direction includes practical suggestions, forms, and

templates that target these institutional locales and at the same time highlight the professional best practices for their

protection and the professional associations and groups, certification programs, and other advanced forms of con￾tinuing education, which assure the best possible methods for managing safety and security challenges.

Tải ngay đi em, còn do dự, trời tối mất!