Effective Security Officer's Training Manual -  Ralph Brislin

Effective Security Officer's Training Manual (eBook)

eBook Download: PDF | EPUB
2014 | 3. Auflage
336 Seiten
Elsevier Science (Verlag)
978-0-12-800192-9 (ISBN)
Systemvoraussetzungen
Systemvoraussetzungen
49,95 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
The Effective Security Officer's Training Manual, Third Edition teaches today's security officers the most important aspects of performing the job of a security officer professionally and effectively. Training is the most important element in becoming a professional security officer, but it is also often overlooked or underutilized. This straightforward, easy-to-follow, and well-organized text covers the essentials that security officers need as they face issues of growing technology and an emphasis on proactiveness and vigilance. The Effective Security Officer's Training Manual, Third Edition also covers many topics of current concern such as sexual harassment, crowd control, cultural diversity, persons with special needs, new technologies, and much more. With discussion questions at the end of every chapter and a full ancillary package accompanying the text, this manual is a comprehensive tool for developing a career as a successful and trusted professional security officer.
• Meets ASIS International's guidelines for Private Security Officer Selection & Training.
• Addresses the latest technological advancements that impact how today's security officers do their jobs.
• Discusses the increased role security officers have in observing and reporting suspicious activities and events.
• Includes end-of-chapter discussion questions to enhance understanding.
The Effective Security Officer's Training Manual, Third Edition teaches today's security officers the most important aspects of performing the job of a security officer professionally and effectively. Training is the most important element in becoming a professional security officer, but it is also often overlooked or underutilized. This straightforward, easy-to-follow, and well-organized text covers the essentials that security officers need as they face issues of growing technology and an emphasis on proactiveness and vigilance. The Effective Security Officer's Training Manual, Third Edition also covers many topics of current concern such as sexual harassment, crowd control, cultural diversity, persons with special needs, new technologies, and much more. With discussion questions at the end of every chapter and a full ancillary package accompanying the text, this manual is a comprehensive tool for developing a career as a successful and trusted professional security officer. Meets ASIS International's guidelines for Private Security Officer Selection and Training Addresses the latest technological advancements that impact how today's security officers do their jobs Discusses the increased role security officers have in observing and reporting suspicious activities and events Includes end-of-chapter discussion questions to enhance understanding

Chapter 1

Introduction to Security


Abstract


The history of security is presented in this chapter by highlighting common laws developed in England. Private security in the United States began in 1857, when the Pinkerton Detective Agency was formed. Definitions that pertain to the various aspects of security are reviewed. Lastly, it is emphasized that security should be considered as more service oriented rather than approaching it from a “tough-guy” perspective.

Keywords


Al QaedaASISBow Street RunnersCommon lawJohn Wayne syndromeKing's Peace
As you read and study this security officer training manual, you should be aware that you are in one of the fastest growing industries in the United States. The purpose of this course is to familiarize you with the most important aspects of the duties of a security officer. We believe you will find this manual to be easy to read, as well as interesting and challenging.

What is private security?


Private security is made up of self-employed individuals and privately funded businesses that provide security and related services to other persons and businesses for a fee. Security is intended to protect and preserve activities and property without loss or disruption. Most security officers have no more legal power than the average citizen. However, some security officers possess police/arrest powers because they have been commissioned by a local, state, or federal government agency.
Security has existed since people began to inhabit the earth. Archaeologists have discovered drawings attributed to “cavemen” that describe how early inhabitants hunted and went to war against other tribes or groups of people. The early inhabitants of the earth needed to protect themselves not only from invaders but from wild animals as well.
The first recognized set of laws is attributed to King Hammurabi of Babylon, who lived about 2000 B.C. Hammurabi devised a legal code that was designed to regulate the behavior of people to one another and to society as a whole. The Code of Hammurabi described what punishment would be enforced against a person who violated the code. The old saying “an eye for an eye, and a tooth for a tooth” is generally accepted to have been initiated in this code. Ancient customs and traditions that sanctioned improper behavior were legitimized in the code of Hammurabi.
During 500–600 B.C., the Greeks developed procedures and implemented systems to protect strategic roads leading to and from their cities, thus protecting their vital interests from potential enemies.
Around the time the modern calendar began, the Roman Empire ruled much of the known world. The Roman army was well-organized and highly trained. Military units were used to protect their cities. The development of the first quasi-police department was considered to be that of the Praetorian Guard.
Laws in the United States are based on ancient common laws that were developed in England. In late 800 A.D., King Albert established the “King’s Peace,” which was an attempt to stop the private wars and battles that occurred between English noblemen who maintain private armies. The King’s Peace called for certain punishments to be inflicted for violations of the law.
The development of law and the original criminal justice system continued in England for the next several hundred years. In 1750, the first plainclothes detective unit was formed; the detectives were known as the Bow Street Runners. The members of this unit were responsible for running to the scene of a crime in an attempt to capture the criminal. In 1829, what is considered the first police department was formed by Sir Robert Peel, who was Home Secretary of England. Sir Peel was responsible for the establishment of this uniformed, full-time police force. The English term “Bobbie” for police officers was the nickname derived from Sir Robert Peel. In the United States, police departments were formed in several large cities during the 1800s.

