Atjaunināt sīkdatņu piekrišanu

Casino Security and Gaming Surveillance [Hardback]

(Consultant, Newburgh, Indiana, USA), (Security/GamingConsultant, Wadsworth, Nevada, USA)
  • Formāts: Hardback, 322 pages, height x width: 254x178 mm, weight: 793 g, 19 Tables, black and white; 45 Illustrations, black and white
  • Izdošanas datums: 08-Oct-2010
  • Izdevniecība: Auerbach
  • ISBN-10: 1420087827
  • ISBN-13: 9781420087826
Citas grāmatas par šo tēmu:
  • Hardback
  • Cena: 191,26 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Bibliotēkām
  • Formāts: Hardback, 322 pages, height x width: 254x178 mm, weight: 793 g, 19 Tables, black and white; 45 Illustrations, black and white
  • Izdošanas datums: 08-Oct-2010
  • Izdevniecība: Auerbach
  • ISBN-10: 1420087827
  • ISBN-13: 9781420087826
Citas grāmatas par šo tēmu:
Almost all incidences of cheating, theft, fraud, or loss can be detected through the surveillance of critical transactions, audit observations, and reviews of key metrics. Providing proven-techniques for detecting and mitigating the ever-evolving threats to casino security, this book covers the core skills, knowledge, and techniques needed to protect casino assets, guests, and employees.

Drawing on the authors six decades of combined experience in the industry, Casino Security and Gaming Surveillance identifies the most common threats to casino security and provides specific solutions for addressing these threats. From physical security and security management to table and gaming surveillance, it details numerous best practice techniques, strategies, and tactics, in addition to the metrics required to effectively monitor operations. The authors highlight valuable investigation tools, including interview techniques and evidence gathering. They also cover IOU patrol, tri-shot coverage, surveillance audits, threat analysis, card counting, game protection techniques, players club theft and fraud, surveillance standard operating procedures, nightclub and bar security, as well as surveillance training.

Complete with a glossary of gaming terms and a resource-rich appendix that includes helpful forms, this book covers everything surveillance and security professionals need to know to avoid high-profile incidents, costly compliance violations and damage to property and revenue.

Recenzijas

Drawing from the experiences of their peers and colleagues in the industry, Boss, a gaming protection operator and consultant, and Zajic, an independent security consultant who teaches in the gaming departments at the University of Nevada in Reno and Las Vegas, explain the skills, knowledge, and techniques for detecting and mitigating threats to casino security and protecting casino assets, guests, and employees, for supervisors and investigators/agents. They discuss the most common threats and how to address them, from physical security and security management to table and gaming surveillance, as well as internal theft and fraud. Topics include IOU patrol, tri-shot coverage, conducting close watches, set-up and conduction of surveillance audits, threat analysis, statistical review, basic strategy, card counting, game protection techniques, loss prevention, players' club theft and fraud, surveillance standard operating procedures, training and investigation, and security surveillance. In Research Book News, booknews.com, February 2011

Its professionals like Al and Derk who personify the professionalism that is crucial when establishing and operating modern casino security and surveillance departments. This book will quickly become the Bible for any security and surveillance officer.Roger Gros, Publisher, Global Gaming Business Magazine

