Download presentation
Presentation is loading. Please wait.
Published byMartin Derek Moore Modified over 8 years ago
1
CJ-180 Private Security Seminar Unit 8
2
Overview of Unit 8 Terrorism Other Threats White Collar Crime Burglary & Robbery Labor Disputes Espionage Piracy 2
3
Terrorism According to Merriam-Webster Online Dictionary (2010), Terrorism is defined as: “the systematic use of terror especially as a means of coercion.” In other words…methodically scaring the hell out of people to get them to comply. 3
4
Terrorism – Then & Now Old-fashioned terrorist acts Assassinations Bombing Present-day terrorism More lethal Suicidal More ideologically religious More technologically advanced. 4
5
Terrorism Terrorist are shifting their targets to “soft targets”. Companies are willing to pay ransoms rather than pre-pay for security 5
6
Where does it come from? Europe Marxism Russia Ireland Palestine Chechnya 6
7
Terrorism in the 21 st Century Financial Support Present day terrorists Loosely organized Use Internet to communicate Ideological Most have their sights set on the U.S. 7
8
International Terrorism No clear definition Political Approach Criminal Approach Militaristic Approach Physiological Approach Group Behavior Multi-factor Approach 8
9
Terrorism as a Tactic Political Social Economic Ethnic and Religious Ideological Personal 9
10
Terrorism’s Shift From ideological to Ethnic and Religious Spread of Western Culture Capitalism Organizational Shift Individual International Terrorism Group Terrorism (Current Trend) State Terrorism (Older Trend) 10
11
Shifts Geographical Used to target Americans outside the U.S. Now targets Americans within its own borders. Tactical Individual Mass 11
12
Shifts Technological From guns and explosives To WMD and Chemical and Biological Organized Crime From State sponsored To Organized Crime networks 12
13
Cyber Terrorism Attacking computer networks What are some computer networks that – if attacked – could result in a severe disruption in normal everyday life? Type in your answers! 13
14
Question? Attacking computer networks What are some computer networks that – if attacked – could result in a severe disruption in normal everyday life? Banking Power Grids Water Treatment Plants Communications systems Air Traffic Control Rail Transportation Public Transportation 14
15
Other Threats to Businesses White Collar Crime Deceit Deception Manipulation Violation of Trust Use to be punishable by Fines Now punishable by Jail 15
16
Other Threats to Businesses Famous White Collar Crimes ENRON Adelphia Communications WorldCom Tyco International Martha Stewart 16
17
Other Threats to Businesses Burglary By entering building or other structure Steal Other Felonies Rape Arson 17 Robbery Force or threat of force Create Fear Steal Assault & Battery 2% solvability rate 4% recoverable items
18
Burglary Average loss $1,725.00 Most use main entrance Some only need to break out Big-Ticket items Cash 18
19
Burglary Physical Defense Alarms Safes Doors Walls Ceilings Locks Surveillance 19
20
Robbery Prevention Employee Training Programs Cash Control Procedures Drop safes Police presence Panic Alarms CCTV 20
21
Targets Supermarkets Gas stations Convenient stores Liquor stores Drug stores Jewelry stores 21
22
Cash is King Counting Money in Public View Opening Routines Transporting Cash / Bank Deposits Closing Routines 22
23
Other Threats Cont. Labor Disputes Espionage Piracy 23
24
Overview of Unit 8 Terrorism Other Threats White Collar Crime Burglary & Robbery Labor Disputes Espionage Piracy 24
25
Key to Success! Please remember to contact me if you have any questions or if you need help with anything. Tbashore@kaplan.edu Protect2357 – AIM I am looking forward to working with you to unlock your future! 25
26
References Fischer, R.J, Green, G., & Halibozek (2008). Introduction to Security. (8 th ed.). Burlington, MA: Butterworth and Heinemann terrorism. (2010). In Merriam-Webster Online Dictionary. Retrieved June 24, 2010, from http://www.merriam- webster.com/dictionary/terrorism 26
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.