1. Trang chủ >
  2. Kinh Doanh - Tiếp Thị >
  3. Quản trị kinh doanh >

Chapter 9. Automation in Protection Operations

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (2.72 MB, 623 trang )


108



9. AUTOMATION IN PROTECTION OPERATIONS



services themselves remained largely low-tech,

focusing on armed guards and facility protection (Smith, 2003).

The next major jump in security services

occurred as World War II approached and the

defense industrial complex emerged. The field

of “industrial security” was established to meet

the needs of the federal government in managing security requirements for defense contractors. The “industrial security” era resulted in

a wide array of new security-related technologies, concepts, and procedures—and an increase

in the use of security officers. Existing security

providers opened specialized divisions and new

providers were established to meet the need.

Despite these innovations and forward-looking

companies, many people viewed the security

industry as nothing more than night watchmen, even up to and through the 1960s. Over

the next three decades, the use of security officers became more prevalent. Ironically, one reason for this may have been the development of

security technology such as electronic access

control and surveillance systems. For example,

these technologies led to the establishment of

security operations centers (or command centers), which created a new function for protection professionals.

During these years, computer and communications technologies developed rapidly and

permeated virtually every type of business as

well as our personal lives. However, the security services industry is generally perceived as

having been slow to embrace technology in the

performance of their mission.

The terrorist attacks of September 11, 2001,

brought new and intense attention to the security industry in both the public and private sectors. One of the benefits of this attention was the

development and implementation of new and

improved security technology applications.

Essentially, it gave a “shot in the arm” to security budgets and made it easier for security professionals to justify innovations in equipment,

tactics, and techniques.



A number of studies in recent years have

projected massive expansion of electronic security systems employing advanced technologies,

but they also concluded that the human element

(i.e., security officers) will not be predominantly

replaced by technology (Webster University,

2009). This conclusion is particularly interesting, and profound, since some of those studies

were funded by security systems vendors.

Nonetheless, technology can and should be

exploited by the security services industry—and this will require officers and supervisors

who are well rounded in technology applications. Some of these applications are discussed

in the remainder of this chapter, according to

the primary functions they perform.



CONTEMPORARY SECURITY

ENVIRONMENT

Today, an increasing number and variety of

technology applications support security functions. The most relevant of these applications,

from the perspective of the professional protection officer, are listed below.



Incident Management Systems

Few would argue that one of the most tedious

tasks for the protection officer is report writing.

Originally, incident management systems simply

changed the task of writing a hardcopy report

into a computer-based function where officers

would enter the same data into a computer using

a word-processing-like program. One of the

benefits of this change was that users of these

reports no longer had to deal with issues such

as poor handwriting and missing pages. Data

entry, however, was awkward, formats were

cumbersome, and it was difficult or impossible

to include attachments, diagrams, and sketches.

The functionality of incident management

systems expanded rapidly and developed into

more integrated tools such as IRIMS (Incident



III. PROTECTION OFFICER FUNCTIONS



CONTEMPORARY SECURITY ENVIRONMENT



Reporting and Information Management System), a product of a Canadian firm known as

PPM 2000. The product was introduced in the

mid-1990s and released as a full enterprise-wide

version in 2001. During this time, a number

of competing products such as iViewSystems

entered the marketplace as well.

The real benefit of these tools is their ability

to integrate, manage, and truly use the information not only for incident management but also

for subsequent investigations, trend analysis,

and strategic security planning. Unfortunately,

many organizations (whether by decisions of

the executive management or of security directors themselves) remained with the “comfortable” paper-and-pencil method, using hardcopy

(often handwritten) incident reports.

Some of the complaints regarding automated

incident management systems were a lack of

user-friendliness, inability to adequately tailor the

system to the particular company using it, inconvenient report generators, and, not insignificantly,

that officers were not computer-savvy enough to

effectively use the systems. Today, many of those

problems have been solved with new versions of

the software or even new product lines for incident management systems. For instance, most

products now include extremely user-friendly

GUIs (Graphic User Interfaces) that make data

entry straightforward and officer familiarization

quick. See the “Emerging Trends” box at the end

of this chapter to learn about some of the trends

in these systems and why they have become an

invaluable tool for asset protection programs in

both the public and private sectors.



