Download as pdf or txt
Download as pdf or txt
You are on page 1of 28

Physical Security

Framework for Addressing Physical Security

Chief Keith F. Hummel (Ret.)


Associate Public Sector Director
Disclaimer

This presentation is designed to provide a general


understanding of the need to develop an integrated
physical security plan. The topics discussed will assist our
clients with the goal of developing physical security
measures, operational procedures, and policies to mitigate
and protect the assets of your municipality. There are
several planning models that can be used to mitigate the
challenges of securing your assets, seek the advice of your
governing body and your municipal attorney to evaluate
and to determine which course of action will meet the
needs of your jurisdiction.

2
Crisis Management Plan

• Do you have a crisis management plan in place?


– Office of Emergency Management

– Today, we are going to discuss “Physical Security”


• Why?
– Best Business Practice
– PEOSHA
– Reasonably Foreseeable

3
Best Business Practice

• Best Business Practice


– Follow a procedure based on expertise from the field
of physical security
• PEOSHA & OSHA
– Maintaining a Safe & Healthy Workplace for Public
Employees (N.J.S.A. 34:6a-33)
• Workplace free of recognized hazards, that are
causing or likely to cause death or serious physical
harm

4
Best Business Practice

• Reasonably Foreseeable?
– Workplace violence
• Census of Fatal Occupational Injuries, of the 5,190 fatal
workplace injuries that occurred in the U.S. in 2016, 500
were workplace homicides…
– Categories of workplace violence
• Criminal Intent
• Customer / Client
• Worker to Worker
• Domestic Violence
• Ideological Violence

5
Department of Labor Workplace Violence

• Major concern for employers and employees


– The cost to organizations is staggering:
• Single incident can have sweeping repercussions
• Immediate and profound loss of life
• Physical and psychological repercussions
• Loss of productivity and morale
• Public relations impact on an employer when news
of violence reaches the media
• Litigation

6
Deliberate Indifference

“It won’t happen here!”

• Search the internet, social media, personal experience…


– 2015 San Bernardino Attack
– 2017 North Park Elementary
– Panama City - Man holds School Board Hostage
– Defendant shot by deputy after attacking judge

7
Integrated Physical Security Plan

• Physical Security
– What can we do?
– Develop a “Plan of Action”
• Go through a process
• Continuous Improvement

8
Integrated Physical Security Plan

• Security Purpose:
– Deter
– Detect
– Delay
– Response

9
Integrated Physical Security Plan

• Physical Security Measures


– Technologies, perimeter, external and internal
protection, sensors, design, barriers…
• Operational Procedures
– How the facility works on a day-to-day basis, how we
deliver services, opening and closing, disruption…
• Policies
– Who does what and the actions to be taken to prevent
an attack on an incident, how to mitigate and ensure
continuation of business

10
Integrated Physical Security

• Goal: Protect our assets


– People
• Our personnel, visitors and those who live near by
– Place
• Physical infrastructure
– Materials
• Sensitive information, archives, business product

11
Integrated Physical Security

• Strike the right balance*

“Ensuring the safety and security of the facility and its


critical assets without impacting on the day-to-day
operational procedures”

*Integrated Physical Security Handbook, p3.

12
Integrated Physical Security

• Communication:
– Marshall your resources:
• Governing body empanel a committee to lead you
through the process – create “Buy-In,” the Why!
– Who: Mayor, Public Safety Director, Police, Fire, OEM,
Employee, Public Representative, etc.
– Mission
– Time line
– Plan of Action
– Options
– Reports

13
Vulnerability Assessment

• What are your critical assets?


– People, Places, Documents, Equipment, Data, …..
• What is your current security situation?
• How secure is your location?
• What is your current perimeter security?
• How structurally safe are you?
• What communications & IT Protection do you have?
• Is your equipment protected?
• What external security protection do you have?
• What internal security protection do you have?

14
Integrated Physical Security

• Step One:
– Your model facility – maximum security without
compromising business as usual
• Identify
– Core Functions
– Critical Assets
– Threats and Vulnerabilities
– Mitigation Strategies

15
Integrated Physical Security

• Step Two:
– Gap Analysis – where I am versus where I want to be!
• Most important – Protect People
• What am I protecting
• Assets to be protected
• Threat to those assets
• Vulnerability of those assets
• Your priorities

16
Integrated Physical Security

• Step Two - Who are my adversaries


 Internal - Disgruntled employees (examples)
– Escalating aggression (physical, verbal, intimidation, stalking)
– Weapons involvement (acquire new or improvement)
– Negative mental status (entitlement, paranoid, delusions)
– Negative employment status (relationship, financial, position)
– Personal stressors (perceive themselves as victims)
– History of violence and conflict (loner, anti-social, previous events)

 Inability to cope?

