Tacoma City CPTED Strategy Assignment Hello, Note: Need two different copies for Assignment Assignment: Research how Tacoma, WA used the concepts of CP

Tacoma City CPTED Strategy Assignment Hello,

Note: Need two different copies for Assignment

Assignment:

Research how Tacoma, WA used the concepts of CPTED (discussed in more detail in 10.3) to build a sense of community using lighting, natural access control and natural surveillance. Determine if these factors could work in your area. See:

Your post should be at least 350 words and include at least one citation and reference formatted using APA 6 requirements.

Reference link:http://cms.cityoftacoma.org/CRO/PW%20405600%20003%20DesignSafeCPTED72.pdf

1. Assignment in 350 words. Effective Physical Security
Fourth Edition
Chapter 3
Security Surveys and the Audit
Copyright © 2013, Elsevier Inc. All rights reserved.
1

Security survey—critical on-site examination and
analysis of a place to:




Determine present security
Identify deficiencies or excesses
Determine protection needed
Make recommendations to improve overall security
Copyright © 2013, Elsevier Inc. All rights reserved.
3 Chapter Security Surveys and the Audit
Security Surveys
2
Security Surveys

Survey or audit must include:




External and internal complex
Identification of threats
Identification of controls
Level of risk
Copyright © 2013, Elsevier Inc. All rights reserved.
3
Security Surveys

Completed risk assessment should
include:



Risk analysis
Risk identification
Risk evaluation
Copyright © 2013, Elsevier Inc. All rights reserved.
4
Security Surveys

Five components:





Anticipation
Recognition
Appraisal
Crime risk
Initiation of action to remove or reduce a crime
risk
Copyright © 2013, Elsevier Inc. All rights reserved.
5
Security Surveys

Crime risk:


Opportunity gained from crime
Cost of protection measured in:



Protection of depth
Delay time
Total cost of item protected
Copyright © 2013, Elsevier Inc. All rights reserved.
6
Security Surveys

Anticipation:


Recognition:


Prognosis of further action
Ability to recognize and interpret crime risk
Appraisal:

Responsibility to develop, suggest, and
communicate recommendations
Copyright © 2013, Elsevier Inc. All rights reserved.
7
Security Surveys

Initiation of action:

Recipient of recommendations decides
whether to act, based on suggestions

Identification of security risk may be made early in
survey; acting on recommendation may be
advisable before survey is completed.
Copyright © 2013, Elsevier Inc. All rights reserved.
8
Security Surveys

Security risk
analysis—process of
assessing
threats/risks and
formulating strategies
to minimize
risk/achieve security

Includes:


Risk management
Analysis of:



Risk factors
Environmental and
physiological security
measures
Crime patterns, fraud,
and internal theft
Copyright © 2013, Elsevier Inc. All rights reserved.
9
Best Time to Conduct Survey

Most effective after a:




Crisis in the corporation
Breaking and entering or major larceny
Major change in physical infrastructure or
operational process
Request from auditors
Copyright © 2013, Elsevier Inc. All rights reserved.
10
Why Conduct a Security Review

Reasons include:




Identify what needs to be protected
Ascertain risk/security management needs
Determine threats/risks/vulnerability to assets
Ensure the security management plan
combats identified threats in cost-effective and
proactive manner
Copyright © 2013, Elsevier Inc. All rights reserved.
11
Recommendation Classifications

Example: Museum with art treasures

Maximum Security—alarm system with
perimeter alarms, 4 panic alarms, high-priced
art have own alarms, each on a separate 24hour zone
Copyright © 2013, Elsevier Inc. All rights reserved.
12
Recommendation Classifications

Example: Museum w/art treasures (con’t)


Medium Security—basement and ground floor
windows alarmed, 1 panic alarm at entrance, highpriced art with own alarms, each on a separate 24hour zone
Minimum Security—high-priced art each has own
alarm, each on a separate 24-hour zone
Copyright © 2013, Elsevier Inc. All rights reserved.
13
Recommendation Classifications

First Step in conducting security survey:

Interview with person requesting the report to
form appraisal on protection degree needed

May need to state all three recommendations in
report



Maximum
Medium
Minimum
Copyright © 2013, Elsevier Inc. All rights reserved.
14
Developing Security Points

Tools for conducting
surveys:





Tape measure
Floor plans
Magnifying glass
Flashlight
Camera






Small recorder
Screwdriver
Penknife
Pencil
Paper
Surveyor’s wheel
Copyright © 2013, Elsevier Inc. All rights reserved.
15
Developing Security Points

