1 / 20

Good evening!

Good evening!. I’ll be right back… CJ180 will begin at 10pm ET/9pm CT/8pm MT/7pm PT…. Unit 1 Assignments. Discussion 20 points 2 Discussion questions Seminar 20 points Quiz 20 points Did you get all 3 assignments completed ?

zamora
Download Presentation

Good evening!

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Good evening! • I’ll be right back… • CJ180 will begin at 10pm ET/9pm CT/8pm MT/7pm PT…

  2. Unit 1 Assignments • Discussion 20 points • 2 Discussion questions • Seminar 20 points • Quiz 20 points • Didyouget all 3 assignmentscompleted? If not, please do so ASAP-you can still submit them for credit.

  3. Unit 2 Assignments • Discussion 20 points • 2 discussion questions • Seminar 20 points • Learning Activity 120 points

  4. Unit 2 Learning Activity • Evolution of Private Security • Write a 2 to 3 page paper (excluding cover page) responding to the following: • Describe the evolution of private security. • Address how World War II had a major influence on the growth of the private security industry.

  5. Unit 2 Learning Activity, cont. • PLEASE NOTE: This essay may require outside research • The paper should contain a cover page and a list of references in APA format (reference page). • All internal citation of outside sources plus the listing of all references should also adhere to APA format. • All text pages should be double-spaced and in 12-point font (Arial, Times New Roman, Courier New).

  6. History of security • English feudalism. . . • What is it? • Statute of Winchester • Huh?

  7. Feudalism • Simplified: • Agreement whereby the king gives land to subjects who agree to protect the land (and country) if necessary

  8. Statute of Winchester • Simplified: • Each hundred (district) was responsible for unsolved crimes and each man was to keep arms to take part in the ‘hue and cry’ when necessary • What is the ‘hue and cry’? • Process by which bystanders are summoned to assist in the apprehension of a criminal who has been witnessed in the act of committing a crime

  9. Statute of Winchester, cont. • What does this part of the Statute of Winchester 1285 remind you of? • Moreover, it is commanded that every man shall have in his house arms for keeping the peace according to the ancient assize

  10. In America… • Alan Pinkerton • Who was he? • Why is he important?

  11. 9/11/01 • What is the significance of the date 9/11/01? • What governmental department/cabinet position was created in response to 9/11?

  12. 9/11/01 • Significance: Terrorist attacks on WTC, Pentagon and White House (potential)-plane taken down by passengers • Department of Homeland Security created in response to those attacks

  13. Department of Homeland Security • Secretary Janet Napolitano • 3rd Secretary in history if DHS • 1st Tom Ridge • Acting James Loy • 2nd Michael Chertoff • Where does the Secretary of Homeland Security fall in the line of succession to the Presidency?

  14. Dept. of Homeland Security • Department Components (best known) • Transportation Security Administration (TSA) • Border Patrol (CBP) • Immigration and Customs Enforcement (ICE) • United States Coast Guard (USCG) • Federal Emergency Management Agency (FEMA) • United States Secret Service (USSS)

  15. Types of Security • What are the 3 types of security services mentioned in Unit 2?

  16. 3 types of security services • Contract • Proprietary • Hybrid

  17. Contract Security • Those operations provided by a professional security company which contracts its services to a company

  18. Proprietary Security • Those that are “in-house” or controlled entirely by the company establishing security for its operations

  19. Hybrid Security • Although contract and proprietary security operations will be around for many years, the future rests in “outsourcing” some of the security operations while maintaining proprietary control over security management

  20. That’s all folks… • Thanks for a great seminar, everyone! • If you don’t have any questions, you are free to leave. • I will stay online to answer questions if you have any. • Have a great night, and great week! • Good night!

More Related