portfolio_2012.docx | |
File Size: | 39 kb |
File Type: | docx |
southwestern_college.docx | |
File Size: | 24 kb |
File Type: | docx |
My reflection on meeting this outcome:
Legal rights of sworn security officers and and security officers of businesses are highly different. Sworn officers have the the right to detain and apprehend anyone based on the badge he or she wears. Security officers are limited to how they can operate within the confines of the facility they are protecting. They basically are given an extension of the owners rights of the property. For example you may see a sign that indicates that the owner has the right to refuse service to anyone based on certain items that don't violate discrimination laws. However they can refuse service if someone is not wearing shoes, shirt or even pants. Some business owners lean to hire sworn police officers as security guards, sure this is a more effective deterant and most police officers are allowed to wear the duty uniform, but this doesn't allow the business owner to use the sworn police officer as he wants. The sworn police officer must obey the rules the city, county or state that has given him his right as a police officer.
Methods of Investigations
When discussing methods of investigation you have to take into account the crimes that you are investigating. One thing that is changing is the way we look at methods of investigation, according to the FBI “Cyber-attacks against government agencies and businesses in the United States continue to rise, and cyber threats will one day surpass the danger of terrorism to the United States.” (Hoover, 2012) As a security professional we must change the way we evaluate investigations in the workplace. Electronic surveillance is the future in workplace investigations due to the type of crimes being committed. Electronic surveillance has five different sub-categories; electronic access control devices, computer use and monitoring, alarms using electronic warning and monitoring technology, covert voice and interception and monitoring and other technology. (Ferraro, 2012) Each of these tools providing what most of us never actually see. Most businesses have some type of access control feature which involves some type of proxy card or key FOB. This type of tool can not only provide and restrict access but allow management to monitor attendance. Monitoring attendance can be an effective tool placing someone at work during a specific crime. Computer and monitoring is a growing concern globally due to social media, corporate espionage and the insider threat. Companies across the nation are being affected by hackers or the theft of proprietary and intellectual information. Being able to monitor computers and end users is crucial in investigation and prosecuting those who violate rules and regulations protecting information. It is my opinion that as security professional we must change the methodology of security and the way its investigated. Investigations involving information technology is important not only to your employer but being able to investigate a case properly. Monitoring Electronic surveillance depending on its content is still protected under certain privacy laws and regulations especially when it comes to emails.
Types of investigations
Depending on the crime will dictate the investigation, computer crimes cost a whole lot more than investigating stolen property. When deciding how to prepare your investigation you must look at tools that are present to make things easier for you or those who you have appointed to conduct the investigation. Some investigation only require statements from individuals who may have been involved with the crime. You must decide if you are going to need a full investigation team. This require a couple of people, first you need your fact finder, these individuals are those who will conduct most of the investigation, they will interview all involved and gather the facts for project manager. The project is the CPU of the investigation he or she will make sure the investigation is done on time, correctly and in an efficient manner. He or she will decide if the investigation requires an outside resource or outside vendor. When an investigation requires an outside source this can be done for a few reason, the crime is serious enough to warrant an outside source or those investigated are on an executive level. This will require an outside investigator to continue with the investigation to include the fact findings and potentially the duties of the project manager.
My Future Learning Goals related to this Outcome:
I’ve learned that law enforcement both on and off duty have rules and regulations they must abide by. I learned even off duty officers must follow the laws that have been given to them by the state, county or city officials. I’ve learned that criminals have the upper hand in society when it comes to crimes, that proven guilty is much harder than innocence. Contract security is limited to their laws and regulations and must be understood better to defeat criminals. We must understand crimes that are specific to our target to defeat them from a proactive standpoint. We need to stop being a reactive society, we must think like the enemy before we can defeat them. Some say that cops are the best criminals, I truly don’t believe it, criminals are the best criminals.
I will continue to gain knowledge to understand the threat; I’ve learned that proactive security is far better than reactive response. I believe you must always think like the criminal to be a step ahead of criminal. I believe understanding policy and regulations will further my core knowledge in aiding customers in defeating future threats costing company millions in lost revenue. I believe the confidence I’ve gained from this major will encourage me to take on bigger challenges enabling me to grow personally and financially.
I will continue to grow by getting globally accredited certifications like my Certified Protection Professional (CPP) certification. This certification allows me to be recognized as a true security professional and not some hack who sells security equipment door to door. This certification allows recognition from my peers as a true professional in my career field. I am also in the process on being a chair member for my local ASIS chapter; this will allow me to grow in my city as a security professional and educate those who require more assistance. I feel I can bring a different perspective to the group allowing for more growth and new members. I believe what I have learned in owning a business is that there are two types of growth, personal and business. You have to have both to see either one grow. Personal growth requires dedication and sacrifice, whereas business growth requires customers and an awesome product. Dedication is taking that extra step in understanding what service you offer better than anyone else understands. Sacrifice is working long hours missing time with your family and those you love to create something you can one day pass on to them.
