StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Criminal Justice: Introduction to Security - Assignment Example

Cite this document
Summary
This essay considers one of the primary concerns of human beings since the time when rudimentary forms of civilizations began to emerge such as security and safety. The essay discusses the history of security services, threats to modern society, protection and mitigation against specific threats…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful
Criminal Justice: Introduction to Security
Read Text Preview

Extract of sample "Criminal Justice: Introduction to Security"

Introduction to Security History of Security Services Security and safety have been one of the primary concerns of human beings since the time when rudimentary forms of civilizations began to emerge. The Ancient Greek states and Roman Empire made valuable contributions towards the formation of legal systems and codes of conduct. The turbulent social eras of these advanced empires also spawned the need for private security forces that would be instrumental in crushing internal disorders. The elite Praetorian Guard was established by the Emperor Augustus to defend vital installations of the Roman Empire (George, 2000). The Romans also created the first police force known as “Vigiles” who were responsible for maintaining law and order in the urban areas of the empire (George, 2000). Europe in the middle ages rapidly transformed and evolved legal institutions. Written legal system led to the creation of representatives of the monarch that had the authority to mete out justice. The rise of modern security organizations emerged in the nineteenth century. The rapid industrialization, migration into urban areas, and development of cities led to proliferation of crime and corruption. This led to the requirement for private security agencies that would offer protection and safety to private citizens. They were usually hired by people who had unique security requirements which government law enforcement agencies could not handle. Allen Pinkerton and Robert Peel are credited with the establishment of modern security agencies. Security agencies before the modern time period were confined to specific tasks. Some of these agencies guarded the private property of important and influential people. Other agencies were involved in solving crime cases. Threats to Modern Society Crime is perhaps the greatest threat to modern society because of its pervasive influence. Organized criminal groups perform a range of activities that can affect society. These groups have extensive networks of criminals that engage in illicit activities that cause intimidation, coercion, and fear amongst people (Gill, 2006). Street crime is also one of the greatest threats to modern society. Perpetrated by individuals or low level gangs it can pose security threats to the lives and properties of citizens. Finally terrorism remains a major threat because of its ability to wreck havoc and destruction. Risk Risk is defined as the frequency or intensity of threat to any target. One of the primary risks for people and places is that of terrorism. Other types of risk can include criminal activity, arson, theft, and banditry. Criminal and terrorism pose significant levels of risks to people and places. Protection and Mitigation against Specific Threats There are numerous ways by which security personnel can mitigate or reduce the level of risks. Providing basic level of security is the most vital component of this defensive strategy. The target that is at risk should be surrounded by a perimeter security system that allows the personnel to monitor various locations of the installation (Gill, 2006). All entry points must have intrusion detection, weapons detection, and other systems that can check and monitor visitors entering and leaving the premises. The people who can be ideal targets should be given a separate entry and exit route. Security agencies can respond to different levels of threats if they pursue unique and innovative methods of security. Authority of Private Security Personnel Private security personnel are governed by the legal regulations and procedures of their national states. They do not enjoy the privileges of government police forces but they are allowed to keep weapons. The use of weapons is allowed for defensive purposes. This has to be proven in the court of law that they acted to protect the person or place which was targeted. Private security personnel do not have the authority to intimidate or interrogate people (Alabarda, 2007). However they are being recruited to guard the vital exit and entry routes of installations and borders. Private security agencies are being recruited by the government to secure public places. Some agencies have also been providing security inside combat zones. However some agencies do engage in such type of discrete behavior which can be considered to be against the legal regulations of that particular country. Security officers must be given greater autonomy and freedom in performing their duties. However care should be taken that this does not lead to misuse or abuse of their privileges and duties (Alabarda, 2007). Private security personnel should be given diversified tasks in order to relieve the burden on law enforcement agencies that are plagued by staff shortages and funding problems. The privatization of security forces should be allowed but there is a need for uniform and standard set of rules that can administer and supervise the industry. This would be beneficial in reducing or mitigating the threat of abuse or misuse of privileges and power. Levels of Security Protection Studies conducted regarding the security industry have categorized levels of security into five types. At the basic level the simplest types of security assets are deployed to protect assets. Basic level security could be applied in the homes of people which can consist of cheap and low cost systems (Alabarda, 2007). Low level security is used to prevent any unauthorized intrusion by the use of standard security systems. Examples of such systems are the ones which are installed and monitored at the offices of law enforcement agencies. Above this level is medium security which is concerned with protecting and safeguarding assets and people from moderate threats. High level security is considered with the detection and prevention of high security threats. It utilizes a number of techniques and systems in order to detect and deter external threats and risks. Examples of high level security can be the protection and defense of public buildings like courts and landmarks. Maximum security is considered to the broadest and comprehensive level of security which has been deployed against a range of threats and risks. Maximum level security can be applied for vital personnel like government officials and vital infrastructure like power plants. A number of electronic and conventional security systems can be used as measures or countermeasures for security threats. CCTV cameras and surveillance systems allow security personnel with the ability to monitor different locations of the installation (Alabarda, 2007). The use of secure exit and entry points can protect vital targets. Electronic perimeter security systems seek to prevent illegal breaches in security. Detection systems like X-Ray machines and metal detectors can be used to search any concealed weaponry by people. High level and maximum security installations can deploy hardened concrete walls, bulletproof glasses, and other sophisticated electronic systems to respond to an array of threats and risks. ASIS Code of Ethics ASIS provides a number of standard and uniform procedures and guidelines which are used to regulate and govern the private security industry. Its code of ethics requires that security personnel perform their duties and actions in a diligent and prudent manner. They are also required to respect the laws of their nation states. They are forbidden to engage in any illicit or illegitimate activity (Gibson, 2007). They must have excellent and exceptional communication, technical, and security skills in order to achieve their goals and objectives. Highest levels of professionalism and excellence are mandated by the ASIS code of ethics. The ASIS code of ethics provides a set of broad based guidelines that call for honesty, integrity, and truthfulness. Security agencies have to follow these guidelines in order to prevent any legal infringement. It is also vital and crucial that any personnel that violate these laws are given appropriate punishment. Any negligence or failure to do so would lead to damage in reputation and image of the security agency. References: George, B. And Button, M. (2000) "Private Security", Basingstoke: Palgrave Macmillan. Gill, M. (ed) (2006) "The Handbook of Security", Basingstoke: Palgrave Macmillan. Alabarda, Yusuf and Lisowiec, Rafal.  The Private Military Firms:  Historical Evolution and Industry Analysis.  Monterey, CA, Naval Postgraduate School, 2007 Gibson, Stevyn D.  Regulated Private Security Companies versus a Professional Security Sector:  A Cautionary Tale.   Journal of Security Sector Management 5:1-10 May 2007 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Criminal Justice: Introduction to Security Assignment”, n.d.)
Criminal Justice: Introduction to Security Assignment. Retrieved from https://studentshare.org/law/1553110-criminal-justice-introduction-to-security
(Criminal Justice: Introduction to Security Assignment)
Criminal Justice: Introduction to Security Assignment. https://studentshare.org/law/1553110-criminal-justice-introduction-to-security.
“Criminal Justice: Introduction to Security Assignment”, n.d. https://studentshare.org/law/1553110-criminal-justice-introduction-to-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Criminal Justice: Introduction to Security

