E A G L E 123 S E N T E N C E S K IN N Y 4 PERFORMANCE PERFORMANCE YATS - URCLOSECLOSE 5 67 E MORE MORE MORE MORE 8 MS.STATEMENTS 9 IT IT AR S P L I T.

Slides:



Advertisements
Similar presentations
McMaster Universitys Moveable Assets Policy Property Protection.
Advertisements

Safety For You and Your Home Community Education Specialist Mary Browning Naperville Police Department.
Partners National Sheriffs Association Bureau of Justice Assistance, Office of Justice Programs, U.S. Department of Justice.
Henderson Police Department Community Relations Unit
Closed Area Construction
INTRUSION ALARM TECHNOLOGY
Seven Bar Safe School Presentation Jan. 15, 2013.
1 INTRUSION ALARM TECHNOLOGY NOTIFICATION DEVICES.
MU Building Emergency Coordinator Training
Marlboro Township Neighborhood Watch P.O. Bernadette Peter.
Presentation Retail Security Key Holding Mobile Patrols Access Control Systems Manned Security Receptionist CCTV Monitoring.
Western District Station 8900 Freedom Center Blvd Manassas VA Phone: Prince William County Police.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Protecting Evidence Fire Cause Determination. Fire departments should investigate all fires to determine the cause of the fire. The cause of a fire is.
Crime Prevention Through Environmental Design
SECURITY HARDWARE & TECHNOLOGY CCPOA REGION 3 TRAINING CLASS MAY 11, 2011.
Crime Prevention Through Environmental Design
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
1 Introduction to Security Chapter 6 Enhancing Security through Physical Controls.
1 INTRUSION ALARM TECHNOLOGY LOCAL VS. MONITORING.
1 INTRUSION ALARM TECHNOLOGY DETECTION DEVICES. 2 INTRUSION ALARM TECHNOLOGY Detection devices can be either passive or active. Passive devices typically.
1. 1.Define Systems Approach 2.List selection criteria for selecting at- risk neighborhoods. 3.Define neighborhood boundaries. 4.List assessment team.
Three Lines of Defense Presented by the Arapahoe County Sheriff’s Office.
Burglary Prevention MORRISVILLE POLICE DEPARTMENT.
Kitchen & Bath Lighting. A good lighting design should: Look good – both people and design space Provide the proper amount of light in every room Be.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
EGRESS AND FIRE PROTECTION
Alarms and Cameras Presented by Sgt. Steve Garst, L.C.C./ C.C.P.S. Little Elm Police Department Little Elm, Texas C.P.T.E.D. The third line of defense.
Presented to School Based Law Enforcement Conference Corpus Christi, Texas June, 2011 Presented by Sgt. Steve Garst Certified Crime Prevention Specialist.
McMaster Rounds. A Crime Prevention Initiative designed to work with the community to improve safety on campus Basis of rounds is similar to “medical.
License No Innovative Solutions. Enduring Principles.
INTRUSION ALARM TECHNOLOGY
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
CPTED Crime Prevention Through Environmental Design.

