Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (2.72 MB, 623 trang )
108
9. AUTOMATION IN PROTECTION OPERATIONS
services themselves remained largely low-tech,
focusing on armed guards and facility protection (Smith, 2003).
The next major jump in security services
occurred as World War II approached and the
defense industrial complex emerged. The field
of “industrial security” was established to meet
the needs of the federal government in managing security requirements for defense contractors. The “industrial security” era resulted in
a wide array of new security-related technologies, concepts, and procedures—and an increase
in the use of security officers. Existing security
providers opened specialized divisions and new
providers were established to meet the need.
Despite these innovations and forward-looking
companies, many people viewed the security
industry as nothing more than night watchmen, even up to and through the 1960s. Over
the next three decades, the use of security officers became more prevalent. Ironically, one reason for this may have been the development of
security technology such as electronic access
control and surveillance systems. For example,
these technologies led to the establishment of
security operations centers (or command centers), which created a new function for protection professionals.
During these years, computer and communications technologies developed rapidly and
permeated virtually every type of business as
well as our personal lives. However, the security services industry is generally perceived as
having been slow to embrace technology in the
performance of their mission.
The terrorist attacks of September 11, 2001,
brought new and intense attention to the security industry in both the public and private sectors. One of the benefits of this attention was the
development and implementation of new and
improved security technology applications.
Essentially, it gave a “shot in the arm” to security budgets and made it easier for security professionals to justify innovations in equipment,
tactics, and techniques.
A number of studies in recent years have
projected massive expansion of electronic security systems employing advanced technologies,
but they also concluded that the human element
(i.e., security officers) will not be predominantly
replaced by technology (Webster University,
2009). This conclusion is particularly interesting, and profound, since some of those studies
were funded by security systems vendors.
Nonetheless, technology can and should be
exploited by the security services industry—and this will require officers and supervisors
who are well rounded in technology applications. Some of these applications are discussed
in the remainder of this chapter, according to
the primary functions they perform.
CONTEMPORARY SECURITY
ENVIRONMENT
Today, an increasing number and variety of
technology applications support security functions. The most relevant of these applications,
from the perspective of the professional protection officer, are listed below.
Incident Management Systems
Few would argue that one of the most tedious
tasks for the protection officer is report writing.
Originally, incident management systems simply
changed the task of writing a hardcopy report
into a computer-based function where officers
would enter the same data into a computer using
a word-processing-like program. One of the
benefits of this change was that users of these
reports no longer had to deal with issues such
as poor handwriting and missing pages. Data
entry, however, was awkward, formats were
cumbersome, and it was difficult or impossible
to include attachments, diagrams, and sketches.
The functionality of incident management
systems expanded rapidly and developed into
more integrated tools such as IRIMS (Incident
III. PROTECTION OFFICER FUNCTIONS
CONTEMPORARY SECURITY ENVIRONMENT
Reporting and Information Management System), a product of a Canadian firm known as
PPM 2000. The product was introduced in the
mid-1990s and released as a full enterprise-wide
version in 2001. During this time, a number
of competing products such as iViewSystems
entered the marketplace as well.
The real benefit of these tools is their ability
to integrate, manage, and truly use the information not only for incident management but also
for subsequent investigations, trend analysis,
and strategic security planning. Unfortunately,
many organizations (whether by decisions of
the executive management or of security directors themselves) remained with the “comfortable” paper-and-pencil method, using hardcopy
(often handwritten) incident reports.
Some of the complaints regarding automated
incident management systems were a lack of
user-friendliness, inability to adequately tailor the
system to the particular company using it, inconvenient report generators, and, not insignificantly,
that officers were not computer-savvy enough to
effectively use the systems. Today, many of those
problems have been solved with new versions of
the software or even new product lines for incident management systems. For instance, most
products now include extremely user-friendly
GUIs (Graphic User Interfaces) that make data
entry straightforward and officer familiarization
quick. See the “Emerging Trends” box at the end
of this chapter to learn about some of the trends
in these systems and why they have become an
invaluable tool for asset protection programs in
both the public and private sectors.
