Contents Contributing Authors Preface PART ONE / INTRODUCTION 1. Risk Assessment and Management Murray Neal
PART TWO / LOSS PREVENTION AND CRIME PREVENTION METHODS 2. Designing Security with the Architects Lawrence J. Fennelly
xiii xv 1 3
7 9
Designing Security with the Architects. Designing Security and Layout of Site. Building Site Security and Contractors. Ironmongery. Closed Circuit TV Checklist. Card Access Control Checklist. Storage Rooms, Safes, and Vaults Checklist. Exterior Lighting Checklist. Crime Prevention Awareness Points. Appendix 2.A. Model Residential and Commercial Building Security Ordinance. Appendix 2.B. Standards 3. Security Surveys Lawrence J. Fennelly
19
The Best Time to Conduct the Survey. Classification of Survey Recommendations. Developing Security Points. Nine Points of Security Concern. Personality of the Complex. Positive and Negative Aspects of Making Recommendations. Crime Analysis. Key Control. Closed Circuit Television. Intrusion Alarms. Lighting and Security. Other Security Aspects. Security Survey Follow-Up. Residential Security. Alarms. Appendix 3.A. Site Survey and Risk Assessment. Appendix 3.B. Physical Security Survey. Appendix 3.C. Plant Security Checklist. Appendix 3.D. Guard Security Checklist. Appendix 3.E. Office Security Checklist. Appendix 3.F. Home Security Checklist. Appendix 3.G. Fire Safety Inspection 4. Internal Theft Controls Robert Fischer
44
Introduction. What Is Honesty?. The Dishonest Employee. Management Responsibility in Loss Prevention. Program for Internal Security. Procedural Controls. When Controls Fail. Case Study. Summary 5. Executive Protection Charles J. Diecidue
59
Rise of Terrorism in the United States. Formulating a Protection Plan. Threat Assessment. Planning. Home and Office Survey. Procedural Vulnerability. Physical Vulnerability. Protection in Transit. Everyday Security Awareness. If an Abduction Occurs vii
viii
HANDBOOK OF LOSS PREVENTION AND CRIME PREVENTION
6. Awareness Robert Hanna
66
Awareness and Knowledge Strategies. Neighborhood Watch Guidelines. How to Avoid Becoming the Victim of an Attacker. Safety Checklist for Apartments. Robbery Prevention— Tips for Small Business. Burglary Prevention—Tips for Small Business. Suspicious Situations to Report. Vehicle Theft—a Big Problem. Safety Skills for Children. Street Smarts—How to Protect Oneself. The Con Artist. Crime Prevention Tips for Senior Citizens. Protection from Telemarketing Fraud. Crime Prevention Tips at ATMs 7. Crime Prevention through Environmental Design Strategies and Applications Timothy Crowe
82
Crime Prevention through Environmental Design Strategies. CPTED Applications. Objectives for the Commercial Environment. Downtown Streets and Pedestrian Areas. Parking Lots and Structures. Office and Industrial Systems. Hallways and Restrooms. Malls and Shopping Centers. Convenience Stores. Branch Banks. Objectives for the Residential Environment. Objectives for the School Environment. Convention Centers and Stadiums PART THREE / SECURITY OPERATIONS AND EQUIPMENT 8. Approaches to Physical Security Richard Gigliotti and Ronald Jason
133 135
Levels of Physical Security. The Psychology of Maximum Security. The Value of Planning. Physical Barriers. The Security Plan. Conclusion 9. Physical Barriers Richard Gigliotti and Ronald Jason
148
Doors. Roofs. Floors. Fences. Walls and Moats 10. The Use of Locks in Physical Crime Prevention James M. Edgar and William D. McInerney
165
Lock Terminology and Components. Key-Operated Mechanisms. Combination Locks. Lock Bodies. Door Lock Types. Strikes. Attacks and Countermeasures. Locks and the Systems Approach to Security. Key Control. A New Standard Set for Exit Devices, Locks, and Alarms. Appendix 10.A. Key Control and Lock Security Checklist. Appendix 10.B. Terms and Definitions for Door and Window Security 11. Safes, Vaults, and Accessories Kenneth Dunckel
