protection report final copy

11
Security Management-LAWS-LS350-03 Protection Report Mohawk College-Michael Pearson Melissa Gibson ID #000330911 [Pick the date]

Upload: melissa-gibson

Post on 19-Aug-2015

16 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Protection Report Final Copy

Security Management-LAWS-LS350-03

Protection Report

Mohawk College-Michael Pearson

Melissa Gibson ID #000330911[Pick the date]

Page 2: Protection Report Final Copy

As a security manager it my duty to provide information about possible security measures that can be implemented to help provide the appropriate physical security measures that will enable target hardening. Physical security measures are the first line of defense against threats and hazards that may disrupt business continuity, security, and/or integrity. Some of the physical security measures that will be discussed in detail will be as follows; public CCTV, locks, alarm systems, barriers both natural and manufactured.

Public CCTV

Closed circuit television is surveillance technology used in the security industry. The most important aspect surrounding CCTV is the system’s ability in “which a number of video cameras are connected in a closed circuit or loop, with the images produced being sent to a central television monitor or recorded.” (Ratcliffe, 2006) Recording facilities can work in different ranges such as recording images from selected cameras, having the recording switch from multiple cameras on a rotating basis to capture images on one tape, or employing digital technology to record images from multiple cameras.

The growth of public CCTV has been steady within Canada and has largely been influenced by CCTV’s used in the UK. In fact, Canada commonly consults with the UK authorities when implementing public CCTV. In 1996 Sudbury, Ontario’s Chief Alex McCauley implemented, due to the influences of Glasgow’s downtown, the ‘Lions Eye in the Sky’. The five cameras that monitor the downtown area and the rail yard in Sudbury has been said, by The Greater Sudbury Police Services, that the systems are responsible for deterring 300-500 robberies, assaults thefts, and many other criminal offences. This deterrence has saved the city of Sudbury approximately $800,000 in direct monetary losses.

Public CCTV is most commonly used in Canada as a tool for public or open-street CCTV and public transport camera surveillance. Public CCTV’s can be utilized to monitor public parks, pedestrianized city centres, outdoor parking areas, residential neighborhood streets, public transport interchange, and outside public facilities. Areas that may have large concentrations of people are generally targeted for use of public CCTV, including areas that may have a considerable amount of bars that increase the possibility of criminal and antisocial behaviours.

Public CCTV is a physical security measures that contributed to target hardening. It provides a visual line of security and lowers the risks of threats and hazards. Public CCTV helps in deterring crime, gathering evidence, allows for deployment of law enforcement, and increases the public perception of safety. Of course this deterrence can only occur when proper signage and awareness surrounding the CCTV in place. Counter terrorism is also another common contributor to the implementation of CCTV.

“Current public opinions research, whether from marketing firms, political organizations and media outlets of from social science, consistently shows strong support for the use of camera surveillance in public and in private spaces.” (Wade Deisman, 2009) Although the usefulness of CCTV has not yet be proven in any evaluation CCTV has been seen as a useful tool against crime. “In a 2006 survey (Surveillance Project 2008), only about a third of Canadians polled claimed to be ‘somewhat familiar’ with CCTV as a surveillance technology, although when asked specific questions such as whether their workplace should monitor by camera the majority believed it to be acceptable but only if informed consent has been obtained.” (Wade Deisman, 2009)Overall the public perception of public CCTV is relatively positive in the Canadian population.

Page 3: Protection Report Final Copy

Although there is a relatively positive public perception surrounding public CCTV there is still some groups that show some ambivalence towards cameras. There are still some concerns that linger around public CCTV. One concern that surfaces is about ‘function creep’, which is when a camera system is installed for one purpose and used for other purposes. Another concern about public CCTV is how the information gathered from CCTV will be used. Recorded images should only be released for reasons to enhance the criminal justice system. For example, “camera operators have been caught selling tapes for entertainment and journalistic purposes.” (CIPPIC, 2007) “Camera schemes and implementation of camera surveillance has never been extensively debated as a national policy issue.” (Wade Deisman, 2009) CCTV may have not become an issue of national policy, but in 2003 had made its way to the court room. Privacy Commissioner George Radwanski attempted to challenge public CCTV in Canada. Commissioner Radwanski felt that CCTV violated Section 8 of the Canadian Charter of Rights and Freedoms. The Commissioner lacked the power to launch the lawsuit due to procedural issues surrounding his case.

Locks

Locks have been around since before the birth of Christ. They have been mentioned in the Bible and have continued throughout time. Locks once began as a crude device mad out of wood and have evolved over time into advance mechanisms of technology. Locks are mechanisms that secure or fasten and/or restrict access items of value, people, or property from those who do not have a form of a key.

There are many types of locks that can be used depending on the value of the items, people or property that needs to be secured. Padlocks, being the simplest form of locks, can be utilized to secure small amounts of items of lower value. Deadbolts, knob locks, rim/mortise locks and lever handle locks are commonly used on doors whether they are for residential or commercial doors. These locks are some of the most common and typical locks used for different levels of security. We must remember that not all locks are your typical lock and key such as the ones you may use to access your home. Locks can vary in appearance, sizes, and formats. A key can be just as unconventional as the lock. A key is simply the item that will unlock whatever mechanism that has been in put in place. For example, some more advanced level locks would be keypad locks, access card locks, password protected are all ways to create protection for multiple items of value. Scanning is also another form of locking mechanisms that can be used to secure access from valuable items. The creation of retinal, hand, and fingerprint scans are unique keys that allow access to generally high items of value.

“Locks are considered a delay device” (Electronic Physical Security Toolbox, 2013) Locks provide physical security and are the first line in protection and allows for target hardening. They protect items both big and small, items that vary in value, as well as people and property. Residence utilizes locks to protect the items within their homes and their families. Some parents may use cabinet locks to protect their children from access to medication, alcohol, guns and other harmful items. Commercial business’s use many forms of locks to protect from entry into the property, to restrict or limit access from sensitive information or specific areas within the facility. Each individual user can utilize the various forms of locks to protect whatever they feel requires it.

Page 4: Protection Report Final Copy

“Locks are the most accepted and widely used security devices for protecting facilities, sensitive or classified materials, and property.” (Electronic Physical Security Toolbox, 2013)”Burglars spend no more than 60 seconds breaking into a home.” (Dr. Simon Hakim) Depending on the quality of the lock it can take a considerable amount of time to break. Of course with the right tools, power and knowledge anybody can break through a lock. With that being said locks should never be considered a standalone security method.

Alarm Systems

A security alarm is a system that has been designed to detect intrusion of unauthorized entry or a device that alerts you to a problem or condition. Alarms were created as a detection component to preventing threats and hazards from occurring. Alarm systems act as a physical aspect of security. It is a part of the first line of defence and contributes to target hardening in the line of security. Alarms don’t just function as a line of security for the perimeter of what needs to be protected. Alarm systems also act and an alerting system informing you of problems or conditions such as fires, carbon monoxide, etc.

Alarm systems are used in many areas by many people for varying reasons. Residential, commercial, and industries all use fire alarm systems to alert them of smoke and fire. Some residents and industries go one step further in detecting environmental changes by using carbon monoxide detectors. Security alarm systems are used in both homes and business. These systems can include glass breaker alarms, motion sensors, keypads, doors and window contact alarms. Business’s such as banks may also include panic buttons as an extension to their alarm system.

Alarms are part of a physical security measure that increase target hardening of the materials or people to be protected. Alarms are also systems that detect events such as fire, gas leaks or environmental changes that pose a threat to people. Alarms can be used a deterrence to criminals when awareness of the alarm systems are properly put in place. When an alarm is triggered, as long as it is not a silent alarm, it could scare an intruder away.

“Whether an alarm system work to deter break-ins largely depends on the system itself. Burglars themselves give alarms mixed reviews.” (Lipinski, 2001)”Studies from both the United States and the United Kingdom have a shown burglar alarms to be among the most effective burglary-deterrence measures.” (Popcenter)Statics back up the effectiveness of fire alarms and their ability to alert and save lives. Between 2007 and 2011 37% of home fire deaths occurred in homes with no smoke alarms and 23% fire deaths occurred in homes with inoperable smoke alarms. These numbers reflect that fire alarms prevent deaths by fire by 50%.

Although alarms do show a high effectiveness rate in deterring crime, threats, and hazards there are still some concerns bear side these systems. Wireless systems can suffer interference when metal objects, electrical wiring, and electronic devices are placed near sensors or the control panel. Of course these alarm systems can be tampered with and disarmed by those who have the knowledge and the tools to do so. Alarms may only cause a delay in access to the property and should be paired with other measures of security. Alarms are key components to detecting threats that may be entering the home or place of business, but can only be effective if properly operated and is functional. Ensuring that the alarm systems work, no matter the type of system, is an essential component to how successful these devices can be.

