Professional Documents
Culture Documents
Study Unit 8
Preview
This study unit is designed to give you an overview of the entire security field of
which you’re a part. As you’ll see in this unit, locksmithing involves more than locks.
As a locksmith you must be familiar with who commits crimes, how crimes are com-
mitted, and how to prevent them. This study unit will teach you the basics of home
and business security. You’ll learn of the many threats to both the workplace and the
home. You’ll also learn the costs of such crimes to us all. Working with other security
professionals, you’ll recognize security weaknesses and what to do about making
both home and business more secure.
When you complete this unit, you’ll be able to
• Discuss retail security and some of the devices and techniques used to provide it
• Discuss industrial security and some of the devices and techniques used to
provide it
Contents
HOME SECURITY . . . . . . . . . . . . . . . . . . . . . . . . . 10
Home Security Concerns
Protecting Your Client’s Home Against Burglary
Home Security Checklist
RETAIL SECURITY . . . . . . . . . . . . . . . . . . . . . . . . . 16
Retail Security Concerns
Combatting Internal Theft
Theft of Merchandise
INDUSTRIAL SECURITY. . . . . . . . . . . . . . . . . . . . . . . 24
The Essential Role of Security
Protecting Materials and Information
Fire Protection
Disaster Plans
Internal Threat to Industrial Settings
External Threat to Industrial Settings
ACCESS CONTROL . . . . . . . . . . . . . . . . . . . . . . . . 35
What is Access Control?
Three Types of Security
Understanding the Terms
Encouraging Management Commitment
Environmental Design
vi Contents
Locks
Lighting
Alarms
SECURITY SURVEYS . . . . . . . . . . . . . . . . . . . . . . . . 49
An Objective Tool
Security Survey versus Insurance Survey
Survey Objectives
Looking at Everything
Creating a Security Survey
A Typical Security Survey Form
Basic Elements of a Security Survey
Assessing Loss Potential
Buildings
Open Areas
Surveying Potential Loss within a Department
Specialized Departments and Their Security
Security Survey Contents Summary
RISK ANALYSIS . . . . . . . . . . . . . . . . . . . . . . . . . . 72
A Subjective Tool
Analysis
Recommendations: The Security Survey Report
Implementation
Do You Know. . .
What is target hardening?
In these pages you’ll find the answers to these and many more questions about home
and business security.
1988, one Crime Index offense was committed every two sec-
onds. One violent crime was committed every 20 seconds,
and one property crime was committed every three seconds
(Figure 2).
What these statistics also point out is that many criminals are
not arrested; many crimes—especially those dealing with
property—are not solved in the same year they are commit-
ted (and may never be solved). Such a realization can be very
discouraging. But it means that you can offer help where help
is needed most. By installing devices to cut down this rate of
theft, you can be secure in knowing that you’re doing your
part in the war against crime.
Burglary
Burglary is the unlawful entry of a structure in order to com-
mit a felony or theft. The felony or theft does not actually
have to be completed in order for someone to be arrested for
burglary. Likewise, the use of force to gain entry isn’t a neces-
sary requirement for the crime to be classified as a burglary.
Home and Business Security 5
FIGURE 3—A Comparison of the Number and Rate of Burglaries from 1984 to 1988
The Crime Index lists three types of burglaries under this cate-
gory: (1) forcible-entry, (2) unlawful entry where no force is
used, and (3) attempted forcible entry.
During 1988, there were over three million reported burgla-
ries. This total represents 23 percent of all Crime Index crimes
and 26 percent of all property crimes. Between 1984 and 1988
there was a marked increase in the number and rate of bur-
glaries (Figure 3).
There are recent trends in residential burglaries (both those
at night and during the day) and non-residential burglaries.
Residential burglaries occurring at night were up one percent
since 1985, while day rates show no change since 1984. Non-
residential burglaries occurring during the day were up 25
percent since 1984, while those at night were down 2 percent.
The statistics also show that burglary victims lost an estimated
$3.3 billion throughout the year. The average loss for residen-
tial burglaries (which accounted for two out of every three
burglaries) was $1,037. The average loss for non-residential
burglaries was $967. Seventy percent of the reported burgla-
ries involved forcible entry.
6 Home and Business Security
Typical Burglars
Who is a typical burglar? We know that “he” (92 percent are
male) is usually young (67 percent are between 15 and 19).
