E A G L E 123 S E N T E N C E S K IN N Y 4 PERFORMANCE PERFORMANCE YATS - URCLOSECLOSE 5 67 E MORE MORE MORE MORE 8 MS.STATEMENTS 9 IT IT AR S P L I T WADEADTER MANMAN MANMAN MAN FINALS FINALS FINALS FINALS 16 LE G BB B B or i.e. ? PROS P ERITY ATHLON ATHLON MEDAL
Presented to International Association of Campus Law Enforcement Administrators Richardson, Texas April 20, 2007 Presented by Sgt. Steve Garst Community Services Division Little Elm Police Department, Texas Campus Crime Prevention
Agenda Key Concepts of Security & Strategies Security Surveys and Annual Assessments Alarm Systems Perimeter Control Lighting Considerations and Safety Reinforcement Locks – a brief refresher Cameras Terrorism
Crime Prevention Through Environmental Design C.P.T.E.D. The majority of the things related to CPTED are… COMMON SENSE & GOOD JUDGMENT
Security Truism Convenience Kills Safety Convenient Safe Convenient Safe
Security Caveat No security system can be made completely secure! Anything made by man can be defeated by man!
If that’s true, WHY BOTHER? Make things more difficult. Reduce risks to people and property. Increase risks to bad people. Slow them down. Make them go to an easier target. a.k.a. – “Target hardening”
The Security Concept The concept of security is as much PSYCHLOLGICAL as it is PHYSICAL! Example… Security lighting Is there any physical barrier presented by security lighting? NO Can it have an impact on or help reduce crime? YES
Definition What is Crime Prevention What is Crime Prevention? “The anticipation, recognition, and appraisal of a crime risk and the initiation of action to remove or reduce it.”
Principles of Crime Prevention Must be geared to the local level Law Enforcement should establish specific policies, goals and objectives Agencies should understand that ALL officers are responsible for achieving the goals and assisting others in achieving the goals Focus on youth (Most crimes are committed by persons 14 – 27 years of age)
Principles - Continued Develop fact based plans to analyze the types of crimes that pose threats Foster neighborhood watch groups, provide security surveys and related services Crime prevention takes place at the neighborhood level (At the community level, the block is the natural organizing point)
Four D’s of Crime Prevention 1. Deter the criminal attack 2. Detect the attack 3. Delay the attack 4. Deny access to selected targets
Proper design and effective use of the built environment can lead to a reduction in the incidence and fear of crime and an improvement in the quality of life. CPTED - Operational Definition
Physical Environment ….. affects Behavior of people….. affects Productive use of space….. affects Crime/loss prevention CPTED Emphasis
Normal Users Abnormal Users Observers “gate watchers” CPTED ACTORS
Natural Surveillance Natural Access Control Territorial Behavior Maintenance Key CPTED Concepts
Four Key Concepts of CPTED 1.) Natural Surveillance Place physical features, activities, and people in a way that maximizes visibility. people in a way that maximizes visibility. Public spaces, walks, etc. well lighted at night night
Four Concepts – cont. 2.) Natural Access Control Physically guiding people coming and going from a space by strategically placing entrances, exits, fences, landscaping and lighting.
Four Concepts – cont. 3.) Territorial Reinforcement Using physical attributes that express ownership such as fences, pavement treatment, art, signage, and lighting.
