Thư viện tri thức trực tuyến
Kho tài liệu với 50,000+ tài liệu học thuật
© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Private Security
Nội dung xem thử
Mô tả chi tiết
Private Security
An Introduction to Principles and Practice
Charles P. Nemeth
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2018 by Taylor & Francis Group, LLC
CRC Press is an imprint of Taylor & Francis Group, an Informa business
No claim to original U.S. Government works
Printed on acid-free paper
International Standard Book Number-13: 978-1-4987-2334-3 (Hardback)
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences
of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and
apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by
any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in
any information storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.copyright.com/)
or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit
organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by
the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and
explanation without intent to infringe.
Library of Congress Cataloging-in-Publication Data
Names: Nemeth, Charles P., 1951- author.
Title: Private security : an introduction to principles and practice / by
Charles P. Nemeth.
Description: Boca Raton : CRC Press, [2018] | Includes bibliographical
references and index.
Identifiers: LCCN 2017025019| ISBN 9781498723343 (hardback : alk. paper) |
ISBN 9781315157191 (ebook)
Subjects: LCSH: Private security services.
Classification: LCC HV8290 .N43 2018 | DDC 363.28/9--dc23
LC record available at https://lccn.loc.gov/2017025019
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
To Mary Claire Nemeth—my youngest daughter—an artist who produces beauty. Soon to finish her MFA and make
her artistic mark in a world desperate for creative work that is not only a wonder to gaze upon but more importantly
uplifts and brings joy to those who encounter it.
To St. Thomas Aquinas No man is so wise as to be able to take account of every single case; wherefore he is
not able sufficiently to express in words all those things that are suitable for the end he has in view. And even if
a lawgiver were able to take all the cases into consideration, he ought not to mention them all, in order to avoid
confusion: but should frame the law according to that which is of most common occurrence.
Summa Theologica at I–II, Question 96, Reply Objection 3
v
Contents
Preface: Introduction to Security xiii
Acknowledgments xvii
About the Author xix
1 Security origins and development 1
1.1 Introduction 1
1.2 Security from ancient times 2
1.3 Private security in England 4
1.3.1 Middle ages 4
1.3.2 Eighteenth-century England and the rise of formal policing 6
1.3.3 Nineteenth-century England and the Peelian revolution 9
1.4 Private security in the United States 10
1.4.1 Railroads, commerce, and the railroad police 12
1.4.2 Industrialization, the labor movement, and Pinkertons 13
1.4.3 Private security and the expansion of the American West 14
1.4.4 Private security and World War II 15
1.5 The contemporary state of private security 16
1.6 Classifications and functions of the private security industry 19
1.6.1 Unarmed officers 21
1.6.2 Alarm companies 21
1.6.3 Private investigators 21
1.6.4 Campus law enforcement and educational institutions 21
1.6.5 Retail/industrial 21
1.7 Ethical issues endemic to the security industry 21
1.8 Conclusion 25
Keywords 26
Discussion questions 26
2 Concept, context, and definition: Security 27
2.1 Security in concept and definition 27
2.2 Security, terror, and homeland defense 30
2.3 Security: The balance of rightful demonstration and threat 32
2.3.1 Security: The challenge of domestic terrorism—Pre-9/11 33
2.3.2 Security: The challenge of international terrorism—Pre-9/11 34
2.4 Security: The challenge of 9/11 and homeland defense 35
2.5 Formalizing security in the homeland: Law, legislation, and executive decree 38
2.5.1 Executive Order 13228: The origin of DHS 39
2.5.2 Executive Order 12231: Protection of infrastructure 39
2.5.3 Executive Order 13493 of January 22, 2009 39
2.5.4 Executive Order 13567 of March 7, 2011 43
2.5.5 Executive Order 13691 of February 13, 2015: Promoting private sector cybersecurity
information sharing 43
2.5.6 Homeland Security Act of 2002 44
2.5.6.1 The Homeland Security Act and Posse Comitatus 45
2.5.7 USA Patriot Act 46
2.5.8 Specialized laws 47
2.5.8.1 The REAL ID program 47
2.5.8.2 Office of Biometric Identity Management 50
vi Contents
2.5.8.3 Chemical facilities 51
2.5.8.4 The SAFETY Act 51
