Sunday, July 15, 2018


Using Landscaping to Control Access




I want to tell you about two incidents that required a security solution and how the first attempt at providing an adequate solution failed miserably.

First case – illegal dumping

The issue was that people were driving up to the banks of a stream and dumping trash; i.e., tires, mattresses, rubbish, etc.  The first solution provided added a camera to the site so that “things” could be monitored.  The camera fed back to the superintendent’s desk.  Of course, when he wasn’t there (weekends, evening/late at night, attending meetings, lunch, naps) the dumping occurred and continued.  The superintendent was scratching his head on what to do.  After all, he just spent several thousands of dollars on the latest technologies and they didn’t seem to work.

Our solution was not electronic.  Instead, we suggested that they build a raised berm/curb using natural landscaping (trees/boulders/bushes, even park benches) so that the vehicle couldn’t drive up to the water’s edge in the first place.  We suggested landscaping due to the ability to prevent the vehicle from reaching the stream.  We imagined the culprits wouldn’t want to carry the heavy objects from the roadway, across a bicycle/walking path and then into the wood clearing to reach the stream.  Our second reason was to ensure the aesthetics of the area were kept intact.  Sure, we could have suggested a fence along the embankment to deny access and achieve the same effect, but who wants to walk along a fence with barbed wire when they’re taking the dog out or jogging or cycling.

Second case – unwanted access to school property

The issue in this case was that community members were cutting across school grounds in order to shorten the distance to retail shops located near the school campus.  The first security company suggested erecting a chain-link-fence with 3-strand barbed wire outrigger around the entire campus perimeter with a gate for buses and parents/administrators.  When not in use the gate would be kept locked.  The administrators weren’t buying it.  What if a student climbed the fence and was injured?  And where were they going to get the manpower to manage the gate? 

Our solution was to construct on three sides a wooden split-rail fence approximately 4 feet high (similar to those used in the Atlantic Piedmont region) and then to place flower beds in front of the fence and thorny shrubbery and trees behind it so that it would be difficult to cut through.  The front of the campus was left open.  We also suggested installing "speed cushions" to allow just buses to enter the "drive up/drop off" area.  And to have a separate loading/unloading zone for the parent's cars, that would be controlled by school staff.  These solutions provided the aesthetic qualities the administrators were looking for.  We also suggested changing procedures but I don't want to give too much away here.  Needless to say a comprehensive change was needed to address the concerns of the school.

These are just two examples of how not all security solutions need to be electronic.  Unfortunately, surveillance companies will tell you that CCTV is the solution to everything.  The reality is it isn’t.  In both cases we used “natural access control” (Crime Prevention through Environmental Design [CPTED]) as a fundamental principle in our approach to reducing crime.

Additional CPTED ideas and other principles on deterring crime and the effects of terrorist attack will be discuss during a 3-day workshop, Designing Secure Buildings: Integrating Security Technologies being held in New York City, 11-13 Sep 18.

Our ROI Toolkit is available.  The Toolkit will help you justify to your boss why you need to attend this training.

Contact us at info@hainesssecuritysolution.com or call +1 805 509-8655 to register.

Visit us at https://hainessecuritysolutions.com/Training to find out about other classes we offer or to host a workshop. 

Sunday, June 17, 2018


Prediction: An Active Shooter Event Will Occur at Your Child's School Unless Fundamental Security Changes are Made

One more active shooter incident, just a different town, different families but we’ve seen this show far too many times before.  I’m disgusted that everyone is blaming everyone else, the gun lobby oh it’s a mental health issue, the gun control tribe, oh we need gun control, everyone attacking the FBI and the mental health system.  The reality is WE, the collective We, failed.  No single agency or group or person or law is solely responsible.  Non-sensible gun control, non-sensible mental health laws, non-sensible law enforcement and non-sensible governing by public officials who haven’t display even the slightest bit of leadership.  Leaders stand up, admit their failures and take actions to correct course.  I know it’s only been a few days, so maybe just maybe someone will step up but based on previous track records, I kind of doubt it.