207
Choose the Right Container. UL-Rated Combination Locks. Relocking Devices. Locking Dials. Lockable Handles. Time Locks. Time-Delay Combination Locks. Alarmed Combination Locks. Vision-Restricting and Shielded Dials. Combination Changing. Safe Burglaries. Overcoming Safe-Opening Problems. Appendix 11.A. Rating Files, Safes, and Vaults 12. Security Lighting Philip P. Purpura, Lawrence J. Fennelly, Gerard Honey, and James F. Broder Illumination. Lamps. Twenty-Five Things You Need to Know about Lighting. Energy Management. Lighting Checklist. Protective Lighting Checklist
218
Contents
13. Alarms: Intrusion Detection Systems Mike Rolf and James Cullity
ix
223
Components of Alarm Systems. Application. Alarm Control. Alarm Transmission/Signaling. Alarms Deter Crime. False Alarms. Alarm Equipment Overhaul. Additional Resources. Conclusion. Appendix 13.A. Smoke Detectors 14. CCTV Surveillance Herman Kruegle
236
Protection of Assets: An Overview. History. Role of CCTV in Asset Protection. CCTV as Part of the Emergency and Disaster Plan. Emergency Shutdown and Restoration. Security Investigations. Safety. The Security Officer’s Role. Training and Education of Employees. Synergy through Integration. CCTV’s Role and Applications. Problems Solved by CCTV. Choice of Overt or Covert CCTV. Security Surveillance Applications. Safety Applications. CCTV Access Control. The Bottom Line. Appendix 14.A. Glossary. Appendix 14.B. Designing Effective CCTV Systems 15. Guard Service in the Twenty-First Century Joseph G. Wyllie
253
Liabilities Connected with Guard Force. Power and Authority of the Security Guard. Training. Report Writing. Weapons Safety. Safety. Safety Checklist. Bomb Threats. Bomb Search. Fire Protection. Fire Prevention. Emergency Medical Assistance. Reporting a Medical Case. Guard Supervision. Conclusion 16. Bomb and Physical Security Planning Stephen E. Higgins
266
Bombs. Bomb Threats. Why Prepare?. How to Prepare. Security against Bomb Incidents. Responding to Bomb Threats. Decision Time. Evacuation. Search Teams. Search Technique. When a Suspicious Object Is Located. Handling the News Media. Summary. Appendix 16.A. Suspect Package Alert. Appendix 16.B. Bomb Threat Checklist. Appendix 16.C. Mail Handlers and Suspicious Mail Procedures PART FOUR / SECURITY AND CRIME PREVENTION APPLICATIONS
277
17. Cargo Security: Intermoda/Logistics—The Complete Overview Louis A. Tyska
279
Prevention Plan. Pilferage. Theft. Organized Crime. Cargo Package and Movement Controls. Trucking Operations. Appendix 17.A. Cargo Security Checklist. Appendix 17.B. Personnel Security Checklist. Appendix 17.C. Physical Security Checklist. Appendix 17.D. Inspection Report Forms. Appendix 17.E. Documentation. Appendix 17.F. The Role of Private Security 18. Lodging (Hotel/Motel) Security Mark Beaudry and Skip Brandt
312
Security Department Structure. Size of the Department. Reporting Level in the Organization. Role of Security. Training. Theft. Opportunities and Trends. Legal Issues. The Future of Lodging Security 19. Retail Security: Lessons Learned from Convenience Store Research Rosemary J. Erickson and Arnie Stenseth New Challenges. Increase in Crime. The Research. Research Underway. The Recommended Program. Conclusions
330
x
HANDBOOK OF LOSS PREVENTION AND CRIME PREVENTION
20. Putting an Extra “EYE/I”on CCTV: Managing Risk in Retail Scott Greenwald
341
Old Tech to New Tech. Rationale for Technology. Definition of Interactive. How Interactive Monitoring Reduces Risk. How to Evaluate the Service Provider. Why Isn’t This Everywhere: Cost versus Availability?. How ICCTV Works. CCTV versus ICCTV 21. Perspectives on Safe School Administration G. Edward Richards
