Transit Guide
Transit Guide
DOT-VNTSC-FTA-94-8
NOTICE This document is disseminated under the sponsorship of the Department of Transportation in the interest of information exchange. The United States Government assumes no liability for its contents or use thereof.
NOTICE The United States Government does not endorse products or manufacturers. Trade or manufacturers names appear herein solely because they are considered essential to the objective of this report.
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintainin the data needed, an d completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information 0perations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the 0f fice of Management and Budget, Paperwork Reduction Project (0704-0188), Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE 3.. REPORT TYPE AND DATES COVERED
DTRS-57-89-D-00091 TT540/V5031
8. PERFORMING ORGANIZATION REPORT NUMBER
KENTRON Division of The Bionetics Corporation* 350 Technology Drive Malvern, PA 19355
9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS
DOT-VNTSC-FTA-94-8
10. SPONSORING/MONITORING AGENCY REPORT NUMBER
Office of Safety & Security Federal Transit Administration U.S. Department of Transportation Washington, DC 20590
11. SUPPLEMENTARY NOTES *Under contract to:
FTA-MA-90-7001-94-2
U.S. Department of Transportation Research and Special Programs Administration John A. Volpe National Transportation Systems Center Cambridge, MA 02142-1093
12a. DISTRIBUTION/AVAILABILITY STATEMENT 12b. DISTRIBUTION CODE'
This document is available to the public through the National Technical Information Service, Springfield, VA 22161
13. ABSTRACT (Maximum 200 words) The Federal Transit Administrations Safety and Security Program goal is to achieve the highest practical level of safety in all modes of transit. In order to protect passengers, employees, revenue, and property, all transit systems are encouraged to identify, evaluate, and adopt security procedures which are most efficient and effective in local practice. Both proactive and response procedures should be included along with methodologies for reviewing their efficacy in actual use. This Guide is designed to help transit systems become aware of the procedures used across the country by transit and other programs in their security tasks. The Guide includes information on how to apply the systems approach to transit security planning and implementation; proactive materials on the prevention of security incidents; procedures for immediate and follow-up response to security incidents; and specific evaluations of a variety of special security problems including crimes against passengers, crimes against the transit system, crimes against the public (hostages, hijacking, bomb threats), and general security issues. The evaluations include information on the most important attributes of each security problem: severity, frequency, type, areas of affect, when, locations, contributing factors; solution areas, solutions/approaches. personnel cost, facility/equipment cost, effectiveness, and application. This is a companion to an earlier document entitled Transit System Security Program Planning Guide which is also available from Volpe and FTA
14. SUBJECT TERMS Transit, System, Security, Procedures, Safety, Law Enforcement, Proactive, Policy Management, Transportation, Bus, Rail, Paratransit, Police, Employee, Passenger, Trespass Vandalism, Guards, Protection, Fare Evasion, Facility Design, Equipment 17. SECURITY CLASSIFICATION
OF REPORT
298-102
Unclassified
NSN 7540-01-280-5500
Unclassified
Unclassified
i i
Acknowledgements
The KETRON Division of The Bionetics. Corporation would like to extend its full appreciation to the Federal Transit Administration, the Volpe National Transportation Systems Center and the following individuals who were instrumental ininitiating this project and bringing it to its successful conclusion:
Franz Gimmler
Deputy Associate Administrator for Safety
Federal Transit Administration
Judy Meade
Program Manager
Federal Transit Administration
William Hathaway
Senior Project Engineer
Volpe National Transportation Systems Center
Larrine Watson
Project Manager
Volpe National Transportation Systems Center
Mark M. Hood Transit/Paratransit Specialist KETRON Division of The Bionetics Corporation Debra J. Haas Administrative Assistant KETRON Division of The Bionetics Corporation Jennifer E. Rimmer
Transit/Paratransit Specialist
KETRON Division of The Bionetics Corporation
R. Benjamin Gribbon
Transit/Paratransit Specialist
KETRON Division of The Bionetics Corporation
DavidChia Transportation Planner KETRON Division of The Bionetics Corporation
iii/iv
TABLE OF CONTENTS
Introduction ................................ ................................ ................... 1
Table of Contents
(continued)
vi
List of Figures
vii
List of Tables
viii
Introduction
Security - An Integral Part of the Transit System
Security is an integral part of the service provided by the transit system. This involves the security s ridership and revenue - personnel, of passengers -which has an impact on the system facilities, and equipment.
Security Problems Chapter 3 General Security Issues Chapter 4 Crimes Against Passengers Chapter 5 Crimes Against the Transit System Chapter 6 Crimes Against the Public: Critical Incidents/Acts of Terrorism
Note: When referring to police entities, the terms forces, authorities, and law enforcement agencies are often used interchangeably throughout this Guide.
Security risks and the measures needed to mitigate them can be identified before there is
an actual security problem. Preventative measures can reduce dangers, problems, and resulting costs.
Security measures can often be implemented in a more cost effective manner in the
planning stages. Planning and anticipating security risks can prevent a number of incidents and reduce the consequences of those that do occur. Reacting to a security breach is costly. For example, if fares are stolen, revenue is lost. Without observation cameras, alarms, and security procedures, there may not be a means for locating the perpetrator at all. A breach in security can also have an affect on the morale of employees who will feel more at risk. In addition, there can be a negative affect on the perceptions of passengers who feel that they are not adequately protected. These negatives can be reduced if there are countermeasures already in place. They can include:
Security Planning
Security planning involves
following up with evaluation of procedures, plans and policies to address any errors and
implement necessary changes The entire process is described in a plan prepared by the transit system so that its employees and the community understand what security, activities are being utilized. The development of the plan itself is described in detail in a companion publication entitled Transit Security System Security Program Planning Guide. This Guide briefly summarizes the development, implementation, and maintenance of the Security Plan. A System Security Program Plan should
be developed to create a detailed security program for the transit system state the objective of the security program and identify the key personnel who are
responsible for achieving those objectives
clearly outline and discuss the process the system has identified to implement security, the
roles and responsibilities of the staff, and the specific procedures and policies for carrying out their security roles reflect the size and complexity of the system reflect the degree to which the security of the system is threatened by internal and external forces leave room for judgment on the part of the staff and provide guidance in addition to regulations where possible be kept simple enough to be understood and carried out by the staff be widely distributed and relevant sections read by all employees form the basis for security instruction for all new employees and for annual refresher training
Section 1
Security Issues and Incidents
Chapter 1
Preventing Security Incidents
Many transit systems rely on a combination of these sources. A large multimodal system, for example, might patrol subways with transit police and rely on local police for responding to incidents on buses. Alternatively, they may use special transit units within local police departments to patrol buses as plain-clothes teams, and contract security service from a local security company for the patrol of maintenance and storage facilities. In contrast, smaller rural systems may have to rely entirely on the state police in a response only mode.
Local Police
All transit systems rely on local police departments to some extent. Smaller transit systems may rely exclusively on local forces. This arrangement is entirely appropriate if the security needs of the transit system are being met.. Reliance on local police may be the best arrangement if the jurisdiction of the local law enforcement agency includes all or most of the transit service area. Communications can be organized to provide effective responses. Complete information from incident reports and transit crime statistics can also be provided to the system. The system calls the police to respond to serious violations. Minor security incidents are handled by in-house security staff (or an operations supervisor), who can perform other operational functions such as assisting passengers. Formal arrangements with local law enforcement agencies are not always made by small transit systems.
If the system relies on the local police, its security department would be primarily administrative and operational. The system may employ staff to identify problem spots to keep the local authorities informed. While the system might employ additional patrol guards, the rest of the inhouse security staff will commonly be supervisors, station attendants, and spotters to provide additional support. The tasks of in-house security staff might also include locking up
inspecting facilities
reporting incidents
providing a human presence
Local police departments can provide an officer during fixed hours at specific problem sites, If the system operates in one police jurisdiction or more than one jurisdiction, arrangements must be made to establish a precise means to ensure police support and response as quickly as possible. Investigate the local standards regarding jurisdictions. Even systems operating in only a few jurisdictions may at some point discover the difficulties of determining in which jurisdiction an incident is occurring. Some systems have attempted to enhance the perceived presence of uniformed officers by offeringthem free transit trips. It is intended that police officers will opt to ride transit vehicles whenever they are traveling in the city. Even off-duty officers can provide a deterrent by their mere presence.
Transit Police
Transit systems with dedicated transit police forces indicate that full police powers are necessary for the security staff to be effective. Although security guards can deter less serious crimes, police with full powers are often needed to deter and respond to more violent crimes. In communities where transit crime is often violent, police power can do much to enhance the effectiveness of the force. An in-house force of transit police can allow the system to rely less heavily on local forces but cannot eliminate the need for cooperation. Reporting functions need to be shared, and local forces must provide backup for the transit police. Often the local forces are more widely distributed, and in some cases will be able to respond faster. Furthermore, local police facilities are generally relied upon for booking and holding functions. Since it is always necessary to rely on and cooperate with the local police at some level, it is extremely important that the transit security staff command the respect of local authorities. In the case of a transit police force, it may even be required that the local force approve the transit police 10
force before full police powers can be granted on a permanent basis. This is commonly achieved by setting high training and employment standards. It is often convenient to use-the standards employed by local police authorities, including the training sites and local academies. Respect for the experience and capabilities of the transit police is also greatly enhanced by drawing staff from the local force, especially to serve as top officials in the transit force. Salary rates are also often based on the rates paid to local officers. A dedicated transit police force is appropriate when the transit system serves many jurisdictions. The complexity of coordinating services for each jurisdiction can be greatly reduced through a staff with full police powers that is responsible throughout the many locations the system serves.
11
Personnel
Sworn Police officers
Sworn police officers have full police powers and have the authority to make arrests. They may include local police personnel, special transit units of local forces, or transit police that serve as patrol officers, detectives, undercover agents, or administrative officers. Sworn officers that have the most training and versatile powers are expensive and should be carefully deployed, but their utilization may be indispensable.
Security Officers
Security officers do not have full police powers and cannot make police arrests, but they can be armed. Security guards provide an armed, uniformed presence to deter crime. They can respond to all calls enforce most rules interrupt crimes in progress make citizen s arrests
Local police will have to be called for more serious incidents. In some systems, security guards are used to complement sworn officers to guard revenue and property. Security guards may be present at all revenue transfers and may patrol non-public areas and facilities.
Patrol Guards
Patrolguards are not used to respond to incidents personally but to deter incidents and guard property and facilities. They are usually in uniform and provide a security presence, which can be a deterrent.
12
There is also some benefit to staffing the administration of a transit police department with civilians, thereby freeing officers for security operations.
Locksmiths
A locksmith may be employed full time at larger systems or may be selected to work on an on-going basis at smaller systems. Locksmiths will help repair damage caused by break-ins and can immediately replace locks if it is determined that a theft was committed by someone who had a key to a particular facility. The locksmith should work with security planning and facilities staff to arrange varied levels of access. It is often wise to change locks and redistribute keys if there have been significant turnovers in staff.
Inspectors
Inspectors may be employed full time or contracted from a security or consulting firm. The inspection function may be assigned to inspect facilities and vehicles for security effectiveness, signs of break-ins, damage to security equipment, functioning of security equipment, condition of locks, and other features essential to security. Inspectors may also determine that routinely. required security procedures are being completed properly, that equipment is properly secured, and that staff understands and can execute other required security-related procedures. A part of this function may also include taking regular inventories of parts and other equipment.
Supervisors
Supervisors may perform the majority of security-related response activities. They may patrol terminals, ride buses, and even perform minor plain-clothed operations by riding with operators on problem runs. Like the dispatcher, the supervisor wields the authority to authorize the vehicle operator to interrupt operations in response to an incident. Supervisors may typically settle arguments between operators and passengers, ask unruly passengers to leave the vehicle, or detain passengers until local police can respond. The involvement of supervisors in security response will be determined by the degree of violence experienced in the systems service area and the nature of the specific problem. In more serious matters, the supervisor may need to be present to gather facts, provide reassurance and direction to the vehicle operator, assist local officers as requested, and make decisions regarding the continuance of operations.
13
Citation Issuers
Although only sworn officers have full police powers, certain persons (security guards or other responsible staff) may be authorized to issue citations for fare evasion or transit-related local ordinance violations. Portable electronic devices are available to assist with this function. This function may be combined with other related assignments, depending on local regulations.
Spotters
Spotters are employed or contracted to observe the work of employees. They may ride a vehicle in plain clothes and observe the operator. Because the confidentiality of their identity is essential, spotters may be severely limited in effectiveness if they are permanent transit system employees.
Station/Terminal Attendants
Attendants at transit facilities have a variety of tasks that provide them with the opportunity to conduct security-related functions. In addition to any other operational functions, these can include observing closed circuit television (CCTV) monitors
watching fare gates and turnstiles
inspecting facilities for signs of security problems
patrolling the facility
making announcements regarding operations, safety, and transit rules
opening and closing facilities
completing reports on all security-related incidents
recording check-ins by security and facility maintenance personnel
requesting security assistance
14
Vehicle Cleaners
Many transit systems have employees who are responsible for fueling and washing vehicles daily. This staff can significantly increase the system s security by inspecting each bus for signs of vandalism each day and reporting it to the security department. They may either remedy the problem immediately (by cleaning, for example) or report the damage to a vehicle supervisor who may assign maintenance staff to correct the damage, issue a repair order, and/or remove the vehicle from service.
Dispatchers
Dispatchers in transit systems are primarily responsible for communication. When a dispatcher receives a call regarding a security incident, whether it is witnessed, in-progress, discovered after the fact, or suspected, the dispatcher must know whom to contact. Eventually, the dispatcher may need to contact many different persons including: transit security, local police, fire and rescue, a supervisor, administration, maintenance and other departments, and other operations staff. Proper training and judgment regarding when, how, and whom to contact - and in what order greatly enhances their effectiveness. They may also need to communicate with other dispatchers. Transit systems often have specialized dispatchers separately handling paratransit operations, fixed-route operations, rail operations,. transit police or security staff, power, and maintenance from the same central command facility. In a large transit system, a serious incident will rarely involve only one department. Radio dispatchers must also be able to work with drivers to defuse a worsening security incident that is in progress. Reinforcing the transit rules over a radio or loudspeaker can often provide onsite staff with sufficient support to relieve a situation. The ability of the dispatcher to effectively make operations decisions is also necessary, whether it be to authorize the driver to stop the vehicle or to dispatch another vehicle to the scene to continue the route after a serious incident.
15
Vehicle Operators
Operators on the road are the first line of defense, It is up to them to enforce transit rules
respond to complaints
defuse arguments
decide when to call for backup
maintain control of the vehicle
report all incidents
They must be familiar with how to handle the most common security situations. Furthermore, they must be given adequate support if they are to undertake the risk of policing the vehicle. It must be clear to them that the system will be ready to support their decisions and quickly respond if needed. Completing reports and other such responsibilities are more often undertaken voluntarily when operators are appropriately compensated for any additional time and provided with operational assistance as needed.
16
Equipment
Firearms
Most large transit systems with dedicated transit police issue handguns to officers. The decision depends upon the level of violent crime in the community and the powers afforded to the security staff. The training required should be significant. Transit systems that have experimented with concealed weapons attest to the value of clearly armed officers as a deterrent. The gauge and power of the firearms will depend upon the stopping power needed, funds, and local expectations. Shot guns are available to some transit police, but they are rarely issued or used.
Chemical Mace
Chemicals such as mace are commonly issued and may be appropriate for security staff without police powers. Mace has the ability to subdue assailants without causing permanent damage. A system may consider issuing mace to vehicle operators.
Handcuffs
Handcuffs are standard equipment for officers with police powers. They are used for detaining criminals and reducing risk during the transport of suspects.
Batons/Billy Clubs
Clubs are employed by officers for subduing violent assailants at close range and batons carry some value as a deterrent. The variety of uses for the baton are communicated to officers through special training.
Radios
The ability of an officer to communicate throughout the whole system provides some deterrence and increases the officer s morale and effectiveness. Radios provide communications capabilities for officers on patrol and are essential to effective response. The effectiveness of the radio, however, can be severely limited by dead spots in the coverage area. When underground or inside transit facilities, special measures are necessary to ensure full coverage. It is useful to provide security personnel with a separate channel from transit operations, especially if the security staff will conduct internal investigations. Officers rely on radios to summon backup, but the reception amplification must be controlled.
17
Infra-Red Goggles
Infra-red goggles can be purchased to enable officers to see in dimly lit or dark surroundings. Officers using these goggles in large rail systems report that their effectiveness is highly reassuring when entering darkened tunnels.
Bullet-Resistant Vests
The effectiveness of vests varies and significant differences among products do exist. Few transit systems issue vests as standard equipment but have them available as needed. The need for vests must also be based on the nature and frequency of violence.
Badges
Badges may be issued to all security staff, including security guards. The badge helps to identify staff and solicits cooperation. The pride associated with a badge maintains the morale and professionalism of the security staff.
Helmets
Helmets may be issued either for motorcycle or bicycle patrols or as disorder gear.
Keys
It is helpful to issue to transit police or security forces sets of master keys that allow them access to patrol the entire facilities for which they are responsible. This is especially helpful if they are expected to respond to alarms and calls for assistance from barricaded/locked areas. Security staff need not be provided keys to the entire system if their range is limited. It is helpful if similar lock cylinders are used to promote the use of master keys. Also, a large ring of keys is somewhat unwieldy and officers are already burdened by other equipment.
Disorder Gear
Riot outfits, including armor, shields, helmets, gas masks, and megaphones are not generally necessary for transit police, although select equipment may be helpful for non-riot purposes. Megaphones, portable barricades, and public address systems may be of some assistance in normal crowd control activities.
18
Vehicles
Patrol Cars
Patrol cars are often used to monitor surface operations, transport arrest persons, and deploy officers to remote areas. The cars are often unable to transport officers to the scene of a subway incident more quickly than the subway vehicles themselves, except when headways between trains are great or service has been suspended. Patrol cars allow officers to carry additional equipment and supplies and may provide more powerful radios than an individual could carry. Patrol cars may be marked or unmarked, although marked cars may be more useful for patrolling parking lots.
Motorcycles
Although motorcycles require a separate vehicle for each officer, they may transport officers to a site more rapidly than a patrol car. However, weather, shift lengths, and urban traffic may affect the officer s comfort and safety.
Bicycles
Bicycles allow interaction between officers and the public and allow officers attempting to reach a particular site greater access via shortcuts. Bicycles may also be transported on transit vehicles. Due to the limited speed and range of bikes, however, their effective use may be limited to large outdoor transit facilities or densely routed areas experiencing frequent security problems.
Transit Vehicles
Most officers patrolling rail systems will rely on transit vehicles for transport because it is useful to patrol the trains and the facilities at which they stop. By design, rail transport should be faster between points than any other mode. The ability of security staff to respond, however, depends on the headways of the system. Many systems expect that surface patrols or local police should also respond to rail incidents if they can reach the site faster. Decreased frequency of trips can require greater saturation by forces. Security staffride buses also, but it should be recognized that the response ability of security staff on board buses is extremely limited.
19
Buses travel the public ways and are, therefore, exposed to the myriad of external forces more so than rail, which is a closed environment. Also, back-up officers must often travel on congested city streets in order to arrive on the scene with assistance.
Foot Patrols
Patrols are entirely appropriate for guards assigned to a single facility, particularly if the facility is large. Patrolling yards and offices and guarding revenue transfers requires only initial transport to the site, for which public transit is probably available.
20
Qualifications
Basic qualifications may be established in any of the following areas:
On-going Training
On-going training Can increase the effectiveness of the security staff and provide an opportunity for the transit system to fine-tune the skills of the force to meet specific requirements. Such ongoing training can include the following: 21
operations
special weapons
new procedure orientation
handling the homeless
public relations and assistance
sensitivity training for assisting victims
inter-jurisdictional coordination
Security Training
Security training should not be limited to the specific security staff. All operations staff perform security-related functions and their effective response and daily security functions can be reinforced with refresher training and special courses. Other training can be aimed to protect transit personnel: for example, rape prevention training.
