Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
38Activity

Table Of Contents

PURPOSE
GENERAL INFORMATION
EXPANDED PROTECTION ROLES
MANUAL FORMAT
CERTIFIED PROTECTION
OFFICER (CPO) PROGRAM
CERTIFIED PROTECTION OFFICER (CPO)
FINAL CHALLENGE PROGRAM
PROTECTION OFFICER CODE OF ETHICS
PURPOSE AND SCOPE
Protection Officer Ethics
UNIT ONE
The Evolution of Asset Protection and Security
UNIT TWO
Field Notes and Report Writing
Observation Skills and Memory
Patrol Principles
Safety and the Protection Officer
Traffic Control
Crowd Control
UNIT THREE
Physical Security Applications
Alarm System Fundamentals
Central Alarm Stations and Dispatch Centers
Access Control
UNIT FOUR
Introduction to Computer Security
Information Security
UNIT FIVE
Procedures
Hazardous Materials
Protection Officers and Emergency Response
Legal and Operational Considerations
UNIT SIX
Workplace Violence
Employee Dishonesty and Crime in Business
Substance Abuse
UNIT SEVEN
Effective Communications
Crisis Intervention
Security Awareness
Environmental Crime Control Theory
UNIT EIGHT
Operational Risk
Emergency Planning and Disaster Control
Terrorism
Counter-terrorism and VIP Protection
Weapons of Mass Destruction:
The NBC Threats
UNIT NINE
Crime Scene Procedures
Foundations for Surveillance
Interviewing Techniques
Investigations: Concepts and Practices for Security
Professionals
UNIT TEN
Legal Aspects of Security
UNIT ELEVEN
Use of Force
Defensive Tactics and Officer Safety
Apprehension and Detention Procedures
UNIT TWELVE
Public Relations
Police and Security Liaison
Ethics and Professionalism
THE CYCLE OF HISTORY
KEY TERMS
CRIME PREVENTION THROUGH
ENVIRONMENTAL DESIGN
THE WARTIME GROWTH OF SECURITY
POLICING
“PRIVATE SECURITY” OR
“PUBLIC POLICE”?
THE “WILD WEST”
FIRE PROTECTION
SAFETY
COMMERCE
ECONOMIC AND MARKETING TRENDS
AND ASSET PROTECTION
DEMOGRAPHICS
CLASS STRUGGLES AND TERRORISM
RISK MANAGEMENT AND INSURANCE
LAW
HISTORY OF SECURITY
SERVICES
THE PATH TO PROFESSIONALISM
CONTEMPORARY CAREERS
IN ASSET PROTECTION
REFERENCES
The Evolution of Asset Protection
FIELD NOTE-TAKING
ASSIST IN PREPARING REPORTS
DETECT CONTRADICTIONS IN
STATEMENTS
REFRESH MEMORY AT LATER DATE
INVESTIGATIVE AID
REFLECT OFFICER ABILITY
Tips on the Use of Notebooks
Who Security Reports Are For
Types of Security Reports:
Planning the Security Report
THE SIX ESSENTIAL INGREDIENTS
SECURITY REPORTS ARE IMPORTANT
REPORT ORGANIZATION
BODY
CONCLUSION
YOUR FIVE SENSES
Sight
Hearing
Smell
Touch
Taste
Memory
HOW TO IMPROVE YOUR SENSES
TECHNIQUES OF PATROL
FACTORS THAT INFLUENCE PATROL
EFFECTIVENESS
UNETHICAL/UNPROFESSIONAL PRACTICES
FIXED POSTS
RESOURCES
BASIC ELEMENTS OF A SAFETY PROGRAM
KEY FACTS IN ACCIDENTS
ACCIDENTS
Accident Types
Accident Causes
THE ROLE OF THE PROTECTION
OFFICER IN SAFETY
