ANSWER THESE QUESTIONS
Chapter 1 - The History of Security and Loss Prevention—A Critical Perspective
Security and Loss Prevention: An Introduction, 5th Edition
by Philip P. Purpura
Butterworth-Heinemann © 2008 Citation
More Contemporary Times
England
For the next 500 years, repeated attempts were made to improve protection and justice in England. Each
king was confronted with increasingly serious crime problems and cries from the citizenry for solutions. As
England colonized many parts of the world and as trade and commercial pursuits brought many people into
the cities, urban problems and high crime rates persisted. Merchants, dissatisfied with the protection
afforded by the government, hired private security forces to protect their businesses.
By the 18th century, the Industrial Revolution compounded urban problems. Many citizens were forced to
carry arms for their own protection, because a strong government policing system was absent. Various
police and private security organizations did strive to reduce crime; Henry Fielding , in 1748, was
appointed magistrate, and he devised the strategy of preventing crime through police action by helping to
form the famous Bow Street Runners , the first detective unit. The merchant police were formed to protect
businesses, and the Thames River police provided protection at the docks. During this period, more than
160 crimes, including stealing food, were punishable by death. As pickpockets were being hanged, others
moved among the spectators, picking pockets.
Do you think policing and justice were impotent during the early Industrial Revolution in England? Do
you think we have a similar problem today in the United States?
Peel's Reforms
In 1829, Sir Robert Peel worked to produce the Metropolitan Police Act that resulted in a revolution in
law enforcement. Modern policing was born. Peel's innovative ideas were accepted by Parliament, and he
was selected to implement the act that established a full-time, unarmed police force with the major purpose
of patrolling London. Peel is credited also with reforming the criminal law by limiting its scope and
abolishing the death penalty for more than 100 offenses. It was hoped that such a strategy would gain
public support and respect for the police. Peel was very selective in hiring his personnel, and training was
an essential part of developing a professional police force. Peel's reforms are applicable today and include
crime prevention, the strategic deployment of police according to time and location, a command of temper
rather than violent action, record keeping, and crime news distribution.
Although Sir Robert Peel produced a revolution in law enforcement in 1829, crime and the private
security industry continued to grow.
Early America
The Europeans who colonized North America had brought with them the heritage of their mother countries,
including various customs of protection. The watchman system and collective responses remained popular.
A central fortification in populated areas provided increased security from hostile threats. As communities
expanded in size, the office of sheriff took hold in the South, whereas the functions of constable and
watchman were the norm in the Northeast. The sheriff's duties involved apprehending offenders, serving
subpoenas, and collecting taxes. Because a sheriff was paid a higher fee for collecting taxes, policing
became a lower priority. Constables performed a variety of tasks such as keeping the peace, bringing
suspects and witnesses to court, and eliminating health hazards. As in England, the watch system had its share of inefficiency, and to make matters worse, those convicted of minor crimes were sentenced to serve
time on the watch.
The watch also warned citizens of fire. In colonial towns, each home had to have two fire buckets, and
homeowners were subject to a fine if they did not respond to a fire, buckets in hand. A large fire in Boston
in 1679 prompted the establishment of the first paid fire department in North America ( Bugbee, 1978 : 5).
The Growth of Policing
The period of the middle 1800s was a turning point for both law enforcement and private security in
America, as it had been in England. Several major cities (e.g., New York, Philadelphia, San Francisco)
organized police forces, often modeled after the London Metropolitan Police. However, corruption was
widespread. Numerous urban police agencies in the Northeast received large boosts in personnel and
resources to combat the growing militancy of the labor unions in the late 1800s and early 1900s. Many of
the large urban police departments originally were formed as strikebreakers ( Holden, 1986 : 23). Federal
policing also experienced growth during this period. The U.S. Treasury had already established an
investigative unit in 1864. As in England, an increase in public police did not quell the need for private
security.
