Private Security Historically The Security Term Paper

Length: 3 pages Sources: 3 Subject: Criminal Justice Type: Term Paper Paper: #77318632 Related Topics: Border Security, Border Patrol, First Aid, Fire Prevention
Excerpt from Term Paper :

The Task Force Report suggested that both of these crime deterring institution work together rather than against one another (Craighead, 2003).

The primary difference between public and private security are the roles of the policing personnel. For public security the purpose is to protect the public, be it property, people, or crimes against property or people. Private security personnel's role is slightly different in that they protect the organization or property rights where assigned. These are primarily privately owned by the property or individual and may differ from public policy and procedure (Craighead, 2003).

Factors affecting the Growth of Private Security

The factors and level of training for security personnel has evolved significantly from those basically walking the perimeter and reporting disturbances. Today private property requires protection in many industries such as banking, medical, chemical, technological, manufacturing, even retailers and small businesses need security protection. The required security today includes to operating highly sophisticated surveillance equipment such as cameras, gates, fire prevention, loss prevention, asset protection, disaster recovery, intellectual property and many additional areas of specialization.

The number of security personnel is nearly two million today while the police force nationwide is approximately 600,000 (Ortmeier, 2009). The private justice system have established the crime and punishment parameters for offences in the private sector (Schmalleger, 2008). The number of jobs that have evolved as a result of the increase of security needs in recent years present unique and lucrative opportunities, especially since the terrorists attacks of 9/11 (Ortmeier, 2009). There are many schools that offer security training throughout the U.S....


Standard training requirements include courses on legalities such as power and authority of security officers or guards. Emergency procedural training in fire safety, CPR, First Aid, and Building Evacuation/Security, Weapons training and certifications, Legal Uses of Firearm, Handling of Firearm, Marksman training for specialized positions, as well as safety and care of firearms. There is also continuing educational certifications that must be completed each year dependent on the type of security service assigned (N.Y. Department of Justice, 2012).

Private Security Growth and Licensing

At the turn of the century the private security forces were used to track criminals, gangsters, and mobsters. Prior to federal agencies being established in law enforcement. The railroad transportation between states was protected by security forces such as Pinkerton in addition to shipments to banks and other businesses that were often targeted by crime elements ( . However once federal agencies such as the FBI were established these jobs were no longer necessary for security agencies. Yet by this time the industry had developed to the point of needed regulation and licensing as many detectives, guards, and armed security bounty hunters and body guards were already working for various businesses.

The development of the Federal Bureau of Security and Investigative Services became the official regulator of all security related licensing. The following chronology lists the various regulatory requirements and agencies involved in the security professions expansion. Today's professional private security force should be aware of these important milestones in order to ensure proper licensing for specific security professions.

Security Professions Regulatory History

1915 California license and regulation of private detectives with the Administration State Board Prison Directorship.

1943 a new specialized category, Private Patrol Operator added to Private Investigation Act.

1949 Repossess agencies are put into the license category beneath Collection Agency Act.

1950 Detective License Act renamed Private Investigator and Adjuster Act.

1959 Repossess agencies, regulated by Collection Agency Act, are now under the Private Investigator Act

1973 the Bureau of Collection and Investigative Service is federally mandated to register all uniformed employees that are Private Patrol Operators.

1974 the firearm program is developed which requires applicants to have exposed weapon permit and complete Bureau-approved training.

1977 Alarm firms and workers require licensing.

1981 Repossession workers require licensing.

1986 Locksmiths workers are require registration with the Bureau.

1993 the Locksmith Act is revised and require separate license for both locksmith companies and employees.

(Bureau of Security and Investigative Services, 2012).


Bureau of Security and Investigative Services (2012). A brief history. Retrieved March 25, 2012 from

Craighead, G. (2003). High rise security and fire life safety. Rothstein Assoc.

Cunningham, W.C, Strauchs, J.J, Van Meter, C.W. (1990). Private security trends: hallcrest reports. . 106. Ibid., p. 2. 107


Sources Used in Documents:


Bureau of Security and Investigative Services (2012). A brief history. Retrieved March 25, 2012 from

Craighead, G. (2003). High rise security and fire life safety. Rothstein Assoc.

Cunningham, W.C, Strauchs, J.J, Van Meter, C.W. (1990). Private security trends: hallcrest reports. . 106. Ibid., p. 2. 107

, P., J. (2009). Introduction to security. Pearson Education. 3rd Edition.

Cite this Document:

"Private Security Historically The Security" (2012, March 28) Retrieved September 18, 2021, from

"Private Security Historically The Security" 28 March 2012. Web.18 September. 2021. <>

"Private Security Historically The Security", 28 March 2012, Accessed.18 September. 2021,

Purpose of

The documents we provide are to be used as a sample, template, outline, guideline in helping you write your own paper, not to be used for academic credit. All users must abide by our "Student Honor Code" or you will be restricted access to our website.

Related Documents
Security Training and Management
Words: 592 Length: 2 Pages Topic: Safety Paper #: 20686310

Q1. What appears to be the main emphasis on the 8-hour pre-assignment training course proposed by the Task Force on Private Security? What is the reasoning behind pre-assignment training? Three decades later are those educational goals still relevant? Although some employers combine basic security training with pre-assignment training and only provide the minimum number of hours required by law, the overall trend within the field has been to increase the number

Security Public or Private Good Analysis Using Commercial Satellite...
Words: 1061 Length: 3 Pages Topic: Government Paper #: 90556341

Security Public or Private Critical Analysis of article "Security:Public or Private Good-Analysis using commercial satellite" Produced water treatment and re-injection in oil reservoir for Zubair field The Origin of Produced Water The Produced Water Composition Produced Water Impact on The Environment Produced Water Management and International Agreements Critical Analysis of article "Security: Public or Private Good-Analysis using commercial satellite" Issue been Addressed The article "Security: Public or Private Good-Analysis using commercial satellite" addresses the issue of security and how

Security Issues of Online Communities
Words: 15576 Length: 60 Pages Topic: Education - Computers Paper #: 35642606

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Private Cloud RFID and Data Warehousing Technology in a Retail Firm...
Words: 1736 Length: 7 Pages Topic: Information Technology Paper #: 28214834

Data Warehousing and Mobile Computing Walmart is the largest company in the world with the estimated one million customers every hour and more than 100 million customers every week. A large number of customer and gigantic supply chain make the company start using the RFID system to track moving items and manage the supply chains. However, the RFID produces gigantic datasets, which may be challenging to store in the relational database.

Role of Private Investment on
Words: 14411 Length: 40 Pages Topic: Economics Paper #: 672069

This also implies inadequacies in fiscal sustainability, which influences investments in private sectors. The second channel happens through the level, composition and quality involved within the public investment, which shows the level at which the public investment replaces the private investments (Schmidt- Hebbel, Serven, & Solimano, 1996). The final channel regards the level of taxation on the corporate earnings and the rules applicable in depreciations. There have been arguments that fiscal policy

Social Security Today
Words: 2395 Length: 6 Pages Topic: Economics Paper #: 78436491

Social Security Today The History of Social Security: What it is and How it Works The Social Security system was established in 1935 by President Roosevelt in order to provide some form of economic security to the elderly. The first world war and the following world wide economic depression had left many elderly people without a support system. This insecurity, along with the general economic turmoil of the era, led to many