He may range in age from preteen to middle age, but will
probably be between 18 and 30. Youngsters tend to steal
because of peer pressure and to take small amounts of money
for games, alcohol, or soft drugs. Chances are they’ll limit
their thefts to familiar neighborhoods. They steal small ob-
jects that are then easily sold.
Adults in their 20s and 30s are often more skilled and cau-
tious in burglary. They have turned it into a profession of
sorts. They work in pairs; they carefully look over the target
and they study the family’s schedule. More experienced
burglars have a cover, or excuse, if someone questions their
presence in the neighborhood. These thieves will take almost
anything of value.
Larceny-Theft
Larceny-theft is the unlawful and nonviolent taking, carrying,
leading, or riding away of property. It is a crime against
property, rather than against a person. It includes crimes
such as shoplifting, pickpocketing, purse-snatching, thefts
from motor vehicles, thefts of motor vehicle parts and acces-
sories, bicycle thefts, and so on; however, no use of force,
violence, or fraud occurs. This category does not include
embezzlement, con games, forgery, or the writing of worth-
less checks. The Uniform Crime Report listed over seven
million acts of larceny-theft in 1988, with both the number
and rate of offenses significantly higher than just four years
earlier (Figure 4). That number represents 55 percent of the
Crime Index total.
FIGURE 4—A Comparison of the Number and Rate of Larceny-Thefts from 1984 to 1988
8 Home and Business Security
FIGURE 6—A Comparison of the Number and Rate of Motor Vehicle Thefts from 1984 to 1988
HOME SECURITY
Lighting
Lighting is critical in home security. Floodlights, automatic
lights (light sensitive or timed), motion lights (that go on
when movement is sensed), and low voltage lights can be
installed by anyone who is handy around the house. It can
be merely a matter of plugging in the lights and placing the
connecting wiring in shallow, underground trenches, as with
low voltage lights. Or sometimes it’s just buying something
as uncomplicated as photocell lights that store energy from
the sun and turn on automatically at night.
Darkness hides the thief. Take away the darkness and you
make it more difficult for the thief to operate. Lights should
be placed strategically throughout the homeowner’s prop-
erty, especially if street lighting is limited. Three common
types of outdoor lighting are:
Windows
Window bars can be attached as a security measure. They’re
great for basement windows. They can be permanently in-
stalled on the inside or the outside. There are also portable
bars that can be locked. The keys should be kept handy in
case of an emergency.
Window locks may be as simple as a sliding window lock or
window screw which fits over a vertical or horizontal track
and is secured with the flip of a lever or the turn of a screw.
Some track stops are key-operated (Figure 7). Other window
locks require some installation. Double hung windows may
be secured by drilling a hole through both sashes and install-
ing a rod lock. A nonlocking variation of this is the locking
pin, which fits into the same kind of hole and is secured to
the frame with a chain. A third variation is a lag screw which
can be removed with a nut driver.
Double hung and sash windows can be secured with a
“Charley” bar —steel bar that is mounted and can be swung
into place for use. A
piece of scrap wood
cut to fit the win-
dow frame will also
do the job. (Some of
these techniques
will also work for
sliding doors.)
Doors
In addition to locks, doors can be secured by other devices.
Sometimes the best protection is knowing who is at the door
before we open it. A door viewer or peephole will allow the
homeowner to see anyone who comes to the door. Installa-
tion usually involves cutting a hole in the door and screwing
both sides of the viewer together (Figure 8).
Landscaping
We all love shrubs,
trees, and bushes,
but placed unwisely
they can be nesting
places for crooks.
Here are four steps
you can recom-
mend that home-
owners take to
ensure that their
landscaping
doesn’t encourage
burglars.
1. Trim trees that overhang roofs or are near windows.
RETAIL SECURITY
Types of Shoplifters
One of the problems that makes retail theft difficult to monitor
is that there is no typical offender. However, certain groups or
types are more likely to engage in shoplifting than others. The
profile varies depending on the type of store, but here are six
categories of people who steal: (1) juveniles, (2) adult female
homemakers, (3) professional shoplifters, (4) kleptomaniacs,
(5) (so-called) privileged shoppers, and (6) employees. Does
this mean that adult males do not steal from retail stores? Of
course not. Statistically, however, they do not steal as often as
the groups we have outlined.
78 percent of all retail thieves are under 30. More than half of
those offenders are between the ages of 12 and 17. Almost all
juvenile thieves are amateurs who steal for the excitement of
it, or for status, or because they want some personal item
they cannot afford. The average incident nets the thief about
five dollars worth of goods. Teenage shoplifters usually oper-
ate in small groups and prefer to steal from large variety
stores and discount stores.
