U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Centralized v Decentralized Services, Phase 3 - California State Police Division, Department of General Services

NCJ Number
79920
Date Published
1979
Length
81 pages
Annotation
This study examines the cost effectiveness of the California State Police (CSP) in meeting the State's security and police needs along with agencies which are duplicating CSP services; recommendations to reduce costs are outlined.
Abstract
Background information on the CSP covers its history, legal authority, funding, organization, and operations. A review of previous studies on the CSP, police records, and interviews with State and local officials revealed that a duplicative and unnecessarily expensive law enforcement staffing policy has evolved within the CSP. Rather than supplementing local law enforcement capabilities, the State has supplanted local efforts on much State property to the detriment of the taxpayers. To promote cost effectiveness, State officials should undertake risk managment analysis which estimates the economic costs of the risks being considered and identifies an array of countermeasures. This study recommended that the CSP continue to provide protection for the governor, other State officials, and the capitol area, but that services in other parts of the State be sharply curtailed and returned to local law enforcement agencies. Any extra facility security services provided by the CSP should be justified by a security survey. The study also assessed police and security services within the several State agencies. In most cases, centralizing the provision of security services under the CSP would be as or more efficient and decrease costs. Recommended service consolidations are detailed for individual agencies and exceptions where CSP takeover would not offer any cost advantages are noted. Footnotes, tables, excerpts from a Rand Institute report on comparing security alternatives, and 14 references are included. (Author summary modified)