Security Information |
|
Mall Protection
The Loss Prevention Manager should be receptive to the needs and objectives of upper management and work to prevent and reduce loss from crime, fire accidents etc. With the continuing threats brought to us by our AL Quaeda and Taliban enemies and the outbreak of new TV shows that reinforce the danger we all face on a daily basis, one must look within as to how we can protect ourselves from threats both real and imagined. I said imagined because we can become either hypochondriacs or completely oblivious to the dangers around us. The situations we will focus on in this brief evaluation are those where large volumes of people congregate on a daily basis. Much has been written about airports and how the Government has stepped in to facilitate the security of baggage and boardings etc. Although Schools and theatres could be targeted, one area I would like to review is the Mall, which we have first hand knowledge of since we frequent them almost daily. The mall, some large and some small all handlelarge volumes of people daily. Its close proximity to the airports has caused me to visualize a frightening scenario from time to time. This also should be addressed in any critique of physical protection Security for malls throughout the country is based on protecting the occupants and the property primarily from fire and water damage. Personnel are generally given basic information as to what should happen in the case of fire and subsequent damage control, but essentially the function of either Security officers or tenants is to pull the fire alarm and wait for the fire trucks to get there, hopefully as quickly as possible. Business continuity is a primary situation for the Mall and yet there is little accomplished to meet those requirements. With this in mind a good security officer should be a fireman and or be trained in fire prevention and training. In the world of fire training there are those who are listed as fire police. They are primarily there at the scene of a fire to direct traffic and move gawkers away from danger. Mall security would seem to fit in this category, as they are not really trained in fire prevention nor fire combating. This exclusion in training on a primary and continual basis is a danger faced by the visitors and businesses that expect protection. Fire-personal as well as the police, by nature, are trained to meet the demand for medical aid in the event of minor or major medical emergencies. At the least, basic first aid should be a required continual training program for all Mall personnel, with an emphasis on the Security Guard. The fact that defibrillators are available at Malls along with first aid kits but with little or no training approved by the Mall is a condition that should be addressed. Most security guards are usually hired because they are between jobs, work cheap and don't ask a lot of questions. Training consists of reading a manual, taking an open book test that consists of : 1. Appearance 2. Where the fire equipment is located 3. Reporting problems 4. How to tour the inside and outside of the building and 5. Limits of authority. It is not the job of the Security Guard to fight fire, provide medical assistance or use force. The primary use of Security personnel is to walk the Mall during the business day and to report from time to time that they have gone into a tenant's space and shown their presence. Observing possible loss pevention does not appear in their lexicon. Over the years the defensive tools used by security personnel has been reduced to carrying a set of handcuffs, which can only be used under the direction of a local law enforcement Officer in the completion of his duty. Again, without basic and ongoing training, the uniformed Protective Services officer is of no other use than to be seen. Physical contact with individuals is totally prohibited due to the same reason above. Lack of training creates liability to the Mall and to the officer. The physical plant known as a Mall has many egresses and entrances. Sets of keys are used by housekeeping, maintenance and protection services to secure the movement throughout the site. In most cases the key systems work as the keys are assigned to individuals and are signed for. Various situations cause damage to the doors, some by the stores themselves and by visiting vendors. Unlawful entrance and egress from the stores occur at all times of the day or night. Doors that are broken and unable to be secured with a key are not repaired in a timely manner. Automatic closing devices are tampered with and are inoperable and in many cases doors are intentionally left open to allow easy access to various parts of the building by not only the Mall employees but many of the store personnel as well. Damaged doors and poor maintenance precludes the hazards to all visitors and employees as well. The ability to enter the building and to cause damage, either unintentionally or inntionally should be of paramount concern to the administration as well as injury to visitors and employees from individuals who may be emotionally, politically or criminally motivated. Daytime situations are normally different than evening and overnight due to the fact that more personnel are available and more activity promotes little opportunity for problematic situations. On one hand this combination of light and sound along with the presence of people creates the environment for terrorism and or criminal acts. During the evening hours there is the added problem produced by teenagers and young adults whocreate disturbances causing security extra work which distracts them from actual security and placing them in the position of acting as police, which they are not trained for. The use of force has been all but totally removed from their arsenal of protection. No training in civil disturbance or any other disturbance is given on any basis. Radio communications is used in various ways depending on the requirements of the various departments within the Mall. The benefit is that communications are available to identify negative situations that would require fire, police, housekeeping and maintenance. In the event of an emergency, radio frequencies will be modified to meet the needs of security. Maintenance and housekeeping as well as Mall administration should be subordinate to security. The standard operating procedure would require that the individual in charge be completely cognizant of the workings of the building and at least have the workable phone numbers of department heads. In many situations of various venues, the phone numbers of employ ees are not kept up to date and can cause unnecessary delay not only in emergencies but also on a day to day basis to contact personnel who are due in for shift changes. It should be the responsibility of at least one person in administration to make sure that the phone numbers are kept up to date. Video surveillance, on the most part, functions well. The worst problem is the lack of light particularly in the parking lot. Often the failure of pole lights creates blackout areas during evening hours. This makes it impossible to check activities from the control center. If there is only one guard on the midnight shift, it requires that the control center may be left unattended to check the lot as well as the entrance and loading doors. video cameras with night vision capabilities would provide the necessary protection of the lot. The inability to patrol and or visually observe the site have created criminal acts from break-ins,vandalism and murder. Using the parking lot or a lover's lane cannot be tolerated. Without listing banal conclusions to these initial thoughts, lets recognize the need to be aware of that, which surrounds us. Remember, God is in the details! With 8 years of service in the Military Police and former investigator for the State of NY election fraud bureau, a retired private and insurance investigator and presently actiove in the field of security. Member of the Police Commissioner's Association of Connecticut, International Foundation of Protection Officers.
MORE RESOURCES: Trump's inauguration coincides with an unprecedented string of high-stakes security events in DC The Associated Press Louisiana Attorney General announces full review of New Orleans security plan ahead of terror attack WDSU New Orleans Biden signs Social Security Fairness Act into law Federal News Network Pensacola stepping up security of Mardi Gras in wake of New Orleans truck attack Pensacola News Journal Heightened security in DC ahead of President Jimmy Carter's state funeral ABC6OnYourSide.com Lawyers for security consultant say CNN report on Afghan evacuations destroyed his career Los Angeles Times Social Security Fairness Act signed into law by Biden, enhancing retirement benefits for millions CBS News New Orleans’ Homeland Security director expects more federal resources for Carnival season FOX 8 Local First Kansas audit flags staff safety, security concerns at Osawatomie State Hospital KSHB 41 Kansas City News January 2025 security patch rolling out for Google Pixel devices, here's what's fixed Android Central Opinion | Banning TikTok Won’t Solve Your Data-Security Problem The Wall Street Journal Women in Security Profile: ‘The industry needs to apply outside-the-box thinking when it comes to recruiting SECURITY SYSTEMS NEWS Security guard killed while trying to stop gunman from entering Honduras consulate in DeKalb County WSB Atlanta UW-Stevens Point announces new chief of police, security services Wausau Pilot and Review CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in minutes CSO Online Skyhigh Security Completes Breakthrough 2024, Surpasses Key Customer and Financial Milestones Business Wire Marine Corps bases heighten security after New Year's Day attacks Jacksonville Daily News Border security is national security Washington Times GlobalLogic and Hitachi Systems Trusted Cyber Management Open Cutting-Edge Security Operations Center in Poland Business Wire A Look at Changes in the NEW HIPAA Security Rule Healthcare IT Today Can Washington handle two weeks of high-security pomp along with a heavy burst of snow? The Associated Press Merced police to increase security at upcoming MLK parade, following New Orleans terrorist attack Hanford Sentinel Nebraska Distributes $10 Million to Boost School Security and Safety Campus Safety Magazine Ron Dermer meets with US National Security Advisor at White House - report The Jerusalem Post UN aviation agency investigating 'potential' security breach BleepingComputer How to Lose Your Security Clearance: 2024 Edition ClearanceJobs AuditBoard Ranked #1 in Enterprise Security Compliance in G2 Winter 2025 Grid Report - Business Wire Security questions CEOs should be asking after the UnitedHealthcare killing, according to experts Fortune Veracode Boosts Supply Chain Security Via Phylum Acquisition BankInfoSecurity.com New Orleans carnival season begins with high tension, tight security after New Year's attack WBUR News Massachusetts awards $1.8 million to fund abortion access, security upgrades for abortion providers Boston 25 News Data deregulation to AI protection: Security priorities in 2025 Security Magazine Alert: New HIPAA Security Rule Updates You Need to Understand Telehealth.org | Professional Training & Consultation Cactus Custody Releases 2024 Highlights: Advancing Security, Compliance, and Innovation Markets Insider 2025 Security Industry Predictions: Faisal Pandit, VP and GM, Johnson Controls Security Sales & Integration Kevin Kelly on Arcfield's Continued and Growing Commitment to National Security and Space Missions WashingtonExec Valley Metro selects STV to implement new safety and security on its rail and streetcar network Mass Transit Magazine Marine Corps Air Station Beaufort heightens security measures WJCL News Savannah Former security guard accused of secretly recording young girls at The Woodlands Mall KPRC Click2Houston Cymulate acquires CYNC Secure to accelerate continuous threat exposure management capabilities SecurityInfoWatch INE Security Alert: Comprehensive Training Solutions to Help Organizations Achieve CMMC Compliance Yahoo Finance Parks Associates: 32% of US households have a paid security service SecurityInfoWatch Why Biden cited national security concerns as he blocked a Japanese bid to buy U.S. Steel PBS NewsHour Amazon's Choice Solar-Powered Eufy S220 Security Camera Is Nearly 50% Off for a Limited Time Gizmodo Napco Access Pro’s Continental Enterprise Security Management Platform, GSA Certified, FIPS 201 Approved Security Today |
RELATED ARTICLES