2.6 Academic and training programs in homeland security 52
2.6.1 Office of Grants and Training 52
2.6.2 Center for Domestic Preparedness 54
2.6.3 Emergency Management Institute 54
2.6.4 The academic discipline of security management, security studies, and homeland security 55
2.7 The private sector and homeland security 57
2.8 Conclusion 63
Keywords 64
Discussion questions 64
3 Private security, public policing, and occupational roles 65
3.1 Introduction 65
3.2 Private versus public policing: A comparative analysis 65
3.3 Defining private security by career role and occupations 76
3.3.1 Guard companies/security agency and security firm 78
3.3.2 Guards and private patrol officers 78
3.3.3 Private investigators and detectives 78
3.3.4 Alarm services: Business and residential 81
3.3.5 Armed couriers 81
3.3.6 Loss prevention specialist 82
3.3.7 College/university and school security 86
3.3.8 Federal law enforcement and security 96
3.3.9 Moonlighting and merger: The public/private connection 97
3.4 Security education, training, certification, and regulations 100
3.4.1 Education and training standards 102
3.4.1.1 Minimum training standards for armed security officers 107
3.4.2 Licensing, regulatory, and hiring standards 110
3.4.2.1 Unarmed security officer training requirements 112
3.4.2.2 Armed security officer training requirements 112
3.4.3 Educational certifications and the private security industry 117
3.5 Conclusion 120
Keywords 121
Discussion Questions 121
4 Private security industry, organizational structure, and definition 123
4.1 Introduction 123
4.2 Individualized services in private security 124
4.3 Contract security services 127
4.4 Proprietary security services 132
4.5 Corporate security services and settings 133
4.5.1 Structure and hierarchy in the corporate security office 136
4.5.2 Professional role and duties of the CSO 137
4.6 Conclusion 138
Keywords 140
Discussion questions 141
5 Private security and the law 143
5.1 Introduction: Industry growth and the legal implications 143
5.2 Civil liability and the private security industry 145
5.2.1 Intentional torts 146
5.2.2 Negligence 148
5.2.2.1 Nature of duty 149
5.2.2.2 Duty and foreseeability 150
Contents vii
5.2.3 Negligence, personnel, and the security manager/director 152
5.2.3.1 Negligent retention 152
5.2.3.2 Negligent assignment and entrustment 153
5.2.3.3 Negligent supervision 155
5.2.3.4 Negligent training 157
5.2.4 Strict liability torts 158
5.2.4.1 Negligence and vicarious liability 159
5.3 Criminal liability and the private security industry 161
5.3.1 Criminal liability under the federal civil rights acts 161
5.3.2 Criminal liability and the regulatory process 162
5.3.3 Criminal acts: Felonies and misdemeanors by security professionals 163
5.3.3.1 Assault 166
5.3.3.2 Arson 167
5.3.3.3 Burglary 168
5.3.3.4 Robbery 169
5.3.3.5 Theft or larceny 169
5.3.3.6 Theft by deception/false pretenses 170
5.3.3.7 Theft by extortion 170
5.3.3.8 Theft of property lost, mislaid, or delivered by mistake 171
5.3.3.9 Receiving stolen property 171
5.3.3.10 Theft of services 171
5.3.3.11 Retail theft 171
5.3.3.12 Related property offenses: Fraudulent behavior 172
5.3.3.13 Forgery 172
5.3.3.14 Simulating objects of antiquity or rarity 173
5.3.3.15 Fraudulent destruction, removal, or concealment of recordable
instruments or their tampering 173
5.3.3.16 Bad check and credit card violations 173
5.3.4 Defenses to criminal acts: Protection of self, third parties, and property 174
5.3.4.1 Personal self-defense and the proportionate use of force 174
5.3.4.2 Protection of other persons 175
5.3.4.3 Defense of property 176
5.4 Legal challenges to private security safe harbor 177
5.4.1 Platinum platter doctrine 180
5.4.2 Private action as state action 181
5.4.3 Public function of private security 183
5.4.4 Color of state law: A legislative remedy 184
5.4.5 Private security and Miranda warnings 186
5.4.6 The law of citizen’s arrest: The private security standard 187
5.4.6.1 Time of the arrest 188
5.4.6.2 Presence and commission 188
5.5 Conclusion 190
Keywords 190
Discussion questions 191
6 Risk management 193
6.1 Introduction 193
6.2 Risk management 195
6.2.1 Nature of risk 196
6.2.2 Risk assessment 197
6.3 Various risk assessment tools 199
6.3.1 CARVER + Shock assessment tool 200
6.3.2 Threat assessment 203
6.3.2.1 Preincident indicators: A tool for threat assessment 207
viii Contents
6.4 Threats and hazards 209
6.4.1 Evolutionary concept of threat and hazard 209
6.4.2 Weapons of mass destruction 212
6.4.2.1 Nuclear 213
6.4.2.2 Radiological 217
6.4.2.3 Biological 218
6.4.2.4 Chemical 222