Resource: Violence Assessment and Intervention ISBN 13:978-1-4200-7112-2

17
Integrated Physical Security

• Step Two - Who are my adversaries


 External
 Vandalism and Theft
 Disgruntled clients
• Tax collector’s office, social services, building department, permits
 Family members
• Break-ups, divorce, money
 Past employees
• Retaliation
 Political Statements and Protests
 Terrorism
 Government cannot protect you, they can’t protect themselves
18
Integrated Physical Security

• Step Two - Who are my adversaries


– Monitor threats:
 Past experiences
 Shared experiences
 Police records
 U.S. Department of Homeland Security
 State of New Jersey Office of Homeland Security and
Preparedness
https://www.njhomelandsecurity.gov/hometownsecurity

Assign someone to read for 15-20 minutes per week!

19
Integrated Physical Security

• Where am I vulnerable?
– Scenario based assessments
• Your employees know!
• They handle the day-to-day activities
• Critical flaws, weak points
– Physical, procedures, policies
– What do you do?
• Go to the bank
• Let people in to your safe space
• Visitors access sensitive areas

20
Integrated Physical Security

• Perimeter
– Type of building
• Cinder block, concrete, wood framed
• Door strengths
• Alarms
• Controlled access
• Training of personnel

• When you know your weaknesses you are able to


develop solutions to mitigate or eliminate the risks!

21
Integrated Physical Security

• Step 3 – GAP Closure


– I know my shortfalls, what are my options?
• Perimeter security
• Vehicles
• Internal security
• Information technology
• People
• Building design
• Community risk assessment
• Technology solutions

22
Integrated Physical Security

• Step 4 - Strategic Plan


– “Strategic Plan”
• Having identified assets, adversaries, threats and
vulnerabilities and determined priorities and options, you are
in a position to plan and strategize the security change
process.
• SWOT
– Strengths, Weaknesses, Opportunities, Threats
– Address all of the areas and close the “GAP”
» Time line, planning for resource allocation
» Submit report to Governing Body

23
Integrated Physical Security

• Step 5 – Implementation
– Approval – Governing Body
• Project Management
• MS Project
• Bid contracting and vendor selection
• Revising policies
• Training and Drills
• Continuously testing for weaknesses
• Re-analyze for changes in the environment
– Recommend new strategies and enhancements

24
Integrated Physical Security

• Carrying out your plan of action


– Deterrence
– Detection
– Delay
– Response
– Recovery
– Re-evaluation

25
Integrated Physical Security

Developing a plan of action will show that


you are engaged in the process of
continuous improvement!

• Fulfill our obligations:


 Safety
 Best Business Practices
 Reasonably Foreseeable

26
Source Material

The Integrated Physical Security Handbook


Don Philpott and Shuki Einstein, Homeland Defense Journal, 2006

Vulnerability Assessment of Physical Protection Systems


Mary Lynn Garcia, Sandia National Laboratories, Elsevier, ISBN 13: 978-0-7506-7788-2

The Art and Science of Security Risk Assessment


Ira S. Somerson, CCP, ASIS International, ISBN 978-1-887056-83-0

Risk Assessment Standard


ANSI/ASIS/RIMS RA.1-2015. ASIS International, ISBN: 978-1-934904-75-6

Facilities Physical Security Measures Guideline


ASIS GDL FPSM-2009, ASIS International, ISBN 978-1-887056-95-3

The Design and Evaluation of Physical Protection Systems


Mary Lynn Garcia, Sandia National Laboratories, Elsevier, ISBN 13: 978-0-7506-7367-9

Risk Balance & Security


Erin Gibbs Van Brunchot (University of Calgary) and Leslie W. Kennedy (Rutgers University). Sage Publications. ISBN 978-1-4129-4070-2

27
Source Material

Violence Assessment and Intervention, The Practitioner’s Handbook 2nd Edition


James S. Cawood, CPP and Michael H. Corcoran, PH.D., CRC Press, ISBN 13: 978-1-4200-7112-2

Bureau of Labor Statistics – Census of Fatal Occupational Injuries Summary 2016


https://www.bls.gov/news.release/cfoi.nr0.htm

28

You might also like