E-Book, Englisch, 608 Seiten, Web PDF
E-Book, Englisch, 608 Seiten, Web PDF
ISBN: 978-0-08-049521-7
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark
* Brings together the expertise of more than 40 security and crime prevention experts
* Each chapter provides a wealth of practical information that can be put to use immediately
Lawrence J. Fennelly is an internationally recognized authority on crime prevention, security planning and analysis, and on the study of how environmental factors (CPTED), physical hardware, alarms, lighting, site design, management practices, litigation consultants, security policies and procedures, and guard management contribute to criminal victimization.Mr. Fennelly was previously employed with Apollo Security, Computershare, Inc., as well as a sergeant at Harvard College, employed by the Harvard University Police Department in Cambridge, Massachusetts. He was trained as a crime prevention specialist and served in this capacity for over 21 years at Harvard. He was also the department's training officer and assistant court officer. As part of his role as an officer at Harvard, Larry also was a deputy sheriff in both Suffolk and Middlesex counties (Massachusetts). Mr. Fennelly is a frequent speaker and lecturer on CPTED, physical security, school crime, and other issues. He serves as an expert witness who works closely with attorneys in defense as well as plaintiff cases, assisting in case preparation, offering knowledgeable questions to ask the opposing side, etc. He has also done a considerable amount of consultant work throughout the United States. His experience ranges from identifying vulnerabilities to conducting security and lighting surveys, working with architects to design and implement security, and developing long range guard training programs and risk assessments of various facilities.He is also a prolific author. His titles include such well-known security books as 'Crime Prevention Through Environmental Design,' 'Effective Physical Security,' and 'Handbook of Loss Prevention and Crime Prevention.'
Autoren/Hrsg.
Weitere Infos & Material
1;Cover;1
2;Copyright Page;5
3;Contents;8
4;Contributing Authors;14
5;Preface;16
6;PART ONE: INTRODUCTION;18
6.1;Chapter 1. Risk Assessment and Management;20
7;PART TWO: LOSS PREVENTION AND CRIME PREVENTION METHODS;24
7.1;Chapter 2. Designing Security with the Architects;26
7.1.1;Designing Security with the Architects;26
7.1.2;Designing Security and Layout of Site;27
7.1.3;Building SiteSecurity and Contractors;27
7.1.4;Ironmongery;29
7.1.5;Closed Circuit TV Checklist;30
7.1.6;Card Access ControlChecklist;30
7.1.7;Storage Rooms, Safes, and Vaults Checklist;31
7.1.8;Exterior Lighting Checklist;31
7.1.9;CrimePrevention Awareness Points;32
7.1.10;Appendix 2.A. Model Residential and Commercial BuildingSecurity Ordinance;32
7.1.11;Appendix 2.B. Standards;34
7.2;Chapter 3. Security Surveys;36
7.2.1;The Best Time to Conduct the Survey;37
7.2.2;Classification of Survey Recommendations;37
7.2.3;DevelopingSecurity Points;37
7.2.4;Nine Points of Security Concern;38
7.2.5;Personality of the Complex;39
7.2.6;Positive andNegative Aspects of Making Recommendations;39
7.2.7;Crime Analysis;39
7.2.8;Key Control;40
7.2.9;Closed CircuitTelevision;40
7.2.10;Intrusion Alarms;40
7.2.11;Lighting and Security;41
7.2.12;Security SurveyFollow-Up;41