22
Uniformed Officers
Deterrence is one of the most positive values of a uniformed security force. As uniformed officers point out, crimes are not committed in front of them. This is one of the major arguments for and against a uniformed force. Uniformed officers may be favored because the presence of the security force is obvious to the riding public. While the presence of officers will prevent most transit crimes, a planned crime will simply take place when those uniformed officers are not present. The recognizability of uniformed officers provides higher deterrence, but sometimes provides reduced detection of crimes in progress.
Plain-Clothed Officers
Plain-clothed forces frequently have a reputation for generating higher arrest rates than their uniformed counterparts. They can be highly effective in responding to .a specific and recurring problem at specific sites, especially if the problem is repeatedly caused by the same perpetrators. Stake-outs can allow decoy patrols to wait and observe a crime in progress in order to intervene and make arrests. After some arrests have been made, the general knowledge that plain-clothed officers are active (without the specific knowledge of who they are or when they are operating where) can be a deterrent to habitual transit criminals.
Assigning Officers
Staff may be assigned to random patrols, regular patrols, a fixed post or a riding post. They may cover a combination of buses, trams, stations, and transit facilities. Staff may be on foot patrol or be assigned to a vehicle. They may be deployed to cover a broad area, a specific and small area, or saturate an area. Their task may be general or specific to certain sites or problems. Regardless of the assignment, however, all officers should be available as needed. Coordination should be handled through a single dispatcher. Security officers face the same dangers as the riding public and transit employees. Teams of two are common. Serious consideration should be given to assigning officers to single patrols. Systems using single-officer patrols often report low morale and limited effectiveness. It is
23
difficult to radio for assistance while pursuing or attempting to subdue a suspect. Single patrols may be considered for locales where the level of danger is determined to be very low. It is sometimes possible to increase coverage and decrease costs by pairing patrol officers with canine forces. Trained dogs have exhibited highly effective complimentary skills, and they are less costly than a second officer. Surface patrols, on the other hand, often require three or four officers to a team: two or three in plain-clothes riding on a bus, and one tailing in a patrol car.
24
citations are made for transit crime of all types and levels. The effect of these sweeps has been known to last many weeks. Sudden surges in crime levels often require officers to work additional hours. Many systems find it useful to maintain agreements whereby additional officers may be temporarily drawn into transit service from a pool of other officers, whether from local police forces or a private security firm. Most officers are familiar with the frequent need for overtime service, but excessive overtime hampers performance and morale. Some systems find that assigning officers to four-days-on, three-days-off schedules help counter these effects. By far, the most important element of deployment is the availability and use of accurate and upto-date information on security incidents, which can often minimize the time and effort spent in trying to resolve incidents. Handling problems from a lesson-learned vantage is key to preventative/proactive policing. The deployment of officers must be extremely flexible so that staff may be deployed to wherever the most recent problems are occurring. After prevention, nipping problems in the bud is the most effective a security force can be.
25
sharing information
agreeing on roles, responsibilities, and jurisdiction
setting up communications
cooperating during training exercises, and operations
sharing security resources (equipment, vehicles, facilities, and computer information)
The coordination agreements established between the transit system and the local police department will depend on the level of responsibility for security that the transit system assumes for itself, its ability to exercise internal security, and the authority granted by the local jurisdiction. Each must examine its individual circumstances and then come to an agreement with the local police on a security cooperation policy.
communications systems of the transit system and police department to interface should be in place. It may not require full compatibility, but there needs to be a method to patch the two systems together. Communication forms the basis for coordinating the response and is vital to success.
Training Many opportunities exist for joint training exercises between the police and transit security forces. There is a need for the police to become familiar with the operations and facilities of the system in addition to any special hazards or operational restrictions. Activities such as working in tunnels, dealing with the third rail, and other unique aspects of operation should be familiar to police officers. Training of the transit system s security personnel should include a similar effort to learn about the operation of the local police department. It will be important for security personnel to know
All of these activities will help both forces work together effectively by building mutual respect for each other s roles. Shared Resources On occasion, sharing resources between the police and the transit system makes sense. Opportunities for sharing can include vehicles, communications equipment, barriers, personnel protective gear and other items. These opportunities should be reviewed periodically to see if any new possibilities exist. There may be opportunities to use networked computers to share transit information about suspects and vehicles.
27
Long-Range Planning Planning for inter-force cooperation is important to long-term efficiency. The police will have an interest in plans to expand transit service that in turn will require additional support to protect new assets and enlarged rights of way, and other aspects that impact police planning. Similarly, the system security department needs to know how the police plan to handle problems associated with drug dealing, prostitution, assaults, robberies and other types of crime that may occur on transit property. Of mutual interest will be staffing plans, training opportunities, plans to add additional security assets such as alarm and communication systems. Cooperation in long-range planning can set the stage for cooperation at all levels and set the example for the rank and file security personnel to follow.
28
Media People s perceptions of transit security are often conditioned by reports in the media. Media coverage tends to emphasize the crime, rather than how safe the system is and how most people actually ride in safety. Media reports of increased transit crime do not include information about increased ridership or overall levels of crime throughout the municipality. Media reports and sensationalism of particular crimes may contribute to an overall public perception of a lack of 2 security on transit.
29
Demographics Women who are often at a physical disadvantage to their perpetrators, as well as the disabled and elderly, are likely to perceive a lack of security. Ethnic minorities are likely to fear racially motivated attacks. Most surveys indicate that the perception of the potential for crime is heightened during the hours after dark, across all demographic groups. Among those who do not 3 use transit, there is a much higher number of people who perceive that the system is unsafe. Preceived Trouble Spots Poorly lit areas and areas where people cannot be seen are perceived to be unsafe. These include
Surrounding Neighborhood The neighborhood around a station or bus stop will affect perceptions of security. Most people feel secure in their own neighborhoods but might not feel secure in another, nearby neighborhood. This is particularly true when each neighborhood has a predominant ethnic group. Many people use the transit system because it is more convenient or more cost effective than other modes of transportation. These people will be even more inclined to use the system when security is not a concern. Studies have shown that the most important factor influencing the use 4 of city transit is crime, even more so than fare levels or scheduling. It is clear that a system can improve its ridership and fare box revenue by improving security throughout the system as well as by concentrating on particular problem stations and areas.
30
Standardized equipment at all stops, such as fare machines, turnstiles, doors, gates,
escalators, and layouts can reduce the number of unknown elements. Provide easy to use and clear instructions on all equipment. Help passengers to go directly to their platform or stop and be certain that they are boarding the right vehicle by providing sufficient information, signs, directions, and schedules.
31
Aesthetics Dirty stations, graffiti-marked walls and vehicles, trash, physical deterioration, and other unpleasant environmental attributes can detract from the perception of security. It is easy to consider the physical environment as a sign that the transit system is not capable of maintaining its facilities and may be lax in other areas. Passengers also tend to feel more secure in facilities that are aesthetically pleasing, with paint schemes, decorations, even art work, than in dingy, gray facilities, no matter how clean.
32
Passengers will not feel secure if they must enter a station from a deserted alley or if they
must walk through a tunnel with turns around which someone could be hiding. A bridge over the tracks is more visible than an underground tunnel. Stairs can be left open rather than walled. Open fences improve visibility in comparison to walls. Corridors inside the facility need to have as few turns and barriers as possible. Mirrors are important security measures so people can see around. comers.
Maintaining a Facility
Maintaining a facility is an important factor in increasing security. Aside from the importance of regular housekeeping (such as removing trash and keeping equipment in operation), it is important to remove quickly all evidence of vandalism or graffiti. This demonstrates the responsibility and responsiveness of the transit system. The presence of graffiti or other vandalism will suggest that the transit system is not concerned about the facility or about the passengers.
Improved lighting can be installed and the facility can be kept clean.
All equipmentshould kept in working order.
Broken fare machines, escalators, or other equipment can easily give the impression that
the station is neglected and that passengers enter without protection from the transit authority. Keeping out non-paying loiterers, youth gangs, and derelicts can eliminate some of the noise, dirt, and maintenance problems.
33
Sensory Aggravation
Sensory aggravation includes anything that is annoying to the senses, increases tension, gives the impression of a system that does not care, and increases the perception that a facilityor route has been neglected by the system. Odors give the impression of poor maintenance and cleaning.
Noise due to poor acoustics, loud passengers, or radios can be irritating.
Dirt is an irritating problem.
Not being able to sit on the benches, lean against the walls, or hold the handrails all
contribute to the passenger s discomfort and the feeling of vulnerability.
34
Visible Patrols
Most passengers prefer to see patrols. One study showed that more that half of those surveyed supported the increased use of the transit police as part of a crime prevention program. Bus 7 passengers place more emphasis on transit police than those who do not ride the bus. Uniformed officers on the bus lend a visible presence that increases the perception of security. At the same time, the potential offender is aware of the immediate or general presence of transit police officers and may be deterred from committing crimes, at least while the officer is present. Many systems use a focal point allowing the staff to be seen and for passengers to understand that they are being observed. The focal point can be a simple glass booth. At high crime stations, the focal point has been used to monitor the surveillance of areas of the station through CCTVs and to monitor the equipment associated with the alarm points in the station. The important point is that the staff member or members who are watching the monitors are highly visible to those in the 8 station. Passengers and potential offenders know how close and how observant staff are. Cameras, monitors, photography equipment, sensor monitors, etc. need to be visible to both passengers and potential offenders. Offenders will have a tendency to avoid those who are being observed by the cameras. The cameras alone, however, are not as effective in fostering a perception of security as the combination of visible cameras and visible transit staff.
Passenger Reporting
Many systems experience success with passenger reporting programs. Such programs generally involve two major commitments from the system: (1)a comprehensive public relations campaign, and (2) a commitment to those reporting the incidents. It is also important for passengers to feel a low risk. Passengers must feel that they can be anonymous. Some systems have set up a process assigning reporting passengers a code number. As success with the passenger reporting program increases, the public relations campaign can measure the number of arrests, prosecutions, convictions, or rewards that have resulted from passengers reporting observed security violations. The public relations campaign will be noted by potential criminals who will feel less confident undertaking criminal activities when there are people present. This makes each passenger a de facto security guard with a minimum risk.
35
Community Relations
It is a basic tenet of crime prevention that the participation of citizens is integral to success. In areas with tenant associations, neighborhood watch activities, and general citizen alertness to crimes, there is a tendency for criminals to be discouraged. Transit systems can tap into the resources in a community and extend them to include concern about the security of transit and an awareness of the community role in transit security.
Bike Patrols .
Bike patrols can improve mobility, provide quick response to emergencies, and allow time to. communicate with passengers.
School Programs
Many systems have specifically targeted efforts at young people in the community as a means of preventing crime. Systems should not think of youths as potential troublemakers. They should think of them as future riders, employees, and community leaders with a stake in the security and continuity of the system. 36
Many systems have slide shows, films, and presentations directed at various age groups which provide information to students about the system, its role in the community, and its value to them. Other activities can include giving tours of the transit system
distributing coloring books with transit safety messages to younger children
using local celebrities and athletes to promote good behavior on and off the system
contacting student leaders for their support
using retired vehicles as teaching locations
Media Relations
Public perception of security is influenced by newspapers, television and radio. The system should establish a strong relationship with the media to provide publicity for fare or policy changes, current information on delays or schedule changes, and other information that needs rapid, widespread dissemination. The system needs to be ready to release factual and forthright information when an event warrants it. It is important to have an individual who primarily talks with the press and who is in the chain of command for an emergency. Transit systems should have an interest in making sure that events receive non-sensationalized treatment.
Most systems need to have one person or office who works with the media so that all reports are reliable and accurate. Some systems establish regular contact with the media through scheduled luncheons, periodic news conferences, and other means of direct communication.
Passenger Relations
Operators and fare collectors are the front line. Their professionalism to help maintain a safe and secure environment, confidence, and helpfulness will contribute to a positive impression of the transit system. Training in passenger relations should include the following skills: maintaining professionalism through words, actions, and attitudes
37
Guardian Angels
Guardian Angels operate in various cities around the country. They patrol streets, housing developments and transit systems. They appear to be successful at preventing crime, but the overtone of vigilantism is problematic in some communities. Transit systems do not enter into agreements with the Guardian Angels.
38
Remedies
The following remedies to the design features identified above should be addressed:
include design features that do not impede adequate surveillance of passenger areas,
entrances, unattended areas, and operational areas
39
40
Step 1: Assessing the Current Situation A first step is to assess the current situation and ask the following questions: How well is access limited to passenger areas in the facility? It is important for the entrances to the facility to limit access to the criminal element. Limit access to the facility to paying passengers only. Have sufficient countermeasures to fare evaders, including sufficient barriers surrounding the facility. Limit the number of entrance and exit points to and from the paid fare areas. How accessible are major security features of the facility? Booths, emergency or courtesy phones, and other security items should be close to the major corridors and paths. Ideally, such features would be near all passenger paths in the facility and staff facilities would also be in clear view from most parts of the facility where passengers wait or congregate. Are all areas visible from the fare booth or kiosk or through surveillance cameras? Systems should attempt to ensure that all areas are visible either through surveillance equipment including fare collection, passenger waiting or by direct supervision by transit staff. All areas- areas, corridors, and platforms - should be visible for supervision by the transit staff. Survey the facilities for areas that are blocked from view by walls, obstructions, insufficient lighting, or other obstacles. Determine what areas need additional supervision of surveillance cameras because staff is not in a position to directly supervise them. At bus stops and shelters, identify any areas that are blocked from the view of the bus operator when he/she is approaching the stop. Transparent materials for the shelter walls and gaps in other walls offers more visibility. Assess stops and shelters for the proximity of shrubbery and other features that are not necessarily the responsibility of the system. Is lighting adequate in all areas? Poor lighting offers protection for criminals to hide or engage in illegal activities, inhibits surveillance and the ability to discern legitimate from illegitimate activities, and makes it more difficult to apprehend offenders because witnesses will not be able to adequately identify them. Adequate lighting also includes lights in hard casings so they will not be easily broken or disabled. It is important to have some redundant lighting so that if one light is out, there are others to illuminate the area. At bus stops and shelters, passengers waiting at an unlit stop or shelter are at particular risk from crime in the neighboring streets. When a bus stop is not adequately lit, those with other transportation options may select them. In this way, poor lighting could consistently discourage ridership and revenue. Are there stations or routes with insufficient passenger volumes for security? Since passengers tend to feel that a critical mass of passengers is necessary for a sense of security,
41
those stations with low ridership, particularly in the off-peak hours, would be perceived as not being secure. What modes of transit are more secure than others? In general, surface and elevated stationsare often more secure than underground stations. Assess crime incidents to determine the least secure modes and concentrate on improving them. What is the neighborhood in the vicinity of the facility? Transit crime is often a reflection of crime in the community. Suburban stations tend to be more secure than urban stations. Stations in residential areas tend to be more secure than those in commercial areas. Stations in areas with-lower land use density tend to be more secure than those with a higher land use density. Stations where there are no parking facilities may be more secure. These items cannot necessarily be altered, but the security differences need to be addressed. Systems need to concentrate on the facilities that do have or are more likely to have security problems due to the surrounding community. Step 2: Anticipating Crime Problems Anticipating crime means determining how much crime a facility is likely to experience and at which locations, in addition to what kinds of crimes are likely to occur. Try to anticipate when crimes are likely to occur and under what types of circumstances (night time, off-peak hours, or special conditions, such as when there are crowds from special events or during rush hour). Some indicators are:
Step 3: Establishing Goals and Identifying Countermeasures Once facilities are assessed and expected types and levels of crime are identified, set security goals and identify potential countermeasures. Potential goals may include:
42
Ensuring Adequate Surveillance of Key Areas of the Transit Facilities Evaluate which areas of the facilities are inadequately supervised and what methods are most appropriate for increasing surveillance. CCTVs can be used to monitor areas where there are no patrols. Lighting can be improved where it is lacking. Increased patrols and police supervision can cover other areas. Eliminate obstructions to the line of sight. Controlling Accesses and Exits Many systems have found that controlling access to the station by moving fare collection close to the entrance can reduce some of the potential for crime. Although those entering the system to commit crimes will have a tendency to evade the fare, forcing them to do that before they have access to passengers enhances the risk of their getting caught before they have committed another or more serious crime. For maximum effectiveness, the fare collection areas need to be under close surveillance. Multiple exits gives offenders more opportunities to evade capture, making the facility a more inviting area of operation for criminals. To fully control access and exit, consider the viability of plans to move the fare collection area and subsequent ramifications for other parts of the facility. It is possible to limit some entrance and exit points during certain times of the day. The following are a variety of ideas for limiting entrances and exits:
When stations are not in till use, such as off-peak hours, certain exit and entrances can be
closed.
Exits and entrances can be closed permanently. Exits and entrances can be equipped with emergency alarms so that their use will set off an
alarm. Exits and entrances that are not frequently used can be the subject of extra surveillance, either with cameras or through additional patrols in the vicinity. Minimize Exposure Time of Passengers to Possible Crimes Exposure time is the amount of time passengers are vulnerable to the possibility of crime while they are in the system. Crimes tend to happen while passengers are moving through facilities and waiting for vehicles. For the most part, exposure time can be minimized by reducing the distance between features of the system and reducing the amount of time passengers must remain at each major function area. Fare collection needs to be simple and machinery and equipment must operate at all times. Clear instructions will help passengers complete the process as quickly as possible. Increasing service frequency and running scheduled service on time can reduce exposure time. Ensuring Adequate Communication in the Facilities and With Vehicles Communication is necessary in facilities and vehicles. Radios, walkie-talkies, emergency phones, etc. must be easy to locate and use. Be sure instructions are visible. Securing Transit Property Trash receptacles, system maps, display racks, and other useful items are typically attached to the facility itself so they cannot be stolen or destroyed easily. The most vulnerable items, such as
43
surveillance cameras or monitors, need to be kept out of reach. Cameras can be put high on the ceiling or over tracks. Monitors can be- kept in locked booths with safety glass and personnel supervision present. Consider unbreakable window materials, special seat fabrics, seats without fabric, graffiti-resistant surface materials and coatings, and other design features. These materials will either prevent vandalism because they cannot be easily destroyed or make repair and cleaning easier because the surfaces resist the damage. And consider physical construction designs that are easy to repair due to modular construction or other design features. For example, benches and seats in which one unit can be removed are preferable to those in which the construction is unified and damage can only be repaired by replacing the entire bench. Quick clean up and repair have already been demonstrated as effective in controlling vandalism. Ensuring the Ease of Use of the Facilities Passengers will become familiar with equipment at one location and will be confident with it when they use it at another location. Maps in stations should always be located in the same place relative to the station entrance, fare machines, or personnel booth. Escalators, elevators, stairs, and other necessities should be located in predictable locations throughout the system. Systems should post adequate signs to provide instructions and directions Directions to particular platforms, exits and other features need to be clear and be placed at all necessary locations. Passengers wandering into unsupervised areas of the facilities present a risk to themselves and a challenge to the transit system to protect them. Enhancing Perceived Security By incorporating positive security factors, systems can improve perceived security and increase ridership. The positive features added to the system candiscourage offenses. Transit systems should consider perceived security as much as real security as a part of any planning procedures and security strategy: (See the earlier section on Perceived Security.) Step 4: Evaluating Possible Countermeasures Each potential countermeasure should be evaluated in terms of its
effectiveness
cost
design implications
feasibility and flexibility
The effectiveness of a countermeasure can be determined by considering the most likely types of crimes that may occur in a particular facility and the effect that the countermeasure will have. For example, crimes perpetrated by homeless persons may be deterred by a countermeasure that goes through great and expensive lengths to limit access to those who have paid a fare. However, if the
44
crimes are vandalism committed by school students who have transit passes, the countermeasure will not address the actual source of the crime. Countermeasures embody the installation and operational costs, including the acceptance by the users or operators. Some countermeasures may not be feasible within the design of the facility without significant alterations. It might not be possible to remove all support columns that obstruct visibility. Some surveillance methods would require high ceilings and sufficient light and if not structurally viable, those methods would not be feasible. Step 5: Considering Limits and Constraints Financial and community concerns, employee and passenger considerations, and the on-going need to provide convenient service to all members of the community should be considered. Since crime may be higher in some neighborhoods than others, success in ensuring security will be limited by the area in which the facilities exist. Some existing facilities may include features that make it very difficult to ensure security. Larger facilities that serve more than one route or mode will have more spaces, corridors, and entrances and will have more impediments to implementing security measures. Such limits and constraints must be acknowledged when planning changes to a facility. When new facilities are designed, planners can seek means of including flexibility and reducing or eliminating potential barriers to personal security. Step 6: Considering Tradeoffs and Other Factors Systems must be concerned about safety, convenience, costs, comfort of passengers, and the needs of the community in general. It is necessary to consider the tradeoffs in safety that some security countermeasures may entail and to consider the comfort and convenience of passengers. The design of a facility may include fire walls and access areas for emergencies. Changing their design or function in the interest of security could result in increased risk. Transit security is one part of the overall transit system and each consideration must be weighed for its total value and effect before final decisions are made. Step 7: Establishing Countermeasure Strategy Once the possible crimes are identified, various countermeasures considered, and the constraints and tradeoffs calculated, most systems find that they need to implement at least minimum security measures, such as lighting and surveillance measures. Many systems choose to concentrate on particular facilities which experience high crime rates or on particular types of crimes that are either the most serious, or most frequent. Those measures that increase perceived security will usually increase actual security. When perceived security is improved, ridership and confidence in the system can increase, thereby adding to ridership and increasing the actual security that occurs from adequate numbers of people to deter certain crimes.
