Your Security Guide: Revised Edition
()
About this ebook
The objective of this book is to acquaint you with the Security Field. It's purpose is to act as a quick reference.
The author has a diversified background of 40 years plus experience within the Security, Law Enforcement, & technical fields giving him competency in this material.
John Malaspina Sr.
The author has a diversified background of 40 years plus experience within the Security, Law Enforcement, & technical fields giving him competency in this material.
Related to Your Security Guide
Related ebooks
Combatting Cyber Terrorism: A guide to understanding the cyber threat landscape and incident response planning Rating: 0 out of 5 stars0 ratingsSecurity In The 21st Century: The 21st Last Treatise on Security Rating: 0 out of 5 stars0 ratingsValue from Security Rating: 0 out of 5 stars0 ratingsNobody Cares: The Story of the World from Safetyman Rating: 0 out of 5 stars0 ratingsCommon Sense Safety and Security Strategies for Teens and Young Adults Rating: 0 out of 5 stars0 ratingsTrue Leadership...Where is it?: Big Politics & Big Business Rating: 0 out of 5 stars0 ratingsWAKE UP! The Crash is Coming: The Economic Crisis You Are Not Being Told About Rating: 0 out of 5 stars0 ratingsThe Future, Declassified: Megatrends That Will Undo the World Unless We Take Action Rating: 0 out of 5 stars0 ratingsPersonal Security The Foundation For Global Security Rating: 0 out of 5 stars0 ratingsForecasting - 10 Methods Rating: 0 out of 5 stars0 ratingsThe Green Beret Survival Guide: Advice on Situational Awareness, Personal Safety, Recognizing Threats, and Avoiding Terror and Crime Rating: 0 out of 5 stars0 ratingsPrivate Guards and National Security:: -Issues, Challenges and Opportunities/Prospects Rating: 0 out of 5 stars0 ratingsConstructing cybersecurity: Power, expertise and the internet security industry Rating: 0 out of 5 stars0 ratingsHow to Remain Anonymous Online: A Users Guide Updated Rating: 0 out of 5 stars0 ratingsDynamic Tensions: Essays on Balancing Privacy, Security and Identity in the 21st Century Rating: 0 out of 5 stars0 ratingsNo Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing Rating: 4 out of 5 stars4/5Survival II Rating: 0 out of 5 stars0 ratingsThe Best Defense?: Legitimacy & Preventive Force Rating: 0 out of 5 stars0 ratingsBusiness at Risk Rating: 0 out of 5 stars0 ratingsCybersecurity: On Threats Surfing the Internet and Social Media Rating: 0 out of 5 stars0 ratingsCombat Terrorism - Foreign and Domestic: Third Edition Rating: 0 out of 5 stars0 ratingsBusiness Espionage: Risks, Threats, and Countermeasures Rating: 0 out of 5 stars0 ratingsThinking about the Future Rating: 0 out of 5 stars0 ratingsCybersecurity Program Development for Business: The Essential Planning Guide Rating: 0 out of 5 stars0 ratingsCyber Weapons of Mass Psychological Destruction: And the People Who Use Them Rating: 0 out of 5 stars0 ratingsBuild a Security Culture Rating: 0 out of 5 stars0 ratingsCOMBAT TERRORISM Rating: 0 out of 5 stars0 ratingsThe Boiling Frog: How Complacency and Ignorance Created Our Leadership Crisis and What We Can Do About It Rating: 5 out of 5 stars5/5Leadership with Soul Rating: 0 out of 5 stars0 ratings
Self-Improvement For You
The Big Book of 30-Day Challenges: 60 Habit-Forming Programs to Live an Infinitely Better Life Rating: 4 out of 5 stars4/5A Stolen Life: A Memoir Rating: 4 out of 5 stars4/5A Child Called It: One Child's Courage to Survive Rating: 4 out of 5 stars4/5How to Win Friends and Influence People: Updated For the Next Generation of Leaders Rating: 4 out of 5 stars4/5The Gifts of Imperfection: Let Go of Who You Think You're Supposed to Be and Embrace Who You Are Rating: 4 out of 5 stars4/5The Four Loves Rating: 4 out of 5 stars4/5Don't Believe Everything You Think: Why Your Thinking Is The Beginning & End Of Suffering Rating: 5 out of 5 stars5/5Think and Grow Rich (Illustrated Edition): With linked Table of Contents Rating: 4 out of 5 stars4/5Self-Care for People with ADHD: 100+ Ways to Recharge, De-Stress, and Prioritize You! Rating: 5 out of 5 stars5/5Boundaries Updated and Expanded Edition: When to Say Yes, How to Say No To Take Control of Your Life Rating: 4 out of 5 stars4/5Chop Wood Carry Water: How to Fall