Visitor Management Tools

Automated visitor management tools are

widely available today and should be in use by

almost all types and sizes of organization. Among

the types of visitor management tools are:





Visitor management modules within

incident management systems



















109



Stand-alone visitor management tools

that can be linked to existing incident

management systems

Stand-alone visitor management products

(independent)

Sophisticated, completely integrated visitor

management tools

Simple, low-end, affordable visitor

management tools



Automated tools for visitor management

have several advantages, including the ability to

keep a searchable record of visitors and generate reports based on individual, company, facility, or date range. Data from these systems can

also support subsequent investigations when

an incident is discovered after the fact. From a

life safety perspective, some systems can report

who is currently in a facility, allowing protection professionals to better account for all building occupants in the event of an evacuation.

System components may include an input

device that can read driver’s licenses or other

identification cards (including photographs),

cameras, badge printers, and self-service kiosks

(for larger applications). Most automated

systems also allow employees to preregister

expected visitors (this can usually be done

through the company intranet right from the

employee’s desktop). Another benefit is the ability to store records of and designate frequent or

repeat visitors. Both of these capabilities serve

to streamline entry procedures, thereby facilitating business operations and presenting a professional security image for the organization.

Among popular product providers are

EasyLobby, iTrak (by iViewSystems), TEMPbadge

(the company that first introduced self-expiring

paper badges), and LobbyGuard. In addition,

extremely affordable packages such as one

by Brother are available at popular office supply stores. This indicates that there are visitor

management tools on the market for all types

of users, all sizes of facilities, and at all cost

levels.



III. PROTECTION OFFICER FUNCTIONS



110



9. AUTOMATION IN PROTECTION OPERATIONS



There is no excuse today for using a handwritten sign-in log as a visitor management tool.

In addition to the inefficiencies and inability to

electronically store and access data, hardcopy

visitor logs can represent a security vulnerability.

Visitors can generally view the log while they are

signing in and see who else (individual, company,

etc.) was recently in the facility. In some environments, that may be very sensitive information—

or may at least represent a privacy issue.



Near-term plans for CAP Index include

“… an ‘ultimate dashboard’ that will merge

crime forecasting with site surveys and risk

assessment, event history and loss-related

alerts …” (Groussman, 2008, p. 63). Tools like

this should be used for strategic security planning, making a business case for new policies

and programs, and conducting risk assessments.

It is extremely useful to track crime data for a

given location over time and also be able to

compare crime levels in surrounding areas.



Crime Mapping

Another category of automation that is

increasingly important to the crime prevention

and security communities is that of crime mapping. The most well-known and respected provider of crime mapping services is CAP Index.

They refer to their primary capabilities as crime

forecasting and security risk analysis. This firm

provides several products, all based on objective crime and incident data. Among the uses

for this type of data are:

























Site selection—used by organizations to aid

in determining where to locate new facilities

or where to expand existing facilities based

in part on local crime data

Rank and compare—the ability to compare

crime statistics at different locations

Security allocation—data to assist in

determining security force deployment, staff

augmentation, and resource allocation

Litigation defense—crime data can be used

to justify corporate policies and procedures

that may be questioned during a securityrelated lawsuit or other legal action

Loss prediction—products can be integrated

with corporate data such as shrinkage figures

to aid in predicting losses and setting risk

tolerance (thresholds) for specific retail or

other sites

Return on investment (RoI)—data can be

used to justify security expenditures and

projected budgets for specific sites or entire

enterprises



Geospatial Information Systems (GIS)

Closely related to crime mapping, GIS provides a graphic view of various situations by

leveraging the capability to layer information

from different databases or inputs over a map

or image. This tool is generally used for exterior

spaces (e.g., a map of a city or neighborhood),

but can also be used with diagrams, campuses,

or even building interiors. The objective may be

to review historical data (such as incidents or

a particular type), identify patterns of activity,

display sensitive locations or areas that warrant

special security attention, support an investigation, identify traffic patterns (vehicular, foot,

or product), or compare any type of data with

other data sets by location.

One example of a GIS provider is ESRI, which

has supported a wide variety of homeland security, law enforcement, disaster management,

and public safety projects. They provide commercial-off-the-shelf (COTS) software as well

as individualized consulting and project management services. The ESRI Web site states that

“a geographic information system … integrates

hardware, software, and data for capturing,

managing, analyzing, and displaying all forms

of geographically referenced information. GIS

allows us to view, understand, question, interpret, and visualize data in many ways that reveal

relationships, patterns, and trends in the form

of maps, globes, reports and charts.” Regarding

force protection and security applications,



III. PROTECTION OFFICER FUNCTIONS



CONTEMPORARY SECURITY ENVIRONMENT



the site mentions the ability to “assess security

risks, develop preparedness and security plans,

and understand the impact of incidents” as key

benefits (ESRI, 2009).

According to an article in the Fall 2002 edition of Energy Currents, GIS can be used not

only for security planning but also to develop

exercise scenarios and to compare projected outcomes of various security solutions. Some applications suggested by the article are comparing

scenarios for pedestrian traffic flow and timing

for building evacuations, simulating “entire

community” response to a crisis (i.e., not only

how will you react, but how will your neighbors react—and how that affects your reaction),

and modeling of toxic substance releases based

on wind speed and direction. The article also

mentions that GIS can be used to plan and/or

compare different CPTED (Crime Prevention

through Environmental Design) options for corporate facilities, government agencies, or communities (Shields, 2002).

The concerns of the energy and utilities industry, and the wide variety of applications for GIS

are outlined nicely in the article as follows:

When disaster occurs, data becomes critical to

life and property savings. GIS shows where the gas,

water, fiber optics, and power lines are (or were).

Rescue teams need to know the location of buildings,

stairwells, and basement facilities. Safe traffic routes

that avoid probable leaks and live wires need to be

drawn. Staging areas for heavy equipment are also a

GIS concern (Shields, 2002).



Criminal Intelligence and

Analysis Tools

According to Brian McIlravey of PPM 2000,

“Using information about actual and prevented

incidents is essential to the development of effective security safeguards for each workplace

environment …” (McIlravey, 2009, p. 7). This

quote highlights the relevance of all of the tools

discussed in this chapter to the professional

protection officer specifically, and the practice of



111



security risk management in general. Criminal

intelligence/criminal analysis tools are the last

application we will cover.

According to Marilyn Peterson, past president of the International Association of Law

Enforcement Intelligence Analysts (IALEIA),

“Criminal analysis is the application of particular analytical methods to data collected for …

criminal investigation or criminal research” and

is “practiced in law enforcement … and in private security organizations around the world”

(Peterson, 1998, p. 1). This field, like some of

those previously discussed, originated in a manual form and has now migrated to a largely automated process.

One of several vendors that offers automated

solutions for criminal intelligence analysis is i2

Incorporated. They offer an “integrated suite

of products that enables investigators and analysts to quickly understand complex scenarios

and volumes of seemingly unrelated data, perform analyses, and communicate the results”

(i2, 2009). Their customers include law enforcement, government, military, and intelligence

users as well as commercial organizations.

Products like this help protection professionals “connect the dots” to uncover crime trends

and conduct complex investigations. The

Protection of Assets Manual (POA) lists criminal intelligence analysis as an important “force

multiplier” for investigative and security professionals (ASIS International, 2006, p. 46).

Another force multiplier is the use of commercial and other online databases. According

to POA:

Anything that significantly improves the speed

and efficiency of information gathering, collation,

analysis, or organization is an important force multiplier. On-line resources are such a tool and are expanding at a rapid pace (ASIS International, 2006, p. 71).



That document also warns, however, against

two dangers in using online resources for investigative and security functions. First, there is

the danger that protection professionals will



III. PROTECTION OFFICER FUNCTIONS



112



9. AUTOMATION IN PROTECTION OPERATIONS



get side tracked and go off on tangents, focusing more on the online environment than on

the investigative or security objectives. Second,

there is a natural assumption that anything

extracted from databases or online sources is

credible. Users must remember to validate and

corroborate all sources, including those that

originate in online databases or files (ASIS

International, 2006, p. 73).



