Elements to include in providing a layered security system

Elements to include in providing a layered security system

Question 1.

What elements would you include in providing a layered security system for a three-building corporate campus that includes a five-story building housing, which is the headquarters office for a major pharmaceutical company in the following scenario? (HINT – start by identifying what you believe are the critical assets and their locations and work from there . . .) (Assume that there have been “Moderate” threat’s made against this company – however not too specific- employees are worried, and executives somewhat cautious in their daily activities.) There have been major protests in and around the facility, however only a few arrests have been made.

The campus is located adjacent to a river that flows into Chesapeake Bay and sits on ground 8 feet above sea level. The building is in a suburban location, sited on approximately five acres adjacent to an interstate highway ramp. Parking is included within the campus boundary and approximately 750 employees are present daily, plus approximately 50 visitors. The loading docks can be accessed from the parking lot via side roads.

Building 1 contains the headquarters offices and is where all of the company’s executives work; all field administrative operations (human resources etc.) are coordinated from this building. Building 2 is where sensitive research is conducted (scientist, and research) and computer – information technology is coordinated. Building 3 has what may be considered as the overflow operations for the company; sensitive training (laboratories), conference rooms and storage. The computer room is in the basement of Building 2 essentially to provide a cool operating environment. The storage facilities hold equipment and supplies used to maintain the grounds.

See the map below for the company. Light poles are indicated by the “+” symbol.

 

 

 

 

Question 2.

Your security firm is hired to provide recommendations for crime prevention for a renovated three four story 50-year-old brick apartment buildings located in Detroit, Michigan. Each building has twenty apartments priced in the upper-middle class range. There is a fairly large overflow parking lot exposed to the city streets. Each apartment is afforded one parking slot in a garage under the building.

This apartment complex is part of a project to renovate the near downtown area and it is placed in an area where there is significant amount of crime about a quarter mile away. The adjacent streets have old businesses, some empty buildings, liquor store, a couple of bars and a popular corner café.

There will be a green landscaped buffer area that extends fifty yards all around the apartment complex to a new sidewalk; an exact landscape plan has not been furnished until you provide your ideas.

However, there are several large old oak trees and mature purple and white flowered lilac shrubbery that has been preserved on the campus kept from a portion of an old inner city park.

In your security plan what would you recommend in terms of crime prevention and target hardening security measures for this new residence complex?

  1. Explain the security measures recommended in terms of critical assets considering likely threats, vulnerabilities, risks and crime theories.
  2. Consider also what must be done prior to any recommendations being made.
  3. Note your opinions, and what options may be available for the client to consider. E. What are your recommendations?
  4. Describe an appropriate security and risk assessment for this scenario.

Question 3.

As a security consultant you are asked to review a recent armed robbery and rape case that happened on State University, USA, associated with the athletic complex. The crime happened at night when Doris Franklin finished her late work out for the gymnastic team. She showered and dressed and ready to leave she noticed the last evening bus left at 10 PM. She just missed it.

The janitor told her she would have to leave the building because he had to lock up the complex. She told him the bus had left and she did not want to walk back to the dorm in the dark and asked if she could call the campus police? He agreed and even stayed with her while she made a call to the campus police.

She called the campus police and asked for an escort. The campus police said they could have a campus security officer come by in about 20 minutes if she could wait. She agreed.

 

She told the janitor and he had her leave the building and wait immediately in front.

After 30 minutes Doris got tired of waiting so she started to walk back in the direction of the dorm when a car approached her, two males brandished a weapon, at gunpoint forced her into the car, stole her purse and she was later raped twice at another location. Fortunately, she was not killed, during the incident and was left severely hurt on the roadside.

The security officer showed up 35 minutes after the call and could not find her. He had stopped for a coffee at McDonald’s before coming. He left the athletic building never calling in the fact she had not been escorted. The procedure is that security must always report the outcome of escort service in terms of person, time of pick up, when the person was safely delivered to their dorm and mileage.

The campus police and security said they are not responsible since Doris chose to leave and not wait for the escort. The security officer was somewhat delayed arriving, however, he picked up his coffee at a drive-through window and had already missed his break since they were short a security officer.

What are the premise liability issues in this case? As a security consultant, what are your findings?

Question 4:

You are a newly appointed administrator of a large public school district that has been experiencing high crime rates among the student population, both on and around campus buildings and facilities. Thefts of property, vandalism and assaults are reported on a daily basis.

The local PTA is upset that the school district has not addressed these problems adequately in the past, and now it appears that these longstanding problems are out of control.

Recently, two students were shot in the hallway of the local high school during an altercation between two rival groups of gang members. Some students have reported observing drug transactions occurring in the bathrooms and in the parking lots, before, during, and after school hours.

Your job is to develop a short-term and long-term strategy to effectively deal with these problems. As with most public agencies, your school system is operating on a very limited budget, so you must choose your interventions wisely.

Assume that there are no programs in place to effectively deal with these problems, but the PTA wants answers now! According to the evidence, which programs work, and which programs do not appear to work? Which ones would you consider using?

Consider the pros and cons of whatever program/procedure you suggest or implement.

