AST Digital Magazine September 2017 AST Digital Magazine September 2017 | Page 28

Volume 16 September 2017 Edition While helpful, we cannot forget about the oth- er layers. Every layer provides an opportunity to distinguish good from bad behavior. CPTED principles have been around since the 90’s and are another very ef- fective non-electronic strategy. A combination of intersecting electronic and non-electronic technologies for detection, as- sessment, command and control (policy and pro- cedure), response and engagement is a precon- dition for the perimeter system at every level to function at full capacity and in a robust manner. Second, the plan must be comprehensive and holistic and include all five physical security pillars – detection, assess- ment, command and control, response and engagement. Ultimately, the goal is to reward wanted behavior and deny and isolate unwanted behavior. And third, there must be a combination of over- lapping and seamless electronic and non-elec- tronic technologies in order to have a fully effec- tive perimeter system. About the Author: Doug Haines is the owner and CEO of Haines Security Solutions (HSS), in Ventura, California. He’s widely respected and sought after for his subject matter expertise in developing building design strategies. (Learn More, courtesy of Greg Perkins and YouTube) The overarching philosophy of any physical se- curity perimeter plan must include all three of these elements. First, recognize that each asset requiring pro- tection has several layers or perimeters and each offers an opportunity to deter, delay, de- tect and defend. Each MUST be used wherever and when- ever they are present. Whether lecturing in academia or at a security 28