Concentric rings of security can be one of the best approach methods to install any security program in its entirety and has been updated by the use of technologies and processes such as CPTED, the understanding of the end product is a not as easy as its name sounds. The use of these differing items can help ball the end product up into the most effective outcome giving the parameters that are directed by those in control and understanding the difference of needs to the area that you are in can make it even better.
In making any portion of any product that goes into the security methodology. The use of items such as CPTED and critical thought processing in assessments make the attributed effort of security an intrinsic sectioning of the spaces involved. Knowing how to see and predict faults in systematic collapses of areas that might allow for a bypass of the procedures can lower the effectiveness of the security in any given area. This process of concentric rings of security can pinpoint the areas effectiveness and their need for additional security protocols and processes in a given section of the concentric rings.
A reminder in this process, is that the areas’ location can affect the total situations needed to be put into place in the areas in question. The targeted secure item needs to heave different technology and stricter procedures than someone entering into the perimeter of a complex. Things like the use of Identification card scanners might work in the lower ring or outer ring, but the more you peel back the rings and go deeper this would not be an effective deterrent into the inner most ring that would be beneficial to the person entering into it, and not the company protecting it.
Using some of the references that I have listed below can add to the thought process in my paper in the fact they are considered to be productive members in their specialized profession. These authors and groups allow for a complete understanding of their individual design systems and how they can add to their specific field by integrating such thought processes that would allow for the personal growth of those involved in the areas to be protected.
Some of the references give instruction on how the government had to take consideration into protecting its own facilities in such a way to prevent future attacks and their potential damage and was produced after the bombing of the Alfred P. Murrah Federal Building in Oklahoma City, Oklahoma. The idea was to lower the potential number of injuries involved, harden the structures, and then keep would be criminal characters from entering into such facilities. A known target would be the central concern of the concentric rings of security.
References:
Aasmae, K. (2018, October 28). Security: After Estonia's ID-card train wreck this identity app is taking Baltics by storm. ZDNet, p. 1. Retrieved from https://www.zdnet.com/article/security-after-estonias-id-card-train-wreck-this-identity-app-is-taking-baltic ...
Concentric rings of security can be one of the best approach metho
1. Concentric rings of security can be one of the best approach
methods to install any security program in its entirety and has
been updated by the use of technologies and processes such as
CPTED, the understanding of the end product is a not as easy as
its name sounds. The use of these differing items can help ball
the end product up into the most effective outcome giving the
parameters that are directed by those in control and
understanding the difference of needs to the area that you are in
can make it even better.
In making any portion of any product that goes into the security
methodology. The use of items such as CPTED and critical
thought processing in assessments make the attributed effort of
security an intrinsic sectioning of the spaces involved. Knowing
how to see and predict faults in systematic collapses of areas
that might allow for a bypass of the procedures can lower the
effectiveness of the security in any given area. This process of
concentric rings of security can pinpoint the areas effectiveness
and their need for additional security protocols and processes in
a given section of the concentric rings.
A reminder in this process, is that the areas’ location can affect
the total situations needed to be put into place in the areas in
question. The targeted secure item needs to heave different
technology and stricter procedures than someone entering into
the perimeter of a complex. Things like the use of Identification
card scanners might work in the lower ring or outer ring, but the
more you peel back the rings and go deeper this would not be an
effective deterrent into the inner most ring that would be
beneficial to the person entering into it, and not the company
protecting it.
Using some of the references that I have listed below can add to
the thought process in my paper in the fact they are considered
to be productive members in their specialized profession. These
authors and groups allow for a complete understanding of their
individual design systems and how they can add to their speci fic
2. field by integrating such thought processes that would allow for
the personal growth of those involved in the areas to be
protected.
Some of the references give instruction on how the government
had to take consideration into protecting its own facili ties in
such a way to prevent future attacks and their potential damage
and was produced after the bombing of the Alfred P. Murrah
Federal Building in Oklahoma City, Oklahoma. The idea was to
lower the potential number of injuries involved, harden the
structures, and then keep would be criminal characters from
entering into such facilities. A known target would be the
central concern of the concentric rings of security.
References:
Aasmae, K. (2018, October 28). Security: After Estonia's ID-
card train wreck this identity app is taking Baltics by storm.
ZDNet, p. 1. Retrieved
from https://www.zdnet.com/article/security-after-estonias-id-
card-train-wreck-this-identity-app-is-taking-baltics-by-storm/
Cregg, J. (2018, August 01). A Study of CPTED Principles and
their Relationship to Crime Risk in Beaumont, Texas. Texas
State University, p. 1-76. Retrieved
from https://digital.library.txstate.edu/bitstream/handle/10877/7
705/Cregg-DRFinal.pdf?sequence=1&isAllowed=y
Meyer, C. (2020, October). At Rest, At Risk. Security
Management, 20(10), 30-37.
