The Private Security Industry: a Review of the Definitions, Available Data Sources, and Paths Moving Forward

The Private Security Industry: a Review of the Definitions, Available Data Sources, and Paths Moving Forward

The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: The Private Security Industry: A Review of the Definitions, Available Data Sources, and Paths Moving Forward Author: Kevin Strom, PhD; Marcus Berzofsky, MS; Bonnie Shook-Sa, MAS; Kelle Barrick, PhD; Crystal Daye, MPA; Nicole Horstmann, BS; Susan Kinsey, BS Document No.: 232781 Date Received: December 2010 Award Number: 2009–BJ–CX–K045 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. RTI Project Number 0212315.001.001 The Private Security Industry: A Review of the Definitions, Available Data Sources, and Paths Moving Forward Literature Review and Secondary Data Analysis Prepared by Kevin Strom, PhD Marcus Berzofsky, MS Bonnie Shook-Sa, MAS Kelle Barrick, PhD Crystal Daye, MPA Nicole Horstmann, BS Susan Kinsey, BS RTI International 3040 Cornwallis Road Research Triangle Park, NC 27709 This document was prepared by RTI International under Cooperative Agreement Number 2009–BJ–CX–K045 from the Bureau of Justice Statistics (BJS). Lynn Langton and Brian Reaves, BJS Statisticians, were the program managers. The Bureau of Justice Statistics (BJS) is a component of the Office of Justice Programs. BJS is an official statistical agency of the U.S. government. The Office of Justice Programs also includes the Bureau of Justice Assistance; the Office of Juvenile Justice and Delinquency Prevention; the Community Capacity Development Office; the National Institute of Justice; the Office for Victims of Crime; and the Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering, and Tracking (SMART). This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Contents Section Page 1. Executive Summary 1-1 2. Background 2-1 2.1 Defining Private Security ........................................................................... 2-2 2.2 Structure of the Industry ........................................................................... 2-3 2.2.1 Distinctions Between Contract and Proprietary Security ....................... 2-4 2.2.2 Types of Security ........................................................................... 2-4 3. Overview of Secondary Data Sources and Survey Methodologies 3-1 3.1 Sources of Secondary Data ........................................................................ 3-1 3.1.1 Survey Methodologies Used by Secondary Data Sources ..................... 3-6 4. Trends and Employee Characteristics in Private Security 4-1 4.1 Private Security Contract Firms .................................................................. 4-1 4.2 Private Security Employment ..................................................................... 4-3 4.3 Services Performed by Private Security Organizations ................................... 4-6 4.3.1 Guard Services .............................................................................. 4-8 4.3.2 Alarm Monitoring ............................................................................ 4-9 4.3.3 Investigation ................................................................................. 4-9 4.3.4 Armored Transport ......................................................................... 4-9 4.3.5 Correctional Facilities Management ................................................. 4-10 4.3.6 Systems Integration and Management ............................................ 4-10 4.3.7 Security Consulting ...................................................................... 4-11 4.3.8 Pre-Employment Screening ........................................................... 4-11 4.3.9 Information Technology Security .................................................... 4-11 4.4 Markets for Private Security ..................................................................... 4-11 4.4.1 Critical Infrastructure.................................................................... 4-13 4.4.2 Commercial ................................................................................. 4-14 4.4.3 Institutional ................................................................................. 4-14 4.4.4 Residential .................................................................................. 4-15 4.4.5 Government ................................................................................ 4-15 4.5 Demographics ........................................................................................ 4-15 4.6 Revenue ............................................................................................... 4-21 iii This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. 4.7 Expenditures ......................................................................................... 4-24 5. The Relationship between Private Security and Law Enforcement 5-1 5.1 History of Collaboration: Private Security and Law Enforcement ..................... 5-2 5.2 Issues and Challenges for Cooperation ........................................................ 5-5 5.3 Private Security–Law Enforcement Partnerships ........................................... 5-6 5.4 Private Security‘s Policing Roles and Powers ................................................ 5-7 5.4.1 Officers Moonlighting in Private Security.......................................... 5-10 6. Regulation and Training of Private Security Sectors 6-1 6.1 Legislation ............................................................................................... 6-1 6.2 Licensure and Certification ........................................................................ 6-1 6.3 Hiring and Background Check Practices ....................................................... 6-7 6.4 Training for Private Security ...................................................................... 6-8 7. Safety 7-1 8. Conclusion 8-1 References R-1 iv This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Figures Number Page 1. Distribution of Company Security Functions Between Internal and External Providers, 2005 ............................................................................................. 2-5 2. Number of Contract Security Firms in the United States by Data Source, 1967–2009 ................................................................................................... 4-2 3. Distribution of Establishments and Employees by Size of Firm (Number of Employees) .................................................................................................. 4-3 4. Total Number of Private Security Officers and Contract Security Officers in the United States by Data Source, 1980–2009 ....................................................... 4-4 5. Percentage of Private Security Officers Who Work Part Time, 1969–2008 ............. 4-6 6. Percentage of Companies Outsourcing Security Services by type of Service, 2005 ............................................................................................................ 4-7 7. Percentage of Companies That Have Purchased or Plan to Purchase Security- Related Technology, 2005 .............................................................................. 4-8 8. Number of Proprietary Security Officers per Employee by Industry Sector, 2009 .......................................................................................................... 4-12 9. Number of Employees per Security Officer by Industry Sector, 2009 .................. 4-13 10. Distribution of Security Officers by Race, 2008 ................................................ 4-16 11. Distribution of Security Officers by Highest Level of Education Obtained, 2008 .... 4-17 12. Percentage of Total Private Security Officers and Contract Security Officers Who Are Female, 2003–2008 ........................................................................ 4-18 13. Median Hourly Wage by Data Source, 1997–2008 ............................................ 4-19 14. Median Hourly Wage by Gender, 2003–2008 ................................................... 4-20 15. Annual Revenue Earned Among Contract Security Firms by Data Source (in Billions), 1980–2009 .................................................................................... 4-22 16. Average Annual Revenue per Contract Security Firm by Data Source (in Thousands), 1980–2009 ............................................................................... 4-23 17. Annual Revenue (in millions) by Largest Contract Security Firms, 2003 .............. 4-24 18. Spending on Security as a Percentage of Revenue

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    98 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us