ELECTED OFFICIALS

If you’re an elected official, we’re calling you out.  There is nothing and I mean, NOTHING that is more important than protecting our kids, no … America’s kids.  If you think of them as someone else’s kids, then you’re sorely mistaken.  These are American’s kids, they belong to all of us.  It just so happens that they weren’t my blood relatives – at least, not this time. 

If you’re a public official you serve us – not your own or your party’s agenda – OUR agenda, and right now our agenda is – SAVE OUR KIDS! 

I had written a two-hundred-word rant but I think Emma Gonzalez said it much more eloquently that I.

This is not about anything other than will power.  We, after Presidential leadership, decided to put a man on the moon.  Not because we knew how but because that’s who we are.  We did it because of our willpower to do it. 

SAME OLD SOLUTIONS

I fear that in the aftermath of this tragic event those faced with finding solutions; i.e., security companies, elected officials, and school administrators will rush to add security guards and electronic security systems to their schools.  Unfortunately, these products will not solve the problem.  The school in Parkland had both.  Sadly, the guards will be somewhere else when the shooting starts or will become the first victim.  More cameras will only allow us to capture what happened, because there is no one monitoring and responding in “real time”.  Allowing teachers to carry guns, will not stop the carnage.  In fact, the idea of allowing “responsible” people to carry weapons, whether open or concealed, only puts more people at risk.  We could add fences and gates and metal detectors but all of those can and will be circumvented by a dedicated threat.  Besides, fences and gates and access control add to the issue of aggressiveness[1].  And, I certainly don’t advocate that we turn our schools into prison like compounds. It’s going to take a multi-layered approach.  We need to address the possession and use of guns, especially assault type weapons that are designed to kill as many people as possible in the shortest amount of time possible. Since they’re not for protecting a person and or his/her loved ones I don’t get why you need to have one.  I understand the argument that you have the right to protect yourself and your loved ones in your home, but do you really need an AR-15 to do that?  I’m not writing this to get in an argument over guns.  I’m writing this to voice my concern that if we don’t address the use of these type weapons in a logical way, we’re in for more trouble. 

Regrettably, someone will say, “Hey here’s how we fix this, so it doesn’t happen again”.  And then everyone will run after that solution for a while or until the next shooting happens.  Then we’ll figure out what “fell through the cracks”, plug that hole and wait for the next killings to occur.  Unless we have a comprehensive approach bringing a variety of disciplines to the table the “plug a hole” approach will cost lives.

Just like tackling the root causes of what happened in their totality so is the necessity to take a layered approach to implement security at the detection, assessment, command and control (school administration), response and engagement levels.  Without a holistic approach we will not have comprehensive solutions.

CRY FOR HELP – MENTAL HEALTH

I have to say, that while I detest what the Parkland shooter did, I also can see that this was a desperate cry for help.  The system failed this young man and now we have hundreds of victims to show for it.  So mental health professionals need to be consulted so they can express how they can have a greater impact on the actions of those who are troubled before they act out. Note: After the Isla Vista shooting in Santa Barbara a few years ago, the city formed a coalition of mental health professionals, police and others to respond to “welfare check” requests, instead of leaving it solely up to the police.

If we don’t address associated mental health issues and the laws surrounding when a physician can report his or her suspicions and concerns that a person may act out, then we’ll miss the boat again.  I think we all can agree, if a mental health professional says this person may resort to violence, then our first course of action should be to take away their ability to access firearms.  At least, until a risk assessment is done by a professional panel.

LAW ENFORCEMENT’S FAILURE

Now that the FBI is under scrutiny for its failure to follow up on what seems to be a credible tip, everyone wants to blame them.  In this instance, an investigation needs to be conducted (Director Wray has already announced a probe will be conducted) and if someone needs to be held accountable, at whatever level, then so be it.  But to place the blame solely on the FBI is wrong.  I have high confidence that the FBI will get to the bottom of what happened and correct it.