Visitor Management Tools
Automated visitor management tools are
widely available today and should be in use by
almost all types and sizes of organization. Among
the types of visitor management tools are:
●
Visitor management modules within
incident management systems
●
●
●
●
109
Stand-alone visitor management tools
that can be linked to existing incident
management systems
Stand-alone visitor management products
(independent)
Sophisticated, completely integrated visitor
management tools
Simple, low-end, affordable visitor
management tools
Automated tools for visitor management
have several advantages, including the ability to
keep a searchable record of visitors and generate reports based on individual, company, facility, or date range. Data from these systems can
also support subsequent investigations when
an incident is discovered after the fact. From a
life safety perspective, some systems can report
who is currently in a facility, allowing protection professionals to better account for all building occupants in the event of an evacuation.
System components may include an input
device that can read driver’s licenses or other
identification cards (including photographs),
cameras, badge printers, and self-service kiosks
(for larger applications). Most automated
systems also allow employees to preregister
expected visitors (this can usually be done
through the company intranet right from the
employee’s desktop). Another benefit is the ability to store records of and designate frequent or
repeat visitors. Both of these capabilities serve
to streamline entry procedures, thereby facilitating business operations and presenting a professional security image for the organization.
Among popular product providers are
EasyLobby, iTrak (by iViewSystems), TEMPbadge
(the company that first introduced self-expiring
paper badges), and LobbyGuard. In addition,
extremely affordable packages such as one
by Brother are available at popular office supply stores. This indicates that there are visitor
management tools on the market for all types
of users, all sizes of facilities, and at all cost
levels.
III. PROTECTION OFFICER FUNCTIONS
110
9. AUTOMATION IN PROTECTION OPERATIONS
There is no excuse today for using a handwritten sign-in log as a visitor management tool.
In addition to the inefficiencies and inability to
electronically store and access data, hardcopy
visitor logs can represent a security vulnerability.
Visitors can generally view the log while they are
signing in and see who else (individual, company,
etc.) was recently in the facility. In some environments, that may be very sensitive information—
or may at least represent a privacy issue.
Near-term plans for CAP Index include
“… an ‘ultimate dashboard’ that will merge
crime forecasting with site surveys and risk
assessment, event history and loss-related
alerts …” (Groussman, 2008, p. 63). Tools like
this should be used for strategic security planning, making a business case for new policies
and programs, and conducting risk assessments.
It is extremely useful to track crime data for a
given location over time and also be able to
compare crime levels in surrounding areas.
Crime Mapping
Another category of automation that is
increasingly important to the crime prevention
and security communities is that of crime mapping. The most well-known and respected provider of crime mapping services is CAP Index.
They refer to their primary capabilities as crime
forecasting and security risk analysis. This firm
provides several products, all based on objective crime and incident data. Among the uses
for this type of data are:
●
●
●
●
●
●
Site selection—used by organizations to aid
in determining where to locate new facilities
or where to expand existing facilities based
in part on local crime data
Rank and compare—the ability to compare
crime statistics at different locations
Security allocation—data to assist in
determining security force deployment, staff
augmentation, and resource allocation
Litigation defense—crime data can be used
to justify corporate policies and procedures
that may be questioned during a securityrelated lawsuit or other legal action
Loss prediction—products can be integrated
with corporate data such as shrinkage figures
to aid in predicting losses and setting risk
tolerance (thresholds) for specific retail or
other sites
Return on investment (RoI)—data can be
used to justify security expenditures and
projected budgets for specific sites or entire
enterprises
Geospatial Information Systems (GIS)
Closely related to crime mapping, GIS provides a graphic view of various situations by
leveraging the capability to layer information
from different databases or inputs over a map
or image. This tool is generally used for exterior
spaces (e.g., a map of a city or neighborhood),
but can also be used with diagrams, campuses,
or even building interiors. The objective may be
to review historical data (such as incidents or
a particular type), identify patterns of activity,
display sensitive locations or areas that warrant
special security attention, support an investigation, identify traffic patterns (vehicular, foot,
or product), or compare any type of data with
other data sets by location.
