EXAMPLES OF INTRUSION
In almost all cases in which an intrusion is defeated, it is stopped from ever happening in the first place by the security operation deterring the intruder away from the target. This is why most discussion of security involves creating the security plan and how to broadcast the presence of security measures. However, sometimes a determined adversary will misjudge or ignore the defenses in place. A security plan must be ready to respond at all times in case deterrence fails.
Capital Asset Protection has had several instances of malicious intruders attempting to breach our defenses. We’ve found that this most often occurs at night, in locations that are difficult to fully monitor all areas at once, such as large factories. In all cases, upon discovery and the realization that an authority figure was aware of their presence, they disengaged with little or no disruption to the property.
A stopped intrusion is cause for [celebration] and relief in how much damage was prevented. However it also necessitates an examination of why the security measures in place failed to deter or obstruct the intruder from entering the property, and a change in procedure to eliminate the weakness.
Today we meet with family and friends to give thanks for our blessings and celebrate our relationships with those close to us, and as we do we should all take a moment to remember that each of us has reason to feel fortunate. Whether it be due to the jobs that allow us to live our lives, the satisfaction we receive from contributing to society with them, and most importantly the people who we will soon be joining together with.
Our management team, Dan, Mark, Mike, Christy, Dylan, and Geoff, wish you a safe and secure holiday, and we hope that it is spent in much joy and little worry.
TO SET UP A DEFENSE
What is the best way to ensure a location is secure from intrusion? It starts with the environment that the building is located in.
Take the above picture for instance, an illustration of a typical industrial building. How does the environment assist in deterring or disrupting intruders? Some measures are obvious – a large fence limiting entranceways, a guard shack in position to limit access to authorized personnel. Some features that help secure the facility are more subtle. The long, unbroken sightlines will reveal any intruder long before he reaches the factory walls. Further improvements could be made still, such as the addition of lighting to ensure nighttime visibility, and cameras so that the entire facility is observable at all times without leaving post. More intensive measures could also be considered, such as replacing the walls with a chain-link fence that does hide potential intruders.
To set up a defense, you must be able to know how the intruder will think – what his approach will be, what goals he will be working towards, and what methods he will attempt to breach the security measures. While you may be confident in your facility’s defensibility, there may be subtle vulnerabilities, or simple changes that could be easily made to improve security. Always make sure to have your defenses reviewed by a security professional, especially in today’s fast evolving world of crime.
FENCING AND PATROLS
The most effective way to deter an intrusion into your property is simply to show that it is being actively defended. A good example is the signs that are commonly placed around homes announcing a security system is installed or at businesses marking the position of cameras – the idea being that if the potential criminal knows that their intrusion has been prepared for, they will not attempt it.
A perimeter barrier is another effective element in a deterrence operation. While most fences provide only a minimum of effectiveness as a delay barrier and thus should be paired with other defensive environmental elements, as a perimeter barrier they are very effective at marking property lines and removing any doubt that a trespasser did not know they were in an unauthorized area.
When a security officer is responsible for defending a property, they will almost always have a patrol schedule implemented as part of the post orders (unless their job duties keep them tied to one area, such as a guard shack at the only accessible entrance). This is partly so the guard can observe the entire property, but arguably the more important result is that the guard makes himself and his active defense visible to anyone who would look to break in.
TRUSTING SECURITY PERSONNEL
One of the most common uses of a security officer is to ensure that there is always a physical presence at what would otherwise be an unoccupied location. This will deter the vast majority of intrusion attempts, but the individuals trusted to man the empty posts must be of the utmost trustworthiness.
Ideally the hiring process filters out the unqualified individuals, and basic interview and verification procedures that all industries use are sufficient. Often times our clients wish to conduct interviews with the potential officers themselves. All of our officers are given criminal history checks, and many undergo additional checks and clearances when positioned at particular sites. For example, working on or near a federal or state government property may require an FBI background check, performing even basic medical procedures mare require an EMT license, and any officers working at a school need several distinct background checks to be cleared before even setting foot on the property.
The majority of the effort is made afterwards, by establishing the standard of conduct, and making sure that the officer is aware not only of policies and procedures, but also that infractions will be discovered and acted upon. Frequent site checks by their managers and road supervisors help avoid a sense of isolation, especially in remote posts and on night shifts when the officer may not expect to be disturbed. As with most aspects of security, the quality of the security operation is directly tied to the quality of the local management.
Exploring What Creates A Protected World