Foreword xv
Preface xvii
Acknowledgments xxiii
About the Authors xxv
Section I Surveillance in Gaming Operations
1 Camera Operational Techniques
3(18)
1.1 Surveillance Patrol
3(1)
1.2 IOU Patrol
4(3)
1.2.1 Case History
6(1)
1.3 Tri-Shot Coverage
7(6)
1.3.1 Case History
12(1)
1.3.2 Case History
13(1)
1.4 Surveillance Audits
13(3)
1.4.1 Case History
15(1)
1.5 Surveillance Close Watches
16(2)
1.5.1 Tips for Successful Close Watches
17(1)
1.6 Proactive or Reactive?
18(1)
1.7 Covert Cameras
19(2)
1.7.1 Case History
20(1)
2 Game Protection
21(28)
2.1 Surveillance Skills
21(5)
2.1.1 Best Practice #1
22(1)
2.1.2 Best Practice #2
22(1)
2.1.3 Best Practice #3
23(2)
2.1.4 Computer Technology
25(1)
2.1.5 Case History
25(1)
2.2 Game Protection
26(1)
2.3 Tells
26(9)
2.3.1 Case History
32(1)
2.3.2 Summation
32(2)
2.3.3 Case History
34(1)
2.4 Basic Strategy
35(1)
2.5 Card Counting
36(4)
2.6 Money Management
40(1)
2.7 Critical Index
41(1)
2.8 Evaluating Players
42(3)
2.8.1 Case History
44(1)
2.8.2 Threat Level
44(1)
2.9 Suspicious Activity, Advantage Play, and Cheating at Gaming
45(2)
2.9.1 Putting It All Together
47(1)
2.9.2 Case History
47(1)
Reference
47(2)
3 Internal Theft and Fraud
49(28)
3.1 What Is Internal Theft and Fraud?
49(1)
3.2 Why Is Internal Theft and Fraud So Costly?
50(1)
3.3 Why Do Employees Steal?
50(1)
3.3.1 Case History
51(1)
3.4 Detecting Internal Theft and Fraud
51(4)
3.4.1 Identifying Critical Areas and Key Transactions
51(1)
3.4.2 Exception Reports
52(1)
3.4.3 Statistical Information
53(2)
3.5 Loss Prevention Programs
55(2)
3.5.1 Prescreening Techniques
56(1)
3.5.2 Basic Prescreening Program Components
56(1)
3.6 Threat and Risk Assessment
57(9)
3.6.1 Identify Your Vulnerabilities, Risks, and Threats
57(1)
3.6.2 Case History
58(1)
3.6.3 Threat Analysis for Surveillance Directors
59(1)
3.6.4 Protection Plan and Strategies
60(1)
3.6.5 Apply Countermeasures
60(1)
3.6.6 Monitor and Investigate Exceptions
61(1)
3.6.7 Obtaining Buy-In from Top Management and Program Partners
61(1)
3.6.8 Determine Program Objectives
62(1)
3.6.9 Case History
63(1)
3.6.10 Train Program Participants to Operate Program
63(1)
3.6.11 Perform Daily Analytics
64(1)
3.6.12 Implement Program
65(1)
3.6.13 Monitor Program
65(1)
3.6.14 Evaluate Program Results
65(1)
3.7 Key Departments to Monitor for Internal Theft and Fraud
66(6)
3.7.1 Case History: Theft in Players' Clubs
66(6)
3.7.1.1 Computer Access Security
70(1)
3.7.1.2 Computer Security Controls: Breached
71(1)
3.7.1.3 Exception Reports: Ignored
72(1)
3.7.1.4 Players' Club Protection: Failed
72(1)
3.8 Protection Strategies and Best Practices for Promotions
72(3)
3.8.1 Best Practice #1: Review Marketing Programs and Promotions
73(1)
3.8.2 Best Practice #2: Monitor Marketing Programs and Promotions
73(1)
3.8.3 Best Practice #3: Review Exception Reports
74(1)
3.8.4 Best Practice #4: Train Your Personnel to Recognize and Report Suspicious Activity
74(1)
3.8.5 Conclusion
75(1)
3.9 Loss Prevention at the Point of Sale
75(1)
3.9.1 Important First Steps
75(1)
3.9.2 Deterring and Detecting Employee Theft and Fraud
76(1)
3.10 Summary
76(1)
4 Security Surveillance
77(4)
4.1 The Evolution of Security Surveillance
77(1)
4.2 Tips for Successful Security Surveillance Operation
78(3)
4.2.1 Case History
80(1)
5 Standard Operating Procedures
81(16)
5.1 Surveillance Department Operational Policies and Procedures
81(1)
5.1.1 Standard Operating Procedures
81(1)
5.2 Key Surveillance Policies and Procedures
82(1)
5.3 Key Surveillance Functions
83(2)
5.3.1 Audits
83(1)
5.3.2 Officer Training
83(1)
5.3.3 Summary
84(1)
5.4 Appendix
85(10)
5.4.1 Mission Statement
85(1)
5.4.2 Key Objectives
85(1)
5.4.3 Investigator Code of Ethics
85(1)
5.4.4 Function of Surveillance Department
86(1)
5.4.5 Authority Specific to Surveillance
86(1)
5.4.6 Surveillance Chain of Command
86(1)
5.4.7 Surveillance Monitor Room Access
87(1)
5.4.8 Surveillance Daily Operations
87(1)
5.4.9 Surveillance Tri-Shot Coverage
88(1)
5.4.10 Evaluation and Coverage of High Action Games
89(1)
5.4.11 Advantage Play
90(1)
5.4.12 Response to Criminal Activity
91(1)
5.4.13 Reporting Violations of Policy or Procedure
92(1)
5.4.14 Close Watch and Audit Operations
92(1)
5.4.15 Required Incident Reports
93(1)
5.4.16 Writing Incident Reports
93(2)
References
95(2)
6 Investigations
97(8)
6.1 Fundamental Investigative Techniques
97(4)
6.1.1 Case History
100(1)
6.2 Interviewing Suspects and Witnesses
101(2)
6.3 Evidence Gathering and Handling
103(2)
7 Surveillance Training and Education
105(6)
7.1 Surveillance Training and Education Program
105(1)
7.2 Program Setup
106(5)
7.2.1 Trainee to Level I/Investigator I
106(1)
7.2.2 Level II/Investigator II
106(1)
7.2.3 Level III/Investigator III
107(4)
7.2.3.1 Compensation and Rewards
108(1)
7.2.3.2 Program Benefits
108(3)
8 Statistical Information and Analysis
111(8)
8.1 Table Games
111(5)
8.1.1 Case History
115(1)
8.2 Slots
116(1)
8.2.1 Case History
116(1)
8.3 Key Daily Reports
117(1)
8.4 Key Business Indicators (KBIs)
118(1)
9 Surveillance in the Future
119(8)
