Download presentation
Presentation is loading. Please wait.
Published byLester Payne Modified over 9 years ago
1
Role of Analysis in the Crime Prevention of Homeland Security Security Services
2
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. Copyright and Terms of Service Copyright © Texas Education Agency, 2011. These materials are copyrighted © and trademarked ™ as the property of the Texas Education Agency (TEA) and may not be reproduced without the express written permission of TEA, except under the following conditions: 1) Texas public school districts, charter schools, and Education Service Centers may reproduce and use copies of the Materials and Related Materials for the districts’ and schools’ educational use without obtaining permission from TEA. 2) Residents of the state of Texas may reproduce and use copies of the Materials and Related Materials for individual personal use only, without obtaining written permission of TEA. 3) Any portion reproduced must be reproduced in its entirety and remain unedited, unaltered and unchanged in any way. 4) No monetary charge can be made for the reproduced materials or any document containing them; however, a reasonable charge to cover only the cost of reproduction and distribution may be charged. Private entities or persons located in Texas that are not Texas public school districts, Texas Education Service Centers, or Texas charter schools or any entity, whether public or private, educational or non-educational, located outside the state of Texas MUST obtain written approval from TEA and will be required to enter into a license agreement that may involve the payment of a licensing fee or a royalty. Contact TEA Copyrights with any questions you may have.TEA Copyrights 2
3
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. Terrorism A difficult concept to explain A difficult concept to explain Does not include acts of violence in which the terror component is incidental or secondary to some other primary objective Does not include acts of violence in which the terror component is incidental or secondary to some other primary objective Is a psychological weapon that is aimed at its immediate victim and also a wider audience; it has the goal of creating a behavior change in that audience Is a psychological weapon that is aimed at its immediate victim and also a wider audience; it has the goal of creating a behavior change in that audience Includes creative tactics without boundaries Includes creative tactics without boundaries 3
4
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. Threat Assessment Assessment of whether a potential terrorist act will happen, where it will happen, and expected damages and injuries if it does happen Assessment of whether a potential terrorist act will happen, where it will happen, and expected damages and injuries if it does happen A developing field pioneered by the US Department of the Treasury’s US Secret Service A developing field pioneered by the US Department of the Treasury’s US Secret Service Commonly used in counterterrorism Commonly used in counterterrorism Involves the investigation and analysis of the situations and the individuals that may pose threats to the public Involves the investigation and analysis of the situations and the individuals that may pose threats to the public 4
5
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. The Department of Homeland Security (DHS) Established in January, 2003 Established in January, 2003 Organized to protect the country from terrorist acts and to minimize the damage of a terrorist attack or natural disaster Organized to protect the country from terrorist acts and to minimize the damage of a terrorist attack or natural disaster Absorbed many different law enforcement resources and organizations Absorbed many different law enforcement resources and organizations The first federal department with homeland security as its primary objective The first federal department with homeland security as its primary objective 5
6
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. The Department of Homeland Security (DHS) (continued) Created by The Homeland Security ACT (HLS) that was passed in 2002 as a direct result of the terrorist acts of 9/11/01 Created by The Homeland Security ACT (HLS) that was passed in 2002 as a direct result of the terrorist acts of 9/11/01 Works through partnerships with state, local, and tribal governments, and the private sector, to ensure the highest level of protection and preparedness for the country and the citizens it serves Works through partnerships with state, local, and tribal governments, and the private sector, to ensure the highest level of protection and preparedness for the country and the citizens it serves 6
7
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. Private Security The private security individual’s role as a first responder The private security individual’s role as a first responder – More limited than the role of the first police officer or other public authority on the scene – Protect people and property until the police or public authority arrives on the scene The first responders to the 9/11/01 terrorist attack in New York City were private security employees; at least thirty-five of them died that day The first responders to the 9/11/01 terrorist attack in New York City were private security employees; at least thirty-five of them died that day There is a need for law enforcement agencies to build formal partnerships with private security organizations There is a need for law enforcement agencies to build formal partnerships with private security organizations 7
8
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. Partnerships Private Security/Public Policing Partnerships policy paper Private Security/Public Policing Partnerships policy paper – Created in 2004 by the US Department of Justice Office of Community Oriented Policing Services (COPS), in partnership with the International Association of Chiefs of Police (IACP) and a broad- based group of private-sector/law enforcement professionals – A comprehensive policy paper that outlines a national strategy to establish partnerships between private security and public law enforcement agencies to create action plans for responding to terrorism 8
9
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. Partnerships (continued) Public–private cooperation – relationships between law enforcement and private security Public–private cooperation – relationships between law enforcement and private security – Many studies see a need for law enforcement/private security partnerships – These fields have much to offer each other but often lack confidence in one another – These partnerships take many forms and occur at many levels (i.e. informal, ad-hoc collaboration, formal partnerships, or contractual agreements) 9
10
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. Partnerships (continued) Benefits of partnership include Benefits of partnership include – Law enforcement agencies have an improved capacity to carry out their traditional crime-fighting duties and their additional homeland security duties by using the many private security resources in the community – Private security organizations have an improved capacity to carry out their mission of protecting their companies’ or clients’ people, property, and information, while at the same time serving the homeland security objectives of their communities – With law enforcement/private security partnerships the nation as a whole will benefit from the heightened effectiveness of law enforcement agencies and private security organizations 10
11
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. Partnerships (continued) Obstacles of partnerships include Obstacles of partnerships include – Private security agencies feel that they do not always receive timely information from law enforcement – Law enforcement agencies Concerned that private security organizations may not treat information as discreetly as needed Concerned that private security organizations may not treat information as discreetly as needed Feel that private security individuals are not adequately trained Feel that private security individuals are not adequately trained Do not understand the functions of private security Do not understand the functions of private security 11