One example of a GIS provider is ESRI, which
has supported a wide variety of homeland security, law enforcement, disaster management,
and public safety projects. They provide commercial-off-the-shelf (COTS) software as well
as individualized consulting and project management services. The ESRI Web site states that
“a geographic information system … integrates
hardware, software, and data for capturing,
managing, analyzing, and displaying all forms
of geographically referenced information. GIS
allows us to view, understand, question, interpret, and visualize data in many ways that reveal
relationships, patterns, and trends in the form
of maps, globes, reports and charts.” Regarding
force protection and security applications,
III. PROTECTION OFFICER FUNCTIONS
CONTEMPORARY SECURITY ENVIRONMENT
the site mentions the ability to “assess security
risks, develop preparedness and security plans,
and understand the impact of incidents” as key
benefits (ESRI, 2009).
According to an article in the Fall 2002 edition of Energy Currents, GIS can be used not
only for security planning but also to develop
exercise scenarios and to compare projected outcomes of various security solutions. Some applications suggested by the article are comparing
scenarios for pedestrian traffic flow and timing
for building evacuations, simulating “entire
community” response to a crisis (i.e., not only
how will you react, but how will your neighbors react—and how that affects your reaction),
and modeling of toxic substance releases based
on wind speed and direction. The article also
mentions that GIS can be used to plan and/or
compare different CPTED (Crime Prevention
through Environmental Design) options for corporate facilities, government agencies, or communities (Shields, 2002).
The concerns of the energy and utilities industry, and the wide variety of applications for GIS
are outlined nicely in the article as follows:
When disaster occurs, data becomes critical to
life and property savings. GIS shows where the gas,
water, fiber optics, and power lines are (or were).
Rescue teams need to know the location of buildings,
stairwells, and basement facilities. Safe traffic routes
that avoid probable leaks and live wires need to be
drawn. Staging areas for heavy equipment are also a
GIS concern (Shields, 2002).
Criminal Intelligence and
Analysis Tools
According to Brian McIlravey of PPM 2000,
“Using information about actual and prevented
incidents is essential to the development of effective security safeguards for each workplace
environment …” (McIlravey, 2009, p. 7). This
quote highlights the relevance of all of the tools
discussed in this chapter to the professional
protection officer specifically, and the practice of
111
security risk management in general. Criminal
intelligence/criminal analysis tools are the last
application we will cover.
According to Marilyn Peterson, past president of the International Association of Law
Enforcement Intelligence Analysts (IALEIA),
“Criminal analysis is the application of particular analytical methods to data collected for …
criminal investigation or criminal research” and
is “practiced in law enforcement … and in private security organizations around the world”
(Peterson, 1998, p. 1). This field, like some of
those previously discussed, originated in a manual form and has now migrated to a largely automated process.
One of several vendors that offers automated
solutions for criminal intelligence analysis is i2
Incorporated. They offer an “integrated suite
of products that enables investigators and analysts to quickly understand complex scenarios
and volumes of seemingly unrelated data, perform analyses, and communicate the results”
(i2, 2009). Their customers include law enforcement, government, military, and intelligence
users as well as commercial organizations.
Products like this help protection professionals “connect the dots” to uncover crime trends
and conduct complex investigations. The
Protection of Assets Manual (POA) lists criminal intelligence analysis as an important “force
multiplier” for investigative and security professionals (ASIS International, 2006, p. 46).
Another force multiplier is the use of commercial and other online databases. According
to POA:
Anything that significantly improves the speed
and efficiency of information gathering, collation,
analysis, or organization is an important force multiplier. On-line resources are such a tool and are expanding at a rapid pace (ASIS International, 2006, p. 71).
That document also warns, however, against
two dangers in using online resources for investigative and security functions. First, there is
the danger that protection professionals will
III. PROTECTION OFFICER FUNCTIONS
112
9. AUTOMATION IN PROTECTION OPERATIONS
get side tracked and go off on tangents, focusing more on the online environment than on
the investigative or security objectives. Second,
there is a natural assumption that anything
extracted from databases or online sources is
credible. Users must remember to validate and
corroborate all sources, including those that
originate in online databases or files (ASIS
International, 2006, p. 73).
