ebook img

The Professional Protection Officer PDF

501 Pages·2019·7.515 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview The Professional Protection Officer

THE PROFESSIONAL PROTECTION OFFICER SECOND EDITION THE PROFESSIONAL PROTECTION OFFICER Practical Security Strategies and Emerging Trends SECOND EDITION Editedby S J. D ANDI AVIES L J. F AWRENCE ENNELLY Butterworth-HeinemannisanimprintofElsevier TheBoulevard,LangfordLane,Kidlington,OxfordOX51GB,UnitedKingdom 50HampshireStreet,5thFloor,Cambridge,MA02139,UnitedStates ©2010,2020ElsevierInc.Allrightsreserved. ©2020BradSpicer.PublishedbyElsevierInc.Allrightsreserved. ©2020JeffreyA.Slotnick.PublishedbyElsevierInc.Allrightsreserved. ©2020JosephNelson.PublishedbyElsevierInc.Allrightsreserved. Nopartofthispublicationmaybereproducedortransmittedinanyformorbyanymeans,electronicor mechanical,includingphotocopying,recording,oranyinformationstorageandretrievalsystem,without permissioninwritingfromthepublisher.Detailsonhowtoseekpermission,furtherinformationaboutthe Publisher’spermissionspoliciesandourarrangementswithorganizationssuchastheCopyrightClearance CenterandtheCopyrightLicensingAgency,canbefoundatourwebsite:www.elsevier.com/permissions. ThisbookandtheindividualcontributionscontainedinitareprotectedundercopyrightbythePublisher (otherthanasmaybenotedherein). Notices Knowledgeandbestpracticeinthisfieldareconstantlychanging.Asnewresearchandexperiencebroadenour understanding,changesinresearchmethods,professionalpractices,ormedicaltreatmentmaybecome necessary. Practitionersandresearchersmustalwaysrelyontheirownexperienceandknowledgeinevaluatingandusing anyinformation,methods,compounds,orexperimentsdescribedherein.Inusingsuchinformationor methodstheyshouldbemindfuloftheirownsafetyandthesafetyofothers,includingpartiesforwhomthey haveaprofessionalresponsibility. Tothefullestextentofthelaw,neitherthePublishernortheauthors,contributors,oreditors,assumeany liabilityforanyinjuryand/ordamagetopersonsorpropertyasamatterofproductsliability,negligenceor otherwise,orfromanyuseoroperationofanymethods,products,instructions,orideascontainedinthe materialherein. LibraryofCongressCataloging-in-PublicationData AcatalogrecordforthisbookisavailablefromtheLibraryofCongress BritishLibraryCataloguing-in-PublicationData AcataloguerecordforthisbookisavailablefromtheBritishLibrary ISBN:978-0-12-817748-8 ForinformationonallButterworth-Heinemannpublications visitourwebsiteathttps://www.elsevier.com/books-and-journals Publisher:KateyBirtcher AcquisitionEditor:KateyBirtcher EditorialProjectManager:AndraeAkeh ProductionProjectManager:MariaBernard CoverDesigner:AlanStudholme TypesetbySPiGlobal,India Dedication We would like to offer this dedication to the steps in protecting people, property, and strongly committed officers who have sought assets. Be safe! out their own professional development To those fallen officers who lost their lives by engaging in their studies that the Inter- while on the job in the line of duty words can’t national Foundation for Protection Officers adequately express our gratitude. The loss that (IFPO) makes available. Thousands upon yourfamiliesmustbefeelingisrealandtremen- thousands of women and men internationally dous.Youwerestrongandbrave,andYOUdid have successfully completed an IFPO certifi- make a difference. Thank you kindly for your cation program which in turn has enhanced service. May God Bless. their career. These individuals are raising the bar for our industry. Often these gradua- Once coined “Forgotten Soldiers of an Invisible tes continue with their studies and earn their Empire”comesto mind. bachelor’s or master’s degrees. This industry byChristopher A. Hertig, CPP, CPOI is evolving at such a substantial rate that the need for well-educated and trained indi- SandiJ.Davies, Larry J.Fennelly viduals is significant. We thank you for taking Contributors MichaelAllen,CPP,CFE,PSP,PCI RobertD.Jaffin,MBS,MTS CurtisBaillie,CSC GlenKitteringham,SDyRM,M.Sc.,CPP,CPOI BrianD.Baker,MA,CPP,PCI,CPOI JenniferLantz JeremyD.Bates,CFI BrianLunn GregBenson,MPA RonaldL.Martin,CPP,CPOI ColinBest,CSSM RobertMetscher,CPP PatrickC.Bishop,CPP,CFE,CPO