In Love With the Process of Becoming Great Rating: 4 out of 5 stars4/5Running on Empty: Overcome Your Childhood Emotional Neglect Rating: 4 out of 5 stars4/5How May I Serve Rating: 4 out of 5 stars4/5How to Talk so Little Kids Will Listen: A Survival Guide to Life with Children Ages 2-7 Rating: 4 out of 5 stars4/5Girl, Stop Apologizing: A Shame-Free Plan for Embracing and Achieving Your Goals Rating: 3 out of 5 stars3/5The Language of Letting Go: Daily Meditations on Codependency Rating: 5 out of 5 stars5/5I'll Start Again Monday: Break the Cycle of Unhealthy Eating Habits with Lasting Spiritual Satisfaction Rating: 4 out of 5 stars4/5The Art of Witty Banter: Be Clever, Quick, & Magnetic Rating: 4 out of 5 stars4/5A Course In Miracles: (Original Edition) Rating: 5 out of 5 stars5/5Feeling Good: The New Mood Therapy Rating: 4 out of 5 stars4/5Girl, Wash Your Face: Stop Believing the Lies About Who You Are so You Can Become Who You Were Meant to Be Rating: 3 out of 5 stars3/5
Reviews for Your Security Guide
0 ratings0 reviews
Book preview
Your Security Guide - John Malaspina Sr.
YOUR
SECURITY
GUIDE
Revised Edition
John Malaspina Sr.
YOUR SECURITY GUIDE
Copyright © 2022 John Malaspina Sr.
All rights reserved. No part of this book may be used or reproduced by any means, graphic, electronic, or mechanical, including photocopying, recording, taping or by information storage and retrieval system without the written permission of the author except in the case of brief quotations embodied in critical articles and reviews.
Stratton Press Publishing
831 N Tatnall Street Suite M #188,
Wilmington, DE 19801
www.stratton-press.com
1-888-323-7009
Because of the dynamic nature of the Internet, any web addresses or links contained in this book may have changed since publication and may no longer be valid. The views expressed in the work are solely those of the author and do not necessarily reflect the views of the publisher, and the publisher hereby disclaims any responsibility for them.
Any people depicted in stock imagery provided by Shutterstock are models, and such images are being used for illustrative purposes only.
ISBN (Paperback): 978-1-64895-837-3
ISBN (Ebook): 978-1-64895-838-0
Printed in the United States of America
Contents
Preface
Introduction
Chapter 1. Definitions
Chapter 2. Areas of Concern
Chapter 3. The Security Survey
Chapter 4. Why Do Security Systems and Programs Fail?
Chapter 5. Protecting the Crime Scene
Chapter 6. Personal Protection
Chapter 7. Fire Detection and Prevention
Chapter 8. Accident/Disaster Prevention
Chapter 9. Technical Services
Chapter 10. Guide to Buying an Alarm System
Chapter 11. Roadway Safety and Protection
Chapter 12. Camping and Outdoor Safety
Chapter 13. Ransomware and Cybersecurity Protection
Chapter 14. School Security and Protection
Chapter 15. Dealing with Terrorism
Chapter 16. Mechanics of Espionage
Chapter 17. Recommended Emergency Supply List
Appendix A. Residential Security Survey
Appendix B. Business Security Survey
Appendix C. Ground-to-Air Emergency Signals
Photo Displays
Keypad designs
Control panels
Wireless Alarm Panels
Zone Annunciators and Graphic Displays
Door and window contacts
Space Detectors
References
About the Author
Preface
The objective of this book is to acquaint you with the security field.
The purpose of this material is to provide you with a reference offering a basic overview of the field without elaborating on specific areas and/or betraying confidential material. Regardless of whether you are an apprentice to the field, a homeowner, a business owner, or an administrator, I am hopeful that my book will provide you with a quick, easy-to-read reference that can aid you with your needs.
Introduction
In reviewing my material from my first publication of this book in August of 2007 to now, I am even more horrified and concerned with current events than I was at that time. It is incredible to see how many of my predictions and concerns are accurate and have gotten worse with the global one world order agenda so easily and aggressively prevailing.
I recognize that world leaders have accepted and promoted this agenda in the desperate belief that it will ensure world peace and tranquility, but history has repeatedly proven it’s an unattainable desire.
