ASIS CPP - Physical Security (Part 3) Flashcards

(141 cards)

1
Q

Contraband

Methods of Contraband Detection

A

Manual search

Metal detectors

Package searches (x-ray, etc)

Explosives detection (bulk and trace)

Chemical and biological agent detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Contraband

Advantages to a manual search

A

Low hardware investment, flexibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Contraband

Disadvantages to manual search

A

Slow throughput, higher labor costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Metal Detectors

A

Magnetometer

Continuous wave

Pulsed field

Handheld

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Contraband

Materials with low atomic numbers (“Z-numbers”) materials starting with hydrogen and ending with Z-number 26, Aluminum

A

Low-Z Materials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Contraband

Bulk Explosives Detection

A
  • Macroscopic, detonable amounts of explosives
  • Targets specific threat amounts of explosives
  • Usually uses ionizing radiation that is not safe for use on people
  • Measures X-ray absorption coefficient, X-ray backscatter coefficient, dielectric constant, gamma or neutron interaction, or microwave or infrared emissions
  • Can determine calculated mass, density, nitrogen, carbon, oxygen content, and effective atomic Z number
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bulk Explosives Detectin (ctd…)

A
  • Multiple-energy X-rays and backscatter X-rays more readily identify low Z-number materials
  • Hi-energy X-rays are large, fixed mechanisms designed to scan large cargo containers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What may be combined with backscatter X-ray technology for detection of low Z-number materials?

A

High-energy X-rays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What devices can use gama rays or neutrons for detection (very high penetrating)?

A
  • Thermal neutron activation (TNA)
  • Pulsed fast neutron absorption (PFNA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Detects the presence of nitrogen through gamma wavelengths

A

Thermal Neutron Activation (TNA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What determines carbon and oxygen content?

A

Pulsed Fast Neutron Absorption (PFNA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Determination of nitrogen, carbon and oxygen content lends more accuracy to separating explosives from foot items

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Food items/cargo cannot be irradiated at energy levels of more than 10 milli-electron volts (MeV) (international law)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bulk Explosives Detection

What is safe for humans, producing 10 microrem per dose?

A

Low-dose backscatter X-ray technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bulk Explosives Detection (ctd…)

CT scans spin sensors on a gantry around the package and produce a 3D image that detects small threat masses; may be subject to high NAR’s

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Quadruple resonance (QR) technology uses…

A

pulsed low-energy radio waves to detect nitrogen-rich materials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What uses laser interrogation and analysis of the spectrum of scattered light to identify threat materials?

  • Cannot see through opaque packaging - designed for clear package searches
A

Raman Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This detection is still under research and development - experiements with distance detection of explosives with infrared cameras, passive and active millimeter-wave imaging systems, and lasers sensing fluorescence or atomic emissions

A

Stand-off Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Trace Explosive Detection

A

Particles and vapor residues associated with handling explosives

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Trace Explosives Detection

Key Performance Metrics

A
  • Limit of detection (smallest detectable amount) (may be as low as < 1 nanogram)
  • Selectivity (ability to distinguish one material from another)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Trace Explosives Detection

Sampling Methods

A
  • Swipe (most efficient)
  • Vapor (puffing) (less invasive)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Trace Explosives Detection

Challenges

A
  • Low vapor phase concentrations of several common high explosives (parts per billion and parts per trillion)
  • Packaging of explosives with oil-based gel or solvent
  • Absorption of explosive molecules upon most materials at room temperature and decomposition upon moderate heating or exposure to high energy, and thus loss of significant sample material in collectin and transport
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Trace Explosives Detection (ctd…)

Techologies

A

Low mobility spectrometry (IMS)

Colorimetry

Chemiluminescence

Mass Spectrometry

Fluorescence

Canine Olfaction

Trase Explosives Detection Portals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Contraband Detectin

