Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

150 Things You Should Know about Security
150 Things You Should Know about Security
150 Things You Should Know about Security
Ebook561 pages9 hours

150 Things You Should Know about Security

Rating: 5 out of 5 stars

5/5

()

Read preview

About this ebook

150 Things You Should Know about Security, Second Edition covers the essential tips and techniques for the latest trends in physical security. This indispensable guide further covers the latest technological trends for managing the security needs of all kinds, from physical and corporate security, to the latest cybersecurity threats. Through anecdotes, case studies, and documented procedures, the authors have amassed the most complete collection of information on security available. Security professionals will find this book easy to use and understand when seeking practical tips for managing the latest security technologies, such as bio-metrics, IP video, video analytics, and more.

Several themes have been included, such as management principles and styles, communications, security applications, investigations, technology, physical security, the future, and many more. In addition, tips for quantifying the reduction and prevention of crime, loss and liability risks are included, assisting security professionals in securing corporate resources for security manpower and infrastructure.

  • Provides essential, practical tips on a seemingly infinite number of security topics, allowing busy security professionals quick access to the information they need
  • Blends theory and practice with a specific focus on today’s global business and societal environment and the various security, safety and asset protection challenges
  • Provides tips on how to utilize the growing field of crime prevention through environmental design (CPTED)
LanguageEnglish
Release dateAug 18, 2017
ISBN9780128095089
150 Things You Should Know about Security
Author

Lawrence J. Fennelly

Lawrence J. Fennelly is an internationally recognized authority on crime prevention, security planning and analysis, and on the study of how environmental factors (CPTED), physical hardware, alarms, lighting, site design, management practices, litigation consultants, security policies and procedures, and guard management contribute to criminal victimization. Mr. Fennelly was previously employed with Apollo Security, Computershare, Inc., as well as a sergeant at Harvard College, employed by the Harvard University Police Department in Cambridge, Massachusetts. He was trained as a crime prevention specialist and served in this capacity for over 21 years at Harvard. He was also the department’s training officer and assistant court officer. As part of his role as an officer at Harvard, Larry also was a deputy sheriff in both Suffolk and Middlesex counties (Massachusetts). Mr. Fennelly is a frequent speaker and lecturer on CPTED, physical security, school crime, and other issues. He serves as an expert witness who works closely with attorneys in defense as well as plaintiff cases, assisting in case preparation, offering knowledgeable questions to ask the opposing side, etc. He has also done a considerable amount of consultant work throughout the United States. His experience ranges from identifying vulnerabilities to conducting security and lighting surveys, working with architects to design and implement security, and developing long range guard training programs and risk assessments of various facilities. He is also a prolific author. His titles include such well-known security books as "Crime Prevention Through Environmental Design," "Effective Physical Security," and "Handbook of Loss Prevention and Crime Prevention."

Read more from Lawrence J. Fennelly

Related to 150 Things You Should Know about Security

Related ebooks

Social Science For You

View More

Related articles

Reviews for 150 Things You Should Know about Security

Rating: 5 out of 5 stars
5/5

1 rating1 review

What did you think?

Tap to rate

Review must be at least 10 words

  • Rating: 5 out of 5 stars
    5/5
    Excellent manual about security administration and technique acquisition for professional.

Book preview

150 Things You Should Know about Security - Lawrence J. Fennelly

150 Things You Should Know about Security

Second Edition

Lawrence J. Fennelly, CPOI, CSSI

Marianna A. Perry, M.S., CPP, CPOI

Table of Contents

Cover image

Title page

Copyright

Dedication

Preface

150 Things You Should Know about Security

1. Crime Prevention Through Environmental Design Strategies

2. Six Additional Crime Prevention Through Environmental Design Strategies

3. A New Role for Law Enforcement: Support of Community Development

4. Environment

5. Target Hardening

6. Deterrents

7. Crime Prevention Through Environmental Design: Care and Maintenance

8. Questions to Be Answered During a Crime Prevention Through Environmental Design Assessment

9. Some Benefits of Crime Prevention Through Environmental Design Planning Activities

10. Use of Information

11. Defensible Space Principles

12. Examples of Strategies in Action

13. How to Increase Security Through Building Design

14. Windows and Window Shutters

15. How to Design a 5-Year and 10-Year Security Plan

16. After Crime Prevention Through Environmental Design and Community-Oriented Policing Services (Situational Prevention)