7.2.13;Residential Security;41
7.2.14;Alarms;43
7.2.15;Appendix 3.A. Site Survey and Risk Assessment;46
7.2.16;Appendix 3.B. Physical Security Survey;48
7.2.17;Appendix 3.C. Plant Security Checklist;52
7.2.18;Appendix 3.D.Guard Security Checklist;54
7.2.19;Appendix 3.E. Office Security Checklist;55
7.2.20;Appendix 3.F. Home SecurityChecklist;56
7.2.21;Appendix 3.G. Fire Safety Inspection;58
7.3;Chapter 4. Internal Theft Controls;61
7.3.1;Introduction;61
7.3.2;What Is Honesty?;61
7.3.3;The Dishonest Employee;62
7.3.4;Management Responsibility in Loss;64
7.3.5;Program for Internal Security;65
7.3.6;Procedural Controls;67
7.3.7;When Controls Fail;73
7.3.8;Case Study;74
7.3.9;Summary;75
7.4;Chapter 5. Executive Protection;76
7.4.1;Rise of Terrorism in the United States;76
7.4.2;Formulating a Protection Plan;77
7.4.3;Threat Assessment;77
7.4.4;Planning;77
7.4.5;Home and Office Survey;77
7.4.6;Procedural Vulnerability;78
7.4.7;Physical Vulnerability;78
7.4.8;Protection in Transit;79
7.4.9;Everyday Security Awareness;80
7.4.10;If an Abduction Occurs;81
7.5;Chapter 6. Awareness;83
7.5.1;Awareness and Knowledge Strategies;83
7.5.2;Neighborhood Watch Guidelines;84
7.5.3;How to AvoidBecoming the Victim of an Attacker;85
7.5.4;Safety Checklist for Apartments;86
7.5.5;Robbery Prevention„Tips for Small Business;87
7.5.6;Burglary Prevention„Tips for Small Business;88
7.5.7;Suspicious Situations toReport;90
7.5.8;Vehicle Theft„a Big Problem;90
7.5.9;Safety Skills for Children;92
7.5.10;Street Smarts„How toProtect Oneself;94
7.5.11;The Con Artist;95
7.5.12;Crime Prevention Tips for Senior Citizens;96
7.5.13;Protection fromTelemarketing Fraud;97
7.5.14;Crime Prevention Tips at ATMs;97
7.6;Chapter 7. Crime Prevention through Environmental Design Strategies and Applications;99
7.6.1;Crime Prevention through Environmental Design Strategies;99
7.6.2;CPTED Applications;100
7.6.3;Objectives for the Commercial Environment;100
7.6.4;Downtown Streets and Pedestrian Areas.Parking Lots and Structures;101
7.6.5;Office and Industrial Systems;112
7.6.6;Hallways and Restrooms;115
7.6.7;Malls and Shopping Centers;117
7.6.8;Convenience Stores;121
7.6.9;Branch Banks;126
7.6.10;Objectives forthe Residential Environment;127
7.6.11;Objectives for the School Environment;137
7.6.12;Convention Centers andStadiums;147
8;PART THREE: SECURITY OPERATIONS AND EQUIPMENT;150
8.1;Chapter 8. Approaches to Physical Security;152
8.1.1;Levels of Physical Security;152
8.1.2;The Psychology of Maximum Security;155
8.1.3;The Value of Planning;155
8.1.4;Physical Barriers;159
8.1.5;The Security Plan;161
8.1.6;Conclusion;163
8.2;Chapter 9. Physical Barriers;165
8.2.1;Doors;165
8.2.2;Roofs;172
8.2.3;Floors;174
8.2.4;Fences;175
8.2.5;Walls and Moats;178
8.3;Chapter 10. The Use of Locks in Physical Crime Prevention;182
8.3.1;Lock Terminology and Components;182
8.3.2;Key-Operated Mechanisms;182
8.3.3;Combination Locks;190
8.3.4;Lock Bodies;192
8.3.5;Door Lock Types;193
8.3.6;Strikes;199
8.3.7;Attacks and Countermeasures;200
8.3.8;Locks and the SystemsApproach to Security;210
8.3.9;Key Control;210
8.3.10;A New Standard Set for Exit Devices, Locks, and Alarms;211
8.3.11;Appendix 10.A. Key Control and Lock Security Checklist;212
8.3.12;Appendix 10.B. Terms and Definitionsfor Door and Window Security;213
8.4;Chapter 11. Safes, Vaults, and Accessories;224