Methods

A

Chemical agent detection

Biological agent detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Contraband Detection Chemical Agent Detection
Uses point sensors at perimeters Goal is early warning NAR is a serious consideration (due to high response level) May not be appropriate for checkpoint screening May use optical sensing methods
26
Contraband Detection Biological Agent Detection
Different from chemical detection in two ways: 1. Most biological agents are not immediately lethal, impacting necessary response times 2. Usually requires several hours for collection and analysis of air samples
27
Physical Protection Systems (PPS) Deployment Methodology The primary objectives of a PPS are...
Detection Delay Response
28
PPS Deployment Methodology Biggest causes of vulnerabilities in a PPS...
Improper component selection Improper installation and maintenance Improper operation Improper integration
29
PPS Deployment Methodology A collection of products, processes or both combined to provide a solution to a problem or goal
System
30
PPS Deployment Methodology Systems, not components, are optimized to yield **the most effective design to the problem**
31
PPS Deployment Methodology A logical method for problem solving in which a comprehensive solution is developed in relation to a problem having several dimensions
ASIS definitionof "systems approach to problem solving"
32
PPS Deployment Methodology In the security context, a system is a combination of...
equipment, personnel, and procedures, coordinated and designed to ensure optimum achievement of the system's stated objectives
33
PPS Integration The combination of a variety of components sucha as people, technology and procedures
Integration
34
PPS Integration Who should engineer the PPS by using the building blocks of people procedures, and technology?
Security Manager
35
PPS Integration In general, **a well-designed, integrated PPS** is more effective against lower-level threats than high-level threats
36
PPS Integration **"Delay-in-depth" = "Protection-in-depth"**
37
PPS Integration Access delay barriers types
Passive (walls, fences, locks, etc...) Security Officers (most flexible, but expensive) Dispensible (fogs, foams, etc)
38
PPS Integration An effective PPS combines the following into an integrated system
People Equipment (technology) Procedures
39
PPS Integration Regardless of how the investigation tool is used; it is an important design element in a PPS and should be used when appropriate
40
PPS Integration Procedural changes can be cost-effective solutions to physical protection issues, although when used by themselves they will only protect assets from the lowest threats
41
PPS Analysis Analysis of the PPS provides two key benefits
1. It establishes the assumptions under which a design was formed 2. It relates system performance to threats and assets, making possible a cost-benefit decision
42
PPS Analysis Analysis evaluates whether the PPS' people, procedures, and technology are achieving the PPS functions of detection, delay, and response
Also referred to as a site survey or vulnerability assessment May be qualitative or quantitative
43
PPS Analysis Qualitative Analysis
Lower-security applications i.e. retail, restaurants, small businesses, etc...
44
PPS Analysis Quantitative Analysis
Higher-security applicaitons Unacceptably high impact, despite level of probability ie. museums, refineries, airports, etc... Require immediate, onsite response to events
45
PPS Analysis Two basic analysis approaches are used in a vulnerability assessment (VA)
Compliance-based (Qualitative) Performance-based (Quantitative)
46
PPS Analysis What system is evaluated on the performance and cost-effectiveness of individual measures in
...Countering threats ...Reducing vulnerabilities ...decreasing risk exposure considered as an integrated whole
47
PPS Analysis PPS performance measure are:
Detection Response
48
PPS Performance Measures Detection
Probability of detection Time for communication and assessment Frequency of nuisance alarms Delay Time to defeat obstacles
49
PPS Performance Measures Response
Probability of accurate communication to response force Time to communicate Probability of deployment to adversary location Time to deploy Response force effectiveness
50
PPS Analysis Interruption
Arrival of responders at a deployed location to halt adversary progress, which may lead to neutralization Probability of Interruption (PI)
51
PPS Analysis Neutralization
Defeat of the advesaries by responders in a face-to-face engagement Probability of Neutralization (PN)
52
PPS Analysis PPS Effectiveness (PE) = **PI x PN**
53
PPA Analysis An ordered series of actions against a facility, which, if completed, results in compromise of assets
Adversary Path
54
PPS Analysis **Adversary Sequence Diagram (ASD)**
A functional representation of the PPS at a fcility that is used to describe the specific protection elements present Illustrates the paths that adversaries can follow to accomplish sabotage, theft or other harm
55
Adversary Sequence Diagram There are three basic steps in creating an ASD for a specific site