BonnieMichelman,CPP,CHPA NormanR.Bottom JosephNelson,CPP JamesBroder,CPP ThomasNorman,CPP,PSP,CSC ChrisCarhart JohnE.O’Rourke,CPP JeremiahDaley DenisA.O’Sullivan,CPP,CPO SandiJ.Davies KevinE.Palacios,M.Sc.,CPP,PSP,PCI WhitneyDeCamp,PhD.,CPO MariannaA.Perry,M.S.,CPP,CPOI MatthewR.Dimmick,PSP,CPD KevinE.Peterson,CPP,CPOI,CPO KevinT.Doss,M.Sc.,CPP,PSP KevinPound JackF.Dowling,CPP,PSP KennaPowell,CPP DougDurant,BA,CPP,CPO DavidL.Ray,BA,JD,CFE FrancisJ.Elliott,CPP BethanyJ.Redmond JimEllis,MA.,CPP,PSP ChrisRichardson,CPP MichaelJ.Fagel,Ph.D.,CEM JamesE.Sellers,MSc,CPP,CFE,CPOI KenFauth,CPP Charles(Chuck)Sennewald,CSC,CPP,CPO LawrenceJ.Fennelly,CPOI,CSSM DennisShepp,MBA,CPP,CFE,PCI RichardP.Fiems,MA,CPOI,CSSM JeffreyA.Slotnick,CPP,PSP LindaF.Florence,Ph.D.,CPP BradSpicer EricL.Garwood,CPP,CSSM,CPO CharlesT.Thibodeau,M.Ed,CPP,CPOI,CSSM TerenceM.Gibbs,MS,CPP,WSO-CSSD FranklinR.Timmon,CPP,CPOI BrionP.Gilbride,MSI,CPP,CSSM,CPO ErnestG.Vendrell,Ph.D,CEM,CPP DavidHalcovitch,MSc TedWade,MA MichaelA.Hannigan,CPO ScottA.Watson,MCJ,M.Ed,CFE,CPP ChristopherA.Hertig,CPP,CPOI LindaWatson,CPP,CSC,CHS-V JenniferHesterman,ColonelUSAirforce(Retired) Rav-ZuridanYisrael,MA,CPP,CPOI,CHS-111 xv Foreword Security isa reflectionof the society. Thistextisintendedasareferenceforprepar- Globalization,terrorism,andtechnologycon- ing the reader for the Certified Protection Officer tinuetodrivechangeinthewaysecurityhasto certification as well as a comprehensive refer- operate and respond to risk. The world is in a ence. The contributing authors are all highly constantstateoffluxandthereforetheconcepts respected professionals from around the globe andpractice ofsecurity mustcontinually adapt withexpertiseandadvancedcredentialsintheir to theever-changing risks. respective areas. Security professionals must be comfortable This book provides a broad overview of with constantly operating in the midst of topics critical to success for security profes- ambiguity. sionals such as communication, protection offi- Drawing from various disciplines and cer’s functions, crime prevention, safety, diverse practice areas, security includes and information security, workplace violence, risk is not limited to STEM (science, technology, management, investigations, private security engineering, and mathematics), cyber, risk law, and the use of force. This version builds management, political science, leadership, on previous editions with new and expanded communication skills, business management, sections to include: and legal aspects. (cid:129) Enterprise security riskmanagement Asthreatscontinuetoevolve,securityprofes- (cid:129) Armed assailant/active shooter sionals at all levels must constantly learn and (cid:129) Leadership skills andcompetencies change,whilebalancingtheparametersoftheir (cid:129) Expanded sections on technology and respective organization, agency, culture, or physical security jurisdiction. Those who intend to harm adapt quickly to overcome preventative and protec- Readers will gain tools, tactics, methodolo- tion measures with increasing creativity and gies,andbestpracticesforprotectingtheirorga- expertise. nizations orcommunities. The good news is the practice of security is Dr. Linda F. Florence,Ph.D., CPP moving toward greater acceptance and profes- sionalism as evidenced by research, best prac- TheFlorenceGroup,LLC tices, guidelines, and a documented body of LosAngeles,CA,UnitedStates knowledge. There are numerous career path- Bonnie Michelman, CPP, CHPA ways for individuals who choose to dedicate MassachusettsGeneralHospital themselves to the practice of professional secu- PartnersHealthcare,Inc. rity through education and certification. Boston,MA,UnitedStates xvii Introduction PURPOSE Today,IFPOistherecognizedcatalystinthe developmentofprofessionalismthroughoutthe ThepurposeofthisbookTheProfessionalPro- securityindustry.Thousandsofsecurityofficers tection Officer: Practical Security Strategies and who have earned the CPO accreditation have Emerging Trends is to provide “need-to-know” gained knowledge and professional career information to protection officers and students enhancement; they have unselfishly