CPTED Fences and Landscaping Part of the FIRST line of defense Presented by Sgt. Steve Garst, L.C.C. Certified Crime Prevention Specialist Community Services.
Crime Prevention Through Environmental Design Presented by The Arapahoe County Sheriff’s Office.
© 2008 Delmar, Cengage Learning Property Security, Emergency Response, and Fire Protection Systems Chapter 13.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Floor Plans and Site Plans Subtle Differences and Simple Changes Sgt. Steve Garst L.C.C./C.C.P.S Little Elm Police Dept.
Celebrate Safe Communities How CPTED and related activities can help you engage community members of all ages!
Lesson Goal After completing this lesson, the student shall be able to identify indicators of an incendiary fire and protect and preserve evidence after.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Physical (Environmental) Security
MONTGOMERY COUNTY FIRE & RESCUE FAMILY CHILD CARE FIRE SAFETY NOTEBOOK Written By: M/FF Matt Kelleher 2008.
Exit Routes and Fire Protection
1 HOOVER SLOVACEK LLP 5051 WESTHEIMER, SUITE 1200 HOUSTON, TEXAS (713) Fax (713) DUDE WHERE’S MY CAR? CLE.
Teaching Kids To Help Design Out Crime National Crime Prevention Council 2006.
MACHINE GUARDING 29 CFR to
INTERNAL CONTROLS What are they? Why should I care?
Hospitality Operations Objective 3.04 Security. Objective Security  State the major responsibility of the Security Department The protection of.
Crime Prevention Through Environmental Design
Monitoring, review and audit.
Course of Study 6. Security Management  Security and its Importance  Security of the Guest and their Property  Security Needs for the Staff and the.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Circulation, Control, Safety, and Security 12 chapter.
10. Security and Physical Protection Basic Concepts
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Using existing lifts in existing buildings to evacuate disabled persons Derek Smith Technical Director UK Lift and Escalator Industry Association.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
What is a Brownfield? Brownfield: A tract of land that has been developed for industrial purposes, polluted, and then abandoned. – Merriam-Webster’s 10.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Unit 1: Protecting the Facility (Virtual Machines)
The University of Adelaide, School of Computer Science
Maintenance Is a very important part of the overall management of the property and should be a regular and consistent routine to: -Replace burnt out lights.
Crime Prevention Through Environmental Design
Access Control Limits the number of entrances and exits on a property.
The University of Adelaide, School of Computer Science
Crime Prevention Part I: Concepts of Security
Presentation transcript:

E A G L E 123 S E N T E N C E S K IN N Y 4 PERFORMANCE PERFORMANCE YATS - URCLOSECLOSE 5 67 E MORE MORE MORE MORE 8 MS.STATEMENTS 9 IT IT AR S P L I T WADEADTER MANMAN MANMAN MAN FINALS FINALS FINALS FINALS 16 LE G BB B B or i.e. ? PROS P ERITY ATHLON ATHLON MEDAL

Presented to International Association of Campus Law Enforcement Administrators Richardson, Texas April 20, 2007 Presented by Sgt. Steve Garst Community Services Division Little Elm Police Department, Texas Campus Crime Prevention

Agenda Key Concepts of Security & Strategies Security Surveys and Annual Assessments Alarm Systems Perimeter Control Lighting Considerations and Safety Reinforcement Locks – a brief refresher Cameras Terrorism

Crime Prevention Through Environmental Design C.P.T.E.D. The majority of the things related to CPTED are… COMMON SENSE & GOOD JUDGMENT

Security Truism Convenience Kills Safety Convenient Safe Convenient Safe

Security Caveat No security system can be made completely secure! Anything made by man can be defeated by man!

If that’s true, WHY BOTHER? Make things more difficult. Reduce risks to people and property. Increase risks to bad people. Slow them down. Make them go to an easier target. a.k.a. – “Target hardening”

The Security Concept The concept of security is as much PSYCHLOLGICAL as it is PHYSICAL! Example… Security lighting Is there any physical barrier presented by security lighting? NO Can it have an impact on or help reduce crime? YES

Definition What is Crime Prevention What is Crime Prevention? “The anticipation, recognition, and appraisal of a crime risk and the initiation of action to remove or reduce it.”

Principles of Crime Prevention Must be geared to the local level Law Enforcement should establish specific policies, goals and objectives Agencies should understand that ALL officers are responsible for achieving the goals and assisting others in achieving the goals Focus on youth (Most crimes are committed by persons 14 – 27 years of age)

Principles - Continued Develop fact based plans to analyze the types of crimes that pose threats Foster neighborhood watch groups, provide security surveys and related services Crime prevention takes place at the neighborhood level (At the community level, the block is the natural organizing point)

Four D’s of Crime Prevention 1. Deter the criminal attack 2. Detect the attack 3. Delay the attack 4. Deny access to selected targets

Proper design and effective use of the built environment can lead to a reduction in the incidence and fear of crime and an improvement in the quality of life. CPTED - Operational Definition

Physical Environment ….. affects Behavior of people….. affects Productive use of space….. affects Crime/loss prevention CPTED Emphasis

Normal Users Abnormal Users Observers “gate watchers” CPTED ACTORS

Natural Surveillance Natural Access Control Territorial Behavior Maintenance Key CPTED Concepts

Four Key Concepts of CPTED 1.) Natural Surveillance  Place physical features, activities, and people in a way that maximizes visibility. people in a way that maximizes visibility.  Public spaces, walks, etc. well lighted at night night

Four Concepts – cont. 2.) Natural Access Control Physically guiding people coming and going from a space by strategically placing entrances, exits, fences, landscaping and lighting.