Conduct survey systematically



Start with building perimeter
Inside the building, start at basement, work
through to attic
Will develop a style of survey

Also software available
Copyright © 2013, Elsevier Inc. All rights reserved.
16
Do’s and Don’ts in Developing a Report

Do’s:





Be honest.
Call shots as you see
them—simple
language.
Be critical.
Keep as simple as
possible, but not
simpler.
Don’ts:




Don’t over-exaggerate
the reports.
Use maps and floor
plans only to illustrate
vulnerabilities.
Don’t repeat.
Don’t make statements
beyond your training
and capability.
Copyright © 2013, Elsevier Inc. All rights reserved.
17
Do’s and Don’ts in Developing a Report

Include in written report:


Page one: Intro or sample cover letter
Page two:




Identification of building and activities
Specific statement of major problems in priority
Alternative recommendations and a ID’d risks
List of further recommendations
Copyright © 2013, Elsevier Inc. All rights reserved.
18
Do’s and Don’ts in Developing a Report

Include in report’s general statements:



Physically inventory all property yearly
Engrave all property for identification
Bolt down all computers; lock all files,
cabinets, and rooms when not in use
Copyright © 2013, Elsevier Inc. All rights reserved.
19
Other Keys to Being Effective



Ability to visualize criminal activity potential
Ability to give sound advice on security
precautions to consider
Be a good investigator:


Know criminal methods/security device limits
Know security hardware
Copyright © 2013, Elsevier Inc. All rights reserved.
20
Nine Points of Security Concern




General purpose of building
Hazards involving the building or
occupants
Police or security officer applications
Physical recommendations
Copyright © 2013, Elsevier Inc. All rights reserved.
21
Nine Points of Security Concern





Locks, equipment to be bolted, card and
key control
Alarms
Storage
Trespassing
Custodians
Copyright © 2013, Elsevier Inc. All rights reserved.
22
Personality of the Complex

Each complex has distinctive personality.

Average building, open 9 a.m. to 5 p.m.



Traffic flow heaviest in that time
Building closed 5 – midnight.
Midnight—cleaning crew
Copyright © 2013, Elsevier Inc. All rights reserved.
23
Personality of the Complex

Three examples of
personality in building
with:




100 x 100 ft
Two solid core doors
One large window
AC

Case 1:

Credit union on main
street next to police
dept. vs. credit union
on edge of town
Copyright © 2013, Elsevier Inc. All rights reserved.
24
Personality of the Complex

Case 2:



Large doctor’s office
Expensive art vs. no
art but small safe with
Class A narcotics
inside
Case 3:

Variety store that
closes at 6 p.m. vs.
liquor store open until
2 a.m.
Copyright © 2013, Elsevier Inc. All rights reserved.
25
Positive and Negative Aspects of Making
Recommendations

Consequences if suggestions are
implemented.

Example:


Housing complex with high crime rate within and
outside
Recommendation: build a 10-foot high fence
around complex
Copyright © 2013, Elsevier Inc. All rights reserved.
26
Positive and Negative Aspects

Positive:




Crime is reduced
Less vandalism
Visual impact is negative
Negative:

Fortress environment—more psychological
barrier than physical one
Copyright © 2013, Elsevier Inc. All rights reserved.
27
Positive and Negative Aspects

Community reaction:



Involve residents
Consider cyclone or other see-through fencing
Use crime prevention through environmental
design (CPTED) to improve appearance
Copyright © 2013, Elsevier Inc. All rights reserved.
28
Crime Analysis

Crime analysis collection—gather raw data
of reported crimes/known offenders from:




Crime and arrest reports
Police contact cards
Police and security officer reports
Internet and newspapers
Copyright © 2013, Elsevier Inc. All rights reserved.
29
Crime Analysis

Step-by-step sequence of five functions:




Data analysis
Dissemination of analysis reports
Feedback/evaluation of crime data
Gives specific information of area crime
Copyright © 2013, Elsevier Inc. All rights reserved.
30
Key Control

Physical or electronic keys


Keys collected from terminated employees?
Master keys required for:




Company executives
Middle managers
Security department
Maintenance department
Copyright © 2013, Elsevier Inc. All rights reserved.
31
Guidelines for Key Control


Large key cabinet to store and control keys
Two sets of key tags with cabinet:



File key, must not be loaned out
Duplicate
Also, loan tags to ID who has loaned key
Copyright © 2013, Elsevier Inc. All rights reserved.
32
Guidelines for Key Control

Keep accurate records/files listing:




Key codes
Date key was issued
Who received it
Get signed receipt when keys are loaned
Copyright © 2013, Elsevier Inc. All rights reserved.
33
Guidelines for Key Control