The History of Loss Prevention in a Nutshell
Loss prevention has its origin in the insurance industry. Before the Civil War, insurers gave minimal
attention to the benefits of loss prevention. For instance, in the fire insurance business, executives
generally viewed fires as good for business. Insurance rates were based on past loss experience,
premiums were paid by customers, losses were paid to unfortunate customers, and a profit was
expected by the insurer. When excessive fire losses resulted in spiraling premiums, the changing
nature of the fire insurance business created a hardship for both the insurer and the insured.
Insurance executives were forced to raise premiums to cover losses, and customers complained about
high rates. The predominance of wooden construction (even wooden chimneys) in dense urban areas
made fire insurance unaffordable for many. A serious fire peril persisted.
After the Civil War, loss prevention began to gain momentum as a way to reduce losses and
premiums. Fire insurance companies formed the National Board of Fire Underwriters, which, through
the use of engineering, investigation, research, and education, was credited with preventing losses. In
1965, the board was merged into the American Insurance Association (AIA). AIA activities have
brought about the development of the National Building Code, a model code adopted by many
municipalities to reduce fire losses.
Today, executives throughout the insurance industry view loss prevention as essential. Many insurers
have loss prevention departments to aid themselves and customers. Furthermore, customers (i.e., the
insured), to reduce premiums, have become increasingly concerned about preventing losses.
Management in many businesses instituted loss prevention strategies (e.g., fire protection). The
security department within businesses repeatedly handle these strategies, which results in an
expanded role for security. Expansion of the security function to such fields as fire protection and
safety has led to the use of the broader term loss prevention rather than security .
The Growth of Security Companies
In 1850, Allan Pinkerton , a cooper, opened a detective agency in the United States after becoming the
Chicago Police Department's first detective. Because public police were limited by geographic jurisdiction,
they were handicapped when investigating and apprehending fleeing offenders. This limitation facilitated
the growth of private security. Pinkerton (see Figure 1-1 ) and others became famous as they pursued
criminals across state boundaries throughout the country. Today, Pinkerton Service Corporation is a
subsidiary of Securitas, based in Stockholm, Sweden.
During the 1800s, because public police were limited by geographic jurisdiction and restrained from
chasing fleeing offenders, private security filled this need and became a growth industry. Courtesy: National Archives.
Figure 1-1: Major Allan Pinkerton, President Lincoln, and General John A. McClellan, Antietam, MD,
October 1862
To accompany Americans’ expansion westward during the 19th century and to ensure the safe
transportation of valuables, Henry Wells and William Fargo supplied a wide-open market by forming
Wells, Fargo & Company in 1852, opening the era of bandits accosting stagecoaches and their shotgun
riders. Wells Fargo was acquired by Burns International Services Corporation. The name Wells Fargo is
exclusive to Wells Fargo & Company, a large financial services business.
Another security entrepreneur, William Burns , first was a Secret Service agent who directed the Bureau of
Investigation that preceded the FBI. In 1910, this experienced investigator opened the William J. Burns
Detective Agency (see Figure 1-2 ), which became the investigative arm of the American Bankers
Association. Today, Burns International Services Corporation is a subsidiary of Securitas.
Figure 1-2: In 1910, William J. Burns, the foremost American investigator of his day and the first
director of the government agency that became the FBI, formed the William J. Burns Detective
Agency Washington Perry Brink , in 1859, also took advantage of the need for the safe transportation of
valuables. From freight and package delivery to the transportation of payrolls, his service required
increased protection through the years as cargo became more valuable and more vulnerable. Following
the killing of two Brink's guards during a robbery, the armored truck was initiated in 1917. Today, the
Brink's Company is a leading global security services company. It provides secure transportation services,
and it monitors home security systems.
Edwin Holmes is another historical figure in the development of private security in the United States. He
pioneered the electronic security alarm business. During 1858, Holmes had a difficult time convincing
people that an alarm would sound on the second floor of a home when a door or window was opened on
the first floor. His sales strategy was to carry door-to-door a small model of a home containing his electric
alarm system. Soon sales soared, and the first central office burglar alarm monitoring operation began.
Holmes Protection Group, Inc., was acquired by ADT Security Services, Inc., at the end of the 20th
century.