provided throughoutthesecurityindustry. Thisresource encouragement and information to their col- servesasthecoursetextfortheCertifiedProtec- leagues and employers. Hence, a new dimen- tionOfficer(CPO)program.Manysecuritypro- sion of opportunities has spread throughout fessionalsalsofindthecontentsofthistextbook the security industry. helpful as a reference in their day-to-day secu- The first version of this book was simple, rity management responsibilities. short,andlimitedinscope,butincludedenough information to help the security officer better understandhisorherroles,duties,andrespon- sibilities.However,sincethatsimplebeginning, HISTORY OF THIS HANDBOOK eachsubsequentedition,atotalofnine(includ- ing seven before the title change), has brought ThefirsteditionoftheProtectionOfficerTrain- new and enlightening information to the ingManual(POTM)originatedwiththebirthof security professional. Heir to this legacy, the theInternationalFoundationforProtectionOffi- Professional Protection Officer is the leading text cers(IFPO)in1988.Atotalof12dedicatedsecu- for protection officers and students. It is also rity professionals from the United States and widelyusedbythoseteachinginProtectiveSer- Canada had a vision: to create an organization vices, Criminal Justice, Homeland Security, or thatwouldprovidemeaningfulcareeropportu- Emergency Managementcourses of study. nities for line security officers internationally. The newly formed IFPO Board of Directors realized that a certification program was DEDICATIONS needed,alongwithaprofessionaltraining text- book, to make that vision a reality. Hence, the Ron Minion, CPP and IFPO Founder first edition of POTM was created to serve as the course text for the CPO program. IFPO, the Ron Minion (1938–2008) lost his battle with CPOprogram,andPOTMallprovedtobevital Lou Gehrig’s disease in 2008. He was the man components in achieving the foundation’s behind this book, one of the founders of IFPO, objectives. a dedicated champion of the security industry, xix xx INTRODUCTION and a tireless advocate for protection officers. at headquarters in Naples for a period of time. His determination, and vision of professional- She proved to be an outstanding and valued ism through training for the industry, has employeeaswell.ThankYOU! resultedinabrighterfutureforscoresofsecurity professionals, and will continue to do so in the CONTENTS future. Ron was the first examined Certified Protec- tionProfessionalinCanada.Hewasafounding Thisneweditionhas3unitsand45chapters. member of the Calgary Chapter of the ASIS The contributors to this edition are among the International, where he was a chapter chair best writers, academics, and practitioners in the and regional vice president. As regional vice securitycommunity.Thistalentedgroupofpro- president, he earned the president’s “award of fessionals has generously provided readers of merit” for establishing ASIS chapters through- thissuperiortextbookwithuniqueopportunities out Canada. In 2006, Security Magazine named toacquirecurrentassetprotectionandlifesafety Ronasoneofthe25mostinfluentialexecutives. information.Thesewritersareoutstandingindi- Ron’s legacy includes the thousands of line viduals who deserve recognition and apprecia- security officers he employed and mentored tionfortheirservicetothesecuritycommunity. over the years. He knew the industry from the The contents of this textbook are sometimes groundfloorup,andneverlosthisvisionofpro- quitebasic.However,everysecuritysupervisor vidingaffordabletrainingtosecurityofficersto and manager should fully understand all of help them turn their mere jobs into viable theinformationcontainedhereintoprovidebet- careers with brighter futures. Ron, our friend, ter leadership and interpretation of officer mentor, industry advocate, and trusted col- responsibilities. league, isgreatly missed. The material contained in each unit is arranged to provide the reader with a smooth flow of related security information. IFPO Team IFPOissupportedbyateamofsecuritypro- GLOBAL CHALLENGES, NEW fessionalsthroughouttheworldwho,yearafter ROLES, AND year, work diligently on behalf of the Founda- RESPONSIBILITIES