Theft of Cash
One suggestion you can make to your retail clients is to use a
cash register to deter theft of cash (Figure 14). Businesses
Home and Business Security 21
• Holding out cash from one sale until the next sale is
made and the cash drawer opened
Theft of Merchandise
It is more common for employees to take merchandise rather
than cash. Usually they conceal the property on their person
like a shoplifter. Employees have this advantage over the
customer-shoplifter; they have unrestricted access to mer-
chandise stocks. Be alert for employees who conceal stolen
items in a package containing merchandise which they have
legitimately purchased.
Locking It Up! 1
At the end of each section in your Professional Locksmith texts, you’ll
be asked to pause and check your understanding of what you’ve just
read by completing a Locking It Up! quiz. Writing the answers to these
questions will help you review what you’ve studied so far. Please com-
plete Locking It Up! 1 now.
1. What is the FBI Uniform Crime Report?
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
INDUSTRIAL SECURITY
• Determine when and how long the employee can have ac-
cess to the plans
Every stored document must have at least one backup copy,
preferably several. To minimize the risk of a total loss due to
fire, earthquake, or another natural or man-made disaster, at
least one set of backups must be stored in an off-site location.
Storing document backups off-site presents another set of
security risks and problems. The backup location must be
tightly protected against the same dangers as the original site.
Companies not only have a problem archiving documents in
a safe and orderly manner, but they also have a problem getting
rid of documents. After a company has put paper-originated
documents on computer disks or microfilm, they may need to
keep one or only a few additional copies on paper. But dozens
of copies may exist. Although these documents may contain
valuable and even classified information, they may also take
up critical space within the facility.
When management decides it no longer needs all these paper
copies, it will call upon security to dispose of the unwanted
materials. What does security do with them? Obviously, you
wouldn’t just take them out to the trash bins and throw them
in. Nor is burning documents always thorough enough,
because some pages may not be totally consumed by the
Home and Business Security 27
Fire Protection
In many industrial settings, fire protection comes under the
responsibility of security (Figure 17). A large facility may even
have its own fire-
FIGURE 17—Fire fighting personnel
protection is a major
security concern in and equipment. The
industry. security professional
must be aware of
sound fire protection
procedures. He or
she must make sure
that the proper fire
protection equip-
ment (extinguishers,
hoses, sprinklers,
alarms, and so on) is
available and func-
tioning properly at
all times. Security
must also see that
fire protection
equipment is strate-
gically located and
readily accessible.
In addition to in-
specting and main-
taining fire protection
equipment, a major responsibility of security personnel within
an industrial setting is to be aware of fire hazards. Safe storage
of combustible items and flammable liquids, such as solvents
and gasoline, should receive high priority. Security must
regularly inspect all areas within the plant, with an eye for
spotting and correcting unsafe conditions. Plant inspections
should examine the effectiveness of ventilation in areas
where combustible items and flammable liquids are used.
The use, storage, and disposal of acids and other toxic
materials must also be carefully monitored.
28 Home and Business Security
Disaster Plans
An efficient industrial security department will create a written
set of guidelines for use in the event of a large-scale emergency
(Figure 18). These written guidelines are often called a disaster
plan. Since security’s response to a fire in the plant must neces-
sarily be different from its response to a flood or an earth-
quake, a written disaster plan will outline both general
procedures and procedures for particular risks and hazards.
• A statement of policy
• The location of
emergency
equipment and
supplies on
hand, including,
medical, first
aid, fire fighting
equipment, and
food and water
supplies
• The availability
of emergency
facilities, the lo-
cation of the
command
center, the most effective evacuation routes, the assembly
points, and the locations of alarms and communications
systems
Shrinkage
The term used in business for the kind of losses created by
employee theft and external theft is shrinkage. Shrinkage in-
cludes loss of merchandise, cash, jewels, tools, equipment, or
any property not belonging to the one who takes it. Shrink-
age, in a broader sense, also includes misplaced products and
inventory and bookkeeping errors.
Employee Theft
The biggest cause of internal shrinkage in industrial settings
is employee theft (Figure 19). We may never have a true
estimate of such losses because the raw-material and
product-inventory methods of some companies are so
inexact that shrinkage from employee theft can take place
without ever being discovered and reported.