THE ROLE OF THE
PROFESSIONAL
PROTECTION OFFICER
Protection professionals, whether operating
in a government or private sector environment,
are increasingly relying on technology and
automated applications such as those described
in this chapter. Individuals who embrace technology and leverage it as a tool in performing
their duties—and in their own professional
development—are those who will excel. In fact,
the same applies to security services providers.
As security business consultant Mark Gottlieb
puts it:
Due to advances in security technology, computer
literate guards who understand “smart buildings”
and possess an understanding of the loss prevention function will find their services in high demand.
... Technological improvements and innovation are
changing the role of the security guard. Security
firms must keep abreast of these changes (Gottlieb,
2006, p. 4).
Only a few years ago, administrators at a
college offering an associate’s degree in criminal justice and security management stated
that their students—those employed as, or
aspiring to become, security officers—were
literally “afraid” of computers. For that reason, the college was extremely hesitant to add
computer skills to their learning objectives and
curriculum.
Today, things have changed as people routinely use technology in their personal lives so
much that they more readily accept technology in their workplace. Still, the effective use of
automated security tools should be emphasized
in officer training and education programs.
Two graduate students in a Business and
Organizational Security Management program
studied college curricula designed to prepare protection officers for a career in security.
Among their findings was a distinct lack of
coursework addressing emerging technology
issues. They concluded that course content
should include orientation on automated tools
such as incident and visitor management systems as well as crime mapping and analysis.
According to their report, “Security officers
lacking this knowledge would be placed at a
great disadvantage among peers …” (Bolyard &
Powell, 2007, p. 4).
In addition to individual officers, security
service providers might consider expanding
their service offerings to include items such as:
●
●
●
●
●
●
Conducting automation-assisted risk
assessments
Providing security technology training
services
Recommending security technology
solutions to clients
Including automated crime analysis or crime
mapping within security services
Providing security services specific to IT
environments (e.g., data centers)
Providing IT security services
As systems and procedures become more
integrated and technology-dependent, we must
also begin to consider the “security of security
systems.” The Alliance for Enterprise Security
Risk Management began to address this issue in
a booklet entitled “Convergent Security Risks in
Physical Security Systems and IT Infrastructures.”
One of the many recommendations presented in
the booklet was:
Connecting special systems and devices to organizations’ networks introduces new and usually serious levels of risk. The trade-offs between connecting
III. PROTECTION OFFICER FUNCTIONS
113
SUMMARY
these systems to organizations’ networks and the
security risks that doing so introduces thus need
to be better analyzed and understood (Alliance for
Enterprise Security Risk Management, 2006, p. 15).
SUMMARY
The issue of automation in protection operations can be summarized nicely with the following quotations:
… networked computer technology and associated applications will provide enterprises with
increased operational efficiencies and intelligent
security” (Open Security Exchange, 2007, p. 3).
and
… the amount and variety of security data flowing into their information systems is only going
to grow … as their corporations grow and as new
technology-based security systems come online. The
corresponding need to store and organize this data
for meaningful use will thus become an even more
pressing issue … (McIlravey, 2009, p. 9).
Technology and automation is bringing unprecedented benefits, efficiencies, and opportunities
to the field of security and assets protection.
From information sharing and information
management to risk assessment and strategic
security planning, automated tools are truly of
value. One warning, from technology consultant Anton Ivanov, however, is very relevant
here:
IT … is a tool to allow [organizations] to implement business processes … [and] operate more
efficiently.… However, it is the business process that
makes the business more efficient, not IT as such
(Ivanov, 2009).
We need to be careful to use technology as
a tool rather than allow ourselves to be used
by technology. Nonetheless, professional protection officers should develop a technologyfriendly mind-set, develop their skills, and
incorporate high-tech thinking into their professional worldview.
EMERGING TRENDS
The driving force in today’s electronic security systems is “integration.” Security systems
are increasingly integrated with fire and life
safety systems, communications systems, and
even automated building controls. This allows
new capabilities such as “downstream controls”
and “automatic lockdowns.” In other words, a
breach at an entrance turnstile might lock down
the elevators or close selected interior doors.