Highway Public Sidewalk Green Belt Your Driveway Your Building Sidewalk Fence or low landscaping Your Building Lighting Grass, dirt, gravel, other area Paving or Walk Material Different from Public Walk
Four Concepts – concluded 4.) Maintenance Allows for the continued use of space for its intended purpose Serves as additional expression of ownership Prevents reduction of visibility (overgrowth)
1. Designation 2. Definition 3. Design (90 % of mistakes made here) Assessment of Space – 3 D’s
What is the designed purpose of this space? For what purpose was it originally intended? How well does the space support its current use or its intended use? Is there conflict? Designation… (the 1 st “D”)
How is space defined? Is it clear who owns it? Where are its borders? Are there social or cultural definitions that affect how space is used? Are the legal or administrative rules clearly set out and reinforced in policy? Are there signs? Is there conflict or confusion between the designated purpose and definitions? Definition… (the 2 nd “D”)
How well does the physical design support the intended function? How well does the physical design support the desired or accepted behavior? Does the physical design conflict with or impede the productive use of the space or the proper functioning of the intended behavior? Is there confusion or conflict in the manner in which the physical design is intended to control behavior? Design… (the 3 rd “D”)
Selected Strategies First… Provide clear border definition of controlled space. May be identified physically or symbolically (mow yard) Can include fence, shrubs, or signs Underlying principal is that a reasonable person will be able to recognize the transition from public to private.
Strategies – cont. Second… Provides transitional zones Provide marked zones that indicate movement from public to semipublic to private space Third… Place safe activities in unsafe locations Serves as magnet for normal users Useful in school campus, parks, offices… (smoking, valet parking, children playing)
Strategies – cont. Fourth… Place unsafe activities in safe locations Laundromat in an apartment complex Fifth… Redesign space to increase perception or reality of natural surveillance Perception of surveillance is more powerful than actual surveillance
Sixth Relocate gathering areas to locations with natural surveillance and access control or to locations away from the view of would-be offenders Seventh Redesign the use of space to provide natural barriers to conflicting activities Eighth Overcome distance and isolation through improved communication and design efficiencies Strategies – cont.
Student Parking School Informal Gathering Areas Steve Garst L.C.C./C.C.P.S Little Elm Police Dept.
Student Parking School Formal Gathering Areas Fencing or landscaping Add Lighting Steve Garst L.C.C./C.C.P.S Little Elm Police Dept.
Student Parking Curb Line Steve Garst L.C.C./C.C.P.S Little Elm Police Dept.
Student Parking Curb Line Fencing or low landscaping Optional Gate Steve Garst L.C.C./C.C.P.S Little Elm Police Dept.
(Un)safe Activities and/or (Un)safe Places Main Street School Building Student Parking Faculty,/Visitor Parking Band and cheerleader practice in student lot after school. Activity is hidden. Steve Garst L.C.C./C.C.P.S Little Elm Police Dept.
(Un)safe Activities and/or (Un)safe Places Main Street School Building Student Parking Faculty,/Visitor Parking After hour parking for away athletic events. Lots of car burglaries or criminal mischief. Driver’s Education Training after school Driveway Steve Garst L.C.C./C.C.P.S Little Elm Police Dept.
(Un)safe Activities and/or (Un)safe Places School Building Student Parking Faculty,/Visitor Parking Move Driver’s Ed to back. Coming and going will help watch activity. Place after-hour parking in front Driveway Main Street Steve Garst L.C.C./C.C.P.S Little Elm Police Dept.
Components of Security Anticipation Recognition Appraisal Crime Risk Initiation of action to remove or reduce a crime risk
Nine Points of Security Concern 1. General purpose of the building 2. Hazards involving the building or occupants 3. Police or security applications 4. Physical recommendations (doors, windows, lightings, access points) 5. Locks, key or card control
Nine Points - Continued 6. Alarms 7. Storage (money, expensive equipment, chemicals) 8. Signs 9. Support staff
The Crime Triangle DESIRE ABILITY OPPORTUNITY The FOCUS of Crime Prevention
Theory of Opportunity Reduction Criminal behavior is learned Reducing criminal opportunity reduces the opportunity to learn criminal behavior opportunity to learn criminal behavior Criminal opportunity is lessened by improved security and increased surveillance improved security and increased surveillance
Tools and Knowledge We can help potential victims People have limited control of their own environment Control the potential victims environment, not the criminals Controlling the victim’s environment affects criminal motivation by reducing criminal opportunity Law enforcement has a primary role in reducing opportunity through education, information and guidance Crime Prevention strategies and techniques must remain flexible and specific
Cost-effectiveness OOOOne of the most difficult concepts of security WWWWe always have to consider what is being protected HHHHow important is it? DDDDoes the cost of protecting it outweigh it’s value?