 

Question 5:

You are the appointed leader/supervisor of a group representing the office of a newly appointed Chief of Police for a large city experiencing high crime rates, which have been directly associated with gun violence on the street. (All of you are considered by the public as being police executives, and are equally responsible for the powers of the Chief of Police.) Street-level violence within the community has existed for years but the numbers of reported robberies, burglaries, murders, assaults, and theft have become increasingly prevalent in more recent times.

The mayor’s office and various members of the community are demanding “answers” because you were hired to help reduce these types of crimes based on your expertise in the policy-making process.

In order to make a difference in overall crime rates, you must address all serious issues relating to crime and its prevention. You have to address the crime problems mentioned above, but what does the research tell you?

Your job is to develop a short-term and long-term strategy to effectively deal with these problems. As with most localities, the various agencies working within your jurisdiction are operating under tight budgets, so you must choose your interventions wisely. Assume there are no programs in place to deal with the challenges that you are now facing. (You may want to consider what security tools you should, or may what to use in your evaluation.)

Assignment # 1: Vulnerability Assessment (5 pages, 5 references) – Course Objectives # 2 – 4

Develop and complete a vulnerability assessment tool to be used to conduct a survey of a home, business, faith institution or other physical facility of your choice.

The paper should include:

1) Cover page with student’s name, course title and number, and date submitted.

2) Body of paper:

  1. Introduction that provides the purpose of the paper;
  2. Discussion of the site selection and the rationale for the site selected;
  3. Components of the vulnerability assessment; and
  4. Suggestions and recommendations of security counter-measures to mitigate and reduce the risk of identified vulnerabilities to an acceptable level.

3) Reference list.

4) Appendix that provides a copy of the vulnerability assessment tool that you assembled and used for the project.

All papers should be submitted to the assignment folder and adhere to APA guidelines. It should be a minimum of five (5) to ten (10) computer-generated, double-spaced pages and use a 12-point font. Margins are to be 1 inch (top, bottom, right, and left). This does NOT include the vulnerability assessment tool that will be added as an appendix.

Assignment #2:  Risk Assessment Tool (5 pages, 5 references) – Course Objectives # 1 – 5

Develop a risk assessment tool to be used to conduct a survey of a home, business, faith institution, or other physical facility of your choice.

The paper should include:

1) Cover page with name, course title and number, and date submitted.

2) Body of paper:

  1. Introduction that provides the purpose of the paper;
  2. Discussion of the site selection and the rationale for the site selected; and
  3. Components of the risk assessment tool.

3) Reference List.

4) Appendix that provides a copy of the risk assessment tool that you assembled and used for the project.

All papers should be submitted to the assignment folder and adhere to APA guidelines. It should be a minimum of five (5) to ten (10) computer-generated, double-spaced pages and use a 12-point font. Margins are to be 1 inch (top, bottom, right, and left). This does NOT include the risk assessment tool that will be added as an appendix.

Assignment #3 Shared Security Issue/Topic Paper (5 pages, 5 references) – Objectives #1 – 12

Write a paper on one of the following topics while following the below instructions. Select one of the over twenty (20) topics below and research no less than three (3) academic articles (preferably five (5)), regarding the selected topic.   The articles should be academic or professional articles of substance. Use of newspaper articles and other such secondary sources should be avoided.

If you have another security issue, or topic that is of special interest to you, please request permission from the instructor about your proposal.

As a general outline, the paper should address all of the following items:

1) Introduce the importance of the security topic. This should include your reasons for selecting the topic. Provide a clear purpose statement.

2) What is the different authors’ perspectives, evidence, or claims regarding the topic?

3) Compare and contrast the articles. Where do they agree, or do NOT agree? If there is some uncertainty, please state the reasons why while discussing any implications.

4) How does your analysis align with what we have learned thus far in the course?

As a final step, include a one page summary of your papers in the discussion area and explain your topic by sharing your perspective, critical analysis, and opinions.  Provide sufficient logical reasoning and data to support your position.   .

All papers should adhere to APA guidelines. Papers should be a minimum of five (5) to ten (10) double-spaced pages and use a 12-point font. Margins are to be 1 inch (top, bottom, right, and left).

 

List of Topics:

  • Home Protection, What You Should Know
  • Preventing and Responding to Workplace Violence
  • Preventing and Responding to Insider Threats.
  • Security Alarm Systems, (or subtopic and issues like the Problem of False Alarms).
  • The Role of Security in Relation to National Disasters (i.e. Katrina).
  • Private Security and the Use of Force.
  • Selecting and Training Qualified Security Personnel.
  • Information Protection.
  • Professionalizing Security, Dream, or Reality?
  • Current Security Liability Issues (You can choose one, or cover several Court case reviews are a good source of information).
  • Raising Security Awareness, Can it make a Difference?
  • Security Licensing.
  • Bomb Threat and Hazardous Material Response.
  • Effective Policies, Procedures and Practices for Handling Disgruntled Employees, (and/or Customers).
  • Effective Control Access Technologies.
  • Surveillance Technologies.
  • Security and Police Relations.
  • CPTED (Crime Prevention through Environmental Design), when does it, or doesn’t work?
  • The Threat Terrorism and Role of Security.
  • Private Security and Customer Relations.
  • Using Crime Analysis to Improve Security.
  • Sex Offender Programs (maps indicating community location) and Alerts, how, and do they work?
  • Security topic/issue of your choice submitted for approval.