Professional Documents
Culture Documents
(Download PDF) 150 Things You Should Know About Security 2Nd Edition Lawrence J Fennelly Online Ebook All Chapter PDF
(Download PDF) 150 Things You Should Know About Security 2Nd Edition Lawrence J Fennelly Online Ebook All Chapter PDF
https://textbookfull.com/product/physical-security-150-things-
you-should-know-2nd-edition-lawrence-fennelly/
https://textbookfull.com/product/the-professional-protection-
officer-2nd-edition-sandi-j-davies-and-lawrence-j-fennelly/
https://textbookfull.com/product/what-you-should-know-about-
politics-but-dont-5th-edition-jessamyn-conrad/
https://textbookfull.com/product/97-things-about-ethics-everyone-
in-data-science-should-know-1st-edition-bill-franks/
The Least You Should Know about English: Writing Skills
13th Edition Paige Wilso
https://textbookfull.com/product/the-least-you-should-know-about-
english-writing-skills-13th-edition-paige-wilso/
https://textbookfull.com/product/what-every-engineer-should-know-
about-modeling-and-simulation-1st-edition-raymond-j-madachy/
https://textbookfull.com/product/100-things-every-designer-needs-
to-know-about-people-2nd-edition-susan-weinschenk/
https://textbookfull.com/product/what-every-woman-should-know-
about-cervical-cancer-revised-and-updated-2nd-edition-nenad-
markovic/
https://textbookfull.com/product/what-you-dont-know-about-
leadership-but-probably-should-applications-to-daily-life-1st-
edition-jeffrey-a-kottler/
150 Things You Should
Know about Security
Second Edition
Lawrence J. Fennelly,
CPOI, CSSI
Marianna A. Perry,
M.S., CPP, CPOI
Butterworth-Heinemann is an imprint of Elsevier
The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, United Kingdom
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
No part of this publication may be reproduced or transmitted in any form or by any means, electronic
or mechanical, including photocopying, recording, or any information storage and retrieval system,
without permission in writing from the publisher. Details on how to seek permission, further
information about the Publisher’s permissions policies and our arrangements with organizations such
as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website:
www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher
(other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience
broaden our understanding, changes in research methods, professional practices, or medical treatment
may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating
and using any information, methods, compounds, or experiments described herein. In using such
information or methods they should be mindful of their own safety and the safety of others, including
parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any
liability for any injury and/or damage to persons or property as a matter of products liability, negligence
or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in
the material herein.
ISBN: 978-0-12-809485-3
This book is the second in a series of the “150 books.” The first was Physical Security:
150 Things You Should Know. You are probably thinking that it would be difficult to
come up with 150 items, but it really was not that hard. We included ASIS Standards,
Underwriters Laboratories (UL), and National Fire Protection Association (NFPA)
Guidelines, and also Occupational Safety and Health Administration (OSHA) mate-
rial, because all these topics affect security and need to be included in a holistic
approach to security vulnerabilities.
Today, we routinely recommend light-emitting diode lighting, which is energy
efficient. Years ago, when conducting assessments, we both remember struggling
to have high-pressure sodium lighting installed because the common misperception
was that this type of lighting killed trees and plants. Clearly, we realized that people
needed to be educated about good security practices, especially lighting. Times are
changing and technology is moving us forward at an incredible pace.
When we say, “150 Things You Need to Know,” we understand that there are
more than 150 things that security practitioners need to know and be aware of. This
book presents information in an easy-to-read format and covers a variety of topics.
Each section of this book has been carefully placed for your review. Security does not
have to be complicated, but it does have to be specific.
We have added only one item in the appendix, which is a chapter from Sandi Davies
book, Women in the Security Profession: A Practical Guide for Career Development,
titled, The Future of Women in Security: Developing a Strategy for Success. We feel
that this work has some useful information for security professionals.
It is our intent to motivate everyone in the security profession to strive for higher
levels of awareness and preparedness for the years ahead. This is the responsibility of
all of us who are a part of the security profession and who must deal with the questions
of where we are leading the discipline and how the role of security will support the
organizations of the future.
Lawrence J. Fennelly
Marianna A. Perry
xiii
150 Things You Should
Know about Security
1 PM Cozens, G Saville, D Hillier. Crime prevention through environmental design (CPTED): a review
and modern bibliography. Prop Manage 2005;23(5):328–56.
2 Ibid.
3 Ibid.
4 Ibid.
PHOTO 1
Photo shows examples of good natural surveillance.
PHOTO 2
Photo shows examples of good natural surveillance.
1. Crime Prevention Through Environmental Design Strategies 3
PHOTO 3
Photo shows examples of good natural surveillance.
PHOTO 4
Photo shows a medium-height fence to establish territorial space and also has good
window design.