Legal rights of sworn security officers and and security officers of businesses are highly different. Sworn officers have the the right to detain and apprehend anyone based on the badge he or she wears. Security officers are limited to how they can operate within the confines of the facility they are protecting. They basically are given an extension of the owners rights of the property. For example you may see a sign that indicates that the owner has the right to refuse service to anyone based on certain items that don't violate discrimination laws. However they can refuse service if someone is not wearing shoes, shirt or even pants. Some business owners lean to hire sworn police officers as security guards, sure this is a more effective deterant and most police officers are allowed to wear the duty uniform, but this doesn't allow the business owner to use the sworn police officer as he wants. The sworn police officer must obey the rules the city, county or state that has given him his right as a police officer.
Methods of Investigations
When discussing methods of investigation you have to take into account the crimes that you are investigating. One thing that is changing is the way we look at methods of investigation, according to the FBI “Cyber-attacks against government agencies and businesses in the United States continue to rise, and cyber threats will one day surpass the danger of terrorism to the United States.” (Hoover, 2012) As a security professional we must change the way we evaluate investigations in the workplace. Electronic surveillance is the future in workplace investigations due to the type of crimes being committed. Electronic surveillance has five different sub-categories; electronic access control devices, computer use and monitoring, alarms using electronic warning and monitoring technology, covert voice and interception and monitoring and other technology. (Ferraro, 2012) Each of these tools providing what most of us never actually see. Most businesses have some type of access control feature which involves some type of proxy card or key FOB. This type of tool can not only provide and restrict access but allow management to monitor attendance. Monitoring attendance can be an effective tool placing someone at work during a specific crime. Computer and monitoring is a growing concern globally due to social media, corporate espionage and the insider threat. Companies across the nation are being affected by hackers or the theft of proprietary and intellectual information. Being able to monitor computers and end users is crucial in investigation and prosecuting those who violate rules and regulations protecting information. It is my opinion that as security professional we must change the methodology of security and the way its investigated. Investigations involving information technology is important not only to your employer but being able to investigate a case properly. Monitoring Electronic surveillance depending on its content is still protected under certain privacy laws and regulations especially when it comes to emails.
Types of investigations
Depending on the crime will dictate the investigation, computer crimes cost a whole lot more than investigating stolen property. When deciding how to prepare your investigation you must look at tools that are present to make things easier for you or those who you have appointed to conduct the investigation. Some investigation only require statements from individuals who may have been involved with the crime. You must decide if you are going to need a full investigation team. This require a couple of people, first you need your fact finder, these individuals are those who will conduct most of the investigation, they will interview all involved and gather the facts for project manager. The project is the CPU of the investigation he or she will make sure the investigation is done on time, correctly and in an efficient manner. He or she will decide if the investigation requires an outside resource or outside vendor. When an investigation requires an outside source this can be done for a few reason, the crime is serious enough to warrant an outside source or those investigated are on an executive level. This will require an outside investigator to continue with the investigation to include the fact findings and potentially the duties of the project manager.
My Future Learning Goals related to this Outcome:
I’ve learned that law enforcement both on and off duty have rules and regulations they must abide by. I learned even off duty officers must follow the laws that have been given to them by the state, county or city officials. I’ve learned that criminals have the upper hand in society when it comes to crimes, that proven guilty is much harder than innocence. Contract security is limited to their laws and regulations and must be understood better to defeat criminals. We must understand crimes that are specific to our target to defeat them from a proactive standpoint. We need to stop being a reactive society, we must think like the enemy before we can defeat them. Some say that cops are the best criminals, I truly don’t believe it, criminals are the best criminals.
I will continue to gain knowledge to understand the threat; I’ve learned that proactive security is far better than reactive response. I believe you must always think like the criminal to be a step ahead of criminal. I believe understanding policy and regulations will further my core knowledge in aiding customers in defeating future threats costing company millions in lost revenue. I believe the confidence I’ve gained from this major will encourage me to take on bigger challenges enabling me to grow personally and financially.
I will continue to grow by getting globally accredited certifications like my Certified Protection Professional (CPP) certification. This certification allows me to be recognized as a true security professional and not some hack who sells security equipment door to door. This certification allows recognition from my peers as a true professional in my career field. I am also in the process on being a chair member for my local ASIS chapter; this will allow me to grow in my city as a security professional and educate those who require more assistance. I feel I can bring a different perspective to the group allowing for more growth and new members. I believe what I have learned in owning a business is that there are two types of growth, personal and business. You have to have both to see either one grow. Personal growth requires dedication and sacrifice, whereas business growth requires customers and an awesome product. Dedication is taking that extra step in understanding what service you offer better than anyone else understands. Sacrifice is working long hours missing time with your family and those you love to create something you can one day pass on to them.