Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Terror, War, Crime, Budget Cuts and Now This – ‘Mall Cop’

By Mark McCourt
February 1, 2009


As if 2009 was not off to a terrifying enough start, Hollywood has chimed in with added terror and fear at the box office. Predicable new releases including “My Bloody Valentine” (in 3D no less), “Saw V” (as in Roman numeral ‘V’ for five in case you don’t have the first four on DVD), “The Unborn” and “Autopsy” are all coming to a theater near you. Even scarier, more shocking and threatening than any of these horror genre movies to security leaders is “Mall Cop.”

“Mall Cop” takes place in New Jersey and is the story of a failed New Jersey State Police Academy candidate who becomes a shopping mall security officer. This is when the fear and terror really begin. The organized crime gangs that target and attack the mall are not eye covering, cringing scary. No, sadly, it is the mall cop himself, who causes goose-bumps and fear.

From the fateful line, “Our mall security is fine, but ultimately we rely on the hope that nothing ever goes down” to the blood curdling scene in which he tries to arrest an elderly shopper in a three wheeled scooter, only to be dragged along the floor behind the scooter. This overweight, feeble, incompetent and at times crying mall cop presents our worse fears of a true security officer’s capabilities and image. Perhaps it raises that fear in backs of our minds that this is how our superiors and peers see our security officers.


Investment in Quality Services

Leading security departments, security companies and organizations (such as the National Association of Security Companies and ASIS International) have invested in training, standards and metrics to raise the competence and skills of the officers, the standards of service and the perception (and salary scale) of the profession. Many years and much work has gone into changing the perception that many CEOs, co-workers and other stakeholders have for security officers, which was a low one.

And while it is convenient to blame Hollywood for its profiting at the expense of the profession’s image, it is probably more valuable to audit your program. Does your organization have a contract security partner that ensures the optimum image, preparation, execution and measurable outcomes?

Training and preparedness, applied technologies, metrics and measurement should be a routine component of your program. Those measurable results should be directly tied to your performance contract and your bottom line. Further, they should be a clear part of reporting to executive management.
In this year’s Annual Guard Firm Ranking report, Editor Bill Zalud takes a hard look at what makes a successful security officer program. With insightful input from Bob McCrie at John Jay College and Joe Ricci at Ricci Communications, Bill's special report gives you new management ideas and trends that show what the best are doing and how they are integrating the latest guard productivity tools. One new element: Look for SAFETY Act certification for a contract guarding firm.

Plus, several solutions-oriented case studies identify how organizations are leveraging more from their partnerships while at the same time, leading organizations are bringing more ideas to their clients to maximize the return on their security officer investment. Thankfully, none of the findings in this year’s Special Report are reminiscent of “Mall Cop.”


Updating with Convergence 2.0

The buzz word of 2006 doesn’t seem to be getting much love anymore, so it seemed the perfect time to bring it back for a fresh look. In the IT world we came to the conclusion that we stopped writing about new technology trends at about the time customers started to implement them. That appears to be the case with convergence. We are finally seeing new technologies and applications come together to improve security operations and deliver measurable productivity and bottom line benefits to users. One proof point: Analog camera sales are forecasted to decline in 2009, for the first time.

In this month’s cover story, Bill Zalud interviews numerous security leaders who are realizing value from the convergence of physical and logical security systems. That includes Tony York, president, International Association for Healthcare Security & Safety; Walt Magnussen, Texas A & M University’s director of university telecommunications and associate director of the school’s Internet2 Technology Evaluation Center; EMC Corporation’s Henry Hoyt; John Petruzzi, VP Corporate Security & Emergency Management at the Simon Property Group; and Robert Messemer, CSO of The Nielson Company. Messemer cuts to the chase: “Convergence brings the opportunity for greater operational efficiency and the potential for contributions toward the organization’s profitability.”

There are many tie-ins to this month’s cover story throughout this month’s issue including features or sidebars on “Enterprise-wide Access Control Platforms” “Physical Security Information Management” and “Security Video and Analytics Converge” (there is that word again!).

I hope you find this month’s issue valuable and helpful. Please let us know at mccourtm@bnpmedia.com.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mark McCourt was once the publisher of Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Budget Cuts Endanger State, Local Courthouse Security

    See More
  • Sequestration Budget Cuts Raise Security Concerns in NY Federal Courts

    See More
  • More Residents Hire Private Security During Police Budget Cuts

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing