ebook img

Security and Loss Prevention PDF

742 Pages·2019·27.261 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Security and Loss Prevention

Security and Loss Prevention An Introduction Seventh Edition Philip P. Purpura Butterworth-Heinemann isanimprintofElsevier TheBoulevard,LangfordLane,Kidlington, OxfordOX51GB,United Kingdom 50HampshireStreet,5thFloor,Cambridge, MA02139,United States Copyright©2019 ElsevierInc.Allrightsreserved. Nopartofthispublication maybereproducedortransmittedinanyform orbyany means, electronicormechanical,including photocopying,recording,oranyinformation storageand retrievalsystem,without permissioninwritingfromthepublisher. Detailsonhow toseek permission,furtherinformation aboutthePublisher’s permissions policiesandour arrangements withorganizations suchastheCopyrightClearance CenterandtheCopyright LicensingAgency,canbefoundatourwebsite:www.elsevier.com/permissions. Thisbook andtheindividual contributions containedinitare protectedundercopyright bythe Publisher(otherthanasmaybenotedherein). Notices Knowledgeandbestpractice inthisfield areconstantly changing.Asnewresearch and experiencebroaden ourunderstanding, changes inresearch methods,professional practices, ormedical treatmentmaybecomenecessary. Practitionersandresearchersmustalwaysrelyontheirownexperienceandknowledgein evaluatingandusingany information,methods, compounds,orexperimentsdescribed herein. Inusingsuchinformationormethodstheyshouldbemindfuloftheirownsafety andthesafety ofothers, includingparties forwhomtheyhaveaprofessional responsibility. Tothefullestextentofthelaw, neitherthePublishernortheauthors,contributors, oreditors, assumeany liability forany injuryand/or damagetopersons orproperty asamatter of productsliability, negligenceorotherwise,orfromany useoroperationofany methods, products,instructions,orideascontained inthematerialherein. LibraryofCongress Cataloging-in-Publication Data Acatalog recordforthisbook isavailablefromtheLibraryofCongress BritishLibraryCataloguing-in-Publication Data Acataloguerecord forthis bookisavailablefromtheBritishLibrary ISBN:978-0-12-811795-8 ForinformationonallButterworth-Heinemann publications visitourwebsiteat https://www.elsevier.com/books-and-journals Publisher:KateyBirtcher AcquisitionEditor:KateyBirtcher EditorialProjectManager:NateMcFadden ProductionProjectManager: MohanambalNatarajan Designer:MarkRogers TypesetbyTNQTechnologies To my family. To the millions of military, public safety, security and loss prevention, and other professionals who seek global security and safety. About the Author PhilipP.Purpura,certifiedprotectionprofessional,hasexperienceasacollegeeducator, consultant,expertwitness,andwriter.HedirectedtheSecurityandJusticeInstituteand theSecurityforHousesofWorshipProjectinSouthCarolina.Purpurabeganhissecurity career in New York City and held management, proprietary, and contract investigative positions. He also worked with a public police agency. He served as chairperson of the ASIS International Council on Academic and Training Programs and continues as a member of this council as well as the Cultural Properties Council and various ASIS committees.Heholdsanassociate’sdegreeinpolicesciencefromtheStateUniversityof New York at Farmingdale and bachelor’s and master’s degrees in criminal justice from the UniversityofDaytonand Eastern Kentucky University,respectively.Healso studied in Europe, Asia, and the former Soviet Union. Purpura is the author of seven other books: Security: An Introduction (Boca Raton, FL: Taylor & Francis/CRC Press, 2011); Terrorism and Homeland Security: An Introduction with Applications (Burlington, MA: Elsevier Butterworth-Heinemann, 2007); Security Handbook, second ed. (Boston, MA: Butterworth-Heinemann, 2003; Albany,NY:Delmar,1991);Police&Community:Concepts&Cases(Needham,MA:Allyn &Bacon,2001);CriminalJustice:AnIntroduction(Boston,MA:Butterworth-Heinemann, 1997); Retail Security & Shrinkage Protection (Boston, MA: Butterworth-Heinemann, 1993); and Modern Security & Loss Prevention Management (Boston, MA: Butterworth, 1989). Purpura was contributing editor to three security periodicals; wrote numerous articles that are published in journals, magazines, and newsletters; and has been involved in a variety of editorial projects for publishers. xv Preface The seventh edition of Security and Loss Prevention: An Introduction continues to draw on manydisciplinesforanswerstoprotectionchallengesfacingprofessionalswhilehelpingthe reader to understand this vocation. As in previous editions, a major focus is on threats, hazards, and countermeasures. This book shows an awareness that, beyond the attention terrorism has received since the 9/11 attacks, protection practitioners continue to confront thesamebasicriskstheyfacedbeforetheattacks.However,sincethelastedition,weareinan era of more powerful and sinister adversaries and more destructive disasters that are both shocking and a serious menace to our way of life. Inmanyways,today,thebadguyshavetheadvantageoverthegoodguys.Thebadguys include a variety of criminals, such as hackers, organized criminals, violent offenders, ter- rorists,thieves,andinsiders(e.g.,corruptemployees).Inaddition,enemynation-statesresort to just about any method as they seek economic, military, and political superiority; their arsenal includes spies, cyberespionage, cyberwarfare, proxy wars, and fake news. With no shortageofbadguys,theyhavethebenefitoffirststrikeandsurprise,andtheyarerelentless. Global cybersecurity professionals are facing the daunting task of responding and defending against an onslaught of persistent hackers from throughout the world who are wreaking havoc on individuals, organizations, and infrastructures. Major changes in pro- tection strategies are desperately needed in this increasingly ominous cyber battleground. Although there are many soft targets, such as public transportation and public gath- erings, what makes matters worse is the terrible fact that security itself has become a soft target!Forexample,hackerspenetratenetworksandsecuritysystemstounlockdoors,spyon video systems, and steal information and data. Thesethreatstoourwayoflife,economy,andnationalsecurityaremajorproblemsthat are being confronted. Cybersecurity professionals are not only enhancing defenses but also going on the attack (e.g., hacking back). Security and loss prevention professionals are working with cybersecurity professionals on strategies such as policies and procedures, awareness programs, security of mobile devices, and investigations. Manufacturers and en- gineers are hardening security systems. Increasinglydestructiveandcostlynaturalandhuman-madedisastershaveresultedin enormousharmtopeople,communities,andbusinesses.Populationclustersinurbanareas and building booms in geographically unsafe locations increase risk. Resilience and an all- hazards approach to disasters are explained in this book. Enterprise risk management and enterprisesecurityriskmanagementarewovenintothecontenttobreakfromanarrowview of security and loss prevention in favor of a holistic approach. There is no guarantee here of solving the world’s protection and resilience problems. What this book does is help the reader to understand and apply theory, methodologies, and practical strategies to real-world challenges. Othergoalsofthisbookaretoguidethereadertobecomeamoreastutecriticalthinker while enhancing skill-sets and providing a deeper understanding of our unpredictable, complex,anddangerousworld.Suchattributesimprovedecision-makingwhilestrengthening xvii xviii Preface jobsecurity.Seniorexecutivesaredemandingthatprotectionandresiliencemethodsshowa return on investment. Suchinvestments mustavoid failure, or worse, increase risk. This book helpsthe readerto understand thebad guysand whattheyare doing, while offeringoptionstoenhancesuccessesagainstthem.Examplesofsecurityasasofttargetare exposed while offering mitigation strategies. A major theme of this book is to connect the traditional security manager, physical securityspecialist,andinvestigatortoITsecurity.ThisisnotaclaimtomakethereaderanIT securityexpert.Rather,thereaderwilllearnaboutsimilaritiesanddifferencesofphysicaland IT security; internal and external IT risks and countermeasures; and the mindset of the IT security specialist. In addition, the convergence of physical security and IT security, as covered in the contents, makes an understanding of IT especially important to the security and loss prevention professional. The many disciplines within this book include criminal and civil law, business, ac- counting, risk management, intelligence, business continuity, emergency management, fire protection, safety, sociology, and psychology. Terminology, concepts, and theories, at the foundation of this profession, are emphasized. Updates include new statistics, laws, stan- dards, guidelines, research, strategies of protection and resilience, technology, events, and issues.Thepublicationssupportingthecontents includeavariety ofperiodicals,books,and researchreportsfromnumerousorganizations.Over400newreferencesareincludedinthis seventh edition. An effort has been made to include relevant and practical research from journalstoassistdecision-makerswhenchoosingsecuritystrategiesthatareevidencebased. The contents retain basic information on the body of knowledge of security and loss prevention. ThewritingofSecurityandLossPrevention:AnIntroductionincludedreferencetoASIS certification domains, standards, guidelines, academic/practitioner symposiums, and the security studies committee. Another source was the University of Phoenix/ASIS research to identifyenterpriserisksandthecompetenciesandskillsrequiredbyprofessionalstomitigate those risks; this project culminated in an Enterprise Security Competency Model formatted fromaframeworkfromtheUSDepartmentofLabor.Anadditionalsourcewascybersecurity workforcecompetenciesresearchedbytheUniversityofPhoenix/(ISC)2.Thisprojectresulted in a Cybersecurity Competency Model also formatted from a framework from the US Department of Labor. The US Department of Homeland Security, Interagency Security Committee, was anothersourcethroughthepublicationtitledSecuritySpecialistCompetencies:AnInteragency Security Committee Guideline. This Guideline seeks the uniformity and consistency of core competencies among federal agencies in the training and professional development of se- curity specialists. This book is an aid to applicants preparing for the Certified Protection Professional Examination, which is sponsored by ASIS International. Numerous topics included in the examination are covered in this book. What specifically is new in the seventh edition? To provide the reader with a view of some of the updates, here is a list of new terms and topics included in the book: Internet of Things (IoT) Climate change and security Environmental security Security as a soft target Soft target security Preface xix Hard target security Data analytics Private equity firms The built environment Business case for security Gap analysis Fortress problem Balancing (legal) test for security investments Fitness devices and litigation Body cameras Social media Emotional intelligence Bloom’s Revised Taxonomy of Educational Objectives Cloud-based services Legacy systems Panoramic cameras Audio analytics Autonomous video analytics Electrified fence Laser space detection sensors Investigation and intelligence functions IoT and investigations Counter social media techniques Deep web and dark web Emojis and emoticons as evidence Jamming devices GPS manipulation Geofencing “Cooking the books” Posttraumatic stress disorder (PTSD) Fire as a weapon Pressurization systems Critical incident management Incident Command System ISO 45001 Root cause analysis Remote-plotted terrorist attacks ISIS Weaponization of information Cognitive security Virtual currencies xx Preface Counterintelligence General Data Protection Regulation (GDPR) Bug bounty programs Vishing Cybersecurity of critical infrastructure and the IoT Life critical embedded systems Cyber defense versus cyber offense NSA hacking strategies “Israelification” of the US aviation Total retail loss (TRL) Consumer racial profiling Racial profiling assessment Mobile point-of-sale Mobile wallet Cash recycler Tokenization Flash mob criminals Cyber-enabled economic warfare Det Norske VeritaseGermanischer Lloyd Active assailant Active assailant management Threat score BSI PAS 3001 Security at large-scale events Impairment in the workplace Defend Trade Secrets Act of 2016 Trade secrets and security and criminal justice technologies Mobile device management WikiLeaks Behavior transmitter-reinforcer Workplace wearables Human-embedded microchip Artificial intelligence Robodrone Crime-as-a-service Toassistthereaderoftheseventhedition,thefollowingisincluded:learningobjectives and key terms at the beginning of each chapter, key terms in bold within each chapter, definitions, examples, illustrations, photos, boxed scenarios, boxed international topics for global perspectives, and career boxes that explain various specializations in security. Thestudentorpractitionerwillfindthecontentstobeuser-friendlyandinteractive,as in previous editions. Several features facilitate an understanding of not only the basics but also the “reality” of the field. The reader is placed in the role of the practitioner through Preface xxi various exercises. Within each chapter, loss problems are described and are followed by coverageofnuts-and-boltscountermeasures.Sidebarsineachchapteremphasizesignificant points and encourage critical thinking. Cases titled “You Be the Judge” appear in the text. Thesefictionalaccountsofactualcasesdealwithsecurity-relatedlegalproblems.Thestudent is asked for a verdict based on the material at hand and then is directed to the end of the chapterforthecourt’sruling.Anotherlearningaidistitled“YouDecide!WhatIsWrongWith ThisFacility?”Withtheassistanceofchaptercontent, thereaderexposesvulnerabilities ata facility and offers suggestions for improved protection. Additional boxed cases appear in chapters and offer bits of interesting information or analyze a loss problem relevant to the subjectmatterofthechapter.Thecaseproblemsattheendsofchaptersalsobridgetheoryto practiceandcontainquestionsforapplyingconceptsinthechaptertoreal-worldsituations. Theseexercisesenablethestudenttoimproveanalyticalanddecision-makingskills,consider alternativestrategies,stimulatecontroversyingroupdiscussions,makemistakesandreceive feedback, and understand corporate culture and ethical guidelines. This new edition also serves as a helpful directory. Professional organizations and sourcesofinformationthatenhanceprotectionprogramsareincludedwithwebaddressesat the ends of chapters. Thefirstfewchaptersprovideanintroductiontosecurityandlossprevention.Chapter1 definessecurityandlosspreventionandpresentsacriticalperspectiveonthehistoryofthis profession. The second chapter concentrates on the growth of the security industry and related challenges. The next three chapters provide a foundation from which protection programs can become more efficient and effective. Chapter 3 focuses on why security is a profession, theory, planning, budgets, risk analyses, standards, regulations, evaluation, research,andthebasicsoforganization.Chapter4providesanoverviewofthejudicialsystem oftheUnitedStates,civil andcriminallaw,premisesecurityclaims,administrativelaw,and laborlaw.Thischapteralsocoversarrestlaw,searches,useofforce,andquestioningsubjects. Chapter 5 explains the “why” and “how” of working with people and organizations to assist loss prevention efforts. Topics include internal and external relations, marketing, social me- dia,andthenewsmedia.Chapters6e8emphasizestrategiesforcurbinginternalandexternal crime threats through job applicant screening, management countermeasures, and physical security. Chapter 9, on purchasing security services and systems, is vital because not all se- curity specialists are wise consumers, and the best plans are useless when followed by poor purchasingdecisions.Chapter10providespracticalinformationoninvestigations,including typesofinvestigations,legalissues,technologyandevidenceinourdigitalage.Thestrategies ofaccountability,accountingandauditingaredescribedinChapter11,withanexplanationas to why these tools are essential for survival. Chapter 12 focuses on resilience, risk manage- ment,businesscontinuity,andemergencymanagementasafoundationforChapter13onlife safety, fire protection, emergencies, and disasters. Chapter 14 emphasizes workplace safety and OSHA. The topics of terrorism and homeland security are explained in Chapter 15. Chapter 16 concentrates on critical infrastructure protection, cybersecurity, and border se- curity.Chapter17describessecurityandlosspreventionatretail,financial,educational,and health-care organizations. The topics of workplace violence, human resources protection, substance abuse, and information security are in Chapter 18. The concluding chapter an- ticipates the future and explains trends, education, research, training, and employment. Thetraditionalfocusofsecuritydsecurityofficers,fences,andalarmsdistoonarrowto deal with an increasingly complex world. Practitioners must work to bring protection and resilience to the next level to confront shrewd adversaries and all hazards. The true profes- sionalmaintainsapositiveattitudeandseesproblemsaschallengesthathavesolutionsand possibly opportunities. xxii Preface Thetremendousgrowthofthesecurityandlosspreventionprofessionprovidesfertile ground to advance in a rewarding career. In such a competitive world, the survival and protection of people, businesses, institutions, technological innovations, and the national interest depend greatly on the men and women in this vocation. With professionalism and perseverance, more battles will be won in the never-ending war with adversaries. This bookshouldinspireandmotivatestudentsandpractitionerstofulfillthesevitalprotection needs.

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.