Foreword |
|
xv | |
Preface |
|
xvii | |
Acknowledgments |
|
xxiii | |
About the Authors |
|
xxv | |
Section I Surveillance in Gaming Operations |
|
|
1 Camera Operational Techniques |
|
|
3 | (18) |
|
|
3 | (1) |
|
|
4 | (3) |
|
|
6 | (1) |
|
|
7 | (6) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
13 | (3) |
|
|
15 | (1) |
|
1.5 Surveillance Close Watches |
|
|
16 | (2) |
|
1.5.1 Tips for Successful Close Watches |
|
|
17 | (1) |
|
1.6 Proactive or Reactive? |
|
|
18 | (1) |
|
|
19 | (2) |
|
|
20 | (1) |
|
|
21 | (28) |
|
|
21 | (5) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (2) |
|
2.1.4 Computer Technology |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
26 | (9) |
|
|
32 | (1) |
|
|
32 | (2) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
36 | (4) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
42 | (3) |
|
|
44 | (1) |
|
|
44 | (1) |
|
2.9 Suspicious Activity, Advantage Play, and Cheating at Gaming |
|
|
45 | (2) |
|
2.9.1 Putting It All Together |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
47 | (2) |
|
3 Internal Theft and Fraud |
|
|
49 | (28) |
|
3.1 What Is Internal Theft and Fraud? |
|
|
49 | (1) |
|
3.2 Why Is Internal Theft and Fraud So Costly? |
|
|
50 | (1) |
|
3.3 Why Do Employees Steal? |
|
|
50 | (1) |
|
|
51 | (1) |
|
3.4 Detecting Internal Theft and Fraud |
|
|
51 | (4) |
|
3.4.1 Identifying Critical Areas and Key Transactions |
|
|
51 | (1) |
|
|
52 | (1) |
|
3.4.3 Statistical Information |
|
|
53 | (2) |
|
3.5 Loss Prevention Programs |
|
|
55 | (2) |
|
3.5.1 Prescreening Techniques |
|
|
56 | (1) |
|
3.5.2 Basic Prescreening Program Components |
|
|
56 | (1) |
|
3.6 Threat and Risk Assessment |
|
|
57 | (9) |
|
3.6.1 Identify Your Vulnerabilities, Risks, and Threats |
|
|
57 | (1) |
|
|
58 | (1) |
|
3.6.3 Threat Analysis for Surveillance Directors |
|
|
59 | (1) |
|
3.6.4 Protection Plan and Strategies |
|
|
60 | (1) |
|
3.6.5 Apply Countermeasures |
|
|
60 | (1) |
|
3.6.6 Monitor and Investigate Exceptions |
|
|
61 | (1) |
|
3.6.7 Obtaining Buy-In from Top Management and Program Partners |
|
|
61 | (1) |
|
3.6.8 Determine Program Objectives |
|
|
62 | (1) |
|
|
63 | (1) |
|
3.6.10 Train Program Participants to Operate Program |
|
|
63 | (1) |
|
3.6.11 Perform Daily Analytics |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
3.6.14 Evaluate Program Results |
|
|
65 | (1) |
|
3.7 Key Departments to Monitor for Internal Theft and Fraud |
|
|
66 | (6) |
|
3.7.1 Case History: Theft in Players' Clubs |
|
|
66 | (6) |
|
3.7.1.1 Computer Access Security |
|
|
70 | (1) |
|
3.7.1.2 Computer Security Controls: Breached |
|
|
71 | (1) |
|
3.7.1.3 Exception Reports: Ignored |
|
|
72 | (1) |
|
3.7.1.4 Players' Club Protection: Failed |
|
|
72 | (1) |
|
3.8 Protection Strategies and Best Practices for Promotions |
|
|
72 | (3) |
|
3.8.1 Best Practice #1: Review Marketing Programs and Promotions |
|
|
73 | (1) |
|
3.8.2 Best Practice #2: Monitor Marketing Programs and Promotions |
|
|
73 | (1) |
|
3.8.3 Best Practice #3: Review Exception Reports |
|
|
74 | (1) |
|
3.8.4 Best Practice #4: Train Your Personnel to Recognize and Report Suspicious Activity |
|
|
74 | (1) |
|
|
75 | (1) |
|
3.9 Loss Prevention at the Point of Sale |
|
|
75 | (1) |
|
3.9.1 Important First Steps |
|
|
75 | (1) |
|
3.9.2 Deterring and Detecting Employee Theft and Fraud |
|
|
76 | (1) |
|
|
76 | (1) |
|
|
77 | (4) |
|
4.1 The Evolution of Security Surveillance |
|
|
77 | (1) |
|
4.2 Tips for Successful Security Surveillance Operation |
|
|