Four Concepts – cont. 3.) Territorial Reinforcement Using physical attributes that express ownership such as fences, pavement treatment, art, signage, and lighting.

Highway Public Sidewalk Green Belt Your Driveway Your Building Sidewalk Fence or low landscaping Your Building Lighting Grass, dirt, gravel, other area Paving or Walk Material Different from Public Walk

Four Concepts – concluded 4.) Maintenance Allows for the continued use of space for its intended purpose Serves as additional expression of ownership Prevents reduction of visibility (overgrowth)

1. Designation 2. Definition 3. Design (90 % of mistakes made here) Assessment of Space – 3 D’s

 What is the designed purpose of this space?  For what purpose was it originally intended?  How well does the space support its current use or its intended use?  Is there conflict? Designation… (the 1 st “D”)

 How is space defined?  Is it clear who owns it?  Where are its borders?  Are there social or cultural definitions that affect how space is used?  Are the legal or administrative rules clearly set out and reinforced in policy?  Are there signs?  Is there conflict or confusion between the designated purpose and definitions? Definition… (the 2 nd “D”)

 How well does the physical design support the intended function?  How well does the physical design support the desired or accepted behavior?  Does the physical design conflict with or impede the productive use of the space or the proper functioning of the intended behavior?  Is there confusion or conflict in the manner in which the physical design is intended to control behavior? Design… (the 3 rd “D”)

Selected Strategies First… Provide clear border definition of controlled space. May be identified physically or symbolically (mow yard) Can include fence, shrubs, or signs Underlying principal is that a reasonable person will be able to recognize the transition from public to private.

Strategies – cont. Second… Provides transitional zones Provide marked zones that indicate movement from public to semipublic to private space Third… Place safe activities in unsafe locations Serves as magnet for normal users Useful in school campus, parks, offices… (smoking, valet parking, children playing)

Strategies – cont. Fourth… Place unsafe activities in safe locations Laundromat in an apartment complex Fifth… Redesign space to increase perception or reality of natural surveillance Perception of surveillance is more powerful than actual surveillance

Sixth Relocate gathering areas to locations with natural surveillance and access control or to locations away from the view of would-be offenders Seventh Redesign the use of space to provide natural barriers to conflicting activities Eighth Overcome distance and isolation through improved communication and design efficiencies Strategies – cont.

Student Parking School Informal Gathering Areas Steve Garst L.C.C./C.C.P.S Little Elm Police Dept.

Student Parking School Formal Gathering Areas Fencing or landscaping Add Lighting Steve Garst L.C.C./C.C.P.S Little Elm Police Dept.

Student Parking Curb Line Steve Garst L.C.C./C.C.P.S Little Elm Police Dept.

Student Parking Curb Line Fencing or low landscaping Optional Gate Steve Garst L.C.C./C.C.P.S Little Elm Police Dept.

(Un)safe Activities and/or (Un)safe Places Main Street School Building Student Parking Faculty,/Visitor Parking Band and cheerleader practice in student lot after school. Activity is hidden. Steve Garst L.C.C./C.C.P.S Little Elm Police Dept.

(Un)safe Activities and/or (Un)safe Places Main Street School Building Student Parking Faculty,/Visitor Parking After hour parking for away athletic events. Lots of car burglaries or criminal mischief. Driver’s Education Training after school Driveway Steve Garst L.C.C./C.C.P.S Little Elm Police Dept.

(Un)safe Activities and/or (Un)safe Places School Building Student Parking Faculty,/Visitor Parking Move Driver’s Ed to back. Coming and going will help watch activity. Place after-hour parking in front Driveway Main Street Steve Garst L.C.C./C.C.P.S Little Elm Police Dept.