45
Bus Stops
Countermeasures That Can Deter Crime
Bus stops require countermeasures that can deter crime related to both the transit system and the street. Bus stops should be
lit at night and properly placed for security considerations. located on busy streets and not off the main flow of traffic. Occasionally bus stops at
interchange points are placed at different positions in order to maintain the traffic flow. The placement for traffic flow should not compromise security.
positioned near the main sources of passenger traffic, whether a shopping center, office
complex, or other source. The waiting passengers should be in full view of the busy areas,
situated away from areas with a lot of liquor stores, flop houses, bars, strip joints or other
similar businesses which attract undesirable people and activities such as drug deals, etc.
some distance from shrubbery, walls, or other areas where people could be hiding. Some
systems have found that bus stops located close to parks experiencing crime in the night hours are stops where there is a particularly high rate of crime. Offenders are able to wait in the darkness of the park until there is someone alone at the bus stop.
designed so that the bus operator can see passengers waiting or anticipate potential
danger. Some transit systems have considered installing emergency phones or lights at bus shelters where there is a high crime rate. Shelters can be equipped with alarms that activate lights on the exterior to alert a passing police patrol. The main problem with such alarm systems is the potential for false alarms. Emergency phones are less prone to such occurrences if the personnel receiving the call can adequately screen it for false alarms. Another problem is that activating an alarm or calling for assistance has the potential to aggravate an assailant and further endanger the victim.
46
Guideway/Track/Right-of-Way Design
The tracks and guideways of transit systems must be protected against the encroachment of pedestrians and vehicles except at designated areas with appropriate safeguards. Access is necessary at stations and stops, but it should be regulated so that passengers approach at boarding areas only. Embankments, fences, guard rails and walls can be used to prevent access to other portions of the track. All the tracks and guideways need to be grade separated to completely prevent access. Underground and elevated portions of the system alleviate most grade separation requirements, but all portions need to be at a different level than roads and pedestrian pathways. For the safety of passengers and for the security of the system, it is generally necessary to use overpasses-or underpasses to allow pedestrians to cross the tracks. Walls, embankments and fences can prevent pedestrians from approaching the tracks from near the underpass or overpass. At-grade/open cut trainways can be made more secure with fencing and access gates which can be opened by transit and/or law enforcement personnel. An adequate level of lighting along the surface portions of the trainway is also critical. Adjacent street lights may not exist or may provide insufficient illimunation to maintain a secure environment. Physical barriers placed along the right-of-way or some type of detection and alarm system should deter those attempting to tamper with the switches, drop items on the tracks, throw items at the vehicles, or hang dangerous objects in the vehicle s path. Overpasses should have sufficient high fences or walls with barbed wire at the-top. In some areas fences can bend away from the tracks at the top to prevent individuals from scaling them or from being able to easily throw objects over them.
47
Exterior Design
Assessing the Neighborhood
Consider the neighborhood and community. The entrances should face main street and the main sources of passengers. Passengers perceive much more security in their own neighborhood than in another, even if the neighborhoods are adjacent. If there is a station located at the convergence of two distinct types of neighborhoods, perceived security could be increased if there were an entrance opening onto a street in each neighborhood. In this way, passengers would not have to leave the familiarity of their own neighborhood to use the facility.
Evaluating Approaches
Passengers approaching the station should see all that is ahead of them so that they can avoid any risks. That includes ill-lit tunnels, tunnels with blind turns, entrances in alleys, and walls and barriers that passengers must circumvent, Consider bridges over tracks rather than underpasses. Stairs may have fences rather than walls so that those on the stairs can be seen. Consider removing any unnecessary walls or other barriers. Fences can serve the same purpose. Entrances are best if they face the main street or the main activity center (shopping center, office building, etc.).
Eliminating Barriers
Barriers that prevent entry to parking lots or other areas can include gates that are opened when the fee is paid or other means of controlled access. Fences that protect the facility do not have to impede the access of passengers approaching through the main entrance, driveway, and parking areas. Areas used by passengers should be open and visible. For example, a fence around the perimeter of the facility would preclude entry from the rear or other unobserved locations, and all access would be from the opening in the front which is well-lit and unobstructed from view on all sides.
Considering Landscape
Landscape schemes must avoid any formations that provide suitable hiding places for offenders.
49
Maintain a clear area between the facility and the outer area for visibility. The landscaping
design can also be arranged so that it does not obscure any lighting on the area. Landscaping features can also be used to form natural fences around the facility. Close-growing shrubbery can be an effective and/or perceived barrier to an offender who is attempting to enter the vicinity or attempting to escape by deviating from normal pedestrian patterns.
50
Booths for transit personnel to. sell or collect fares, information booths, or posts for station attendants or security guards are most effective if placed in a location that allows direct observation of as much of the facility as possible. Booths may house
Monitors for CCTVs should be placed within the booth in such a way that passengers can note their presence. Such booths require strong doors and locks,, bulletproof glass, or other glazing with bank-teller-type service windows. If security is not a significant problem, staff may leave doors open to interact directly with passengers.
Entrances are safe if they can be aligned with an area within the facility that experiences high traffic. Alternatively, the entrance may be very wide. The idea is to create a line of observation from outside the facility => through the entrance => into the public area of the facility. In some areas this may require clear doors and walls. Gates and solid doors can be used when the entrance is closed. One security countermeasure involves closing some entrances in evenings to limit the areas that must be supervised. In such cases, the entrance should be clearly indicated as closed at a point before approaching passengers are stopped at a locked door. Some systems use colorcoded lights at all entrances to indicate their open/closed or exit/entrance status. Although expensive, it is also possible to construct entrances that can be opened and closed by remote control from a personnel booth or even central control.
Fare Boxes/Entrance Gates To limit access to transit facilities to passengers only, fare collection gates should be located as close to the entrance as possible. Fare boxes are often subject to vandalism by those attempting to 51
steal fares. The theft of large volumes of fares can usually be deterred by investing in stronger vaults. Fare evasion can be reduced by making it more difficult to circumnavigate the collection point. Jumping over turnstiles can be reduced by using high-channel turnstyles and floor-to-ceiling type gates. Full-height revolving gates are particularly useful at points that are strictly exits; however, they may worry passengers because it is possible for passengers to trap themselves within the revolving gate. Direct observation of the fare collection point from personnel booths is a common practice.
Telephones
Telephones for the public serve as an amenity and security device. Passengers recognize the telephone as a potential means of calling for help. Even if someone is being assaulted and is unable to dial 911, the potential exists for someone else to call. Telephones also assure passengers that if they miss a transit vehicle or their ride, they have the opportunity to call for a taxi or another ride. Likewise, passengers arriving later than expected can call for a ride if they become worried about walking alone in the evening. Telephones are, however, subject to the same potential vandalism as other equipment and must be safeguarded and maintained.
An area close to the entrance can be set aside as a safe waiting area. Such an area would be clearly marked for use during certain hours and should be supervised by transit personnel. The safe waiting area is shared by all passengers who would otherwise be waning in separate locations. Such an arrangement must include a means of notifying passengers when their vehicle is approaching with sufficient warning to allow them to reach the boarding area before the transit vehicle moves on. As this requirement must be met for all passengers, including those who may be slow-moving due to age or disability; it is most helpful if the number of minutes before vehicle arrival can be communicated.
52
Mirrors
Mirrors are successfully used in facilities with blind turns. They allow passengers to avoid potential assailants. Mirrors can be subject to vandalism, so polished stainless steel usually works best because it resists damage and can be cleaned easily.
Windows
Windows and glass walls can be highly useful in increasing security where some divider must exist. The greatest problem with windows and clear dividers is the potential for vandalism and illegal entry. Increased thicknesses, synthetic/plastic glazing, and wire reinforcement can increase the strength of the glazing, to the point that illegal entry is virtually precluded. Stronger glazings are, however, more expensive. The use of many small windows placed out of reach, or windows made of glass bricks might also reduce breakage and entry. Windows can be equipped with various alarms to minimize or prevent the effects of entry, but the alarms will not protect the window.
53
Architects can help select the most appropriate types of doors for a specific site. A transit system must be able to change locks after significant turnover of personnel and must be able to designate various levels of access. Security forces should be able to move quickly through most doors in order to respond to alarms or pursue suspects. Various options other than metal keys are available to control access, including magnetic cards and remote release by a second party.
Barriers
Doors, walls, windows, fencing, barbed wire, sharp changes in elevation, gates, and portable barricades are all options for preventing or controlling access between areas. In many cases, the most obvious choice of these options will not provide the most security. For example, although opaque barriers (walls) are perceived to be the most secure in terms of privacy, there are cases where an unobstructed view may better increase security.
Alarms
Alarms can notify staff or emergency personnel of fires, unsafe conditions, unauthorized entry, and other conditions. Silent alarms are appropriate when a victim would be placed in even greater danger if the alarm were to be activated or the capture of a criminal is of greater importance than the protection of the person, area, or equipment guarded a rare situation. Alarms related to security and intrusion detection should normally notify anyone on site as well as remote staff when they are activated. A list of some of the different types and features of alarms, many of which can be combined, is shown in Table 2. Table 2. Types of Alarms
54
Emergency Boxes
Trains should be equipped with emergency call boxes, central controls, or simple-to-operate intercoms to allow communication between all passengers and the operator. The location of the intercoms should be visible from any point in the car. Two-way capabilities allow transit staff to reassure passengers, request specific information, and provide instructions.
Advertising Placards
Advertising placards show concern for security. They also promote programs such as immediate cleanup and repair, passenger reporting programs,. and community relations programs. This information can reduce travel anxiety and increase the speed with which passengers move through the system.
Mounted Cameras
Some systems have experienced success with mounting cameras within a vehicle to photograph a crime in progress. Although the primary value is to identify the criminal, the visibility of the camera can deter crime. The cameras themselves must be protected from vandalism.
Aerial Surveillance
Large, clear vehicle identification markings on the roof of the vehicle can aid in aerial surveillance in the event of a hijacking, hostage situation, theft, or in following a vehicle that is experiencing problems.
55
56
Endnotes
1. 2. 3. 4. R. Shellow, et al., "Improvement of Mass Transit Security in Chicago," Transportation Research Institute, Carnegie-Mellon University, Pittsburgh, PA, June 30, 1973. U.S. Department of Transportation, Urban Mass Transportation Administration, Case Studies of Transit Security on Bus Systems, August 1983. Lynch, G. and S. Atkins, "The Influence of Personal Security Fears on Women's Travel Patterns," Transportation, 15:257-277, 1988. Austin, Thomas L. and Eve S. Buzawa, "Citizen Perceptions on Mass Transit Crime and Its Deterrence: A Case Study," Transportation Quarterly, Volume 38; Number l, January, 1984. Andrle, Stephen J., Barry Barker, Marvin Golenberg, "Security Considerations in the Design and Operation of Rapid Transit Stations," Rail Transit Planning and Rail Stations. Transportation Research Record, Number 760, Transportation Research Board, 1980. Richards, Larry G. and Lester A. Hoel, "Planning Procedures for Transit Station Security," Traffic Quarterly, Vol. 34, Number 3, 1980. Levine, N. and M. Wachs, Factors Affecting the Incidence of Bus Crimein Los Angeles; U.S. Department of Transportation, Chapter 6, "Perceptions of Bus Crime Prevention," January, 1985. Swain, David, "A Study of Preventative Measures Applicable to Public Rail Transport," Proceedings of Seminar C, Transport and Planning 16th Summer Annual Meeting, September, 1988: Richards, Larry G., and Lester A. Hoel, "'Planning Procedures for Transit Station Security," Traffic Quarterly, Vol. 34, Number 3, 1980. Ibid.
5.
6. 7.
8.
9. 10.
57
Chapter 2
Security Issues
This chapter discusses ways in which a system can respond to criminal activities. It includes: Security activities from the start of the incident to its closure => its review => followup => evaluation => reporting. Special considerations of communications, interaction with law enforcement agencies, record keeping and reporting, and on-going system refinement. A brief discussion of the role of procedures in a comprehensive Passenger, vehicle, and Facility System Security Plan. Also discussed are different types of crime and ways to assess the degree of danger inherent in the situation. A range of activities is listed that can be conducted in different sets of circumstances. This Guide does not dictate the response for any given system because each transit system will have its own policy concerning security responsibility and authority. However, it suggests ways to formulate the response policy and implement it through training. There is a short discussion of high technology equipment to help support the system staff in its response to crime.
59
Immediate Response
The Need for Immediate Response
Criminal activity poses a number of serious questions concerning how a transit system employee should react. An employee can be faced with such a broad array of possible crimes that no set of rules can accommodate all situations. The crimes security employees see can range from loitering, drinking or smoking, trespassing, assault, robbery, and sexual assault to murder. The response of each will vary. The objective of the initial response is to control the situation. Each system needs to tailor its own approach to security response based on the size and authority of the organization, the community which it serves, and the degree of responsibility it accepts for its own security. Variables include
The average employee, as well as the security personnel, has specific responsibilities when observing criminal activity. Each of the following factors plays a role in how the transit employee is expected to respond when he/she observes criminal activity.
The first step in responding to a crime is observing it. The person to observe a crime first will often be a passenger or an employee. The actions of the initial observer can have a major impact on the outcome of the incident. Thereare three basic options to a person who observes a crime. He/she can 1. do nothing 2. go for help 3. try to intervene The action taken should depend on how the observer is trained (e.g., motorman or security personnel) and what he/she observes. The objective is to stop the crime and prevent it from escalating.
60
Categories of Crime
The observer must base his/her reaction on the seriousness of the criminal activity taking place. The degree of criminal activity ranges from low (eating or smoking in an authorized area) to high (someone being robbed at gunpoint). A non-security employee may be able to intervene in the non-violent criminal activity and successfully stop it but would be ill advised to intervene in a violent crime. Crime can be divided into four categories: Category 1 Crime non-violent, non-destructible violations (quality of life infractions) non-violent, destructive behavior violent, theft-related violent, assault-related Description eating or smoking in authorized areas, loitering, etc. fare avoidance, defacing system property, pickpockets robbery with a weapon assault, fights, murder
2 3 4
Assessing Risk
The decision to intervene comes down to judging the degree of risk. Staff members should take charge of a security breach which may mean coping with a dangerous situation. Concern 1: Risk to Employees Employees should take whatever action will delay or end the criminal behavior without putting themselves in danger. One option is to send for help after taking low-risk actions to interrupt the criminal activity. Concern 2: Risk to Passengers System employees must keep passengers safe from harm. That does not mean risking their own lives, but it suggests cautious actions that delay or reduce the seriousness of the security incident. Concern 3: Degree of Danger The amount of violence in the community will have a direct impact on the advisability of transit employees intervening in criminal incidents. It is important that the system and its employees recognize this and that employees are trained to take appropriate action to protect passengers, employees, and the system from criminal activity.
61
Concern 4: Risk to Equipment and Facilities Transit system property is important to the proper operation of the system and should be protected from a wide variety of threats. The simple act of quickly removing trash, litter, damage, or graffiti will help to cover the incidence of this type of activity. However, property is of lower priority than other considerations when trying to decide how to respond.
Actions
Minor Violations In the vast majority of cases, criminal activity will only involve some sort of minor violation that can be corrected with a simple comment or direction to the offender. However, these activities can cause problems if they are overlooked routinely or if there is an overreaction by security personnel. System employees should be trained to handle these situations routinely and consistently. Problems occur when the public perceives that someone is being singled out unfairly, that the reaction of the system is more heavy handed than the incident warrants, or if enforcement consists of empty threats. More Than Violations In cases where interrupting the activity may require more than a reminder, the judgment of the transit employee comes into play. It is not the responsibility of the employee to apprehend the Criminal -it is only to stop the. activity. Some actions are less risky than others. If the risk to the employee is high, there may be other indirect ways to intervene. In some transit systems, the security personnel are trained to handle more than minor violations. Interrupting the Activity The employee can call out from a safe distance or use a public address system to let the criminal know that the crime has been observed. Whatever approach is used, the point is to stop the activity as soon as possible and worry about catching the criminal later. The employee can say that
If the system employs security personnel, persons suspected of a crime can be detained by the security department. It is important that other employees do not merely observe a crime while waiting for the security or police to arrive and catch the offender. Although it is not the role of the non-security transit personnel to become the enforcement authority in a confrontation situation, they should keep in mind that their first responsibility is to
62
think of ways to stop the crime, ifpossible, without endangering their lives or the lives of others. They should summon the appropriate personnel (e.g., police, transit police, security department, or other transit employees) that are trained and equipped to handle the situation. Employees should not assume the wrong role in a confrontation with an individual. An example of the wrong role is standing between the objective of the confronting individual. Notifying Security Forces Shortly after discovering the incident, the employee must make a decision when to alert the system that an incident is taking place. Several factors come into play in this decision: how easy it is to communicate with security
how threatening the criminal incident is
how much danger the employee or passenger is in
whether the employee can resolve the incident without help
Notification can take place in the form of pressing an alarm button, calling on the phone or radio,
or simply shouting for help if others are near. If the employee can bring the incident to a safe
conclusion alone, it is still necessary to let someone else know that an incident has taken place as
soon as possible. However, if there is a significant risk involved, initial notification should be
made before any other actions are taken.
If there is a major incident where security
personnel or the local police were involved,
they will probably already have been notified
and additional notification will be unnecessary.
But even for routine security activity, there is
still the need to keep the security department
informed on the background level of small crimes
and minor violations so they can be alerted to any
change in the level or crime or of the need to
address certain problems. Notification can be a
simple phone call during which the security depart
ment collects the information they need or a very
simple incident form that only includes the basic
information concerning the incident. Anymore than
the basic information sheet will discourage employees
from reporting incidents and may even reduce their
initiatives to engage in security-type activities.
Figure 2 is an example of such a form.
Figure 2: Sample Incident Form Helping Passengers Once the activity has been interrupted and notification has taken place, the employee can focus attention on any passenger affected by the crime. The objective is to reduce the trauma of being a
63
victim and aid in the recovery. If an injury has occurred, whatever first aid employees are authorized to provide should be administered. The employee should then note the circumstances surrounding the incident: This can include the number of persons involved
their physical description
the location
who or what was affected and to what degree they were impacted
what was the time sequence of events
what actions were taken by the transit system staff during the course of the incident
This information is important not only for future prosecution but for reviewing the way the transit system responds to criminal activity and improving its response to future events.
Planning sessions should include a group representing management, security and non-security personnel, union representatives, and local police who meet to review the different types of crime and regulation violations that may affect the system. Their job is to categorize the different types of activities a nd to suggest strategies for the different categories of employees to use. Because you cannot train employees to handle every incident, generalize the planning to apply to a variety of circumstances and then train employees to recognize the different types of incidents so they can react accordingly. This input should be supplemented with discussions with other transit systems and reference to transit security literature.
Policies and Procedures
Each system should come up with a set of security policies that will depend on the size of the system
modes of transportation
type of facilities under their control
size and amount of differentiation in the staff
agreements that exist between the system and the local law enforcement agencies
64
This system again needs to consider the community when prescribing security procedures. If graffiti is prevalent in the community and is an accepted form of urban art then, declaring it a crime on the system will require public education. If violence is prevalent in the community and weapons are frequently carried, then the amount and manner of intervention by security and nonsecurity personnel should be carefully considered. Training Awareness Sessions Awareness sessions should be conducted to inform employees of the actions to be taken in the event of a crime. They should define the types of criminal activities to be expected and the manner in which each type should be handled. Examples of actual incidents are very effective, especially ones that occurred in the local system. Better still are incidents related by the individuals involved. Videotapes and Films Videotapes and films can be used to effectively demonstrate policy and procedure information. Upon finishing the training, employees should have a clear understanding of what their responsibility is during a criminal act and what the system s expectations are of their actions. Role Playing Examples may be developed which will illustrate the approach to different types of incidents. They can illustrate the key stages of the event and possible problems that might be encountered. Employees should participate actively, guided by a script directing what they are supposed to do. This involves the staff and encourages them to think about their roles. Encourage questions during these sessions and provide reasoned answers. Avoid answers that say, Because that is what it says in the policy. Drills and Exercises Training would move to the drills and exercises to where employees are periodically asked to practice what they know in realistic drills. These exercises may also be conducted at unannounced times to see how an individual will react in real-life situations. Results of these drills should also be fed back into the training session if the desired actions are not performed. A note of caution . . . It is unwise to make the results of the training drills part of an employee s performance evaluation. The results should be viewed as reflecting the effectiveness of the training and not as a disciplinary tool for employee ratings.
65
Technology
When deployed properly, technology can be an effective force in trying to cope with security problems. However, no matter how useful the technology, the staffmust be alert, motivated and trained to be effective. Technology is no substitute for motivated employees who take the security aspects of their jobs seriously and perform their duties professionally. Technology that extends the reach of the security organization includes cameras, microphones, intrusion sensors and other equipment which allows remote areas to be monitored from a more central location. The primary advantage of using technology is that fewer individuals are needed to monitor the different locations in the system. The disadvantage is twofold. 1. No matter how dedicated the employee is, it is very difficult to focus for long periods of time on an event (e.g., a closed-circuit television monitor) in which there is no action. Boredom and/or inattentiveness often sets in, decreasing the effectiveness of the individual performing the job. 2. A sensor itself does not prevent a crime, but it might make it more difficult and force the criminal to take some precautions. Patrols by security personnel have added impact. Technology can be effective and help a transit system cope with expanding responsibilities and smaller staff, but it cannot be relied on to the exclusion of the human element and still be expected to prevent crime. (For additional information see the later text on Hardware.)
66
67
More than the minimal information is not necessary immediately, and its collection can slow the response when speed is most needed. If follow-up will be needed, recording and automatic logging devices may be used to allow reconstruction of the incident. The person calling for help is not concerned with follow-up, and assistance should not be delayed to compose paperwork.
The Operator As the Key Link The contacts made by the operator will depend on the structure and policy of the system and the nature of the incident. The role of the operator is to collect and route the information accurately through the designated channels of the system. Those on the scene should handle the incident with the assurance that the rest of the system will support them. It is important that the information relayed by the operator is accurate, clear, concise, and complete. Each individual contacted should be told of the nature of the problem, the urgency required for response, and what actions the have the individual is expected to take. It is a good emergency operating procedure to information repeated by the person receiving it to ensure that it is understood. The Role of Communications Personnel The attitude, poise, and training of communications personnel are important to the success of emergency response. Communications staffmust be able to collect information and relay it quickly, calmly, and accurately. Training and realistic drills are the most effective ways to prepare people for a security incident. Those who cannot function in a high-stress environment should not be assigned to a communications position.
68
On-Scene Instructions/Feedback
The communications system should provide for easy two-way communication between the site of possible security incidents and a central security coordination location. With compact portable radios, cellular telephones, and mobile tracking systems, most systems can equip their buses and vans with two-way communications. This will allow direct command and control of the security incident from a central location. Autonomy Each system will have to decide how much autonomy they are willing to give the on-scene personnel. There is a trade-off between relying on employeestraining and expertise to handle incidents and centralized control that is dependent on communications systems dealing with limited information. The person on the scene needs to be given some leeway to handle nonroutine situations that may not be apparent in central control. On the other hand, central control may be able to bring additional expertise or assets to the individual on-scene to help resolve an incident. For example, in extended incidents the people at central control may be able to provide background on the perpetrator and suggest ways of working with him/her that are not readily apparent on the scene. Conversely, the on-scene leader may see immediate opportunities to act. Coordinating Communications If multiple security/police departments are involved, it will be necessary to establish coordinated communications. Many areas already have protocols for coordinating the communication of multiple emergency response forces through which the transit system may be able to work. More remote sites may rely simply on telephone lines to connect the police and transit dispatcher.
Maintaining Lines of Communication Once lines of communication have been established, they need to be maintained throughout the incident. The communication system operator must maintain communication with the scene, even at times when there is no traffic because the lines must be available as it is needed. Additional communication lines can be made available to the operator to handle calls to alert the other transit functions. This may also require back-up communication capabilities in case the original line to the scene is lost. This can be either a permanently installed system with redundant lines to all stations and facilities or a second means of communication on a temporary basis for the duration of the incident. Loss of communication with the scene will prevent the coordination of the response.
69
In any protracted incident, the media may insist on being kept abreast. The members of the media have certain deadlines they have to meet, and they should be treated with respect and fairness. The system should designate a single spokesperson to communicate. This spokesperson must be forthright in releasing information and should answer questions with only facts. Speculation should be kept to a minimum and no one should attempt to predict the outcome of an incident. The media often insists on their right to know and may claim certain privileges. The system should cooperate but should not feel pressure to respond to unreasonable or inappropriate demands for information. Information of a personal nature should not be released.
70
Incident Follow-Up
The Purpose of Follow-Up
The purpose of security incident follow-up is threefold: 1. To limit and repair any harm done to individuals and property. Follow-up response will initially focus on any people who were in the vicinity of the crime and to help in their recovery. It will the focus on limiting the danger to the transit system from any aftereffects of the crime. 2. To collect information and evidence concerning the incident for possible legal action and to evaluate the effectiveness of the security system. 3. To return the system to normal operation. This will involve clean-up of the site, dispersing the crowd, reopening any areas that may have been closed, and handling the dissemination of information concerning the incident. As with the initial response, the number of options and different sets of circumstances make it
impossible to prescribe all of the activities to be conducted. The following guidelines will help
ensure that all important aspects of the follow-up activity are considered. That includes
Short-term Response Short-term response begins after the security incident has been resolved and any persons directly affected are assisted. Its purpose is to limit and overcome the impact to the system, collect evidence while it is still available, and file the initial reports. This period is critical to ensure the incident is resolved with as little impact on the rest of the system as possible. Limiting Impact Limiting the impact can include evacuating people from the scene, arranging for alternative transportation, or arranging for support activities for traumatized passengers. Provide an effort to ensure that there are no residual problems that will impact other parts of the system. Routes may have to be alerted, stations closed, or additional buses activated to restore service. The system should continue to provide service to the community despite problems at one site. An effort needs to be made to keep the system operating during and after the incident.
71
In the case of minor incidents, such as graffiti or other vandalism, the goal should be to get the area cleaned and the damage repaired as soon as possible. In cases where the incident requires facilities to be closed or passengers re-routed, implementing temporary routes will require more planning and the commitment of additional operations resources. And in cases where the incident is not fully resolved (which could happen if a criminal escaped through a subway tunnel or a bomb threat lingers), the system may have to alter schedules and change routes for an extended period. The principal impact to avoid is personal injury. Additional assets will have to b committed as necessary to keep the system functioning. Collecting Evidence One of the challenges is to restore the operation of the system as quickly as possible. Evidence collection needs to be done quickly and correctly because any residual information will be destroyed as soon as the public is readmitted. There is little sympathy on the part of the public about being inconvenienced to investigate a crime. Witnessed must be interviewed quickly and their names and addresses taken. If they can be convinced to provide information, they should be kept apart from other witnesses until they have had an opportunity to recount their experiences. If potential witnesses insist on leaving before a security person arrives, the system employee should try to get the witness s name and address so he/she can be contacted later. The statements should be taken. by the security person in charge of the scene or a person they designate. If possible, a quiet area should be set aside to conduct interviews. Completing Reports Reports need to be completed quickly. Witnesses have a tendency to begin to edit what they report based on what they think other witnesses are saying or what they think other people want to hear. The more quickly the report is prepared, the more complete and accurate the information will be. For the report to be effective, it should not limit the answers of the person filling it out, While a computer form makes data entry easy, the information collected may not represent what was actually witnessed. Give the witness as much latitude as possible. Questions should be openended, allowing the witness to fill in as much detail as he/she can remember. An open-ended report form will be more difficult to interpret, but it may include information that would have been missed in a more structured format. It may be necessary for the system to provide assistance to individuals who have to fill out the forms. Persons with limited literacy or with language difficulties should be given assistance.
72
Long-Term Response
The long-term response involves conducting a review of the incident, determining any follow-up action to be taken immediately, or mitigating the impact of future incidents. Long-term response occurs after experts have had a chance to analyze the incident but before facts and details are forgotten. Reviewing the Incident The incident review is an examination of the circumstances surrounding an incident to determine whether any immediate actions are necessary. This review should include a representative from the security staff the line management, and transit staff. The incident review should begin with a review of the reports. It should be followed by an examination of the actions taken by the perpetrator, the staff, and the public during the incident. It should consider the circumstances that led up to the incident, whether the perpetrator still represents a threat to the system, and if the actions of the staff and security personnel were effective in resolving the incident. If necessary, this review team should ask questions of the staff, review procedures and policies to assess what happened, and determine its effects of the passengers and the system. This review should be conducted quickly and recommendations reported directly to the person with the authority to implement them. The specific individual selected to conduct the incident reviews may vary. It is important for the incidents to be reviewed in an open and unbiased manner. This will occur only if the participants approach the task in a fresh and serious manner. Determining Additional Action Needed The report of the review team will indicate whether any additional actions are necessary. The idea is to have a means to implement quick changes to the security practices to meet emerging problems. The actions could include
distributing a description of the perpetrator throughout the system if he/she has not been
apprehended recommending that additional security staff be assigned to patrol high risk areas providing staff with portable radios to help resolve the situation . Following Up As Needed Periodic follow-up of the recommendations is important. If the security danger still exists, the follow-up will encourage the staff to remain alert. Once the situation has been resolved, it may be appropriate to relax the increased state of alert.
73
Reviewing Policies In conjunction with the recommendations of the incident review team, system management should examine its policies to see if changes are necessary. This policy review will affect the performance of security on a more basic level than the recommendations of the incident review team. The policy review may indicate that insufficient attention was paid to someone loitering around a bus stop for several days before an incident took place . . . that the operators should be trained. to be more alert to occurrences of this kind . . . that panic buttons should be installed on buses so operators can indicate trouble without alerting the person threatening them. The results of the policy review can be documented and included for refinement as part of the system security program plan.
74
Reporting
Why All The Paperwork
Security would be so simple if it weren t for all the paperwork is an attitude shared by many professionals. It is not surprising for people to question the benefit of filling out long, complicated forms. The reporting part of the security process must demonstrate its value. Information collection begins with considering the reasons security information is collected and some of the uses of that information. It is important to know what data is available, but more important, which of it is useful to collect for data analyses. Once the information requirements are established, the means of collection, storage, and analysis are discussed. In what manner and in what form reports are prepared are also reviewed.
Information Requirements
Performance Requirements Performance requirements involve measures of system effectiveness including the number of incidents, response time, outcome of incidents, and comparisons with other like-events. The information would deal with how secure the system is and what role the security department has in keeping the system secure. In particular, any information that would assist in determining where to deploy staff or allocate resources is especially important. There is obviously a lot of room to decide how much information to require within these categories. The temptation is to collect everything available just in case it is needed. A concerted effort is required to reduce the information requirements to just what is needed.
75
Legal Requirements Depending on the authority and jurisdiction of the system s security, there may be a requirement. to keep legal records. Transit police should maintain records of arrests, criminal investigations, interviewing witnesses, etc. Records have to be kept on suspects, arresting officers, detention, and custody. This information is especially important for identification purposes in criminal trials. Administrative Requirements Administrative requirements include organization, payroll, and security expense information. This information is collected as a matter of course to issue payroll, pay vendors, and other routine matters. However, this information is useful in security when used with performance data to determine adequacy of resources.
Collecting Information
Performance information can be collected from many sources. A large security organization may keep tapes of the conversations between the on-scene command and the operator and the rest of the security coordination team. Reports will be prepared from the different phases of the security activity. In addition to security incident reports already mentioned, two useful sources of summary information includeincident review reports, which are created by a small group reviewing the incident, andperiodic procedure and police review reports, which are completed at the end of a formal security system review. These reports and logs can be a primary source for performance information. Legal Information Legal information will be contained in records of incident investigations, arrest records, and custody records. The extent of this information and its use will depend on the scope of the system s jurisdiction. In all but the largest systems, this information will be handled by the local police department and not the system s security department. It is, however, useful to familiarize key security personnel with legal document requirements even if the system is not responsible for the records. Quantitative Information Quantitative information (or numerical information, which are cost and time) can be used in calculations to draw statistical conclusions. This type of information is very useful for conducting trends analyses and solving budget allocation problems.
76
Qualitative Information Qualitative information is narrative and requires the user to interpret and draw conclusions. It has the disadvantage of frequently being anecdotal. This information is helpful if it is analyzed as a whole and used in conjunction with the quantitative information to find trends and identify problems. Statistical Information Statistical information can be manipulated for almost any purpose. Many times a conclusion is reached and then the information is sought to support that conclusion. This approach frequently precludes obtaining good information from the data collected.
Methods of Storage
Using the computer to store the information related to security always requires careful planning to determine what will be stored and how it will be stored. The report formats are generally simple enough to be put into a database for incident reporting. A limited number of categories can be established to cross reference the incident so it can be compared with similar incidents. Categories can include type of incident, incidents involving property damage, time of day the incident occurred, etc. Databases will allow storage of information about the specific categories and also the text information in either large fields or in memos. If the database is properly designed, it will permit both the storage and retrieval of security information. A number of safety reporting software programs and databases are available. Among these are two which have been developed and refined by the Federal Transit Administration. They are Automated Emergency Response System (AERS) and Section 15 Safety Management Information Statistics (SAMIS).
Report Preparation
Report preparation is based on the same information requirements discussed earlier. This leads to the selection of the data to be collected and dictates the standard reports that are generated by the database system. Minimum requirements could be a monthly listing of incidents by type, and another could be a listing of events by location Statistical reports are often used to track the rise and fall of key numbers as one measure of the effectiveness of the security system. Including text information in the database allows for more than just numerical indications of effectiveness. It will allow a story to support or qualify the numerical values.
77
The system should also be able to provide supplemental and special request reports as needed. Someone familiar with the database can extract the information in a variety of ways and format the report to suit the request.
Report Dissemination
Careful planning is needed to decide how to distribute security reports. Reports may deal with very sensitive information that should not be widely available. To be useful to the security department as a whole and to assure the suppliers of the information that is being used, it is important that at least portions of the data see wide distribution. Specific, detailed reports should have some restrictions put on their availability since they will contain sensitive and personal information. Statistical reports showing in&dent rates and possibly limited descriptions of the incidents can be distributed more widely. The key factor in distribution, however, is what information can be used by what staff to enhance security further.
78
System Refinement
Keeping Up With The Times
The effectiveness of any security system depends on its internal structure and on the environment in which it functions. This means that as the environment changes, the system has to change. There is another aspect to making changes in a security system. One of the biggest problems with security is that since it might be fully exercised infrequently, it can gradually become ineffective because it is heavily dependent on the alertness of employees. Making changes to the system will require security and other staff members to think about what they are doing and how they are doing it. Change can improve the overall effectiveness of the security system without causing substantive differences in the way security is implemented.
Policy/Procedure Review
Policy review should involve the people who are responsible for carrying out the security program. It must depend on their experiences and their knowledge of security requirements to direct improvements to the system. The role of management is to guide the review to ensure that all aspects of security are considered.
79
Review Committee
The system s management should be flexible enough to handle a number of committee formats. One way to review the effectiveness of procedures could be incorporated into the training program where members of the staff devise ways to thwart the security system. This forces the security staff to develop better ways to detect and react to security problems. Then the roles can be reversed and the security personnel could create ways to defeat their own procedures. Not only does the staff have to learn the procedure being examined (effectiveness training), they also may find a means to improve the way it is employed (better procedures). The group then evaluates the process for consistency, efficiency, and check particular procedures against the reports of security incidents.
Recommendations
Whatever method is used, the results should be recorded and presented for approval. The recommendations would include a statement discussing the problems and should be corrected to reflect how new procedures will satisfy that requirement. They should be complete and include any special circumstances for their implementation, The individual responsible for implementing of the recommendation must be comfortable that consideration was given to all important aspects the new procedure and that no adverse effects are likely.
80
Security Problems
About This Section
This section has been designed as a reference and planning tool for solving security problems. It does not need to be read in sequence and some redundancy exists to make it easy to use. Each subsection discusses a unique security problem and its potential solutions. Subjects that are inherently related have been identified, and cross references have been provided to indicate sections that discuss common issues in further detail. This section focuses on the causes, prevention, and handling of specific security-related incidents. Solutions beyond the more general proactive measures discussed in the previous section are provided. A discussion regarding each unique security problem includes:
Careful planning and consideration should precede the implementation of any of these approaches to increasing the security of your passengers, vehicles, facilities, staff and overall system. Also, decision-makers must realize that new technologies are being made available every day. Additional research may be necessary before implementing particular procedures to ensure all options have been considered.
83
Security Problems
(continued)
84
Security Problems
(continued)
85
Summary Tables
About Summary Tables
Summary Tables are provided for each security problem. The basic format is shown as Table 3. Each table shows summarized information regarding:
86
Summary Tables
(continued)
name of the security problem or issue. Low, Moderate or High depending on how much damage, how great an injury, and how much loss may occur based on a single incident. the relative likelihood of the incident occurring or how often the crime may occur relative to other problems. whether the issue is considered a General Security Issue, a Crime Against Passengers, a Crime Against the System, or a Crime Against the Public. what parts of the system may be impacted most directly by the incident including: passengers, vehicles, equipment, facilities, staff, or all of these. describes the time of the day or part of the passenger s trip the incident can occur. This descriptor varies significantly depending on the problem, and might include whether the incident is likely to occur while patrons are: waiting, boarding, on board, exiting the system; during peak hour, off peak, business hours, rush hours, early AM/evening, late night; while closed; at some special time; or at any time. describes where the problem occurs the most, whether on the bus, on rail, on board any vehicle, in parking lots, at stops or shelters, in the adjacent community, at facility approaches and exits, in the vehicle front or rear, at entrance/exit areas, at fare collection areas, on the platform, in corridors, in offices and garages, in any location, or various other sites.
Frequency
Type
Areas of Affect
When
Locations
Contributing Factors those general conditions that cause a problem or make a security breech more likely. Examples include: lighting, community, staff, the presence of others, the approach of the vehicle, observation, time of day, equipment strength, police presence, secrecy, response capabilities, history of an issue, human factors, equipment power, or various other factors.
87
Summary Tables
(continued) Solutions summarizes the types of approaches and areas affected by solutions. These areas vary but may include: Training, Equipment, Facilities Design, Response, Public Relations, Community Relations, Communications, Observation, Fares, Advertising, Coordination, Cooperation, Enforcement, Special Materials, and Contingency Planning, among others. provides brief descriptions of possible solutions or approaches to handling the problems. Approaches are discussed in further detail within the text, but in this table information regarding the costs, effectiveness, and frequency/duration of application are summarized for comparison. All of the costs, effectiveness, and frequency/duration are variable, but the relative merits and drawbacks are presented for quick consideration. describes the relative expense in staff time and salaries generally required to effectively implement and maintain security. These costs are presented as either low, moderate, or high. describes the relative costs of obtaining and/or maintaining new equipment devices, or facility improvements. They vary, depending on how elaborate the specific materials are. In general costs may be described as low, moderate, or high. notes how effective this solution or approach should be, how effective other systems have found this to be, and how likely the approach is to work. The real effectiveness of a program will be determined by how Well it is implemented and the specific problem it is designed to address. However, the relative effectiveness of the approach compared to other approaches is described as slight, low, moderate, high or very effective, or Variable, if there is an unusually high number of other factors which dictate the success of an approach.
Solutions/ Approaches
Cost-Personnel
Cost-Facility/ Equipment
Effectiveness
Frequency/Duration describes how often or how long the solution approach will have to be applied, Equipment based solutions need to be installed only once, for example, but training approaches are required periodically. Efforts may be required once, for each case, periodically, or on an on-going basis.
88
Chapter 3
General Security Issues
89
Drunkenness
Problems Caused by Drunkenness
Intoxicated passengers very easily become a nuisance. In some circumstances they can become a real hazard to transit personnel and to other passengers. Drunk passengers generally exhibit the following behaviors:
In more serious instances they could present severe problems such as:
Occurrence of Drunkenness
Problems with drunk passengers generally occur late at night and on the weekends. Bus routes that travel through areas with many bars and night spots are more likely to pick up intoxicated passengers. Often, the very presence of other passengers on the vehicle or at waiting locations contributes to the problem. A drunk passenger may respond with hostility to another passenger s attempt to avoid him/her. A driver s attempts to interfere with an intoxicated passenger s activities can also contribute to an incident that threatens the security of the passengers and the driver.
90
9 1
personnel from the hazards of potentially dangerous individuals. The effectiveness is long term-in that personnel will be able to apply what they learn whenever necessary. Communicating with Dispatch Communicating with dispatch is a very effective means of dealing with drunk passengers on a bus. The voice on the other end of the radio can have a dramatic affect on an unruly passenger and may induce behavior that the driver alone is not able to impose. When the driver is coping with a difficult passenger, the threat of calling dispatch may be enough to persuade the passenger to cooperate. If dispatch is called, the dispatcher has a variety of options to communicate to the passenger and the driver. The dispatcher has the authority to stop the operation of the vehicle altogether, which the dispatcher should communicate to the passenger. The passenger knows that the driver s function is to maintain the bus schedule, but the dispatcher can authorize the driver to take extraordinary actions in individual circumstances. The dispatcher also has the resources to call the police and have the passenger incarcerated. This is a valid threat and one the dispatcher may be called on use. Actions of the Dispatcher The dispatcher can also take other actions, such as calling for the police or a street supervisor to board the vehicle and assist the driver, requesting the name and addressof the passenger, or requesting that the passenger alight at the next stop. The transit system can also develop other options, policies, or techniques that the dispatcher can communicate to the passenger. This procedure has low personnel and equipment costs, assuming that vehicles are equipped with radios and dispatchers are on duty during service hours. This procedure is effective in a relatively short time without undue delay of the vehicle. Using the dispatch system to deal with unruly passengers also demonstrates to other passengers that there is an authority beyond the driver on which they can rely for their security, particularly when the driver seems to be having difficulty dealing with the situation.
92
Effective procedures need to become an integral part of personnel training, and they should be consistently applied to reassure other passengers who are present that their security will be protected if it becomes necessary. Steps in Dealing With an Intoxicated Passenger A passenger causing a mild nuisance may be given a warning from the driver. If the behavior continues, the driver may: 1. 2. 3. 4. ask the person to move to another seat ask the passenger to alight at the next stop stop the vehicle until the passenger alights call dispatch. (The dispatcher should have escalating options with the last resort being a call for police assistance.)
Other effective procedures must be in place so that when a driver needs assistance it arrives quickly. Dispatchers must have the authority to call the police in different precincts or jurisdictions. Phone numbers and names of key contact individuals must be readily available. The police or transit police must be involved in setting up procedures so that they can quickly get the information they need to enact a response. This information includes: the number of people involved, whether there is a weapon, the location of the vehicle, the next stop; if there are injured parties, and other crucial information. When a Driver Should Call for Assistance Although it is vital that the driver be able to call for police assistance when an intoxicated passenger becomes violent and menacing, the driver should avoid calling for assistance when the situation is not dangerous. Doing so could unnecessarily delay other passengers, create a scene the other passengers may find frustrating or intimidating, or offend a passenger who may not be as inebriated as was presumed. Enforcing Transit System Policies All transit policies that may have some affect on coping with intoxicated passengers must be consistently enforced. For example, many systems have policies banning food and drink on vehicles or in stations. Enforcing this policy will prevent passengers from becoming increasingly intoxicated while riding. It may also prevent intoxicated passengers from boarding if they refuse to leave their drinks. On the other hand, the policy will create problems if it is not consistently enforced. If a person who is prevented from bringing a bottle of alcohol on board observes
93
another passenger drinking a soda, the entire policy is undermined. If the driver is unable to enforce policies for the protection of passengers, security staff or police should be called in. Consistent application of policies will have moderate personnel costs because they must include training. There will also be a low equipment and facility cost for both the development and implementation of policies. Observing Intoxicated Passengers Drivers need to observe passengers as they board and identify those who may be intoxicated. When such individuals are identified, the driver must watch the passenger during the length of his/her trip in order prevent problems. If problems do occur, techniques for curtailing the unwanted activities include the following:
stopping the vehicle and letting the passenger off if the passenger is going to vomit or
urinate keeping a trash bag on board in case a passenger becomes ill Drivers should also observe the reactions of other passengers. If other passengers are expressing disgust, shock., or anger, the driver may need to take action regarding the problem passenger. Observation alone will not address all the problems that intoxicated passengers create, but it will be effective in preventing some in the early stages of development. Prevention of Intoxicated Passengers from Boarding Vehicles A more controversial procedure is implementing a policy of preventing obviously intoxicated individuals from boarding the vehicle. This could have a moderately high cost in terms of personnel because of the additional training that will be required for drivers to accurately identify those who are intoxicated.
94
95
Disorderly Conduct
What is Disorderly Conduct
Disorderly conduct is not a criminal offense. It relates to the loud, rude, or abusive behavior by individuals or groups of passengers. The problem is relatively minor in comparison to others, but it is usually threatening to other passengers. The perception that no one is in control and there might be danger can be sufficient to discourage passengers from using the transit system.
96
Presence of Security Personnel Although the presence of others can contribute to disorderly conduct, security personnel or police are a deterrent. It is important for more than one officer to be present to have a sufficient affect. Armed and uniformed officers tend to discourage disorderly conduct. Mobilizing Transit Personnel Transit personnel should move onto the platform or other areas where disorderly conduct is occurring. In some cases, as in large crowds, the effect might be to control the crowd, reassure individuals, or achieve a level of organization. Often, if the disorderly individuals are a small part of the crowd, they will be inclined to move to another part of the facility or out of it altogether. (See the discussion on Crowd Control for more information on dealing with crowds.) Mobilizing transit personnel will have a moderate personnel cost, depending on the number of individuals required to respond. When a number of transit personnel are involved in dealing with an incident, they will not be available to address other problems which may occur in the facility. This procedure will be moderately effective depending on the type of individuals involved in the disorderly conduct. Observing Disorderly Conduct Observing those involved may prevent a dangerous incident or criminal activity (such as fare evasion or vandalism). When disorderly conduct is observed through surveillance equipment, transit personnel must carefully evaluate the potential threat to passengers, staff, and the facility. The cost of observation is moderate, but there is a good return on the effort. Transit systems may use the public address system to discourage disorderly conduct. If people are observed through a closed-circuit television system, the public address system can be used to warn them to stop what they are doing. This procedure will be particularly effective if the public address system is directed to specific areas of the facility. Even if the announcement does not stop disruptive behavior, the group will know it is being watched and will be less likely to engage in behavior that will lead to arrest. Procedures must be in place if the group does become engaged in illegal or destructive activities.
97
Stopping the Transit Vehicle The operator has the option to stop the vehicle and handle the problem directly. This compromises the operator s schedule and invites the anger of other passengers. Stopping the vehicle has moderate effectiveness. It has a high personnel cost in that the driver is confronting unruly passengers who may be a threat. In situations like this, the operator must radio the dispatcher. Removing Disruptive Passengers Another procedure for dealing with disruptive behavior is to remove the individual(s) from the vehicle. The operator could radio for a municipal or transit police officer to remove the offending individual(s). The source of the trouble will be eliminated as soon as the vehicle is boarded by the security personnel or police. This will be an appropriate procedure for cases when offenders are extremely abusive and threatening to other passengers, or when operation of the vehicle is endangered.
98
Crowd Control
Events That Might Require Crowd Control
The need for crowd control is generally caused by single events such as a
festival
major athletic event
concert
major employment center
heavy traffic routes
weather problem
A single event with an unusually large crowd can pose safety and security problems because passengers will wait at the edge of the curb or all the way along the platform in a transit station.
99
Vehicle Overloading The transit system should be concerned with preventing vehicle overloading. The following factors make overloading dangerous or illegal: seating capacity, gross vehicle weight rating (GVWR), health concerns, driver and vehicle limitations, and tempers. Other Problems With huge volumes of people, there is a high probability of fights breaking out, pickpocketing, vandalism, fare evasion, or trespassing into non-public areas.
provide sufficient service to meet that high number of passengers per minute service
demand reduce the number of persons per square foot in the waiting area to a manageable and safe size maintain the safety of the transit vehicles, facilities, staff, and passengers
100
Establishing Crowd Control Committees In some areas, crowd control committees have proven to be very effective. The committee may involve a police force, ushering services, emergency medical services, communications office, managing representative, ticket offices, custodial staff, and a member of the transit team. If the system establishes a committee, it should include primarily operations and security staff, including a vehicle operator, station attendant, supervisor, security officer and manager, representative from local police and emergency forces (including medical services), and a floating member who should represent the traffic generator for which crowd control is being planned. The, committee should meet prior to each major event at which crowd control is anticipated. For larger urban centers where there are numerous needs for crowd control, subcommittees should be established. A single committee can meet regularly to plan for anticipated events over the following weeks, month, or months. Coordinating with Traffic Generators The transit system can learn a great deal from traffic generators that is very useful in planning for crowd control. This information can include the following:
A basketball game or a concert with an encore may have a very specific release time during which all patrons leave. A conference, however, may have a staggered release time, with persons arriving and leaving over several hours. In the latter case, the need for crowd control will be somewhat reduced. Coordinating with Local Police Local police are generally involved in events sponsoring large crowds. Therefore, it should not be necessary for a transit system, to start from scratch with regard to security planning for crowd control. Work with other involved security and police teams in planning for the event. Coordinate with local police forces to ease the burden of crowd control and to build a strong relationship with other security forces. Communicating with Key Staff In anticipation of the need for crowd control, a number of things should be established:
101
the number of local police that will be involved the various means of communication to be used
Communication paths must be established among local police and the traffic generator staff at entrances to the transit waiting area, staff the transit waiting area, and transit security personnel (whether in-house or hired). Effective communication between vehicles, the dispatcher, and the waiting area must also be established. Utilizing the Proper Equipment Utilizing proper equipment will significantly support crowd control efforts. This equipment can be borrowed from local poke or the traffic generator and stored at the transit facility. Storing the crowd control equipment at the transit facility is most appropriate in the case of frequent events demanding regular crowd control. Crowd control equipment includes radios, megaphones and/or public address system, portable metal fencing, sawhorse-type barricades, proper signage, trash barrels, and custodial equipment. Sawhorses and Barricades When controlling crowds boarding buses, an effective safety measure is to use metal or sawhorse barricades along the curb to prevent crowds from walking onto the street except at designated boarding locations. The vehicle operator can easily place the boarding doors appropriately between barricades to enable passengers to board. Megaphones or Public Address Systems Megaphones or public address systems may be used to inform the crowd when the next vehicle will be arriving to request crowd movement (such as to move the crowd away from the edge of the platform or out of the street) or to impart information to ease the crowd s anxiety. A permanent public address system, however, tends to be more acceptable to patrons. The public address system is an unknown authority (rather than a single security person) which calmly imparts information in a normal speaking voice. The volume of megaphones too near to patrons imparts a feeling of herding, and may cause excitement rather than alleviate it. Increasing Transit Operations An operational approach to crowd control can perhaps be the most significant factor in easing the problem. Prior to the event, the transit system should assign additional vehicles, drivers, and supervisors to the area which will decrease headways. This will reduce the frustration and anxiety of the transit crowd and reduce the period of time during which crowd control is required. The faster passengers are moved from the waitingareas toward final destinations, the more effective the crowd control and transit service will be.
102
Using a Consistent Approach to Crowd Control Crowds are easiest to deal with when they are self-policed. A crowd that is informed and not anxious will cause few problems. This is achieved by using a consistent approach to crowd control for every event. Additional signage indicates that access to the waiting area is being controlled, that vehicles are coming at X headway, and all passengers will be afforded the earliest possible boarding opportunity. This reduces the anxiety of the crowd. Excitement and surging can be reduced through consistent methods and signage for crowd control. Reducing Crowd Size Smaller numbers of people are easier to control. In the case of a crowd, smaller sections of the crowd are desirable units to control. Allowing smaller groups of people to enter the waiting area is easier than allowing crowds to enter en masse. Barriers or barricades should be placed to narrow a large crowd so that by the time patrons are entering the transit facility waiting area they are in single- or double-file lines. Maintaining Clear Areas in the Transit Center Certain areas around the transit center should be kept clear. If the entrance is also the only exit from the waiting area, the area should be kept relatively clear. This may be accomplished by allowing patrons to enter in small groups, cross the entrance area, and stop in the waiting area. Patrons are generally accepting of the explanation that fire departments require certain areas to be kept clear and can understand that a waiting area can only hold a certain number of people. Marketing Campaigns for Transit Services The problems of crowd control will also be reduced by informing the public prior to the event through a marketing campaign. Signage should be posted on the way to the event to inform passengers of what transit services and options will be available. Planning to arrive early, leave early, or leave late from the event may also be emphasized to reduce the number of passengers per minute traveling at peak times. Establishing a Communications Center Establishing a communications center has proved extremely effective in relieving some cases of crowd control. This communication center should have access to all communication channels including local and state police, local emergency services, the traffic coordinator s own security and ushering services, the transit security staff, and transit supervisory staff. If these organizations are not on the same channel, the communications center must take responsibility for relaying information between such staff members. For example, should a medical emergency occur, the supervisory staff patrolling the waiting area should immediately notify the
103
communication center and have nearby emergency medical forces deployed to the specific location of the disabled patron.
Personnel should be on the alert for any malfunctioning equipment. Problems with crowd control are exacerbated by malfunctioning equipment. On-site or stand-by maintenance personnel should quickly return equipment to working order, such as turnstiles, climate control systems,. public address systems, and token sales machines. If any of this equipment is broken, the frustration of the crowd is likely to increase. Naturally, the safety of passengers and the restoration of normalcy is paramount to the transit system. Custodial staff should be available to clean up any spillage, eliminate slick areas, remove overflowing trash cans, and dispose of broken glass. They should also be employed immediately after the crowd is dissolved to clean up and return a clean, well-maintained, and controlled appearance to the transit site.Overall, the key to the safety and security of the crowd is limiting masses of people to manageable groups and maximizing communication through planning and adequate staffing.
104
105
106
107
Designing Drug-Free Facilities Facilities need to be designed to discourage illegal activities of all types. All areas need to be welllit. Bright lights in transit stations, bus shelters, platforms, and the interiors of vehicles will contribute to minimizing drug activity. The presence of passengers, transit personnel, law enforcement personnel, or others is an inhibiting factor. While the presence of other passengers alone will not necessarily eliminate drug use or transactions, users and dealers will be more inclined to find less busy areas. Systems should close off portions of the facility or corridors that are not being used at certain times of the day. Closing all but one entrance to facilities during night operation is a common practice. 108
Security-conscious facility designs can be expensive. Personnel costs will be low since the intent of the design is to reduce those needed to monitor and patrol facilities. Design changes will be implemented-once and will have on-going effectiveness, making it easier to observe activities and to enforce policies and procedures. Starting Public Education Campaigns Public education campaigns have been used successfully in many systems to alter such undesirable behaviors as vandalism, fraudulent injury claims, fare evasion, and other transit problems. Similar campaigns should be waged for eliminating drug law violations. Public education campaigns should encourage passengers to be aware of drug use and to report problems when they occur. The transit system should develop public awareness materials which include pamphlets, posters, flyers, interior bus advertisements, station flyers, radio, and local television spots. Materials encouraging passengers to report drug use violations will discourage drug users who may otherwise feel free to do as they wish. The materials must include information regarding the hazards of drug use and the importance that passengers can play. These materials must also include instructions for the passenger on how to report a drug-use violation. Warnings should be included that alert the passenger to report the violation to the nearest appropriate individual, not to interfere in the drug transaction. Passengers will be more likely to participate in reporting drug law violations if they are convinced their input is welcome and action will be taken and that reports will be competently and expediently investigated. The system also needs to develop materials specifically for transit personnel which must include procedures for effectively responding to reports from passengers regarding drug law violations. The cost of a public education campaign is moderate in terms of personnel and facilities. Personnel need to be involved in its design and management. They also need to be trained in the purpose of the campaign and their public relations role. Facilities and equipment costs will depend on the-quantity of the materials produced, the distribution efforts, and the type and extent to which different media will be involved in advertising the campaign. Enforcing Laws and Transit System Policies Because of the danger inherent in drug transactions, many systems have been reluctant to aggressively address activities. Law and policy enforcement is an important tool in preventing hazardous activities. The system needs to develop and implement clear procedures for arranging for the arrest of drug dealers or the incarcerating of drug users. Enforcing these anti-drug policies will have immediate as well as long-term effectiveness. Those arrested may not return to the same location. At the same time, a reputation for enforcing the law will discourage activities in the future.
109
Response by transit or municipal police to reports of drug transactions from transit personnel or passengers will also inhibit drug activities. A consistent practice of thorough and on-going implementation of integrated policies and overall prevention of all unwanted activities will serve as a deterrent to drug law violations over time. Enforcement procedures will have a moderate personnel cost because the policies will require the transit personnel to contact the police and be able to effectively communicate with them. Coordinating with Local Law Enforcement Personnel Close coordination with local law enforcement personnel is essential, and systems should aggressively build these relationships. After identifying a local law enforcement contact person, the system should keep them informed of
Establishing an on-going working relationship with the local police force will facilitate the enforcement of drug law violation policies and procedures. The working relationship needs to
simplify the procedures for responding to information when there are drug-related activities taking place address community-wide problems that impact the transit system, such as neighborhoods adjacent to transit facilities and stops where there is heavy drug trafficking assist in the routine observation of bus stops and shelters, parking lots, bus lots, or other areas that police include in their patrols.
