Pages

Tuesday, 12 December 2017

Security Awareness for NT businesses - The Principles of Physical Security


Since the beginning of human endeavour, humans have used barriers, tools and procedures to protect themselves from attack. These practices have developed into principles over the generations of human development and are as relevant today as they were many generations ago.

The basic principle is that of layering defences to protect the asset that you wish to protect.  That could be your business or your family, but what does this layering actually attempt to achieve?

What we seek to achieve is a robust series of layered security measures to achieve security-in-depth.  This is the basis for all protective security, including the securing of IT systems.  The strategies may change but the principle of security-in-depth will remain.  

This system provides mutually supporting protective security measures that provide well defined protection of an asset or even your family.  It is adaptable and can be used in many areas of security where protection is necessary. Our army has practiced this principle for most of existence under the term 'Defence-in-Depth' when used to protect defensive positions..

Although it is a very old practice, we are seeing the principle being disregarded in crime prevention strategies and security being installed to rely on one element and at times one piece of technology.

When we look at many some crime prevention risk mitigation strategies being approved by State and local government agencies, it is obvious that these decisions are not being based on solid principles of defence, or security-in-depth.

What are these Principles? They are to Deter, Detect, Delay and Respond.


Deter

The deter perimeter is the farthest one from the location of the assets and is often a mix of Legislative controls (laws), physical infrastructure such as fences and lighting and policies and procedures that are posted as signage along fence-lines.

The security objective on this perimeter is to deter the criminal from even attempting a breach of the protective system. Signage, laws and regulations along with business policies and procedures all contribute to deterrence.

Deterrence is a psychological battle, and when security wins, the criminal activity never starts.

Applying surveillance technology along the perimeter of large enclosures such as industrial sites, will make it obvious to all approaching the perimeter that they are under surveillance.

Signs saying, “no trespassing” or “area under surveillance” also aid in communicating a deterrent message to unauthorised persons.

Deterrence also includes routine foot or mobile patrols of the area by police or security.  it reinforces ownership and crime awareness under the CPTED Principles and increases the risk of detection. The most common form of deterrence for industrial sites is that of a guard dog, however, if overcome, the property will be exposed to criminal attack.

This layer will deter the law-abiding person and most opportunist offenders. 

Detect

The detection layer’s security objective is to monitor large areas of space to accurately detect possible unauthorised intrusion in time to respond appropriately. Surveillance camera technology, is improving all the time and is very effective as an accurate detection tool.

Important objectives are the timely notification to security personnel, and having the ability to digitally or optically zoom into the area where intrusion was detected to clearly identify what is occurring and who is involved, with the ability to clearly identify those involved.

The use of external and internal motion detection technology enhances detection, providing a method of tracking an intruders progress. When combined with CCTV, these become an excellent tool for detection and assists response units by providing situational awareness.
Having patrolling guards, who detect unlawful entry also fulfils this principle and allows for more rapid response, when the event is reported to a control centre.

 Delay

The delay layer’s objective is to slow down an active intrusion enough to force the intruder to give up, or allow the security team to respond.

Use of heavy duty locking hardware and security padlocks on gates will delay an offender, who may be attempting to enter your property and may cause them to either change their attack method, scale the fence or gate or withdraw from the area to move to a softer target.  We would prefer that they move on.

Often, interior locking doors or other physical barriers are used to slow down the intrusion. Surveillance cameras can be used inside the delay perimeter to provide situational awareness and measure the effectiveness of the delay countermeasures.

The use of attack resistant laminated polycarbonate glazing or installing steel mesh security screens protecting glazed areas of the building perimeter structure will provide delay and, if supported by a detector, can give alarm to an attempted entry via the particular point of attack, providing responders with necessary information to quickly attend and challenge the offenders.

Insufficient delay will negate the effectiveness of other layers of security. Time is needed for a response and delaying is the tool to achieve the necessary time. 


 Respond
The response layer is typically a police or security personnel response that attempts to apprehend the intruder.  

Surveillance is used at this perimeter to record the apprehension and determine the effectiveness of the response.  

This final perimeter often includes the involvement of law enforcement and typically overlaps the other perimeters.

Some final comments


The general rule is that the farther away from a secured building the more expensive are the security measures. This holds true for cameras, sensors and access control systems.

Designing outdoor systems requires detailed upfront planning because of the wide range of operating conditions to which the security systems will be exposed. For cameras, lighting and weather conditions are the biggest problems the system will have to overcome and requires expert knowledge of surveillance systems and system capabilities to select the right solution.

Holistic design processes that combine both indoor and outdoor perimeters will provide the most effective physical security systems.

Look at your business or home. Where are your vulnerabilities?
  • How can you modify or harden your building perimeter to best apply the principles of physical security and reduce your vulnerabilities?
  • What technology can I afford to provide mutually supporting defence of your property?
  • How effective is response to alarms in your area? The cost of implementing sound physical security may be negated by poor response.
Keep in mind that good security does come at a cost but the biggest cost will be not training your people and yourself in testing and using the technology. 

Know your systems well and test your systems to identify gaps or system failures.  A DVR hard drive in tropical areas, subject to severe electrical storms can be easily damaged during wet season tropical storms and, without testing, may not be identified as an issue for some time, leaving your business vulnerable to not having video evidence, when needed.

Security-in-depth and the principles of physical security rely on mutually supporting measures that complement each other. Reliance on one system to protect your property is gambling with your security and safety. Keep this in mind when people are advising you of how you can improve the security of your business or family home.

No comments:

Post a Comment