Three Lines of Defense Perimeter Barriers - The first line of defense Buildings exterior - Walls, floor and roof Building interior
Perimeter Barrier… The First Line of Defense What is a barrier? Anything that restricts or obstructs Intended for both physical and psychological deterrence
Maintenance A very important, but often ignored aspect… Must be inspected on a periodic basis to determine condition and guard against digging, damage, climbing aides, etc. Locks on gates and other openings in the barrier must be inspected periodically and changed at planned intervals “BROKEN WINDOWS” concept
Control Ingress and Egress Serve as a channel for persons and vehicles Must accommodate routine, expected movement Must also consider emergencies Must not deter from the overall value or benefit of the barrier itself
Visibility Issues Must NOT obstruct visibility A solid barrier has two negative effects… P Provides a shield for unauthorized activity rohibits visual inspection of the property
Common Perimeter Barriers Types of fences Expanded Metal Privacy Wrought Iron Chain Link
Fence Guidelines – (important) Minimum eight (8) feet tall Posts no more than eight (8) feet apart Design as straight as possible to discourage climbing Place terminal posts at the ends and corners and to support gates Brace ends and gate posts if fabric is over six (6) feet high, or less than six (6) feet if not top rail
Fence Guidelines – cont. Brace diagonally to the nearest line post Dig post holes a minimum twenty-four (24) inches deep for a four (4) foot fence Add an additional three (3) inches in depth for each added foot in fence height Fill post holes with concrete A center rail is required if fabric is over twelve (12) feet in height
Fence Guidelines – cont. Use #9 gauge fabric or heavier, with openings of no more than two (2) inches Install fabric within two (2) inches of solid ground. Install below ground level in sandy soil Fabric should be twisted and barbed at the top Attach fabric to top rail with #9 gauge wire or clips with peened bolts Extend mesh above top rail Install a top guard of barb wire, usually at a forty-five (45) degree angle
Fence Guidelines – concluded Locate all fences to afford maximum visibility Ideally, locate fence fifty (50) to one hundred fifty (150) from building or object of protection At a minimum, maintain a minimum of twenty (20) feet of cleared space on either side of the fence If twenty (20) feet space is not possible, raise the height of the fence, or otherwise compensate
Applicability What types are currently in use? Are there fences in use that do NOT constitute a security barrier? Are there any buildings that would preclude the use of fences? Any other questions or considerations regarding fencing?
Landscaping and Shrubbery Insure optimum visibility of all possible entrances and exits Locate shrubs eighteen (18) to twenty-four (24) inches away from all entrances and exits Cut shrubs at least six (6) inches below window level, or no higher than eighteen (18) inches Trim tall shrubs and trees for the ground up to six (6) to eight (8) feet to assure visibility
Landscaping and Shrubbery – cont. Separate hedges to prevent hiding Recommend preventive measures that serve to increase the chances of detection Generally, thick and thorny type bushes or hedges are most recommended…but …remember that they may be used to hide an intruder Generally includes additional barriers, such as an alarm system
Applicability Are there any locations currently using landscaping or shrubs for security purposes? Are there any locations that could use it effectively? Are there any locations currently using landscaping or shrubs that violate the concepts for security purposes? Any other questions regarding landscaping and shrubbery?