Since 1874, ADT Security Services, Inc., has been a leader in electronic security services. Originally
known as American District Telegraph, ADT has acquired numerous security companies since its
inception. Today, it is a unit of Tyco Fire and Security Services. ADT is a provider of electronic security
services (i.e., intrusion, fire protection, closed-circuit television or CCTV, access control) to millions of
commercial, federal, and residential customers.
The Wackenhut Corporation is another leader in the security industry. Founded in 1954 by George
Wackenhut , a former FBI agent, the corporation extended its services to government agencies, which
resulted in numerous contracts since its inception. The Wackenhut Corporation is the U.S.-based division
of Group 4 Securicor, located in the United Kingdom.
Railroads and Labor Unions
The history of private security businesses in the United States must include two important events of the
19th century: the growth of railroads and labor unions.
Although railroads were valuable in providing the vital East–West link that enabled the settling of the
American frontier, these powerful businesses used their domination of transportation to control several
industries, such as coal and kerosene. Farmers were especially hurt in economic terms because they had
no alternative but to pay high fees to transport their products via the railroads. The monopolistic practices
of railroads created considerable hostility; when Jesse James and other criminals robbed trains, citizens
applauded. Railroads could not rely on public police protection because of jurisdictional boundaries.
Consequently, numerous states passed laws enabling railroads to organize proprietary security forces with
full arrest powers and the authority to apprehend criminals transcending multiple jurisdictions. Railroad
police numbered 14,000 by 1914. During World War I, they were deputized by the federal government to
ensure protection of this vital transportation network.
The growth of labor unions at the end of the 19th century resulted in increased business for security firms
who acted as strikebreakers for large corporations. However, this venture proved costly. A bloody
confrontation between Pinkerton men and workers at the Carnegie steel plant in Homestead,
Pennsylvania, resulted in eight deaths (three security men and five workers). Pinkerton's security force
surrendered. The plant then was occupied by federal troops. Senate hearings followed the Homestead
disaster and "anti-Pinkertonism" laws were enacted to restrict private security. However, local and state
police forces began to emerge quickly to deal with strikers ( Shelden, 2001 : 84). Later, the Ford Motor
Company and other businesses were involved in bloody confrontations. Henry Ford had a force of about
3,500 security personnel, spies, and "sluggers" (i.e., private detectives), who were augmented by various
community groups such as the Knights of Dearborn and the Legionnaires. The negative image brought to
the public eye by newspaper coverage tarnished many businesses and security firms. Prior to World War
II, pressure from Congress, the Roosevelt Administration, labor unions, and the ACLU caused corporate
management to shift its philosophy to a softer "public relations" approach ( Shelden, 2001 : 92). The Great Wars
World Wars I and II brought about an increased need for protection in the United States. Sabotage and
espionage were serious threats. Key industries and transportation systems required expanded and
improved security. The social and political climate in the early 20th century reflected urban problems, labor
unrest, and worldwide nationalism. World War I compounded these turbulent times and people's fears.
Security became a primary concern. A combination of the "war to end all wars," Prohibition, intense labor
unrest, and the Great Depression all overtaxed public police. Private security companies helped fill the
void.
By the late 1930s, Europe was at war again, and the Japanese were expanding in the Far East. A surprise
Japanese bombing of the Pacific Fleet at Pearl Harbor in 1941 jolted the United States into World War II,
and security concerns appeared again. The United States went into full production, and protection of vital
industries became crucial, leading the federal government to bring plant security personnel into the army
as an auxiliary to military police. By the end of the war, more than 200,000 of these security workers had
been sworn in.
The Third Wave
In the decades following World War II, private security expanded even more; during the 1950s, the Korean
War and the unrelenting "cold war" created worldwide tension and competition between the democracies
and communist regimes. The Department of Defense, in 1952, strengthened the security requirements of
defense industries to protect classified information and materials. When the Soviets successfully launched
the first earth satellite (Sputnik, in 1957) and first reached the moon with an unmanned rocket (1959),
Americans were stunned. The technological race became more intense, and information protection
became more important.