While theft by employees is a crime punishable by law, many
employees in industrial and other commercial settings feel no
qualms about taking
things from their
place of employ-
ment. They consider
company property
as something which
exists for their own
personal use. They
think that taking it
is somehow differ-
ent from shoplifting
or theft from a place
where they are not
employed.
FIGURE 19—The
employee lunch box is
a common vehicle for
minor company theft.
Home and Business Security 31
Sabotage
Sabotage is any intentional and malicious damage to machin-
ery, tools, property, personnel, or production procedures.
The basic aim of an act of sabotage is to disrupt a company’s
ability to function normally and produce its goods or provide
its services to its customers.
Espionage
Companies spend many millions of dollars over several years to
develop products for market. Take a major automobile manu-
facturer, for example. Years, and a huge capital investment,
are required to bring an innovative line of cars to market. The
success of the venture depends on keeping competitors from
obtaining the secrets to new technology and designs. In other
words, the first company to get to market with a new product
Home and Business Security 33
Locking It Up! 2
1. True or False? The biggest cause of internal shrinkage in industrial
settings is employee theft.
2. True or False? Data stored in computer files is usually safe from un-
authorized access.
3. What is shrinkage?
_______________________________________________________________________
_______________________________________________________________________
4. What is sabotage?
_______________________________________________________________________
_______________________________________________________________________
ACCESS CONTROL
Policy Manual
A policy manual is a written collection of practices and proce-
dures regarding the way tasks are to be performed. In
38 Home and Business Security
Staffing
Fiscal Support
Environmental Design
When a new office complex is on an architect’s drawing
board, security consultants, including locksmiths, must have
input about how the facility will be built. Basically, environ-
mental design focuses on three kinds of security needs: (1)
the architecture of the building itself, (2) the location of the
building or structure, and the (3) surrounding environment
(both proximate lines of defense and perimeter lines of de-
fense). Crime prevention through environmental design starts
with a basic first question, What type of building or facility is
being designed? The answer to this question will determine
the amount and type of security needed.
Home and Business Security 39
Building Design
It’s important to determine what the possible ways a building
or facility can be entered or breached are. In other words,
how might a criminal gain access to the interior? Actually,
the answer to this question is the same for all buildings.
Every building can be entered from six directions: the roof,
the flooring, and the four sides (doors, windows, and miscel-
laneous entrances such as fire escapes, vents, delivery or
trash doors, and storm sewers) (Figure 23). A locksmith’s re-
sponsibility is to help secure all openings into the building.
FIGURE 23—A building can be accessed from six directions: the roof, the flooring, and the
four sides.
40 Home and Business Security
Perimeter Barriers
The last area of environmental design involves the use, place-
ment, and choice of barriers. Physical barriers may be of two
types: human-made barriers such as fences, walls, grills, or
bars; and natural barriers, such as bodies of water, moun-
tains, cliffs, deserts, canyons, or swamps.
Lighting
Statistics show that in the majority of burglaries, the point of
entry was not illuminated. To make lighting effective in
crime prevention you must consider size, brightness, con-
trast, and space.
Size. Where you put lights and how many lights are used
will depend on the size of the object being protected. Large
objects need less light than smaller objects.
Types of Lighting
The type of lighting is also important. The most common
type of protective lighting is continuous, or stationary. Such
lighting consists of a series of fixed lights that flood an area
with overlapping cones of light. Standby lighting, the second
most common type, consists of lights that are not continu-
ously lit but are manually or automatically turned on when
necessary. A third type, movable lighting, is used to supple-
ment other types of lighting. Last is emergency lighting, which
is used only when regular lighting is inoperable. Emergency
lighting systems must include their own source of power.
Two methods of deploying continuous lighting are glare
lighting and controlled lighting. Glare lighting is aimed
directly at potential intruders (Figure 26). It is useful in illu-
minating a perimeter barrier. It is also useful in lighting
entrances, checkpoints, and gates. Because it is set up behind
security, they can see more than the intruder. Its disadvan-
tage is that it cannot be used near major streets or highways
because it could blind on-coming traffic. Controlled lighting
is mounted on poles, buildings, or fences and is directed
downward, reducing the amount of glare (Figure 27). One
problem it creates is that it lights both target and proximate
lines of defense.