8.4.1;Choose the Right Container;224
8.4.2;UL-Rated Combination Locks;225
8.4.3;Relocking Devices;225
8.4.4;Locking Dials;226
8.4.5;Lockable Handles;227
8.4.6;Time Locks;227
8.4.7;Time-Delay Combination Locks;227
8.4.8;Alarmed Combination Locks;228
8.4.9;Vision-Restricting and Shielded Dials;228
8.4.10;Combination Changing;228
8.4.11;Safe Burglaries;229
8.4.12;OvercomingSafe-Opening Problems;231
8.4.13;Appendix 11.A. Rating Files, Safes, and Vaults;232
8.5;Chapter 12. Security Lighting;235
8.5.1;Illumination;235
8.5.2;Lamps;236
8.5.3;Twenty-Five Things You Need to Know about Lighting;237
8.5.4;Energy Management;238
8.5.5;Lighting Checklist;238
8.5.6;Protective Lighting Checklist;239
8.6;Chapter 13. Alarms: Intrusion Detection Systems;240
8.6.1;Components of Alarm Systems;240
8.6.2;Application;247
8.6.3;Alarm Control;247
8.6.4;Alarm Transmission/Signaling;248
8.6.5;Alarms Deter Crime;249
8.6.6;False Alarms;249
8.6.7;Alarm Equipment Overhaul;250
8.6.8;Additional Resources;250
8.6.9;Conclusion;251
8.6.10;Appendix 13.A. Smoke Detectors;251
8.7;Chapter 14. CCTV Surveillance;253
8.7.1;Protection of Assets: An Overview;253
8.7.2;History;254
8.7.3;Role of CCTV in Asset Protection;255
8.7.4;CCTV asPart of the Emergency and Disaster Plan;256
8.7.5;Emergency Shutdown and Restoration;257
8.7.6;SecurityInvestigations;258
8.7.7;Safety;258
8.7.8;The Security Officer’s Role;258
8.7.9;Training and Education of Employees;258
8.7.10;Synergythrough Integration;259
8.7.11;CCTV’s Role and Applications;260
8.7.12;Problems Solved by CCTV;261
8.7.13;Choice of Overt orCovert CCT;261
8.7.14;Security Surveillance Applications;261
8.7.15;Safety Applications;262
8.7.16;CCTV Access Control;262
8.7.17;TheBottom Line;262
8.7.18;Appendix 14.A. Glossary;264
8.7.19;Appendix 14.B. Designing Effective CCTV Systems;267
8.8;Chapter 15. Guard Service in the Twenty-First Century;270
8.8.1;Liabilities Connected with Guard Force;270
8.8.2;Power and Authority of the Security Guard;271
8.8.3;Training;271
8.8.4;Report Writing;271
8.8.5;Weapons Safety;272
8.8.6;Safety;273
8.8.7;Safety Checklist;273
8.8.8;Bomb Threats;274
8.8.9;Bomb Search;274
8.8.10;Fire Protection;275
8.8.11;Fire Prevention;275
8.8.12;Emergency Medical Assistance;276
8.8.13;Reporting a Medical Case;277
8.8.14;Guard Supervision;277
8.8.15;Conclusion;282
8.9;Chapter 16. Bomb and Physical Security Planning;283
8.9.1;Bombs;283
8.9.2;Bomb Threats;283
8.9.3;Why Prepare?;284
8.9.4;How to Prepare;284
8.9.5;Security against Bomb Incidents;284
8.9.6;Responding to Bomb Threats;286
8.9.7;Decision Time;286
8.9.8;Evacuation;287
8.9.9;Search Teams;287
8.9.10;Search Technique;287
8.9.11;When a Suspicious Object Is Located;289
8.9.12;Handling the News Media;289
8.9.13;Summary;289
8.9.14;Appendix 16.A.Suspect Package Alert;290
8.9.15;Appendix 16.B. Bomb Threat Checklist;291
8.9.16;Appendix 16.C. Mail Handlers andSuspicious Mail Procedures;292
9;PART FOUR: SECURITY AND CRIME PREVENTION APPLICATIONS;294
9.1;Chapter 17. Cargo Security: Intermoda/Logistics„The Complete Overview;296
9.1.1;Prevention Plan;297
9.1.2;Pilferage;298
9.1.3;Theft;298
9.1.4;Organized Crime;300
9.1.5;Cargo Package and Movement Controls;301
9.1.6;Trucking Operations;301
9.1.7;Appendix 17.A. Cargo Security Checklist;315
9.1.8;Appendix 17.B. PersonnelSecurity Checklist;320
9.1.9;Appendix 17.C. Physical Security Checklist;323