Components of Security Anticipation Recognition Appraisal Crime Risk Initiation of action to remove or reduce a crime risk

Nine Points of Security Concern 1. General purpose of the building 2. Hazards involving the building or occupants 3. Police or security applications 4. Physical recommendations (doors, windows, lightings, access points) 5. Locks, key or card control

Nine Points - Continued 6. Alarms 7. Storage (money, expensive equipment, chemicals) 8. Signs 9. Support staff

The Crime Triangle DESIRE ABILITY OPPORTUNITY The FOCUS of Crime Prevention

Theory of Opportunity Reduction  Criminal behavior is learned  Reducing criminal opportunity reduces the opportunity to learn criminal behavior opportunity to learn criminal behavior  Criminal opportunity is lessened by improved security and increased surveillance improved security and increased surveillance

Tools and Knowledge We can help potential victims People have limited control of their own environment Control the potential victims environment, not the criminals Controlling the victim’s environment affects criminal motivation by reducing criminal opportunity Law enforcement has a primary role in reducing opportunity through education, information and guidance Crime Prevention strategies and techniques must remain flexible and specific

Cost-effectiveness OOOOne of the most difficult concepts of security WWWWe always have to consider what is being protected HHHHow important is it? DDDDoes the cost of protecting it outweigh it’s value?

Three Lines of Defense Perimeter Barriers - The first line of defense Buildings exterior - Walls, floor and roof Building interior

Perimeter Barrier… The First Line of Defense What is a barrier? Anything that restricts or obstructs Intended for both physical and psychological deterrence

Maintenance A very important, but often ignored aspect… Must be inspected on a periodic basis to determine condition and guard against digging, damage, climbing aides, etc. Locks on gates and other openings in the barrier must be inspected periodically and changed at planned intervals “BROKEN WINDOWS” concept

Control Ingress and Egress Serve as a channel for persons and vehicles Must accommodate routine, expected movement Must also consider emergencies Must not deter from the overall value or benefit of the barrier itself

Visibility Issues Must NOT obstruct visibility A solid barrier has two negative effects… P Provides a shield for unauthorized activity rohibits visual inspection of the property

Common Perimeter Barriers Types of fences Expanded Metal Privacy Wrought Iron Chain Link

Fence Guidelines – (important) Minimum eight (8) feet tall Posts no more than eight (8) feet apart Design as straight as possible to discourage climbing Place terminal posts at the ends and corners and to support gates Brace ends and gate posts if fabric is over six (6) feet high, or less than six (6) feet if not top rail

Fence Guidelines – cont. Brace diagonally to the nearest line post Dig post holes a minimum twenty-four (24) inches deep for a four (4) foot fence Add an additional three (3) inches in depth for each added foot in fence height Fill post holes with concrete A center rail is required if fabric is over twelve (12) feet in height

Fence Guidelines – cont. Use #9 gauge fabric or heavier, with openings of no more than two (2) inches Install fabric within two (2) inches of solid ground. Install below ground level in sandy soil Fabric should be twisted and barbed at the top Attach fabric to top rail with #9 gauge wire or clips with peened bolts Extend mesh above top rail Install a top guard of barb wire, usually at a forty-five (45) degree angle

Fence Guidelines – concluded Locate all fences to afford maximum visibility Ideally, locate fence fifty (50) to one hundred fifty (150) from building or object of protection At a minimum, maintain a minimum of twenty (20) feet of cleared space on either side of the fence If twenty (20) feet space is not possible, raise the height of the fence, or otherwise compensate

Applicability What types are currently in use? Are there fences in use that do NOT constitute a security barrier? Are there any buildings that would preclude the use of fences? Any other questions or considerations regarding fencing?

Landscaping and Shrubbery Insure optimum visibility of all possible entrances and exits Locate shrubs eighteen (18) to twenty-four (24) inches away from all entrances and exits Cut shrubs at least six (6) inches below window level, or no higher than eighteen (18) inches Trim tall shrubs and trees for the ground up to six (6) to eight (8) feet to assure visibility

Landscaping and Shrubbery – cont. Separate hedges to prevent hiding Recommend preventive measures that serve to increase the chances of detection Generally, thick and thorny type bushes or hedges are most recommended…but …remember that they may be used to hide an intruder Generally includes additional barriers, such as an alarm system

Applicability Are there any locations currently using landscaping or shrubs for security purposes? Are there any locations that could use it effectively? Are there any locations currently using landscaping or shrubs that violate the concepts for security purposes? Any other questions regarding landscaping and shrubbery?

