You are on page 1of 38

Introduction to Security

Chapter 6 Enhancing Security through Physical Controls

Prepared by: Matt J. McCarthy

Crime Prevention Through Environmental Design (CPTED)

Began in the early 1960s A fundamental concept in security design that is based on the premise that effective use and manipulation of the physical environment can reduce criminal behavior

Prepared by: Matt J. McCarthy

Crime Prevention Through Environmental Design (CPTED)


4 Key Strategies: 1. Territoriality 2. Natural Surveillance 3. Activity Support 4. Access Control

Prepared by: Matt J. McCarthy

Crime Prevention Through Environmental Design (CPTED)


1. Territoriality: Most people tend to protect area that they feel is their own, and have a certain amount of respect for others. Fences, pavement treatments, signs and landscaping all help to express ownership.

Prepared by: Matt J. McCarthy

Crime Prevention Through Environmental Design (CPTED)


2. Natural Surveillance -This is almost entirely based off of the fact that criminals do not want to be seen. - place physical activities, features and people in a way that they can be observed - remove trees, sheds, bushes and other sight obstructions
Prepared by: Matt J. McCarthy 5

Crime Prevention Through Environmental Design (CPTED)


3. Activity Support - encourage legitimate activity in public spaces - any activity that gets people out and interacting helps to discourage crime - basketball courts in parks, neighborhood parties, etc.
Prepared by: Matt J. McCarthy 6

Crime Prevention Through Environmental Design (CPTED)


4. Access Control - properly located entrances/exits - fencing - lighting - receptionist at a front desk - a neighbor sitting on their front porch

Prepared by: Matt J. McCarthy

An Overview of Physical Controls


Concentric Zone Theory based on the premise that the more valuable an asset is, the more protection it needs

Prepared by: Matt J. McCarthy

Concentric Zone Theory

Prepared by: Matt J. McCarthy

An Overview of Physical Controls


3 Basic Lines of Physical Defense: 1. The perimeter of the facility 2. The building exterior 3. The interior

Prepared by: Matt J. McCarthy

10

Basic Security Equipment


A. Locks - key, key card or smart card operated first used in Egypt over 4,000 years ago - remains one of the oldest, most commonly used methods of access control
Prepared by: Matt J. McCarthy 11

Basic Security Equipment


B. Biometrics - the science of using individual physiological features or behavioral characteristics to positively identify a person Examples: fingerprint, iris/retinal scans, hand geometry, voice, et al.
Prepared by: Matt J. McCarthy 12

Basic Security Equipment


C. Lighting - intruders want darkness to cover their actions - 3 out of 4 commercial burglaries are committed within buildings with little or no light

Prepared by: Matt J. McCarthy

13

Basic Security Equipment


C. Lighting 4 types: 1. Continuous 2. Standby 3. Moveable 4. Emergency

Prepared by: Matt J. McCarthy

14

Basic Security Equipment


D. Alarms - date back to 390 BC when geese were used - many federally insured institutions are required to use them - some insurance companies offer discounts for alarm installation/use

Prepared by: Matt J. McCarthy

15

Basic Security Equipment


D. Alarm uses:

Burglar Fire Temperature Humidity Water flow Electrical power

Prepared by: Matt J. McCarthy

16

Basic Security Equipment


D. Alarm system types:

Local sound on the premises only Proprietary a constantly-manned alarm panel operated by the owner Central Station similar to proprietary, except usually operated off premises by an alarm company Police Connected the alarm is directed via phone lines to the nearest police dept.
Prepared by: Matt J. McCarthy 17

Basic Security Equipment


D. Alarms False Alarms

More than 90% of all intrusion alarms are false alarms, resulting in needless expense and risks on the part of responders. Because of the high number of false alarms, many cities prohibit alarms connected directly to the police department.

Prepared by: Matt J. McCarthy

18

Basic Security Equipment


E. Closed Circuit Television (CCTV)

A generic term, generally meaning a system in which a number of video cameras are connected in a closed circuit or loop, where the images are sent to a central television monitor or recorded. CCTV systems range from basic system to very complicated networks.