Alarms
Since its invention in 1906, the burglar alarm has been one of
the most popular ways to prevent burglaries. Today, alarm
systems are used to detect fire, to detect intrusion, to notify ap-
propriate authorities regarding fire, intrusion, or emergency,
and to monitor equipment and facility conditions such as tem-
perature, humidity, and even the presence of radioactivity.
There are three major types of alarms systems. A local alarm
system sounds locally but not anywhere else; it is best used to
control access when a building is located in a populated area.
Central alarm systems are connected to a central police
station; the police call to determine false alarms, but respond
immediately to real emergencies. Central proprietary systems are
Home and Business Security 45
Perimeter Alarms
Alarms can also be classified by where they are placed to protect
the property. Perimeter alarms are installed on the perimeter of a
facility or on the outside of a building. Although many perime-
ter alarms exist, we’ll look at five kinds: (1) magnetic contacts,
(2) plunger contacts, (3) foiling, (4) vibration detectors, and
(5) screens.
Magnetic contacts are the most widely used perimeter alarm
systems (Figure 28). They use electromagnetic devices com-
prised of a simple switching system. The switch is on when
the two magnets touch each other. Magnetic contacts are at-
tached to windows,
doors, transoms,
and other openings.
If the door is opened
while the alarm sys-
tem is on, contact is
broken and the
alarm sounds. These
alarms cannot con-
trol access through
the roof or the walls,
nor will they detect
people who stay be-
hind after hours un-
til they try to leave
FIGURE 28—Magnetic the building.
Contacts
46 Home and Business Security
Interior Alarms
Alarm systems installed on the inside of a building to form
an interior line of defense are known as interior alarms. We’ll
look at six types.
Pressure mats are alarm pads placed in doorways, hallways,
and stairways, or under mats and carpets. A flat switch inside
activates the alarm when pressure is applied. These are used
to isolate a particular area in a house or office, and one draw-
back is that they can be set off easily and accidentally.
The photoelectric beams, designed primarily for residential use,
send out small beams of infrared light from a wall unit (Figure 30).
When someone walks through the invisible beam, the circuit is bro-
ken and the alarm sounds. They should be used in contained areas so
Home and Business Security 47
Locking It Up! 3
1. What is access control?
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
SECURITY SURVEYS
An Objective Tool
Security is the prevention of damage and loss of any kind,
thus assuring the safety of all personnel and property. The
security survey and risk analysis, which we will cover in
more detail in the next section, are the basic loss-prevention
tools to assess potential problems related to personal and
physical security. Whatever the size of the organization need-
ing protection, providing security begins with an assessment
of the potential for loss. This is the security survey, the chief
investigative tool used by security professionals in gathering
the information they need.
Survey Objectives
Surveys are usually customized to meet the needs of the or-
ganization and facility being studied, its specific goals, and
the unique physical and personnel structure.
50 Home and Business Security
Looking at Everything
A security survey must look at everything: it must examine
every inch of the physical plant, inside and outside, top to
bottom, and it must consider the people who occupy the loca-
tion for any amount of time, no matter how infrequent or in-
cidental their presence might be. For example, all of the
following people would need to be considered.
• Visitors
Home and Business Security 51
SECURITY SURVEY
Address ____________________________________________________________________________
Telephone Number_________________________________________________________________
GENERAL INFORMATION
SECURITY CONTROLS
4. Are items of company property clearly identified with a distinguishing mark that
cannot be removed? (Yes / No)
5. Are yard areas and perimeters included in guard coverage? (Yes / No)
7. Are package controls exercised when packages are brought onto or removed
from the premises? (Yes / No)
8. Do the guards have written instructions outlining all security-related policies and
procedures? (Yes / No)
10. Are personnel last leaving building charged with checking doors, windows, cabi-
nets, etc.? (Yes / No)
11. Are adequate security procedures followed during lunch hours? (Yes / No)
Comments: ________________________________________________________________________
PROPRIETARY INFORMATION
4. Are safeguards followed for paper waste, for its collection, and destruction?
(Yes / No)
5. Are desk and cabinet tops cleared at the end of the day? (Yes / No)
Comments: ________________________________________________________________________
You have seen that a security survey must cover these four
main areas: (1) buildings, (2) outside perimeter areas, (3) traffic,
and (4) individual departments. Let’s take a more detailed look
at each one of these areas.
Buildings
Most people spend one-third or more of their waking hours at
their jobs. You might think that the employees of a company,
school, or hospital would be familiar with every inch of the fa-
cility in which they spend so much of their time. Security ex-
perts know, however, that just the opposite is generally true.