17. Access Control Cards: Twenty-Three Things You Should Know

18. Body Cameras for Law Enforcement and the Private Sector

19. Social Media

20. Bullycide

21. Encryption Defined

22. Cybercrime: What Security Directors Need to Know About Cyber Security

23. Terrorism: Reinventing Security Performance

24. What Managers Need to Know

25. Seven Things You Need to Know about Soft Targets

26. Helpful Hints From a Burglar

27. Malicious Destruction of Property

28. Risk Assessment

29. Key Control and Badge Control

30. Digital Security Surveillance System

31. Lighting and Security

32. Lighting Levels

33. Security Checklist From the Massachusetts Home Security and Crime Prevention Center

34. Top Ten Security Threats

35. The Audit

36. Mail Services Security

37. Crime Analysis

38. Emergency Planning

39. Fire and Life Safety

40. Exterior Physical Characteristics: Perimeter Grounds

41. Exterior Windows

42. Security Officers Checklist

43. Safes

44. Metal Theft

45. Master Planning: Physical Systems

46. Parking Lot Safety Issues

47. Physical Security Is Needed to Prevent Workplace Violence in the Health Care Environment

48. Security Assessment Follow-Up

49. Seven Things You Should Know About Physical Security Information Management

50. The Ten Basic Knowledge Areas for Crime Prevention, in the 21st Century

51. Ever Need a New Year’s Resolution? How About Changing Your Passwords?

52. Speed Bumps

53. Bullying and Liability for Schools

54. Police Massachusetts School Bus Driver Drunk in Crash

55. Security Officer Responsibilities

56. Emergency Planning and Development

57. Seven Basic Types of Protective Lighting

58. Things You Need to Know about Soft Targets

59. The Ultimate Security Cookbook and the Future Trends

60. Ten Steps to Reduce Risk

61. ASIS Standards and Guidelines

62. Safe Citizen and Law Enforcement Encounters

63. The Art of Training

64. Do Not Take Training Lightly

65. Security/Protection Officers and Professionalism

66. The Importance of Professional Certifications: ASIS International and International Foundation for Protection Officers