Personnel costs involved in coordinating with the police in enforcing laws and arresting violators include establishing a working relationship with the police and maintaining the working relationship through regular contact. The facility and equipment costs should be low. The only exceptions are costs associated with establishing any type of permanent live communications such as shared radio channels and direct telephone lines. Coordinating with Local Social Service Agencies The system needs to coordinate with local social services or rehabilitation services. These agencies can provide information, training, techniques for referring individuals to drug treatment centers, advice to users seeking help, assistance for users in a crisis, and other tools for coping with the problems. Early coordination with the agencies in the community will facilitate their availability. Establish a strong working relationship with a contact person for each appropriate local agency. Those working in the social services will have insights and information that will greatly assist the transit system. Coordination with social services will be most effective on an on-going basis and when
110
accompanying other policies and procedures that create an atmosphere where drug use is deterred and enforcement expected. This will have a moderate personnel cost. There will be a low facilities or equipment cost. Coordination will have moderate effectiveness, depending on the level of organization and the extent of outreach efforts. Maintaining Surveillance of Transit Facility Activities Thorough surveillance of system facilities is an effective deterrent. Systems should assist police operations in the surveillance and arrest of drug dealers who habitually use facilities or nearby areas to conduct business. Effective surveillance can be accomplished by:
areas to increase observation using police or transit system personnel patrols to monitor facility activities concentrating facility activities to limited areas Increased surveillance is moderately effective because it alone does not prevent or stop unwanted activities. Observation needs to be supported with quick-reaction procedures. When depending on the type of equipment that is installed or alterations made, there will be a moderate to high cost for increasing the surveillance of illegal activities. The costs of increased observation capabilities can include the cost of personnel to be available to observe drug law violation and the cost for any devices that increase the capabilities of individuals to watch for activities. It should be noted that better quality observation devices will reduce the relative cost of surveillance. Providing Outreach to Drug Abusers Outreach and assistance projects should be used to address drug use violation problems. This should be accomplished by the distribution of pamphlets and materials describing the locations of local soup kitchens, social service agencies, hospitals, drug abuse centers, etc.. that are available in the area; the availability of social service and/or other emergency phone numbers; and easy access to medical information on vehicles and in facilities. Distributing literature and other information regarding social services will be useful in directing those seeking help. The outreach policies may only be effective with a small portion of those violating drug laws in the system, but the cost is low for both personnel and facility resources. One significant drawback is that the pamphlets are often discarded right after they are received, thereby contributing to a litter problem.
111
112
Improving Facility Design Eliminate dark and secret areas. Close off portions of the facility that are not in use and implement observation procedures in areas that are not heavily traveled, Maintain adequate lighting and
113
remove any barriers to observation. All public areas must be made highly visible so that exhibitionists are discouraged and prostitutes cannot solicit without being seen. Exhibitionism can take place very rapidly and requires only a small area for the offender to hide. Transit personnel must tour the facility to identify areas that are unobserved, get information from police and security patrols regarding where sex offenses have occurred, and attempt to remove the enabling features. Facility design changes to combat sex offenses include
installing cameras
instituting additional patrols
removing architectural features such as decorative columns or unnecessary walls
installing features such as locks, doors, and barriers
Changes in facility design have a low personnel cost but can have a moderate to high facility cost depending on the type of design changes that will be made. Removing poor facility design features will have a moderate effect in eliminating sex offenses. Training Transit and Security Personnel Transit and security personnel must be trained to identify potential sex offenders. For example, not all prostitutes are obvious, and a person dressed questionably has the right to be in the transit facility and on vehicles as long as there is no active solicitation. It is more likely that a solicitor will be active during nighttime hours than during the morning hours. The surrounding community can contribute to the training because prostitutes often work in specific parts of a city and sex offenders can be identified by the police or other groups. Other training should involve procedures for dealing with sex offenders. Relocating prostitutes to another area is a relatively simple task, but dealing with an exhibitionist can be more complex. Some sex offenders may be suffering from a mental impairment and may not respond predictably. Others, such as the homeless who gather at transit facilities, may require a social service agency. Training must include the sensitive handling of complaints and reports of offenses. Although these offenses are not assaults, the victims are often affected. Personnel must also respond in a manner that leads the victims to believe that a similar incident will not happen again. This includes
taking immediate action to apprehend the offender taking information for a later arrest and prosecution notifying the police
These responses will promote the perception that the transit system is in control and will not allow its passengers to be victimized. Training has a moderately high personnel cost but a low equipment cost. Training occurs once for each person, but has on-going effectiveness.
114
Enforcing Laws and Policies Policies against loitering can eliminate the opportunity for sex offenders to frequent the system. However, the policies must be enforced and loiterers must be asked to move. Policies that prohibit solicitation inside and outside the facility are important to establish and enforce. All sex offenders must be removed before anyone is victimized. It is important to make sure that
All these enforcement policies demonstrate to the public that the transit system is committed to their safety. The enforcement policies also demonstrate to offenders that they will be prosecuted if they undertake these activities. Policy enforcement can have a moderate personnel cost but a low equipment cost. Observing Activities Within the System An important tool for the observation of sex offenders is to recognize and identify them when they are in the facility. Having images taken through facility cameras will enable transit and security personnel to identify individuals to observe when they enter the facility. When offenders are recognized, foot patrols or surveillance equipment can be used to monitor their activities. The most important purpose of the observation is to prevent the offender from committing a crime, not to harass the individuals or remove them from the system when they have not committed an offense. Observing the facility in general is important for preventing sex offenses. When individuals move behind barriers or into isolated areas, system personnel must be able to observe them and prevent unwanted activities. An obvious presence - such as a foot patrol - is an effective means of observing activities. (See the section concerning Crimes Against the Transit System which includes additional information on Trespassing and Physical Security Countermeasures and information on surveillance equipment.) Observation must be an on-going system procedure and can have a moderate personnel cost and moderate to high equipment costs, depending on the type of equipment involved. Observation can be very effective in preventing sex offenses, particularly When it is obvious that the potential offender is being observed or will be observed when the offense takes place. Coordinating with Social Service Agencies Some sex offenders are mentally impaired and are not able to respond to enforcement, observation, or other procedures as predicted. Coordination with social service agencies will provide the system with valuable aid in dealing with sex offenders. Social service agencies provide a good source of information, such as educational materials and information on the different needs and responses of sex offenders. The agencies may also intervene if the sex offender needs
1 1 5
assistance. Coordination with social service agencies has a low personnel and facility cost and can be moderately effective if the offender requires the assistance. Social service agency coordination needs to be maintained on an on-going basis. Table 8. Assessing Sex Offenses
116
Solicitation
What is Solicitation
Solicitation involves begging and panhandling, distributing products and literature, and unlicensed merchants. It does not constitute a threat to people who use transit service. But for many of them it is an issue that contributes to their impression of the transit system. Solicitation may make passengers feel uncomfortable and give them a reason to avoid using public transit. It may also give passengers an impression that the system cannot control lesser nuisances.
117
118
the facility is a gathering place for the general public. But the transit system can only eliminate the problem with a cooperative effort with the various groups in the community that it serves.
119
Homelessness
How This Affects Transit Facilities
The homelesspopulation in transit facilities has become a growing problem in terms of the security of passengers and employees, as well as in the cost of maintaining facilities where homeless people gather. The transportation industry has typically been left out of decisions on issues that impact the homeless. Shelter programs, rehabilitation efforts,! employment programs, and other efforts to help the homeless fall outside transit interests.
Effects of Homelessness
Effects on Passengers Passengers often feel threatened and intimidated by a large number of homeless people and can cause them to use other modes of transportation. Effects on Facilities Transit facilities show the effects of homeless in the quantities of debris and rubbish that are left, the official or unofficial closure of parts of facilities, and the increased maintenance problems. Homeless people who take up residence in a transit facility leave the remains of meals and drinks which attract vermin and cause a health risks. Human waste also accumulates. Some systems prevent access to facilities when they shut down at night. Even without formal restrictions, corridor access to passengers is limited due to the presence of homeless people sleeping on benches or rest room floors, bathing in public sinks, and setting up sleeping areas in entrances and corridors. Effects on Staff Transit staff feels the effects of the presence of homeless people the most. These effects result in health risks, demoralization, and high turnover rates. Constant attention on the part of transit and
120
janitorial staff is required to maintain sanitary conditions. They must cope with the added cleaning and the danger of such health-threatening debris, such as used hypodermic syringes. Transit police have the additional responsibility of moving the homeless - a job which lowers morale among those on the-shift. BART, in San Francisco, Working on a Solution Bay Area Rapid Transit (BART), in San Francisco, has a special wake-up shift that rouses sleeping homeless people and moves them in the morning. Police on the shift must wear plastic gloves for protection. Token agents are afraid to leave their booths at night because of the homeless sleeping around them. Maintenance crews have additional work in trying to repair equipment which has been contaminated when used as bathroom and bedroom facilities by homeless people.
121
Limiting Non-Passenger Access to Facilities Many systems have instituted procedures whereby only passengers with tickets are permitted in areas of the facility. Relocating fare collection devices close to transit stop entrances can prevent the entry of individuals who will not be traveling on the system. In larger transportation facilities, designating waiting areas for ticketed passengers will eliminate the occupation of those areas by people not using the system. Increasing Facility Patrols Increased patrols can be effective in preventing the congregation of homeless people. If the homeless are continually asked to move, they will be more reluctant to choose a transit site. This can be effective in the long run, but at a high cost. Moving homeless people on a constant basis is a large task and may require much additional personnel. This is a significant risk to transit or other personnel because some homeless people may be dangerous due to poor mental health, drug use, or the AIDS virus. Poor morale and high turnover are common problems amongthose who deal with the homeless, particularly in enforcement activities. Coordinating With Social Service Providers Transit systems are not social service providers, but they often feel the burden of the homeless problem. Transit systems must establish effective programs, policies, and procedures to coordinate with local social services to address the issues of the homeless. In many communities, close work between transit systems and social services has resulted in innovative solutions to the homeless problem. The following methods require coordination and cooperation with local social service agencies and the surrounding community:
Instituting Travelers Aid Programs Often a person arrives in a city or town without resources and is unable to find assistance. By helping people find appropriate resources, the system can prevent the people from becoming residents in system facilities. Many systems have found that distributing brochures and other literature about specialized programs to homeless individuals in system facilities is helpful. Coordinating with the Local Community It is important for transit systems to coordinate their activities with other community services. In many cases, transit authorities are not involved in community decisions regarding the homeless or other issues. However, without proper coordination and communication, policies designed to help will have a negative affect on the system.
122
123
Miscellaneous Misdemeanors/Nuisances
Simple Violations
The most common security problems that all systems are forced to handle are violations. Up to several times an hour, each first-line operation employee (bus drivers and station attendants) will have to enforce the transit system rules. Depending on the specific violation and the validating source of the rule, these incidents may be minor rule violations, misdemeanors, nuisances, or local ordinance violations, such as:
littering spitting smoking in unauthorized areas eating or drinking on vehicles loud radios loud behavior
124
Consistently Enforcing Rules and Regulations When passengers observe that a station is free of rubbish, they are less likely to drop theirs. If one passenger is playing a radio too loud and the operator asks that passenger to turn it off, it is not appropriate for the driver to allow another passenger to play a loud radio because he/she likes the music better. The consistent enforcement of rules has a low cost in personnel and equipment. In fact, it can decrease the amount of resources necessary to enforce the rules because operators will not have to explain and justify every incident. Advertising and Public Relations Advertising Advertising has a strong affect on miscellaneous misdemeanors. An essential part of advertising is the posting of rules at many locations throughout the system, including inside all vehicles, at entrances to facilities, on station platforms, and in bus shelters. Passengers often violate rules because they are unaware of them. Post the rules in clear language in an easy-to-read location. When passengers are moving through the facility they do not have the time or inclination to read a lengthy list and description. On station platforms, the rules can be somewhat more detailed because there is time to read them while Waiting. Eventually everyone who uses the system regularly will have had time to read the rules. Other places to Publish rules include brochures, schedules, and information pamphlets that are distributed throughout the system. Posting the rules has a low personnel cost and can actually decrease the cost of enforcement. There is a moderate equipment and facilities cost, depending on the size of the system and the number of vehicles and facilities on which to post the rules. A good advertising policy can be moderately effective and the cost is periodic, depending on how often rules change or literature is published. Public (or Passenger) Relations Operators must be thoroughly trained in public relations so that they can deal with rule violations. These skills can prevent a relatively minor incident from becoming a major argument which would cause a delay on the system. All public relations skills training involves treating every passenger
125
politely and professionally. Being polite to passengers includes not intimidating or belittling them because they are violating the rules, not threatening or menacing them, and not getting into arguments or confrontations with those who are violating the rules. Passenger relations training must include
communication skills
appropriate policies and procedures
appropriate means of coping with problem passengers
Public relations training can have a moderate personnel cost because it can be a part of general operator training. The cost for equipment is low. The effectiveness of driver training in public relations is very high. The training occurs once, but the skills can be applied on an on-going basis. Involving the Dispatcher Many systems have found that when the operator is coping with a particularly disruptive passenger, it is useful to contact dispatch to inform them of the problem and seek a solution. The dispatcher has a variety of options which include
In general, the voice over the radio takes on a level of authority that can have a dramatic effect on the passenger. The passenger is often not aware of the level of authority of the person on the radio and will often respond to the dispatcher in circumstances in which the driver was ineffective. This method has a low to moderate cost in personnel and equipment, depending on whether the system has radio equipment and dispatch capacity. The method can have a moderate effect on the prevention of the rule violations and is dependent on the type of violation, the type of passenger, and the type of options available to the dispatcher. Empowering the Staff In some cases, the dispatcher needs to be empowered to authorize activities outside the standard operating procedures. For example, a violator may take advantage of the fact that the operator needs to stay on schedule. The dispatcher may then-need to authorize the driver to stop the vehicle until the disruptive passengeragrees to leave, even though this is contrary to standard procedures. Once the vehicle is authorized to stop, the passenger will lose his/her advantage.
126
127
Miscellaneous Misdemeanors/Nuisances
Simple Violations
The most common security problems that all systems are forced to handle are violations. Up to several times an hour, each first-line operation employee (bus drivers and station attendants) will have to enforce the transit system rules. Depending on the specific violation and the validating source of the rule, these incidents may be minor rule violations, misdemeanors, nuisances, or local ordinance violations, such as:
littering spitting smoking in unauthorized areas eating or drinking on vehicles loud radios loud behavior
124
Consistently Enforcing Rules and Regulations When passengers observe that a station is free of rubbish, they are less likely to drop theirs. If one passenger is playing a radio too loud and the operator asks that passenger to turn it off, it is not appropriate for the driver to allow another passenger to play a loud radio because he/she likes the music better. The consistent enforcement of rules has a low cost in personnel and equipment. In fact, it can decrease the amount of resources necessary to enforce the rules because operators will not have to explain and justify every incident. Advertising and Public Relations Advertising Advertising has a strong affect on miscellaneous misdemeanors. An essential part of advertising is the posting of rules at many locations throughout the system, including inside all vehicles, at entrances to facilities, on station platforms, and in bus shelters. Passengers often violate rules because they are unaware of them. Post the rules in clear language in an easy-to-read location. When passengers are moving through the facility they do not have the time or inclination to read a lengthy list and description. On station platforms, the rules can be somewhat more detailed because there is time to read them while Waiting. Eventually everyone who uses the system regularly will have had time to read the rules. Other places to Publish rules include brochures, schedules, and information pamphlets that are distributed throughout the system. Posting the rules has a low personnel cost and can actually decrease the cost of enforcement. There is a moderate equipment and facilities cost, depending on the size of the system and the number of vehicles and facilities on which to post the rules. A good advertising policy can be moderately effective and the cost is periodic, depending on how often rules change or literature is published. Public (or Passenger) Relations Operators must be thoroughly trained in public relations so that they can deal with rule violations. These skills can prevent a relatively minor incident from becoming a major argument which would cause a delay on the system. All public relations skills training involves treating every passenger
125
politely and professionally. Being polite to passengers includes not intimidating or belittling them because they are violating the rules, not threatening or menacing them, and not getting into arguments or confrontations with those who are violating the rules. Passenger relations training must include
communication skills
appropriate policies and procedures
appropriate means of coping with problem passengers
Public relations training can have a moderate personnel cost because it can be a part of general operator training. The cost for equipment is low. The effectiveness of driver training in public relations is very high. The training occurs once, but the skills can be applied on an on-going basis. Involving the Dispatcher Many systems have found that when the operator is coping with a particularly disruptive passenger, it is useful to contact dispatch to inform them of the problem and seek a solution. The dispatcher has a variety of options which include
In general, the voice over the radio takes on a level of authority that can have a dramatic effect on the passenger. The passenger is often not aware of the level of authority of the person on the radio and will often respond to the dispatcher in circumstances in which the driver was ineffective. This method has a low to moderate cost in personnel and equipment, depending on whether the system has radio equipment and dispatch capacity. The method can have a moderate effect on the prevention of the rule violations and is dependent on the type of violation, the type of passenger, and the type of options available to the dispatcher. Empowering the Staff In some cases, the dispatcher needs to be empowered to authorize activities outside the standard operating procedures. For example, a violator may take advantage of the fact that the operator needs to stay on schedule. The dispatcher may then-need to authorize the driver to stop the vehicle until the disruptive passengeragrees to leave, even though this is contrary to standard procedures. Once the vehicle is authorized to stop, the passenger will lose his/her advantage.
126
127
Table 11. Assessing Misdemeanors, Nuisances, Local Ordinances, and Rule Violations
128
C h a p t e r 4
Crimes Against Passengers
Chapter 4
Crimes Against Passengers
Theft
Theft is an issue of both actual security and perceived security. Theft occurs in transit systems of all sizes and settings. In some large urban systems, reported losses by passengers is in the hundreds of thousands of dollars each year. However, transit security staff believe that this figure greatly underestimates the magnitude of the problem because many thefts go unreported. Single incidents total a significant security issue on their own. Pickpocketing (Dips) Pickpocketing differs in certain aspects from other types of thefts from passengers. Dips (as these thieves are known in their field) rely on diversions and confusion to help them carry out the crime. Dips often work in teams of two or three. They prefer to operate in crowded situations, such as a train platform, bus stop, or near parked vehicles. One member of the pickpocket team may ask the mark for help (perhaps to pick up something from the floor) or intentionally bump into the mark to create the distraction. One of the team members will continue the distraction - another will lift a wallet from the mark s pocket or quickly pull a wallet from the mark s purse. Locations of Theft Theft of personal property can take place in any portion of a transit system, including a bus stop, platform, station, parking lot, or vehicle. In general, theft is most common where surveillance is low, escape is easy, and response time is long. The crime can take place at any point during a passenger s journey through the system, including times when the passenger is
129
130
131
Physical Assault
Threat of Physical Assault
While assaults in transit are often comparable to or less than those in the surrounding community, many people have the perception that they are less secure while waiting for or riding on a public transit vehicle. Transit security personnel must create a secure environment and educate the public regarding positive steps to take to increase their security.
Types of Assaults
Assaults in transit systems fall into one of two categories. First: There are altercations that involve a single assailant and a single victim who may or may not know each other. This type of assault is usually not planned in advance and does not involve a weapon. It can occur anywhere in a transit system. Second: There are general types which involve one or two victims confronted by a group of assailants. This type of assault usually is planned. It may not be designed for the actual victim but is planned with the intent of assaulting anyone in the transit system. Often the motive is robbery, but there are other common motives such as hate crimes, or violence against certain ethnic, religious, or racial groups; crimes targeted at homeless individuals; and gang assaults of a random nature.
Frequency of Physical Assaults Assaults do not occur as frequently as other less serious transit crimes. The surrounding service area of the system usually determines the frequency of assaults which occur more often in high crime urban areas, and rarely in small towns and rural areas. Assault victims are likely to report the incident to authorities, so the reported number of assaults in transit systems closely reflects the actual incidence of assaults.