ARMING TEACHERS AND SCHOOL ADMINISTRATORS

Many people will want to have officials pass legislation so that teachers and school administrators can carry weapons at school.  Bringing more wood to a burning building only makes the fire grow.  While on the surface, armed teacher/administrators may seem like a good idea but when you think it through it’s not.  These active shooter incidents most often start outside the classroom, somewhere on the periphery.  This means, that in order to be effective armed school officials would need to be outside of the classroom to engage and neutralize the threat.  Second, if everyone has a gun then what is the triggering mechanism for suspicious behavior or “See Something, Say Something”.  The tip that came in to the FBI was initiated because the behavior of the shooter was out of the ordinary.  If everyone is walking around with a loaded weapon, then how do we distinguish the good guys from the bad guys?  Besides, when the shooting starts who’s to say it won’t become the “wild west”?  I fear there would be many more casualties.  We’ve become accustomed to armed security officers or policeman because they’re uniformed, which identifies them as a good guy, and because they receive regular firearms safety training.  Yet accidents do happen.  I doubt teachers and administrators would receive the same degree of rigorous and routine situational training.

Curious note here: A Presidential Pool reporter was stopped this morning because he had a gun in his bag and was attempting to travel with the President.  If gun advocates think everyone should be allowed to “conceal carry” a weapon wherever they go, then why not let the reporter carry his legally registered firearm while accompanying the President to his golf game?  Just saying.

CHANGE IN ARCHITECTURAL DESIGN

Additionally, schools are not designed for protection, they’re designed for education.  Now, that said, some newer schools have been designed with security in mind but most of the effort has been on creating a perimeter that is impenetrable.  The reality is, what happens if a person gets past the perimeter[2], then what?  No places to hide that offer ballistic protection.  Especially in the newer facilities with open floor plans that foster the interaction of students.  The idea of stacking desks and chairs behind a door and expecting the dry-wall to offer protection from a high caliber bullet is just insane. 

We need a change in the way we design inhabited space, especially when the occupancy is higher than 20 people or so.  There should always be two possibilities for escape[3]. 

And we should be teaching to run at all costs; hiding and fighting is not an option.  Throw a chair through the window, kick or punch a hole in the wall (after all it’s just dry-wall) and get out no matter what, the only time a person should stay behind is if they don’t have time to escape.  With that in mind, we need to start creating ballistically protected spaces throughout that provide sanctuary and keep people safe when it’s too late for them to run.

There are off-the-shelf ballistic materials available that can be used to create safe-havens, in new construction or existing facilities and can be embedded in white boards, desks and chairs. 

THE COST OF CHANGE

Now, don’t get me wrong, I think space exploration and figuring out a way that’s economical to get to Mars is a great and necessary thing.  I’m using this as only one of many examples that I could use.  I’m just saying, if we can find the money to this, then why can’t we find the money and willpower to protect our schools.

The fiscal conservatives will say that it will drive the budget up.  So!  I can’t think of a better return on investment.

The cost to launch the Falcon Heavy was somewhere close to $90,000,000.  Not to mention the costs of the R&D that came before hand.  There’s not allot of information about how much money is has been allocated to this program so I’m going to make some guesses here.  Let’s say there were 10 launches (ground tests and orbital) at $50M each.  So that’s $500,000,000. 

So, let’s just say, that to make a space that’s approximately 100 square feet, that can accommodate a classroom full of students and teacher, we use the occupied floorspace guidance provided by DHS for saferooms/shelter (spaces where a person can seek shelter for up to two hours) costs, $20,000.  If, you divide half a billion by $20k that’s 25,000 classrooms that could be built or retrofitted.  And let’s say on average a classroom has 20 students then that’s roughly 500,000 students and teachers that would have been afforded protection in the same period.  Using the same formula and using just the latest launch cost of $90M, equates to protecting 90,000 lives. 

This doesn’t look like rocket science to me.

REAL CHANGE

For real change to occur two actions are required;

First, we need to stop thinking about this as a singular issue to resolve.  This is a multi-layered issue and can only be resolved with a multi-dimensional approach.  No topic or option, no matter how painful, needs to be off the table[4].  Folks need to check their emotions at the door and get to work.

And second, and much more importantly, we need to change our way of thinking.  We need to think that although it didn’t happen in my town or to my family it did happen to me personally – these are not someone else’s kids and teachers, they are OUR kids and teachers – they belong to America!