67. Guard Houses/Guard Booths

68. Physical Security Expenses and Maintenance

69. Data Center and Server Security

70. Loading Dock and Chemical Storage Security

71. The Six Most Critical Areas in a Storage Facility

72. Parking Facility Security

73. Emergency (Blue Light) Phones/Call Stations

74. Environmental Security

75. The Neighborhood and Fear of Crime

76. Designing Security and Site Layout

77. Montreaux Document

78. Access for Physically and Mentally Challenged

79. Active Shooter/Active Assailant

80. How to Respond When an Active Shooter Is in Your Vicinity

81. School Parking Lots and Garages

82. Women as Investigators

83. Preventing Identity Theft

84. Top 10 Crime Prevention Through Environmental Design Research and Best Practice Resources on the Web

85. The Role of Security Practitioner

86. Physical Barriers

87. Fire Safety Issues

88. Video Analytics and Thermal Cameras

89. Design Out Crime/Designing for Security

90. Mass Notification Procedures

91. Occupational Safety and Health Administration Regulations

92. Workplace Fire Safety

93. Security for Marijuana Farms and Dispensaries

94. Site Security During Construction

95. Protection of Cultural Resource Properties: NFPA 909

96. Three Phases of Attack

97. Thirteen Steps to Avoid Becoming a Victim

98. Courtroom Testifying

99. Crime Prevention: Eighteen Terms You Should Know

100. Hazardous Materials

101. Hazardous Materials: How They are Harmful to People

102. Informants

103. Twenty Things You Should Know about the Legal Aspects of Security

104. The 3-D’s Approach to Crime Prevention Through Environmental Design

105. Management Principles According to Bud Smith

106. Crime Prevention Tips from the Greenville, NC, USA, Police Department

107. Why Security Fails

108. Fifty Random Aspects of Physical Security That You Should Know: a Checklist

109. Emergency Manager Responsibilities

110. National Response Framework: Five Mission Areas

111. Emergency Planning Best Practices

112. National Fire Protection Association

113. Organization and Administration

114. Organization and Planning

115. Outsourcing for a Security Practitioner

116. Paper Shredders

117. General Personnel Security

118. Personnel Security: Twenty-Five Things You Should Know

119. Ten Things You Should Know about Fraud

120. Physical Access Control

121. Physical Security: Ten Things You Should Know

122. Glazing (Bullet-Resistant and Burglary-Resistant Glass)

123. Privacy in the Workplace

124. Product Contamination

125. Reengineering, Downsizing, and Rightsizing: Twenty-Five Things You Should Know

126. Retail Security

127. Retail Security Management

128. Risk Analysis

129. Robots as Security Devices

130. The Role of Risk Manager

131. Crimes Defined

132. Safe Schools

133. Security Assessments

134. Biometrics Using Hand Geometry

135. Security Management

136. Protection of Sensitive Information

137. Transportation Security

138. Setting Specifications and Getting Bids for Security Components

139. Sexual Harassment

140. Sexual Harassment in the Schools

141. Stalking

142. Stress on the Job

143. The Use of Force by Private Citizens

144. Freedom of Information Act

145. Travel Security

146. Physical Entry and Access Control

147. Letter and Parcel Bombs

148. Liaison: Twenty-Five Things You Should Know

149. AMBER Alerts

150. Emerging Trends in Security

Appendix 1

Appendix 2

Index

Copyright

Butterworth-Heinemann is an imprint of Elsevier

The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, United Kingdom

50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States

Copyright © 2018 Elsevier Inc. All rights reserved.

No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.

This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).

Notices

Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary.

Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.

To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.

Library of Congress Cataloging-in-Publication Data

A catalog record for this book is available from the Library of Congress

British Library Cataloguing-in-Publication Data

A catalogue record for this book is available from the British Library

ISBN: 978-0-12-809485-3

For information on all Butterworth-Heinemann publications visit our website at https://www.elsevier.com/books-and-journals

Publisher: Candice Janco

Acquisition Editor: Candice Janco

Editorial Project Manager: Hilary Carr

Production Project Manager: Punithavathy Govindaradjane

Designer: Matthew Limbert

Cover Image Credit: Karen Camilovic with Camilovic Creative

Typeset by TNQ Books and Journals

Dedication

I have three sons, Larry, Bill, and Stephen and wish to dedicate this book to them. My wife and I love them dearly. They are not only our children but also our best friends. We are a close family who support one another and laugh a lot together. Sad, but many people don’t have this type of family bond.

Lawrence J. Fennelly

This book is dedicated to law enforcement officers and security professionals who work hard every day to keep people safe and protect our way of life. Thank you.

Marianna A. Perry

Preface

This book is the second in a series of the 150 books. The first was Physical Security: 150 Things You Should Know. You are probably thinking that it would be difficult to come up with 150 items, but it really was not that hard. We included ASIS Standards, Underwriters Laboratories (UL), and National Fire Protection Association (NFPA) Guidelines, and also Occupational Safety and Health Administration (OSHA) material, because all these topics affect security and need to be included in a holistic approach to security vulnerabilities.

Today, we routinely recommend light-emitting diode lighting, which is energy efficient. Years ago, when conducting assessments, we both remember struggling to have high-pressure sodium lighting installed because the common misperception was that this type of lighting killed trees and plants. Clearly, we realized that people needed to be educated about good security practices, especially lighting. Times are changing and technology is moving us forward at an incredible pace.

When we say, 150 Things You Need to Know, we understand that there are more than 150 things that security practitioners need to know and be aware of. This book presents information in an easy-to-read format and covers a variety of topics. Each section of this book has been carefully placed for your review. Security does not have to be complicated, but it does have to be specific.

We have added only one item in the appendix, which is a chapter from Sandi Davies book, Women in the Security Profession: A Practical Guide for Career Development, titled, The Future of Women in Security: Developing a Strategy for Success. We feel that this work has some useful information for security professionals.

It is our intent to motivate everyone in the security profession to strive for higher levels of awareness and preparedness for the years ahead. This is the responsibility of all of us who are a part of the security profession and who must deal with the questions of where we are leading the discipline and how the role of security will support the organizations of the future.

Lawrence J. Fennelly

Marianna A. Perry

150 Things You Should Know about Security

Abstract

Crime Prevention Through Environmental Design (CPTED) concepts have been proven to enhance community activities while reducing crime problems and are fundamental to traditional law enforcement values, in terms of helping the community to function properly. The seven overlapping strategies of CPTED are discussed. The questions that are to be answered during a CPTED assessment are listed. The benefits of CPTED planning, in addition to dealing with the reduction of crime and fear problems, are listed. There needs to be the right mix of people and technology for the overall security plan to be effective. Therefore, the role of access control and video surveillance in preventing crime is discussed. The authors discuss extensively about soft targets and the role of target-hardening in reducing crime. A security checklist, including 35 security checkpoints, to assist in risk assessment is provided. The role of physical security in health care environment is described. Lighting is the single most cost-effective deterrent to crime. Hence, the types of lighting, their sources, and goals are reviewed. Special attention is paid to the subject of active shooter/active assailant and how one should respond when an active shooter is in the vicinity. The authors have also provided a classification of fires and the selection of extinguishers based on the type of fire. Fraudulent activity is an issue for individuals and all types of business operations from the small mom-and-pop store to the large Fortune 50 operation. The goal of those initiating and committing the fraudulent activity is to gain some type of monetary benefit. The goal of the targeted operation is to identify the threat and to educate their associates to identify and to eventually block the threat. Therefore the authors have discussed the top ten fraud-related issues present today.