Criminal Technology from the Past into the Future

Past Evolution of Technology Effects on Policing Styles and Public Relations Advancement of information technology has led to IT fragmentation where criminal are utilizing technology to commit crime, which may become a problem to security.... Running head: Criminal Technology from the Past into the Future Criminal Technology from the Past into the Future Insert Name Insert Insert 04 March 2011 Evolution criminal justice Technology Introduction A criminal activity has in the recent past become easier to undertake due to the application of technology, which concurrently evolves with criminality....
4 Pages (1000 words) Assignment

Balance in the Administration of Justice and Security

BALANCE IN THE ADMINISTRATION OF JUSTICE AND security NAME: INSTITUTION: Abstract The balance in administration of justice and security has been a major global problem.... As a result, there was a great imbalance between the administration of justice and security.... Things have changed in the 21st century because of the evolution of security and justice.... New laws have been formed and implemented in order to protect the rights of citizens while still offering them security....
6 Pages (1500 words) Essay

The Effects of Plagiarism in Criminal Justice and Security Management

Thie term paper "The Effects of Plagiarism in criminal justice and Security Management" focuses on an issue that continues to beset the academic community.... This is the same problem that is encountered in the field of criminal justice and security management writing and research.... With plagiarism, efforts at in-depth and unique analyses of issues in criminal justice and security management would essentially suffer in terms of quality....
10 Pages (2500 words) Term Paper

Criminal justice Tends Paper

Name: Title: Course: Tutor: Date: criminal justice Trends Introduction Focusing on law enforcement as the selected criminal justice component, this paper seeks to evaluate the trend from the past to the present and predict into the future, from which budgetary and managerial impact in criminal justice system as a whole would be analyzed.... hellip; Law enforcement in criminal justice refers to the agencies and individuals charged with law enforcement and maintenance of order and safety in the public....
4 Pages (1000 words) Essay

The Role of the Judiciary in the Pursuit

As a branch of the criminal justice system, the study uses the hypothesis that professionals in the field of legal affairs such as lawyers, judges and advocates can use the principles of social justice, such as solidarity, human rights and freedoms, fairness and equality to promote justice in the contemporary society.... This has happened according to various incidents, where the professionals either compromise their integrity against the justice system as a result of security threats to their lives or deliberate compromise because corrupt deals....
6 Pages (1500 words) Research Paper

Essence of a Criminal Justice System

The study is aimed at exploring the essence or rationality of a criminal justice system.... Accordingly, the paper has made a through study and investigated into the point to discover the essence of the criminal justice system for a given country.... In addition, the study has also proceeded to develop the idea as to the significance or implication of a criminal justice system.... It is well-said that the evolution of criminal justice began at the earliest period of human civilisation....
6 Pages (1500 words) Essay

Does the Press Have Too Much or Too Little Freedom

41) development and application of criminal justice technology for the purpose of individual liberty is possible only in communities that share and perpetuate democratic norms.... introduction: The press has always played a very important part in the political, social and cultural life of the country, along with other media such as television, and radio; and the present day internet.... introduction: According to Klay; Sewell (1996: p....
10 Pages (2500 words) Essay

Physical Security Clients Assessment (Criminal Justice)

Physical security refers to the physical measures undertaken to safeguard personnel, protect material from unauthorized access and protect against theft, damage and sabotage (Fennelly, 2004).... It entails more than the external security.... As attainment of absolute security would be… almost impossible, the idea would be to make access difficult enough to deter intruders and consequently provide for their apprehension (Siegel, 2010).... The vulnerability of any security installation has to be assessed so as to determine physical security needs....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us