1. Describing the facility by separating it into adjacent physical areas 2. Defining protection layers and path elements between the adjacent areas 3. Recording detection and delay values for each path element
56
ASD The biggest mistake in ASD is...
To follow a single path from off-site to the largest location and only do an analysis on that path
57
ASD ctd... The best method for creating an ASD is...
To walk or drive around the exterior of the area, then repeat the same inside
58
ASD ctd... Sabotage incidents require...
Evaluation of only entry paths, as exit paths become irrelevant once the damage is done
59
ASD ctd... ASD's should be executed for...
Day/night, open/closed, and other contradicting conditions fo the facility
60
ASD ctd... Sometimes used as a substitute for defined threats in the ASD process, but this can lead to gaps in analysis
Scenario Analysis
61
ASD ctd... Preferred Approach
Analyze PPS using defined threats and path analysis, then generate scenarios by looking at weak paths
62
ASD ctd... Scenario analysis must also consider the possibility of concurrent attacks on multiple assets, concurrent threat objectives (i.e.. theft and sabotage, etc...), and attack by multiple threat teams
63
ASD ctd.. PPS response includes personnel and the communications system they use
64
ASD ctd... The systems design process is **a serial process**
65
PPS Design What is the most important element in the defense against dynamic threats and potential catastrophic losses?
**Proper use and application of the integrated security systems design process**
66
PPS Design A well-engineered PPS exhibits the following characteristics
Protection-in-depth Minimum consequence of component failure Balanced Protection
67
PPS Design The design process can be based on two criteria/approaches
Performance criteria (preferred method) Feature criteria ("checlist" method that may ignore performance goals)
68
PPS Design 4 Elements of Physical Design
Deter Detect Delay Respond
69
PPS Design Important factors in system design are...
The environment and unique needs of the facility
70
PPS Design The best PPS solutin is designed by considering
Threats Risks Vulnerabilities Constraints
71
Systems Design Process Systems Design Process Phases
Planning and assessment Design and documentation Procurement Installation
72
PPS Design - Phase 1 Task 1, Identification of
Critical assets Potential threats Subsequent vulnerabilities Likely risks Functional requirements
73
PPS Design - Phase 1 Task 2
Analyze security requirements and formulate solutions or countermeasures concepts to reduce or eliminate vulnerabilities and mitigate risks
74
Systems Design Process - Phase 1 The first phase of any security design project
Planning and Assessment Phase
75
Systems Design Process - Phase 1 In the architectural process its referred to as...
Programming or Schematic Design (SD) phase
76
Systems Design Process - Phase 1 Consists of gathering all relevant pre-design asset information and analyzing it in terms of project requirements and constraints
77
Systems Design Process - Phase 1 Culminates in a security "basis of design"
The basis of design is the first and most important output of the design process Focuses on specific project requirements and a conceptual design solution based on those requirements
78
Systems Design Process - Phase 1 the planning and assessment phase results in a conceptual design solution that categorizes vulnerabilities by their criticality and identifies the most preferred and cost-effective protection scheme to mitiage or eliminate asset risks
79
Systems Design Process - Phase 1 Another important outcome of the planning phase is the development of the business case for the new or upgraded security systems
80
Systems Design Process - Phase 1 Security design is just as dependant on collecting good data leading to informed decisions by knowledgeable people as is any other analytical process where a solution is engineered and constructed
81
Systems Design Process - Phase 1 The basis of design becomes the designer's means to obtain consensus from the design tema on...
The goals and objectives of the project What will constitute the project How the project will secure the assets
82
Systems Design Process - Phase 1 **Implementing the basis of design** is not the time to identify engineering details, prepare budgets, or identify and debate specific countermeasures
83
Systems Design Process - Phase 1 **The Conceptual Design, also called a Design Concept**, is the last task of Phase 1 Planning and Assessment
84
Systems Design Process - Phase 1 A design concept's detail should never be more than a top-level description of the various anticipated security system elements, subsystems, and support systems
85
Systems Design Process - Phase 1 From an architectural perspsective, the Design Concept is usually referred to as the **initial conceptual design or schematic development (SD) phase**
86
Systems Design Process - Phase 1 Most security designers identify four principal security strategies - **prevention, detection, control and intervention** - as the most important functional requirements of security design