A review of history prior to WW2 will clearly show that the world was struggling with similar issues at that time with the United Nations (UN) [formerly the League of Nations] guiding and assisting world events in an attempt to ensure world peace. Instead, stupid and misguided politically correct solutions actually contributed to the beginning of WW2.
People quickly forget that the world leaders at the end of WW2 recognized that the world came very close to annihilating itself and agreed for everyone to respect each other’s sovereignty.
Simply put, those who were friends continued, and those with other beliefs and ideology stayed in their respected borders, leaving each other alone. The world, while not perfect, continued and prospered with society having many years of peace and prosperity. The world continued for over forty years, generally speaking, with globalism. Countries that were friends, as mentioned, traded economically and culturally for years, assisting each other for many reasons in times of need.
The danger is simply human behavior.
I personally believe we are currently reliving 1938 all over again with current events. The semantics and rebellious causes are different, but the methods and dangers are not.
As mentioned above, there were countries at the end of WW2 with different ideology and beliefs, who were basically 180 degrees from ours whether it was political or religious.
The primary was communism, which has firmly believed for generations that it cannot work properly unless it is global. Many countries had accepted socialism as an alternative between us and communism.
Until now, it really doesn’t appear to be a concern or threat. What many are failing to recognize is that socialism is just one step below communism.
Communism is alive and well despite what many people think. It is clearly behind many current events with China as its forerunner.
It is very clear that the UN formulated this global order to serve its own interests as the world’s focal point and central government, giving communism and capitalism an agreed platform to operate from.
We have all witnessed how the Global Machine has influenced and changed our way of doing business, celebrating our holidays, educating our children, and undermining our political and religious ideologies all in the name of progress.
Our recent elections have nothing to do with Trump versus Clinton or Biden. It is clearly globalism versus Americanism and the free world.
All that have occurred has not been by accident. Everything has clearly resulted from a well-designed agenda and obviously put in motion to come together so well with perfect timing, which clearly means it has been in the working for many years and well thought out by its players before now.
I firmly believe that despite everyone’s intentions, our world is more unsafe and unpredictable now than ever before. The COVID-19 pandemic provides the perfect platform, whether intentional or not, for the mechanics of the plan to fall into place.
I, like many others, am fearful that our nation is on the verge of a civil war and possibly an international one.
While possible but improbable, I don’t think we will have a third world war provided the Global Machine prevails with China dominating the situation, but if what little is left of the free world does offer substantial resistance and defiance to China, we could have WW3.
I, unlike many other people, am not worried about nuclear war because all world leaders are smart enough to realize that would be a no-win situation for all of us.
I am very concerned about conventional warfare and, as mentioned earlier, believe it to be in our near future. Simply put, our future is anyone’s guess and beyond the averages person control with future generations paying dearly for our ineptness.
That is why personal security has now become of vital importance, more so than ever before.
Chapter 1
Definitions
What Is Security?
Security is a technical and behavioral science whose primary objective is the protection of human life and physical property. It is also known as crime prevention, loss prevention, protection management, and/or risks management.
The overall objective of any security program is to prevent an incident from occurring in the first place and to minimize any losses incurred should something happen. Also, if the program is designed and used properly, another objective of the program should be to suppress and/or control criminal activity.
What Is a Security Hazard?
A security hazard is defined as any act, omission, or condition that could seriously breach the protective system and result in a compromise of client’s secrets, a loss of client’s property, or injury to client’s personnel, family, and/or visitors. Hazards can be generally divided into two classifications: human hazards and/or natural hazards.
What Is a Security Survey?
A security survey is a detailed analysis of an overall facility, its operating procedures, and any existing conditions that, if left unchecked, could develop into a serious problem.
Specialized Classifications Within the Field
Accident prevention
Aerospace security
Airport and aircraft security
ATM security
Apartment complex security
Arson prevention
Banking security
Burglary prevention
Casino security
Child abduction prevention
Construction site security
Computer room security
Document security
Executive/celebrity protection
Farm equipment security
Fraud prevention
Food and beverage security
Fire prevention
Hospital security
Hostage prevention
Handicap barrier–free design
Industrial espionage
Mall security
Marine security
Motel/hotel security
Mailroom security
Mobile home security
Movie/film security
Museum/art security
Narcotic prevention
Nuclear security
Office building security
Pharmaceutical security
Public transit security
Rape/sexual assault prevention
Retail security
Robbery prevention
School/campus security
Showcase security
Terrorist prevention
Traveling security
Shipping/receiving
(transport) security
Underwater security
Vehicle security
Technical services
Professionalism within the field has grown tremendously over the years as the above list clearly demonstrates.