Development of private security in the United States


Allan Pinkerton (Figure 1.1) is recognized as the father of private security in the United States. In 1857, he formed the Pinkerton Detective Agency. He worked primarily for the railroads; thus, most of Pinkerton’s early work involved catching train robbers. The Pinkerton Company served as an intelligence-gathering (spy) service for the Union army during the Civil War. In 1874, American District Telegraph (ADT) was formed to provide alarm detection services.
In 1859, William Brink founded a truck and package delivery service in Chicago. When Brink’s carried its first payroll in 1891, it became the first armored car and courier service. In 1909, William Burns founded the Burns Detective Agency, which provided security during labor strikes.
At the beginning of World War I, the security industry began to grow because of concerns about sabotage and espionage, but the growth slowed considerably during the Depression. During the 1940s, with the outbreak of World War II, the industry began to grow again.

FIGURE 1.1Wood engraving of Allan Pinkerton, who is considered the father of private security in the United States.
Before awarding defense contracts, the government required that munitions suppliers begin security measures to protect classified materials and defense secrets from sabotage and spying. The Federal Bureau of Investigation (FBI) assisted defense contractors in ensuring their security was adequate. The government also granted the status of auxiliary military police to more than 200,000 plant security officers. For the most part, the jobs were to protect war goods, equipment, and personnel. As a result of World War II, manufacturing companies became aware of the need for plant security and its value. After the war, George R. Wackenhut and three other former FBI agents formed the Wackenhut Security Corporation. In 1955, the American Society for Industrial Security (ASIS) was formed. Today, there are over 38,000 members of ASIS what is known now as ASIS International. In 1968, the federal government required increased security for federal banks when Congress passed the Federal Bank Protection Act. In January 1973, the Federal Aviation Administration began to require the screening of all air passengers and carry-on baggage due to the number of air hijackings that were occurring.

Security development and the future


Security, like most professions, has continued to change amid rapid growth. More and more organizations are examining the training criteria security companies use to ensure that a satisfactory level of knowledge and professionalism exists.
Many terms are often used interchangeably to describe security.
• Private police
• Security police
• Plant protection
• Facility or plant security
• Loss prevention
• Risk management
• Loss control
• Fire protection
• Asset protection
• Safety
• Hazardous material control
Security encompasses all of these areas to a greater or lesser extent, depending on the facility and industry where security officers are employed. This is not meant to imply that the term security is the same as all of the above terms. Rather, in the twenty-first century, security responsibility will continue to increase as long as the training of security personnel is considered to be a good value and return on investment to corporations. The terms can be generally defined as follows:
Security generally refers to the protection of people and/or property in an effort to maintain what is considered normal conditions.
Loss prevention refers to a management philosophy that invests money in the hope of preventing losses from occurring.
Risk management involves recognizing risks that could result in losses and evaluating how to best reduce risk and loss (usually relating to insurance).
Loss control refers to a management philosophy that recognizes that losses will occur but attempts to minimize or control losses at a predetermined level.
Law enforcement refers to the actual enforcement of legal requirements that, if violated, will result in punishment to the offender.
Safety refers to ensuring that the workplace or conditions in the workplace are not inherently dangerous to people or, if they are dangerous, ensuring that proper protection devices or procedures are implemented to guarantee the continued well-being of people.
Fire protection simply incorporates the equipment, devices, policies, and procedures that are in place to protect life and property from fire loss.
As you study the material in this manual in an effort to learn as much as possible with regard to security training, ask yourself, “What type of career or profession have I entered into?” Various studies have been highly critical of the security industry, citing training inadequacies, poor selection and hiring practices, low pay, high turnover, and intense competition. If these studies are true, why would a person want to work as a security...

PDFPDF (Adobe DRM)
Größe: 8,7 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

EPUBEPUB (Adobe DRM)
Größe: 9,9 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Kommentar

von Heiko Ahlbrecht; Wolfgang Bär; Katharina Beckemper …

eBook Download (2023)
C. F. Müller (Verlag)
213,99
Mit Cannabisstrafrecht

von Carsten Krumm; Marco Ostmeyer

eBook Download (2024)
Nomos Verlagsgesellschaft mbH & Co. KG
69,00