345
Emphasize Crime and Deviance Prevention during Teacher Education. Maintain a Sense of Ownership in School Grounds and the Surrounding Neighborhood. Conduct Periodic Risk Assessments or Security Surveys. Clearly State Rules and Regulations. Conduct a Crime and Deviance Analysis. Develop an Incident Mapping System. Utilize Parent Volunteers as Monitors and Student Aides. Institute After-School Programs. Security Considerations Should Be Incorporated from the “Ground Up.” Establish In-Class Communication between Teachers and Administration. Institute a Safety and Security Committee. Value the Contributions of Custodial Personnel. Train Personnel in Graffiti Interpretation. Schools Need Central Office Support. Value Aesthetics. Foster Students’ Beliefs They Are Connected to the School. Do Not Use Student Monitors. The “Combustible Engine” Model of School Communities. Create a Crisis Management Plan. Train Personnel in Conflict Resolution. Implement Character Education Curricula. Create Law-Related Education Modules to Be Incorporated in Social Studies Courses. Establish “Communities within Schools.” Avoid Peer-Group Counseling. Instill an Awareness of the Dangers of Terrorism 22. Campus Security and Crime Prevention Bronson S. Bias
350
Communication. Key Elements in a Campus Crime Prevention Program. Commitment. Cycle of Activity. Specific Programs. The Campus Security Act of 1990. Neighborhood Watch on the College Campus. Phones on Campus. Thefts in the Library. Bicycle Theft Prevention. Administration Office Security Programs. Operation Identification. Intrusion Alarms. Conclusion 23. Hospitals and the Health-Care Security Environment Russell L. Colling
357
Categories of Health Care. Types of Hospitals. The Foundation of Health-Care Security: Risks and Areas of Vulnerability. Basic Health-Care Security Risk and Areas of Vulnerability 24. Library Security R. A. (Rick) Draper and Susan Urosevic
362
Risk Assessment Terminology. Identifying Risks. Assessing Likelihood. Assessing Consequences. Qualifying Risks. Managing the Risk. The Scope of Security Problems in Libraries. Security Risk Management Strategies. Dealing with Specific Threats. Conclusion. Security Management Resources 25. High-Rise Security and Fire Life Safety Geoff Craighead High-Rise Assets. Threats to Security and Fire Life Safety. Security of Modern High-Rise Buildings. Fire Safety of Modern High-Rise Buildings. Summary
370
Contents
26. Multiresidential Security Norman R. Bottom
xi
376
Apartments. Condominiums. Levels of Security. Personnel. Physical Security and Hardware. Procedures. The Elderly. Some Special Areas of Vulnerability. Disasters. Legislation. Basic Steps to Remember in Multiresidential Security 27. Workplace Violence: Anticipation through Process, Not Prediction of Results Revisited John H. Lombardi
387
Causes and Avoidance of Claims of Inadequate Security. Job Applicant. Narrowing the Focus of the Workplace Violator Profile. Case Studies in Workplace Violence. Organizational Dynamics. The “Team” Concept and Shared Expectations as an Approach to Workplace Motivation. “Why Don’t Subordinates Do What They Are Supposed to Do?”. Steps to Reduce the Opportunity for Workplace Violence. The Predatory Prevention Matrix. Process versus Output, or the Difference between “High Crime” and “High Profit.” Uses of the Predatory Prevention Matrix. An Apartment Case Study. The Magic Chair. Defense against Workplace Violence: Possible or Probable? 28. Domestic Violence: Everyone’s Problem Ingeborg Sebyan
402
What Is It. Who Are the Victims. Why Abusers Abuse. What We Do Know. Law Enforcement Response. Options for Protection. Government Involvement. Conclusion 29. Personal Safety and Self-Defense Melissa Soalt