We claim to be the greatest nation in the history of the earth yet we sure aren’t acting like it.






[1] Security Update Opinion: Little empirical evidence #security measures can really stop school shootings ow.ly/kRah30irCS0
[2] Security guidelines for safer schools can be downloaded from the PASSK12 website http://passk12.org/
[3] “Active Shooter Threat:  Why Run-Hide-Fight is Wrong and Two Ways to Fix It” appeared in the 16 May 17 edition of the New York Real Estate Journal
[4] Toolkits on how to change the safety culture at your school are available here  https://www.safeandsoundschools.org/

Sunday, April 15, 2018


THE EVOLUTION OF RISK MANAGEMENT,
WAS DARWIN RIGHT?



In the Theory of Evolution, Darwin suggests that evolution is about survival of the fittest.  Was he right?  While he was talking about the natural world, his theory also applies to the security business.

In order to survive in today’s world businesses must adapt to their environments.  The threats that were around twenty years ago have changed.  They’ve become more sophisticated and must be adapted to.  What worked before won’t necessarily work in today’s world.  Not only have threats scenarios evolved but with the increase in technologies so have a new variety of threats come about. 

It used to be that a person who wanted to commit a breach of security had to be physically present in the space in order to carry out the attack.  That is no longer the case.  Since just about everything that has a moving part to it is somehow connected to the Internet of Things (IoT), a hacker does not have to be present in the physical sense in order to disable a closed circuit television (CCTV) camera, for example.  This means, a new way of thinking about threats, vulnerabilities and risk is necessary.

Threats used to be pretty much two-dimensional.  That no longer is true.  Those involved in the risk management business must think in three-dimensional terms.  In fact, they need to think about security as if it were a cube or box.  It’s six-dimensional and the approach to risk management must be carried-out that way.  This will require, pardon the pun, “outside of the box” thinking.

Additionally, without the “it’s part of the culture” way of doing business threat scenarios will continue to be played out with varying degrees of impact – and, some will be catastrophic.  Since we cannot prevent threats from occurring one hundred percent of the time we have to get the results down to a level that we can accept and handle with available resources.  This requires us to include scenario that are improbable but the results will overwhelm resources.  I call this “impact centric planning”.   I know most of us will not encounter an active shooter situation within our lifetime but active shooter threats must be planned for wherever high concentrations of people gather.  The adage, it won’t happen here cannot be the flavor of the day.  You’re right it probably won’t happen here, BUT if it does?  What will be the impact?

Not only must we deal with threats that are likely but we also must deal with threats that would be catastrophic even though very unlikely.   An excellent example of a highly unlikely event is the Las Vegas shooting incident.  That event was so improbable that if I would have brought it up during a planning session those in the room would have thrown their coffee at me. 

In order to survive, we must ensure we are the fittest.  So, Darwin was absolutely right.

Sunday, March 18, 2018


If Data is the New Currency of the Modern World Then Why
Is My Account Overdrawn?



According to a recent report in Security Megatrends: The 2018 Vision for the Security Industry published by the Security Industry Association 99.5 percent of all data collected via electronic devices goes unused.  Let that sink in for a second.  99.5% is wasted.  Less than .5 percent is accessed, analyzed and used in some type of constructive way.  I can’t imagine any other industry or area of life where less than one-half of one percent is good return on investment (ROI).



Here’s some data provided in the article "Accessing and Analyzing Smart and Big Data, Moving into Artificial Intelligence and Augmented Reality", using 60 seconds as the baseline, on just the social media platforms that I use:



·         Google – more than 3.8 million searches

·         Twitter – more than 350,000 tweets

·         Facebook – more than 243,000 photos uploaded and 70,000 hours of video content viewed

·         Linked-In – 120 new accounts created



So, why does this occur.  Well, it has to do with automation and the progressive nature of technology.  We’ve all heard the standard cliché that your phone has more data processing capability than the spaceships that went to the moon.  There have been surprising advancements in just about every sector of society.

