Sunday, May 19, 2019


Getting Everyone to Speak a Common Language




A couple weeks ago, I was teaching a class about using building design to deter criminal activity, including terrorist attack, and when it fails reduce its effects and prevent mass casualties.  After the obligatory introductions, I said something to the effect, that building design is a matter of reducing risk whenever and wherever possible.  But in order to do that you have to the know your “DBT”.

Based on the blank stares, I got back, I knew something was wrong.  So, I said it again.  Still the deer in the headlights looks.  So, I said, “Everyone knows what DBT stands for, right”?  Still nothing.  Not one person raised their hand.  I was taken aback.  After all the class was made up of seasoned architects, engineers, planners and security folks.  I would have thought, at least, one or two would have known what I was talking about.

So, we spent the new few minutes talking about Design Basis Threat or DBT, if you will.  DBT is identifying your threats, their tactics, the tools they may use and then designing your building to deter or prevent them from happening, in the first place, and understanding that if they do happen you can reduce their effects if you’ve included reduction strategies into the design.

The very first thing to do is to assemble “the planning team”.  The idea that “it takes a village” needs to be used here.  The team should include architects, engineers, facility manager, security, end users and others.  It’s important to bring these folks together, so that they can discuss the parameters of what they are trying to accomplish and “buy in” to the project.  If done correctly at the beginning of a project, security costs can be kept to a minimum, usually somewhere around five percent of the total project costs.  If security comes in at the end of the project this cost may skyrocket to thirty-forty percent, because of the long term cost of equipment maintenance and especially, personnel costs.

Once the team is assembled, the first step is to identify the threat or threats.  Threats can be divided into two categories; natural and man-made.  Fortunately, laws and ordinances exist that address natural threats in building design; i.e., earthquake, flooding, fire, tornado, etc.  Man-made threats on the other hand – not so much.  Although, that is changing slowly.  Last year, federal legislation was signed into law that addresses the use of hostile vehicles as a method of attack in public spaces.  We’re still waiting for the DHS report the law requires and its subsequent findings and recommendations.  I’m particularly concerned that our government hasn’t the courage to attack hostile shooter legislation, when it is so needed.  But that’s another Blog topic for another time.

The second step is to identify the motives of the man-made threat,; i.e., causing injury or death, theft or unlawful removal of property or equipment, damage to property or facilities and causing adverse publicity.  Then we need to figure out what type of groups commit these acts; criminals (sophisticated/non-sophisticated, organized/unorganized), protesters (organized/non-organized), terrorist (domestic/trans-national/state-sponsored) and subversives.  

Then we look at the tactics they use; stationary or moving vehicle, different types of weapon usage, forced entry, etc.  Each tactic uses a different set of tools. That said, each type of tool use has a countermeasure available to reduce its effectiveness.

If we understand their motives, tactics and tools, we can design countermeasures into inhabited space that reduces the possibility that they will occur and when that falls short reduces their effects. 

My book, The Solutions Matrix: A Practical Guide to Soft Security Engineering for Architects, Engineer, Planners and Security Professionals, will be available in September.  It will outline the processes used to determine DBT, have a quick reference chart that outlines how to counter each type of man-made threat and provide examples of practical real-world solutions.  

Sunday, April 21, 2019



Street Market, Outdoor Café, and Pedestrian Zone Security is Lacking

Street Markets

I’m probably stating the obvious here.  But most street markets are temporary in nature (farmer’s, or harvest markets) and only occur on a certain day or two of the week or for a short period (Christmas Markets).  Local police department’s put up metal stanchions and post a traffic cop more for crowd and traffic control, than anything else.  They are not a deterrent to a dedicated threat using a vehicle as a weapon or an errant driver.  Now before you go and tell the mayor or the police commissioner his cops are ineffective let me explain.

It’s a matter of physics and not “goodwill or attentiveness” on the part of the policeman.  A vehicle traveling at just 10 mph covers a distance of approximately 73 to 102 feet in the 5-7 seconds it takes a trained officer to view, identify and react to an errant vehicle – intentional or otherwise.   Unless the speed of the vehicle is severely reduced to below that speed the vehicle will travel significantly further before it is recognized as a potential threat.  Cops are doing a great job everyday but they can’t beat physics – no matter their super hero powers, unfortunately.

Shameless plug here:  My friends at Marshalls Landscaping Protection USA have developed a super-shallow mount bollard that can be easily installed/removed because of the depth of the footing (3.9 inches or about the width of two girl scout cookies laid end-to-end).

Outdoor Cafes

And then there are outdoor cafes.  By nature they are more permanent.  I have to admit, I enjoy sitting in the piazza sipping an espresso just like any other caffeine addicted tourist.  Whole sections of city centers have rows of restaurants and outdoor cafes where you can sit and “take in life” as it passes by.  In response to the current “ramming vehicle threat” some cities are now placing very ugly “jersey” barriers[1] made from reinforced concrete) around these areas. 

A solid planter filled with dirt weighs several thousands of pounds and is an effective barrier, especially if struck by a vehicle at a high rate of speed.  A large vehicle could nudge it out of the way if it is not somehow anchored, but hopefully someone would notice that and sound the alarm.  Fortunately there is “street furniture” in the form of benches, planters, way signs, lighted bollards that are shallow mounted. These devices are permanently affixed, so they can’t be nudged, and can absorb the kinetic energy of a moving vehicle threat as described above.

What about large pedestrian zones?

My concern comes from the idea that besides establishing a perimeter and depending on which city you are in will determine how porous that perimeter is, is there really a separation of the different types of traffic that frequent the space; i.e., delivery vehicles, bicycle, pedestrians.  Each category of traffic poses a threat to the others.  Of course, a vehicle crashing into someone is much more likely to cause injury to.

Many cities are creating large “pedestrians zones” in city centers that cover many city blocks.  This is great but traffic is still mixed within these spaces in some places.  Unless the entire zone is vehicle traffic free, a pedestrian or cyclist must cross the street at some point.  These crosswalks are particularly vulnerable and offer great target selection. 

We need to further separate the traffic within these zones, so that only the traffic we want within a particular zone is allowed[2]; vehicles with vehicle with vehicles, cyclist with cyclist and pedestrian within their assigned zone.  We can design the space so that only the type of travel that we want will be in its particular zone because the unwanted traffic types can’t enter.   To separate vehicles from the rest, we could easily designed higher-than-normal-curbs and reduce speeds by creating a serpentine effect.  We could use the same idea for cyclist either permanently designed as part of the bicycle path or by using planters with trees.  And for the pedestrian only zone, we can design the space so that bicycles and vehicles cannot enter while pedestrians are present.   Again, we can borrow our idea from the outdoor café and place street furniture throughout.  Thereby, allowing pedestrians to duck for cover if something goes wrong.



[1] Security Industry Association Technology Insight 2018 Spring edition, https://www.securityindustry.org/2018/04/05/the-puppy-movement/

Sunday, March 17, 2019


YEP – IN SECURITY WE STILL NEED TO OCCUPY THE GROUND, WE CAN’T LEAVE IT ALL UP TO ELECTRONIC TECHNOLOGIES 



Despite the advances in electronic security technologies one fact remains, we (“the good guys”)still need to occupy the ground.

As many of you know, I’m a former Air Force Security Policeman – a blue grunt, if you will.  So consequently am a little partial to “zoomies” when it comes to the defense of the country.  Our strike capabilities are so sophisticated that we really don’t need the other services (now, don’t get your knickers in a twist and let me explain).  We could just bomb the hell out of the bad guys until they surrender.  But bombing the hell out of them doesn’t do anything for us, because in the end we still have to occupy the ground.  And that’s why the Air Force is just not enough.

The same holds true in the security business.  Everyone is moving towards electronic technologies and the advances in predictive behavioral analyses and other artificial intelligence (AI) technologies is “mind blowing”.  
In the ‘80’s we posted guards, in the ‘90’s we put cameras because guards became expensive and since that time we’ve been using analytics to understand better what we are observing.  With the technologies that are currently “off the shelf” we can do allot more than we used to be able to do.  We can have one guard monitor several cameras and with analytics s/he uses can monitor even more as the software interprets what it’s seeing and notifies those responsible when something is amiss.

This is all well and good, but electronics can’t do it alone.  We still need to “occupy ground”.  By that I mean we need to design the built environment so that it complements the technology we use.   The use of non-electronic technologies will become even more important in the future, and especially in the urban environment.

The city of New York employs thousands of cameras around the city but they also deploy thousands of beat officers.  Both rely on each other to enhance the other‘s effectiveness.  If a patrolman sees something, she/he can have a colleague at the central station bring the field of view into focus and zoom in.  And by looking at adjourning screens or from different angles maybe get a clearer picture of what is happening.  Likewise, if the monitor sees something suspicious, he/she can dispatch a patrol to investigate further and cover those areas that the camera can’t see.

So with the utmost respect, we still need the grunts.

Sunday, February 17, 2019

What the LA Ram Superbowl Game Plan Teaches Us about Home Security


What the LA Rams Superbowl Game Plan 
Teaches Us about Home Security





First, I have to admit I had hoped the Rams would win the Superbowl.  It would have made my blog sound allot better.  I could have boosted about how Sean’s crew had analyzed their adversaries and implemented the perfect countermeasures and protected the home front (after all they were the home team).

Then secondly, I admit I’m not a football buff and understand everything about the do’s and don’ts of the game.   But I can with confidence make some comparisons and analogies that I believe most of us can understand.

So, anyway, congratulations to the New England Patriots on their win.