Page 5: Protection Report Final Copy

Barriers

Barriers are obstacles, whether they are manufactured or natural, that prevents movements of access or keep people or things a part to prevent communicating or progress. These barriers can be physical, natural, or structural. Natural barriers can include mountains, cliffs, canyons, rivers, and other difficult terrain. Structural barriers may include fences, walls, floors, grills, bars and other structures to deter penetration.

Barriers are security measures that are used in crime prevention through environmental design. Barriers act as physical security that creates a level of target hardening. Barriers can be used to deter those who may wish to interact in deviant behaviour and help reduce threats and hazards. A natural barrier such as hedge bushes in front of a home destroys the ‘broken window theory’ and helps create ownership to the property. This perception of ownership transcends into the idea that someone cares about the property and can discourage those to try and commit acts of deviance. Barriers, whether they are natural or manufactured, can create an obstruction of access and escape.

Barriers can be used to provide perimeter protection and become a fist line of defence in physical security. Barriers may also be utilized to direct traffic away from specific areas or towards desired areas. Natural barriers such as large rocks or foliage or manufactured barriers such as a fence can redirect and deter pedestrians from getting close to the edge of a cliff. Residents, commercial and industrial businesses can all utilize barriers as a security mechanism. Barriers are essentially used by anyone that can utilize them as deterrence, but don’t interfere with the image presented to the public.

Utilizing barriers to lower the risk of threats and hazards may not always work. If barriers are not properly placed they can be used to help hide the acts of crime or create hazards themselves. Not all barriers are aesthetically appealing. Barriers that are aesthetically appealing are not always a means of highs security. This is a common conflict with implementing barriers as a form of security for businesses with high risk of threats or hazards. Residents use barriers such as hedge bushes and small fences around the front perimeter of their home. Some may not even notice that this ‘decorations’ is acting a measure of security for their home. Businesses are more aware of their use of barriers as they are responsible for a level of security and have assets to protect, but also want to consider the image and perception by the public in doing so.

Human Protection Systems

Human protection is any security or protection strategy that uses a person as the major component such as surveillance, close protection, and security guards. There are many different protection strategies put into place to protect a variety of areas. For example, we have CAS as a protection strategy for the health and welfare of children. Close protection has been around since the dawn of the ages, since kings and queens required close guard protection from their enemies. We have had security and private investigations since Pinkerton National Detective Agency in 1851. Human protection systems are a personnel security measure to protect people, property and anything of value.

Close protection is used to protect people from threats. These people could be executives, dignitaries and celebrities. Surveillance is used to monitor the behaviour and activities of people for the purpose of directing, managing and protecting them. Surveillance that includes people such as guards on foot or watching CCTV screens are generally used by businesses. Most people don’t hire a security guard to walk around the perimeter of their home or continuously watch surveillance images from cameras

Page 6: Protection Report Final Copy

around their home. Businesses that have a responsibility to secure people, dangerous material, or items of high value would utilize security guards to survey, direct, manage and protect their assets. When it comes to protection strategies everyone might use them based on the need of the services these agencies provide. Child protection agencies can be used by any child no matter their culture, race, sex and socioeconomic status. Anyone who has reasonable grounds to believe that the environment may be in danger by those who pose a threat can call environmental protection agencies. These agencies have strategies put into place that allow them to protect the element of their concern.

Human protection systems are put into place to provide protection to different elements of value, whether they people, property, material or information of high value. Depending on the method of protection used it can utilize other areas of security measures to enhance its protection strategy. For example, security guards may use CCTV, locks, alarm systems, and access control as a way to enhance their ability to properly survey and protect the people, property, materials, or valuable information they are responsible for. They will utilize other physical security measures to allow target hardening and as a first line of defence. Human protection systems are put into place to deter others who may become a threat to the element of value. Having a secured detail on a dignitary creates a visual and psychological perception of security and helps deflect possible threats. Security guards surveying a property allow those of deviant nature to see that their risk level is higher than the rewards they will receive for their criminal behaviour.

