The Loss Prevention Manager should be receptive to the needs and objectives of upper management and work to prevent and reduce loss from crime, fire accidents etc.
With the continuing threats brought to us by our AL Quaeda and Taliban enemies and the outbreak of new TV shows that reinforce the danger we all face on a daily basis, one must look within as to how we can protect ourselves from threats both real and imagined. I said imagined because we can become either hypochondriacs or completely oblivious to the dangers around us.
The situations we will focus on in this brief evaluation are those where large volumes of people congregate on a daily basis. Much has been written about airports and how the Government has stepped in to facilitate the security of baggage and boardings etc. Although Schools and theatres could be targeted, one area I would like to review is the Mall, which we have first hand knowledge of since we frequent them almost daily. The mall, some large and some small all handlelarge volumes of people daily. Its close proximity to the airports has caused me to visualize a frightening scenario from time to time. This also should be addressed in any critique of physical protection
Security for malls throughout the country is based on protecting the occupants and the property primarily from fire and water damage.
Personnel are generally given basic information as to what should happen in the case of fire and subsequent damage control, but essentially the function of either Security officers or tenants is to pull the fire alarm and wait for the fire trucks to get there, hopefully as quickly as possible.
Business continuity is a primary situation for the Mall and yet there is little accomplished to meet those requirements. With this in mind a good security officer should be a fireman and or be trained in fire prevention and training. In the world of fire training there are those who are listed as fire police. They are primarily there at the scene of a fire to direct traffic and move gawkers away from danger.
Mall security would seem to fit in this category, as they are not really trained in fire prevention nor fire combating. This exclusion in training on a primary and continual basis is a danger faced by the visitors and businesses that expect protection.
Fire-personal as well as the police, by nature, are trained to meet the demand for medical aid in the event of minor or major medical emergencies. At the least, basic first aid should be a required continual training program for all Mall personnel, with an emphasis on the Security Guard. The fact that defibrillators are available at Malls along with first aid kits but with little or no training approved by the Mall is a condition that should be addressed.
Most security guards are usually hired because they are between jobs, work cheap and don't ask a lot of questions. Training consists of reading a manual, taking an open book test that consists of :
2. Where the fire equipment is located
3. Reporting problems
4. How to tour the inside and outside of the building and
5. Limits of authority.
It is not the job of the Security Guard to fight fire, provide medical assistance or use force. The primary use of Security personnel is to walk the Mall during the business day and to report from time to time that they have gone into a tenant's space and shown their presence. Observing possible loss pevention does not appear in their lexicon.
Over the years the defensive tools used by security personnel has been reduced to carrying a set of handcuffs, which can only be used under the direction of a local law enforcement Officer in the completion of his duty. Again, without basic and ongoing training, the uniformed Protective Services officer is of no other use than to be seen. Physical contact with individuals is totally prohibited due to the same reason above. Lack of training creates liability to the Mall and to the officer.
The physical plant known as a Mall has many egresses and entrances. Sets of keys are used by housekeeping, maintenance and protection services to secure the movement throughout the site. In most cases the key systems work as the keys are assigned to individuals and are signed for. Various situations cause damage to the doors, some by the stores themselves and by visiting vendors. Unlawful entrance and egress from the stores occur at all times of the day or night. Doors that are broken and unable to be secured with a key are not repaired in a timely manner. Automatic closing devices are tampered with and are inoperable and in many cases doors are intentionally left open to allow easy access to various parts of the building by not only the Mall employees but many of the store personnel as well. Damaged doors and poor maintenance precludes the hazards to all visitors and employees as well. The ability to enter the building and to cause damage, either unintentionally or inntionally should be of paramount concern to the administration as well as injury to visitors and employees from individuals who may be emotionally, politically or criminally motivated. Daytime situations are normally different than evening and overnight due to the fact that more personnel are available and more activity promotes little opportunity for problematic situations. On one hand this combination of light and sound along with the presence of people creates the environment for terrorism and or criminal acts. During the evening hours there is the added problem produced by teenagers and young adults whocreate disturbances causing security extra work which distracts them from actual security and placing them in the position of acting as police, which they are not trained for. The use of force has been all but totally removed from their arsenal of protection. No training in civil disturbance or any other disturbance is given on any basis.