THE ROLE OF THE

PROFESSIONAL

PROTECTION OFFICER

Protection professionals, whether operating

in a government or private sector environment,

are increasingly relying on technology and

automated applications such as those described

in this chapter. Individuals who embrace technology and leverage it as a tool in performing

their duties—and in their own professional

development—are those who will excel. In fact,

the same applies to security services providers.

As security business consultant Mark Gottlieb

puts it:

Due to advances in security technology, computer

literate guards who understand “smart buildings”

and possess an understanding of the loss prevention function will find their services in high demand.

... Technological improvements and innovation are

changing the role of the security guard. Security

firms must keep abreast of these changes (Gottlieb,

2006, p. 4).



Only a few years ago, administrators at a

college offering an associate’s degree in criminal justice and security management stated

that their students—those employed as, or

aspiring to become, security officers—were

literally “afraid” of computers. For that reason, the college was extremely hesitant to add

computer skills to their learning objectives and

curriculum.

Today, things have changed as people routinely use technology in their personal lives so



much that they more readily accept technology in their workplace. Still, the effective use of

automated security tools should be emphasized

in officer training and education programs.

Two graduate students in a Business and

Organizational Security Management program

studied college curricula designed to prepare protection officers for a career in security.

Among their findings was a distinct lack of

coursework addressing emerging technology

issues. They concluded that course content

should include orientation on automated tools

such as incident and visitor management systems as well as crime mapping and analysis.

According to their report, “Security officers

lacking this knowledge would be placed at a

great disadvantage among peers …” (Bolyard &

Powell, 2007, p. 4).

In addition to individual officers, security

service providers might consider expanding

their service offerings to include items such as:

























Conducting automation-assisted risk

assessments

Providing security technology training

services

Recommending security technology

solutions to clients

Including automated crime analysis or crime

mapping within security services

Providing security services specific to IT

environments (e.g., data centers)

Providing IT security services



As systems and procedures become more

integrated and technology-dependent, we must

also begin to consider the “security of security

systems.” The Alliance for Enterprise Security

Risk Management began to address this issue in

a booklet entitled “Convergent Security Risks in

Physical Security Systems and IT Infrastructures.”

One of the many recommendations presented in

the booklet was:

Connecting special systems and devices to organizations’ networks introduces new and usually serious levels of risk. The trade-offs between connecting



III. PROTECTION OFFICER FUNCTIONS



113



SUMMARY



these systems to organizations’ networks and the

security risks that doing so introduces thus need

to be better analyzed and understood (Alliance for

Enterprise Security Risk Management, 2006, p. 15).



SUMMARY

The issue of automation in protection operations can be summarized nicely with the following quotations:

… networked computer technology and associated applications will provide enterprises with

increased operational efficiencies and intelligent

security” (Open Security Exchange, 2007, p. 3).



and

… the amount and variety of security data flowing into their information systems is only going

to grow … as their corporations grow and as new

technology-based security systems come online. The

corresponding need to store and organize this data

for meaningful use will thus become an even more

pressing issue … (McIlravey, 2009, p. 9).



Technology and automation is bringing unprecedented benefits, efficiencies, and opportunities

to the field of security and assets protection.

From information sharing and information

management to risk assessment and strategic

security planning, automated tools are truly of

value. One warning, from technology consultant Anton Ivanov, however, is very relevant

here:

IT … is a tool to allow [organizations] to implement business processes … [and] operate more

efficiently.… However, it is the business process that

makes the business more efficient, not IT as such

(Ivanov, 2009).



We need to be careful to use technology as

a tool rather than allow ourselves to be used

by technology. Nonetheless, professional protection officers should develop a technologyfriendly mind-set, develop their skills, and

incorporate high-tech thinking into their professional worldview.



EMERGING TRENDS

The driving force in today’s electronic security systems is “integration.” Security systems

are increasingly integrated with fire and life

safety systems, communications systems, and

even automated building controls. This allows

new capabilities such as “downstream controls”

and “automatic lockdowns.” In other words, a

breach at an entrance turnstile might lock down

the elevators or close selected interior doors.