The turbulent 1960s created massive social and political upheaval in the United States, and public police
forces were overwhelmed by responses to the unpopular Vietnam war; protests over the denial of civil
rights to minority groups; the assassinations of President John F. Kennedy, Senator Robert Kennedy, and
the Reverend Martin Luther King, Jr.; and rising crime and drug problems. Private security boomed.
Protests, crime, terrorism, and limited public police resources marked the 1970s, 1980s, and 1990s. By this
time, the advanced nations of the world had developed into what Alvin Toffler's (1980) The Third Wave and
John Naisbitt's (1982) Megatrends call third wave societies : societies based on information and
technology. ( First wave societies had agriculture as a foundation, and these dominated the world for
thousands of years, deriving energy from human and animal power. Offenders stole cattle, gold, and other
valuables. Second wave societies occurred during the Industrial Revolution when production was
powered by irreplaceable energy sources such as coal and oil. Criminals focused on money and booming
economic conditions.) With the depletion of world resources, the world is becoming more dependent on
technology and information; and "third wave" criminals exploit technology to commit their crimes, the extent
of which is limited only by technological innovation and the offenders’ imaginations.
"Has Cybercrime Surpassed Physical Crime?"
Gips (2006 : 24) asked the preceding question in response to an IBM survey of mostly chief information
officers. Sixty percent viewed cybercrime as more costly to their business than physical crime. Gips
notes that it is difficult to measure and compare cybercrime and physical crime because "studies that
attempt to quantify security losses across sectors and types of crime are based on extrapolation and
guesswork." He argues that the cost of physical crime in the United States easily outpaces the cost of
cybercrime. Gips refers to several sources on annual costs of crime: the FBI estimates that cybercrime
costs about $400 billion and counterfeit goods cost about $250 billion; the Association of Certified
Fraud Examiners estimates that occupational crime (e.g., altering checks, setting up fictitious
accounts) costs about $652 billion; cargo theft costs "tens of billions" of dollars according to the
International Cargo Security Council; retailers lose about $40 billion from shrinkage and inventory loss;
and physical crime losses often exclude indirect costs, such as defending and paying judgments on
lawsuits alleging negligent security. Gips concludes his arguments by noting that "if you think you are
at risk for cybercrime, that's likely where you will devote your resources. And if the risk lies elsewhere,
that could mean that the company's more costly vulnerabilities will not be adequately addressed." Convergence of IT and Physical Security
Today, the third wave is continuing with three notable occurrences affecting security. First, terminology is
changing. Examples are cybercrime and denial of service . Second, two distinct security camps have
emerged: information technology (IT) security specialists and physical security specialists. Generally, the
former possess a background geared to protect against computer-related crime and unauthorized
intrusions into IT systems, whereas the latter focus on traditional security duties (e.g., perimeter security,
access controls, and contract security forces). Third, both camps often use similar terminology and perform
similar duties. Terms common to both groups include denial of access and intrusion detection . Similar
duties can be far reaching and include investigations, information security, loss prevention, and risk
management. Jim Spencer (2000: 1-13), writing in iSecurity , adds that these two groups have their own
suppliers, consultants, publications, associations, and trade shows.
For several years, cross-training has been a buzzword for various vocations, such as for investigators and
auditors. History repeats itself and we have a need for cross-training for IT and physical security
specialists. Each specialist can assist the other with data, technologies, access controls, biometrics,
investigations, and business continuity, among other areas. Cooperative planning is essential. Suppose an
employee is fired at a company. Security officers and access control systems customarily deny the former
employee entrance to the company facility. However, today, protection requires broader applications
because of remote access to IT systems. An offender no longer has to physically trespass to steal and do
harm to an organization . We can only guess at the number of times the traditional security manager has
done an excellent job of ensuring that security officers are patrolling, physical security is operational, and
the facility is protected, except that a hacker has penetrated the corporate IT system and stolen proprietary
information or caused other harm to the business. Physical security specialists and IT specialists must
work together for comprehensive protection. As explained earlier, an executive with a title such as Vice
President of Security, Vice President of Loss Prevention, or Chief Security Officer can manage all aspects
of security (i.e., physical and digital), work to ensure organizational survival, and report to senior
executives.