Homeland security features five principal strategies: **Preparation, prevention, detection, response, and recovery**
87
Systems Design Process - Phase 1 The importance of having a redundant security system (multiple layers of security) is based on the 10 principles of probability developed **by the French mathematician and astronomer Marquis de Laplace (1749 - 1827)**
88
Systems Design Process - Phase 2 Design and Documentation may be split into two phases in the construction idustry
Design Development (DD) Construction Documents (CD)
89
Systems Design Process - Phase 2 Design Development (DD)
Generally DD includes a preliminary design (30-35%) following the conceptual design and concludes with a 50%-60%
90
Systems Design Process - Phase 2 Construction Documents (CD)
Generally starts with a 60% design and passes through a 90% submission and conclused with 100% CD set
91
Systems Design Process - Phase 2 The CD set consists of three elements
1. Contractual details (usually the Div 01 spec for large projects) 2. Specification (Div 28 for security on large projects) 3. Drawings (not required for a services contract, like guards)
92
Systems Design Process - Phase 2 The objective of Phase 2 (DD) is...
To complete the design and to document the process to the level of detail necessary for the chosen method of procurement
93
Systems Design Process - Phase 2 Division 28 (Div28) is the Electronic Safety and Security section of the construction specifications institute (CSI) MasterFormat specifications template that includes 50 sections total (not all used)
Each division, or section, is divided into three parts: General Products Executiong
94
Systems Design Process - Phase 2 Security systems drawings are always considered secondary to the specifications (specs take precedence)
95
Systems Design Process - Phase 2 Drawings include the following types
- **Plans (**top view, map-like view of system component placement int he facility - **Elevations** (views of vertical surfaces that show mounting heights and locations of wall-mounted devices **- Details** (define elements of the system in more detail **- Risers** (chart-like reprentations of complete subsystems such as CCTV or access control **- Hardware schedule**s (tables that provide detailed component information
96
Systems Design Process - Phase 2 Key factors to be considered in hardening of a facility
Stand-off distance Structural integrity of the premises Prevention of progressive collapse Redundancy of operating systems
97
Systems Design Process - Phase 3 Procurement **The type of procurement should be determined before or at the start of the design phase** because the type of procurement determines the level of detail required in the construction documents (CDs)
98
Systems Design Process - Phase 3 Three major forms of security systems procurement
1. Sole source 2. Request for proposal (RFP) 3. Invitationfor bid (IFB)
99
Systems Design Process - Phase 3 Sole Source
- May be the most appropriate for small projects - This method of procurement is recommended only where the security owner has the capability to perform the security needs analysis and has good prior knowledge of systems and prices
100
Systems Design Process - Phase 3 Sole Source
Positives The construction documents are usually simple, reducing owner design costs and saving time
101
Systems Design Process - Phase 3 Sole Source
Negatives ## Footnote 1. There is a tendency to focus on hardware and technology only, leaving the equally important personnel, procedures, and facilities subsystems for others 2. The owner may tend to skip the all-important security planning process and rely on advice from a contractor with a vested interest in selling equipment 3. Without a competitive bidding process, the organization has no means of comparing prices
102
Systems Design Process - Phase 3 RFP
## Footnote Almost always based on a set of detailed design and construction deocuments Specifications are usually generic and performance-based Equipment makes and models are often listed with the phrase "or approved equal" The owner typically procures a security business partner, not just a one-time security systems installer An RFP response may be open to any contractor or it may be limited to a list of prequalified contractors
103
Systems Design Process - Phase 3 RFP (ctd...)
- In addtion to providing a cost proposal, a proposer must submit a technical proposal that describes the firm's understanding of the requirements and how the objectives will be met - It is common to allow responders to propose alternate solutions, called "alternates" - The RFP need not restrict the organization to accept the lowest bid. Instead, it aims to obtain the best value - If price will not be the determining factor in vendor selection, the RFP should say so - A contractor's response to an RFP usually takes longer to prepare than responses to other types of procurement because both a technical and a cost proposal must be prepared
104
Systems Design Process - Phase 3 IFB