Building controls may include doors and locks,
elevators, lighting, HVAC, and communications
systems. Today, these controls can be integrated
with CCTV, intrusion detection, and electronic
access control systems.
Another important trend is toward remote
monitoring and control of security systems.
Electronic security systems are now routinely
capable of being controlled from remote sites
via the Internet (over secure connections) and
even using mobile devices such as a BlackBerry
or iPod (including activation/deactivation of
access cards, and dissemination of threat alerts
to specific audiences). This trend is expected to
continue and will require security professionals
to keep up on these technologies (Belfor, 2008).
Somewhat related is the trend toward greater
functionality of incident management systems.
Data is being collected, analyzed, and utilized
in unprecedented ways. Contemporary systems
can provide valuable data for corporate investigations, level-of-trust decisions, on-site incident management, evacuation management,
III. PROTECTION OFFICER FUNCTIONS
114
9. AUTOMATION IN PROTECTION OPERATIONS
regulatory compliance monitoring, security
performance measurement, security planning,
force deployment, report generation, business
case analysis, and many other tasks. As stated by
Brian McIlravey: “Incident reporting and investigation management software solutions … are
becoming the keystone of a well-thought-out
and executed security information management
program, playing a key role in the risk management and decision-making process” (McIlravey,
2009, p. 24).
Finally, the use of online sources and integration of disparate databases for information
sharing will become indispensable in protection operations. At the same time, however, this
information-sharing environment will raise questions about personal privacy concerns which will
likely lead to data restrictions. The proper balance between security and privacy will be a key
issue and will be the subject of much discussion.
References
Alliance for enterprise security risk management (AESRM).
Convergent security risks in physical security systems
and IT infrastructures. 2006.
ASIS International. (2006). Protection of assets manual (Vol.
II). Investigations Management. Chapter 1, Part 1, ASIS
International, Alexandria, VA.
ASIS International. (2007). Protection of assets manual (Vol. I).
Introduction to Assets Protection. Chapter 2, Part 1, ASIS
International, Alexandria, VA.
Belfor, H. J. (2008, March). Chairman ASIS International
Physical Security Council, “New Directions in Security
Systems and Integration: An overview” (presentation).
Bolyard, D., & Powell, D. (2007, April). An assessment of
undergraduate curriculum in criminal justice and homeland
security (master’s thesis), Webster University, National
Capital Region.
ESRI. Web site Ͻwww.esri.com/Ͼ. Accessed October 11,
2009.
Gottlieb, M. S. (2006). Security: An industry study. MSG
Accountants, Consultants and Business Valuators. Great
Neck, NY. (white paper).
The continued development of public-private
partnerships that involve the private security
community may influence this issue and allow
special access to security-relevant data.
In short, technology is expanding rapidly
and is making more and more of an impact on
security operations and the way protection
professionals perform their duties. McIlravey
summarized the entire issue of “automation in
protection operations” this way:
There is a strong trend in security management to strengthen and make more consistent
the management of security information across
the enterprise. This trend is driven … by the
much broader corporate interest in data analysis
and knowledge-based decision making. There is
also relentless pressure to improve the speed and
quality of decision making, reduce costs, improve
productivity, and demonstrate a commitment to
best practices (McIlravey, 2009, pp. 23–24).
Groussman, J. (2008, May). Loss forecasting and ROI.
Security, pp 62–63. BNP Media, Troy, MI, http:/
/www.
securitymagazine.com.
i2, http:/
/www.i2group.com, (corporate web site), McLean,
VA, accessed September 2009.
Ivanov, A. (Technology Consultant, Cambridge, UK), Internet
posting on “LinkedIn Q&A Forum/Information Security,”
posted 12 October 2009, Ͻwww.linkedin.comϾ.
McIlravey, B. (2009). Security information management—The
foundation of enterprise security (white paper). PPM 2000
Inc. Edmonton, AB, Canada.
