Page 53 - Security Today, August 2017
P. 53

Instead of adding more cameras or in- vesting in traditional security solutions that provide a limited threat response, the goal should be to develop a new strategy and in- crease awareness of activity beyond the view of your fence or cameras.
Implementing an Approach
The major hurdle for organizations is imple- menting an approach that focuses on realis- tic, rather than hypothetical, threat behavior. Real-world threats today operate in ways designed to specifically counter most of the modern, overt security technologies available in the market.
To better understand the behavior and activities of real-world threats, it’s imperative to understand many of the misconceptions associated with protection of many of our protected facilities and assets.
Low level, insurgent-like behaviors, pre- viously confined to United States’ conflicts in the Middle East, are now becoming more and more prevalent in countries and regions like the United States and Europe. Real- world threats employ creative and uncon- ventional tactics that can only be understood by studying their specific tactics, techniques, and procedures. You cannot adequately pro- tect your assets against such threats by using traditional red-teaming exercises and staff.
During recent conflicts in Iraq and Af- ghanistan, we have seen conclusive evidence that those seeking to do us harm will go to great lengths to learn what and where exist- ing security measures have been put in place. With that information, threats can under- stand how to avoid and/or sabotage them with little to no chance of recourse.
Even though these are concepts under- stood by militaries and some security pro- fessionals, most organizations are still plan- ning their protection around past attacks even if it’s not representative of what could happen today.
The 2013 sniper attack on the Metcalf transmission substation is a constant re- minder of the type of attacks we are con- stantly up against. With some early recon- naissance, the attackers were able to quickly cause $50 million in damages and escape ap- prehension. Even with the amount of atten- tion this received in the security world, utility providers and other organizations with high- value facilities have done little to improve their protection.
Traditional perimeter security protection tends to follow the same methodology no matter what facility or asset you’re protect- ing. A fence surrounds your protected area, with cameras mounted at numerous posi- tions. These cameras are deployed to focus on known routes and to reduce the amount of surrounding blind spots. Security per- sonnel and sophisticated software monitor
WWW.SECURITYTODAY.COM
PORTABLE PROTECTION
Garrett’s multi-zone PD-6500i metal detector
Trusted around the world to help keep each facility safe, the PD-6500i is simple to set up and simple to operate.
Its versatile programs allow
it to be used in any security environment: mass transit, sports arenas, campus security, loss prevention, courts, prisons, and more.
SUPER SCANNER V® Hand-Held Metal Detector
Optional caster set enables full mobility for rapid deployment.
Optional battery modules for 10 hours of continuous operation without power cables or other wiring.
®
garrett.com
Toll Free: 800.234.6151
(U.S. & Canada)
Go to sp.hotims.com and enter 10 for product information.
Proudly Made In The USA


































































































   51   52   53   54   55