Private Security Functions as it Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:

GIS and mapping software, once available only to agencies possessing mainframe computers, can now be easily loaded on the laptops carried in patrol vehicles and therefore can be used by even small and budget-constrained police departments. The innovations demanded by community and problem-oriented policing require that departments incorporate a geographic, spatial, or local focus, and emphasize the importance of integrating crime-mapping techniques into departmental management, analysis, and enforcement practices." (2006) What is needed, according to the work of Kehoe is 'standardization' insofar as the technology used in law enforcement and private security so as to enable more integration and coordination between the two entities. The tools which Kehoe includes in the foregoing list are not an exhaustive list whatsoever.

The work of Ashley Paul Moore entitled: "First Responder Accreditation: The Pros and the Cons" states that there has been a debate among members of Congress as to whether there is an existing need for establishment of "a comprehensive set of national standards to regulate state and local terrorism preparedness programs." (2006) Those who support these federally supported standards believe that there could be significant improvement of the capacity of the first-responder community in the United States in countering a terrorist attack that involved "chemical, biological, radiological, nuclear, and/or improvised high-yield explosive (CBRNE) weapons. It is related in the work of Kehoe (2006) that cities all across the United States are presently working on "various stages of implementing GIS projects related to the engineering, planning and zoning particulars as well as the general infrastructure of their own communities." (2006) Today's law enforcement agencies can look to the resources in information available "to power such programs as Community Policing Beat Book, which is a free program that the National Institute for Justice has funded that provides practical mapping information. " (Ibid)


Imagine, if you will, for a moment that a disaster occurred in a town very familiar, a community, whether urban or rural, where in past local occurrences each agency went about its' appointed duty without interrupting one another, and this has traditionally been the case in the United States. Then suddenly a disaster such as Hurricane Katrina in New Orleans occurs and the new agencies developed by Homeland Security come into the area and communication channels get crossed with tasks being duplicated and others being left undone, neglected perhaps. Strategies that can be shared, integrated and coordination through use of technological tools offer the possibility for unprecedented coordination among law-enforcement, private security and public service providers in the event of such a catastrophe or disaster. Because of the capacity for improved logistics and increased effectiveness, standardization is critical in this pursuit. This could well be through networking of cell-phones, with laptops, blackberry devices and onboard computers in mobile vehicles of any of those stated.

Standardization of law-enforcement and private security procedures and the communication protocol used must necessarily be integrated if these agencies are to rise to the challenges that present in the future of the tasks associated with law-enforcement and private security function and duties. This could well be a project assigned to local FEMA office, presently Civil Defense in each individual county within a U.S. state so that these initiatives could be built up county-by-county and state-by-state toward a rising to compliance with a fifteen year integration effort. The outcome has the potential to be a tightly networked unit of protection for all community, country, regional, state sectors within the United States. This avoids confusion, duplication of duties, misassignment of duties, misapplication of duties, and neglect of duties in the future of law-enforcement and private security workers.


Kehoe, Jay (2006) GIS Solutions for Medium and Small Law-Enforcement Agencies - T.I.P.S. Total Integrated Preparedness Solutions 23 February 2005. online available at

Moore, Ashley Paul (2006) First Responder Accreditation: The Pros and the Cons - GIS Solutions for Medium and Small Law-Enforcement Agencies - T.I.P.S. Total Integrated Preparedness Solutions 23 February 2005. online available at

Working with Law Enforcement to Abate Cybercrime: Cyber Security Guidelines (2006) Commission of the Europeans Communities 9 Jan 2006. Presented at Brussels. Online available at

Private Security Functions as it Relates…[continue]

Some Sources Used in Document:


Cite This Term Paper:

"Private Security Functions As It" (2007, July 14) Retrieved December 6, 2016, from

"Private Security Functions As It" 14 July 2007. Web.6 December. 2016. <>

"Private Security Functions As It", 14 July 2007, Accessed.6 December. 2016,

Other Documents Pertaining To This Topic

  • Private Security Project One Was

    How could such concerns be addressed? Any concerns that do arise should be addressed in a manner according to council. With the proper authorities delegating the new policies, addressing concerns, whether they be from lower personnel or upper management, they will have the opportunity to unveil the oppositions that may hinder the operation of new policies. How would transferring certain functions affect service delivery and public opinion? Transferring certain functions, such

  • Private Security After 911 the

    Even perimeter security is in question. The GAO surmised that perimeter security at airports may be insufficient to provide effective security. The TSA has begun efforts to evaluate the effectiveness of security related technologies. These include items such as biometric identification systems, but the TSA still has failed to develop a plan that will guide airports when technology enhancements are developed. The TSA has pursued the procurement of checkpoint technologies

  • Private Security Public or Private

    One big cause for the demand on modern hyper security is that a lot of cool stuffs are becoming easily available. Developments in computers have made programming robots easy for non-experts. Security systems can be toggled to holiday mode with a touch of a button to mechanically show the previous two weeks' lighting and curtain movements, showing the existence of owners. Paul Rose, director of U.K. based security firm

  • Private Military Contractors Private Security

    During times where they are not needed, this would be a waste of resources. Instead, a PMC is there when the military needs it, and when the mission is over, the military no longer has to spend resources to maintain their personnel. Another benefit, although this is also the source of many ethical challenges as will be discussed later, is a PMC's ability to operate more freely than a state's

  • Private Security and Patriot Act

    Sikhs are also mistakenly included since police are unable to detect the difference. (District of Columbia, Maryland, and Virginia Advisory Committees to the U.S. Commission on Civil Rights, 2003) a lot of people are being arrested on very technical immigration infringements of visa, and immigration judges will never let go an individual till the FBI articulates a curiosity in that particular person. For instance, on one occasion a student

  • Public and Private Policing Functions

    The private security field also underwent significant reforms in connection with the qualifications, training, and (especially) vetting of employment candidates as well Ortmeier, 2009). Ironically, instead of recognizing the comprehensive improvement throughout the private security industry after 2001, many police personnel intensified their pre-existing disdain for all non-sworn security professionals instead (Dalton, 2003). The Conceptual Significance of Public and Private Spaces One of the worst consequences of the antagonism on the part

  • Rise of Private Security in Surveillance and Undercover Services

    Private Security Threats: Terrorist Profiling Security is an invaluable asset to the society. The U.S. government has instituted various measures aimed at bolstering the security of its citizens and ensuring that they are comfortable in whatever they are doing. Oftentimes, the government has to outsource of the services to private entities. Some individuals also contract private entities because they consider them as effective and efficient in terms of services delivery

Read Full Term Paper
Copyright 2016 . All Rights Reserved