Open Security Exchange. (2007). Physical security convergence: What it means, why it’s needed, and how to get there,
Washington, DC (white paper).
Peterson, M. (1998). Applications in criminal analysis: A
sourcebook. Praeger Publishing Company, Santa Barbara,
CA.
Shields, B. (2002). Crime and catastrophe: A GIS response.
Energy Currents, Fall, ESRI, Redlands, CA.
Smith, R. M. (2003). From blackjacks to briefcases. Ohio
University Press, Athens, OH.
Webster University, National Capital Region, “Business
assets protection,” course materials, 2009.
III. PROTECTION OFFICER FUNCTIONS
SECURITY QUIZ
S EC U RI T Y QU IZ
1. Automated visitor management systems
should only be used in large, complex
organizations with multiple facilities.
a. True
b. False
2. One use for crime mapping is to help
determine where to locate new facilities.
a. True
b. False
3. Studies indicate that security technologies
will soon make security officers obsolete.
a. True
b. False
4. Incident Management Systems today are
really nothing more than word processing
systems that allow an officer to enter reports
electronically.
a. True
b. False
5. Two dangers mentioned in this chapter that
protection professionals should be aware of
in using online resources are (circle two):
a. The possibility of going off on a tangent
rather than focusing on the objective
b. The possibility of introducing a virus to the
system
c. Accidentally disseminating sensitive
information to unauthorized recipients
d. Assuming that information in online
databases is credible
6. Among the advantages of automated visitor
management systems are (circle all that apply):
a. Ability to reduce costs by integrating with
access control systems
b. Ability to keep a searchable record of
visitors
c. Ability to better account for all building
occupants during an evacuation
d. Ability to support subsequent
investigations in the event of an incident
115
7. A study by Bolyard and Powell concluded
that “security officers lacking this
knowledge would be placed at a great
disadvantage.…” What “knowledge” were
they referring to?
a. An understanding of basic electronic
security systems and design parameters
b. A thorough understanding of contemporary information technology (IT) security
threats and risks
c. An orientation on automated tools such as
incident and visitor management systems
as well as crime mapping and analysis
d. An orientation on the historical basis for
automation in protection operations as
it applies to the security industry in the
United States
8. Geographic Information Systems (GIS) are
closely related to:
a. Integrated security systems
b. Crime mapping systems
c. Automated incident management systems
d. Graphical user interface systems
9. A number of studies in recent years have
projected massive expansion of electronic
security systems employing advanced
technologies, but they also concluded that
the human element (i.e., security officers)
will not be predominantly replaced by
technology.
a. True
b. False
10. Technology and automation is not bringing
the benefits, efficiencies, and opportunities
to the field of security and asset protection
that was anticipated.
a. True
b. False
III. PROTECTION OFFICER FUNCTIONS
This page intentionally left blank
C H A P T E R
10
Patrol Principles
Christopher A. Vail
CHAPTER OBJECTIVES
●
●
●
●
●
●
Provide a history of security patrol
List the major purposes of patrol
Explore issues relating to both foot and
mobile patrol
Provide techniques that enhance an
officer’s ability to detect unusual
situations
List factors that influence patrol
effectiveness
Identify areas of professional conduct for
officers on patrol
HISTORY OF PATROL
Security work encompasses various functions; however, there is one function that is
common to all security agencies—the job of
patrol. In order to understand the technical
aspects of patrol, it is important to see how this
function came about, how it developed, and
how it changes over time. Eugene O’Neill, a
famous writer, once said, “The past is the present, isn’t it? It’s the future, too.” Therefore, to
gain insight and understanding of the patrol
function today, it’s necessary to see its genesis.
The very word “patrol” is thought to be derived
from the French word patrouiller, which originally meant “to tramp in the mud.” To many,
this translation may well reflect what may be
described as a function that is “arduous, tiring, difficult, and performed in conditions other
than ideal” (Cole, 1995).
Around 2100 B.C., the first codification of
customs was written by Hammurabi, King of
Babylon. Under these laws of Hammurabi, it
is believed that messengers were appointed to
carry out the commands of the law—the first
form of patrol duty. About 1400 B.C., Amenhotep,
pharaoh of Egypt, developed a marine patrol
on Egypt’s coast, the first recorded history of a
patrol unit.