The more I think about it the more I realized that the Rams loss actually teaches us more about sizing up the threats than I first thought.  It teaches us, that not only do we have to look at the attacking forces from our perspective but we also must consider how they see themselves and will adjust.

In security design, we call this the design basis threat or DBT.  In other words, what you’re trying to protect your asset (thing of value) from – whether it’s a natural threat; such as, wind, fire,  rain or a man-made threat; like, graffiti, burglary or theft of property.

The Rams coaching staff had to analyze what the Patriots were capable of (their modus operandi [MO] and then figure out how thwart it.  They also needed to formulate a plan that covered the entire field.  In essence, defense in depth – the front line, the linebackers, the safeties.  We’ve all heard, “The best defense is offense”.  How true.  Ask the Patriots.

Unless, you have a comprehensive plan for the protection of your home, the attacker, be it a burglar, tagger, etc. will circumvent your security by finding the weak spot and exploiting it.  Remember, just having a security camera or system is not enough.  You have to have security built in to every facet of your daily routine. 

For home security that starts with your on-line social media presence.  Don’t give too much information away.  I laugh when I think that someone couldn’t believe she was robbed while in Paris.  Like duh, if you brag about how expensive the stuff is that you have there’s a very strong likelihood that someone also sees the value and will try to take it from you.  There was a case this week in Los Angeles were a rapper was flashing a big wad of cash and posted it on social media.  Well, guess what, he got robbed. 

Next, are you doing other things that tip off those with bad intention?  Do you put boxes out on the curb the night before the trash truck comes by?  Do you put papers in the trash that someone could take out under the cover of darkness and open-up credit card accounts in your name?  When you got that big screen to watch the Superbowl on, did you mount it on the wall so that someone walking on the sidewalk in front of your house could see it through the window?

Your plan has to be comprehensive.  It covers not only what you do but also where you do it.  Start from the roadway and work your way inward, assessing what the bad guy is able to see.  Make sure all lights work and all gates, windows and doors lock.  We lock our car even when it’s parked in the garage and the door from the garage into the house.  These little things delay the perpetrators actions and may possibly give us enough time to call 911.

I few years ago, I posted that the best home security system is actually a plate of cookies.  I still believe that, if you take some freshly baked chocolate chip cookies to the neighbors.  They’ll thank you for them and inadvertently watch out for your stuff because now they think they owe you.  

Maybe if the Rams would have taken some cookies to the Patriot’s locker room before the game things would have turned out differently.

Sunday, January 20, 2019


The Truth About Walls (Fencing)




A few years ago, I was asked by the editors of Security Middle East magazine[1] to write an article about perimeter security.  During the conversations with the editor that lead to the eventual article, she asked me to summarize what the article would be about.  I told her that in order to understand perimeter security you first needed to accept the fact that if you have a ten-foot fence the bad guy will bring an eleven-foot ladder. 



The idea that you can build a fence or wall and keep the bad guys out faded out sometime after the medieval ages when new technologies and new ways of conducting warfare came about.  Well, the same holds true today.



If you look up on Google the difference between a wall and a fence you’ll get the following explanation: “A fence is usually a wooden or metal structure that encloses a yard, pasture or other area…The difference between a fence and a wall is that you can almost always see through a fence, at least to some degree, while a wall is solid”.



If you look up fence purposes, you’ll get the following explanation; “A fence is a structure that encloses an area, typically outdoors, and is usually constructed from posts that are connected by boards, wire, rails or netting.  Alternatives to fencing include a ditch (sometimes filled with water, forming a moat)”.



Both definitions suggest that a boundary is formed between property that is not controlled and property that is controlled. 



Whether using a wall or fence, the purpose is to delineate a boundary; usually at a property boundary.  This is the true meaning of fencing or "walling", if you will.  To delineate property boundaries, in other words, you’re over there and I don’t care what you do but it you come over here you need to go down to the access point so I can check you out.  With that in mind, you could paint a line on the ground and put up a sign that says, “stay out or go over there for access”.  Both would achieve the same effect as a wall of fence.  So, why not just paint a line.  Because the value in constructing a fence or wall, is 1) to identify the boundaries of the controlled space, 2) to cause a delay in unauthorized access, and 3) to identify unwanted behavior.  An authorized person will not climb over a fence or wall, tunnel under it or cut through it.  An unauthorized person will, especially if they have nefarious intentions.  So, with that in mind, the fence serves an early warning system.  It tells us when someone breaches it that they have  “bad intentions”.  If they didn’t, they would not breach the fence/wall and would proceed to an access control point to display the proper credentials to gain entry.  Hopefully, the fence will be constructed in such a way as to delay their unauthorized access.  Sadly, even without tools a eight foot chain link fence with three strand barbed wire outrigger can be scaled or climbed over in about four seconds.  With tools, like a ladder or a truck to stand on it takes even less time.



