AST Digital Magazine September 2017 AST Digital Magazine September 2017 | Page 25
Volume 16
must be used, when and where available to as-
sist in the four D’s.
September 2017 Edition
Layer 1 – Property Boundary/Line
If you ask one hundred people, approximately 95
percent will say that perimeter security is a fence
at a property boundary. Well, they’re partially
correct.
The most commonly referred to “perimeter”
is the property boundary or the edge of the
space that we can control.
Deterrence comes in the form of warning signs,
random patrols either by human guard forces or
robotics, visual display of surveillance and dedi-
cated lighting.
Delay mechanism include such things as, physi-
cal barriers (fences, planters, way-signs, trash
containers, hard and soft landscaping, doors,
windows, etc.) that restrict movement and slow
approaches of pedestrians and vehicles.
Note: The longer it takes to transverse a space
the higher the likelihood of detection.
Detection capabilities that also include as-
sessment components, such as, electron-
ic security systems that have a “real time”
monitoring element are essential [1] [2].
The perimeter is actually a line of demarcation,
sometimes identified by a fence or sign or some-
thing, that basically says, “If you’re over there
I don’t care what you do, but if you come over
here, I want to know who you are”.
And then we direct them down to an ac-
cess control point to get checked.
Most security officers focus on bolstering this
first layer where the controlled space comes into
contact with the public and consequently put
most of their resources there.
The idea being the harder it is to get in the less
likely the “bad guy” will.
Unfortunately, this is simply false.
Without an adequate response to “unwanted be-
haviors” by either members of the organization or
the guard force then engagement will be lacking
and the perpetrator will succeed; thereby, putting
people at risk.
It is essential that we consider what happens if
the “bad guy” breaches our “secure” perimeter at
any level – then what?
For this reason, each pillar of physical security
(detection, assessment, command and control,
25