tion and what it stands for. Because of these men and women who are committed to excel- lence and remain steadfast in their obligation Where once the term “security” might have to high standards of service, IFPO continues to referred to the lone night watchman whose besuccessful. We thank you. greatestadversarywasaburglarhopingtopick AnextraspecialthankstoAliceGrime.Again a lock, those days are long gone. The night hertalentshavemadethisbookevenbetter!Over watchman’srolewasviewedasmerelyajobthat the years Alice has worked with our team on a didnotgarnermuchrespectinthecommunity. numberofotherverysuccessfulbooks.Through Today’s security professionals are finding herprofessionalrelentlesseffortsasaresearcher theirrolesgreatlyexpandedinnumerousarenas and proof reader, the end product is superior worldwide, due, in part, to a much greater becauseofhercontributions.Weindeedappreci- global threat and a reduction in public law ate her efforts and her interest in assisting the enforcement protection. The current economic IFPO meet it’s goals and objectives. We might situation has caused an increase in some types addthatAliceoncewasapartofourIFPOteam of crimes. At the same time, those economic INTRODUCTION xxi realitieshavealsoforcedlocalmunicipalitiesto the industry. The latter more or less cements reduce public law enforcement efforts through the impactof theformer. layoffs or hiring freezes, even though the need Whilethequestformutualrespectandseam- for moreprotection isgrowing. less cooperation between public and private The threat of terrorism was spotlighted for security has improved over the years, it must the United States and the world on 9/11, and remain an ongoing goal for both the private is still an ever-present threat worldwide. It has andpublicsectors.Mutualrespectandcoopera- andwillcontinuetoimpacttheindustry,partic- tion between public law enforcement and pri- ularlyintheareasofresearchandriskmanage- vate security is essential to ensuring that ment methodologies. security needsaremeteffectively. Inrecentyears,cyberterrorism,whichthreatens Increasingly, security functions have been infrastructureandservicesbyattackingcomputer contracted out to private security firms to fill networksviatheInternet,hasbecomeaveryseri- the gap between what government can do and ousthreat.Itcan,andhas,resultedinthelossofbil- what is needed. Private security firms are even lions of dollars of proprietary information, and steppingintofilltherolesthatmilitaryperson- compromiseddataatabroadrangeofinstitutions, neloncefilledonmilitaryinstallationsandeven from government agencies to banks, credit card war zones. A new type of protection officer is companies,andbusinessfirms.Companyexecu- increasingly stepping forward to fill the need, tivesareacutelyawareofthedangerofdataloss, readytodealwithnewsituationsandchallenges andnumerouslawsgovernwhatmustbedoneif astheycomealong,thankstoongoingeducation data is compromised. Cyberterrorism not only and training. putsdataatrisk,butcanalsoputessentialservices Currently, corporations that once relied on and infrastructure at risk. Guarding against this thatnightwatchmantopatrolafenceassufficient typeofthreatrequirescontinuingeducationabout protection are increasingly instituting their own the ever-evolving risks, deterrents, prevention, in-house security departments. An integral part and laws. Unlike the night watchman, who only of this overall protection process is the profes- worried about physical security with its fences, sionalsecuritymanagerandsupervisor,comple- gates,andaccesspoints,today’sprotectionofficer mentedwithasecuritystaffcapableofattending mustalsoguardagainstanenemythatmovesat to the ongoing protection needs. Generally, cor- thespeedoflight.Theprotectionofficermustnot porations require their security managers and onlyprotectthephysicalpremisesandequipment supervisors to be well educated, trained, and but also guard against an enemy that moves experienced. Private security firms are also silentlytodisruptservices,incapacitateinfrastruc- demandingeducated,trainedprofessionals. ture,andstealdata. Thenightwatchmanmighthavebeenableto The National