Common Safety Hazards
SIGNS AND AUTOMATIC SIGNALS
ROADWAY POSITIONS
HAND SIGNALS
THE WHISTLE
GATE DUTY
EQUIPMENT
GENERAL RULES FOR
TRAFFIC DIRECTION
DEFINITIONS
FORMATION OF CROWDS
CAUSES OF CROWD FORMATIONS
PSYCHOLOGICAL FACTORS
TYPES OF CROWDS
CROWD ACTIONS AND SUGGESTED
COUNTERMEASURES
SECURITY AND DEMONSTRATIONS
FORMATION OF A MOB
RESPONSIBILITY AND BEHAVIOR OF
PROTECTIVE GROUPS
PLANNING CONSIDERATIONS
PERSONAL BEHAVIOR
RIOT CONTROL FORCE
DEPLOYMENT PROCEDURES
SECURITY LIGHTING
APPLICATION CONSIDERATIONS
GLAZING
INTRUSION DETECTION
DETECTORS/SENSORS
SYSTEM CONTROLS
SYSTEM MONITORING
CARD ACCESS
LOCKING HARDWARE
CLOSED CIRCUIT TELEVISION
SAFES AND VAULTS
Burglary-Resistive Safes
DURESS ALARMS
NUISANCE ALARMS
ALARM RESPONSE
EMERGENCY ACCESS CONTROL
EXAMPLES OF ACCESS CONTROL
AUDIT AND RECORD KEEPING
ACCESS AUTHORIZATION
APPLYING PHYSICAL SECURITY
IN ACCESS CONTROL
Locks and Key Control
Electronic Access Control Systems
ACCESS SYSTEM DATABASE MANAGEMENT
BIOMETRIC TECHNOLOGIES
ACCESS CONTROL IN THE
INFORMATION AGE
THE GROWING PROBLEM
WHAT IS COMPUTER SECURITY?
THREATS
Human Threats
Hackers and Crackers
MOTIVATIONS
ATTACK METHODS
SECURITY POLICIES
COMPUTER SECURITY TERMINOLOGY
READINGS
BIBLIOGRAPHY
CRITICAL INFORMATION
METHODS OF SECURING INFORMATION
Need to Know
Form of the Information
POLICY AND PROCEDURE FACTORS
SECURITY QUIZ
PREVENTION AND MITIGATION
FIRE BASICS
DETECTION METHODS
FIRE TYPES
EXTINGUISHERS
PERMANENT EXTINGUISHING HARDWARE
CONTAINMENT
FIRE PLANS
ARSON
METHODS OF RESPONSE
THE INITIAL RESPONSE
ACTIVATE THE CONTINGENCY PLAN
IDENTIFY THE SUBSTANCE
AND QUANTITY RELEASED
DETERMINE THE DAMAGE
PERFORM “SITE SECURITY”
MEDICAL EMERGENCIES
FIRE SAFETY
HAZARDOUS OR
BIO-HAZARDOUS MATERIALS
WORKS CONSULTED
STRIKES
SEARCHES
EMPLOYEE MISCONDUCT
AND DISHONESTY
EMPLOYEE DISCIPLINE
Types of Discipline
ARBITRATION
INTERVIEWS
SUMMARY
WHAT SOCIETY THINKS ABOUT THE THIEF
THE REALITIES OF THEFT PREVENTION
DEFINITION OF EMPLOYEE DISHONESTY
FIRST STEPS
MARKINGS
CONCEALMENT
REPORTING
PREVENTIVE ACTIONS
SEARCH POLICY
EMPLOYEE LIAISON
IMPACT ON BUSINESS AND INDUSTRY
SUBSTANCE ABUSE: WHAT IS
THE MOTIVATION?
HOW PROBLEMATIC BEHAVIOR AND
DEPENDENCE DEVELOP
HOW IS SUBSTANCE ABUSE PERPETUATED?
CONDITIONS ADVERSELY AFFECTING
THE WORKPLACE
HOW MUST INDUSTRY RESPOND?
DRUGS OF ABUSE, PARAPHERNALIA,
AND DEFINITIONS
INDICATORS AND COMMON
SIGNS OF ABUSE
SIGNS AND SYMPTOMS:
CONTROLLED SUBSTANCES
EFFECTIVE COMMUNICATIONS DEFINED
DUE DILIGENCE BASED ON EFFECTIVE
CHANNELS OF COMMUNICATIONS
THE SIX ESSENTIALS OF EFFECTIVE
CONSIDER THE AUDIENCE
VERIFYING COMMUNICATIONS
WITH FEEDBACK
MYTHS AND MISCONCEPTIONS
IN COMMUNICATIONS
PROPER USE OF
COMMUNICATIONS DEVICES
CAUSES OF DISRUPTIVE BEHAVIOR
STAGES OF MANAGEMENT OF
DISRUPTIVE BEHAVIOR
CRISIS DEVELOPMENT