Mark and code all alarm keys
Check keys in possession of guards/staff
Do not issue keys unless necessary
One person to order/issue keys
Change key cylinder when authorized key
is discharged for cause.
Copyright © 2013, Elsevier Inc. All rights reserved.
34
Guidelines for Key Control


Periodic inspections to ensure the right
people have the correct keys
Ensure original key issue and reissuance
of keys have identity coded on key so lock
cannot be identified by looking at key.
Copyright © 2013, Elsevier Inc. All rights reserved.
35
Digital Closed-Circuit Television

CCTV a valuable asset; even more when
hooked to a digital video recorder (DVR)

Can be:


Actively monitored
Recorded for follow-up
Copyright © 2013, Elsevier Inc. All rights reserved.
36
Digital Closed-Circuit Television

Evaluate operation
and effectiveness:


Working properly and
sufficiently clear?
Monitored or recorded,
with data saved for
correct length of time?



Fields of view placed
in most beneficial
areas?
Lighting levels correct
for areas being
monitored?
Security recording
hardware in locked
area?
Copyright © 2013, Elsevier Inc. All rights reserved.
37
Intrusion Alarms

Check out current alarm system:



Walk through every motion detector unit
Evaluate existing system vs. available alarms
that may meet client needs
Be familiar with state of the art alarm
systems.
Copyright © 2013, Elsevier Inc. All rights reserved.
38
Lighting and Security

Improved lighting results in:





Decreased vandalism
Decreased street crime
Decrease in suspicious persons
Decreased commercial burglaries
Reduction in crime
Copyright © 2013, Elsevier Inc. All rights reserved.
39
Lighting and Security—Streetlights

Four types of lighting
units:


Incandescent lamp—
least economical
High-intensity sodium
vapor lamp—brighter
and cheaper to use,
color closer to daylight


Mercury vapor lamp—
long life but slow to
fully illuminate; dim
Metal halide lamp—
bright white, instantly
on
Copyright © 2013, Elsevier Inc. All rights reserved.
40
Other Security Aspects

Review:


Communications networks, utility closets, IP
data networks, walkie-talkies or cell phones,
location of interior/exterior phones
Guard force and security personnel and
training, police powers, use of badges,
methods of operation
Copyright © 2013, Elsevier Inc. All rights reserved.
41
Security Survey Follow-up

Basic security survey framework steps:





Generate survey request
Conduct physical inspection
Deliver survey recommendations
Follow up after report is completed
Evaluate the program
Copyright © 2013, Elsevier Inc. All rights reserved.
42
Residential Security—Defensive
Measures

Doors:




Install dead bolts on
entry doors
Viewing devices
Doors with glass:


Sliding glass doors:


Secured so they can’t
be pried out of their
track
Use of a “Charley bar
Most rear doors
Double cylinder dead
bolt
Copyright © 2013, Elsevier Inc. All rights reserved.
43
Residential Security—Windows,
Entrances

Windows:

Double-hung sash-type windows:



Drill hole through top corner of bottom window into
bottom of top window
Keyed window latches
Grilles and grates
Copyright © 2013, Elsevier Inc. All rights reserved.
44
Residential Security—Inner
Defenses

Even with precautions, someone may
break in. Create obstacles by:



Install dead bolt lock on to door of closet
Restrict access from one part of building to
another with dead bolt locks
Burglar alarm– perimeter, motion detectors
Copyright © 2013, Elsevier Inc. All rights reserved.
45
Residential Security—Alarms

Residential intrusion alarms

Control panel often also handles fire alarms



Audible horn distinguishes between the two
Entrance/exit delay feature reduces false
alarms
Total coverage system recommended
Copyright © 2013, Elsevier Inc. All rights reserved.
46
Residential Security—Lighting

Better lighting provides a residential
security measure:


Reduces likelihood of burglary
May be displacing burglary to another, less lit
area
Copyright © 2013, Elsevier Inc. All rights reserved.
47
Home Security Checklist—Entrances

Examples:





Metal or solid wood doors?
Door hinges protected from removal from
outside?
Auxiliary locks?
Wide-angle viewer or voice communication?
Can lock be reached through mail slot, etc.?
Copyright © 2013, Elsevier Inc. All rights reserved.
48
Checklist—Garage/Basement Entrance

Examples:



Metal or solid wood entrances
Auxiliary locks for exterior entrances?
Door from basement to living quarters have
auxiliary lock on living quarter side?
Copyright © 2013, Elsevier Inc. All rights reserved.
49
Checklist—Ground Floor Windows