LightingProper lighting serves as one of the most effective perimeter barriers available Provides both a physical and psychological deterrence Very efficient deterrent Partially restores some of the deterrence provided by daylight MUST…Be functioning properly Protect fixtures, switches, fuse boxes
Lighting Terms Watt: Term used to measure the amount of electrical energy Lumen: Term used to express the output of a light source. (Lighting efficiency is measured by lumens of wattage) Footcandle: Unit of illumination defined as one square foot surface area in which one lumen of light is uniformly distributed Kilowatt: 1000 watts
Not just More More Light More Appropriate Light
Lighting Trivia – cont. Starlight=.0001footcandle Full moon=.01footcandle Overcast day= 100footcandle Office lighting= 100footcandle Daylight=1000footcandle Direct sunlight= 10000footcandle
Lighting Trivia – cont. Recommended level by engineers… Building entrances=5 footcandles Parking deck=5 footcandles Pedestrian tunnel=5 footcandles Open parking lot=2 footcandles Commercial sidewalk=2 footcandles Residential sidewalk=4 footcandles
Lighting Trivia – cont. How can I calculate how much it costs to burn a particular light? Use the following formula… Cost per month to burn 1.) Multiply watts of bulb X hours burned per day divided by 1000 = KWh used / day divided by 1000 = KWh used / day 2.) Multiply KWh/day X number of days = KWh / mo 3.) Multiply KWh /mo X cost / day =
Lighting Trivia – cont. Example: Assume - cost/KW hour =.30 cents per day 150 watt bulb 150 watt bulb burned 8 hours per day for 31 days burned 8 hours per day for 31 days 150 watts X 8 hours per day = 1200 watts / day 1.2 KW hours/day X 31 days = KWh / mo KWh X.30 cents/day = $11.16 / month 1200 watts / 1000 = 1.2 KWh / day
Types of lighting Incandescent lighting Low initial cost Good color rendition Relatively short life Low lamp efficiency
Types of lighting – cont. Mercury Vapor Emit purplish-white color More efficient than incandescent Long life Good lumen characteristics Good color rendition Good lumen efficiency
Types of lighting – cont. Metal Halide Appearance similar to mercury vapor lights Much higher lumen efficiency Excellent color rendition Shorter life than mercury vapor (6,000 hrs compared to 24,000 plus)
Types of lighting – cont. Fluorescent Good color rendition High lamp efficiency Long life Temperature sensitive Cannot project light over great distances
Types of lighting – cont. High-Pressure Sodium Vapor Golden-white to light pink color High lumen efficiency Relatively good color rendition Relatively long life (24,000 hrs.) Light output good over bulb life (90%) Excellent exterior lighting
Types of lighting – cont. Low-Pressure Sodium Vapor Relatively long life Poor color rendition – yellow cast Maintain lumen efficiency over bulb life (95%) Require warm-up time to light
Lighting Controls 1.) On-off switch Most common Most common Requires human intervention Requires human intervention 2.) Timer Generally better than on-off switchGenerally better than on-off switch Power failure / time change adversely affectsPower failure / time change adversely affects 3.) Photo-electric cell Generally most dependable Generally most dependable Accurate Accurate
Lighting Positioning 1.) Wall / roof mounted 2.) Pole mounted 3.) Ground mounted Never recommended for security lighting Never recommended for security lighting Easily defeated Easily defeated Casts shadows on building Casts shadows on building
Lighting Recommendations Be specific on type of lighting recommended Best to have a minimum / maximum recommendation Minimum can be done right now and usually less costly Maximum usually takes longer and/or more costly Sometimes more light is not the answer. May just need to adjust or re-direct what’s there
Building Exterior – Second Line of Defense Consider principle points of entry DoorsWindows Roof hatches Skylights Floors Storm sewers In other words…. Consider not only sides but top and bottom. Concessions made on the first line of defense should be made up for here Window air conditioner
Building Exterior Guidelines Any opening larger than nine (9) inches square requires attention as a security issue Any opening on a wall less that eighteen (18) feet from the ground requires attention
Types of Doors Hollow-core Pressed wood Solid wood Wood panel Metal Aluminum Glass
Windows Any window less than eighteen (18) feet from the ground is a possible entry point. Any opening more than nine (9) inches square is also a possible entry point Reminder Additionally To comply with security standards for insurance purposes, all windows must have two locks.