I read an article some time back, that said your bank account could be hacked through your toaster.  At the time, I thought it a bit far-fetched,  But now the home improvement stores are selling refrigerators that can order food for you, if programed properly.  While, I think that was a little exaggerated but the point the author was making was, if your toaster has a microchip in it and that sensor report data somewhere, there is the potential that a person with malicious intent could through that sensor get to my bank account.



But is this a good thing?  For the most part yes.  I mean, think about it, only a few decades ago, if you were diagnosed with the big “C”, you started counting your days.  Now, more people survive and overcome the disease than don’t.  But on the other hand, let’s not get too carried away.  Technology is a tool and should be used as such; a tool that allows us to make better decisions about life choices.  Let’s remember that technology is not the solutions but it can be used to find the solution.



One of the areas where there is promise, within the security industry, is the area of “augmented reality” or AR.  We’ve all heard of “virtual reality” where the user is immersed in a fictional environment.  With AR the data augments the natural environment.  A simple example would be the ability to super-imposed a data screen on the visor of a motorcycle policeman that presents him or her with information about traffic up ahead, including accidents or breakdowns.  Or data information relayed to first responders during active shooter events.  This ability will undoubtedly save lives.



Estimates are that the Internet of Things (IoT) will mushroom in the coming years to between 34 Billion and 58 Billion devices connected to the data grid in some way by 2020.   Even if the world population doubles in the next two years (which is highly unlikely) that’s more than two devices per person.  


The hard part, in all of this is, will be figuring out what data to analyze, what to keep for the future and when to give it to someone to use now.    

Sunday, February 18, 2018


The Marriage of Cyber and Physical Security is Not a
Match Made in Heaven








Megatrend #2 from Security Megatrends, The 2018 Vision for the Security Industry, produced and published by the Security Industry Association (SIA) is, “Cyber Meets Physical Security, Threats Magnify with Digital Innovation[1]  hits the proverbial nail on the head.   With the connectivity of electronic devices to the internet, more and more of the different technologies we use in our daily lives are susceptible to compromise.  I read an article about a year back that talked about how in theory your new toaster could get hacked by someone with nefarious intentions and through that connectivity could steal your personal identifying information (PII).  While I believe that scenario to be a little far-fetched, I do believe the point was made.  The point being, that my smart phone, smart TV and even my smart refrigerator, especially if I had it set up to automatically order milk or bread for me directly with the store, is highly susceptible since I would most certainly have payment information in my stored profile.

The connectivity to the IoT is inherently vulnerable.  Since there’s an electronic connection, eventually given enough time, a “bad guy” will figure out a way to breach whatever security systems are in place.  Just ask Equifax, Sony Pictures, Target, etc.

The only absolute way to keep a breach from happening is not to connect to the IoT.  Unfortunately in today’s world that is just not possible.  We cannot function without being connected.  Now even my wife’s Jeep’s telling her she need servicing, before it was, “Hey, Honey, there’s a red light on on  the dashboard.  What’s that mean? “  Now, she gets a message on her phone that tells her  the tire pressure’s too low.

This convergence of cyber and physical means that physical security must be much tighter than it’s been in the past.  We can’t rely on the good guys to build a strong enough firewall, while vitally important, equally important is the physical security piece.  We need to teach our folks and ourselves how to spot vulnerabilities and how to protect those vulnerabilities from being exploited in a language they can understand.  I know a software engineer and whenever I talk with him, I have no idea what he’s talking about.   Listen if it’s a burden – I can’t understand it – I won’t do or use it. 

The vetting process, to ensure the right folks are working on our systems has to be comprehensive and continual.  Just because a person gets the job, it doesn’t mean the vetting process stops.  The vetting process must be continuing.  Physical security measures must also make sure that only people that have been cleared can physically access systems that they’ve been cleared for and not have a general run of the place.   I believe the DIY days are over.  Sure, there are some things any person should be able to do, like follow the tutorial on setting up a TV but other things that are in the Settings should probably be left up to an expert to change.  There is a tremendous assumption that just because I can read I can also understand the code being spoken.

Cyber security focuses on cyber-threats and the ability to detect and mitigate ransom ware attacks, especially as they’ve become a popular mechanism to extort businesses, will become more and more important.  I’m beginning to understand less and less about computers, how they work and what they can do to make my life simpler, because I have to do more and more of what use to be done by that weird guy down the hall.