Convergence of IT and physical security means that both specializations and related technologies unite
for common objectives. Efforts to secure access to databases, e-mail, and organizational intranets are
merging with access controls, fire and burglar alarm systems, and video surveillance. Physical security is
increasingly relying on IT systems and related software. Both IT systems and physical security systems
have sensors that generate data that is managed. As examples, an IT system will have an antivirus
program and a physical security system will have motion detectors.
Bernard (2007 : 475) notes that "convergence relating to security is occurring at two levels: technology and
management." At the technology level is the convergence of digital information technology with electronic
security systems. At the security management level, convergence is the integration of physical security
functions, IT security, and security risk management.
There are advantages from the convergence of IT and physical security. These include the opportunity for
security personnel to monitor physical security remotely from almost anywhere in the world, less travel time
and expenses for monitoring and investigations, and easier software upgrades. Two disadvantages are a
virus may affect physical security when sharing a single server; and an organization's bandwidth may
reach its limit from the requirements of video surveillance.
Gural (2005 : 9) cites a report from Forrester Research that shows increases in organizational spending
that brings traditional security functions—CCTV, access controls, and security officer duties—onto the
same platform as such functions as IT network access management. In addition, software is increasingly
being used for detection and response instead of relying on only personnel. Security Management (Tech
Talk, 2004 : 45) notes that as traditional physical security increasingly relies on IT systems, IT specialists in
organizations are playing a larger role in physical security decisions. IT specialists want to ensure that
physical security technology is compatible with the network and safe from virus infections and hackers.
Physical security purchasing decisions in organizations often consist of a committee of personnel from
security or loss prevention, IT, and operations. Generally, the IT department has a larger budget than the
security department, and this may increase the clout of IT in purchasing decisions. Furthermore, if IT
managers can convince senior management that cybercrime is a greater threat than physical crime, then
this also will influence the direction of the security budget ( Computer Business Review, 2006 ). Another player in corporate management change is the facility manager. This individual, often an engineer,
ensures that the company's infrastructure, which houses people and operations, functions at optimum
efficiency to support business goals. The traditional security department is likely to feel a "pull" toward IT or
the facility manager because its boundaries are dissolving as a result of information and communications
technology. The process of management is increasingly dependent on information, who controls it, what is
done with it, and its dissemination. The power of IT especially is growing ( Freeman, 2000 : 10).
There are those who may claim the demise of the traditional security manager, who will be replaced by the
IT manager or facility manager. The argument is that if an offender enters a facility and steals a computer,
this crime is minor in comparison to, say, the potential harm from a hacker accessing a company's IT
system. Such reasoning misses the broad, essential functions performed by the traditional security
manager and staff. Examples are preventing crimes against people, responding to crimes, rendering first
aid, conducting investigations, working with public police to arrest offenders, life safety, and fire protection.
At the same time, traditional security practitioners must be put on notice to become involved in lifelong
learning of IT systems, which touch all aspects of their traditional duties.
Convergence of Enterprise Security
Convergence of enterprise security refers to the merging of security functions throughout the entire
business enterprise (i.e., business organization). Research conducted by Booz Allen Hamilton (2005) for
ASIS International, and others, showed a trend of convergence of all components of security in
organizations. The research report titled Convergence of Enterprise Security Organizations explains
convergence in broad business terminology and emphasizes an enterprisewide view of risk. "Delivering on
convergence is not just about organizational integration; rather it is about integrating the security
disciplines with the business’ mission to deliver shareholder value." "To be effective this converged
approach should reach across people, processes, and technology, and enable enterprises to prevent,
detect, respond to, and recover from any type of security incident." The research report referred to an
incident at the Sumitomo Mitsui Bank in London, England, to illustrate the importance of merging security
functions throughout the entire business enterprise. Although the bank had strong IT security measures,
hackers took advantage of a lapse in physical security by posing as janitors and installing devices on
computer keyboards that permitted them to obtain valuable login information. In 2004, in only three days
the MyDoom e-mail virus caused about $22.6 billion in damages as it spread to more than 200 countries.
