ONE:
Directions: Choose a national or regional incident of workplace or school violence. After reviewing this act of violence, address the following:
Provide a brief review of the incident.
As the security manager, discuss the role that private security would have played in this incident (or did play) and how this differs from that of the role of public security.
Identify any telltale signs of the incident happening prior to the event. How can a security manager best anticipate such incidents?
Discuss measures that were put in place post incident in terms of physical asset protection. If no measures can be identified, discuss two measures that could be put in place in terms of physical asset protection.
Discuss what you believe to be the two most important factors to be considered in the realm of security management, security components and operational conditions in preventing incidents of workplace or school violence and why these are the most important.
Discuss what you believe to be the two most significant administrative challenges that a security manager in incidents of workplace or school violence face, and how these challenges might be overcome.
Format Requirements:
Paper must be double spaced, 11 or 12 pt font and 1”margins all around.
Paper should be 1,000 to 1,500 words.
All APA 7th edition format requirements must be followed (cover page, in text citations, reference page). Refer to APA/UMGC – learning resources found in the content page of this course.
You must have resources to support your thoughts/opinions/information. These must be cited both in text as well as at the end of the document. Your paper should not contain direct quotes, sourced material must be paraphrased.
TWO
1. In your (supported) opinion, what, if any, is the difference between “police community programs” and community policing?
2. What is meant by the term community policing and its relevance as regards serving the community?
3. Does community policing improve the relations between the police and members of a minority community?
THREE
As a member of the Virtual Police Department’s Administrative Services Unit you have been called into a meeting with your supervisor, several other police commanders, and the Chief of the Virtual Police Department. This is what you are told by the head of the Criminal Intelligence Unit.
Several jurisdictions in the vicinity of Virtual have experiences “Flash Robs”. These are groups of teenagers and young adults, both men and women, who descend on a commercial store and, on a given signal, grab as much merchandise as they can carry and flee the store in mass. The size of the group and the quickness of their action made apprehension almost impossible for the overwhelmed store employees. Targeted stores range from sporting goods outlets, and electronic shops, to pharmacies and liquor stores. There is some evidence that the mob is organized by codes using social media. The Virtual Small Business Association is petitioning the Mayor for a plan to ensure these mobs to not attack the downtown business area. They are insisting on more police presence (particularly during peak business hours) and closer cooperation between the police and their own private security.
The Chief has decided to form a 8-unit task force. This operation will be a collaborative effort involving both the Virtual Police Department and other appropriate “partner” agencies within the criminal justice system. The Administrative Services Unit will draw up the proposal for the Chief to take to the Mayor. Your supervisor gives this assignment to you.
Identifying 6 and only 6 departmental units that will be included in some manner on the task force from the Virtual Police Department Table of Organization chart. (See Virtual Police Table of Organization.)
NOTE: All of Patrol (Commanders A, B and C, Captains, Lieutenants, Sergeants, COPs and Patrol Officers) is 1 single unit. If patrol is selected as part of the task force the requirements in #2 below must be completed.
ALSO: Selection of a “Commander” (e.g., Special Operations Commander) as a Unit includes the official and their immediate office staff. It does not include each of the subordinate units.
2. For each of the 6 units selected from within the Virtual PD you are asked to:
a) Identify the unit and briefly describe its typical operational/administrative role and regular duties in a law enforcement agency
b) Explain why the unit was chosen for this task force, what role it will play on the task force
If more than 6 units in the Virtual Police Department have a potential role on this task force, you must select the 6 units having the most impact and/or being most useful in achieving the reduction in violent crime goal.
3. Additionally, you will identify 4 units in the Virtual Police Departmental units that will NOT be part of the task force. For each of these units not selected, you are asked to:
a) Identify the unit and briefly describe its typical operational/administrative role and regular duties in a law enforcement agency
b) Explain why it was NOT chosen for this task force.
4. To complete the 8 unit task force, you will also identify 2 non-departmental units from the criminal justice system that should be included in some manner on the task force
a) Identify the unit and briefly describe its typical operational/administrative role and regular duties in the criminal justice system
b) Explain why the unit was chosen for this task force, what role it will play on the task force
In order to present a convincing argument and demonstrate the depth of your research you must include supportive outside resources. You must acknowledge the outside resources (or course materials) using appropriate American Psychological Association (APA) citation format.
Again, the goal of this project is to give you an opportunity to determine, analyze and assess the role of various police department units, their relationship to other units, and how their skills can be applied to counter criminal activity. Therefore, each unit you discuss, must be supported by an appropriate reference, in APA format.
FOUR
“Security Management Standard: Physical Asset Protection” is a 2012 ASIS International publication that assists security directors in completing their security planning.
“ASIS International Facilities Physical Security Measures Guideline,” also assists organizations in determining risk levels and the appropriate controls to secure assets in the most effective, efficient, and cost-saving manner.
After thoroughly reviewing these documents, summarize their contents and explain how the standard and the guideline will assist you in completing the vulnerability assessment required not only for this in this course, but also in your current of future security management career.
Also, identify, in your considered opinion, the five most significant physical controls used to protect corporate assets discussed in the document and explain your rationale, citing not only the advantages of the controls you selected, but also the drawbacks.