There are numerous men and women across the nation, as well as around the world, who have specialized within these areas.
Chapter 2
Areas of Concern
Access control
Visitor identification/control
Employee identification/control
Physical building layout and design
Key control
Perimeter protection
Exterior detection
Interior detection
Locks
Intrusion detection program and alarms
Fire detection programs and alarms
Inventory control
Trash disposal
Shipping/receiving control
Accident prevention
Lighting
Exterior
Interior
Emergency
Computer security
Storage area/room security
Vehicle parking
Identification/control for the following:
Visitors
Employees
Delivery
Disabled/Handicap
Company Vehicles
Internal theft control
External theft control
Crisis prevention
Hazardous material control
Industrial espionage
Safes/vaults
Personnel investigations
Criminal investigations
Disaster operations
CCTV systems
Public address system
Intercom system
Surveillance systems
Trailer controls
Security seals
Bomb threats
Terrorists prevention
Information control
Preemployment screening
Fraud detection
Return/exchange policies
HVAC/environmental control
Vehicle/bandit barriers
Handicap facilities/accessibility
Excessive shrubbery
Price switching
EAS devices (shoplifting)
Strike/labor disputes
Perimeter fencing
Search and seizure policies
Discharging employees
Patrol operations
Crime/loss prevention programs
Public relations programs
Employment discrimination
Personnel training
Record keeping
Report writing
First aid facility and program
Lost and found program
Swimming pool control
Company phone usage
Office equipment control
Operation identification
Accountability
Substantiation
General housekeeping
Employee package inspection
Inner area security
Perimeter gates
Emergency exit control
Identity theft
When designing and preparing any security system and program, you must address each of these areas. An oversight and/or failure to even consider a vulnerability from one of these areas could prove very costly. Most people are victimized by people who know them or of them.
Special Note
There is a clear distinction between a security system and a security program.
A security system naturally has to do with physical devices that create physical controls thus limiting access to a given area. These controls often help with establishing individual accountability.
The security program is equally important and needs to work in combination with a security system to be effective but concentrates on the behavioral aspects.
The program, if designed properly, tries to anticipate many behavioral movements and/or interactions of the various people coming in and out of your facility and actually defines the total overview and purpose of the security system.
Chapter 3
The Security Survey
Remember when completing surveys, your objective is to identify exposures and reduce vulnerabilities.
The best method is to think like an intruder and/or thief. You must get to know your people and your environment to be alert to the abnormal or a change in routines. Use good judgment, logical thinking, and your imagination. Do not underestimate any situation and/or individual.
Know the different types of criminals and terrorists. Master information resources; remember, your enemy usually does!
Lastly, be cautious to blind adherence and complete reliance on yes and no answers since most situations in today’s complex world are not simple yes and no answers anymore.
When doing your survey, you are analyzing the following areas:
Main entrance/door
Lock (main entrance)
Rear door
Lock (rear door)
Emergency exits and/or side doors
Locks (side doors and/or emergency exits)
Intrusion alarm
Holdup/panic alarms
Sprinkler systems
Carbon monoxide detectors
Smoke detectors
Gas detectors
Water detectors
Freezer detectors
Atmospheric detectors
Door viewers
Public address systems
Interior lighting
Exterior lighting
Emergency lighting
Emergency generator
Emergency exit signs
Display windows
Windows
Locks (windows)
Fire alarm
Fire extinguishers
Fire hoses, etc.
Escape ladders
Fire brigade
Hazardous material identification
Hazardous material storage
Fire prevention program
Accident prevention program
Crime prevention program
Telephones
Telco boxes
Secondary backup communication
Emergency telephone list
Key control
Key cabinets
First aid cabinets
First aid equipment
First aid supplies
Visitor parking
Employee parking
Handicap parking
Handicap facilities
Receiving area
Shipping area
Visitor control
Employee control
Company vehicles
Company vehicle control
Trailer protection
Trailer control
Inventory control
Storage areas
Locks (storage areas)
Safes
Deposits/cash drops
Store layout
Merchandise display
Display counter
Register locations
Desk locks
File cabinets
Lock (file cabinets)
Paper shredder
Trash disposal
Company seals
CCTV
Convex mirrors
Flashlights
Battery reserves
Employee identification
Speed-reducing ramps
Return policies
Refund policies