Preventing Physical Assaults The actions of the transit system should be very visible to both the potential criminal and the passengers. These actions include
creating an environment which discourages assaults employing visible transit security personnel
132
Creating an Environment Which Discourages Assaults Preplanned assaults will more likely take place at times and locations where the criminals believe their attack will go undetected and where escape is easy. Therefore, effective measures should involve
designing and maintaining the facility (stop or station) training the operators and other personnel in the field specifying security personnel and procedures
Employing Visible Transit Security Personnel Visible, uniformed security personnel are very effective in preventing assaults. Transit personnel, while less effective, may be more practical and require fewer additional expenditures. The fact that an assault will be immediately detected is the greatest deterrent. Smaller transit systems and systems that only operate buses may not have their own security personnel to patrol the bus routes and stops. Instead they rely on local police. In such cases, the lead transit security officer should focus his/her efforts on coordinating the system s resources and information with the local police department. Designing Facilities to Discourage Assaults Good lighting increases the likelihood that a passenger can see a potential assailant. Passengers will feel more comfortable in a well-lit area such as station platforms, bus stops, and bus shelters. Many rail systems have designated off-hours waiting areas. These are clearly marked portions of the station that are within sight of token booth clerks or other transit personnel. They are also part of the train platform or are close enough to the platform for easy access to arriving trains. Passengers are not required to wait at these off-hours areas. They tend to do so, however, especially when encouraged through transit system promotions. Installing CCTV An effective but higher-cost measure is a CCTV. The presence of cameras at stations and platforms gives an impression to passengers and potential assailants that criminal activity will be detected. CCTPs enable the security staff to observe-activities at a wide variety of locations and alert security personnel to report to a specific location when necessary.
133
Installing Alarms and Call Boxes Alarms and call boxes provide a means for passengers and transit personnel to call for assistance in the event of assault, threat, or other emergency. Their locations must be planned for the convenience of users. A transit system must also develop procedures for responding to the alarms or messages, including the inevitable false alarms. The effectiveness of alarms, call boxes, and CCTV is enhanced when used together. Table 13. Assessing Physical Assault
134
Sexual Assault
Occurrences of Sexual Assault
s preparation and Sexual assault - rape or molestation - is an act of violence. A transit system response to sexual assaults should be linked to its preparation and response to other physical assaults. However, response to sexual assaults requires particular attention to sensitivity toward the victim and issues of privacy. Although sexual assaults are more frequent in larger systems, they still comprise a small proportion of all assaults. Society s attitude towards these acts makes many victims reluctant to report these incidents. Sexual assaults are more likely to occur in settings where the assailant believes that the assault will go undetected and he/she will be able to escape from the scene without being identified. A single assailant or a gang will try to isolate a potential target at a time and location where there will be no witnesses and no chance for the target to call for help.
The measures discussed in this Guide on Physical Assault address these requirements and are appropriate measures for a transit system to take in trying to reduce the number of sexual assaults. They include
135
Coordinating with Local Police Many transit systems depend on the local police department to provide security along bus routes and at bus-stops. The local police are frequently responsible for responding to assaults and providing immediate medical attention to victims. A key responsibility of the lead transit security officer is to coordinate the transit system s resources with the local police. This applies to any criminal activity within the transit system but especially to those incidents that require expertise that the transit system s own security personnel may not have. Special Sensitivity Training Victims of sexual assault will need special attention that transit personnel should be prepared to provide. The victim will need immediate medical attention. The system should also have women on its staff to comfort female victims and provide support during any questioning. All staff involved in the response to sexual assaults should receive sensitivity training on the preferred ways to take care of victims after the assault. Transit staff should also be sensitized to the privacy issues involved. Information concerning the assault should be handled by the head security officer. The system should respect the privacy of the victim who does not want to be identified to the public. Transit personnel should follow whatever policies the system has established regarding the control of information to the media relating to security incidents.
136
Chapter 5
Crimes Against the Transit System
Types of Crimes
Crimes against the transit system occur frequently, and they often cause injuries or death to transit passengers and employees. They involve the destruction of transit property that can be very costly to repair or replace. Fare Evasion and Fare Theft Fare evasion is not a serious crime in terms of injury or destruction, but it has the potential to cost the transit system a significant amount of money over time. Fare evaders who are not caught can encourage more of the same activity by other passengers. Suicide Attempts Suicide attempts can be destructive, disruptive, and take a high morale toll. Further disruption can result when the publicity encourages others to attempt suicide. Vandalism, Trespassing, and Theft These crimes frequently cause large losses. They also create an overall perception of insecurity on the part of passengers. The prevention of trespassing can thwart a variety of other crimes and disturbances. The security of passengers and personnel must be of primary importance Transit personnel must be relied on for their commitment and dedication, and they must feel safe or their effectiveness will be impaired.
137
short-changing fares
boarding through the rear door of the bus
misusing transfers
turnstile violations
Robbery of token clerks, break-ins, and theft of revenues from within the system are discussed separately. (See companion materials on Theft, Burglary, and Robbery.)
138
Short-Changing Fares One common fare evasion strategy is short-changing fares by depositing only a portion of the fare. Another technique is to use a dollar bill that has been tom in half, folded, and deposited to appear as a whole dollar. Boarding Through The Rear Door of the Bus Fare evasion often occurs in the rear of the vehicle. Instead of slipping past the farebox, the fare evader enters through the rear door. Even if the doors only open from the inside, or if the rear doors are locked by the operator as the last passengers exit, fare evaders may grab the rear doors as others exit, prevent the doors from closing, and enter after the others have exited. Exiting passengers may even hold rear doors for boarding passengers. Although it may be difficult for the driver to see, this type of fare evasion is particularly obvious to passengers.
Misusing Transfers Some systems experience the problem of passengers requesting a transfer, sitting toward the rear of the bus and handing it out the window to a person who can then board at the transfer rate. This can also cause a significant loss of revenue. Violating Turnstiles Thousands of passengers in major systems evade fares at turnstiles by jumping over them, crawling underneath them, or squeezing through the gap. Fare evaders also dart through fare gates or enter through exit doors held open by existing passengers. Similarly, an imbalance or lack of entrance and exit gates can cause bottlenecks in pedestrian flow which contributes to fare evasion. In sweeps where plain-clothes officers have arrested fare dodgers, a true cross-section of transit riders have be caught. They often have excuses about long lines and broken turnstiles. The number of these atypical criminals increases with the number of disabled turnstiles. In fact, major transit systems have found frequent occurrences of dozens of passengers jumping turnstiles as the train arrives because they were frustrated by long lines behind out of order turnstiles.
139
Jammed and broken turnstiles are frequently caused by fare thieves known as trolls and token suckers. They pry open the turnstile and steal the entire bag or box of tokens. Another approach is to steal tokens. Token suckers will jam the turnstile with paper or metal. Then, once the paying rider gets around the turnstile or goes to complain, they will suck tokens out with their mouths. Trolls may employ token catchers, which are thin pieces of metal cut into the shape of a comb and inserted into the coin slot, which can collect several tokens before being removed. A metal sleeve inserted in the coin slot can also collect several tokens. Trolls also steal temporary fare boxes that may be set out by transit staff when turnstiles are jammed.
140
Increasing Driver Visibility Illegal rear boarding problems and illegal distribution of transfers can be monitored by increasing driver visibility. High-mounted left and right view mirrors will allow the operator to see the full length of the outsides of the coach will help monitor the activities of boarding passengers. Interior mirrors can help the operator to see the activities of all passengers. Interior mirrors aimed at the
141
rear door or rear stepwell will allow them to be monitored. Additional mirrors are usually worth their cost because they are valuable safety features. Exact Change Making it easy to obtain exact fares will help limit fare evasion. This can be accomplished by providing change machines or ticket/token sales machines that give change, and by having nearby retail businesses make it easy to obtain correct fare. However, high maintenance costs and delays at the farebox should be expected. Advanced Sales and Convenience of Payment Advance sales can reduce fare evasion. This includes monthly, weekly, or weekend passes with a limited number of rides. Advance sales does lead to a common form of white-collar fare evasion, whereby passengers loan their passes to others. Advance sales and convenience of payment approaches have the benefits of increased ridership and reduced cash handling. However, they require the costs of marketing and additional sales locations. They also may be subject to counterfeiting problems, The more difficult a pass is to produce, the harder it will be to counterfeit. Sweeps by Plain-clothes Police In crack-downs of this type, fare evaders can be booked at the time of the violation. Sentences can include fines, community service, and transit system maintenance such as cleaning and painting. Police sweeps can be a very effective short-term solution, but they are generally limited to those who use the particular station. Cooperation from local police forces and courts are necessary.. Maintaining Turnstiles Well-maintained turnstiles are important. Unfortunately, it is far easier to jam turnstiles than to have them repaired, although repairs usually take only 20 minutes once maintenance staff arrive. Transit systems have found it useful to
Using Coded Fare Cards One expensive, long-term approach to reducing fare evasion is coded fare cards or coded fare tickets. These cards have fare information recorded on the magnetic strip. The cards have a number of advantages. They are
142
In the case of fare theft and turnstile vandalism, the attendant can summon police or security staff. It would be useful if attendants are trained in minimum turnstile maintenance so they can unjam the coin slot area and keep the fare collection system operational. Station attendants are most effective if they are relieved of the routine duty of token sales so they can then devote their full attention to observation. In addition, without tokens, tickets, or cash the attendant is less subject to attack. Table 15. Assessing Fare Evasion and Fare Theft
1 4 3
144
Suicide Attempts
Suicide Statistics
Approximately 25,000 people commit suicide each year in the United States. All ages and sexes may attempt suicide on or around a transit system, and a majority of suicides are attempted by those under 40. Some systems report much higher suicide attempt rates among women; however, the rate of success is greater among men. In addition to loss of life or serious injury, the staff and passengers are subject to trauma.
145
Communicating with Passengers If a potential suicidal individual is observed, transit police should approach and confront the individual, calling on special background training. Although it is not recommended that token clerks or station attendants leave their observation area, they may communicate with passenger through a public address system. Personnel may simply say: Will all passengers waitingfor a train please move away from the edge of the platform. It is highly recommended that station attendants have some means of notifying the train operator to approach the station with caution, whatever the reason. Training Transit Personnel Transit security personnel approaching a suspected suicidal individual should be adequately trained to defuse the situation. Officers should receive sufficient training to identify and properly refer those individuals that may need help. If the person states that he/she were planning suicide, staff can direct them to suicide prevention hotlines. Security staff have the opportunity to defuse a potentially dangerous situation before it escalates by:
offering discounts to public service advertisers such as those with toll-free hotlines,
particularly if the transit agency has an interested suicide prevention advertiser
eliminating public access to track bed areas reducing train speeds into platform areas
146
Immediate Response Time Once a suicide is discovered, a transit employee should immediately follow regular emergency reportingprocedures by notifying the central control. In the case where a vehicle operator or transit staff witnesses a suicide attempt, he/she should
Any sections of track involved should be powered down immediately. Local police should then be notified to conduct an investigation. The body should not be removed by transit staff. Central control should
There should be a contingency plan for suicide attempts which contains emergency operating procedures detailing the responsibilities of specific individuals. Following a suicide attempt, passengers should be immediately cleared away from the area. Witnesses should be kept together so that police can take statements. Attempts That Might Not Be Obvious Should the suicide attempt occur on a bus with paraphernalia the passenger carried aboard, the attempt and cause of injury may not be obvious. If a passenger collapses from a chemical/drug overdose, it is likely that the suicide attempt will be handled as a medical emergency. The driver must safely stop the vehicle and radio dispatch as soon as possible. The report should detail the location of the incident, a brief description of the problem, and the type of emergency forces needed. Also, statements from nearby passengers should be collected. A violent suicide attempt on the transit vehicle is handled differently. Immediate reporting is still required. However, it becomes more important to move the passengers away from the fallen victim-as soon as possible. Statements from witnesses will be necessary. Passengers should not be dismissed; they should be kept away from the incident until police arrive. This will serve to aid in the investigation, aid the efforts of paramedics, and reduce trauma among passengers. On the operations front, another bus and another operator should be dispatched as soon as possible. The incident may otherwise be handled similarly to other accidents and emergency situations.
147
Informing the Public of a Suicide - Don t The transit system should announce that an unavoidable delay in service has occurred, not that a suicide attempt or injury has taken place. The system should also estimate the number of minutes before service will be resumed and announce it, Transit staff should be available to suggest alternative routes, particularly if the station will be closed for more than a half hour. Public relations staff or the transit manager responsible for handling the press should be updated as soon as possible in order to prepare any press statements necessary. Systems will generally receive more favorable coverage when cooperating with the press, so it is not advisable that real incidents be denied. It is essential, however, that staff have accurate information and appear to be well informed of the situation. Resuming Operations Before resuming operations
If operations cannot be resumed due to damage, alternative means of transportation must be established immediately. Collect witness information before the witnesses board another vehicle. In addition, determine the best means of reestablishing the normal schedule by considering vehicles and headways. Witnessing a suicide attempt may or may not cause trauma to an operator, but it can be distracting. The operator should be relieved from duty for the rest of the day with pay. Additional days may also be taken through a liberal leave policy if the employee feels any uncertainty about returning to work too soon. Employee assistance programs should be used to council an employee if it is necessary.
148
Eliminating Public Access to the Track Bed The system should minimize or eliminate public access to the track bed by establishing
Employing Effective Medical Response Systems Employ a rapid and effective response system for deploying paramedics to the scene of a suicide attempt. Slow response times are not acceptable in an emergency situation where lives are at stake. Reducing Train Speed In larger systems, it is not uncommon to experience 50 suicide attempts annually. If a system is having an on-going problem with suicide attempts at particular stations, an appropriate response is to reduce the train speed into the stations. Collecting Witness Information Transit systems can also help minimize liability by collecting witness information. If this has already been done by the police, copies of the information should be obtained through cooperation with the local police agency. The system should have statements from those present at a suicide attempt, especially if they support the system s case that a passenger s entrance into the track bed area was deliberate. Without witness information, it may be difficult to establish with certainty that the victim jumped. Maintaining Accurate Records Records should be collected and maintained on all suicides. Because the measures to prevent suicide attempts are different from those to prevent other types of security problems, statistics on suicide attempts should be kept separately. Information generally recorded includes:
149
150
Vandalism
What is Vandalism
Vandalism is the willful and malicious destruction of property. For small transit systems, vandalism is not too common. For large systems, it is quite common, and the costs can run in the millions of dollars. The crime is generally nonviolent and is aimed at the destruction or abuse of transit property. Like many types of transit crime, vandalism makes transit less pleasant for patrons by increasing anxiety and fear.
Types of Vandalism
Missilings What is Missiling? Missiling includes rock or brick throwing, shooting BB guns or sling shots, and firing guns at transit property. The windows of transit facilities, especially those in transit vehicles, are a tempting target for vandals. Also, the fact that transit vehicles are moving makes them a more tempting target. Risks The high risks to passenger and personnel safety will cause the system to categorize certain missilings as assaults. Rocks, bricks, bullets and BBS all have the potential of not only shattering the glass or plastic, but causing the shards to fly onto passengers. The likelihood of shards entering a passenger s face or eye is high because windows are generally set at levels that enhance visibility. In addition, there is the danger of the missile itself entering the cabin and striking the passengers, especially if the missile is a bullet. Missilings, particularly those hurled with significant force or from powerful weapons should always be pursued as a form of assault as well as vandalism. Inherent Costs Replacing glass or plastic is the highest expense associated with vandalism. Combating Missilings A deterrent is to use vandal resistant glazing, including specially treated glass or plastics. Glass may be strengthened by adding additional layers of thickness. To increase the safety associated with broken glass, windows may be
151
Using plastic in place of glass has been known to have drawbacks associated with clear visibility. Plastic has invited a different sort of vandalism associated with scratching initials or random markings in the glazed panes. In addition, so-called bullet-proof glass, or lexan-type materials, are very expensive. Window vendors have begun to offer a wide variety of options in improved safety and vandal resistance in glazing. For example, there is shatter-proof translucent fiberglass reinforced plastic for bus shelters. Costs are generally related to the effectiveness of the glazing. It should be noted, however, that many options in glazing have trade-offs. Assess the costs of window replacement for the past year and compare them to the costs of replacing glass with vandal-proof glass over the next year. Then weigh that against the cost of not having to replace the glass in upcoming years. Destroying Seats or Other Equipment Inside the transit vehicle, particularly in buses, one of the most common forms of vandalism is the abuse of seats. That includes seats that are slashed with knives, written on with pens or markers, or set on fire. Fortunately, the increased dissemination of information and the adoption of fireresistant materials has made the likelihood of fire slightly less severe. However, the problem has not been completely eliminated. Vandals committing a crime of this nature normally leave a bag smoldering in the back of the bus or purposely light one of the seats on fire. Setting seats on fire is especially dangerous because of the toxic fumes and excessive smoke conditions. Systems should also be concerned about the speed with which an entire vehicle can be consumed in flames. In many cases, vandals may be unaware of the likelihood that their seat fire may result in the consumption of the entire transit vehicle. The vandalism of turnstiles, vending machines, and other equipment has day-to-day operational impacts. This type of vandalism may be motivated by frustration, the thrill of destruction, or attempts at theft. Combating the destruction of seats and other system equipment may be accomplished by the following methods: Hardening Equipment If destruction of equipment is a problem only the hardening of that equipment to prevent the likelihood of theft or ease of breakage is a specific. approach. Otherwise, more general techniques aimed at observing and enforcing to reduce transit crime will be very effective. Using Detection Systems Seat fires can be discovered with early detection devices, Unfortunately, those used most successfully have been employed inside the engine compartment where automatic fire suppression systems can be activated. Automatic fire suppression systems inside the transit vehicle is not practical because of the presence of passengers. Suppression systems may even hinder, patrons attempting to evacuate a vehicle that is on fire. Smoke alarms in a vehicle may provide a form of early detection. This has a combined safety and security benefit. Whether a fire is started from
152
arson or malfunctions in the engine compartment, a smoke detector in the back of the bus can save lives and limit the destruction to vehicles. Flame-Resistant Seat Materials Non-toxic, flame-resistant seat materials should be required. Special seat covers can also be ordered to combat the problem of seat slashing. While hard, unpadded transit seats reduce problems associated with knives and sharp objects, they are not generally favored by passengers. Seat vendors have been sensitive to the need for cut-resistant and flame-resistant seating for a number of years and offer such coverings at a moderate but increased cost. Also, some methods exist to repair torn or slashed vinyl seating, though these may vary in effectiveness. The latest developments in vandal-resistant materials are generally advertised in the transit trade magazines. Vendors should be contacted for the most recent developments in vandal-proof materials. Graffiti Graffiti is one of the most obvious forms of vandalism. It is placed to be seen. Graffiti is committed on a whim; as a test; for fun; or just to spread a name, a mark or a signature. Graffiti is less random a crime than we often think. Graffiti artists - as they consider themselves - need to acquire paints, select a site and a time, and plan the design of more elaborate pieces. Occasionally graffiti is as simple as writing on transit vehicle seats, seat belts, walls, or ceilings with magic marker. This common graffiti may not have been planned by the rider before boarding the vehicle or entering the system. Graffiti can result in signs being stolen, dented, or defaced, This is particularly frustrating for passengers, since it not only presents an eyesore, but it removes necessary information. Graffiti artists commonly work in groups, bonded primarily by entertainment. Those with similar status within a group of graffiti artists may dress similarly. Graffiti vandals generally range from ages 13 to 20, but occasionally include those as young as eight. Graffiti artists who have not yet made names for themselves, or are younger and less experienced members of the group, are sometimes known as toys. Toys will assist with the artwork. After age 19 or 20, ,a graffiti artist will usually give up this pursuit and take up more lucrative crime. Large pieces of graffiti are seldom done by a single artist. One member of the group may be responsible for bringing the basic design, and toys may be responsible for the paint cans. Another artist may do the outline while several still others fill in various colors. Frequently, a member of the group will bring a camera to take pictures of the artists at work. The unexposed film in confiscated cameras and developed photographs in the possession of suspected graffiti artists has helped establish the proof necessary for convictions. Graffiti artists will develop their own mark or symbol to be associated with their pieces, which, if properly recognized and interpreted, can also be used as evidence for convictions.
153
Combating Graffiti in the Transit System Many methods may be used, each with varying effectiveness and cost. These include
using special Graffiti Teams using Anti-Graffiti surfaces routinely removing graffiti instituting an Adopt-A-Shelter Program.