LightingProper lighting serves as one of the most effective perimeter barriers available Provides both a physical and psychological deterrence Very efficient deterrent Partially restores some of the deterrence provided by daylight MUST…Be functioning properly Protect fixtures, switches, fuse boxes

Lighting Terms Watt: Term used to measure the amount of electrical energy Lumen: Term used to express the output of a light source. (Lighting efficiency is measured by lumens of wattage) Footcandle: Unit of illumination defined as one square foot surface area in which one lumen of light is uniformly distributed Kilowatt: 1000 watts

Not just More More Light More Appropriate Light

Lighting Trivia – cont. Starlight=.0001footcandle Full moon=.01footcandle Overcast day= 100footcandle Office lighting= 100footcandle Daylight=1000footcandle Direct sunlight= 10000footcandle

Lighting Trivia – cont. Recommended level by engineers… Building entrances=5 footcandles Parking deck=5 footcandles Pedestrian tunnel=5 footcandles Open parking lot=2 footcandles Commercial sidewalk=2 footcandles Residential sidewalk=4 footcandles

Lighting Trivia – cont. How can I calculate how much it costs to burn a particular light? Use the following formula… Cost per month to burn 1.) Multiply watts of bulb X hours burned per day divided by 1000 = KWh used / day divided by 1000 = KWh used / day 2.) Multiply KWh/day X number of days = KWh / mo 3.) Multiply KWh /mo X cost / day =

Lighting Trivia – cont. Example: Assume - cost/KW hour =.30 cents per day 150 watt bulb 150 watt bulb burned 8 hours per day for 31 days burned 8 hours per day for 31 days 150 watts X 8 hours per day = 1200 watts / day 1.2 KW hours/day X 31 days = KWh / mo KWh X.30 cents/day = $11.16 / month 1200 watts / 1000 = 1.2 KWh / day

Types of lighting Incandescent lighting Low initial cost Good color rendition Relatively short life Low lamp efficiency

Types of lighting – cont. Mercury Vapor Emit purplish-white color More efficient than incandescent Long life Good lumen characteristics Good color rendition Good lumen efficiency

Types of lighting – cont. Metal Halide Appearance similar to mercury vapor lights Much higher lumen efficiency Excellent color rendition Shorter life than mercury vapor (6,000 hrs compared to 24,000 plus)

Types of lighting – cont. Fluorescent Good color rendition High lamp efficiency Long life Temperature sensitive Cannot project light over great distances

Types of lighting – cont. High-Pressure Sodium Vapor Golden-white to light pink color High lumen efficiency Relatively good color rendition Relatively long life (24,000 hrs.) Light output good over bulb life (90%) Excellent exterior lighting

Types of lighting – cont. Low-Pressure Sodium Vapor Relatively long life Poor color rendition – yellow cast Maintain lumen efficiency over bulb life (95%) Require warm-up time to light

Lighting Controls 1.) On-off switch Most common Most common Requires human intervention Requires human intervention 2.) Timer Generally better than on-off switchGenerally better than on-off switch Power failure / time change adversely affectsPower failure / time change adversely affects 3.) Photo-electric cell Generally most dependable Generally most dependable Accurate Accurate

Lighting Positioning 1.) Wall / roof mounted 2.) Pole mounted 3.) Ground mounted Never recommended for security lighting Never recommended for security lighting Easily defeated Easily defeated Casts shadows on building Casts shadows on building

Lighting Recommendations Be specific on type of lighting recommended Best to have a minimum / maximum recommendation Minimum can be done right now and usually less costly Maximum usually takes longer and/or more costly Sometimes more light is not the answer. May just need to adjust or re-direct what’s there

Building Exterior – Second Line of Defense Consider principle points of entry DoorsWindows Roof hatches Skylights Floors Storm sewers In other words…. Consider not only sides but top and bottom. Concessions made on the first line of defense should be made up for here Window air conditioner

Building Exterior Guidelines Any opening larger than nine (9) inches square requires attention as a security issue Any opening on a wall less that eighteen (18) feet from the ground requires attention

Types of Doors Hollow-core Pressed wood Solid wood Wood panel Metal Aluminum Glass

Windows Any window less than eighteen (18) feet from the ground is a possible entry point. Any opening more than nine (9) inches square is also a possible entry point Reminder Additionally To comply with security standards for insurance purposes, all windows must have two locks.