6.4.2.5 Improvised explosive devices 223
6.5 Computer security and risks to the information infrastructure 226
6.6 Conclusion 229
Keywords 229
Discussion questions 230
7 Physical security 231
7.1 Introduction: The physical nature of security 231
7.2 Physical security: Exterior applications 232
7.2.1 Perimeter security measures 237
7.2.2 Perimeter design and planning 240
7.2.2.1 Bollards 240
7.2.2.2 Fencing 241
7.3 Physical security: Interior applications 247
7.3.1 Doors 247
7.3.2 Access control 251
7.3.2.1 Keys 251
7.3.2.2 Keypad entry 253
7.3.2.3 Access control by alternative keyless systems 253
7.3.2.4 Access control by sensor detection 258
7.4 Video surveillance 259
7.4.1 What are the steps of surveillance? 260
7.4.2 What is the exact objective of surveillance? 260
7.4.3 Where is the location of surveillance? 261
7.4.4 When will surveillance occur? 261
7.4.5 Who or what will be surveilled? 261
7.4.6 Surveillance equipment 261
7.4.6.1 CCTV equipment 261
7.4.6.2 Photographic/video equipment 264
7.5 Physical security and CPTED 265
7.6 Conclusion 270
Keywords 271
Discussion questions 271
8 Security: Human resources and personnel 273
8.1 Private security industry: Protection of people 273
8.2 Preemployment screening and background checks 276
8.2.1 General recommendations on background and employment investigations 276
8.2.2 Background issues 279
8.2.2.1 Establishing identity 279
8.2.2.2 Employment history 280
8.2.2.3 Credit history 284
8.2.3 Additional methods of background investigation 289
8.2.3.1 References for character, competency, and reputation 289
8.2.3.2 Testing and consultative services 293
8.2.3.3 Polygraph and lie detector technology 295
8.3 Executive protection 296
Contents ix
8.4 Special security problems in the workplace environment 308
8.4.1 Harassment in its various forms 313
8.4.2 Stalking 316
8.4.3 Protection from abuse/domestic/spousal abuse 316
8.4.4 Hate crimes and the workplace 318
8.4.5 Terroristic threats 320
8.4.6 Assault: From simple to aggravated 323
8.4.6.1 Assault 323
8.4.6.2 Simple assault 323
8.4.6.3 Aggravated assault 324
8.4.6.4 Mayhem 324
8.5 Active shooter programs for the private security industry 325
8.6 Conclusion 331
Keywords 332
Discussion questions 332
9 Investigations and investigative reporting for the security professional 333
9.1 Introduction 333
9.2 Essential investigative characteristics for the security professional 333
9.2.1 Objectivity and investigative practice 334
9.2.2 Logic and investigative practice 335
9.2.3 Perseverance, diligence, and investigative practice 338
9.2.4 Human relations skills and investigative practice 340
9.3 Private police investigative practice as compared to public police 344
9.3.1 Investigative practice and protocols for private security: Distinct legal dimensions 347
9.4 Investigations and investigative procedure 348
9.4.1 Types of investigations in the security industry 353
9.5 Private security and investigative applications 355
9.5.1 Theft by shoplifting 355
9.5.1.1 Rationalizations and justifications for shoplifting 356
9.5.1.2 Shoplifting methods 358
9.5.1.3 Practice suggestions: Forms to detect and report shoplifting 361
9.5.2 Theft by employees 363
9.5.2.1 Reasons and rationales for employee theft 364
9.5.2.2 Employee theft tactics 365
9.5.2.3 Investigating internal theft 366
9.5.2.4 Employee theft tests and protocols 367
9.5.3 Theft by burglary 374
9.5.4 Theft by fraud in insurance cases 376
9.5.4.1 Fraudulent property claims in arson 377
9.5.4.2 Theft by fraud in workers’ compensation 379
9.5.4.3 Theft and fraud in disability claims 389
9.5.4.4 Theft and fraud in auto liability claims 390
9.6 Reporting and memorializing the investigative method 404
9.7 Conclusion 406
Keywords 406
Discussion Questions 407
10 Crisis planning and prevention of accidents, emergencies, and disasters 409
10.1 Introduction 409
10.2 Private security industry: Occupational safety and health—OSHA 413
10.3 Private security industry: Accidents and emergencies 417
10.4 Emergencies in the workplace 422
10.5 Fire protection and life safety 426
x Contents
10.6 Private security industry: Hazmat and WMD 434
10.6.1 Weapons of mass destruction 440
10.6.1.1 Nuclear 442
10.6.1.2 Radiological 442
10.6.1.3 Biological 444
10.6.1.4 Chemical 448
10.6.1.5 Bomb threats 451
10.7 Natural disasters 455
10.8 Pandemic threats 461
10.8.1 Infectious diseases 465
10.9 Emergency crisis management and response 467
10.9.1 National Response Framework 476
10.9.2 Continuity and resiliency and the security industry 478
10.9.3 Evacuation plan 480
10.10 Conclusion 481
Keywords 482
Discussion questions 485
11 Critical infrastructure security 489
11.1 The critical infrastructure and the private security industry 489
11.2 Critical infrastructure: Transportation 492
11.2.1 Cargo and port security 492
11.2.1.1 Secure Freight Initiative 494
11.2.1.2 Container Security Initiative 494
11.2.1.3 Container inspection 496
11.2.1.4 Vessel inspection 498
11.2.1.5 Customs Trade Partnership against Terrorism 500
11.2.1.6 Automated Commercial Environment 501
11.2.2 Airline transportation: A short history 504
11.2.2.1 Transportation Security Agency 505
11.2.2.2 Private security industry and the Screening Partnership Program 510
11.2.3 Rail and mass transit 511
11.2.3.1 Private security for rail and transit 515
11.2.3.2 Amtrak: The National Passenger Rail Corporation 517
11.2.3.3 CSX: The freight line 518
11.2.3.4 Southeastern Pennsylvania Transit Authority: Rail mass transit 521
11.3 Critical infrastructure: Food, agriculture, and water 522
11.3.1 Strategic Partnership Program on Agroterrorism 529
11.3.2 Water 533
11.4 Critical infrastructure: Energy 537
11.5 Critical infrastructure: Nuclear 545
11.6 Critical infrastructure: Chemical plants 550
11.7 Conclusion 553
Keywords 553
Discussion questions 554
12 Private security and art and cultural, educational, religious, and medical institutions 555
12.1 Introduction 555
12.2 Private security and cultural institutions: Art, museums, and libraries 556
12.2.1 Security tactics and protocols in the protection of art, museum, and special collections 560
12.3 Private security and educational institutions 562
12.3.1 How the security industry serves educational institutions 565
12.3.2 Security officers in the educational marketplace: Searching for the best model 574
12.3.2.1 COPS program 575
Contents xi
12.3.2.2 Congressional Research Service 576
12.3.3 Professional associations and groups in school security 582
12.4 Private security and religious centers 587
12.4.1 State of the problem: Worship, violence, and terror 587
12.4.2 Private security tactics and strategies in worship locations 589
12.4.3 Special templates and protocols for churches 593
12.4.3.1 Risk assessment template for churches 593
12.4.3.2 Fire prevention checklist 593
12.5 Private security industry, hospital and other medical institutions 593
12.5.1 Background and context 593
12.5.2 Career projections and professional associations 599
12.5.3 Special forms and templates for hospital security 605
12.5.3.1 Risk assessment template for hospitals 605
12.5.3.2 Hospital planning and continuity 605
12.5.3.3 Hospital hazard planning 606
12.6 Conclusion 606
Keywords 611
Discussion questions 611
13 Private security: Hospitality, gaming, event, and mall property 613
13.1 Introduction 613
13.2 Private security and the hospitality industry 616
13.2.1 Special protocols for hotel and hospitality security 621
13.2.1.1 Risk assessment in hotels and hospitality 623
13.2.1.2 Bomb assessment in hotel and hospitality facilities 623
13.2.1.3 Special training and licensure for nightclub operators and licensees 623
13.2.2 Certifications for security specialist in hospitality 629
13.2.2.1 Certification: National Host Security Training 630
13.2.3 Professional associations in hospitality, hotel, and lodging industry 632
13.2.3.1 American Hotel and Lodging Association 632
13.2.3.2 The International Lodging Safety and Security Association 632
13.2.3.3 International Tourism Safety Association 633
13.3 Event security 633
13.3.1 Professional certifications in event security 640
13.4 Private security industry and malls 643
13.4.1 Special protocols in mall security 646
13.5 Private security industry: Casino and gaming 648
13.5.1 Private security industry, gaming and occupational outlook 652
13.5.2 Oversight and control boards and commissions 653
13.5.3 Professional associations and certifications 655
13.5.3.1 Certificate in casino management 657
13.6 Conclusion 662
Keywords 662
Discussion questions 662
14 Information, IT, and computer security 663
14.1 Introduction 663
14.2 INFOSEC 664
14.2.1 Physical security 664
14.2.2 OPSEC 664
14.2.2.1 Social engineering 665
14.2.3 COMSEC 666
14.2.4 COMPUSEC 666
14.2.4.1 Cybercrime 667
xii Contents
14.2.4.2 Cybersecurity measures 669
14.2.5 Defense in depth 673
14.2.5.1 NIST Cybersecurity Framework 674
14.3 Chapter summary 675
Keywords 677
Discussion questions 677
15 The future of the private security industry: A philosophical outlook 679
15.1 Introduction 679
15.1.1 History of private security and the American experience 679
15.1.2 Private security industry and the constitutional advantage 680
