AST Digital Magazine September 2017 AST Digital Magazine September 2017 | Page 28
Volume 16
September 2017 Edition
While helpful, we cannot forget about the oth-
er layers.
Every layer provides an opportunity to distinguish
good from bad behavior.
CPTED principles have been around
since the 90’s and are another very ef-
fective non-electronic strategy.
A combination of intersecting electronic and
non-electronic technologies for detection, as-
sessment, command and control (policy and pro-
cedure), response and engagement is a precon-
dition for the perimeter system at every level to
function at full capacity and in a robust manner.
Second, the plan must be comprehensive and holistic and
include all five physical security pillars – detection, assess-
ment, command and control, response and engagement.
Ultimately, the goal is to reward wanted behavior
and deny and isolate unwanted behavior.
And third, there must be a combination of over-
lapping and seamless electronic and non-elec-
tronic technologies in order to have a fully effec-
tive perimeter system.
About the Author:
Doug Haines is the owner and CEO of Haines
Security Solutions (HSS), in Ventura, California.
He’s widely respected and sought after for his
subject matter expertise in developing building
design strategies.
(Learn More, courtesy of Greg Perkins and YouTube)
The overarching philosophy of any physical se-
curity perimeter plan must include all three of
these elements.
First, recognize that each asset requiring pro-
tection has several layers or perimeters and
each offers an opportunity to deter, delay, de-
tect and defend.
Each MUST be used wherever and when-
ever they are present.
Whether lecturing in academia or at a security
28