- Commonly used by government and other organizations whose procurement procedures require that projects be competitively bid and that the award be given to the lowest qualified, responsive bidder - No technical proposals or alternative solutions are sought, so the construction documents must be extremely explicit - The onus of selecting equipment makes and models, and the accuracy of the security system design, is placed solely on the design team
105
Systems Design Process - Phase 3 IFB
- Bidders submit a cost proposal or bid, which may contain **unit pricing and whatever price breakdown is requested** - The award is then made, usually wihtout negotion **to the lowest qualified bidder who has conformed to the bidding instructions** - The IFB requires additional time and cost in design and specification, but **typically needs only one or two weeks of procurement time, depending on the size and complexity of the project**
106
Systems Design Process - Phase 3 IFB (ctd...)
- It is common to require bids to be **sealed and delivered by a specific time to a specific location:** * **At the time and place, the bids are opened (often publicly)** and the apparent winner is announced * Contracts are signed when the apparent winner's proposal has been checked for **completeness, accuracy, and qualifications**
107
Systems Design Process - Phase 3 In an RFP or IFB, the pre-bid conference should be held **one week after CD's are issued for bid**
108
Systems Design Process - Phase 4 Installation The most important step in stalling the PPS
to plan correctly
109
PPS Systems Design Process - Phase 4 Second step in installing the PPS
for the contractor to visit the site to ensure conditions agree with designs
110
PPS Systems Design Process - Phase 4 Four types of Installation Tests
Pre-delivery or factory acceptance tests Site acceptable tests Reliability or availability tests After-acceptance tests
111
PPS Systems Design Process - Phase 4 Factory Acceptance Testing
Demonstrate system performance complies with specified requirements in accordance with approved factory test procedures
112
PPS Systems Design Process - Phase 4 Site Acceptance Test
Contractor should verify all previous test results, diagnostics and calibrations two weeks prior to acceptance testing
113
PPS Systems Design Process - Phase 4 Reliability Testing
Conducted in alternating phases of testing and evaluation to allow for validation of the tests and corrective actions
114
PPS Systems Design Process - Phase 4 After-implementation Tests
Operational tests Performance tests Post-maintenance tests Subsystem tests Limited scope tests Evaluation tests
115
PPS Systems Design Process - Phase 4 All the technological and procedural precautions in the world will be ineffective **if they are not executed properly**
116
PPS Systems Design Process - Phase 4 **Without appropriate training**, personnel are more likely to contribute to security risks accidentally
117
PPS Systems Design Process - Phase 4 The common time for the contractor to report to the job site to address a warranty issue is
**within four hours of the problem report**
118
PPS Systems Design Process - Phase 4 A PPS maintenance agreement typically includes two categories of services
1. Remedial maintenance that corrects faults upon failures 2. Preventitive maintenance consists of scheduled maintenance to keep the PPS in good operating condition
119
PPS Systems Design Process - Phase 4 Indications of a poor maintenance program
Frequent system failures Cursory testing procedures An inordinate number of components awaiting repair
120
PPS Systems Design Process - Phase 4 Typically, maintenance and warranty costs equal **11% of the total capital systems construction cost**
121
Security Officers - Purpose A human being is needed if the post requires the ability to
Discriminate among events, persons, circumstances, or physical objects based on complex and varying criteria Conduct rational dialogue with people face-to-face and discern next actions based on such communication Use physical force or the threat of it to restrain one or more persons Exercise judgement to determine a logical course of mental or physical activity Provide reports detailing their activities on an ongoing basis
122
Security Officers - Purpose A security officer post is any location or combination of activities for which a trained human being is necessary and includes three key concepts:
1. A location or combination of activities 2. Necessary human being 3. Training and competence to accomplish the required activities
123
Security Officers **Security officers** represent the largest segment of security sector employees and are the largest cost element in the majority of security operating budgets
124
Security Officers What are generally the largest item in the operating budget of a security department
Personnel Costs
125
Security Officers Private security outnumbers..... in the U.S. by 3 to 1?
Law Enforcement
126
Security Officers - Deployment Structures of security operations - Vertical Model
"Hierarchical model" Authority starts at the top
127
Security Officers - Deployment Structures of security operations - Shamrock Model
Three leaf shamrock Leaf 1: Professionals, managers, and skilled technicians Leaf 2: third-party suppliers Leaf 3: Part-time and temporary workers (flexible)