Section II Physical Security in Gaming Operations
10 The Gaming Security Officer's Role
127(10)
10.1 Operational Separation from Surveillance and Reasons
127(2)
10.2 Proactive Presence
129(3)
10.3 Public Relations and Security
132(2)
10.4 Uniforms and Appearance
134(3)
11 Security Patrols and Assignments in the Gaming Environment
137(24)
11.1 The Function of Patrols and Assignments
137(1)
11.2 Identification Checks as a Constant
138(3)
11.3 Stationary Assignments
141(1)
11.4 Dispatchers
141(2)
11.5 Lost and Found
143(1)
11.6 Ingress and Egress Positions
144(1)
11.7 Employee Entrances and Loading Docks
145(2)
11.8 Patrol of Hotel and Guest Rooms
147(3)
11.9 Patrolling the Casino Floor
150(4)
11.10 Securing Parking Lots and Garages
154(3)
11.11 Plain-Clothes Security
157(1)
11.12 Target Area Security
158(3)
12 Alcohol and the Gaming Environment
161(12)
12.1 Responsible Alcohol Service
161(1)
12.2 Managing Intoxication
162(3)
12.3 Nightclubs, Ultra Lounges, and Large Bars
165(8)
12.3.1 Nightclub Staffing Levels
169(1)
12.3.2 Club Drugs and Room Checks
170(2)
12.3.3 Use of Local Promoters
172(1)
13 Table Game Fills, Credits, Drops, and Money
173(8)
13.1 Protection of Currency and Negotiable Chips
173(1)
13.2 Fills and Credits: Understanding the Flow of Chips
174(2)
13.3 Escorting Employees with Cash Drawers
176(1)
13.4 The Slot Machine Drop
177(1)
13.5 Table Games and Validator Box Drops
178(3)
14 Managing and Controlling Incidents
181(6)
14.1 Calls for Service: Responding to Incidents
181(1)
14.2 Intoxication and Incident Control
182(1)
14.3 Closed-Circuit Television and Documenting Incidents
182(1)
14.4 Verbal and Physical Altercations
183(1)
14.5 Public Domestic Fights
184(3)
15 Removing Undesirables
187(16)
15.1 Eject, Evict, Trespass, and Eighty-Sixing
187(1)
15.2 Underaged People
187(2)
15.3 The Function of Eighty-Sixing
189(1)
15.4 The Formal Eighty-Sixing Process
189(1)
15.5 Converting Incidents into Trespass Warnings
190(1)
15.6 "Three Fingers"
191(2)
15.7 Escorts to the Nearest Door
193(1)
15.8 Making the Decision to Effect a Citizen's Arrest
194(1)
15.9 Prosecuting the Trespasser
195(1)
15.10 Employee Misconduct
196(2)
15.11 Incidents in Hotel Areas
198(1)
15.12 Conducting the Guest Welfare Check
199(1)
15.13 Domestic Hotel Incidents and Evicting a Guest
200(3)
16 Arrests and Detainments
203(8)
16.1 An Arrest as a Last Resort
203(3)
16.2 Restroom Use
206(1)
16.3 Notifying Local Law Enforcement
207(1)
16.4 Checking Restraints
207(1)
16.5 Dealing with Medical Issues
208(1)
16.6 Conducting Searches
209(2)
17 Theft, Larceny, and Other Property Crimes
211(12)
17.1 Theft and Fraud: The Security Response
211(1)
17.2 Valet Parking
212(3)
17.3 Theft from Guest Rooms
215(2)
17.4 Inventory Theft by Employees
217(1)
17.5 Bartenders and Servers
217(2)
17.6 Food Cashiers and Servers
219(1)
17.7 The Friends and Family Discount
219(1)
17.8 Maintenance.Staff and Engineers
220(3)
18 The Major Security Incident
223(6)
18.1 Guns and Gaming
223(1)
18.2 Casino Robbery
224(2)
18.3 Active Shooter
226(3)
19 Training Gaming Security Officers
229(10)
19.1 Training as a Constant
229(2)
19.2 New Hire Orientation
231(1)
19.3 Training of the New Security Officer
232(2)
19.4 Field Training
234(1)
19.5 Specialized Training
235(1)
19.6 Refresher Training
236(3)
20 Common Casino Scams and Crimes
239(12)
20.1 Where There Are People with Money, Scams Are Present
239(1)
20.2 The Short Change Artist
239(2)
20.3 Check Cashing and the Cashier's Cage
241(1)
20.4 Distraction Crimes
242(1)
20.5 Abusing Marketing Programs
243(3)
20.6 The Slip-and-Fall Artist
246(1)
20.7 Prostitution and Related Crimes
247(4)
21 Managing Casino Security
251(16)
21.1 The Security Industry in General and Gaming Security
251(1)
21.2 Know Your Facility
252(1)
21.3 Monitoring Police Calls to Your Facility
253(2)
21.4 Communicating with Local Law Enforcement
255(1)
21.5 Professional Groups and Associations
256(1)
21.6 Tracking, Analyzing, and Managing Incidents
256(1)
21.7 Internal Staff Communication
257(3)
21.8 Policies and Procedures
260(2)
21.9 Written Reports
262(2)
21.10 Standards and Guidelines
264(3)
Appendix: Additional Forms and Resources 267(16)
Glossary of Gaming Terms 283(6)
Index 289
Derk Boss is a well-respected gaming protection operator and consultant with more than twenty-eight years of experience within the gaming industry. He has served in executive positions in security, surveillance, and compliance capacities for American Casino and Entertainment Properties, Grand Casinos, Ballys, Aztar, Del Webb corporations, and Tropicana Entertainment. The surveillance teams trained and led by Boss have a proven track record of success in the detection of cheating, advantage play, and both internal and external theft and fraud. Boss has earned professional certification as a Certified Fraud Examiner (CFE), Certified Protection Professional (CPP), and Certified Surveillance Professional (CSP). Presently, Derk serves on the Gaming and Wagering Council for ASIS International and is a past chairman for the Council.

