31
Introduction to Security Chapter 9 Preventing Losses from Criminal Actions

1 Introduction to Security Chapter 9 Preventing Losses from Criminal Actions

Embed Size (px)

Citation preview

Chapter 9

1Introduction to SecurityChapter 9Preventing Losses from Criminal Actions

2Enforcing Proprietary RightsNot all crimes can be prevented.Security officers are expected to act to protect the assets of their employers, and cannot always assume local authorities will handle the situation.Some of these problems may not be actual violations of a criminal code, so they are securitys responsibility.

3 Proprietary RightsPrevent trespassingControl conduct of persons legally on the premisesDefend self, others and propertyPrevent the commission of a crime

4Criminal OffensesMisdemeanor a minor crime that is punishable by a fine and/or a relatively short jail sentence (less than a year)Felony a serious crime, such as murder, robbery or rape, which is punishable by imprisonment in the state prison system or death

5Uniform Crime Reports (UCR)Statistics are voluntarily reported by nearly 17,000 law enforcement agencies, and compiled annually by the FBI.

62005 UCR results:1 violent crime every 22.7 seconds1 murder every 31.5 minutes1 forcible rape every 5.6 minutes1 robbery every 1.3 minutes1 aggravated assault every 36.5 seconds1 larceny-theft every 4.7 seconds1 burglary every 14.6 seconds1 motor vehicle theft every 25.5 seconds

7Crimes of Concern to Private Security and Steps to Deal with Them:Larceny/ TheftBurglaryRobberyTrespassing and VandalismAssaultArsonWhite Collar & Economic CrimeFraudComputer Crime

8Crimes of Concern to Private Security and Steps to Deal with Them:1. Larceny/ TheftLimit access to assetsUse basic security equipment and procedures to deter employee pilferageUse basic security equipment and procedures to deter non-employee theft

9Where larceny/theft occurs:

102. BurglaryDefined as: entering a structure without the owners consent with the intent to commit a crime.Although the crime is usually theft, it could also be something else such as rape or assault.

113. RobberyDefined as: the unlawful taking of personal property from the person or in the persons presence, against the persons will by force or threat of force.

123. RobberyRobbery Prevention Steps:Train employees how to react if a robbery occursDo not build up cash. Use armed couriers to transport cash.Establish strict opening and closing procedures; use extreme caution if someone wants in after hours.

13What to do if robbed:Stay calmDo exactly as you are toldAssure the robber you will cooperateTreat any firearm displayed as if it were loadedActivate alarms only if you can do so undetectedTry to alert others if possible

144. Trespassing and VandalismTrespassing: the unlawful presence of a person on the property or inside the premises.Vandalism: the malicious or intentional damaging or destroying of property.

154. Trespassing and VandalismReducing trespassing and vandalism:Preventing or reducing access and using strict access controlsUsing security lightingUsing signage to deter violatorsUtilize security patrols

165. Assaultan attack on a personSteps to combating assault:Adequate lightingSecurity patrolsCommunication systems (emergency light posts)Escort services to parking areas

176. ArsonDefined as: the willful or malicious burning or attempting to burn, with or without the intent to defraud, a dwelling house, public building, motor vehicle, aircraft, or personal property of another

186. ArsonMotives:Financial gain through insurance fraudAn attempt to hide another crime such as burglary or embezzlementRevengeTerrorism

196. ArsonIncrease security for those areas commonly used to start fires.Common sites for arson fires:BasementsStoreroomsDuplicating, file and mail roomsUtility closets

206. ArsonPossible indicators:More than 1 point of originDeviate from normal burn patternsEvidence of trailersEvidence of accelerantsPresence of ignitorsTelltale odors or smoke colors

217. White-Collar or Economic CrimeThese are business-related crimesThere may be only one individual involved or it may be a larger conspiracy.Examples:Identity theftTax offensesSecurities theftEnvironmental offensesEmbezzlementBribes

228. FraudFraud comes in many forms, so security managers must be very diligent to combat it.Identity theft has evolved into a very serious and pervasive threat to both consumer and the financial services industry.

239. Computer CrimeAlso known as cybercrimeComputers are the heart of most business operations/ communications systems that makes them an attractive and potentially catastrophic target for criminals

249. Computer CrimeTypes of threats:Employees snooping through confidential filesTheft of trade secretsAlteration of input data (altering grades, fictitious suppliers entered to divert funds)Changing computer time to allow employees to steal time

259. Computer CrimeDetecting and Reporting:By its very nature, computer crime is relatively easy to commit and tough to detect.Only a small number are actually detected.Of those detected, only 12% are reported to authorities and only 3% of those offenders go to jail.Thus, the chance of committing a computer crime and going to jail is 1:27,000.

269. Computer CrimeInvestigating:We may need the help of an outside professional to help investigate computer crime.Be aware many law enforcement agencies do not possess the equipment or expertise to effectively investigate cybercrime.We need to be prepared to work with several agencies as the investigation crosses state/ national borders.

27Computer Security Program Recommendations:Have strict access controlMaintain up-to-date protection softwareRemove paper printout sheets from computer areasAvoid contact with recording surfaces of disksNever use paper clips or rubber bands on disksEstablish a backup system

28Expelling, Detaining, Searching and Arresting The most important part of this sensitive area is to know exactly what local and state statutes allow security personnel to do.This is especially important when a security manager is responsible for security personnel in different jurisdictions.

29Expelling, Detaining, Searching and Arresting Many states allow security personnel to:Detain suspected shopliftersMake a citizens arrest of persons who have committed a misdemeanor in their presenceMake a citizens arrest of persons whom they have probable cause committed a felony

30Expelling, Detaining, Searching and Arresting Use of ForceForce can be used only when and to the extent it is necessary.Deadly force can only be used to protect human life.Training and documentation of training is critical.

SearchingThe law clearly establishes the right of an arresting officer to search a person.Most security searches do not involve an arrest. They are conducted based on company policy. Conduct searches in private, have a witness to the search if possible, searcher should be same sex as person searched.31

31