Macano, K. (2018, January 01). Crime Prevention Through
Environmental Design [CPTED]: Designing Out Opportunity
and Fear. Center for Public Safety, p. 1-6. Retrieved
from https://www.rit.edu/liberalarts/sites/rit.edu.liberalarts/files
/docs/CRIM%20Resources/Crime%20Prevention%20Through%2
0Environmental%20Design%20%5BCPTED%5D-
%20Designing%20Out%20Opportunity%20and%20Fear.pdf
Godown, J. (2013). The CompStat Process: Four Principles for
Managing Crime Reduction . The Police Chief Magazine, 1(1),
1. Retrieved
from https://www.iadlest.org/Portals/0/Files/Documents/DDAC
3. TS/Docs/The%20CompStat%20Process.pdf
Practice Profile: Closed Circuit Television (CCTV)
Surveillance. (2020). Retrieved September 12, 2021. Retrieved
from https://crimesolutions.ojp.gov/ratedpractices/25#pd
U.S. Marshals Office, n. DOJ. (1995). Vulnerability Assessment
of Federal Facilities (156412 C.2). Retrieved August 29, 2021,
from DOJ,
website: https://www.ojp.gov/pdffiles1/Digitization/156412NCJ
RS.pdf
General Security Risk Assessment Guidelines. (2021). Retrieved
October 17, 2021,
from https://www.asisonline.org/publications--
resources/standards--guidelines/gsra/
Management System for Quality of Private Security Company
Operations-Requirements with Guidance. (2021). Retrieved
October 17, 2021,
from https://www.asisonline.org/publications--
resources/standards--guidelines/psc1/
Mackay, R. (2017). Lessons from Manchester and Paris:
Physical Security for the Entertainment Industry and Executive
Protection: Iconic entertainers will remain attractive targets for
terrorist attacks because they attract substantial crowds and
promote social norms and values that conflict with terrorists'
worldviews. Security, 54(9), 54-. Retrieved from https://www-
proquest-
com.ezproxy1.apus.edu/docview/2108801853/9B8E4B406BC44
126PQ/1?accountid=8289
Hello Dr. Aguiar and Classmates,
For this week’s forum, we were asked to discuss the
project topic, thesis statement, and main points being
researched. For my capstone project, I will be highlighting the
active shooter incident at Stoneman Douglas High School in
Parkland, Florida. The Parkland shooting occurred on February
14, 2018, where the perpetrator Nikolas Cruz killed 17 people.
4. The Parkland shooting is considered one of the deadliest
shootings in modern history, and research shows that many
countermeasures could have prevented the incident. This
research paper will use the Parkland incident as a baseline of
what possible shortfalls occurs when preventive a school
shooting. I choose this subject matter because school shootings
have played a significant role in my life. I was in National
Incident Management System (NIMS) School at the time of the
Sandy Hook shooting. I was able to understand the response
procedures of an active shooter and how subject matter experts
determine the motives of the perpetrator.
The thesis statement that I will be using in the capstone
project will be “Innumerable active shooter incidents will
continue to occur in the United States unless law enforcement,
educators, and security professionals develop countermeasures.”
The purpose of the thesis statement is to narrow down the
spectrum of research. I will be using the mixed research method
of research while focusing on the four quantifiable categories
consisting of school administrator’s responsibilities, law
enforcement, and security professional integrated response, the
significance of school architecture, and preliminary mental
health detection. When it pertains to school administrators’
responsibilities, I will be utilizing research from Dr. Jeff
Daniels and his published research titled The Counseling
Psychologis. The publication states that trends found in active
shooter incidents dating back to Columbine High School have
remained consistent. For example, Dr. Daniels believes a root
cause for an adolescent perpetrator is violent influences like
social media or video games. Dr. Daniels concludes that when a
child is exposed to a violent experience, they become
desensitized to tragedy. With Dr. Daniel’s research, I will be
able to validate my thesis by showing the need for school
administrators to take action.
An additional academic source is from author James
Seebock and his publication named Responding to High-Rise
Active Shooters. The information is structured to assist law
5. enforcement officers and security professionals’ ineffective
response to an active shooter. It is vital to show the
advancements in emergency services response and compare
what effective procedures are. This source balances the need for
fast emergency response in order to reduce the loss of life in an
active shooter. Mr. Seebock has contributed too many
advancements in law enforcement response. For example, in
1999, law enforcement officers would treat an active shooter as
a barricaded suspect, meaning that they would not make entry.
Mr. Seebock’s research has shown that immediate entry and a
“direct to threat” mindset has reduced the loss of life.