BEHAVIOR MODULES
PROTECTION OFFICER GUIDELINES
VERBAL AND PHYSICAL
EMPATIC LISTENING
NONVERBAL COMMUNICATIONS
CONTROLLING DISRUPTIVE OR
VIOLENT BEHAVIOR
TEAM INTERVENTION
POSITIVE FACTORS RESULTING
FROM TEAM APPROACH
LEADERSHIP IN THE TEAM APPROACH
SAFETY CONSIDERATIONS IN
EXPANDING THE TEAM
DEVELOPING THE TEAM MENTALITY
FOUNDATIONS
DIFFUSION OF BENEFITS
ENVIRONMENTAL DESIGN (CPTED)
DEFENSIBLE SPACE: CRIME PREVENTION
THROUGH URBAN DESIGN
(Oscar Newman)
CHAPTER REFERENCES AND ADDITIONAL SOURCES OF INFORMATION
OTHER SOURCES
GENERAL GUIDELINES
OUTLINE OF ACTION
Contacting the Authorities
Delegating Responsibilities
Limiting Facility Operations
Plant Warning and Communications System
Establish Facility and Perimeter Security and
Guard Force Preparation
Some other Points to Consider in Local Plans
Protecting Propriety and Classified Company and
Government Documents
Legal Aspects and Requirements
WHAT IS TERRORISM?
WHY DOES TERRORISM EXIST?
THE PROTECTION OFFICER’S ROLE
TERRORIST ACTIONS AND ACTIVITIES
COUNTERTERRORIST STRATEGY
COUNTERTERRORIST TECHNIQUES BY
ORGANIZATIONS/FACILITIES
SPECIFIC TECHNIQUES FOR
COUNTERTERRORIST SECURITY
PROFESSIONAL DEVELOPMENT FOR
PERSONAL PROTECTION SPECIALISTS
PERSONAL PROTECTION
SPECIALISTS (PPS)
PROTECTING THE PRINCIPAL
HOSTAGE SITUATIONS
HOSTAGE THREAT RECEIPT
IF TAKEN HOSTAGE
MANAGING THE HOSTAGE INCIDENT
NEGOTIATION
FOR THE FUTURE
NUCLEAR THREATS
BIOLOGICAL THREATS
CHEMICAL THREATS
DEVICE DETECTION AND
INCIDENT PREVENTION
IMMEDIATE RESPONSE
TREATMENT AND LONG-TERM
DETERMINING THE CRIME SCENE
DETERMINING BOUNDARIES
PROTECT THE SCENE
PRESERVE THE CRIME
MAKING NOTES
RECONSTRUCT THE CRIME SCENE
PHYSICAL EVIDENCE
EVIDENCE COLLECTING
GENERAL TYPES
COVERT PERSONAL SURVEILLANCE
OVERT PERSONAL SURVEILLANCE
COVERT ELECTRONIC SURVEILLANCE
OVERT ELECTRONIC SURVEILLANCE
EQUIPMENT REQUIREMENTS
PRIVACY ISSUES
RECORDING AND RETENTION
CONDUCTING THE INTERVIEW
OBSTACLES TO CONVERSATION
ENCOURAGING CONVERSATION
ENDING THE INTERVIEW
“Minor Is Major”
INVESTIGATIVE LOGIC
HISTORY
PRELIMINARY INVESTIGATIONS
FOLLOW-UP INVESTIGATION
INTELLIGENCE
LIAISON
NOTES AND REPORTS
AUDITING
INTERROGATION
INFORMANTS
UNDERCOVER INVESTIGATIONS
SHOPPING SERVICES
BEHAVIOR CONDITION ANALYSIS
TESTIFYING IN LEGAL AND
QUASI-LEGAL PROCEEDINGS
MANAGING INVESTIGATIONS
OBJECTIVE
WHAT IS THE LAW?
THE SOURCE OF OUR LAWS
TYPES OF LAW—CRIMINAL AND CIVIL
ARREST
What Is an Arrest?
The Powers of Arrest
SEARCH
A NOTE ON FORCE
EVIDENCE
CONFESSIONS
THE BURDEN OF PROOF
LEGAL AUTHORITY OF THE
SEARCH AND SEIZURE
TRESPASS
Elements of an Arrest
FOR FURTHER INFORMATION
LIABILITY AND NEGLIGENCE
AUTHORITY
THE CHARTER OF RIGHTS AND FREEDOMS
YOUNG OFFENDERS
TYPES OF A CRIMINAL OFFENSES
THE CHARTER OF RIGHTS
EFFECT ON ARREST
POWERS OF ARREST OF A
THE USE OF FORCE
