CRIMJ304:

Lesson 1: The History and Development of Security

Lesson Overview (1 of 5)
Lesson Overview

Introduction

Lesson Overview

The purpose of this lesson is to introduce you to the long history of security, and how, through the ages, that history has shaped the development of the private security profession. To begin, the chapter defines security, which is followed by a discussion of how early societies sought to achieve individual (for self) and collective (for the community) security. Following this, the lesson provides a detailed description of the foundations of the private security profession in America. On the whole, this lesson is critical for understanding the connections between the origins of the need for security and the ways in which the security profession has matured. The discussion highlights the fact that security remains a key element of one's quality of life as highlighted in Maslow's well-known "Hierarchy of Needs," in which security is presented as the second layer of his pyramid (See Figure 1.1). In fact, in post-9/11, national security or homeland security represents one of the most pressing concerns of the 21st century. This, too, will be highlighted in the course.

Please click on each layer of the pyramid to reveal a description of each level of need.
Self actualizing needs
The highest level of needs is concerned with self-awareness, personal growth and reaching one's full potential.
Esteem needs
Include the need to feel good about oneself, a sense of personal worth and have social recognition and success.
Social needs
Include the needs for belonging, love, and affection.
Security needs
These needs are important for survival, but unlike the basic needs, one can physically survive without. These needs include a home, safe environment, steady employment, and health insurance.
Physiological needs
The most basic needs of air, food, water, and sleep. All other needs are secondary to these basic and instinctual needs.
Figure 1.1 Maslow's pyramid

Lesson Objectives

By the end of this lesson, you should be able to:

Please complete readings and assignments as listed on the course schedule.

What is Security? And what are its origins? (2 of 5)
What is Security? And what are its origins?

What is Security? And What Are Its Origins?

Security can be defined in a variety of ways, but one very good definition of it is provided by Fischer and Green (1998): "Security (italics in original) implies a stable, relatively predictable environment in which an individual or group may pursue its ends without disruption or harm and without fear of disturbance or injury" (p. 3). For thousands of years, individuals and societies have pursued security, which has been accomplished in a variety of ways. In addition, security has taken on both public and private forms. Charles Reith provides the following four phases that illustrate the development of security concerns:

caveman

Figure 1.2 Caveman Protecting his home

Among the variety of measures used to ensure security, Hess and Wrobleski (1996) aptly point out that rulers used "weapons, lakes or cliff dwellings, walls and gates." Thus, they made use of the natural and enhanced landscape to ensure their security. In ancient times people such as the Sumerians made use of private security forces and bodyguards to provide security. Fortresses were also popular in ancient times. The Great Wall of China, for example, was built between 220 BC and 200 BC. It was build to protect the Chinese from their enemies. Built of earth, stones, wood, and later, bricks, it stretches 4,000 miles and has walls over twenty feet high, to go along with a walkway that is more than fifteen feet wide. Besides the wall itself, an additional security feature was watch towers. These towers were used to "store weapons, house troops, and send smoke signals" (Wikipedia, 2007).

figure 1.3

Figure 1.3 Great Wall, Watch Tower, Castle, and Fort

The Egyptians used intricate tombs to provide security for the treasures often buried with Pharaohs. Of these, Tutankhamen's, whose treasures have been part of a global tour for the past few decades, is the most famous one. Figure 1.4 illustrates the interior structure of King Tut's tomb. The figure reveals that while robbers did penetrate the tomb at various points in antiquity, the design of the tomb successfully kept them from reaching the treasury.

KingTut

Figure 1.4 Interior Structure of King Tut's Tomb

Knowledge Base (3 of 5)
Knowledge Base

Knowledge Base

reading assignment Reading

  1. The assigned reading is Chapter 1 in the Dempsey's Introduction to Private Security.
     
  2. Download and review the PowerPoint slides for Chapter 1.  
Learning Activity (4 of 5)
Learning Activity

Learning Activity

discussionforum Thought-Povoking Discussion

Now that you have learned about the history of security and the measures that have been used to provide security, think about the following:

  1. What measure do you take on a daily basis to ensure your own personal security?
  1. What security measures are being used in your neighborhood to ensure collective security?
  1. Looking at your responses to questions 1 & 2, provide linkages to the security measures first used in ancient times.

Post your thoughts to the Lesson 1: Security Measures discussion forum.  (You will find the discussion forum in the Lesson 1 Activities folder.)

Summary (5 of 5)
Summary

Summary

Taken together, the materials presented in this lesson sought to introduce you to the origins of security and the ways in which it has been achieved. From the very beginning, security has been about developing ways to protect self and society. But, over time, people have also sought to protect land and other material assets. To do so, they have used innovative security measures. In general, though, caves, architectural advances, gunpowder, locks, armored cars, spying techniques, and transportation advances have all played a role in ensuring security. Moreover, African, Asian, European, and American histories are all intertwined with the development of these security-related technological advances. Today, these technological advances continue, but, as you can see from the contents of this lesson, they still owe a large debt to ancient societies.

In America, while citizens, for good reasons, continue to focus on the security provided by public policing (e.g., state and municipal police), private security has a rich history and remains an area in which billions of dollars are invested each year. This investment has led to the call for more oversight and, as a response to this often pungent criticism, an increased emphasis on professionalizing the field. A review of the private security industry is presented in Lesson 2.


Top of page