U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

MODERN SECURITY METHODS

NCJ Number
65956
Author(s)
C F HEMPHILL
Date Published
1979
Length
317 pages
Annotation
WRITTEN FOR STUDENTS OF CRIMINAL JUSTICE AND POLICE SCIENCE, THIS BOOK PROVIDES A GENERAL OVERVIEW OF PRIVATE SECURITY, INCLUDING HISTORICAL FACTS AND PRESENT METHODS AND PROBLEMS.
Abstract
SECURITY IMPLIES A STABLE ENVIRONMENT IN WHICH GOALS MAY BE PURSUED WITHOUT DISRUPTION OR DANGER AND WITHOUT LOSS OR INJURY. TWO BASIC KINDS OF SECURITY EXIST: (1) THAT PROVIDED BY POLICE OR PUBLIC AGENCIES AND (2) THAT FURNISHED BY PRIVATE AGENCIES. BOTH PUBLIC AND PRIVATE SECURITY ARE NEEDED, WITH ONE SUPPLEMENTING THE OTHER. BY THE END OF 1976, THERE WERE APPROXIMATELY 800,000 PERSONS EMPLOYED IN PRIVATE SECURITY FIRMS. THESE COMPANIES OFFER MANY SERVICES TO BUSINESSES, INDIVIDUALS, AND THE OWNERS OF PRIVATE PROPERTIES. SUCH SERVICES INCLUDE UNIFORMED GUARDS, PATROL SERVICES, CENTRAL ALARM STATIONS, INVESTIGATIVE SERVICES, AND OTHERS. THIS TEXT, FOLLOWING A GENERAL INTRODUCTION TO THE HISTORY AND DEVELOPMENT OF PRIVATE SECURITY, DISCUSSES PHYSICAL FACILITIES, INCLUDING BUILDING LOCATION AND GROUNDS, PERIMETER CONTROLS, AND BUILDING OPENINGS IN THE CONTEXT OF SECURITY. IT COVERS THE SECURITY FEATURES OF LOCKS, KEYS, BUSINESS SAFES, AND VAULTS, AND REVIEWS SECURITY MEASURES SUCH AS ALARMS, ALARM SENSORING OR TRIGGERING SYSTEMS, CLOSED CIRCUIT TELEVISION, PROTECTION SERVICES, AND ACCESS CONTROLS SUCH AS LIGHTING, BADGE SYSTEMS, AND CARD-KEY ACCESS SYSTEMS. NEXT, ITS FOCUS SHIFTS TO OFFENSES WHICH SECURITY SYSTEMS ARE SUPPOSED TO INHIBIT AND PREVENT: THEFT, SHOPLIFTING, ARMED ROBBERY, AND BUSINESS AND RESIDENTIAL BURGLARY. ATTENTION IS ALSO DIRECTED TO MERCHANDISE HANDLING (RECEIVING, SHIPPING, AND WAREHOUSING), PERSONNEL SECURITY (OBTAINING AND KEEPING EMPLOYEES HONEST, AND DEALING WITH PROBLEM EMPLOYEES), AND COMPUTER SECURITY PROBLEMS (INSTALLATION, FIRE, BACKUP RECORDS, AND OTHER PREVENTIVE MEASURES). OTHER CHALLENGES TO SECURITY CONSIDERED ARE PROTECTING TRADE SECRETS AND CONFIDENTIAL INFORMATION, OFFICE SECURITY PROBLEMS, AND SPECIAL SECURITY PROBLEMS OF INSTITUTIONS. ONE CHAPTER IS DEVOTED TO THE RAMIFICATIONS OF THE OCCUPATIONAL SAFETY AND HEALTH ACT (OSHA), WHILE THE FINAL CHAPTER DISCUSSES SECURITY MANAGEMENT AND ADMINISTRATION. EACH CHAPTER HAS A REVIEW AND DISCUSSION SECTION; DRAWINGS, TABLES, REFERENCES, AND AN INDEX ARE PROVIDED ALSO. APPENDIXES CONTAIN SPECIFICATIONS FOR CHAIN-LINK FENCING, MISCELLANEOUS FORMS, AND A MODEL BURGLARY SECURITY CODE. (PRG)