15.1.3 Privatization of the public sector 680
15.1.4 A customer/consumer-based mentality 681
Appendix A 683
Appendix B 697
Appendix C 715
Appendix D 741
Appendix E 759
Burdeau v. McDowell
Appendix F: Physical security survey checklist 765
Index 773
xiii
Preface: Introduction to Security
Before commencing this authorship, especially after so many years of involvement in the private security industry, in
research, consulting, practice, and teaching, I thought I knew a great deal about the private security industry. After
completing this text, I am not humbled into thinking otherwise. For sure, I had a strong experiential and intellectual
base to work from in tackling this text—and considering my long advocacy of privatized services both as to inevitability and efficiency; I fully realized that the demand had long legs to run with. This was an industry not merely in
growth mode—rather in a frenetic sort of dynamism that was unstoppable. Private security has now become a central
player in nearly every facet of protection in terms of both people and assets. To be simplistic, the industry is everywhere and with everyone! So, tackling this industry is a major undertaking from every imaginable angle and sector.
As a result, the text seems to know no bounds because the industry lacks boundaries as we project outward over the
next decade or so. It is a growing organism and shows no signs of limitation. Therefore, the book that unfolds over
the next 800 pages tries its best to cover everything and everyone, but it is ludicrous to think this even be realistic.
However, the reader will be exposed to all the major threads of a powerful industry assuming more critical roles in
the life and safety of a nation.
Chapter 1 lays out a full historical survey of private security with some provocative realities: first, that self-help and
self-protection are more natural in the American experience than public policing, and second, that it appears that
while public policing expanded over the last 100 years, that expansion appears to be coming to halt—while privatization and privatized services—the actual legacy of private security, is making a fierce comeback. The chapter delivers
an overview on how the industry comes to play in the American historical experience and how industrialization,
Western expansion, and social complexities triggered new models of policing.
Chapter 2 defines the idea of security from a host of perspectives such as private self-help, terror and defense, protection of the homeland, and the contrast between protection of assets and people. Special emphasis is given to the
myriad of programs and protocols that provide security to business, industry, and individuals, and equal stress is
evident when discussing how our homeland is now dependent on both public and private participation. The nature of
security is viewed too through the eyes of an academic discipline, occupation’s roles and functions, publications and
professional journals, and its tendency to partner with public, governmental bodies.
Chapter 3 continues that definitional analysis by a comparative assessment of public policing and private security
operations. Precisely what are the missions? Are they compatible or antagonistic? Is there cross-over and collaboration? To be succinct, the similarities are far greater than the contrasts in these two worlds and the text stresses the
symbiotic relationship. Finally, the chapter targets the more dominant security positions witnessed in the occupational marketplace. In this way, we look to the common occupations that intersect with public policing and the private justice model and find a separation of the two impossible. The last portion of the chapter defines private security
by its training and regulatory requirements both experientially and academically. Special attention is given to the
many certifications and licensure programs for private security professionals. Only by these measures will a true
understanding of the private security industry unfold.
Chapter 4 further defines the industry by its organizational structure—how it delivers its services, whether by contract or agreed proprietary services. In this light, a close look at the nature of an independent contractor status—a
common event in the industry—is provided. The chapter additionally provides advice on how individual services are
provided by consultancy or company and then features the usual deliverables. The last portion of the chapter focuses
on corporate security with major emphasis on the CSO in the company decision-making.
