Download presentation
Presentation is loading. Please wait.
Published byCandace Floyd Modified over 9 years ago
1
SECURITY HARDWARE & TECHNOLOGY CCPOA REGION 3 TRAINING CLASS MAY 11, 2011
2
INTRODUCTION Security Technologies available for – HOME – COMMERCIAL – EDUCATIONAL
3
CPTED Crime Prevention Through Environmental Design Idea………if a site is laid out well, the likelihood of it being targeted for a crime may be reduced Definition………anticipation, recognition and appraisal of crime risk and the initiation of some action to remove or reduce it
4
CPTED STRATEGIES Natural Surveillance “see and be seen” Natural Access Control “control the traffic” Territorial Reinforcement “sphere of influence
5
CPTED STRATEGIES Maintenance “broken window theory” What technologies are available for us?
6
CCTV CAMERAS Why – Sense of security – Deterrence factor – Strong evidence – Use with personal defenders – Better use of site personnel
7
CAMERAS con’t Why Not – Expensive – Can be vandalized and broken – Need maintenance – Need assessments to determine need/location – Need technical knowledge (before and after)
8
CAMERAS con’t Where – Parking lots and driveways – Cafeterias – Patio and entry areas – Hallways – Main Offices – Doorways – Storage Areas (areas holding proprietary info) – IT areas, entrances and exits,
9
ACCESS CONTROL SYSTEMS Metal Detectors – Portals Expensive ($3,000 - $40,000) Require trained personnel Does not do all the work – Hand Held Scanners Only as good as the Operator Inexpensive ; typically used with Portals Not the best approach for full campus/building
10
ACCESS CONTROL con’t Entry Controlled Technologies (low tech) – Posted signs – Contract/Proprietary Guard – Parking Stickers – Minimal entrances/exits – Greeters – Badges – Identification Cards – Fences
11
ACCESS CONTROL con’t Entry Controlled Approaches – WHO let’s you in – WHAT you have – WHAT you know – WHO you are
12
ACCESS CONTROL con’t Duress Alarms/Panic Alarms – Pushbutton mounted in a fixed location – ID Alarm – portable device that identifies the owner of the device – ID Location Alarm – portable that tracks then identifies, locates and tracks the person who activated the alarm
13
WHAT DO WE DO WHERE Single Family Homes – CCTV Cameras with signage – Alarm Systems with direct reporting to 1 st Responders – Lighting with motion – Windows double paned, film or encased wire – Locks using biometrics, codes (keyless) “know thy neighbor” “neighborhood watch”
14
WHAT DO WE DO WHERE Multi-family buildings – CCTV Cameras with signage – Alarm Systems with direct report to 1 st Responder – Lighting with motion – Windows double paned with film, encased wire – Locks using biometrics, codes – Contract Security Guards with Rovers – WE-TIP, CRIME STOPPERS, NEIGHBORHOOD WATCH PROGRAMS
15
ACCESS CONTROL con’t Educational Institutions – CCTV Cameras with signage – Alarm Systems with direct report to 1 st Responder – Lighting with motion – Fencing mesh and height – PDA with schedules, access to cameras – Windows double paned, film and encased wire – Locks with biometric, codes – Contract Security with Rovers
16
ACCESS CONTROL con’t Educational Institutions con’t – WE-TIP, CRIME STOPPER PROGRAMS – Snakes – Rumba – Murals – 24/7 monitoring of cameras – Use of facility after hours – Motion, water, hose – Release the Hounds
17
ACCESS CONTROL con’t Commercial Storefronts – CCTV Cameras – Alarm Systems with direct report to 1 st Responder – Lighting with motion – Windows double paned, film, encased wire – Locks biometric, codes – Contract Security – WE-TIP, CRIME STOPPERS, NEIGHBORHOOD WATCH
18
RECOMMENDATIONS Do an needs assessment to determine the appropriate security technology Make sure you have Policies and Procedures written for whatever technology you implement
19
Contact Information Chris M. Wright, CPP The Wright Group 714-687-1190 direct 714*687-1194 fax cwright@thewrightgroup.com
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.