I’m not sure I’m ready to have a micro-chip make all of the decisions of my daily life for me.  I have a feeling, it’s going to be a “rocky” marriage because I can't divorce her.
Next month:  If Data is the New Currency of the Modern World Then Why Is My Account Overdrawn?



Sunday, January 21, 2018


Security Opportunities within the Booming IoT Market

The Future is Bright for Non-electronics, Too






The term Internet of Things was coined back in the late 90’s.  The somewhat official definition is “A network of dedicated physical objects that contain embedded technology to interact internally or externally”.  I think we can all agree that is a very broad brush definition.  I would rephrase it to be, basically “an ecosystem that includes electronic things, and the communications and data analysis between them”.



With that in mind, let’s look at where we are today and where we’re going.



Today there are an estimated 7billion devices connected via the internet and applications that use the internet.  That’s a device for every human on the planet.  In just five years that number will increase to over 50billion.  The use of The Cloud is fueling this increase.



What does this mean for the security profession?  Simply put lots of openings and an unlimited number of chances.  In other words, if you can think it, you can make it happen. 



This increase in the realm of possibilities will affect every aspect of our daily lives.  So whether you’re involved in the residential, small business or corporate security market, you can make it.



I usually think of security solutions as following into one of two spheres – electronic or non-electronic.



ELECTRONIC TECHNOLOGIES



Electronic technologies are just that – technologies that are electronic.  Kind of a no brainer, don’t you think?  These technologies run the gamut from intrusion detection systems to access control to surveillance and beyond.  They’re becoming ever more sophisticated and complex.



Unfortunately, as technology evolves it will probably become more invasive.  It will collect more and more data about you. 



These invasive technologies already assault our daily lives.  Just imagine how that will change in the future.  While there is tremendous resentment about governments collecting data on individuals.  Companies, such as, Google, Amazon, Microsoft and other major retailers are doing it and no one really seems to care.



The use of cellphones will become almost an extension of ourselves.  We will be able to do everything from or with our phone.  I suspect someone is going to develop a security app that will read your blood pressure or your heart rhythm to authenticate that you are the correct user, instead of the fingerprint reader or PIN code of today.  Your phone will become your “Mini-me”.  It will know your behavior patterns well enough to “help” you make choices.



If you’re a dealer, distributor, integrator, system installer or work in a parallel vertical the opportunities abound, as you provide solutions for your customers.  It really won’t matter which product or service you provide, as there is a place and need for all of it, and combining technologies will provide even more opportunities.



The development of “predictive analytics” based on data collection will allow companies to forecast their customers buying habits better.  My personal opinion is that “predictive analyst” will become a job title and many security companies will hire them to determine future sales projections and to forecast their future markets.  With that in mind, there is already some technology out there that can analyze behavioral patterns.  Does this mean that access control will be determined by a biometric sensor and as a back-up analysis app that says, this is you because you always show up for work at this time or an even more sophisticated analysis by the pressure you apply to the pin-pad as you type in your PIN code?



NON-ELECTRONIC TECHNOLOGIES



Non-electronic technologies on the other hand don’t use electricity to function. They can range from windows and doors to landscaping or even the way a particular building or inhabited area is designed. 



Fortunately, to counter the invasiveness of the electronic age, non-technologic innovation will become less invasive as we develop better materials and strategies as we design inhabited space. 



I believe we can “socially engineer” inhabited space.  We can incorporate specific urban design strategies that cause positive behaviors so that there is less reliance on the invasive use of electronic means to keep us safe.  Ultimately citizens don’t want cameras that watch their every move; instead they want space that is functional and free of crime and unwanted behaviors.  By increasing the effectiveness in controlling the social behaviors of the people using or transiting the space, the environments will become safer and need fewer electronic gadgets.



We are at the cusp of an explosion in technologies, both electronic and otherwise.  Whether you are in the business of providing solutions directly in the form of a product or service or in the business of providing solutions indirectly, i.e., architect, engineer, security consultant or government official strap yourself in and hold on to your hat because it’ going to be a great ride with lots of opportunities for all to excel.