Prepared by: Matt J. McCarthy

19

Basic Security Equipment


E. Closed Circuit Television (CCTV)

Cameras may be overt or covert, or semi-covert.


Overt out in the open Covert hidden Semi- Covert cameras are in public view but behind a one-way transparent covering.

Prepared by: Matt J. McCarthy

20

Basic Security Equipment


E. CCTV other technology: Internet Protocol Video (IP)

Video can be sent across a companys data network so that it can be viewed wherever the company chooses. These can cause bandwidth and digital storage issues for a companys network.

Prepared by: Matt J. McCarthy

21

Basic Security Equipment


E. CCTV other technology: Night Cameras most popular kind use image intensification that amplifies available visible and nearinfrared light to achieve better vision

Prepared by: Matt J. McCarthy

22

Basic Security Equipment


E. CCTV other technology: Thermal Imaging operates on the principle that all objects emit infrared energy that can be seen using a thermal imager

Prepared by: Matt J. McCarthy

23

Privacy concerns

There is concern over the amount of, or rather lack of, privacy by private, non-criminal citizens through the extensive use of surveillance methods. Some cities are passing legislation to govern these types of devices and their use.

Prepared by: Matt J. McCarthy

24

Facility Physical Defense Guidelines

Prepared by: Matt J. McCarthy

25

The Perimeter

The perimeter can be controlled by a variety of ways:


A. Fences 2 basic types
Ornamental Chain Link effectiveness can be increased by adding razor wire, barbed wire, etc.

Prepared by: Matt J. McCarthy

26

The Perimeter

The perimeter can be controlled by a variety of ways:


B. Alarms C. Perimeter Lighting

Floodlights Street lights Fresnal units Searchlights

Prepared by: Matt J. McCarthy

27

The Perimeter

The perimeter can be controlled by a variety of ways:


D. Surveillance Cameras E. Vehicle Barriers

Active require some action by a person or equipment to be raised into place Passive a fixed device with no moving parts, such as guard rails, concrete poles, etc.

Prepared by: Matt J. McCarthy

28

The Perimeter

The perimeter can be controlled by a variety of ways:


F. Patrols

Security Officers Patrol or Guard Dog units roam alone inside a perimeter or building to deter intruders

Prepared by: Matt J. McCarthy

29

The Perimeter

The perimeter can be controlled by a variety of ways:


G. Signs H. Physical Layout When possible, we should always try to maintain a clear zone of 20 feet on either side of the perimeter

Prepared by: Matt J. McCarthy

30

The Building Exterior


For some facilities, the exterior is the first line of defense. Keys for effective security:

Strong, locked doors Limited number of entrances Secured openings (>96 sq. inches) Alarms Surveillance Lighting

Prepared by: Matt J. McCarthy

31

Building Exterior controls

Panic or Crash Bars

A device located on the inside of a door only. It allows the door to opened in case of a fire, but has no hardware on the outside that can be used to open the door.

Prepared by: Matt J. McCarthy

32

The Building Interior

Internal physical controls are usually required along with external controls. Secure areas should be separated from non-secure areas if possible.

Prepared by: Matt J. McCarthy

33

The Building Interior


Safeguards:

Locks Alarms Mirrors Document shredders Vaults/ safes Bolt down large, moveable equipment Lock down devices on office equipment Surveillance systems
Prepared by: Matt J. McCarthy 34

The Building Interior


The Command Center

Should be linked to the security control center Should be in a tightly controlled area Can also monitor access Increasingly, staff members of the command center can also handle computer network issues if need be.

Prepared by: Matt J. McCarthy

35

The Physical Security System

The goal is to provide the amount of security needed - neither too much nor too little. This is a balancing act between aesthetic, operational, safety and security needs.

Prepared by: Matt J. McCarthy

36

The Physical Security System

Physical Security Users: a group comprised of the people who own the property being protected, the people who work at or visit the facility, and the security forces themselves.

Prepared by: Matt J. McCarthy

37

The Physical Security System

Physical security footprint the mark left during or after a security action that the public sees and lets them know security is present.

Prepared by: Matt J. McCarthy

38

You might also like