He is currently the president of the International Association of Certified Surveillance Professionals (IACSP) and is one of its founding members. Derk is also a respected author, instructor, and speaker, specializing in the fields of surveillance training and methodology, gaming protection, loss prevention, and the detection of internal and external theft and fraud.

He has appeared as an expert on several television networks, including the Travel Channel and his technical articles have appeared in dozens of professional journals, including Security Management magazine, which is published by ASIS International. ASIS International is the largest organization for security professionals with more than 36,000 members worldwide. As a speaker, he has been featured at several international conferences including the Global Gaming Exposition, Gaming Operation Summit, and Biometric Summit. Derk currently resides in Evansville, Indiana where Derk is the Director of Security and Surveillance for Casino Aztar.

Alan W. Zajic is a Nevada licensed independent security consultant specializing in hospitality, gaming and retail security environments primarily in Nevada. He has more than 30 years of practical hands-on experience in security and surveillance operations and served as security director for the Sahara Tahoe and High Sierra resorts in Lake Tahoe as well as corporate security for Del E. Web, Corp. in Nevada.

Alan is a member of ASIS International where he holds the designation of Certified Protection Professional (CPP) and is currently the chairman of the Hospitality, Entertainment and Tourism Security Council as well as being an active member of the Gaming and Wagering Protection Council. He is actively involved in the Northern Nevada and Las Vegas Chapters as well as the international security community. He is also a member of the International Association of Certified Surveillance Professionals (IACSP) where he holds the designation of Certified Surveillance Professional (CSP) and is a member of the International Association of Professional Security Consultants (IAPSC). He is a subject matter expert and track advisor for the American Gaming Association.

In addition, Alan is an instructor for the University of Nevada at Reno in the Gaming Management Program and at UNLV for the International Gaming Institute in security and surveillance applications. He is frequently requested to present sessions at international security conferences and for various organizations throughout the country. Further, he is frequently called upon to serve as a forensic security consultant (expert witness) in gaming, hospitality, retail, bars and nightclubs, and multi-unit housing environments nationally and in Nevada. His practice areas include forensic consulting, management consulting, major incident management, policy and procedure development as well as conducting tailored training programs for gaming operations.