Keywords

10,080 pixel; 3 D’s; 360  degree peephole; A Plus Paper Shredding; Access controls; Access risks; Active assailant; Active security; Active shooter; Actively check professional references; Activity program; Activity program support; Activity support; ADA requirements; Additional hours; Additional work; Adopt-a-student programs; AED; Age or marital status; Alarms; Alerts; All lives matter; Annealed glass; Anticipation; Appraisal of a crime risk; Approaches; Approved by UL; ASIS; ASIS School Safety and Security Council; Asphyxiation; Assaults; ATM; Audit; Auditing; Auditors; Audits/assessment/future; Authority; Bad management skills; Badge control; Benefits; Burglars; Best practices; Biometrics; Biometrics and access control to specific areas; Blue light phone; Blueprints and designs; Body cameras; Bollards or barricades closing down streets and controlling access; Broken; Browser-based user interface. Both the K3 and K5 integrate the 90  terabytes of data; Building designs; Bullet-resistant glass; Bulletproof glass; Bullycide; Bullying; Bumper stickers; Bumps; Burglar; Burglar resistant; Bus accidents; Calling 911; Capital letters; Carelessness; CEO; Certification; Changing attitudes; Changing of climate control; Charley bar; Check criminal and credit histories; Chemical storage; Clear border; Communication; Communications and video surveillance; Community; Community awareness; Conducting investigations; Confident; Conflict; Consider integrity surveys; Construction sites; Contracts; Copper drains; COPS; CORI check; Corporate executives; CPR; CPTED; CPTED design; CPTED for 2017 and beyond; CPTED landscape principles; CPTED principles; CPTED principles and concepts; CPTED principles and strategies; CPTED, the second generation; CPTED, the third generation; Credentials; Crime analysis; Crime displacement; Crime pattern analysis; Crime problems; Crime rate; Crime risk; Criminal and civil law; Criminal assets; Cross-examination; Crowding; Crying; C-TPAT; Customs Trade Partnership Against Terrorism; Cybercrime; Data breach; Data center; Data security; Dedicated security personnel; Defensible space; Defensible space principles and concepts; Delay time; Deletion; Deposition; Depression; Designing for security; Deter; Deterrents; Developing security points; Digital closed-circuit television; Digital recording; Disabilities; Disaster response; Displacement of crime; Documentation; Doors; Drunk driver; Duty; Dynamic alarm management; Dynamic risk; Emergency command center; Emergency evacuation planning; Emergency light; Emergency management; Emergency planning/procedures; Encryption; Entrance; Entrapment; Environment; Environmental clues; Environmental security; Equipment requirements; Ethnic background and race; Evacuation; Evidence preservation; Excessive postage (usually postage stamps); Exit doors; Exterior physical characteristics; Exterior windows; Extortion; Extremely hazardous; Fear of crime; Federal information center; Fee-based training services; Felony; FEMA; Fences; Financial printouts; Fire; Fire alarm system; Fire and safety regulations and codes; Fire detection and suppression equipment; Fire drills; Fire prevention; Fire prevention plan; Fire safety; Fire suppression; Firearms; First aid; First aid training; Flashing yellow signs/lights; Floor safe; Floors; Formulation of partnerships; Fraud; Gates; Geographical juxtaposition; Geographical juxtaposition (wider environment); Glare; Glass; Goals; Good security; Good visibility; Graffiti; Guard house; Guard shack; Guards; Guidelines; Hallcrest report; Hand geometry; Handouts; Hazardous material; Hazardous materials substances and wastes; HD; Health; HIPPA; Holiday season; Holistic; Hospital residential treatment; HVAC systems; Identify assets; Identity fraud and credit/debit card fraud; Identity theft; IESNA; IFPO; Image and/or maintenance; Image management; Informal organization; Informant; Infrastructure protection; Inge Sebyan Black; Ingestion; Inhalation; Injection; Inland regional center; Installation services; Insufficient information; Insurance coverage; Insurance forms and reports; Integrated security systems design; Intent; Interior; Interior/exterior layout; Internet-connected; Intervention; Intrusion; Intrusion alarm system; Intrusion alarms and signage of alarms; Intrusion detection systems; Intuitive; Investigations; IP cameras; ISO; Key control; Lack of awareness; Laminated glass; Land use; Landscape security principles; Laptop computers; Larceny; Layout; Legal aspects; Legal authority; Letter bombs; Liability; Liaison; Life safety and fire prevention; Lighting; Lighting that meets standards and design by increased visibility; Lights; Lights burnt out; Limits; Local emergency management; Locks; Loss of self-esteem; Lower-case letters; Lows power; Magnetic stripe cards; Maintenance; Malicious destruction of property; Management systems requirements; Man-made disasters; Marketing and sales data; Mentally challenged; Mentoring programs; Merchandise; Mergers; Metal on roof tops; Methods of operation [typically called standard operating procedures (SOPs) and post orders]; Michael Fagel; Minimum standards; Misdemeanor; Missing or exploited children; Misspellings of common words; Monitoring equipment; Digital recording equipment; Multi-screen; Mutual aid association; Name-calling; Natural access; Natural access control; Natural barriers; Natural disasters; Natural surveillance; Neighborhood watch concepts and community involvement; Networks; NFPA; NFPA 101; NFPA 909; NFPA codes; NIMS; Non-random; Non-value-adding work; Numbering system; Numbers; OIP; Ongoing maintenance; On-site probation officers; Open hands; Openings; Order maintenance; Organization; Organizational resilience; OSHA standards; Overhead doors; Padlocks and door locks and peepholes; Pan and tilt; Pandemics; Panic and barrier alarms; Parking garages; Parking lots; Passive security; Passwords; People; Perimeter; Perimeter security; Perimeter walls; Personnel records and files; Physical deterrence; Physically challenged; Places of worship; Planners; Planning; Plastic glazing; Plexiglas; Police officer; Police powers; Policies; Policies and procedures; Poor/low morale; Portable alarms; Post orders; PowerPoints; Practice; Preparedness and continuity; Pre-recorded messages; President; Prevention; Prioritize; Probable cause; Probable cause; Procedures; Process error; Product failure; Product security; Production schedules; Professionalism; Proper protection to works on display; Proprietary information; Protection of depth; Protection of sensitive information; Protection officer; Protective clothing; Protective coverings; Protective lighting; PSIM stands for physical security information management; Purchases; Pure risk; Qualifications; Random; Rape; Reasonableness of the privacy expectation; Recognition; Recordkeeping; Reduce crime; Regulations; Relations with law enforcement; Religion; Remote starters; Reporting; Residential security; Risk; Risk assessment; Risk manager; Robbery; ROI; Roll-up window shutters; Roof access; Roofs; SSN; Sabotage; Safe; Safe areas; Safe schools; Safety; Safety glass; Safety issues; Sarbanes-Oxley; Saturday detention; School administrator/employer ratified; Schools; Secret information; Securities and Exchange Commission; Security; Security assessments; Security awareness; Security management; Security officer; Security officers checklist; Security threats; Server room; Setting specifications and getting bids; Sexual harassment; Shutters; Signage; Sinkholes; Situational crime prevention; Situational crime prevention principles and concepts; Skilled; smart cards; Smash and grab attackers; Social media; Soft targets hardening 101; Soft targets versus hard targets; Software; Solutions; Space; Space design; Span of control; Spin the dial; Stan Carter; Standards; Standby; State department; Stop and think; Storms; Strategies; Strategy; Streetlight; Streetlighting; Stress; Stress on the job; Structural barriers; Student courts; Subcontractors; Suicide; Support; Survey; Suspicion of a crime; Symbols; Systems; Target hardening; Target hardening strategies; Target hardening versus soft targets; Taunting; Technology; Tempered glass; Territorial reinforcement; Terrorism; Terrorist attacks; Testifying; The concept; The environment; The initiation of an action; The Montreux Document; The operational security plan; Theft of supplies; There are seven overlapping strategies in CPTED; Thomas Norman; Threats; Threats of layoffs are all additional contributors to stress; Tires; Training; Transportation security; Trapped; Types of tasks/work; UL; UL codes; Undercover; Uniforms; Unsafe activities; Urban problems; US Department of Justice; Use of badges; Use of Force; Vacation; Value-adding work; Vendors; Verbal de-escalation; Victim sullen and isolated; Video; Video analytics; Video analytics and thermal cameras; Video surveillance; Violation of law; Visitors; Visual aids; Voice data; Wall safe; Walls; Waste; Weigand cards; Windows; Wired glass

