Circles of Protection - Understanding the Big Picture
Stephen Somers, CPP, CHS-V
Vice President Strategic Alliances and Initiatives
Circles of Protection: Understanding the Big Picture
This plan of Circles of Protection was taught to me by Edmund Skrodzki, a retired U.S. Secret Service agent. When he retired?from the Secret Service?in 2005, Mr. Skrodzki became the Executive Director of Security Services at Johns Hopkins University in Baltimore, Maryland. The Homewood campus, located in downtown Baltimore, presented numerous challenges, being situated in an urban environment within a socially challenged area with very high crime rates.? Mr. Skrodzki decided to use the same strategy he had employed in the Secret Service for 22 years to address the challenges in Baltimore. This strategy paid off by reducing crime significantly.
?
This "Circles of Protection"?strategy?offered an overlapping concept that utilizes all available resources to ensure comprehensive campus safety.
In campus security, the idea of circles of protection—often referred to as the layered approach—is a method designed to create multiple layers of security to safeguard the campus community and its assets. The concept involves setting up a series of concentric circles, each representing a distinct level of security, providing an added layer of defense.
Building a layered approach to public safety in a higher education setting is vital for establishing a thorough and effective security program. This strategy, commonly termed circles of protection, integrates various safety measures to ensure complete coverage and an efficient response during incidents. Here’s how to structure this layered approach:
Static Officers ?
- Fixed Security Posts: Position static security personnel at critical points like campus entrances, residence halls, and busy areas. ?
- Access Control: Officers oversee building access, check identifications, and maintain visitor logs to deter unauthorized entry. ?
Mobile Patrol ?
- Vehicle Patrols: Utilize security vehicles to patrol the campus perimeter and parking areas, offering a visible deterrent and fast response capability. ?
- Rapid Response: Mobile patrols can swiftly address incidents throughout campus, covering larger areas more effectively than foot or bike patrols. ?
Bike Patrol ?
- Flexible Coverage: Officers on bikes can reach areas that are tricky for vehicles, such as pedestrian paths and courtyards. ?
- Community Engagement: Bike patrols boost visibility and enable officers to interact with the campus community in a more engaging manner. ?
领英推荐
Foot Patrol ?
- Close Interaction: Officers on foot can closely watch building interiors, libraries, and other crowded spaces, offering a strong visible presence. ?
- Detailed Observation: Foot patrols are better at noticing subtle details and suspicious activities that might elude other patrol forms. ?
Off-Duty Law Enforcement ?
- Supplemental Security: Employ off-duty law enforcement officers to provide extra backup during high-risk times, such as large events or late-night hours. ?
- Enhanced Authority: Off-duty officers carry additional authority and the power to make arrests, serving as a strong deterrent. ?
Proper Level of Supervision ?
- Shift Supervisors: Make sure each shift has a dedicated supervisor to oversee and coordinate security efforts, respond to incidents, and support officers. ?
- Regular Training and Briefings: Host ongoing training sessions and daily briefings to keep security staff informed about new protocols, potential threats, and campus happenings. ?
- Performance Monitoring: Implement regular evaluations and feedback mechanisms to uphold high standards and promote continuous improvement. ?
Integration and Coordination ?
- Unified Command Structure: Build a command structure that ties all layers of security together, ensuring smooth communication and cooperation. ?
- Collaboration with Campus Administration: Keep open lines of communication with campus administration, facilities management, and student services to align security measures with broader campus operations. ?
- Community Engagement: Cultivate positive relationships with students, faculty, and staff through safety workshops, forums, and regular interactions to foster trust and cooperation. ?
Regular Assessment and Improvement ?
- Risk Assessments: Periodically conduct risk assessments to pinpoint vulnerabilities and modify security strategies as necessary. ?
- Incident Analysis: Analyze incidents to grasp their causes, evaluate response effectiveness, and implement corrective measures. ?
- Feedback Loop: Collect feedback from the campus community to highlight areas needing improvement and adjust strategies accordingly.
By applying these layers of protection, higher education institutions can develop a strong and adaptive security program that confronts various threats while ensuring a safe and secure learning atmosphere.
Experienced NGO Security Advisor ??? | Local Governance & Climate Resilience ????
1 个月Great contribution and thank you ?? Stephen Somers, CPP, CHS-V
Distinguished Adjunct Faculty | Sports Security Expert | Best-Selling Author | Specialized in USESC Event Staff Training & Personal Safety | Bridging Higher Ed & Sports Security
1 个月Excellent share Stephen Somers, CPP, CHS-V. Nicely done.
Experienced Security Executive delivering Peace of Mind through unified Security Solutions.
1 个月Very informative
Travel Risk Management Consultant | GBTA US Risk Committee Chair | Senior Global Crisis Program Manager
1 个月Great insight into the "Circles of Protection" strategy and how they layered approach to campus security creates a safe environment. It's inspiring to see how methods used in the Secret Service can be adapted to meet the unique challenges of higher education to foster a safer campus community.
Decades of Elite Security Leadership and Public, Private and Non-Profit Sectors Business and Operations Expertise. U.S. Secret Service (retired)
1 个月Edmund Skrodzki taught us well! One of the best in the business. If this was fully applied on July 13th in Butler PA, the shooting wouldn’t have taken place and the suspect would have been caught. Nice of you to highlight and recognize Ed and share your experiences.