Building controls may include doors and locks,

elevators, lighting, HVAC, and communications

systems. Today, these controls can be integrated

with CCTV, intrusion detection, and electronic

access control systems.

Another important trend is toward remote

monitoring and control of security systems.



Electronic security systems are now routinely

capable of being controlled from remote sites

via the Internet (over secure connections) and

even using mobile devices such as a BlackBerry

or iPod (including activation/deactivation of

access cards, and dissemination of threat alerts

to specific audiences). This trend is expected to

continue and will require security professionals

to keep up on these technologies (Belfor, 2008).

Somewhat related is the trend toward greater

functionality of incident management systems.

Data is being collected, analyzed, and utilized

in unprecedented ways. Contemporary systems

can provide valuable data for corporate investigations, level-of-trust decisions, on-site incident management, evacuation management,



III. PROTECTION OFFICER FUNCTIONS



114



9. AUTOMATION IN PROTECTION OPERATIONS



regulatory compliance monitoring, security

performance measurement, security planning,

force deployment, report generation, business

case analysis, and many other tasks. As stated by

Brian McIlravey: “Incident reporting and investigation management software solutions … are

becoming the keystone of a well-thought-out

and executed security information management

program, playing a key role in the risk management and decision-making process” (McIlravey,

2009, p. 24).

Finally, the use of online sources and integration of disparate databases for information

sharing will become indispensable in protection operations. At the same time, however, this

information-sharing environment will raise questions about personal privacy concerns which will

likely lead to data restrictions. The proper balance between security and privacy will be a key

issue and will be the subject of much discussion.



References

Alliance for enterprise security risk management (AESRM).

Convergent security risks in physical security systems

and IT infrastructures. 2006.

ASIS International. (2006). Protection of assets manual (Vol.

II). Investigations Management. Chapter 1, Part 1, ASIS

International, Alexandria, VA.

ASIS International. (2007). Protection of assets manual (Vol. I).

Introduction to Assets Protection. Chapter 2, Part 1, ASIS

International, Alexandria, VA.

Belfor, H. J. (2008, March). Chairman ASIS International

Physical Security Council, “New Directions in Security

Systems and Integration: An overview” (presentation).

Bolyard, D., & Powell, D. (2007, April). An assessment of

undergraduate curriculum in criminal justice and homeland

security (master’s thesis), Webster University, National

Capital Region.

ESRI. Web site Ͻwww.esri.com/Ͼ. Accessed October 11,

2009.

Gottlieb, M. S. (2006). Security: An industry study. MSG

Accountants, Consultants and Business Valuators. Great

Neck, NY. (white paper).



The continued development of public-private

partnerships that involve the private security

community may influence this issue and allow

special access to security-relevant data.

In short, technology is expanding rapidly

and is making more and more of an impact on

security operations and the way protection

professionals perform their duties. McIlravey

summarized the entire issue of “automation in

protection operations” this way:

There is a strong trend in security management to strengthen and make more consistent

the management of security information across

the enterprise. This trend is driven … by the

much broader corporate interest in data analysis

and knowledge-based decision making. There is

also relentless pressure to improve the speed and

quality of decision making, reduce costs, improve

productivity, and demonstrate a commitment to

best practices (McIlravey, 2009, pp. 23–24).



Groussman, J. (2008, May). Loss forecasting and ROI.

Security, pp 62–63. BNP Media, Troy, MI, http:/

/www.

securitymagazine.com.

i2, http:/

/www.i2group.com, (corporate web site), McLean,

VA, accessed September 2009.

Ivanov, A. (Technology Consultant, Cambridge, UK), Internet

posting on “LinkedIn Q&A Forum/Information Security,”

posted 12 October 2009, Ͻwww.linkedin.comϾ.

McIlravey, B. (2009). Security information management—The

foundation of enterprise security (white paper). PPM 2000

Inc. Edmonton, AB, Canada.