Sunday, December 17, 2017

Question You Should Ask Before Getting a
Home Security System For Christmas


Is a home security system on your wish list from Santa?  If so, here are a couple of things you need to ask before Santa puts your system in his bag.
The first two questions to ask yourself are, “What am I going to protect by buying this type of system?" Then, "Will it do what I want it to do?”  These sound like no-brainers don’t they?  Most of us would say, “I want it to catch the bad guy”.  Well, not really, because it won’t catch a bad guy.  It will let you know when there is behavior inside of your house or when your perimeter is breached. But it won’t tell you if the behavior is good or bad.  YOU have to do that.  YOU have to assess the behavior and determine if it's good or bad.  So, you want to be able to analyze the behavior, like your kids coming home from school or the mailman delivering a package and determine if it is friend or foe.  Which brings us to the next question, which is, “Who will monitor what the system 'sees' and who will respond when there is unwanted behavior?”
If you are relying on your local 911 or a police department response, then you need to find out what the local policy is for home invasion.  Some departments don’t respond immediately for a variety of reasons; sometimes due to competing priorities and sometimes because they don’t want to get there when the bad guy is still on the premises which may cause a “stand-off”.  They don’t want that and neither do you.
If you are relying on a service provider for response, you need to ask, “What is the guaranteed respond time?”  If it’s less than seven minutes the good guys will catch the bad guys.  If it’s more than that, the bad guy will get away with your stuff.  Actually you don’t want the good guys to get there while the bad guy is still there, as it increases the likelihood that someone is going to get hurt.
The National Institute of Justice reported a couple years ago that perpetrators of housebreaking/ burglary usually stay on site less than seven minutes.   I doubt it’s changed much in the last couple of years.
DO-IT-YOURSELF (DIY) SYSTEMS
Many professional installers will swear up and down that home owners cannot do this alone.  But let’s face it.  Just about anybody can do just about anything, given the right tools and knowledge.  Most home kits include instructions, so they’re pretty simple.  Tab A goes into Slot B.  If you can put together IKEA furniture you certainly can install a couple of cameras and sensors around your house.  That’s the tools part.  Now for the knowledge part – where to put cameras and where to put sensors?  Think of your house as an onion.  Start on the outer skin (property line) and work your way in.  Use a combination of sensors and camera that overlap so that all areas are covered by at least two components of your system.  Say a sensor and camera, or two cameras.  By using a combination of different technologies and creating an overlapping system you will, in all likelihood, get notified that something’s going on.  The chances of both systems failing simultaneously is very low.  Make sure you get "real time" notification.  The ability to talk into the system and tell the perpetrator that you're watching him or her (sorry ladies) is a plus.  However, it also let's the bad guy or gal know you are not at home.  So make sure you system covers the perimeter and you can engage before they ever get to the house.
HOME DELIVERY SERVICES
When Amazon recently announced that they would place your parcels just inside your front door if you signed up for this service many security folks cried “foul”.  They cited this service as basically allowing an intruder to enter your house.   Well, not really.  Amazon vets their delivery folks/employees during the hiring process.  If Amazon trusts them then why shouldn’t you?  Sure, there are always a few bad apples, but I see the risk of the delivery person rummaging through your house as a very low possibility since they don’t know if you’re going to come home suddenly and find them in the bedroom.  That just doesn’t make sense.  There are really two factors that are in play here that make this a good idea.  First, Amazon vets their employees and secondly the door lock and code is specific to your home. Additionally, the kit comes with a closed circuit television camera that you can set up to see if the person does more than deliver the package(s).   Plus there’s an electronic record of when the lock opened and when it closed.  Anything more than a minute or two, the amount of time to place the packages inside, would be cause for alarm and indicate something out of the ordinary happened.
If I ordered stuff on line and wasn’t home all day I’d use this service.
NO SYSTEM IS FOOL PROOF
Just remember that no system no matter how sophisticated is fool proof or offers one hundred percent protection one hundred percent of the time.  There will always be some risks involved.  The goal is to reduce the risks as much as possible and accept some risk.