At the same time, it was recognized that natural access control and surveillance
contributed to a sense of territoriality, making it effective for crime prevention.
Natural access control and surveillance will promote more responsiveness by users
in protecting their territory (e.g., more security awareness, reporting, reacting) and
promote greater perception of risk by offenders.
Risk Management is defined5 as the process by which an entity identifies its poten-
tial losses and then decides what is the best way to manage these potential losses.
CPTED landscape security principles:
1. For natural surveillance cut back bushes to a height of 3 ft.
2. Cut back the tree branches to 8 ft from the ground.
3. Chain link fence height 7 ft plus three strands of barbed wire.6
4. Height of a stone wall—8 ft.
5. A least 10 ft of clear space on both sides of the fence and wall.7
6. Psychological deterrence: results when lighting leaves a potential intruder fear-
ful that he or she will be detected, identified, and/or apprehended.
5 Ibid.
6 LJ Fennelly. The chain link fence manufacturers institute as stated in loss prevention and crime pre-
vention handbook. 5th ed. 2012. p. 311.
7 JF Broder, CPP. Risk analysis and the security survey. 3rd ed. Elsevier; 2006.
8 http://it.ojp.gov/documents/d/fusion_center_guidelines.pdf.
6 150 Things You Should Know about Security
4. ENVIRONMENT
The conceptual thrust of a CPTED program is that the physical environment can be
manipulated to produce behavioral effects that will reduce the incidence and fear of
crime, thereby improving the quality of life. These behavioral effects can be accom-
plished by reducing the propensity of the physical environment to support criminal
behavior. Environmental design, as used in a CPTED program, is rooted in the design
of the human/environment relationship. It embodies several concepts.
The term environment includes the people and their physical and social surround-
ings. However, as a matter of practical necessity, the environment defined for demon-
stration purposes is that which has recognizable territorial and system limits.
9 TD Crowe, LJ Fennelly. Crime prevention through environmental design. 3rd ed. Elsevier Publishers;
2013.
10 www.popcenter.org/tools/cpted/.
5. Target Hardening 7
The term design includes physical, social, management, and law enforcement
directives that seek to affect positively human behavior as people interact with their
environment.
Thus, the CPTED program seeks to prevent certain specified crimes (and the fear
of them) within a specifically defined environment by manipulating variables that are
closely related to the environment itself.
The program does not purport to develop crime prevention solutions in a broad
universe of human behavior but rather solutions limited to variables that can be
manipulated and evaluated in the specified human/environment relationship. CPTED
involves design of physical space in the context of the needs of legitimate users of
the space (physical, social, and psychological needs), the normal and expected (or
intended) use of the space (the activity or absence of activity planned for the space),
and the predictable behavior of both legitimate users and offenders. Therefore in the
CPTED approach, a design is proper if it recognizes the designated use of the space,
defines the crime problem incidental to and the solution compatible with the desig-
nated use, and incorporates the crime prevention strategies that enhance (or at least
do not impair) the effective use of the space. CPTED draws not only on physical and
urban design but also on contemporary thinking in behavioral and social science, law
enforcement, and community organization.
5. TARGET HARDENING
The emphasis on design and use deviates from the traditional target hardening
approach to crime prevention. Traditional target hardening focuses predominantly
on denying access to a crime target through physical or artificial barrier techniques
(such as locks, alarms, fences, and gates). Target hardening often leads to constraints
on use, access, and enjoyment of the hardened environment. Moreover, the tradi-
tional approach tends to overlook opportunities for natural access control and sur-
veillance. The term natural refers to deriving access control and surveillance results
as a by-product of the normal and routine use of the environment. It is possible to
adapt normal and natural uses of the environment to accomplish the effects of artifi-
cial or mechanical hardening and surveillance. Nevertheless, CPTED employs pure
target hardening strategies, to test their effectiveness either compared with natural
strategies or when they appear to be justified as not unduly impairing the effective
use of the environment.
As an example, a design strategy of improved street lighting must be planned,
efficient, and evaluated in terms of the behavior it promotes or deters and the use
impact of the lighted (and related) areas in terms of all users of the area (offenders,
victims, and other permanent or casual users). Any strategies related to the lighting
strategy (e.g., block watch or neighborhood watch, 911 emergency service, police
patrol) must be evaluated in the same regard. This reflects the comprehensiveness of
the CPTED design approach in focusing on both the proper design and effective use
of the physical environment. Additionally, the concept of proper design and effective
8 150 Things You Should Know about Security
use emphasizes the designed relationship among strategies to ensure that the desired
results are achieved. It has been observed that improved street lighting alone (a
design strategy) is ineffective against crime without the conscious and active support
of citizens (in reporting what they see) and of police (in responding and conducting
surveillance). CPTED involves the effort to integrate design, citizen and community
action, and law enforcement strategies to accomplish surveillance consistent with the
design and use of the environment.