Using Special Graffiti Teams: Because graffiti artists have a culture of their own, one of the most effective approaches has been the use of non-uniformed officers. These officers can
Routinely Removing Graffiti: Graffiti begets graffiti. Therefore, the routine removal of graffiti is one of the most effective means of combating it. This is expensive but has been proven to be very effective. It requires that transit systems be alert and report all incidents diligently. Less obvious graffiti needs to be spotted by drivers and fuelers at the end of each shift. Graffiti artists want a piece to last. The most successful advertising and marketing campaigns to combat graffiti have been those that indicated that no matter how much work was spent on
154
graffiti, it will be washed off the very next day. Various types of cleaning agents and solvents make magic marker clean-up relatively simple. Anti-graffiti coatings, paint systems, surfaces, and solvents are extremely helpful in daily graffiti removal, which generally require steam cleanings. Lastly, every-effort should be made to replace vandalized signs as soon as possible. Instituting an Adopt-A-Shelter Program: In this successful program, -a company or group takes responsibility for cleaning a shelter in exchange for posted recognition. The company should clean once a week for a period of up to a year. This is a fairly low-cost approach with some moderate costs related to posting the notice of who has adopted the shelter.
instituting witness reward programs preventing access to non-public areas involving the local community
Instituting Witness Reward Programs In these programs, several hundred dollars may be offered to anyone providing information leading to the conviction of a transit vandal. The system can make such tips anonymous if that is preferred. One of the advantages is that passengers assist in identifying vandalism close to the time that it happened, making it easier to remove or repair. Preventing Access to Non-Public Areas Areas of the system not normally available to the public should be hardened against access by vandals and other criminals. Center platforms and other means which remove the walls from reach of people are effective ways to reduce vandalism. This may include
(See the portions on Trespassing and Physical Security Countermeasures for additional information.) Involving the Local Community Some systems have successfully employed a community involvement and public relations approach to combating vandalism. Transit professionals may visit schools to distribute transit information and discuss with students the high cost and unfairness associated with transit crime.
155
In some cases, special teams of transit security personnel have been authorized to invest time with youths in the community sharing information and respect. Also, bike patrols enable officers to interact more easily with persons in the surrounding community and in the transit system. Educational packages in schools can include:
Sample
Vandalism
Countermeasures
Objectives
156
157
158
The effectiveness of CCTVs is dependent on how well transit personnel view the monitors; they must be watched at all times. Cameras that pan or monitors that display sequential images will show areas only briefly, so it is important for personnel to quickly perceive something out of the ordinary. It may be necessary for personnel to work in teams and watch the CCTV screens in intervals to prevent boredom and fatigue. Procedures must be established whereby personnel can respond to a trespassing incident.
159
Cameras are very effective in addressing a trespassing problem, particularly if the response is quick and effective. The photographs are a response as well as an observation technique and can be effective evidence if the trespasser is arrested. Once the cameras are installed and activated, they should require little maintenance.
dispatch can efficiently direct them to alerts from sensors, alarms, video surveillance, or other devices. The cost of two-way communications units is moderate and depends on the number of units and the level of sophistication required. All units should be equipped with
Two-way communications systems can be very effective in aiding the response personnel with instructions from the system and in preventing intruders from committing further crimes once they have trespassed. It speeds the response and is an effective force multiplier. The purchase of the units with or without central control equipment requires a one-time installation, although units will need to be replaced over time. This is an on-going procedure that must also be backed up with procedures for response when an incident is detected.
radar
Transit systems use many types of alarms. Silent alarms alert the police of an intrusion. They may be triggered by sensors or manually by ,a foot patrol or passenger. Hidden alarms ring in the vicinity of the intruder or in a remote monitoring system. Remote alarms provide some advantage because the intruder will not
be aware that it has been triggered immediately flee to evade capture attempt to dismantle the system
However, without video or other means of monitoring, there is an increased likelihood of false alarms. Also, in the case of manual activation, it is not usually possible to determine what is taking place, causing difficulty in staging an appropriate response. Furthermore, an alarm triggered manually may agitate the trespasser who is there for criminal purposes. This may endanger the person sounding the alarm. Sensors and alarms are moderately expensive to install and incur a moderate personnel cost. Personnel still need to monitor and respond to alarms, but the sensors provide additional monitoring capabilities because personnel cannot be everywhere at once. Sensors and alarms can
161
be very effective when the appropriate equipment is used. Once the installation is complete, the on-going cost is low.
162
has been breached, transit personnel should be made aware of it through sensors, other devices, or direct observation during a patrol. Fences (barbed wire, razor wire, electrified, etc.) around transit facilities and vehicle lots must be appropriate to the type of protection they need to provide. Some of these barriers, however, can prevent emergency access or exit in the case of a fire or other hazard. Locks, gates, and fences will have a moderate to high cost of installation, depending on the type of system installed. The equipment itself is moderately expensive and will present a formidable barrier to trespassers.
163
164
expensive parts, tools, and machines are stolen vehicle lots or stopped buses when the driver leaves without implementing sufficient security procedures
165
Training Employees One solution is to train all personnel in the proper procedures for maintaining security. Training might include
locking vehicles
securing fare revenues
keeping an equipment inventory
Employees must also learn what happens to those who are caught. It has been shown that employee theft is more easily deterred in systems where employees who steal are prosecuted rather than just discharged. Observing Employees Surveillance Equipment Surveillance systems can include CCTV systems and photo cameras in facilities and vehicles. Cameras take a series of photographs that will document any fare theft by personnel and ensure that proper fare collection procedures are being followed. The photo cameras will be more useful than television cameras in vehicles because they can survive the vibrations of the vehicle better and will last longer with less need for repairs or replacement. Some systems have found success with the placement of dummy cameras that are less expensive and do not operate. A deterrent is created when employees do not know which cameras are operating. Uniformed Patrols Uniformed patrols are obvious to the employee. Personnel know when they are being watched and will act accordingly. Patrols should be completed by security personnel or supervisors. This can prevent theft if observation is used continuously. (See the text on Trespassing and Physical Security Intrusions for more information on observation techniques.) Undercover Patrols Undercover (anonymous) patrols are used by many systems to monitor activities on buses and rail vehicles. Members of the patrol who are unknown to transit employees travel on the system to observe whether procedures are being followed and whether there is a potential for theft or other crimes. Observation procedures are relatively inexpensive and have some effectiveness in situations when personnel must handle cash. Most systems have instituted policies that prevent drivers from handling fares, such as exact fare policies. Implementing Secure Fare Counting and Depositing Procedures Fares are removed from vehicles through different procedures ranging from manual removal by the operator to sophisticated methods using machines which attach to the underside of the farebox through the vehicle floor and move the cash directly to the fare room. One security procedure is to count the money several ways to increase the likelihood of one miscount being detected and
166
rectified. Some systems have the money counted at the facility and weighed at the bank. Others have multiple employees count and recount the cash. Fareboxes Fareboxes can record the theoretical amount of money being deposited, but many cannot effectively record paper money. In fare situations, procedures for comparing the recorded fare to the actual cash must be available. Some systems will not allow paper money to be used and all fares must be in change. This addresses the problem of theft when the money is being counted and the potential for theft when the driver handles cash. Ridership Estimates Many systems generate ridership estimates and compare them with farebox revenue in order to detect discrepancies. Ridership estimates can be made through sample counts on particular routes at various times of day and days of the week. When there is a great discrepancy between the estimated revenue and the actual amount, there might have been some theft on the vehicle or in the fare room. Ridership estimates are also valuable for making operational decisions regarding route changes and vehicle purchases. Fare Counting and Depositing Procedures Fare counting and depositing procedures are moderate in cost in terms of personnel, particularly if multiple fare counting is part of the procedures. The cost is also moderate in terms of facilities and equipment. Some of the more sophisticated equipment is expensive, but the return on investment will be very good if fare theft is a major problem in the system, Any type of procedures must be implemented on an on-going and consistent basis. Implementing Inventory Control Procedures Another location for employee theft is in the maintenance facilities. Many systems have found their inventories of parts and tools shrinking. Strict inventory control procedures must be implemented in the maintenance facility in order to control the theft of costly parts and tools. Procedures in which a tight inventory is kept can help a system detect theft. The fact that a tight inventory is kept and that discrepancies may be quickly detected will also deter potential thieves. Signing Out Tools One inventory control procedure is a system of signing tools out through a maintenance clerk. Maintenance employees should be required to initial a form showing that they have the tool and must return it when they are finished. The employee is then responsible for that piece of equipment. These types of procedures will have a moderate personnel cost, but a low facilities cost. They can very effectively address the problem of employee theft from maintenance facilities. Preventing Theft by Non-Employees Non-transit employee theft is far more common than employee theft. Outsiders may steal fares from fare machines, fareboxes, turnstiles, or other access gates.
167
Securing All Loose Objects The most obvious deterrent is a policy of securing all objects directly to the walls and floors of the facility. Trash cans, display racks, maps, and other items should be securely bolted to the facility itself Observing Equipment and Facilities Equipment that takes and holds fares must be kept under observation through .a CCTV system or direct observation. This can have a high personnel cost and a moderate facility cost. Observation can be very effective if it is combined with a rapid response, such as photographing the perpetrator at the time of the theft or as he/she moves out of or through the facility following the theft. Vehicle lots must be kept secure with fences and surveillance equipment; Many systems have found that camera surveillance is not sufficient for vehicle lots; therefore, security patrols must also be implemented. Observing vehicle lots can have a moderate personnel cost and a moderate to high cost in facilities and equipment. These procedures can have be very effective. Outsider theft also occurs in the maintenance areas. Parts, tools, and items as large as bus engines have been stolen when maintenance areas are breached, Areas must be protected through careful observation and surveillance procedures in combination, with alarms and other devices. Such procedures can have a low personnel cost and a moderate equipment cost. Using a Vault for Keeping Fares The equipment that holds the fares must include a strong and impermeable vault for keeping the cash safe. While no particular device is completely resistant to break-ins, any equipment that makes it extremely difficult will be a deterrent., A thief will not have sufficient time to open a resistant vault unobserved. In addition, any excessive time that is spent working on a vault will be a further opportunity for the police or-transit security to apprehend the thief Secure vaults will be very effective, particularly if the equipment is under observation. Strong, secure equipment can have a moderate equipment cost, but there will be a low personnel cost. Implementing Vehicle Security Procedures Outsider theft also frequently occurs in vehicles when they are not in use. Vehicles can be stolen, but the theft of equipment on board the vehicles is much more common. The most popular target is the radio, but items such as the fire extinguisher and first aid kit are also popular. Operators must always follow locking procedures whenever they leave the vehicle. Other vehicle security procedures should be implemented that require the driver to observe the vehicle at all times. These procedures have a low cost in terms of personnel and facilities and can be very effective in the short term.
168
Securing Administrative Offices Many transit systems have experienced non-employee theft from the administrative offices. Unauthorized access can lead to the theft of expensive office equipment. In addition, records or data on computers can be taken or destroyed by an intruder. It is important to implement consistent procedures for locking the offices no matter how many people are there. Many systems use access cards, keys and codes to limit access into the office area. This is particularly important because access to offices in some systems can be obtained from public corridors. Doors should not be marked in too obvious a manner. Alarms and/or observation of the entrances to the administrative offices will alert police or transit security personnel that there has been unauthorized entry to the offices. There must be procedures for responding to an incident of theft in administrative offices. (See the text on Trespassing and Physical Security Intrusions for more information on these procedures.) Procedures for locking and limiting access to the administrative offices have a low cost for personnel and can have a moderate cost in terms of equipment. When used in combination with other policies, locking procedures can be very effective.
169
Preventing Robbery in the Transit System Robbery is the act of threatening or harming an individual in order to steal what they have. For the transit system, this often translates to the robbery of fare collection personnel and operators. (See the robbery of passengers, which is discussed in more detail in the section on Crimes Against Passengers.)
170
171
Attacks on Personnel
Responsibility of the Transit System
A transit system has the responsibility to protect its administrative, maintenance, operations, and security personnel from the time they report for duty until the time they are safely on their way home.
172
fare or removing a drunk passenger who was disruptive. Transit system employees may also be attacked only because they are alone
among the few people out and available in the middle of the night
believed to be carrying cash and other revenues
ensures that all employees can maintain verbal contact at all times
identifies the whereabouts of all employees at all times
has remote employees check in before and after leaving their assignment location
encourages employees check in at regular intervals
welcomes employees who monitor the safety of other employees
173
Have Employees Check In at Regular Intervals Mobile transit staff that cannot be provided the convenience and security of portable radios due to practical or budgetary constraints can be afforded protection by checking in regularly. Facility maintenance staff should check in at each location which houses a stationed transit employee. They may check in with the employee on duty or may use communications at that site to contact central control. Have Employees Monitor the Safety of Other Employees This increases morale and is especially effective when involving security staff. Security guards or transit police checking in on clerks and drivers makes their security function and protection explicit rather than implied. It also reinforces to patrons that transit employees are given formal protection.
Contingency Plans
The transit system should develop specific procedures to be employed by staff as they carry out their regular duties. In some cases, cooperation with the assailant will be the only effective response. The prevention and elimination of attacks, however, should be the primary concern. Increase Lighting Most transit system operations must typically begin and end in the early hours of the morning and late at night. Staff are vulnerable from the instant they arrive at the site of transit offices. Employees will usually have to walk along a street or across a parking lot. Until they reach the transit offices, they may be at some risk. 174
Lighting a parking lot is very effective in creating a greater sense of security. The lighting should cover the area that employees have to cross to reach the transit offices as well as a perimeter area to allow individuals to see their entire surroundings clearly. The installation of additional lighting is somewhat expensive, but the cost of providing electricity can be reduced by setting lights on a timer that comes on up to 30 minutes before work shifts begin and up to 30 minutes after shifts end. For those employees leaving the building slightly later than expected, a switch that temporarily turns outside flood lights or parking lot lights on can be included. The cost of lighting can also be reduced by mounting spot lights, flood lights, or parking lot type lights on the building itself rather than on poles throughout the lot. This may not be possible if the employee lot is particularly large. Adjust Shift Times Staggered shift times can provide a steady stream of people entering and exiting the transit facility. In this case, individuals who are planning assaults will be uncertain when the next individual might happen by. Also, all passing employees have the potential of interrupting or observing a crime in progress. For the protection of transit personnel whose shift changes are in remote locations, it is beneficial to schedule the beginning of the following shift at least five or ten minutes before the preceding shift ends. If the relieving employee fails to arrive for a shift or is absent from his/her post, it should be reported and investigated. In many cases, this will lead to the disciplining of an offending employee. However, it is helpful from a security standpoint to be able to note the approximate time and immediately send for help if a serious incident occurs. One employee should stay in radio or verbal contact and should be able to observe the approach and/or departure of the other. Eliminating Unauthorized Access to Transit Facilities Entrances to the facility from public areas should generally be locked. The locks should be sufficient to keep out any unauthorized persons without causing staff undue trouble entering. Due to the possibility of an attacker entering the building with a transit employee who has appropriate access, the-area immediately inside the main entrance to the transit facility should be continually monitored by a receptionist, office windows that overlook the entrance way, or a CCTV camera and an alarm. If none of these observation techniques are available in the entrance area, an alarm should be installed that enables transit employees to alert other staff in the building that assistance is needed. Similarly, the transit office building should have windows that overlook the employee parking area, increasing the amount of observation. Many of these measures seem extreme or complicated for only entering the building, but it is the early morning hours when transit systems generally begin and end operations that cause particular danger to individuals. The community in which a facility is located also determines the need and extent of such protection.
175
176
177
hostage situations
hijackings bomb threats All three of these incidents are rare occurrences in transit in this country. When they do occur, however, they can be part of a terrorist situation, in which case there should be procedures in place that allow the transit agency to request assistance from the Federal government. There are many systems that have had the good fortune of never having been involved in a hostage situation, vehicle hijacking, or bomb threat. Nevertheless, the lead security officer at a system should be aware of the measures that the system and the local police department should take to deter and/or respond to these situations. Every incident will have a unique set of circumstances and demands. The over-riding priority of a system in all such incidents should be to minimize injuries and avoid deaths.
179
Hostages
Training Transit personnel
Vehicle operators should receive training on the specific procedures to be followed in the event of a potential or actual danger. These may include:
alerting the dispatcher, either directly or through ten codes. The operator should give
the location of the vehicle and the nature of the danger.
number of passengers
number and description of perpetrators
the demands for releasing the hostages
A spokesperson should cooperate with the media to avoid unfounded exaggeration of the actual events. At the same time, the spokesperson-must stress the sensitivity of the problem and reveal only information that does not put the hostages in greater danger. 3. Negotiate with the Perpetrators An experienced and skilled negotiator should act on behalf of the transit system and police. The ultimate decision maker - transit director, police chief, mayor - should use the negotiator as the intermediary in discussions with the hostage takers. Ideally, the negotiator will end the crisis simply by the powers of persuasion. A negotiator should reassure the hostage takers, allowing them to speak their minds and perhaps soften their stance. Negotiations should be lengthened to place pressure on the hostage takers to back down and to provide more time for the security forces to collect additional information that may help in the case of a forceful reclaiming of the hostages. A good way to lengthen discussions with the hostage takers is for the negotiator to have to defer all decisions to another authority. This also directs the blame away from the negotiator when talks are delayed or demands are turned down. While negotiations are taking place, other security staff should be preparing for the release of the hostages and capture of the perpetrators. The exact procedures to be followed and the assignment of authority should be arranged jointly by the transit authority and the local police. (See Staff and Immediate Response for further discussion on suggested responsibilities and activities for transit staff and outside police.) 4. Forcibly Reclaim Hostages The system and local police must be prepared to reclaim the hostages through forceful means if negotiations appear to be failing. This is a decision that only the highest administrators can make based on recommendations from lead security staff. Force is likely to lead to injuries; therefore, it is a last resort.
181
182
Hijacking
Motives for Hijacking
Hijackers may already possess what they want - the vehicle - and may be using the passengers as anegotiating chip to gain safe passage or meet some other demand. Because motives are usually different in hostage takings and hijackings, transit and police officials may learn about the incidents at different stages of its development For example, hostage takers will reveal that they have hostages as soon as they are ready to make demands. In contrast, hijackersobjectives may be to use the vehicle to travel somewhere. In that case, it is to their benefit to remain undiscovered for as long as possible.
183
Other Measures
Other measures include
184
Bomb Threats
Purpose of Bomb Threats
A bomb threat is to disrupt the system, not to cause physical harm. If harm were intended, a perpetrator would not give advanced warning. Bomb threats elicit many reactions from transit personnel and passengers. There is a sense of relief when the threat turns out to be a false alarm and the potential disaster was avoided. Yet this sentiment soon turns to frustration, distress, and anger as the people affected realize the waste of time and resources they were subjected to and the danger to which they had been unnecessarily exposed.
185
when is the bomb going to explode? This question is crucial in deciding how to proceed. For example, if the answer is five minutes, the transit system should evacuate all vehicles and facilities immediately. If the answer is later today, the person taking the call should try to get a more precise answer before continuing with the other questions. Where is the bomb? This question will help to narrow down its evacuation and/or search activities. The dispatcher should follow up with questions that try to pin down the precise location, e.g., not just which station but which platform, parking lot, or rest room facility. The dispatcher may also try to deceive the caller to find out if the threat is a hoax. For example, he/she can ask Is the bomb at the garage on Main Street? knowing there is no garage on Main Street. What does the bomb look like? What will make the bomb go off? Try to gain more technical information about the bomb. The responses will help the transit security staff to:
Why did you plant the bomb? Who are you? From where are you calling? These questions allow the caller to state any demands related to the bomb threat. From these responses, the transit system should:
186
Evacuating Facilities Depending on the information gathered on the nature of the bomb, local police may order a greater evacuation from transit facilities and areas adjacent to the transit facilities. Planning For Potential Fire and Damage The transit system should coordinate planning with the police and other emergency forces (fire department, medical) on how to control and handle potential fires and damage. In the case of an actual explosion, early planning will greatly reduce the possibility of fire spreading to other areas. Low-Key Reaction to Bomb Threats If the bomb threat is determined to be false or inauthentic, a transit system may record, but not take large scale action on the threat. It should, however, conduct a low-key search that does not disturb service to the passengers.
187
188