9.1.10;Appendix 17.D. InspectionReport Forms;324
9.1.11;Appendix 17.E. Documentation;326
9.1.12;Appendix 17.F. The Role of Private Security;328
9.2;Chapter 18. Lodging (Hotel/Motel) Security;329
9.2.1;Security Department Structure;329
9.2.2;Size of the Department;330
9.2.3;Reporting Level in the Organization;331
9.2.4;Role of Security;332
9.2.5;Training;334
9.2.6;Theft;336
9.2.7;Opportunities and Trends;339
9.2.8;Legal Issues;342
9.2.9;The Future ofLodging Security;346
9.3;Chapter 19. Retail Security: Lessons Learned from Convenience Store Research;347
9.3.1;New Challenges;347
9.3.2;Increase in Crime;347
9.3.3;The Research;349
9.3.4;Research Underway;354
9.3.5;The RecommendedProgram;354
9.3.6;Conclusions;355
9.4;Chapter 20. Putting an Extra EYE/IŽon CCTV: Managing Risk in Retail;358
9.4.1;Old Tech to New Tech;358
9.4.2;Rationale for Technology;358
9.4.3;Definition of Interactive;358
9.4.4;How InteractiveMonitoring Reduces Risk;359
9.4.5;How to Evaluate the Service Provider;359
9.4.6;Why Isn’t This Everywhere:Cost versus Availability?;360
9.4.7;How ICCTV Works;360
9.4.8;CCTV versus ICCTV;361
9.5;Chapter 21. Perspectives on Safe School Administration;362
9.5.1;Emphasize Crime and Deviance Prevention during Teacher Education;363
9.5.2;Maintain a Sense ofOwnership in School Grounds and the Surrounding Neighborhood;363
9.5.3;Conduct Periodic RiskAssessments or Security Surveys;363
9.5.4;Clearly State Rules and Regulations;363
9.5.5;Conduct a Crime andDeviance Analysis;363
9.5.6;Develop an Incident Mapping System;363
9.5.7;Utilize Parent Volunteers asMonitors and Student Aides;363
9.5.8;Institute After-School Programs;364
9.5.9;Security Considerations ShouldBe Incorporated from the Ground Up.Ž;364
9.5.10;Establish In-Class Communication between Teachersand Administration;364
9.5.11;Institute a Safety and Security Committee;364
9.5.12;Value the Contributions ofCustodial Personnel;364
9.5.13;Train Personnel in Graffiti Interpretation;364
9.5.14;Schools Need Central OfficeSupport;364
9.5.15;Value Aesthetics;365
9.5.16;Foster Students’ Beliefs They Are Connected to the School;365
9.5.17;DoNot Use Student Monitors;365
9.5.18;The Combustible EngineŽ Model of School Communities;365
9.5.19;Createa Crisis Management Plan;365
9.5.20;Train Personnel in Conflict Resolution;365
9.5.21;Implement CharacterEducation Curricula;366
9.5.22;Create Law-Related Education Modules to Be Incorporated in SocialStudies Courses;366
9.5.23;Establish Communities within Schools.Ž;366
9.5.24;Avoid Peer-Group Counseling;366
9.5.25;Instill an Awareness of the Dangers of Terrorism;366
9.6;Chapter 22. Campus Security and Crime Prevention;367
9.6.1;Communication;367
9.6.2;Key Elements in a Campus Crime Prevention Program;367
9.6.3;Commitment;368
9.6.4;Cycle of Activity;368
9.6.5;Specific Programs;369
9.6.6;The Campus Security Act of 1990;370
9.6.7;Neighborhood Watch on the the College Campus;371
9.6.8;Phones on Campus;372
9.6.9;Thefts in the Library;372
9.6.10;Bicycle Theft Prevention;372
9.6.11;Administration Office Security Programs;372
9.6.12;Operation Identification;372
9.6.13;Intrusion Alarms;373
9.6.14;Conclusion;373
9.7;Chapter 23. Hospitals and the Health-Care Security Environment;374
9.7.1;Categories of Health Care;374
9.7.2;Types of Hospitals;375
9.7.3;The Foundation of Health-Care Security: Risks;375
9.7.4;Basic Health-Care Security Risk and Areas of Vulnerability;375