With the Rise of Internet Crimes, Users are Turning to High-Tech "PI's" for Solutions High-tech private investigators are becoming the answer for many Internet users who have been victimized online. The use of e-mail by that unethical element lurking in cyberspace rings all too common these days. How To Cover Your Tracks On The Internet Every single time you access a website, you leave tracks. Tracks that others can access. What to Look for before You Purchase Spyware Software Huge number of spyware software applications are available in the market, some being offered as shareware while rest as freeware. (Shareware means a software available for download / CD, and can be used for a particular length of time, usually 30 days. Eliminate Adware and Spyware Everyone should eliminate spyware and adware from your hard drive for your computer privacy protection. Spyware and adware programs also slow down the speed of your computer by cluttering your hard drive with annoying programs. 5 Simple Steps to Protect your Digital Downloads A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes. The Move to a New Anti-Virus Model This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #1: the Basic ModelAnti-virus software vendors still rely on yesterday's methods for solving today's problems: they wait for the next virus to wreak havoc and then produce a solution. How to Thwart the Barbarian Spyware! Today,on most internet user's computers, we have theability to employ software, along with ourintelligence, to prevent viruses and spyware.To put this article into proper perspective, we'll useMedieval defense tactics. Hacked: Who Else Is Using Your Computer? A friend called me one day and asked if I would stop by to look at his computer. He said it was running abnormally slow and he had found something on his hard-drive he could not explain. Internet Small Business and Fraud Be careful of sites that promise to send you "instant pins". These companies usually have lax credit card security and can afford customer charge backs from fraudulent transactions. Arming Yourself Against Spyware While clicking from site to site on the internet you are likely to land yourself on a website that downloads spyware onto your computer system. Even while using familiar or unlikely and secure web site you run the risk of being infected with unwanted spyware. Network Security 101 As more people are logging onto the Internet everyday, Network Security becomes a larger issue. In the United States, identity theft and computer fraud are among the fastest rising crimes. The Saga of the Annoying Adware When we think of adware, what comes to mind are those annoying and pesky ads that pop up out of nowhere whenever we are surfing the net. Anybody who has surfed through the net has encountered those irritating pop-up adwares advertising everything from computer software down to Viagra. Are They Watching You Online? When surfing the Internet you probably take your anonymityfor granted, most of us do.Tapping phones, listening to confidential conversations,reading others' e-mail messages seems like something thatonly happens in spy movies to "other" people. Why Corporations Need to Worry About Phishing Phishing is a relatively new form of online fraud that focuses on fooling the victim into providing sensitive financial or personal information to a bogus website that bears a significant resemblance to a tried and true online brand. Typically, the victim provides information into a form on the imposter site, which then relays the information to the fraudster. 40 Million People Hacked - YOU as Identity Theft Victim Saturday, MasterCard blamed a vendor of ALL credit cardproviders called CardSystems Solutions, Inc., a third-partyprocessor of payment card data, as the source of loss of 40million consumers credit card information. The Top Twelve Threats No Computer User Should Ignore The internet is undoubtedly a fantastic resource for families and offers a rich vein of educational content.However, there are potential dangers - welcome to the seedy world of viruses, spam, trojans, pornography, spyware and other nasties. How to Protect Yourself Against Online Criminals Credit card fraud is a growing problem for online businesses and can hurt your business in many ways.Fraudulent credit card transactions are costing e-commerce businesses many millions of dollars annually. Passwords or Pass Phrase? Protecting your Intellectual Property Much has been said on the theory of password protection for files, computer login, and other network access. In the past we used a combination of letters, special characters, and other techniques to try and prevent unwanted or unauthorized access to our computers, resources, and networks. Phishing - Learn To Identify It Phishing: (fish'ing) (n.)This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts. A Basic Introduction To Spyware Spyware is the most troublesome software to appear on theInternet in recent times. When spyware infects a computersystem, it may be relatively harmless or it may bedevastating. |
home | site map |
© 2006 |