Other Entry Points Sewers, storm drains, manhole covers (secure with chains, padlocks, bars, grating) Roof / roof hatches / skylights (make recommendations as circumstances dictate) Shafts, vents, ducts, fire escapes (make recommendations as circumstances dictate)

Interior Controls – Third Line of Defense Complex area and may vary considerably from building to building Considerations are: L o c k s K e y c o n t r o l A l a r m s C a m e r a s M e t a l d e t e c t o r s T y p e o f g l a s s A c c e s s

Key Control How many keys are out there? How do you know, for sure? When was the last time building was re-keyed? Who has keys? What do they open? Are there any reports of lost keys? If ‘yes’, what action was taken?

Building Access Is entry limited to certain doors? Can secured doors be easily defeated? What precautions are in place to prevent defeat? Who unlocks / locks building?

Locks Definition: “A mechanical, electrical, hydraulic, or electronic device designed to prevent entry to a building, room, container, or hiding place and to prevent the removal of items without the consent of the owner. A lock acts to temporarily fasten two separate objects together, such as a door to its frame or a lid to a container. The objects are held together until the position of the internal structure of the lock is altered – for example; by a key – so that the objects are released.” (Healy 1968, 233).

Lock Guidelines Locking devices are useless unless proper key control is maintained Maintain Records: Written record for all keys and locks, including padlocks that shows location, keyholders, date issued and the locks / doors each key operates Storing duplicate or spare keys: Tag each key and store in a secure key cabinet

Lock Guidelines – cont. Master Keys: When possible, retain in control of one person. Do not make and store duplicates Re-keying: Consider re-keying or changing combination when keys are lost, misplaced, a key employee leaves, or for additional security

Locks… and what else? Photo ID cards - Staff Photo ID cards - Students Photo ID cards - Visitors Proximity Card Access

Intrusion Alarms - Overview Conduct basic check of the system. Can it be armed / disarmed as designed? Can it be armed / disarmed as designed? Does it dial in to dispatch? Does it dial in to dispatch? When was code last changed? When was code last changed? Are detectors located in appropriate locations? Are detectors located in appropriate locations? Are all detectors operational? Are all detectors operational? Do all keypads work? Do all keypads work?

Fire Alarms - Overview Conduct basic check of system Does it dial in? Does it dial in? To whom does it dial in? To whom does it dial in? Is a zone map displayed beside the main panel? Is a zone map displayed beside the main panel?

Alarms - Generally Three main components 1. Control unit – ‘brain’ a. Power supply b. Circuitry c. Sensory controls i. Open loop system ii. Closed loop system (most common) iii. Supervised system (banks, etc.)

Alarms – cont. 2. Annunciation system a. Local (bell, light, siren, etc.) b. Remote (monitoring station) 3. Sensors and detectors a. Touch or feel (contact type) b. Hear (noise, glass breakage) c. Sight (PIR)

Alarms – cont. Perimeter Intrusion Sensing Devices 1. Contact / plunger switch 2. Glass breakage 3. Floor pressure mats 4. Metal foil 5. Alarm screen (expensive) Two most common

Alarms – cont. Space or motion sensing devices 1. Photo electric cell (easily disguised as other item) 2. Ultra sound / microwave 3. Passive infrared

Alarms – cont. Remote alarm transmission circuits 1. Dialers 2. Dedicated line 3. Multiplexing Connections 4. Microwave / cellular connects Newest technology

Alarms – cont. Common problems in circuitry (failure) 1. Broken foil 2. Battery failure 3. Bad controls 4. Loose wire 5. Accessibility

Alarms - concluded Hints… Use motion detectors in conjunction with heat sensing PIR. Both must be activated to set off alarm. Add heat sensors in attics, etc. They can be set to any temperature and will activate before a fire starts. Add strobe lights to attract additional attention.

