Buildings play a significant role in our lives. We live in homes, apartments and dorms. We work in office parks, stores and high rises. We go to school on campuses and we attend a whole host of events indoors. Still, if you’re like most people you never give the physical security of these structures a second thought. That is until, something gets stolen or someone gets assaulted. In the aftermath of an event, security receives a great deal of attention…for awhile.
As a security professional, I’ve rarely been called in to review the security of a building for proactive reasons. Typically something has already happened; either in that facility or somewhere nearby. When consulting about such issues, I spend a great deal of time emphasizing the need for a proactive mindset regarding security. Sometimes these efforts bear fruit. Other times, people listen politely and then promptly ignore everything I’ve just told them. This used to surprise me, but it no longer does. It is simply human nature.
In the absence of immediate threat, most people relax to the point of their previous vulnerability.
Whose Responsibility is it?
Building owners, managers and their agents have legal, ethical and moral responsibilities to provide a reasonably safe environment for the users of their facility. Still, if you’ve been reading this blog for awhile now, you know that you cannot solely rely on others to protect you. A basic knowledge of physical security concepts will help you make informed decisions about your personal security.
Physical Security 101
While the purpose, operating parameters and specific risks of every building are unique, there are some physical security concepts that are universal. I encourage you to take the following into consideration when deciding how your personal security is impacted by the buildings you frequent.
Concentric Circles: The concentric circle theory of security is fundamental to understanding how physical protection measures should be deployed. Concentric Circle theory says that a building should be surrounded by multiple layers or “concentric circles” of increasingly heightened security. In order for an adversary to gain access to the building’s most valuable assets, he would have to first pass through all the other layers of security. These multiple layers of security increase the odds are that the adversary would be stopped prior to reaching his target.
The concentric circle theory of security is not new. In fact, the concept has been with us since people lived in walled cities and castles. Still, many organizations fail to make adequate use of this fundamental concept. Far too many organizations employ an outer layer of security and then call it done. As a direct result of such thinking, once an adversary gets past the building’s outer perimeter, they can wander about freely. While this is very convenient for legitimate users, it is equally convenient for criminals, disgruntled former employees, stalkers and abusers
The Four Ds of Physical Security: The 4 D’s of physical security is a complementary concept to the concentric circle model discussed above. The 4 Ds include Deterrence, Detection, Delay and Denial.
Deterrence: At the outer edge of the concentric circle model is the complimentary concept of deterrence. Deterrence is based on the idea that a rational adversary will make a value judgment about the ease or difficulty associated with committing a particular crime at a particular location. A crime is “deterred” when the adversary judges that the level of visible security poses too much of a risk of being caught and therefore decides to move on to another target. While most people and organizations believe in the concept of deterrence, it is exceptionally difficult to quantify. After all, how does one measure an event that never happened? Still, common sense dictates that deterrence is real and can prevent at least some people from selecting a particular location for their criminal activities.
Detection: If an adversary is not deterred by the visible security at a given location, the next best step is early detection. Detection is the point at which responders learn that the adversary has gained unauthorized access to the facility. Detection includes such countermeasures as cameras, alarms and employee awareness programs to name a few.
Delay: Delay, as the name implies, serves to slow down the advance of an adversary until the arrival of security or police responders. Delay must work in conjunction with detection. In other words, an adversary must be detected first, and then delayed long enough for responders to reach the adversary. Delaying measures typically include various types of barriers and locks.
Denial: Denial occurs when security or police responders arrive on scene and capture or cause the retreat of the adversary.
Note that all four Ds must work together.
1. If an adversary is not deterred, there must be a method of detection
2. If an adversary is detected, the detection technology needs to elicit a response from the security forces.
3. While the security forces are en route, there must be sufficient delaying mechanisms present to allow the responders to reach the scene in a timely manner.
4. When the responders reach the scene, they need to be equipped and trained so as to properly handle the situation.
Characteristics of a Secure Facility"Secure" is a relative term, but as a matter of practicality the reader should consider how the presence or lack of the following characteristics could impact their personal security program.
Area Characteristics:
1. Is the building located in a high crime area?
2. Is the building located near high profile facilities that are likely to be targeted by criminals or terrorists?
3. Are there any obvious natural hazards that could impact your safety?
4. Are there any technological hazards or unsafe conditions that could pose a hazard to you?
Property & Building Characteristics:1. Does the property have well established borders and an easily identifiable purpose?
2. Does the property limit areas of concealment and allow for natural surveillance?
3. Is the facility well maintained?
4. Is the facility well lit?
5. Is there a method of actively controlling access to the property?
6. Is there a method of actively controlling access to the building?
7. Are visitors required to be escorted by employees or other authorized persons?
8. Do the occupants have a sense of ownership and/or community?
9. Is there an onsite security force present? If so, do they look and act professionally?
10. Do security personnel or another designated group provide escorts to people walking to their vehicles?
11. If cameras are present, are they well maintained and actively monitored by a real, live person?
12. Is the facility adequately segmented into layers of security?
13. Finally, if you were going to commit a crime, would you choose this facility? Why or why not?
One need not be a security professional to adequately assess the personal risk they face as a user of a particular building. Applying the basic concepts discussed here should assist the reader in determining how the security measures at a given facility may impact their personal security program.
By: SA Watson