Except for their own area, most employees know little of the
physical layout of the rest of the facility or what goes on in
the other parts of the company. It is the job of the security
professionals to know all about a facility because a thief,
especially the professional thief, knows that same building
in detail, from roof to basement, inside and out. A thief
knows all the security weaknesses at the targeted location.
The security professional must know as much as the thief
who’s trying to break in. A risk analysis will either confirm
that the present security is efficient and sufficient or will lead
to new and tighter security measures (Figure 36).
Rooftops
Rooftops are common entry points for thieves and vandals.
Skylights and air-conditioning vents are potential openings
into the interior of the building. The best way to protect sky-
lights from burglars is to install metal bars, grills, or steel
56 Home and Business Security
Type? _________________________________________________________________________
Height? _______________________________________________________________________
Cleared areas?________________________________________________________________
10. Are any materials stored outside the building? (Yes / No)
Comments: ________________________________________________________________________
Air ducts, vents, and transoms that measure more than eight
inches by 12-inches on roofs should have round or flat iron or
steel bars secured by non-removable bolts.
It is easy for people to conceal themselves on buildings with
flat roofs. Because of this, roof access deserves special atten-
tion. If buildings are close to each other, thieves can use the roof
of one building as a platform from which to break into the
building next door. This requires a thorough security check of
adjoining buildings. When such buildings are under separate
ownership, only a joint effort by both owners can ensure full
security.
Windows
All of a building’s windows, no matter how small, are critical
to the security of that building. The windows in many older
buildings were constructed at a height that makes them too
easily accessible from the ground (Figure 37). A relatively
new feature in com-
FIGURE 37—The mercial and indus-
windows in many trial architecture is
older buildings were
to have security
constructed at a height
that makes them too experts review
easily accessible from plans for new
the ground. construction or
remodeling jobs.
Among the items
that receive a great
deal of attention in
these security re-
views are the loca-
tion, construction,
and locking mecha-
nisms of windows.
Display windows
should be made of
burglary-resistant
material and
should be labeled
as such. Some retailers don’t like unbreakable or bullet-proof
glass because it tends to distort or magnify the items on dis-
play. The final decision is usually based on the potential for
loss. If the risk is great, the distortion may be worth it.
58 Home and Business Security
PRODUCT CONTROLS
1. Are all thefts, shortages, or other possible problems (anonymous letters, crank
calls, etc.) reported immediately? (Yes / No)
2. Conduct an inspection of the shipping area and review control policies and
procedures.
3. Conduct an inspection of the receiving area and review control policies and
procedures.
4. Is there a supervisor in attendance at all times? (Yes / No)
5. Are truck drivers allowed to wander about the area? (Yes / No)
6. Is there a waiting area segregated from the product area? (Yes / No)
Are there toilet facilities nearby? (Yes / No)
Is there a water cooler nearby? (Yes / No)
Is there a pay telephone available? (Yes / No)
7. How are loaded trucks protected? _____________________________________________
8. Are all trailers secured by seals? (Yes / No)
9. Are seal numbers checked against shipping papers for correctness, both “IN”
and “OUT”?
10. What kind of locks are utilized on trailers? _______________________________________
11. Is a separate storage location utilized for overages, shortages, damages? (Yes /
No)
12. Is parking (employee and visitor vehicles) prohibited from areas adjacent to
loading docks or emergency exit doors? (Yes / No)
13. Is any material stored outside a building? (Yes / No)
If so, how is the material protected?____________________________________________
14. Are trailers or shipments received after closing hours? (Yes / No)
If so, how are these shipments protected? ______________________________________
15. Are all loaded trucks or trailers parked within a fenced area? (Yes / No)
16. What product inventory controls are in place?__________________________________
Loss Breakage Returns
Average _________ ___________ _____________
Monthly _________ ____________ _____________
17. What controls over breakage are in place? ____________________________________
Gates
When the location to be secured is one that is shared by mul-
tiple tenants, as in an industrial park setting, there should be
some kind of electronic gate control. This is especially true when
the nature of the tenants’ businesses concerns high-technology
research and/or production.
Main Entrances
Obviously, people need to get in and out of a building to do
their jobs and conduct business. Visitors and guests are often
in a building. A security survey looks at the procedures for
controlling access to the building by logging in individuals who
enter and accounting for them when they leave the building
(Figure 39). Does the building have a properly supervised
sign-in log around the clock?