In early Greece, guard systems were established
to protect the tower, highways, and the person of
Pisistratus, ruler of Athens. Ancient Rome saw the
establishment of quaestores (inquirers; also basically judicial officers) who would go to the house
of the accused and blow a trumpet or horn as an
indication of his arrest. In 27 B.C., under Augustus,
emperor of Rome, the Praetorian Guards were
formed to protect the life and property of the
emperor, and urban cohorts were established to
keep the peace of the city. The vigiles (from which
we get the word vigilantes) were formed to
patrol the streets and act as enforcement officers.
117
118
10. PATROL PRINCIPLES
Although they were nonmilitary, they were armed
with staves and the traditional short swords. These
patrolmen were also assigned to patrol geographical precincts.
As people moved north toward England
and developed collective living arrangements
(the precursors to towns), a form of individual
and group responsibility for policing began
to emerge through the concept of local selfgovernment. Around A.D. 700, tithings (groups
of ten families) were formed for the purpose of
maintaining the peace and protecting the community. Tithingmen were elected by the group,
and their responsibilities included raising the
hue and cry upon learning of a crime in the
group and dispensing punishment. Ten tithings were called a hundred and the head man
was called a reeve. Several hundreds within the
same geographical area were collectively called
a shire (the equivalent of our county) and the
chief law enforcement officer was called a shirereeve (what we now call the sheriff).
William, the duke of Normandy, introduced a
highly repressive police system in A.D. 1066, in
which collective security was deemed far more
important than individual freedom in England.
He divided England into 55 separate military
districts and appointed an officer of his choice
to be the shire-reeve in each shire, or military
district. The state assumed the responsibility for
keeping the peace in this system. England lived
under this system until the Magna Carta (Great
Charter) was written in A.D. 1215, guaranteeing civil and political rights to individuals and
restoring local control to the communities.
In 1252 in England, the watch system was
established. People appointed to the duty of
watchman had the responsibility for keeping
the peace. They were unpaid and were often
the dregs of society—the old, infirm, sick, and
criminally inclined. After 1285, some watches
grouped together for the purpose of safety,
forming a “marching watch,” which may be
considered the first form of patrol organization found in our present-day system. The only
paid watchmen were those paid by merchants,
parishioners, and householders. In 1737, the
Elizabethan Act of 1585 was enlarged to allow
cities to levy taxes to pay for the night watch.
In 1748, Henry Fielding suggested that policing was a municipal function and that some
form of mobile patrol was needed to protect
the highways. The Bow Street Runners were
formed, with a foot patrol to operate in the inner
areas of London, and a horse patrol to operate in
the outer areas. In 1829, the Home Secretary, Sir
Robert Peel, introduced “An Act for Improving
the Police In and Near the Metropolis”—the
Metropolitan Police Act. This legislation forms
the basis for law enforcement organizational
structure in America. Setting the stage for organized patrol activity, 1 of the 12 fundamental
principles of the Act stated that “the deployment of police strength by time and area is
essential.” By the end of 1830, the metropolitan
area of London was organized into 17 divisions
and superintendents were appointed. Patrol sections were created, and each section was broken
down into beat areas.
Basically, Peel replaced the patchwork of private law enforcement systems then in existence
with an organized and regular police structure
that would serve the state and not local interests.
He believed that deterrence of criminal activity should be accomplished by patrol officers
trained to prevent crime by their presence in the
community. Hence, modern patrol was born.
Many English systems and beliefs became
the basis for American social, political, legal, and
governmental systems. In New England, communities were formed around towns and villages,
which relied on constables to provide protection
and keep the peace by using the watch system.
The South was more rural and agricultural, with
smaller communities. The county was the primary
form of government, in which the sheriff system
was the prominent form of law enforcement. As
expansion moved westward, law enforcement
organizations combined the functions and roles of
constable and sheriff.
III. PROTECTION OFFICER FUNCTIONS