In “Security Management Standard: Physical Asset Protection,” the authors discuss the use physical barriers as a physical control designed to protect assets by deterring individuals or delaying entry of those unauthorized to access the building or property. However, fences do not entirely “prevent” entry as we have periodically read about with the “fence jumpers” at the White House in Washington, D.C. The authors identify fences and walls as the most common perimeter barriers and proceed to describe the various types: brick and stone walls, chain-link, welded-wire, barbed wire, razor or concertina wire, wooden, electronic, planters, steel barricades, and others.
As a result of the increased frequency of “fence jumpers” at the White House, the United States Secret Service (USSS) in 2017 received approval from the National Capital Planning Commission to raise the wrought iron fence surrounding the 18 acres from about 8 feet high to 11.7 feet. Other fence “anti-climb” features were also a part of the plan. There was significant public interest expressed in this matter. As reported in the media, the USSS gave thoughtful consideration regarding the selection of a new and enhanced fence design as a part of the agency’s risk assessment process and the employment of Practice Advisories we discussed in class last week. ASIS Practice Advisories #6 and #7 relating to the “feasibility” of implementing recommended security options to mitigate risk and considering the “cost versus benefit” of a particular security strategy are particularly interesting regarding the decision about the fence and other possible security measures in and around the White House.
Identify and discuss the “practical” considerations the USSS had to consider about the height, type, and design of the new enhanced fence surrounding the White House. Note: Although the President questioned the $50 million dollar cost of the new fence, for this scenario, our discussion should focus primarily on the “feasibility” of implementing any proposed security options in light of the mission and authority of the National Capital Planning Commission (NCPC) and other historical oversight associations. Incorporate into your response whether or not you believe an 11 foot tall fence made from concrete, chain link, razor, or concertina wire would be a better choice from a security perspective and whether or not such fences would survive public and National Capital Planning Commission scrutiny.
In preparing a response, students should review the following resources that provide specific background information regarding the scenario presented:
White House Fence (White House fence final design approved.) This video may help: White House fence to the National Capital Planning Commission can be found at: https://www.ncpc.gov/videos/504/31m47s – Actual fence presentation starts at 53 minutes and ends at 1:06:14.
NPS (White House Fence Design Receives Final Approval.)
History (History of the White House Fence).
Cost(Trump: New White House security fence to cost a ‘crazy’ $50 million.)
NCPC (About NCPC.)
“Security Management Standard: Physical Asset Protection” is a 2012 ASIS International publication and key resource for security operatives when assessing risk and developing options to prevent or mitigate loss events through physical and procedural controls and other security operations and assessing the feasibility of those options to ensure they do not substantially interfere with the organization’s core operations. The document provides an extensive list of terms and definitions routinely employed in security planning and a broad discussion of the various security controls used to protect assets, their specific functions, and strategies for implementation. This standard, used in conjunction with the “ASIS International 2009 Facilities Physical Security Measures Guideline,” assists security practitioners in determining risk levels and the appropriate controls to protect assets in the most effective, efficient, and cost-saving manner. Students use these documents for identifying and analyzing the various physical and procedural controls when developing and enhancing their workforce competencies such as strategic and operational planning, financial management, critical thinking, and decision-making skills. The 2012 Security Management Standard: Physical Asset Protection publication can be accessed at: Security Management Standard:Physical Asset Protection. The 2009 Facilities Physical Security Measures Guideline publication can be accessed at: Facilities Physical Security Measures
“Concentric Circles of Protection” is a graphic listed on the website of Silva Consultants depicting the use of “security layers” to more effectively protect company assets. Also included on the website is a description of this critical security strategy, also known as protection-in-depth. Security practitioners and students use this approach as recommended by ASIS International to design multiple physical, procedural, and virtual controls for high value assets requiring enhanced security. The graphic and description can be accessed at: SILVA
RESOURCES:
“The Changing Role of Private Security” is a 2008 magazine article published by Security Technology & Design that reports on a roundtable discussion involving three prominent security professionals about issues and challenges confronting the private security industry since September 11, 2001, including training inconsistencies and pay disparity in the industry, lack of national operational security standards, and the convergence of physical security with information technology in security operations. This article provides students another opportunity to examine real problems confronting security directors and begin formulating possible solutions. The article can be accessed at: Changing Role
“Physical Security” is a 2010 publication by the Department of the Army (ATTP 3-39.32) and is a resource for security practitioners and students to employ while identifying options to prevent or mitigate risk loss events. This document provides specific guidance to Army personnel responsible for planning and executing security operations. It is an in-depth consideration of such topics as the principles of protection, information security, physical security planning, and many others. Private security personnel and students alike must realize military operatives prepared this document for military purposes. Nevertheless, it is very useful resource in the study and application of security concepts This resource document can be accessed at: Physical Security
“Evaluating Your Parking Lot Lighting,” “Three Dirty Secrets About Video Surveillance Systems,” and “Security of Public Restrooms” are security tips offered by Michael A. Silva, founder of Silva Consultants, appearing on the company’s website. The articles identify the basic considerations for conducting a lighting survey, a security camera’s real deterrent value to crime, and the security problems created by public restrooms and options for controlling access. These tips are useful to security practitioners and students for developing options to prevent or mitigate loss events through physical and procedural controls and other security operations.
The articles can be accessed at:
– Parking Lot
– Video
– Public Restrooms