1. Crime Prevention Through Environmental Design Strategies

There are seven overlapping strategies in crime prevention through environmental design (CPTED):

1. Natural access control

2. Natural surveillance

3. Territorial reinforcement

4. Image and/or maintenance¹

5. Activity program support²

6. Target hardening³

7. Geographical juxtaposition (wider environment)

Access control and surveillance have been the primary design concepts of physical design programs. At the outset of the CPTED program, access control and surveillance systems—pre-existing as conspicuous concepts in the field of CPTED—received major attention. Access control and surveillance are not mutually exclusive classifications since certain strategies achieve both and strategies in one classification typically are mutually supportive of the other. However, the operational thrust of each is distinctly different, and the differences must be recognized in performing analysis, research, design, implementation, and evaluation.

Access control is a design concept directed primarily at decreasing crime opportunity. Access control strategies are typically classified as organized (e.g., security officers), mechanical (e.g., locks, lighting, and alarms), and natural (e.g., spatial definition). The primary thrust of an access control strategy is to deny access to a crime target and to create a perception of risk in offenders. Surveillance is a design concept directed primarily at keeping intruders under observation. Therefore the primary thrust of a surveillance strategy is to facilitate observation, although it may have the effect of an access control strategy by effectively keeping intruders out because of an increased perception of risk. Surveillance strategies are typically classified as organized (e.g., police patrol), mechanical (e.g., lighting, locks, and alarms), and natural (e.g., windows) (Photos 1–3).

Photo 1  Photo shows examples of good natural surveillance.

Photo 2  Photo shows examples of good natural surveillance.

Photo 3  Photo shows examples of good natural surveillance.

Traditionally, access control and surveillance, as design concepts, have emphasized mechanical or organized crime prevention techniques while overlooking, minimizing, or ignoring attitudes, motivation, and use of the physical environment. More recent approaches to physical design of environments have shifted the emphasis to natural crime prevention techniques, attempting to use natural opportunities presented by the environment for crime prevention. This shift in emphasis led to the concept of territoriality.

The concept of territoriality (elaborated most fully to date in the public housing environment) suggests that physical design can contribute to a sense of territoriality. That is, physical design can create or extend a sphere of influence so that users develop a sense of proprietorship—a sense of territorial influence—and potential offenders perceive that territorial influence (Photo 4).

Photo 4  Photo shows a medium-height fence to establish territorial space and also has good window design.

At the same time, it was recognized that natural access control and surveillance contributed to a sense of territoriality, making it effective for crime prevention. Natural access control and surveillance will promote more responsiveness by users in protecting their territory (e.g., more security awareness, reporting, reacting) and promote greater perception of risk by offenders.

2. Six Additional Crime Prevention Through Environmental Design Strategies

Defensible Space: This concept was developed in the public housing environment. It is similar to CPTED strategies (Crowe 1999).

Environmental Security differs from CPTED in that it uses a broader range of crime control strategies including social management, social media, target hardening activity, support, and law enforcement.

Situational Crime Prevention which incorporates other crime prevention and law enforcement strategies in an effort to focus on specific crime problems.

Results and objectives:

• Reduce violent crime

• Reduce property crime

• Displacement of crime

• Eliminate the threats and risk

• Reduce the likelihood of more incidents

• Eliminate vulnerabilities and protect assets

Risk Management is defined⁵ as the process by which an entity identifies its potential losses and then decides what is the best way to manage these potential losses.