USE OF FORCE IN GENERAL
JUSTIFYING THE USE OF FORCE
FORCE ALTERNATIVES DEFINED
EXCESSIVE FORCE LIABILITY
DUTIES THAT ACCOMPANY USE OF FORCE
A FORMULA FOR SELF-CONTROL
RESPONSE TO AGGRESSIVE BEHAVIOR
CONFRONTATION CONTINUUM
ESCALATION/DEESCALATION CONTINUUM
OFFICER SAFETY ISSUES
OPTIMAL DISTANCE
DEFANGING THE SNAKE
ELEMENTS OF AGGRESSION
DEALING WITH AGGRESSION
VERBAL DEESCALATION
APPLYING VERBAL DEESCALATION
TO AGGRESSIVE SITUATIONS
LETHAL AND LESS-THAN-LETHAL
WEAPONS MANAGEMENT
REPORT WRITING IN USE OF
FORCE CASES
BASIC GOAL
PREVENTION OF COMBAT
WHAT IS COMBAT?
KNOW YOUR LIMITATIONS
STROBERGER’S RULES OF SEVEN
THE USE OF FORCE CONTINUUM
TRAINING FOR SUCCESS
MARTIAL ARTS AS DEFENSIVE
TACTICS TRAINING
WEAPONS IN DEFENSIVE TACTICS
ASSUME THAT YOU WILL BE INJURED!
DEFENSIVE TACTIC TIPS
DEVELOPING A WORKING MODEL
WHAT CONSTITUTES AN ARREST?
THE IMPORTANCE OF REASONABLENESS
WHAT GETS SECURITY OFFICERS
IN TROUBLE?
CRIMINAL LAWS THAT CAN
GET A SECURITY OFFICER IN
TROUBLE LOOK LIKE THIS
DETENTION AND APPREHENSION
METHODOLOGY
DEALING WITH THE AFTERMATH
PUBLIC RELATIONS PLANNING
PROMOTING EFFECTIVE
CUSTOMER RELATIONS WITHIN
THE SECURITY FORCE
HANDLING CUSTOMER COMPLAINTS
SERVICE THAT CAN MAKE
THE DIFFERENCE
THE MEDIA: GOOD DREAM/BAD DREAM
ACCESS CONTROL AT THE SCENE OF A
CRITICAL INCIDENT
DISRUPTION OF BUSINESS
PLANT EMERGENCY
ORGANIZATION CONTROL
CONTRACT SECURITY CONTINGENT
FOR MORE INFORMATION
APPENDIX 1
Academic Programs (colleges which offer degree/courses in security)
APPENDIX 2
MINIMUM TRAINING CURRICULUM FOR PRIVATE SECURITY POLICE
APPENDIX 3
Professional Certification Programs
APPENDIX 4
KEY TERMS AND CONCEPTS
ETHICAL DECISION MAKING
WHY UNETHICAL BEHAVIOR OCCURS
PATROL PREPARATION
RADIO TEN CODES
PHONETIC ALPHABET
0 of .
Results for:
No results containing your search query
P. 1
Protection Officer Training Manual

Protection Officer Training Manual

Ratings:

5.0

(1)
|Views: 4,543 |Likes:
Published by Xale D'Man

More info:

Published by: Xale D'Man on Mar 18, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

08/20/2013

pdf

text

original

You're Reading a Free Preview
Pages 7 to 60 are not shown in this preview.
You're Reading a Free Preview
Pages 67 to 94 are not shown in this preview.
You're Reading a Free Preview
Pages 101 to 126 are not shown in this preview.
You're Reading a Free Preview
Pages 133 to 187 are not shown in this preview.
You're Reading a Free Preview
Pages 194 to 327 are not shown in this preview.

Activity (38)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Bruno Guimarães liked this
Hercio Moyses liked this
sorin99sorin liked this
Wolf1369 liked this
hypnomate liked this
pretender liked this
bujin2011 liked this
Radu DImitriu liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->