Examples:



Windows with key-operated locks or pinning
method?
Screens or storm windows locking from
inside?
Windows free from concealing structure or
landscaping?
Copyright © 2013, Elsevier Inc. All rights reserved.
50
Checklist—Upper Floors and Windows

Examples:




Do any windows open onto porch or roof?
Are they as secure as first-floor windows
Trees and shrubbery cut back?
Are ladders accessible?
Copyright © 2013, Elsevier Inc. All rights reserved.
51
Checklist—Basement Doors and
Windows

Example:





Door from outside to the basement?
Door adequately secure?
Lit by exterior light?
Concealed from street or neighbors?
Basement windows secured?
Copyright © 2013, Elsevier Inc. All rights reserved.
52
Checklist—Garage Doors/Windows

Examples:




Auto entrance door equipped with locking
device?
Door closed and locked at all times?
Garage windows adequately secured?
Garage doors lit on outside?
Copyright © 2013, Elsevier Inc. All rights reserved.
53
Protecting Personal Property

Programs to reduce losses:



Operation Identification—engrave personal
property with driver’s license number
Bicycle registration/antitheft program
Auto theft prevention program
Copyright © 2013, Elsevier Inc. All rights reserved.
54
Protecting Personal Property

Neighborhood Watch—encourages
reporting suspicious circumstances:




Unusual noises
People who do not live in neighborhood
Stranger entering neighbor’s house when
neighbor not at home
Someone running
Copyright © 2013, Elsevier Inc. All rights reserved.
55
Protecting Personal Property

Security Surveys:


Trained crime prevention officers provide
security survey assistance to residents
Citizen patrols:



Perform surveillance function
Relatively inexpensive
Takes advantage of existing behavior patterns
Copyright © 2013, Elsevier Inc. All rights reserved.
56
Protecting Personal Property

Citizen patrol shortcomings:




Cyclic pattern, so patrol tend to be short-lived
Passive role difficult to maintain
Police reluctant to cooperate with a patrol
May aggravate community tensions
Copyright © 2013, Elsevier Inc. All rights reserved.
57
Top Ten Security Threats





Staff members and staffing agencies
Loss of data or information
Extremism and terrorism
Lack of contingency or business-continuity
planning
Physical security
Copyright © 2013, Elsevier Inc. All rights reserved.
58
Top Ten Security Threats





Theft and fraud
Lack of security awareness
Storage and disposal of data and
information
Lack of training/competence
Regulatory compliance
Copyright © 2013, Elsevier Inc. All rights reserved.
59
The Audit

Exterior access
control


Objective—determine
whether sufficient
controls are in place
Approach—review
latest security manual
related to exterior
security

Interior access control


Objective—determine
whether appropriate
access controls in
place
Approach—review
latest security manual

Test for specific
controls related to types
of designated space.
Copyright © 2013, Elsevier Inc. All rights reserved.
60
The Audit

Mail services security


Objective—determine
if correct access
controls in place in
mail services area
Approach—review
latest version of
security manual

Badges, lock, and key
control


Objective—determine
whether program
controls are adequate
Approach—review
lasted version of
security manual
Copyright © 2013, Elsevier Inc. All rights reserved.
61
The Audit

Access controls and
badge designs

Objective—determine
if process and
technology in support
of physical acc

Search policy


Verify processes and
technology in support
of physical searches
operating effectively
Review latest version
of security manual
related to search
policy
Copyright © 2013, Elsevier Inc. All rights reserved.
62
The Audit

Emergency planning


Objective—determine
if emergency plans
have been established
Approach—review
latest version of
security manual
related to emergency
planning

Reporting of incidents


Objective—determine
if implemented
process for reporting
incidents
Approach—review
latest version of
security manual
related to reporting
incidents
Copyright © 2013, Elsevier Inc. All rights reserved.
63
The Audit

Investigations


Objectives—determine
whether incidents are
investigated, reported,
and closed correctly
Approach—review
latest version of
security manual
related to investigation

Emergency response



Reference—company
security manual
Objectives—determine
proactive involvement
in security emergency
planning and response
Approach—determine
if emergency
procedures are
developed
Copyright © 2013, Elsevier Inc. All rights reserved.
64
The Audit

Fire and Life Safety


Objective—determine if location implemented
an effective process to detect, annunciate and
suppress fires
Approach—review the fire/life safety program
and related documentation
Copyright © 2013, Elsevier Inc. All rights reserved.
65

Purchase answer to see full
attachment

"Order a similar paper and get 100% plagiarism free, professional written paper now!"

Order Now