In Chapter 5, the reader is exposed to the full array of legal principles applicable to the private security industry.
Aside from minimizing legal liability, as to negligence, intentional torts, crimes, vicarious liability, and civil rights
violations, the typical security company must be forever mindful of legal challenges. While not governed by constitutional principles as applied to public policing, this constitutional advantage does not negate all of the other forms
of legal liability the industry can be slapped with. The chapter defines the many elements and components of these
xiv Preface: Introduction to Security
legal actions, and provides case law examples to edify the principles and factual scenarios to apply these legal theories
to private security situations.
Chapter 6 expends all of its efforts on the nature of risk, hazard, threats, and vulnerabilities—constant preventive
and mitigated realities for security managers and directors. Exactly what is risk and how do we measure it? What
types of threats have the greatest significance for private security operatives? Is there any difference between natural
or man-made threats and how does that impact company preparation? On top of these questions, the chapter looks
at the typical natural disasters that both people and companies encounter; looks to ways of preventing, mitigating,
responding to, and recovering from these disasters; and at the same time, calculates the reality of risks and threats
aligned to terror—especially WMD challenges from the nuclear to the biological.
Chapter 7 targets the many facets of physical security—long-standing private sector responsibility. To protect people
and assets, physical security plays a crucial and continuous role. The said security commences from the exterior—the
perimeter—and ventures into the nooks and crannies of home and facility. The many types of physical security tools,
from locks to lights, fencing to bollards, sensors to motion trackers, all are covered. The end part of the chapter looks
to how crime prevention and environmental design go hand in hand and how surveillance is now part of the security
fabric of protection.
The scope of chapter 8 rests firmly in the world of human personnel practices and the security that is so essential to
assure integrity and safety in the workplace. The stresses in the chapter are many but mainly focused on background
investigations—a province of the private security world for many generations—prevention and deterrence of crime
and harm in the workplace with special emphasis on new and emerging challenges such as domestic violence, sexual
harassment, and stalking as well as full coverage of active shooter protocols. Other coverage includes the world of
executive and celebrity protection—another area of significant private sector involvement.
Chapter 9 targets the skills, characteristics, and both general and specific protocols for the private security operative
conducting investigations. First in will be a full examination of the investigative method—precisely how and in what
manner effective investigations can be done. Then, the chapter turns to specific applications in investigative practice,
including but not limited to theft in its many forms, fraud in the retail and commercial exchange, employee scrutiny,
and oversight for loss prevention purposes and other employee misconduct in need of particular proof. In the final
portion of the chapter, the reader is exposed to investigative protocols that deal with workers’ compensation, disability, and other insurance cases.
Covered next in Chapter 10 is the world of crisis and emergency response—a growing interplay for the security professional whose security work is now part and parcel of emergency planning and response. The thrust of the chapter
is to lay out the more typical emergencies, accidents, and natural or man-made crises witnessed in the workplace,
community, or other locale. Precisely how to plan for and respond to these events are central to the overall aim of the
discussion. Hence, the reader is exposed to the myriad of potential harms and accidents encountered by employees,
staff, or visitors to a location, including hazmat and contamination situations, accidents in the work environment,
pandemic threats to communities and their infrastructure, natural disasters such as hurricane, flooding, and fire,
and the full scope of WMD—whether biological or radiological, chemical, or bomb or other explosive.
Chapter 11 addresses the protection and care of critical infrastructure—a burgeoning area for private security professionals and companies. The broadest reach of critical infrastructure is part of the delivery, including the transportation sector, both air and rail; the maritime sector, which deals with ports, cargo, and shipping; food and agro-industry;
and various utilities, including water, energy, and power and chemical plants. The overarching trend of the material
highlights the significant role that private security plays in the protection of our critical infrastructure.
Moving to particular institutional practices encompasses the chief goal of Chapter 12. By institutional, we mean what
the private security industry delivers to institutions such as art and cultural settings, educational facilities whether
K-12 or at the college and university level, religious congregations and their respective houses of worship, and the
full range of medical and hospital settings. Part of the chapter’s direction includes practical suggestions, forms, and
templates that target these institutional locales and at the same time highlight the professional best practices for their
protection and the professional associations and groups, certification programs, and other advanced forms of continuing education, which assure the best possible methods for managing safety and security challenges.