CPTED landscape security principles:

1. For natural surveillance cut back bushes to a height of 3  ft.

2. Cut back the tree branches to 8  ft from the ground.

3. Chain link fence height 7  ft plus three strands of barbed wire.

4. Height of a stone wall—8  ft.

5. A least 10  ft of clear space on both sides of the fence and wall.

6. Psychological deterrence: results when lighting leaves a potential intruder fearful that he or she will be detected, identified, and/or apprehended.

3. A New Role for Law Enforcement: Support of Community Development

Public/private sector partnerships enhance public safety by sharing information, making the community more aware of threats and involving them in the problem-solving process. Collaboration is a key word for partnerships because all partners must recognize that their goals or missions overlap and they work together to share resources and achieve common goals. The added value of public–private sector partnerships is the cross-transfer of skills, knowledge, and expertise between the public and private sectors.⁸ In order for a partnership to be successful, each partner has to understand the value they will gain from participating. Successful partnerships involve partners that are committed to working together to achieve common goals—building the community. There are a number of compelling reasons for law enforcement to be involved in CPTED aside from the formulation of partnerships:

1. CPTED concepts have been proven to enhance community activities while reducing crime problems.

2. CPTED concepts are fundamental to traditional law enforcement values, in terms of helping the community to function properly.

3. CPTED requires the unique information sources and inherent knowledge of the community, which is endemic to the law enforcement profession.

4. CPTED problems and issues bear a direct relationship to repeat calls or service and to crime-producing situations.

5. CPTED methods and techniques can directly improve property values, business profitability, and industrial productivity, thereby enhancing local tax bases.

Law enforcement agencies, regardless of their size, must be involved formally in the review and approval process of community and business projects. Their participation must be active and creative, rather than passive and reactive. Moreover, any such involvement should not expose the agencies involved to possible litigation, since it is the role of law enforcement in CPTED to provide additional information on concerns that may not have occurred to the persons who are responsible (and qualified) for making changes to the environment. The expression, Pay me now, or pay me later, conveys the idea that the early involvement of a knowledgeable law enforcement agency in the conceptualization and planning of community projects can lead to improvements in the quality of life and to reductions in the fear and incidence of crime. This early involvement is one of the most cost-effective methods of crime prevention.

Crime Prevention Through Environmental Design Assessments

¹⁰

During a CPTED assessment, the following CPTED principles should be focused on:

Natural surveillance

Natural access

Territoriality reinforcement

Image and/or maintenance

Order maintenance

Activity program support

Geographical juxtaposition

Be sure that you notice positive attributes of the area while identifying the needed changes or improvements. Logically organize your observations and recommendations.

4. Environment

The conceptual thrust of a CPTED program is that the physical environment can be manipulated to produce behavioral effects that will reduce the incidence and fear of crime, thereby improving the quality of life. These behavioral effects can be accomplished by reducing the propensity of the physical environment to support criminal behavior. Environmental design, as used in a CPTED program, is rooted in the design of the human/environment relationship. It embodies several concepts.

The term environment includes the people and their physical and social surroundings. However, as a matter of practical necessity, the environment defined for demonstration purposes is that which has recognizable territorial and system limits.

The term design includes physical, social, management, and law enforcement directives that seek to affect positively human behavior as people interact with their environment.

Thus, the CPTED program seeks to prevent certain specified crimes (and the fear of them) within a specifically defined environment by manipulating variables that are closely related to the environment itself.

The program does not purport to develop crime prevention solutions in a broad universe of human behavior but rather solutions limited to variables that can be manipulated and evaluated in the specified human/environment relationship. CPTED involves design of physical space in the context of the needs of legitimate users of the space (physical, social, and psychological needs), the normal and expected (or intended) use of the space (the activity or absence of activity planned for the space), and the predictable behavior of both legitimate users and offenders. Therefore in the CPTED approach, a design is proper if it recognizes the designated use of the space, defines the crime problem incidental to and the solution compatible with the designated use, and incorporates the crime prevention strategies that enhance (or at least do not impair) the effective use of the space. CPTED draws not only on physical and urban design but also on contemporary thinking in behavioral and social science, law enforcement, and community organization.

5. Target Hardening

The emphasis on design and use deviates

Enjoying the preview?
Page 1 of 1