Fire Protection Association’s dohisjobwithlimitededucation,butintoday’s (NFPA’s) “Guide for Premises Security” and ever-changing, challenging security climate, “Standard for the Installation of Electronic Pre- professionalsmustbeeducatedandwelltrained mises Security Systems” have both caused to fulfill their new, evolving, and demanding changes that may not make news headlines roles. This new breed of security professional but will certainly impact the industry. The for- is winning respect by proving that they are mer will not affect the general public but fire skilledandverycapableofcarryingoutthemost protection, security consultants, facility man- sophisticated, demanding roles. They are dedi- agers, and insurance companies will be forced cated professionalswiththecredentialsneeded to deal with it. ASIS International has already to keep themselves, their employers, and their begun setting standards that have impacted employers’ assets from harm. xxii INTRODUCTION CPO PROGRAM Protectionofficershavemanytitles:security guard,securityofficer,campuspolice,losspre- ProfessionalProtectionOfficer:PracticalSecurity ventionofficer,crimepreventionofficer,retail Strategies and Emerging Trends is the course text losspreventionagent,militarypolice,andsev- for the CPO program, an internationally recog- eral others. They can work part time or full nized certification for protectionofficers. time.Theycanbeassignedtoprotectaperson, TheCPOdesignationisaprofessionalaccredita- a group of people, an office building, a net- tionthatcanbeearnedbycompletingaself-paced work,astoreorfactory,andmanyotherassets coursebasedonthistextbookeitherthroughtradi- in many locations. Some are armed; some are tionalcorrespondenceorIFPO’sonlineplatform. unarmed. They can be employed as indepen- In addition to having security experience or dentconsultants,byasecurityservicesagency, the equivalent, a candidate must complete the by the military, by a state government, by the following stages of progression to earn the federal government, and by other organiza- CPO designation: tions.Theterm“protectionofficer”isnoteasy to define. Titles vary, specific tasks vary, loca- 1. Submit application for enrollment. tions vary, employers vary, but the one thing 2. Successfullycomplete a midterm that all protection officers have in common is examination. that they are willing to take risks and put into 3. Successfullycomplete a supervised final place preventive measures to protect tangible examination. (A proctormay belocated assets, such as buildings, intangible assets, withinthe candidate’s organization or such as data, and of course, the public. They community.) assume the risks so that others can go about (Bothexaminationsarebasedonthecontents their business and not have to worry about of thistextbook.) potential harm. Thistextbookiswrittenasausefulreference CERTIFIED PROTECTION for security supervisors, managers, and those who teach; but the primary beneficiary is the OFFICER (CPO) FINAL student orworkingprotection officer. CHALLENGE PROGRAM The editors of the Professional Protec- This book, The Professional Protection Officer: tion Officer: Practical Security Strategies Practical Security Strategies and Emerging Trends, and Emerging Trends, Second Edition, is also thetext fortheCPOFinalChallengepro- arehonoredtoworkwithsomanyacade- gram,whichisthefast-trackmethodofobtaining micians, researchers, and outstanding theCPOcertification.TheFinalChallengeoption security professionals since the planning eliminatesthecourseofstudyandgoesdirectlyto ofthefirstedition.Thesetalentedauthors thefinalexam,whichisthesameonethatispart are dedicated security professionals that oftheCPOprogram.Questionsonthefinalexam have worked tirelessly in supporting, comefromthematerialinthetextbook. promoting, and contributing to IFPO and ContactIFPOformoreinformationregarding allofitsworthwhileprograms.“Wecould theCPOand/orother programs. not have done itwithoutyou!” CONCLUSION Sandi J.Davies andLawrence J.Fennelly The term protection officer frequently appears in thistextbook. What is aprotection officer?

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.