407
Introduction. Violent Crimes. Self-Defense 30. Designing Crime Risk Management Systems National Crime Prevention Institute
410
Understanding Crime Risk Management. Who Is the Client?. The Client-Practitioner Relationship. Crime Pattern Analysis. Conducting the Security Survey. Determination of Probable Maximum Loss. Making Recommendations to Clients. Conclusion 31. Planning, Management, and Evaluation Charles M. Girard
418
The Concepts Defined. Statistical Information: The Backbone for Design of a Prevention Program. Crime Statistics. Demographic Data. Efficiency Analysis: Measuring Activity. Effectiveness Analysis: Measuring Program Impact. Attitudinal Analysis: Gathering Opinions on the Program Impact. A Strategy to Facilitate Implementation of the Evaluation 32. Financial Institution Security Edward F. McDonough, Jr., and Linda F. Mikitarian
431
The Bank Protection Act of 1968. The Role of the Security Department. Current Risks Affecting Financial Institutions. Criminal Reporting. Bank Security Devices. Security Training in Financial Institutions. Other Federal Regulations with an Impact on Banking. Critical Issues in Financial Institution Security 33. Automatic Teller Machines (ATMs) Jerry Wright Responsibility of an ATM Owner. Case Study from Ann Arbor Police Department: Law Enforcement and ATM Safety. Ann Arbor, Michigan’s Guidelines for Automatic Teller
442
HANDBOOK OF LOSS PREVENTION AND CRIME PREVENTION
xii
Machines User Safety. Appendix 33.A. ATM Safety Tips. Appendix 33.B. ATM Safety Checklist 34. Telecommunications Fraud Mark D. Farrell
447
How Does It Happen?. How to Find Out. How to Reduce Vulnerability. How to Stop It 35. Electronic Surveillance and Wiretapping Philip P. Purpura
449
Countermeasures. Economic Espionage Act of 1996 36. Safety Websites Richard A. Phelan
453
Introduction. Safety Websites 37. Homeland Security Lawrence J. Fennelly
454
Gov. Ridge Announces Homeland Security Advisory System. National Framework for Federal, State, and Local Governments, Private Industry, and the Public. Factors for Assignment of Threat Conditions. Unified System for Public Announcements. A Tool to Combat Terrorism. Homeland Security in 2002. HITS and IFPO Computer-Based and Web-Based Security Officer Training. Final Comments 38. Security of Information Systems Joseph C. Nelson
457
Conclusion. Security Organizations 39. Counterespionage and Information Security Management Norman R. Bottom
461
Reasons for Attacking Computers. Methods of Attacking Computer Systems. Methods of Defense. Roots of Industrial Espionage. Historic Attacks on Computers and Networks. Recent Lawsuits. Covert Action. Theft. Other Causes of Information Loss. Why People Steal Information. Types of Attacks. Espionage Methods. Rogue Use. Competitive Intelligence. Human Error. The WAECUP Human Factors Protocol. Human Factor Training Practices. Electronic Surveillance and Countermeasures. Telecommuting. Wireless Mike Dangers: An Example. Computer Passwords. Current Security Issues. Host-Based Perimeter Defense. EMail. Local Area Network. Radio Links. Encryption. Investigations. Trade Secrets 40. Emergency Management Norman Bottom
481
Crisis, Disaster, Catastrophe—Are You Ready?. The Emergency Management Plan Is Only as Good as the Last Drill 41. The Security Professional, Terrorism, Bio-Terrorism, and the Next Level Karl J. Leger
487
The Security Professional and Terrorism. Terrorism and the Terrorist. Understanding Terrorism. Terrorist Groups and Organizational Structure. Mechanism of Violence and Associated Risk Factors. Assessing Threats from Terrorism and Developing Effective Countermeasures. The Security Manager’s Responsibilities. Conclusion Index
504