Elevators
Elevators present a special security problem. The survey
looks at the kinds of controls that are in place to keep people
from using the elevators to gain access to restricted parts of
2. Is there a control to prevent visitors from wandering into restricted areas? (Yes / No)
5. What type of visitors are on the premises during off–hours and on weekends?
6. Do any other company’s employees have access to the facility? (Yes / No)
Comments: ________________________________________________________________________
LIGHTING
8. Is interior night lighting adequate for surveillance by night guards (or by munici-
pal law enforcement agents)? (Yes / No)
Comments:________________________________________________________________________
Keys
Every organization must take great care in issuing and tracking
keys, especially master keys, keys that operate two or more locks
in a series. As a general rule, as few master keys as possible
should be issued. A security survey will look carefully into exist-
ing policies for issuing and accounting for keys (Figure 41).
LOCKING CONTROLS
1. Does the facility have adequate control of all keys and a record of all persons
who have keys? (Yes / No)
6. When was the last time combinations were changed on the safes? Date: _________
7. If the combinations are recorded, where are they stored? Location(s) ___________
9. What policies and procedures are in place for securing sensitive items, such as
monies, precious metals, high dollar value items, narcotics, etc.?________________
_______________________________________________________________________________
Name ________________________________________________________________________
Address _______________________________________________________________________
Phone_________________________________________________________________________
11. When was the last key inventory taken? Date: _________
Comments: ________________________________________________________________________
ALARMS
Alarms
Emergency doors should be equipped with alarms so that
departure from the building through an unmonitored door
alerts security. In addition, a security survey will ask if a
system of personal or local alarms is in place (Figure 42). For
example, industrial and educational chemistry labs usually
have their own alarms to warn everyone in the building of a
chemical spill. Cashiers and bank tellers are able to trigger an
alarm in the event of a robbery.
Equipment
A major emphasis of every security survey is the manner in
which portable equipment is protected. Such equipment in-
cludes computers, typewriters, copy machines, fax machines,
and video equipment. Is this valuable equipment physically
secured in some way? Is expensive equipment located close
to outside doors, so that someone can steal it and get away
64 Home and Business Security
After-hours Restrictions
Most buildings are less crowded in the off-hours, usually
evening to early morning. This is a time when many areas of
the building are particularly vulnerable to unlawful admis-
sion, theft, and damage. Here are only a few of the items a
thorough security survey will examine.
Open Areas
By open area we refer to the area surrounding a building; such
areas are part of the complex, but exclude roads. Open areas
include parking lots, gardens, patios, outdoor recreation
areas, playing fields, and so on. Security measures taken to
protect open areas will vary depending on a number of vari-
ables; however, the security survey will examine all of the
following:
Home and Business Security 65
Fences
Are fences necessary? Is the fence properly maintained and
effective in keeping people out? Are the locks adequate?
Outside Lighting
One of the best burglary-prevention steps is the provision of
adequate lighting. Thieves do not like to be seen. They tend
to stay away from areas that are well lighted. An outside area
needs to be well lit, particularly around entrances, entrance
gates, parking lots, or walkways.
Parking Lots
Parking lots present one of the greatest security challenges.
Here you are dealing with both theft of property and per-
sonal security. Most hospital and school parking lots allow
easy and open access. Unless restricted by permits, the lots
are largely unsecured. Even when security officers patrol
regularly, plenty of opportunity for wrongdoing remains.
Parking permits may have to be issued for good security.
A security survey examines all parking areas to see how well lit
they are (Figure 43). Clear pavement markings and well-placed
exit signs are also important so that people can easily find their
way into and out of the lots. Telephones should be readily avail-
able to allow someone to call the security office for help.
VEHICULAR MOVEMENT
3. Are cars parked adjacent to loading docks, building entrances, etc.? (Yes / No)
Comments: ________________________________________________________________________
Landscaping
A security survey will also look at the way a complex is land-
scaped. The aim is to see if there are places behind trees and
bushes where a would-be thief or rapist might hide. Are trees
kept far enough away from buildings to prevent someone
from gaining access to windows or the roof of the building by
climbing a tree? Is there high grass near buildings that can
present a fire hazard in dry seasons?