Radio communications is used in various ways depending on the requirements of the various departments within the Mall. The benefit is that communications are available to identify negative situations that would require fire, police, housekeeping and maintenance. In the event of an emergency, radio frequencies will be modified to meet the needs of security. Maintenance and housekeeping as well as Mall administration should be subordinate to security. The standard operating procedure would require that the individual in charge be completely cognizant of the workings of the building and at least have the workable phone numbers of department heads. In many situations of various venues, the phone numbers of employ ees are not kept up to date and can cause unnecessary delay not only in emergencies but also on a day to day basis to contact personnel who are due in for shift changes. It should be the responsibility of at least one person in administration to make sure that the phone numbers are kept up to date.
Video surveillance, on the most part, functions well. The worst problem is the lack of light particularly in the parking lot. Often the failure of pole lights creates blackout areas during evening hours. This makes it impossible to check activities from the control center. If there is only one guard on the midnight shift, it requires that the control center may be left unattended to check the lot as well as the entrance and loading doors. video cameras with night vision capabilities would provide the necessary protection of the lot. The inability to patrol and or visually observe the site have created criminal acts from break-ins,vandalism and murder. Using the parking lot or a lover's lane cannot be tolerated.
Without listing banal conclusions to these initial thoughts, lets recognize the need to be aware of that, which surrounds us. Remember, God is in the details!
With 8 years of service in the Military Police and former investigator for the State of NY election fraud bureau, a retired private and insurance investigator and presently actiove in the field of security. Member of the Police Commissioner's Association of Connecticut, International Foundation of Protection Officers.
Woman shot after a security guard and suspect exchange gunfire on West Side, police say - KSAT San Antonio
Woman shot after a security guard and suspect exchange gunfire on West Side, police say KSAT San Antonio
US has ‘absolute legal right’ to shoot down Chinese spy balloon, say national security experts - Fox News
US has ‘absolute legal right’ to shoot down Chinese spy balloon, say national security experts Fox News
Tallahassee hospital cancels procedures, diverts EMS after IT security issue Tallahassee Democrat
Attacks on Electrical Substations Raise Alarm The New York Times
President Biden Announces Appointments to the President’s ... The White House
Biden Administration Announces Additional Security Assistance for ... Department of Defense
CBP proposes efforts to strengthen aviation security | U.S Customs and Border Protection
Electronic pollbook security raises concerns going into 2024 New Haven Register
Texas Senate leaders signal intent to spend big on border security The Texas Tribune
Deputy Secretary Sherman's Meeting with Poland's National ... Department of State
Downtown bars under new security guidelines following fatal ... The Turlock Journal
US. Department of Homeland Security and Finnish Ministry of the ... Homeland Security
Marshall, Moran point to China spy balloon as proof of national ... Kansas Reflector
Palestinian leaders ‘rebuff' pressure to resume security coordination The Jerusalem Post
Basketball games add extra security after multiple lockdowns in Wake County during the week - WRAL News
Basketball games add extra security after multiple lockdowns in Wake County during the week WRAL News
Band of Barbers, Judges and Security Guards Uses Soviet-Era Guns ... The Wall Street Journal
Statement of Homeland Security Secretary Mayorkas on the Family ... Homeland Security
Turkey says West failed to share details of security threat The Associated Press - en Español
Exclusive: Supreme Court justices used personal emails for work and 'burn bags' were left open in hallways, sources say - CNN
Exclusive: Supreme Court justices used personal emails for work and 'burn bags' were left open in hallways, sources say CNN
Memphis Police Chief Trained With Israel Security Forces The Intercept
Williamsport security guard allegedly chokeholds boy PAHomePage.com
Security guard accused of killing man during fight at grocery store will not face charges - Fox Baltimore
Security guard accused of killing man during fight at grocery store will not face charges Fox Baltimore
TikTok's Transparency Campaign Echoes Effort by Huawei to Ease ... The Wall Street Journal
Barely Dressed Woman Meanders Through Security At The Miami ... View from the Wing
US will send Stryker combat vehicles to Ukraine for first time as part of $2.5 billion security package - CNN
US will send Stryker combat vehicles to Ukraine for first time as part of $2.5 billion security package CNN
The Security Service of Ukraine exposed officials of the ... Odessa Journal
DHS Announces Process Enhancements for Supporting Labor ... Homeland Security
More Than $3 Billion in Additional Security Assistance for Ukraine Department of Defense
DHS Continues to Prepare for End of Title 42; Announces New ... Homeland Security
Remarks by President Biden on Border Security and Enforcement The White House
JsonWebToken Security Bug Opens Servers to RCE Dark Reading
Git patches two critical remote code execution security flaws BleepingComputer
Identity Thieves Bypassed Experian Security to View Credit Reports ... Krebs on Security
Joint Statement by Canada and the United States on NEXUS Homeland Security
Microsoft ends Windows 7 extended security updates on Tuesday BleepingComputer
Protecting Your Identity On The Internet
Afraid that someone is monitoring your PC or installed a keylogger to record every single keystroke? Find out which tools you need to get to make sure you are protected.X-Cleaner Deluxehttp://www.