12
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. Targets Terrorist attacks Terrorist attacks – Occur with or without warning – Often intended to cause Mass casualties Mass casualties Loss of critical resources Loss of critical resources Disruption of vital services Disruption of vital services Disruption of the economy Disruption of the economy Individual and mass panic Individual and mass panic – Have a range of environmental and physical indicators (i.e. factors that are absent are as important as factors that are present) 12
13
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. Targets (continued) Terrorists Terrorists – Choose their targets to meet their goals (i.e. the food supply) – Select “soft” or lightly protected targets over “hard” or very secure targets – May also be drawn to major events such as parades or athletic events 13
14
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. Targets (continued) Some of the weapons available to some terrorist groups include Some of the weapons available to some terrorist groups include – Biological weapons – Nuclear weapons – Incendiary devices – Chemical weapons – Explosive devices 14
15
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. Lessons from the 9/11/01 Terrorist Attacks Crisis management Crisis management – To identify, acquire, and plan the use of resources needed to anticipate, prevent, and/or resolve a threat or an act of terrorism – Predominantly a law enforcement response that is most often executed under federal law 15
16
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. Lessons from the 9/11/01 Terrorist Attacks (continued) Challenges of planning for disaster recovery Challenges of planning for disaster recovery – Many individuals that hold key positions in private security also hold reserve positions with law enforcement, fire service, or the National Guard – It is critical to anticipate victims’ reactions so that first responders can plan accordingly 16
17
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. Lessons from the 9/11/01 Terrorist Attacks (continued) The impact of natural disasters and terrorist attacks on victims is different, and care should be taken to treat victims accordingly The impact of natural disasters and terrorist attacks on victims is different, and care should be taken to treat victims accordingly Fear management comprises the programs that reduce the incidence of adverse psychological effects following a disaster Fear management comprises the programs that reduce the incidence of adverse psychological effects following a disaster 17
18
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. Lessons from the 9/11/01 Terrorist Attacks (continued) Natural disasters Natural disasters – Many types follow regional and seasonal patterns (i.e. floods, tornadoes, and hurricanes) – These patterns provide some degree of familiarity and predictability for community victims, emergency responders, and disaster relief workers 18
19
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. Lessons from the 9/11/01 Terrorist Attacks (continued) Terrorist attacks Terrorist attacks – Are caused by deliberate human acts, that include sudden and unexpected threat, horror and destruction – Affect innocent and unsuspecting people in the course of their daily routines – Cause significant psychological issues There are usually more psychological victims than physical victims There are usually more psychological victims than physical victims The death and destruction become reminders to many victims of their own vulnerability and inability to keep their loved ones safe The death and destruction become reminders to many victims of their own vulnerability and inability to keep their loved ones safe 19
20
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. The Federal Emergency Management Agency (FEMA) Has the mission to Has the mission to – Reduce loss of life and property and protect the nation from all hazards, including natural disasters, acts of terrorism, and other manmade disasters – Lead and support the nation in a risk-based, comprehensive emergency management system of preparedness, protection, response, recovery, and mitigation 20
21
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. The Federal Emergency Management Agency (FEMA) (continued) Recommendations for emergency situations Recommendations for emergency situations – Local officials provide information to the public through the media – Individuals in circumstances where they feel threatened or endangered need to leave their current location to avoid danger – The amount of time to evacuate depends on the emergency; planning ahead (including gathering necessary supplies) is essential 21
22
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. Preparedness Issues (Individual/Business) Communication – plans should be in place to reassure, give instruction, and share information Communication – plans should be in place to reassure, give instruction, and share information Leadership/management – needs to review its emergency planning and practice executing decisions before a crisis occurs Leadership/management – needs to review its emergency planning and practice executing decisions before a crisis occurs Transportation – plans must account for the possibility that many individuals may be stranded after a disaster Transportation – plans must account for the possibility that many individuals may be stranded after a disaster 22
23
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. Preparedness Issues (Individual/Business) (continued) Geographic location – in some types of disasters, individuals or businesses must move to an alternate geographic location Geographic location – in some types of disasters, individuals or businesses must move to an alternate geographic location Personnel backup – companies that have some form of structural leadership or hierarchy ensure that certain employees are trained to replace employees that depart from the company Personnel backup – companies that have some form of structural leadership or hierarchy ensure that certain employees are trained to replace employees that depart from the company Database backup – companies need to understand that some redundancy in operations and processing is helpful Database backup – companies need to understand that some redundancy in operations and processing is helpful 23
24
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. Preparedness Issues (Individual/Business) (continued) Key dependencies – companies should understand their dependencies on key vendors Key dependencies – companies should understand their dependencies on key vendors Security – consists of threat assessment; individuals or companies must assess security measures Security – consists of threat assessment; individuals or companies must assess security measures 24
25
Copyright © Texas Education Agency 2012. All rights reserved. Images and other multimedia content used with permission. Resources US Department of Justice (DOJ), Engaging the Private Sector to Promote Homeland Security: Law Enforcement-Private Security Partnerships https://www.ncjrs.gov/pdffiles1/bja/210678.pdf US Department of Justice (DOJ), Engaging the Private Sector to Promote Homeland Security: Law Enforcement-Private Security Partnerships https://www.ncjrs.gov/pdffiles1/bja/210678.pdf https://www.ncjrs.gov/pdffiles1/bja/210678.pdf Introduction to Private Security: Theory Meets Practice, Cliff Roberson & Michael L. Birzer Introduction to Private Security: Theory Meets Practice, Cliff Roberson & Michael L. Birzer Introduction to Security (6th Ed.), Robert J. Fischer & Gion Green Introduction to Security (6th Ed.), Robert J. Fischer & Gion Green Investigator/Officer’s Personal Experience Investigator/Officer’s Personal Experience 25
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.