Verified Document

Art And Science Of Protection Research Paper

¶ … Protection Discipline The art and science of protection has evolved and transformed over the past decades where new levels of its requirements are in high demand. This structural shift in the needs for protection have also created the environment where stark contrasts between approaches and industry becomes rather evident. These noticeable differences need to be addressed in order to successfully and truly understand how this process can be maximized for effectiveness, efficiency and economics.

The purpose of this essay is to highlight and describe the different requirements, limits of authority, limits of force, material assets, ethics and best practices of three differing and distinct realms of protection. The essay will first examine physical protection be highlighting aspects of its use in the U.S. Federal Government. The essay will then explain information protection highlighted how the U.S. Military uses this type of protection and how it is reflected in their practices. This type of protection revolves around the idea of national resource protection. Finally this essay will discuss how the private individual or corporation demonstrates transoport protection and the circumstances in which it is used.

The essay will ultimately argue that protection itself is dependent upon the relative situation and the overall strategic aims of the organization that is practicing these protection services. This idea is center to the difference of qualities and requirements that are used to value and judge the impact of the protection services that are being demonstrated in all three of these very important arenas.

Demonstrating Physical Protection

Aspects of Physical Security

Physical security requires the building or critical thing being protected be secure from outside forces and dangers. Securing a building requires a deep knowledge of physical security aspects of protective security. Security forces that take posts on buildings or critical sites need to be aligned with overall strategic aims of the protective effort. In other words, advanced analysis and intelligence must be incorporated with security event. Risk analysis is an important aspect of physical security and the proper analysis requires that risks are put in their proper perspective. Furthermore, security agents working the job, must be aligned to these intentions.

Many times physical security may not be pleasing to the eye and there may be some backlash from key players within the decision making process. It is important to prioritize the right risk and placing aesthetics over security is not necessarily a good idea. In addition, all entrances to a building or critical sight must be secured. These openings are key to the actual security of the building. These key points must be accounted for in the larger scheme of any physical security scheme.

Once security standards have been put into place it is necessary for management and those who believe they are above the rules to ignore certain physical security measures. This can be exemplified in TSA lines in Federally controlled airports. This can be a mistake and allowing certain privileged people to ignore security standards creates a poor precedent and reveals many weak spots of the security plan. IDs and badges are a must to gain entrance and exit to any critical sight or building that requires physical security.

Mastering the technology is important for any physical security effort to be successful in the long run. Secret service agents must be proficient at their weapons and the computer and IT professionals working in other aspects of physical security must also be prudently trained on their technological aspects to the jobs they perform. A piece of technology becomes a burden if it is not purposefully employed in any effective or efficient means. The best approach is to keep things simple as possible and let the truth ring out.

Ethics and Mission

The act of physical protection requires training, safety and solid leadership. Those doing the protecting must be highly conditioned to ignore their own personal well being and safety for another person. This type of behavior must be molded and conditioned within the secret service and other agencies, so the agent thinks about the asset first and his own self-protection second. This type of duty suggests that those in the physical protection environment at the U.S. government level have been programmed to follow orders without question and provide useful and practical human chattel to manipulate and coerce as those who see fit wish to do.

Agency Applications

Physical security is exemplified by the U.S. Department of Homeland security. The materialistic world view that understands the nation's most valuable materialistic and physical objects are to be protected. Physical security trumps emotional and intellectual...

Physical security is emphasized in this area by the DHS as demonstrated by their organizational leader sip and their policies.
The DHS is home to the Federal Protective Service. According to the DHS's website, "The Federal Protective Service protects Federal Facilities, their occupants, and visitors by providing superior law enforcement and protective security services and leveraging our access to the intelligence and information resources of our network of federal, state, local, tribal, territorial, and private sector partners. From our frontline law enforcement and security personnel to those who support the operations of the Service, we approach our mission as one team. Every day we protect the homeland by managing risk and ensuring continuity for one of the most crucial elements of our national critical infrastructure -- the people and our nation's Federal Facilities."

The FPS has enormous mission and may be too much to handle in the way it is currently being run. The FPS has more than 1400 employees who help oversee nearly 15000 private security personnel. "In the most recent GAO report in May, the agency said an official from one of the Federal Protective Service's contract guard companies had reported that about 38% of its 350 guards never received mandatory screener training. Without ensuring that all guards receive training on how to respond to active-shooter incidents at federal facilities, FPS has limited assurance that its guards are prepared for this threat." (Markon, 2014). The Federal Government may have overreached its ability to protect so many of its perceived assets. Perhaps the problem lies in the value assessing process. Some things may not need protection.

The Secret Service, is another representation of how physical protective services are explicitly demonstrated at the U.S. Federal Government. This agency has been installed since the President McKinley assignation in 1901. This organization represents the more traditional role of protective services as its scope of duties also encompasses law enforcement investigations. According to its website " applicants should have either a four-year college degree or a combination of education and criminal investigative experience, be in good physical condition, and have a record that is clear of criminal behavior. All new agents spend 11 weeks in Glynco, Georgia, at the Federal Law Enforcement Training Center, where they are taught basic police skills. These basic skills include law, firearms training, defensive tactics and report writing. After completing the first school, all Secret Service agents come to Washington, D.C., where they undergo 16 additional weeks of training. " The secret service was authorized by law 18 USC 3056 to protect the important leaders of our country and of our allies.

