Fundamentals of an effective Physical Security Posture & the 4th Layer, The Border Focus

Fundamentals of an effective Physical Security Posture & the 4th Layer, The Border Focus

The basic fundamentals of physical security require a layered defense in which you need three layers. These three layers consist of the outer layer, a perimeter fence, a wall etc, the inner layer which serves as a “buffer zone” and can be with the use of internal protective measures such as concrete planters, lights or other barriers or even a patrolling guard force (an active measure), the third layer is the building itself from entry control measures to surveillance. These three rings are key as the first is designed to prevent unauthorized access to the grounds, the second is designed to prevent further unauthorized access if a breach occurs or used to monitor internal activity, the third is designed to prevent unauthorized access into the building giving access to its inhabitants. With regards to the three layers, I like to consider a fourth.

The fourth layer is the people inside the building as they would essentially serve as a last line of an active defense should an incident occur. Often times this is not a consideration as the other three layers are designed to prevent something from happening but the people are an integral part of the overall security posture. Unfortunately, we cannot guarantee 100 percent that an incident won't happen even with the other measures in place so the need for the consideration of a fourth layer is relevant. This means that the people inside need to be trained in order to be an effective fourth layer and should not only be aware of the security policy the organization has but to understand it as well.

With regards to our nation's borders, the same fundamentals apply on a much larger scale. In this case the border wall serves as the first layer, the second layer would be a “buffer zone” between the wall and border patrol but it is also includes the border patrol agents as an active measure, the third layer combines our infrastructure and state and local law enforcement and the fourth layer is our buildings and our citizens. The buildings protect people as a static measure and the people are the last line of an active defense. Our borders are not like controlled facilities and grounds, they are very porous and are extremely difficult to monitor effectively and efficiently and pose a challenge unlike that of a building or facility.

The lack of a sufficient amount of border patrol agents and a crumbling wall / fence (which is finally being fixed / replaced), makes this a more difficult issue to address in order to properly mitigate the risks. When you lack a solid perimeter and the personnel to provide adequate coverage, the system fails and allows unauthorized access. Video surveillance is necessary and being used but it does nothing to really prevent unauthorized access as it only serves as a way to watch a breach occur.

Our border must be viewed as a very large facility with a massive perimeter that needs to be protected effectively and efficiently. If we don't give the border patrol agents the necessary tools and proper protective measures to protect our country then we are not only failing them but we are failing our law abiding citizens. Without the first line of defense, a wall, we are leaving the door open and leaving our agents susceptible to attack, which has happened quite a few times and a flood of unauthorized individuals access to what is not theirs.

Considering the current, ever evolving threat environment and the violent world in which we live, the old thought process must make way for an unconventional and outside the box mentality in order to effectively address the many threats we face as we try to mitigate associated risks. These threats and issue come in many forms from a flood of migrants to terrorism to domestic issues and active attackers and as their methods change, so must our mindset and how we approach, analyze and address them. If we continue to keep the same mindset, use conventional methods, attend conventional training and refuse to adapt then we are not making progress with regards to prevention and risk mitigation.

Castle Defense 360 Website

#educatetrainprotectdefend #physicalsecurity #borderpatrol #layereddefense #protectivemeasures #protectiveservices #securityposture #bordercontrol #entrycontrol #accesscontrol #cpted


Carl David (SAS-AP)

President/Chairman at David David Gallery | International Art Dealer specializing in European and American works. Suicide Prevention Advocate. Law Enforcement Force Multiplier. Author

3 年

Great essay Tim! Hope everyone reads and implements this important perspective!

Tim, first off, the article covers several critical issues. Here's my opinion. CBP and BP can't hire enough people to sustain such a substantial—workforce intensive operation. Why? Because of the current CBP/BP’s hiring percentage (approximately 36 percent). CBP has the lowest hiring percentage of all federal agencies. This inability to hiring enough people is due predominantly to the CBP’s polygraph procedures. I agree wholeheartedly with your security layer theory. However, the current state of the workforce is not sufficient enough to facilitate such an operation. Establishing a physical barrier is an excellent start; however, if the workforce remains inadequate, a wall, a fence, etc., becomes just one more hurdle to overcome on the road to freedom. I'm currently working in Iraq as a civilian high-threat protection asset. We have a small detail that consists of Marines, Seals, and SF units. However, the majority of the workforce and security here in Iraq derives from private contractors, not DoD personnel. The same notion of employing civilian high-threat protection assets in Iraq applies to our nation's borders. If you boost the workforce at the border, you'll strengthen border security. It's that simple.

Tim Easton what an interest presentation via your article. Here’s to the articulation of an important topic and content with clarity and perspective. It is done in such a way by your use of analogy and examples to produce clearer understanding of physical security fundamentals. Others who read your article will leave feeling the way I do. It’s vital that security professionals know where to go to acquire understanding as you’ve laid them out so those who read the article leave with clearer knowledge of developing strategic planning and tactical execution of physical security. Your trainer spirit, capacity and mentality helps those who take time to read this article wrap their arms around the topic under any circumstance. In addition, one needs the capability to discuss these issues with those who influence the procurement process, and implementation. I think once the human equation is made a part of this dynamic discussion greater understanding is injected and applied as it relates to integration, collaboration, coordination and application. It’s my impression that through your Army trainer Skills you bring clarity and perspective to the topic. Stay on your course it makes sense.

James A. DeMeo, M.S.

Sports Security Expert | USESC Peer Mentor | Adjunct Faculty Member | Risk Management | Retired LEO

5 年

"but the people are an integral part of the overall security posture." Nice work Tim. Your points are well stated and your work is most appreciated during these difficult, trying times. Regardless of the vertical, the people, staff, workers, employees, must maintain their own robust security posture by having a survival mindset when faced with a true emergency situation. A pre-planned response along with being hyper vigilant bodes well for personal safety &? security initiatives. Thanks for sharing. Keep going strong.?

Christopher Kemp

Director of Enterprise Operations Anti-Human Trafficking Intelligence Initiative

5 年

I thank you sir for writing a paper regarding the basics of security fundamentals. It’s always great to have a central focus on those basics because one must have strong foundation in order to be successful planning, both strategically and activity. As well as executing during normal and under threat response conditions. Along with recovery after an incident occurs.

要查看或添加评论,请登录

Tim Easton的更多文章

社区洞察

其他会员也浏览了