9.8;Chapter 24. Library Security;379
9.8.1;Risk Assessment Terminology;380
9.8.2;Identifying Risks;380
9.8.3;Assessing Likelihood;381
9.8.4;Assessing Consequences;381
9.8.5;Qualifying Risks;382
9.8.6;Managing the Risk;382
9.8.7;The Scope of Security Problems in;383
9.8.8;Security Risk Management Strategies;384
9.8.9;Dealing with Specific Threats;385
9.8.10;Conclusion;386
9.8.11;Security Management Resources;386
9.9;Chapter 25. High-Rise Security and Fire Life Safety;387
9.9.1;High-Rise Assets;387
9.9.2;Threats to Security and Fire Life Safety;387
9.9.3;Security of Modern High-Rise;389
9.9.4;Fire Safety of Modern High-Rise Buildings;390
9.9.5;Summary;392
9.10;Chapter 26. Multiresidential Security;393
9.10.1;Apartments;394
9.10.2;Condominiums;394
9.10.3;Levels of Security;395
9.10.4;Personnel;395
9.10.5;Physical Security and Hardware;398
9.10.6;Procedures;400
9.10.7;The Elderly;401
9.10.8;Some Special Areas of Vulnerability;401
9.10.9;Disasters;402
9.10.10;Legislation;402
9.10.11;Basic Steps to Remember in Multiresidential Security;403
9.11;Chapter 27. Workplace Violence: Anticipation through Process, Not Prediction of Results Revisited;404
9.11.1;Causes and Avoidance of Claims of Inadequate Security;405
9.11.2;Job Applicant;406
9.11.3;Narrowing the Focus of the Workplace Violator Profile;406
9.11.4;Case Studies in Workplace Violence;407
9.11.5;OrganizationalDynamics;409
9.11.6;The TeamŽ Concept and Shared Expectations as an Approach to WorkplaceMotivation;409
9.11.7;Why Dont Subordinates Do What They Are Supposed to Do?Ž;410
9.11.8;Steps to Reducethe Opportunity for Workplace Violence;410
9.11.9;The Predatory Prevention Matrix;410
9.11.10;Process versusOutput, or the Difference between High CrimeŽ and High Profit.Ž;411
9.11.11;Uses of the PredatoryPrevention Matrix;412
9.11.12;An Apartment Case Study;414
9.11.13;The Magic Chair;416
9.11.14;Defense against WorkplaceViolence: Possible or Probable?;416
9.12;Chapter 28. Domestic Violence: Everyone’s Problem;419
9.12.1;What Is It;419
9.12.2;Who Are the Victims;420
9.12.3;Why Abusers Abuse;420
9.12.4;What We Do Know;420
9.12.5;Law EnforcementResponse;421
9.12.6;Options for Protection;422
9.12.7;Government Involvement;423
9.12.8;Conclusion;423
9.13;Chapter 29. Personal Safety and Self-Defense;424
9.13.1;Introduction;424
9.13.2;Violent Crimes;424
9.13.3;Self-Defense;426
9.14;Chapter 30. Designing Crime Risk Management Systems;427
9.14.1;Understanding Crime Risk Management;427
9.14.2;Who Is the Client?;428
9.14.3;The Client-PractitionerRelationship;429
9.14.4;Crime Pattern Analysis;429
9.14.5;Conducting the Security Survey;430
9.14.6;Determination ofProbable Maximum Loss;431
9.14.7;Making Recommendations to Clients;433
9.14.8;Conclusion;434
9.15;Chapter 31. Planning, Management, and Evaluation;435
9.15.1;The Concepts Defined;435
9.15.2;Statistical Information: The Backbone for Design of a PreventionProgram;437
9.15.3;Crime Statistics;437
9.15.4;Demographic Data;440
9.15.5;Efficiency Analysis: Measuring Activity;441
9.15.6;Effectiveness Analysis: Measuring Program Impact;442
9.15.7;Attitudinal Analysis: Gathering Opinionson the Program Impact;443
9.15.8;A Strategy to Facilitate Implementation of the Evaluation;444
9.16;Chapter 32. Financial Institution Security;448
9.16.1;The Bank Protection Act of 1968;448
9.16.2;The Role of the Security Department;450