PERSONNEL QUESTIONS
4. Do newly hired employees execute a corporate briefing form for inclusion in their
personnel files? (Yes / No)
5. Are exit interviews conducted when employees are terminating? (Yes / No)
6. Is a program followed to ensure return of keys, credit cards, I.D. cards, manuals,
and other company property? (Yes / No)
Comments: ________________________________________________________________________
MONEY CONTROLS
RISK ANALYSIS
A Subjective Tool
We have been examining all the areas that must be included
in a security survey. Once the data from the security survey
have been collected, three more steps remain in the total
process, and these steps make up the risk analysis. Unlike a
security survey, which is an objective tool, a risk analysis
is a subjective tool. An expert analyst takes the information
gathered during the survey, studies it in detail, and makes
recommendations based on what the survey reveals. Analy-
sis involves judgments about what is good and not so good,
what is safe and unsafe, and what are the right and wrong
ways to conduct business. Specifically, the surveyors must:
1. Analyze the data.
2. Recommend changes, if necessary.
3. Implement new security measures and procedures.
These three steps together form the second major part of the
security survey/risk analysis process. Let’s look at each of these
three steps individually.
Analysis
You’ve seen that before an effective security program can be
set in place, top management must thoroughly investigate
the risks that exist at every level of the operation. These risks
may be from natural or man-made forces. They may be the
result of criminal activity, accidental causes, or acts of nature.
Taking all of the information collected in the course of the
security survey, those charged with analyzing the data usu-
ally set up a system of priorities. Areas most critical for the
survival of the business or institution are given top priority
for protection (Figure 46). Non-critical areas are assigned a
lesser priority.
Sometimes the level of priority can shift in the course of a sin-
gle 24-hour period. Take the example of a major department
store. During hours when the store is open for business, the
Home and Business Security 73
STATE UNIVERSITY
Implementation
Writing up a great report is only part of the battle. Security
consultants must also work to bring about the appropriate
changes. Whether or not to make such changes, however, will
depend on a careful comparison of the cost of implementing
new measures versus the potential for loss if the measures are
not implemented. This comparison and decision-making pro-
cess is one of the main objectives of risk analysis.
Locking It Up! 4
1. True or False? A security survey doesn’t usually evaluate visitor access
to a building.
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
and 19). Teens and young adults look for easy targets; they
are hit- and-run artists and are still considered amateurs.
Adults in their 20s and 30s are more skilled and cautious bur-
glars. They usually work in pairs, take time to study their tar-
get, and know a family’s schedule. They also have a “cover”
or excuse to account for their presence in a neighborhood.
A target is the property, person, or information that is the goal of a criminal’s attack.
Target hardening refers to the process where all entry points are guarded by visible
means of security. Some of these means include lights, locks, fencing, alarms, and
security officers. All these security measures make entry difficult, thus hardening the
target against attack.
• Target hardening
1. False
2. light
3. An open area is the area surround-
ing a building. It includes parking
lots, gardens, patios, outdoor rec-
reation areas, playing fields, etc.
4. False
5. data collection
analysis
recommendation
implementation
Examination 85
EXAMINATION NUMBER:
03100801
Whichever method you use in submitting your exam
answers to the school, you must use the number above.
For the quickest test results, go to
http://www.takeexamsonline.com
When you feel confident that you have mastered the material in this study unit,
complete the following examination. Then submit only your answers to the school
for grading, using one of the examination answer options described in your “Test
Materials” envelope. Send your answers for this examination as soon as you
complete it. Do not wait until another examination is ready.
1. Shoplifting refers to
A. 25 % C. 65%
B. 50% D. 75%
86 Examination
5. A gate is an example of
A. 10–20% C. 20–30%
B. 30–40% D. 40–50%
A. February C. August
B. June D. December
10. The largest percentage of retail thieves are between the ages of
A. 65–80. C. 50–65.
B. 30–45. D. 12–25.
A. Two C. Six
B. Four D. Eight
Examination 87
13. Which of the following is a basic loss-prevention tool used in assessing potential
problem areas?
15. The term used in business for the kind of losses created by employee theft and external
theft is
A. prevention. C. prosecution.
B. parental discipline. D. restricting teenage access to stores.
17. What is the first line of defense against intrusion from external sources?
20. A data-processing department survey is mainly concerned with the potential loss of
COMING ATTRACTIONS
Now that you have a firm understanding of the impor-
tance of security in home and business environments, it’s
time to move on to your next study unit. In Study Unit 9
you’ll learn all about automotive locks, their construction
and operation, and how to install and repair them. You’ll
also review the coding system used to cut automotive keys
and learn about emergency car opening. See you there!