Which brings us to the next truth, unless there is a guard or technology monitoring the fence-line in real time, we have no way of knowing if the boundary has been breached.  We must monitor for unauthorized access, respond to it, and engage the aggressor in real time.  The operative word here is “real time”.  If we don’t what’s the use?



Another thing to remember, no matter how solid, sturdy, high or how many bells and whistles are added, there will always be a way to circumvent whatever is put in place.  The key is, making sure there is enough time to delay the “bad guy or gal” so that his or her behavior can be identified and the “good guys/gals” have time to respond and engage.





[1] Security Middle East magazine article More Power to the Perimeter link https://issuu.com/securitymiddleeastmagazine/docs/sme_july-_aug_2015_web?e=0/14330179

Sunday, December 23, 2018

How to Protect Yourslf Against Burglary or Housebreaking by Using Surveillance Systems and Safe-rooms






I was watching the news the other night and just like every night, they were showing criminals that had broken in to homes while the owners were away.  There was even footage of the family dog chasing the burglar away.  But one story caught my eye.  It was the story of a homeowner who had installed a doorbell system with a camera.  We’ve all seen the ad where the bad guy approaches the home and the owner say “Get off my lawn” or something to that effect.  Then the perps run away.  It was one of those types.

In this particular case, the homeowner was inside the house with her son.  When the would-be burglar approached the door she got an image of the burglar standing by her front door.  He knocked on the door and pulled a gun from his waist band.  The homeowner took her son and hid in a closet and called 911.

Can’t say I blame her.  After all this was more than a burglary this had all of the potential of being a kidnapping, sexual assault or worse.  I think she did the right thing in hiding.  That said, however, a closet offers very little protection from a dedicated intruder.  What she needed was a closet that had been converted into a safe-room.  A room that was impenetrable from the outside.  There are materials out there that can be used in new construction or retrofitted to an existing closet space for a few thousand dollars. It could even be a DIY project over a weekend.  Shouldn’t every home have one? 

But the real problem here is that the homeowner had bought the security system thinking that it would protect them.  I guess it did, sort of, because she was able to see the perps and take action.  The standard action is to tell the perps to go away.  She didn’t do that, so in essence she didn’t use the system the way it was designed to be used.  Fortunately, the perps weren’t able to force the door open and eventually gave up and left. 

There are two things to remember about having a home security system; 1) it must be used the way it was designed in order to be truly effective, and 2) unless, there is a police or guard force’s immediate response, it really only collects evidence.



More tips on what you can do so it doesn’t happen to you, here:  https://reader.mediawiremobile.com/NYREJ/issues/203922/viewer?page=57



A one-day class on safe-room and shelter design and construction will be conducted on 20 June 2019.  Sign-up by calling 805 509-8655 or sending an email to info@hainessecuritysolutions.com  

Sunday, November 18, 2018

Architects Meet Security Halfway

Architects Meet Security Halfway
What Should They Do to Go All the Way? 


The normal process for building or inhabited space design goes something like this:  the client goes to the architect and describes his/her vision.  The architect interprets that vision using their creative juices.  That’s a good thing! Once the client approves the vision then project is handed over to an engineering firm to “build the guts”. Once the infrastructure is done and the project is finalized.  The client accepts the project.  At that point, it’s up to the client to coordinate the security features of the designed environment.

Sometimes, this process works.  But more often than not, it doesn’t for a very simple reason.  Everyone sees the project differently.  The first questions the architect asks the client is how many people, what type of space (open/shared/closed offices, how many floors, etc.?  During that conversation there should be questions asked that regard the Design Basis Threat; i.e, what types of threats are we trying to protect against? This particularly the case when it comes to man-made threats; such as, active shooter, hostile vehicle, insider threats.  Natural threats to buildings and people are usually governed by ordinances or codes; fire, earthquake, high winds, etc.  Man-made threats on the other hand are not usually governed by ordinance.

That said, when understanding man-made threats it is important to identify several keys elements of the threat:
1) Types of aggressors threats (covert or overt, group or individual, organized or not)
2) Aggressor motivations or objectives (inflict injury or death, damage or destroy property, steal equipment or materials, and create adverse publicity)
3) Aggressor tactics (both the modus operandi and the tools needed to be successful)

Unfortunately, these elements are usually left up to the security consultant towards the end of the project.  If they were considered during the initial 15% phase or 35% phase of the project, it could easily accommodate countermeasures that mitigate these identified threats purely by designing the space to do just that while still maintaining functionality and aesthetics.

The Department of Defense, Department of State and Veteran’s Administration mandate that a security representative be part of the design team from the very beginning.  The civilian world should follow suit, instead of the current halfway method.

Other trends in the built environment are discussed here:
Security Industry Association Technology Insight, Spring edition

Security Industry Association Technology Insight, Fall edition