The scope and power of the U.S. Federal Government lies in the consent it is given by its constituents. The need for protective services in all shapes and forms can be delivered by the U.S. Federal Government if the public mandates such action. It is important to remember that consent and balance are needed in order for protective services to be effective at such a widespread level. The millions and millions of people under the protection of the U.S. Federal Government appears in many ways that are distinct and unique.

Information Security

Protecting Information

It seems that a wide range of ideas related to the creation of security of information. Protecting information may mean many things to many different people, as the definition of information is quite vague in many ways. The digitization of information also makes the protection of it that much harder. Cyberspace is not a reality we can sense without a tool, and makes the protecting of this area very challenging if not impossible.

Saltzer & Shroeder (1975) suggested "Many different designs have been proposed and mechanisms implemented for protecting information in computer systems. One reason for differences among protection schemes is their different functional properties -- the kinds of access control that can be expressed naturally and enforced. It is convenient to divide protection schemes according to their functional properties. One should recognize that concentration on protection and authentication mechanisms provides a narrow view of information security, and that a narrow view is dangerous. The objective of a secure system is to prevent all unauthorized use of information, a negative kind of requirement. It is hard to prove that this negative requirement has been achieved, for one must demonstrate that every possible threat has been anticipated. "

Information protection within the cloud has become a new challenge as well. Chen & Zhao (2012)…

Sources used in this document:
References

Chen, D., & Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol. 1, pp. 647-651). IEEE.

Gordon, P. (2013). What to Expect when Force Protection Conditions Change. U.S. NAVY.Mil, Navy Public Release, 21 Feb 2013. Retrieved from http://www.navy.mil/submit/display.asp?story_id=72213

Hertig, C. (2001). The Evolving Role of Protection Officers. Security Solutions, 1 Nov, 2001. Retrieved from http://securitysolutions.com/mag/security_evolving_role_protection/

Markon, J. (2014). Can the Federal Protective Service meet new demands for heightened security? The Washington Post, 30 Oct 2014. Retrieved from http://www.washingtonpost.com/blogs/federal-eye/wp/2014/10/30/can-the-federal- protective-service-meet-new-demands-for-heightened-security/
McNally, S. (2012). The Evolution and Importance of the Private Security Sector. AMU Security Info, 24 May 2012. Retrieved from http://amusecurityinfo.com/the-evolution-and- importance-of-the-private-security-sector/
US Army Criminal Investigation Command (nd). U.S. Army Protective Services Battalion. Viewed 6 April 2015. Retrieved from http://www.cid.army.mil/psb.html
US Department of Homeland Security (nd). The Federal Protective Service. Viewed 5 April 2015. Retrieved from https://www.dhs.gov/topic/federal-protective-service
US Secret Service (nd). Protective Mission. Viewed 5 April 2015. Retrieved from http://www.secretservice.gov/protection.shtml
Cite this Document:
Copy Bibliography Citation

Related Documents

Science and Western Civilization Part a Paleolithic
Words: 674 Length: 2 Document Type: Essay

Science and Western Civilization Part a Paleolithic Era (Old Stone Age): 135,000 years ago The culture and society of the Paleolithic Era was based on hunter-gathering. This is when men and women worked together to survive by foraging for food. The way that this was accomplished was through a nomadic existence. In most places, different groups of people would follow the migration patterns of animals (by constantly moving around). (McClellan, 2006, pp.

Science Vs. Policy
Words: 673 Length: 2 Document Type: Term Paper

Science vs. Policy Scientific policy issues are formulated by the Congress, the Office of the President, relevant Government Departments and Agencies, and non-governmental organizations. Science plays an integral part in the lives of the citizens of the United States. A testament to this is the resolve by the United States government to institute institutions like the United States Environmental Protection Agency-EPA. EPA makes regulatory decisions that touch on environmental issues. It

Science Fiction & Feminism Sci-Fi & Feminism
Words: 13761 Length: 50 Document Type: Chapter

SCIENCE FICTION & FEMINISM Sci-Fi & Feminism Origins & Evolution of Science Fiction As with most things including literature, science fiction has progressed and changed a lot over the years. Many works of science fiction were simply rough copies and following the altready-established patterns of prior authors. However, there has always been authors and creators that push the envelope and forge new questions and storylines that have not been realized or conceptualized before.

Protection in the Cloud
Words: 1377 Length: 4 Document Type: Case Study

Virtual Security Issues Many of the challenges in managing a virtualization security upgrade project revolves around the communication between members of an organization. The means or tools that communication efforts are based upon make no difference as long as there is a shared and accepted policy that is agreed upon between those who need to communicate. During times of transition, communication must remain in extra clear terms as the stress associated

Analyzing Art and Death the Chinese
Words: 1359 Length: 4 Document Type: Research Paper

Art and Death: The Chinese Portraying death to children In the preschool age, educators seldom broach the topic of death. However, some picture books for kids directly address death and related issues. Their current approach is worth utilizing as reference. Book presentations follow the steps: comprehending death with preschoolers' internal experiences, slowly probing into what death means in the eyes of preschoolers, and expanding on the subject by seeking the continuance of

Geography of Martial Arts
Words: 4700 Length: 15 Document Type: Capstone Project

Martial Arts can be defined as a system organized into a code or it may be termed as the customs that revolve around practices that may give rise to conflict. This art is used by people for a number of reasons such as safety, championship, physical up gradation subliminal and divine development (Clements, 2006). People hold completely different perspectives towards the idea of Martial arts. A large number of people consider

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now