The last main point focuses on the preventive measures
taken when architecturally building a school. The concept
Crime Prevention through Environmental Design (CPTED) is
utilized in new construction throughout the world. When it
pertains to schools, the preemptive placement of landscape can
contribute to preventing an active shooter. Professor Todd
Schneider describes in his book CPTED 101: Crime Prevention
through Environmental Design--The Fundamentals for Schools
the need for schools to place walkways, access roads, and
common student areas in a restricted posture. This writing is
imperative to justice the thesis because it is the first line of
defense when it comes to preventives. Overall, these categories
of research will show trends and provide insight on how to
prevent a high school, active shooter.
-Bryan
Reference
Daniels, J. A., Volungis, A., Pshenishny, E., Gandhi, P.,
Winkler, A., Cramer, D. P., & Bradley, M. C. (2010). A
qualitative investigation of averted school shooting rampages.
The Counseling Psychologist, 38(1), 69-95.
Schneider, T. (2010). CPTED 101: Crime Prevention through
Environmental Design--The Fundamentals for Schools.
National Clearinghouse for Educational Facilities.
Seebock, J. (2018). Responding to High-Rise Active Shooters.
Homeland Security Affairs.
6. The public’s perception of what the primary roles of a security
officer/manager and that of a law enforcement officer maybe
drastically different from reality. Without a doubt there are
distinct differences between the two (2) types of law
enforcement. Primary roles of security officers/managers place
an emphasis on “the protection of assets, immediate deterrence,
and commercial enforcement.” (Nemeth, 2011) Understanding
that security officers/managers are charged with the duty to
protect the entity of which they are employed and/or their assets
while law enforcement officers (LEO’s) have society watch
over, naturally points out gaps in enforcement coverage. Many
of the primary roles of law enforcement officers (LEO) fill
these gaps. For example, LEO’s typically take an oath to protect
and serve the public. This means they focus on matters
concerning citizens, whereas a security manager focuses more
on their clients. Their guiding principle for primary roles is
established within the laws and statues of their jurisdiction.
This gives them a very large scope of responsibility from traffic
control, sexual assaults to murder. Although both types have a
vested interest in crime prevention. LEO’s primary roles endow
them with the authority to apprehend, and make arrest foll owing
a crime.
A security officer/manager may be held liable for their actions
even if it’s in accordance with their duties. Many of them are
faced with confrontational employees, clients and even
student’s or faculty members. On many college campuses across
America, security officers are employed and often tasked to
handle crowd control for special events. In the event that a
physical altercation occurred and the security officer/manager
caused injury to someone while trying to diffuse the situation
the injured party may seek a tort claim for assault. Likewise,
they may be held liable for the duration of time they have
detained a person. Given the same example above, if the
security officer/manager detained one of the agitators of the
7. altercation and then questioned them for over an hour it, “can
give rise to the claim of false imprisonment.” (Nemeth 2011)
References:
Nemeth, C. (2011). Private security and the law. Elsevier
Science & Technology. https://ebookcentral.proquest.com
Good afternoon class,
This week we looked at the relationship of private security and
law enforcement.
The role and responsibility of private security is to primarily be
a deterrent. The simple presence of a security officer can reduce
the likelihood of crimes. When a crime does occur, often the
security officer is the first responder. In this situation it is up to
the security to maintain a safe scene, identify and isolate
witnesses, perform crowd control measures and depending on
training and needs, assist the injured. Security officers first
objective is to ensure the well-being of the client or site where
posted. That could include securing merchandise, protecting
employees, buildings or information. Security officers are not
responsible for eliminating an armed hostile threat, they are
responsible for preserving the lives of themselves and others
surrounding them.
When it comes to law enforcement, they are trained to eliminate
hostile threats. When law enforcement enters a scene where the
security has identified a suspect and separated witnesses, the
law enforcement agency will often take over the scene as they
can conduct official investigations. Depending on the laws
around private security in any given region, it is a general idea
that security officers are not authorized to conduct intensive
interviews or search individuals. Law enforcement is able to
recite Miranda rights and make official arrests while security
can only make a citizen arrest.
Security officers can be liable in their actions if they are
8. performing criminal activity, working against their agency
policies or client policies. This includes negligent performance
of their duties, wrongful or unauthorized use of force and many
other questionable activities. If a security officer used force to
handle a situation that posed no threat to his or her life or the
life of those around the situation, their agency may not be able
to defend their actions, putting the officer as the liable party.
Some private security agencies will not stand behind their
officers when they use force, even if the force is relatively
justified.
Regards,
Jessie
References
Nemeth, C. (2011). Private security and the law. Elsevier
Science & Technology.