Besides the initial costs of such incidents, long-term harm can damage reputation and brand, and if the
incident threatens the public good, regulators may enact stricter regulations of business practices.
Surveys and interviews from the Booz Allen Hamilton research point to several internal and external drivers
that are influencing the trend in convergence. They are
◾ Rapid expansion of the enterprise ecosystem . Enterprises are becoming more complex in a
global economy of external partners.
◾ Value migration from the physical to information-based and intangible assets . Value is
continuing to shift from physical to information-based assets.
◾ New protective technologies blurring functional boundaries . Technology is causing an overlap
between physical and IT security.
◾ New compliance and regulatory regimes . Regulations are increasing in response to new
threats and business interactions.
◾ Continuing pressure to reduce cost . Enterprises are constantly striving to efficiently reduce
risk.
Many companies have two security directors, one for IT and the other for physical security. Do you
agree with this approach? Why or why not? Twenty-First Century/Post-9/11 Security Challenges
The last decade of the 20th century offered warnings of what was to come in the next century. The 1990s
brought the first bombing of the World Trade Center, the bombing of the Murrah Federal Building in
Oklahoma City, the first war with Iraq, crimes resulting from the Internet, the increased value of proprietary
information, and attention to violence in the workplace.
As we know, not long into the 21st century, on September 11, 2001, terrorists attacked the World Trade
Center and the Pentagon. Following the attacks, a crisis in confidence in government occurred. Citizens
asked: How could the most powerful nation on earth be subject to such a devastating attack? What went
wrong? Who is to blame? In response to the crisis, President George Bush declared war on terrorism. He
appointed a new Cabinet position, the Office of Homeland Defense, to coordinate counterterrorism. The
attacks also led to greater police powers for search and seizure and electronic surveillance, and the age-
old question of how to balance police powers and constitutional rights.
These bold, surprise attacks, subsequent bioterrorism (i.e., anthrax attacks through the U.S. Postal
System), the war in Afghanistan, and the second war in Iraq show the difficult challenges facing our world
in this new century. The United States and its allies are not only faced with conflict in Iraq, Afghanistan,
and other regions, but also old and emerging state competitors and the proliferation of weapons of mass
destruction.
The 21st century has also recorded huge natural disasters that—along with the problem of
terrorism—necessitate a rethinking of emergency management and business continuity. Hurricanes
Katrina and Rita, in 2005, devastated Gulf-coast states. Katrina flooded New Orleans. The December 2004
Sumatran Tsunami killed almost 300,000 people and affected 18 countries around the Indian Ocean. The
human and financial strain on nations in preparing for and responding to natural and accidental threats is
overwhelming. These challenges require global cooperation, a broad base of knowledge, skills from many
disciplines, and continued research.
From a business perspective, security and loss prevention practitioners are faced with serious challenges
and questions as they assist their employers with surviving in a constantly changing world filled with risks.
How can businesses and institutions protect employees, assets, and operations from terrorism and other
risks? What does the future hold? Who will pay for protection? Although this book offers some insight into
these questions, the answers are still being developed.
A rethinking of strategies will meet these threats. Through improved education, training, research,
professionalism, creativity, astute planning, and support from our business and government leaders,
security professionals will provide a safer environment.
Search the Web
Access the Web and seek an international perspective by visiting the New Scotland Yard, which
includes links to history: http://www.met.police.uk
Use your favorite search engines to check the sites of major security companies. For example:
http://www.pinkertons.com/
What did you learn from these sites?
Use of content on this site is subject to the restrictions set forth in the Terms of Use .
Page Layout and Design ©2017 Skillsoft Ireland Limited - All rights reserved, individual content is owned by
respective copyright holder.
Feedback | Privacy and Cookie Policy | v.4.0.78.212