Cameras - Overview Cameras have been documented as being effective in…  D D D Deterring criminal activity  D D D Documenting criminal activity  R R R Reducing property loss, thus reducing insurance premiums and related costs  R R R Reducing personal injury incidents  P P P Providing court-approved evidence  D D D Diffusing parental disputes of child’s activity

Camera - Considerations High-resolution, low-lux color cameras are very cost effective Data recorders are high quality and low maintenance, with huge memory Major cost of installation is wiring Question: What is the cost of a camera system compared to a human life? Is your answer still the same if it happens on your campus?

Camera – Considerations – cont. What do you want to accomplish? Remember, there were perimeter cameras in Thurston High, and they showed Kip Kingel coming in, but he was not personally identifiable, nor could it be seen that he was carrying a large package. What good were they? A sub-par system that is not properly maintained is more of a liability than an asset.

Camera – Considerations - cont. Columbine had cameras but… The custodian forgot to change the tapes that morning and he changed it during the time (20 min.) that Harris and Klebold set the propane bombs in the cafeteria.

Camera – Recommendations Where do you want them? Inside? Outside? Both? Cafeteria? Hallways? Stairs? Gyms? Commons? Main Office? Parking lot? Building perimeter? Bus ramp? Other????

Weather and other Shelter-in-Place Red and Green Dots Low cost Easy to install Easy to train Easy to follow

Terrorism High Value Targets Research Labs HAZMET Potential Dignitary Protection

Terrorism Building Identification Roof (building) and Door Identification Unique building identifiers Individual door numbering & orientation Ex: (Bldg.) A Ex: A (building) - N (north) – D – (door) A-N-1, A-N-2, A-W-1, etc.

Terrorism Active Shooters Plan for rapid response with less than idea, adequate preparation or redundancy Train, train, train First responding officers MUST go to the threat

A Terrorist Plan to Neutralize America Let’s talk…

Liability YOU are responsible for what you say! Qualify statements as an “opinion” if it is one, to protect yourself. Learn the Life Safety Code. DON”T recommend anything that violates it, or that violates any other law. A COMPANY (i.e. – THE DISTRICT) INCURS LIABILITY FOR LEGITIMATE ITEMS IN YOUR REPORT WHICH THEY DO NOTHING ABOUT!

Disclaimer EVERY CPTED OR SECURITY SURVEY ASSESSMENT MUST CONCLUDE WITH THE FOLLOWING… “If the recommendations contained in this report are implemented, they will greatly enhance the safety of the employees (staff) and customers (students), as well as the security of the building and its contents.” AND These recommendations do not guarantee a crime-free environment

Purpose of the Annual Assessment Threat Assessment Plan of Action Evidence of Implementation Evaluation

Definition What is a Security Survey/Assessment? “A critical on-site examination and analysis of an industrial plant, business, home, or public or private institution, to ascertain the present security status, to identify deficiencies or excesses, to determine the protection needed, and to make recommendations to improve the overall security.”

Assessment Location of Deficiency Precisely where on the campus is the item, described in sufficient detail that anyone with a desire or need can locate it. Observed Deficiency Describe the problem in as much detail as needed

Assessment – cont. Potential Hazard Describe the potential harm that could occur as a result of the Observed Deficiency Recommendation(s) List the specific suggestions you have to eliminate the Observed Deficiency. May have more than one suggestion, or may have a minimum/maximum requirement necessary to correct the item.

Methods of Assessment Team Approach Annual Requirement Capital Improvement Plan

How do we systematically look at a building for security purposes? Put yourself in the role of the intruder Put yourself in the role of the intruder Test accessibility and vulnerability Test accessibility and vulnerability Draw on your experience and knowledge of local conditions and MO’s Draw on your experience and knowledge of local conditions and MO’s Consider the total environment Consider the total environment Pay attention to detail Pay attention to detail

THANK YOU

Sgt. Steve Garst Little Elm Police Department Community Services Division 100 W. Eldorado Parkway Little Elm, Texas Phones: (972) Office (469) Cell