Human protection systems are used all over the world for various reasons. Today we continue to utilize the services that provide measure of security in personnel protection. The United States Presidents have consistently used protective detail since the assassination of William McKinley in 1901. With the growing numbers and increased employment in the security industry it’s become very clear that surveillance, close protection, and protection strategies are now a commonly used. In fact human protection is so highly thought of that President Obama signed a law in 2013 to have all past presidents and their families issued a lifetime of Secret service Protection.

Although we have human protection systems in place doesn’t mean that they are 100% effective. We may have protection strategies in place to help protect human rights and children’s welfare, b ut that doesn’t stop people from hurting them every day. More than not our dignitaries are protected and kept safe, but there are times when close protection fails. The assassination of J.F. K is a great example of the failures that can occur with human protection systems. It is always important to remember that no security measure is a 100% and that we should always be diligent in all measures of security in when it comes to human protection.

Page 7: Protection Report Final Copy

BibliographyAlarm Industry research, E. F. (n.d.). The Greenwhich Case. (AIREF) Retrieved November 30, 2014, from

http://c.ymcdn.com/sites/www.esaweb.org/resource/collection/45356150-7B2E-4856-9571-E7D302727B0C/The_Greenwich_Case.pdf

Association, N. F. (2014, March). Retrieved December 1, 2014, from Smoke Alarms in U.S. Home Fires: http://www.nfpa.org/research/reports-and-statistics/fire-safety-equipment/smoke-alarms-in-us-home-fires

Chellew, C. (2009, June 8). Retrieved December 2, 2014, from http://basicsnewsletter.blogspot.ca/2009/06/dangers-of-public-surveillance.html

CIPPIC. (2007, June 2). Retrieved November 30, 2014, from https://cippic.ca/index.php?q=public-video-surveillance/#faq_privacy-concerns

Dave Noordam, F. C. (2007, 10 December). Firefighting in Canada. Retrieved Decemeber 2, 2014, from http://www.firefightingincanada.com/prevention/smoke-alarms-evaluating-effectiveness-1332

DIY Security Forum. (2013, May 10). Retrieved Decemeber 1, 2014, from http://blog.homesecuritystore.com/2013/05/10/the-7-different-types-of-alarms-you-should-know-something-about/

Dr. Simon Hakim, A. I. (n.d.). A study on Burglar Alarm Effectiveness for Surburban Home Using data Gathered from Greenwich, Conn. Retrieved December 1, 2014, from http://c.ymcdn.com/sites/www.esaweb.org/resource/collection/45356150-7B2E-4856-9571-E7D302727B0C/The_Greenwich_Case.pdf

Electronic Physical Security Toolbox. (2013, March 29). Retrieved December 1, 2014, from Missoula Technology and Development Center: http://www.fs.fed.us/t-d/phys_sec/deter/index.htm

Electronic Security Association. (n.d.). ALARM.ORG. Retrieved Decemeber 1, 2014, from http://www.alarm.org/BusinessSafety/BusinessAlarmSystems.aspx

Exterior Protection. (2013, January 11). Retrieved November 30, 2014, from http://www.usgs.gov/usgs-manual/handbook/hb/440-2-h/440-2-h-ch4.html

Knoller, M. (2013, January 12). CBS News. (CBS News) Retrieved December 2, 2014, from http://www.cbsnews.com/news/obama-restores-lifetime-secret-service-for-former-presidents/

Lipinski, E. (2001, May 20). The New York Times. Retrieved December 1, 2014, from http://www.nytimes.com/2001/05/20/nyregion/weighing-options-in-alarm-systems.html

Lipinski, E. R. (2001, May 20). (N. Y. Archives, Producer) Retrieved December 1, 2014, from http://www.nytimes.com/2001/05/20/nyregion/weighing-options-in-alarm-systems.html

Popcenter. (n.d.). Retrieved December 1, 2014, from The Causes, Effectiveness & Costs of Flase Burglas Alarms: http://www.popcenter.org/problems/false_alarms/2

Page 8: Protection Report Final Copy

Ratcliffe, J. (2006). University at Albany. Retrieved 11 30, 2014, from Popcenter: http://www.popcenter.org/Responses/video_surveillance/print/

Raub, E. (2012). Safe and Sound Family. Retrieved November 30, 2014, from http://safesoundfamily.com/blog/8-burglar-deterrents-to-consider-and-5-to-avoid/

Wade Deisman, P. D.-L. (2009, January). A Report on Camera Surveillance in Canada, Surveillance Camera Awareness Network (SCAN).