Eliminate Adware and Spyware
Everyone should eliminate spyware and adware from your hard drive for your computer privacy protection. Spyware and adware programs also slow down the speed of your computer by cluttering your hard drive with annoying programs.
If You Steal It, They May Come!
Business on the internet is getting down right shameless. This week, my email box was literally filled with hype, overly inflated promises, phish mail, scams, ezines I did not order, and about 14 viagra gimmicks.
Can I Guess Your Password?
We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access? But of course remembering all the different passwords can be a headache.
Its Time to Sing the Encryption Song - Again!
Yes, I'm wearing my encryption hat again. Why you may ask? Well I just finished reading about the newest security hole in Microsoft's latest server product.
Personal Firewalls - Secure Your Computer
There has not been a time in the history of the personal computer that firewalls and anti-virus programs have been more necessary and in-demand. Today, personal computer security is not only threatened by viruses and worms, but also by spyware - those severely annoying programs that are illegally loaded onto your computer from the internet.
Spyware Programs Are Out To Get You!
The average computer is packed with hidden software that can secretly spy on online habits.The US net provider EarthLink said it uncovered an average of 28 spyware programs on each PC scanned during the first three months of the year.
Click Here To Defeat Evil
Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement:"A security issue has been identified that could allow an attacker tocompromise a computer running Internet Explorer and gain control over it.
6 Ways To Prevent Identity Theft
These six ways to prevent identity theft offer you valuable tips against the fastest growing crime in America today. In 2004, more than 9.
Anti-Spyware Protection: Behind How-To Tips
There is no doubt that "how-to articles" have become a separate genre. One can find such an article about almost anything; there are even some entitled "How to Write a How-To Article".
Dont be a Dork - Protect Yourself
There are folks out there who use their powers for evil, not good. Let's not give them the opportunity to sneak into our lives and wreak havoc.
Three-pronged Trojan Attack Threatens Security on the Internet
Free Ways to Tackle Threats to Your Computer
Protect Your PCHaving problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet?Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either.
The Loss Prevention Manager should be receptive to the needs and objectives of upper management and work to prevent and reduce loss from crime, fire accidents etc.With the continuing threats brought to us by our AL Quaeda and Taliban enemies and the outbreak of new TV shows that reinforce the danger we all face on a daily basis, one must look within as to how we can protect ourselves from threats both real and imagined.
Are You Surfing Safe?
Ok, you've got a computer, and you get online. You surf your favorite sites, Sports, Shopping, Cowchip Tossing Blogs, and so on.
All About Computer Viruses
Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won't seem to open.
The Top Twelve Threats No Computer User Should Ignore
The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content.However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties.
Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders
Can you protect your computer from all possible viruses and other invasions?The quickest answer to this is "no." It's just flat impossible to protect your computer from all viruses, registry attacks, worms, spyware, malware, popups, and other such nasties.
How To Avoid Hackers From Destroying Your Site?
Recently, my site and other internet accounts ( http://www.nabaza.
Reclaim Your PC from the Internet Spies
Viruses are, however, not the only malicious software programs out there. The newest addition to the evil software family is the so called Spywares and a good anti-virus program or firewall is not enough to safeguard against these clever programs.
|home | site map|