Other Entry Points Sewers, storm drains, manhole covers (secure with chains, padlocks, bars, grating) Roof / roof hatches / skylights (make recommendations as circumstances dictate) Shafts, vents, ducts, fire escapes (make recommendations as circumstances dictate)
Interior Controls – Third Line of Defense Complex area and may vary considerably from building to building Considerations are: L o c k s K e y c o n t r o l A l a r m s C a m e r a s M e t a l d e t e c t o r s T y p e o f g l a s s A c c e s s
Key Control How many keys are out there? How do you know, for sure? When was the last time building was re-keyed? Who has keys? What do they open? Are there any reports of lost keys? If ‘yes’, what action was taken?
Building Access Is entry limited to certain doors? Can secured doors be easily defeated? What precautions are in place to prevent defeat? Who unlocks / locks building?
Locks Definition: “A mechanical, electrical, hydraulic, or electronic device designed to prevent entry to a building, room, container, or hiding place and to prevent the removal of items without the consent of the owner. A lock acts to temporarily fasten two separate objects together, such as a door to its frame or a lid to a container. The objects are held together until the position of the internal structure of the lock is altered – for example; by a key – so that the objects are released.” (Healy 1968, 233).
Lock Guidelines Locking devices are useless unless proper key control is maintained Maintain Records: Written record for all keys and locks, including padlocks that shows location, keyholders, date issued and the locks / doors each key operates Storing duplicate or spare keys: Tag each key and store in a secure key cabinet
Lock Guidelines – cont. Master Keys: When possible, retain in control of one person. Do not make and store duplicates Re-keying: Consider re-keying or changing combination when keys are lost, misplaced, a key employee leaves, or for additional security
Locks… and what else? Photo ID cards - Staff Photo ID cards - Students Photo ID cards - Visitors Proximity Card Access
Intrusion Alarms - Overview Conduct basic check of the system. Can it be armed / disarmed as designed? Can it be armed / disarmed as designed? Does it dial in to dispatch? Does it dial in to dispatch? When was code last changed? When was code last changed? Are detectors located in appropriate locations? Are detectors located in appropriate locations? Are all detectors operational? Are all detectors operational? Do all keypads work? Do all keypads work?
Fire Alarms - Overview Conduct basic check of system Does it dial in? Does it dial in? To whom does it dial in? To whom does it dial in? Is a zone map displayed beside the main panel? Is a zone map displayed beside the main panel?
Alarms - Generally Three main components 1. Control unit – ‘brain’ a. Power supply b. Circuitry c. Sensory controls i. Open loop system ii. Closed loop system (most common) iii. Supervised system (banks, etc.)
Alarms – cont. 2. Annunciation system a. Local (bell, light, siren, etc.) b. Remote (monitoring station) 3. Sensors and detectors a. Touch or feel (contact type) b. Hear (noise, glass breakage) c. Sight (PIR)
Alarms – cont. Perimeter Intrusion Sensing Devices 1. Contact / plunger switch 2. Glass breakage 3. Floor pressure mats 4. Metal foil 5. Alarm screen (expensive) Two most common
Alarms – cont. Space or motion sensing devices 1. Photo electric cell (easily disguised as other item) 2. Ultra sound / microwave 3. Passive infrared
Alarms – cont. Remote alarm transmission circuits 1. Dialers 2. Dedicated line 3. Multiplexing Connections 4. Microwave / cellular connects Newest technology
Alarms – cont. Common problems in circuitry (failure) 1. Broken foil 2. Battery failure 3. Bad controls 4. Loose wire 5. Accessibility
Alarms - concluded Hints… Use motion detectors in conjunction with heat sensing PIR. Both must be activated to set off alarm. Add heat sensors in attics, etc. They can be set to any temperature and will activate before a fire starts. Add strobe lights to attract additional attention.