Open Security Exchange. (2007). Physical security convergence: What it means, why it’s needed, and how to get there,

Washington, DC (white paper).

Peterson, M. (1998). Applications in criminal analysis: A

sourcebook. Praeger Publishing Company, Santa Barbara,

CA.

Shields, B. (2002). Crime and catastrophe: A GIS response.

Energy Currents, Fall, ESRI, Redlands, CA.

Smith, R. M. (2003). From blackjacks to briefcases. Ohio

University Press, Athens, OH.

Webster University, National Capital Region, “Business

assets protection,” course materials, 2009.



III. PROTECTION OFFICER FUNCTIONS



SECURITY QUIZ



S EC U RI T Y QU IZ

1. Automated visitor management systems

should only be used in large, complex

organizations with multiple facilities.

a. True

b. False

2. One use for crime mapping is to help

determine where to locate new facilities.

a. True

b. False

3. Studies indicate that security technologies

will soon make security officers obsolete.

a. True

b. False

4. Incident Management Systems today are

really nothing more than word processing

systems that allow an officer to enter reports

electronically.

a. True

b. False

5. Two dangers mentioned in this chapter that

protection professionals should be aware of

in using online resources are (circle two):

a. The possibility of going off on a tangent

rather than focusing on the objective

b. The possibility of introducing a virus to the

system

c. Accidentally disseminating sensitive

information to unauthorized recipients

d. Assuming that information in online

databases is credible

6. Among the advantages of automated visitor

management systems are (circle all that apply):

a. Ability to reduce costs by integrating with

access control systems

b. Ability to keep a searchable record of

visitors

c. Ability to better account for all building

occupants during an evacuation

d. Ability to support subsequent

investigations in the event of an incident



115



7. A study by Bolyard and Powell concluded

that “security officers lacking this

knowledge would be placed at a great

disadvantage.…” What “knowledge” were

they referring to?

a. An understanding of basic electronic

security systems and design parameters

b. A thorough understanding of contemporary information technology (IT) security

threats and risks

c. An orientation on automated tools such as

incident and visitor management systems

as well as crime mapping and analysis

d. An orientation on the historical basis for

automation in protection operations as

it applies to the security industry in the

United States

8. Geographic Information Systems (GIS) are

closely related to:

a. Integrated security systems

b. Crime mapping systems

c. Automated incident management systems

d. Graphical user interface systems

9. A number of studies in recent years have

projected massive expansion of electronic

security systems employing advanced

technologies, but they also concluded that

the human element (i.e., security officers)

will not be predominantly replaced by

technology.

a. True

b. False

10. Technology and automation is not bringing

the benefits, efficiencies, and opportunities

to the field of security and asset protection

that was anticipated.

a. True

b. False



III. PROTECTION OFFICER FUNCTIONS



This page intentionally left blank



C H A P T E R



10

Patrol Principles

Christopher A. Vail

CHAPTER OBJECTIVES





















Provide a history of security patrol

List the major purposes of patrol

Explore issues relating to both foot and

mobile patrol

Provide techniques that enhance an

officer’s ability to detect unusual

situations

List factors that influence patrol

effectiveness

Identify areas of professional conduct for

officers on patrol



HISTORY OF PATROL

Security work encompasses various functions; however, there is one function that is

common to all security agencies—the job of

patrol. In order to understand the technical

aspects of patrol, it is important to see how this

function came about, how it developed, and

how it changes over time. Eugene O’Neill, a

famous writer, once said, “The past is the present, isn’t it? It’s the future, too.” Therefore, to

gain insight and understanding of the patrol



function today, it’s necessary to see its genesis.

The very word “patrol” is thought to be derived

from the French word patrouiller, which originally meant “to tramp in the mud.” To many,

this translation may well reflect what may be

described as a function that is “arduous, tiring, difficult, and performed in conditions other

than ideal” (Cole, 1995).

Around 2100 B.C., the first codification of

customs was written by Hammurabi, King of

Babylon. Under these laws of Hammurabi, it

is believed that messengers were appointed to

carry out the commands of the law—the first

form of patrol duty. About 1400 B.C., Amenhotep,

pharaoh of Egypt, developed a marine patrol

on Egypt’s coast, the first recorded history of a

patrol unit.