6. DETERRENTS
INTRODUCTION
We recently started looking into deterrents. For example, are security officers and
video surveillance systems a deterrent? Our findings were that a lot has been written
on closed-circuit television in England and Canada, whereas not as much has been
written on security officers. We also know from talking to our peers, other security
practitioners, and law enforcement knowledge from working on the street as to what
works and what are the deterrents. Disbelievers will say show me the data or you did
not use enough data.
Either way, it is time you started thinking about it. I have seen stores with about
100 cameras inside and 25 outside. Now that is a heavy cost to the wallet, but if they
were not saving the company money and preventing theft, they never would have
been purchased. Even with 125 cameras, there is still a certain degree of theft for a
variety of reasons stated later. Anyone who steals an item with the camera focusing
on the same item or area is said to be stupid, and we know a lot of stupid people get
caught.
Category A
• Security surveillance system used to prevent crime in private and public
locations
• CPTED principles and concepts
• Defensible space principles and concepts
7. Crime Prevention Through Environmental Design 9
Category B
• Security officers armed and unarmed in private and public locations. Individuals
who perform an observation or formal to informal function, i.e., hotel door man,
bus drivers, tickets sellers or ticket takers, train conductors.
• Police officers in uniform and armed security who may deduce that a crime is
about to be committed and deter the incident with their presence.
• Security officer patrolling the parking lots of hotels, hospitals, and retail loca-
tions; protecting corporate assets; and protecting customers.
• “Guardian angels” patrolling streets, neighborhoods, and subways.
PHOTO 5
Photo shows a camera on the roof, plus lighting.
PHOTO 6
Photo shows a driveway to an apartment building that reflects poor security caused from
the overgrowth of vegetation.
PHOTO 7
Photo shows poor security caused from overgrowth. Do you see the light in the middle of
the vegetation?
• Are all spaces designated and delineated for specific use? If not, can they be?
• Are there conflicts between uses?
• Is there sufficient capacity? Is crowding creating tension, fear, or potential
dangers?
• Are there expressions of pride and ownership (territoriality)? Can they be
increased?
12 150 Things You Should Know about Security
• Are all areas well maintained—kept clean and functional with no needed repairs
or replacements? If not, when were they last maintained?
• Are rules of conduct communicated? Enforced?
• Are there supporting activities that enhance surveillance, access management,
and social order? If not, can they be added?
• Are the grounds easy to navigate? Is it easy to understand where you are at any
given point? Is it obvious which path or direction you need to take to arrive at a
desired location?
• Does the landscaping enhance the ability to read the site? Does it provide shade
and buffering where needed? Does it provide an esthetic quality? Is it acces-
sible? Is it healthy and well maintained? Is it a problem?
• How do the site users behave? Is there respect for the environment? Are there
areas where tensions and disorder are common?
• Is there graffiti or are there other signs of vandalism?
• Is there video surveillance? If so, are they placed in prime locations? Are there
other means of surveillance?
• Are there successful CPTED applications already in place? If so, take note and
use them as positive examples.11
SURROUNDING NEIGHBORHOOD
• Adjacent land uses
• Condition of adjacent streets and properties
• Traffic patterns and volumes on adjacent streets
• Pedestrian crossing safeguards (marked crossings, traffic lights)
• Recommendations for improvements
11 http://cptedsecurity.com/cpted_design_guidelines.htm.
24 150 Things You Should Know about Security
Eyebolt
FIGURE 2
Securing double-hung windows with an eyebolt.
From New York Police Department.
WINDOWS
Windows come in a variety of shapes, sizes, and types, each of which presents a dif-
ferent type of security problem. Windows provide an inviting entryway for a burglar
who does not like to break glass because the noise may alert someone. On double-
hung sash-type windows, drill a hole through the top corner of the bottom window
into the bottom of the top window. Place a solid pin into the hole to prevent the win-
dow from being opened (Fig. 2).
Keyed window latches may also be installed to prevent the window from being
opened. In addition, grilles and grates may be installed over extremely vulnerable
accesses.
ENTRANCES
Any opening through which a human body can pass is an entrance. Front doors,
basements, patio doors, garages that have access to the house, and windows on the
second floor are all entryways to burglars. No one way is more important to protect
than another.
[He strikes himself without pity; then, seeing Damiani enter the court, he
hurriedly drops the shard.]
DAMIANI.
MARCOMIR.
DAMIANI.
MARCOMIR.
[in a low voice]
He has no guilt.
DAMIANI.
[Exit.]
MARCOMIR.
Not use the rod!
Not use it when I feel incitements rapid
As points of fire awake me to the knowledge
That all my flesh is burning! Every flint
Becomes a new temptation. How confess
To him I love his wife, and guiltily!
O Geneviva, do the swans still crowd
Round you to feed them? Are you mistress still
In the old palace? Can there be a doubt?
If Pepin dare insult you—O this frock,
This girdle, not a sword belt! And your husband
Who brought you to such peril with his dreams,
Let the light wake him!
[Marcomir unlocks the prison-door, flings it open and draws back behind
the trellis of vines.]
CARLOMAN.
MARCOMIR.
[advancing] I am come
To give you freedom.
CARLOMAN.
[seizing his hand like a boy]
Are the throstles fledged
I left within the orchard?
MARCOMIR.
CARLOMAN.
MARCOMIR.
Dear Carloman—
CARLOMAN.
MARCOMIR.
But is that meditation,
And does one so find peace?
CARLOMAN.
MARCOMIR.
CARLOMAN.
MARCOMIR.
But promises—
CARLOMAN.
CARLOMAN.
We must escape
From anything that is become a bond,
No matter who has forged the chain,—ourselves,
An enemy, a friend: and this escape,
This readjustment is the penitence,
The sole that I will practise.
[looking more narrowly at Marcomir] But your eyes
Are witheringly remorseful. One would say
That you had been some sunshines in the dark,
You, and not I. Open your heart to me.
MARCOMIR.
I hate you.
CARLOMAN.
MARCOMIR.
CARLOMAN.
There is escape.
MARCOMIR.
What, for a child?
CARLOMAN.
MARCOMIR.
CARLOMAN.
I entreated
You would not come with me.
MARCOMIR.
CARLOMAN.
MARCOMIR.
Have you watched the lepers?
Waiting outside the churches to be blest?—
They pray, they linger, they receive their God,
And yet depart uncleansed.
Do not continue
To question me, but listen. Bend your eyes
Full on me! I have never told the Prior,
I cannot; and I would not breathe it now
But for her sake. The lady Geneviva
Is spotless; but my thoughts have been defiled.
I love her, I have never won her love,
Must never strive to win it. It is hell
To think of her.
CARLOMAN.
MARCOMIR.
Never.
CARLOMAN.
MARCOMIR.
CARLOMAN.
No more of this—
MARCOMIR.
CARLOMAN.
MARCOMIR.
CARLOMAN.
DAMIANI.
DAMIANI.
CARLOMAN.
DAMIANI.
Is this what darkness and strict punishment
Have wrought in the corruption of your mind?
CARLOMAN.
A MONK.
MARCOMIR.
CARLOMAN.
MARCOMIR.
O Carloman,
My brother, I am saved!
OLD MONK.
DAMIANI.
[in a whisper] Half the brethren
Are in the chapel: I will bring them down
In mass on these insurgent novices.
[aloud] Children, I leave you: wrestle with temptation;
I now can only aid you with my prayers.
When you have heard him through, decide; and either
Lead him in chains to me; or if his lies
Prevail with you, then put me in your prisons,
And let the devil rule.
[to Carloman] Now do your worst
With your blaspheming tongue.
[Exit.]
OLD MONK.
We should be fools
To listen to him—it is mutiny;
And there are walled-up dungeons.
CARLOMAN.
CARLOMAN.
How? All of us march with a single mind
Making a strong procession from the gates.
Whither?
The heretic!
OLD MONK.
CARLOMAN.
CARLOMAN.
CARLOMAN.
OLD MONK.
Gently, brother,
You had your way, and made yourself a monk;
Now you are all for change—so is the world
For bitter change.
OLD MONK.
IST MONK.
It is too late.
CARLOMAN.
OLD MONK.
[Damiani, with Rachis and a large troop of monks, is seen coming from the
Chapel.]
CARLOMAN.
The gates are strong;
But you and I and all of us can pass
Through them in simple triumph if we will—
With one consent.
Why, they are opening now!
How gloriously! Armed riders!
Miracle!
A sign from God.
CARLOMAN.
ASTOLPH.
Where’s Carloman?
DAMIANI.
ASTOLPH.
CARLOMAN.
My saviour!
ASTOLPH.
CARLOMAN.
ASTOLPH.
DAMIANI.
And worse—
A rebel, an apostate, noble prince,
For whom I bring these manacles.
ASTOLPH.
And I
An extra horse; for, lunatic or sane,
I must have speech with——
RACHIS.
ASTOLPH.
RACHIS.
ASTOLPH.
To every dog his day!
[with a shudder]
Ah, then—meanwhile there is a blowing wind,
And all the world to ravish ... Carloman,
We are the brothers now ... [to Damiani] Yes, I and this
[Rachis sneaks off, hissing curses.]
Fraternal soul, your madman.
DAMIANI.
Do you need
An interview?
ASTOLPH.
[He looses his helmet and dips it in the well. Carloman puts both hands
round it as soon as it is full of water.]
CARLOMAN.