78 | (3) |
|
|
80 | (1) |
|
5 Standard Operating Procedures |
|
|
81 | (16) |
|
5.1 Surveillance Department Operational Policies and Procedures |
|
|
81 | (1) |
|
5.1.1 Standard Operating Procedures |
|
|
81 | (1) |
|
5.2 Key Surveillance Policies and Procedures |
|
|
82 | (1) |
|
5.3 Key Surveillance Functions |
|
|
83 | (2) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
85 | (10) |
|
|
85 | (1) |
|
|
85 | (1) |
|
5.4.3 Investigator Code of Ethics |
|
|
85 | (1) |
|
5.4.4 Function of Surveillance Department |
|
|
86 | (1) |
|
5.4.5 Authority Specific to Surveillance |
|
|
86 | (1) |
|
5.4.6 Surveillance Chain of Command |
|
|
86 | (1) |
|
5.4.7 Surveillance Monitor Room Access |
|
|
87 | (1) |
|
5.4.8 Surveillance Daily Operations |
|
|
87 | (1) |
|
5.4.9 Surveillance Tri-Shot Coverage |
|
|
88 | (1) |
|
5.4.10 Evaluation and Coverage of High Action Games |
|
|
89 | (1) |
|
|
90 | (1) |
|
5.4.12 Response to Criminal Activity |
|
|
91 | (1) |
|
5.4.13 Reporting Violations of Policy or Procedure |
|
|
92 | (1) |
|
5.4.14 Close Watch and Audit Operations |
|
|
92 | (1) |
|
5.4.15 Required Incident Reports |
|
|
93 | (1) |
|
5.4.16 Writing Incident Reports |
|
|
93 | (2) |
|
|
95 | (2) |
|
|
97 | (8) |
|
6.1 Fundamental Investigative Techniques |
|
|
97 | (4) |
|
|
100 | (1) |
|
6.2 Interviewing Suspects and Witnesses |
|
|
101 | (2) |
|
6.3 Evidence Gathering and Handling |
|
|
103 | (2) |
|
7 Surveillance Training and Education |
|
|
105 | (6) |
|
7.1 Surveillance Training and Education Program |
|
|
105 | (1) |
|
|
106 | (5) |
|
7.2.1 Trainee to Level I/Investigator I |
|
|
106 | (1) |
|
7.2.2 Level II/Investigator II |
|
|
106 | (1) |
|
7.2.3 Level III/Investigator III |
|
|
107 | (4) |
|
7.2.3.1 Compensation and Rewards |
|
|
108 | (1) |
|
|
108 | (3) |
|
8 Statistical Information and Analysis |
|
|
111 | (8) |
|
|
111 | (5) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
117 | (1) |
|
8.4 Key Business Indicators (KBIs) |
|
|
118 | (1) |
|
9 Surveillance in the Future |
|
|
119 | (8) |
Section II Physical Security in Gaming Operations |
|
|
10 The Gaming Security Officer's Role |
|
|
127 | (10) |
|
10.1 Operational Separation from Surveillance and Reasons |
|
|
127 | (2) |
|
|
129 | (3) |
|
10.3 Public Relations and Security |
|
|
132 | (2) |
|
10.4 Uniforms and Appearance |
|
|
134 | (3) |
|
11 Security Patrols and Assignments in the Gaming Environment |
|
|
137 | (24) |
|
11.1 The Function of Patrols and Assignments |
|
|
137 | (1) |
|
11.2 Identification Checks as a Constant |
|
|
138 | (3) |
|
11.3 Stationary Assignments |
|
|
141 | (1) |
|
|
141 | (2) |
|
|
143 | (1) |
|
11.6 Ingress and Egress Positions |
|
|
144 | (1) |
|
11.7 Employee Entrances and Loading Docks |
|
|
145 | (2) |
|
11.8 Patrol of Hotel and Guest Rooms |
|
|
147 | (3) |
|
11.9 Patrolling the Casino Floor |
|
|
150 | (4) |
|
11.10 Securing Parking Lots and Garages |
|
|
154 | (3) |
|
11.11 Plain-Clothes Security |
|
|
157 | (1) |
|
11.12 Target Area Security |
|
|
158 | (3) |
|
12 Alcohol and the Gaming Environment |
|
|
161 | (12) |
|
12.1 Responsible Alcohol Service |
|
|
161 | (1) |
|
12.2 Managing Intoxication |
|
|
162 | (3) |
|
12.3 Nightclubs, Ultra Lounges, and Large Bars |
|
|
165 | (8) |
|
12.3.1 Nightclub Staffing Levels |
|
|
169 | (1) |
|
12.3.2 Club Drugs and Room Checks |
|
|
170 | (2) |
|
12.3.3 Use of Local Promoters |
|
|
172 | (1) |
|
13 Table Game Fills, Credits, Drops, and Money |
|
|
173 | (8) |
|
13.1 Protection of Currency and Negotiable Chips |
|
|
173 | (1) |
|
13.2 Fills and Credits: Understanding the Flow of Chips |
|
|
174 | (2) |
|
13.3 Escorting Employees with Cash Drawers |
|
|
176 | (1) |
|
13.4 The Slot Machine Drop |
|
|
177 | (1) |
|
13.5 Table Games and Validator Box Drops |
|
|
178 | (3) |
|
14 Managing and Controlling Incidents |
|
|
181 | (6) |
|
14.1 Calls for Service: Responding to Incidents |
|
|
181 | (1) |
|
14.2 Intoxication and Incident Control |
|
|
182 | (1) |
|
14.3 Closed-Circuit Television and Documenting Incidents |
|
|
182 | (1) |
|
14.4 Verbal and Physical Altercations |
|
|
183 | (1) |
|
14.5 Public Domestic Fights |
|
|
184 | (3) |
|
|
187 | (16) |
|
15.1 Eject, Evict, Trespass, and Eighty-Sixing |
|
|
187 | (1) |
|
|
187 | (2) |
|
15.3 The Function of Eighty-Sixing |
|
|
189 | (1) |
|
15.4 The Formal Eighty-Sixing Process |
|
|
189 | (1) |
|
15.5 Converting Incidents into Trespass Warnings |
|
|
190 | (1) |
|
|
191 | (2) |
|
15.7 Escorts to the Nearest Door |
|
|
193 | (1) |
|
15.8 Making the Decision to Effect a Citizen's Arrest |
|
|
194 | (1) |
|
15.9 Prosecuting the Trespasser |
|
|
195 | (1) |
|
15.10 Employee Misconduct |
|
|
196 | (2) |
|
15.11 Incidents in Hotel Areas |
|
|
198 | (1) |
|
15.12 Conducting the Guest Welfare Check |
|
|
199 | (1) |
|
15.13 Domestic Hotel Incidents and Evicting a Guest |
|
|
200 | (3) |
|
16 Arrests and Detainments |
|
|
203 | (8) |
|
16.1 An Arrest as a Last Resort |
|
|
203 | (3) |
|
|
206 | (1) |
|
16.3 Notifying Local Law Enforcement |
|
|
207 | (1) |
|
|
207 | (1) |
|
16.5 Dealing with Medical Issues |
|
|
208 | (1) |
|
|
209 | (2) |
|
17 Theft, Larceny, and Other Property Crimes |
|
|
211 | (12) |
|
17.1 Theft and Fraud: The Security Response |
|
|
211 | (1) |
|
|
212 | (3) |
|
17.3 Theft from Guest Rooms |
|
|
215 | (2) |
|
17.4 Inventory Theft by Employees |
|
|
217 | (1) |
|
17.5 Bartenders and Servers |
|
|
217 | (2) |
|
17.6 Food Cashiers and Servers |
|
|
219 | (1) |
|
17.7 The Friends and Family Discount |
|
|
219 | (1) |
|
17.8 Maintenance.Staff and Engineers |
|
|
220 | (3) |
|
18 The Major Security Incident |
|
|
223 | (6) |
|
|
223 | (1) |
|
|
224 | (2) |
|
|
226 | (3) |
|
19 Training Gaming Security Officers |
|
|
229 | (10) |
|
19.1 Training as a Constant |
|
|
229 | (2) |
|
19.2 New Hire Orientation |
|
|
231 | (1) |
|
19.3 Training of the New Security Officer |
|
|
232 | (2) |
|
|
234 | (1) |
|
19.5 Specialized Training |
|
|
235 | (1) |
|
|
236 | (3) |
|
20 Common Casino Scams and Crimes |
|
|
239 | (12) |
|
20.1 Where There Are People with Money, Scams Are Present |
|
|
239 | (1) |
|
20.2 The Short Change Artist |
|
|
239 | (2) |
|
20.3 Check Cashing and the Cashier's Cage |
|
|
241 | (1) |
|
|
242 | (1) |
|
20.5 Abusing Marketing Programs |
|
|
243 | (3) |
|
20.6 The Slip-and-Fall Artist |
|
|
246 | (1) |
|
20.7 Prostitution and Related Crimes |
|
|
247 | (4) |
|
21 Managing Casino Security |
|
|
251 | (16) |
|
21.1 The Security Industry in General and Gaming Security |
|
|
251 | (1) |
|
|
252 | (1) |
|
21.3 Monitoring Police Calls to Your Facility |
|
|
253 | (2) |
|
21.4 Communicating with Local Law Enforcement |
|
|
255 | (1) |
|
21.5 Professional Groups and Associations |
|
|
256 | (1) |
|
21.6 Tracking, Analyzing, and Managing Incidents |
|
|
256 | (1) |
|
21.7 Internal Staff Communication |
|
|
257 | (3) |
|
21.8 Policies and Procedures |
|
|
260 | (2) |
|
|
262 | (2) |
|
21.10 Standards and Guidelines |
|
|
264 | (3) |
Appendix: Additional Forms and Resources |
|
267 | (16) |
Glossary of Gaming Terms |
|
283 | (6) |
Index |
|
289 | |