In early Greece, guard systems were established

to protect the tower, highways, and the person of

Pisistratus, ruler of Athens. Ancient Rome saw the

establishment of quaestores (inquirers; also basically judicial officers) who would go to the house

of the accused and blow a trumpet or horn as an

indication of his arrest. In 27 B.C., under Augustus,

emperor of Rome, the Praetorian Guards were

formed to protect the life and property of the

emperor, and urban cohorts were established to

keep the peace of the city. The vigiles (from which

we get the word vigilantes) were formed to

patrol the streets and act as enforcement officers.



117



118



10. PATROL PRINCIPLES



Although they were nonmilitary, they were armed

with staves and the traditional short swords. These

patrolmen were also assigned to patrol geographical precincts.

As people moved north toward England

and developed collective living arrangements

(the precursors to towns), a form of individual

and group responsibility for policing began

to emerge through the concept of local selfgovernment. Around A.D. 700, tithings (groups

of ten families) were formed for the purpose of

maintaining the peace and protecting the community. Tithingmen were elected by the group,

and their responsibilities included raising the

hue and cry upon learning of a crime in the

group and dispensing punishment. Ten tithings were called a hundred and the head man

was called a reeve. Several hundreds within the

same geographical area were collectively called

a shire (the equivalent of our county) and the

chief law enforcement officer was called a shirereeve (what we now call the sheriff).

William, the duke of Normandy, introduced a

highly repressive police system in A.D. 1066, in

which collective security was deemed far more

important than individual freedom in England.

He divided England into 55 separate military

districts and appointed an officer of his choice

to be the shire-reeve in each shire, or military

district. The state assumed the responsibility for

keeping the peace in this system. England lived

under this system until the Magna Carta (Great

Charter) was written in A.D. 1215, guaranteeing civil and political rights to individuals and

restoring local control to the communities.

In 1252 in England, the watch system was

established. People appointed to the duty of

watchman had the responsibility for keeping

the peace. They were unpaid and were often

the dregs of society—the old, infirm, sick, and

criminally inclined. After 1285, some watches

grouped together for the purpose of safety,

forming a “marching watch,” which may be

considered the first form of patrol organization found in our present-day system. The only



paid watchmen were those paid by merchants,

parishioners, and householders. In 1737, the

Elizabethan Act of 1585 was enlarged to allow

cities to levy taxes to pay for the night watch.

In 1748, Henry Fielding suggested that policing was a municipal function and that some

form of mobile patrol was needed to protect

the highways. The Bow Street Runners were

formed, with a foot patrol to operate in the inner

areas of London, and a horse patrol to operate in

the outer areas. In 1829, the Home Secretary, Sir

Robert Peel, introduced “An Act for Improving

the Police In and Near the Metropolis”—the

Metropolitan Police Act. This legislation forms

the basis for law enforcement organizational

structure in America. Setting the stage for organized patrol activity, 1 of the 12 fundamental

principles of the Act stated that “the deployment of police strength by time and area is

essential.” By the end of 1830, the metropolitan

area of London was organized into 17 divisions

and superintendents were appointed. Patrol sections were created, and each section was broken

down into beat areas.

Basically, Peel replaced the patchwork of private law enforcement systems then in existence

with an organized and regular police structure

that would serve the state and not local interests.

He believed that deterrence of criminal activity should be accomplished by patrol officers

trained to prevent crime by their presence in the

community. Hence, modern patrol was born.

Many English systems and beliefs became

the basis for American social, political, legal, and

governmental systems. In New England, communities were formed around towns and villages,

which relied on constables to provide protection

and keep the peace by using the watch system.

The South was more rural and agricultural, with

smaller communities. The county was the primary

form of government, in which the sheriff system

was the prominent form of law enforcement. As

expansion moved westward, law enforcement

organizations combined the functions and roles of

constable and sheriff.



III. PROTECTION OFFICER FUNCTIONS



Xem Thêm
Tải bản đầy đủ (.pdf) (623 trang)

×