9.16.3;Current RisksAffecting Financial Institutions;450
9.16.4;Criminal Reporting;454
9.16.5;Bank Security Devices;455
9.16.6;Security Trainingin Financial Institutions;456
9.16.7;Other Federal Regulations with an Impact on Banking;457
9.16.8;Critical Issuesin Financial Institution Security;458
9.17;Chapter 33. Automatic Teller Machines (ATMs);459
9.17.1;Responsibility of an ATM Owner;459
9.17.2;Case Study from Ann Arbor Police Department: LawEnforcement and ATM Safety;459
9.17.3;Ann Arbor, Michigan’s Guidelines for Automatic Teller Machines User Safety;460
9.17.4;Appendix 33.A.ATM Safety Tips;462
9.17.5;Appendix 33.B.ATM SafetyChecklist;463
9.18;Chapter 34. Telecommunications Fraud;464
9.18.1;How Does It Happen?;464
9.18.2;How to Find Out;464
9.18.3;How to Reduce Vulnerability;465
9.18.4;How to Stop It;465
9.19;Chapter 35. Electronic Surveillance and Wiretapping;466
9.19.1;Countermeasures;467
9.19.2;Economic Espionage Act of 1996;468
9.20;Chapter 36. Safety Websites;470
9.20.1;Introduction;470
9.20.2;Safety Websites;470
9.21;Chapter 37. Homeland Security;471
9.21.1;Gov. Ridge Announces Homeland Security Advisory System;471
9.21.2;National Framework for Federal,State, and Local Governments, Private Industry, and the Public;471
9.21.3;Factors for Assignment ofThreat Conditions. Unified System for Public Announcements;471
9.21.4;A Tool to Combat Terrorism.Homeland Security in 2002;472
9.21.5;HITS and IFPO Computer-Based and Web-Based Security OfficerTraining;472
9.21.6;Final Comments;473
9.22;Chapter 38. Security of Information Systems;474
9.22.1;Conclusion;476
9.22.2;Security Organizations;477
9.23;Chapter 39. Counterespionage and Information Security Management;478
9.23.1;Reasons for Attacking Computers;478
9.23.2;Methods of Attacking Computer Systems;479
9.23.3;Methods ofDefense;479
9.23.4;Roots of Industrial Espionage;479
9.23.5;Historic Attacks on Computers and Networks;480
9.23.6;RecentLawsuits;480
9.23.7;Covert Action;481
9.23.8;Theft;481
9.23.9;Other Causes of Information Loss;481
9.23.10;Why People StealInformation;482
9.23.11;Types of Attacks;482
9.23.12;Espionage Methods;482
9.23.13;Rogue Use;483
9.23.14;Competitive Intelligence;483
9.23.15;Human Error;483
9.23.16;The WAECUP Human Factors Protocol;484
9.23.17;Human Factor Training Practices;485
9.23.18;Electronic Surveillance and Countermeasures;485
9.23.19;Telecommuting;487
9.23.20;Wireless Mike Dangers: AnExample;488
9.23.21;Computer Passwords;488
9.23.22;Current Security Issues;488
9.23.23;Host-Based Perimeter Defense;489
9.23.24;EMail;490
9.23.25;Local Area Network;491
9.23.26;Radio Links;492
9.23.27;Encryption;492
9.23.28;Investigations;494
9.23.29;Trade Secrets;496
9.24;Chapter 40. Emergency Management;498
9.24.1;Crisis, Disaster, Catastrophe„Are You Ready?;498
9.24.2;The Emergency Management Plan Is Only asGood as the Last Drill;500
9.25;Chapter 41. The Security Professional, Terrorism, Bio-Terrorism, and the Next Level;504
9.25.1;The Security Professional and Terrorism;504
9.25.2;Terrorism and the Terrorist;505
9.25.3;UnderstandingTerrorism;506
9.25.4;Terrorist Groups and Organizational Structure;507
9.25.5;Mechanism of Violence andAssociated Risk Factors;508
9.25.6;Assessing Threats from Terrorism and Developing EffectiveCountermeasures;508
9.25.7;The Security Manager’s Responsibilities;518
9.25.8;Conclusion;519
10;Index;521