Cameras - Overview Cameras have been documented as being effective in… D D D Deterring criminal activity D D D Documenting criminal activity R R R Reducing property loss, thus reducing insurance premiums and related costs R R R Reducing personal injury incidents P P P Providing court-approved evidence D D D Diffusing parental disputes of child’s activity
Camera - Considerations High-resolution, low-lux color cameras are very cost effective Data recorders are high quality and low maintenance, with huge memory Major cost of installation is wiring Question: What is the cost of a camera system compared to a human life? Is your answer still the same if it happens on your campus?
Camera – Considerations – cont. What do you want to accomplish? Remember, there were perimeter cameras in Thurston High, and they showed Kip Kingel coming in, but he was not personally identifiable, nor could it be seen that he was carrying a large package. What good were they? A sub-par system that is not properly maintained is more of a liability than an asset.
Camera – Considerations - cont. Columbine had cameras but… The custodian forgot to change the tapes that morning and he changed it during the time (20 min.) that Harris and Klebold set the propane bombs in the cafeteria.
Camera – Recommendations Where do you want them? Inside? Outside? Both? Cafeteria? Hallways? Stairs? Gyms? Commons? Main Office? Parking lot? Building perimeter? Bus ramp? Other????
Weather and other Shelter-in-Place Red and Green Dots Low cost Easy to install Easy to train Easy to follow
Terrorism High Value Targets Research Labs HAZMET Potential Dignitary Protection
Terrorism Building Identification Roof (building) and Door Identification Unique building identifiers Individual door numbering & orientation Ex: (Bldg.) A Ex: A (building) - N (north) – D – (door) A-N-1, A-N-2, A-W-1, etc.
Terrorism Active Shooters Plan for rapid response with less than idea, adequate preparation or redundancy Train, train, train First responding officers MUST go to the threat
A Terrorist Plan to Neutralize America Let’s talk…
Liability YOU are responsible for what you say! Qualify statements as an “opinion” if it is one, to protect yourself. Learn the Life Safety Code. DON”T recommend anything that violates it, or that violates any other law. A COMPANY (i.e. – THE DISTRICT) INCURS LIABILITY FOR LEGITIMATE ITEMS IN YOUR REPORT WHICH THEY DO NOTHING ABOUT!
Disclaimer EVERY CPTED OR SECURITY SURVEY ASSESSMENT MUST CONCLUDE WITH THE FOLLOWING… “If the recommendations contained in this report are implemented, they will greatly enhance the safety of the employees (staff) and customers (students), as well as the security of the building and its contents.” AND These recommendations do not guarantee a crime-free environment
Purpose of the Annual Assessment Threat Assessment Plan of Action Evidence of Implementation Evaluation
Definition What is a Security Survey/Assessment? “A critical on-site examination and analysis of an industrial plant, business, home, or public or private institution, to ascertain the present security status, to identify deficiencies or excesses, to determine the protection needed, and to make recommendations to improve the overall security.”
Assessment Location of Deficiency Precisely where on the campus is the item, described in sufficient detail that anyone with a desire or need can locate it. Observed Deficiency Describe the problem in as much detail as needed
Assessment – cont. Potential Hazard Describe the potential harm that could occur as a result of the Observed Deficiency Recommendation(s) List the specific suggestions you have to eliminate the Observed Deficiency. May have more than one suggestion, or may have a minimum/maximum requirement necessary to correct the item.
Methods of Assessment Team Approach Annual Requirement Capital Improvement Plan
How do we systematically look at a building for security purposes? Put yourself in the role of the intruder Put yourself in the role of the intruder Test accessibility and vulnerability Test accessibility and vulnerability Draw on your experience and knowledge of local conditions and MO’s Draw on your experience and knowledge of local conditions and MO’s Consider the total environment Consider the total environment Pay attention to detail Pay attention to detail
THANK YOU
Sgt. Steve Garst Little Elm Police Department Community Services Division 100 W. Eldorado Parkway Little Elm, Texas Phones: (972) Office (469) Cell