128
Security Officers - Deployment Structures of security operations - Network Model
"Flattened" "Horizontal" or "open" model Connections between employees and multiple supervisors Security department itself is networked to other departments
129
Security Officers - Deployment The number of officers required for a facility is determined by several factors, including:
Physical complexity and size of the facility Number of employees Nature of work Number of entrances (and hours they are open) Value and amount of assets being protected Number of patrols needed Number of escorts and special assignments needed
130
Security Officers - Deployment A 24/7 post requires a minimum of 4.2 officers (168 hours @ 40 hour shifts)
4.5 to compensate for sick, vacation, and holiday leave
131
Security Officers - Basic Functions Where personal recognition for access-control purposes is required, under low-density queuing, a remote operator **could control three or four access points**
132
Security Officer - Rank & Authority The efficiency of the security force depends on **the adquacy and skill of its supervisors**
133
Security Officers - Rank & Authority Security officer supervisors are selected on **the basis of their knowledge of the job and demonstrated administrative and leadership abilities**
134
Security Officers - Regulation Jurisdictions use two different methods for regulating security activity
1. Requiring the licensing of the primary controlled business - the individual or corporate applicant must typically apply for and obtain a license before engaging in the regulated activity 2. The second method applies to the licensing or registration of employees fo the business other than those named on the original application
135
Security Officers Recommendations resulting from the 1972 Rand Report on private security in the U.S.
- Government regulation should be applied as uniformly as possible - Regulation should be at the state level - Directors and managers of in-house security services as well as owners and managers of contract security services should be licensed - All employees of both proprietary and contract security organization should be registered by the state - Each license and registrant should meet minimum standards or qualifications (which could vary among types of licensees and registrants
136
Rand Report
- State regulatory agencies should conduct background investigations of each applicant for a license or registration (i.e.. for all security employees, proprietary and contract), including a criminal records check and prior employment verification for a period of seven years - All new applicants for licensing and registration should have completed high school or it equivalent or must pass a special literacy test - Experience in private security should be required before a license is granted. A bachelor's degre (or higher) should be permitted to substitute for some of the experience requirement.
137
Rand Report
- Licenses should meet a minimum bond or insurance requirement - State agencies should require minimum training programs for all types of private security personnel - Separate training programs should be required for different security positions, such as guard, investigator, polygraph operator, and central station alarm responder - Instructors' schools shold be accredited by the state regulatory agency
138
Rand Report
- Currently employed security personnel should be given on year to meet the training requirements - Private security personnel should be prohibited from carrying concealed firearms while on duty. Company-furnished weapons shold remain on company proprty during off-hours - Statutory liability shold be imposed on private security businesses for weapons abuses by their employees against private citizens
139
Rand Report
- Regulatory agencies should hav the authority and resources to spot-check private security records and operations - Local police and insurance companies should forward to the regulatory agency any information coming to their attention involving major complaints or incidents involving security personnel - Prior criminal convictions related to potential abuses in private security should be a basis for denying registration or licening
140
Rand Report
- Evidence obtained by illegal search by private individuals should be subject to suppression either on a per se basis (as is the case for evidence illegally seized by law enforcement) or ad hoc, with the judge or magistrate weighing the equities - Uniformed private security personnel should be forbidden to engage in interrogation or interviewing - Jurisdictioins should regulate the color and style of private security uniforms, as well as the use of police titles by private seucrity personnel
141
Rand Report
- Any firm hiring the services of an independant security contractor should be held liable for any negligent failure to control the contract staff - The federal government should consider funding a research center to evaluate the effectiveness of private security personnel. Its finding should be included in an overhauled statistical reporting system to be maintained by the insurance industry