Place specific residential estate crime prevention design framework and considerations by Chris Cobb

By way of introduction crime prevention is not a “one size fits all” effort, and that some residential estate developments will require more attention and ingenuity than others in crafting an effective risk prevention strategy.

In designing residential crime prevention strategies, it requires several correct tools to get it right…and to keep it that way. It requires a risk assessment and audit function to separate fact from fiction, it requires training and written awareness to move from reactive to proactive response, it requires analysis to gain efficiency, and of course, it requires investigations

Any “savings” will quickly disappear when we consider the extra time and energy it takes to do a job with the wrong tool. You wouldn’t think of owning just one golf club, or one handbag, but we often accept having just one tool in our loss prevention bag.

I am always at odds as to why real estate developers fail to see “the whole picture” and continue to ignore the fact that the best opportunities for applying crime prevention design strategies occur when buildings, street layouts, street lighting programs, new subdivisions, shopping centres, and housing projects are still in the planning stages, and crime prevention principles can be incorporated before construction starts.

Furthermore, I am continually at a loss for words in respect of the following:

1.      Architectural drawings that have been crafted by a professional team of civil, electrical engineers etc often constitute the framework for designing the place specific residential estate crime prevention master plan strategy.

2.      Cost-consciousness is often looked at by “bean counters” in a cost effective/productive means at the present and usually counters any necessary security plans by justifying figures with such statements as, “It is not cost effective to implement at this time,” all the while not foreseeing the immediate future. This type of decision making often at times does not weigh the risk factors enough since in most instances none have been provided in order to consider the maximum loss due to substantial interruption of an individual activity, direct cost loss, indirect cost loss, replacement cost loss, and future loss due to events, whether implicated directly or not

3.      Electrical Engineers whilst generally having great insight in respect of their security and life safety technical products strengths and weaknesses often do not possess an understanding of the unique risks faced by the various vertical markets. Often is the case that solutions being sought by end users woefully fall short in having the desired impact in mitigating risks due to this poor understanding of the end user’s risks which in many instances have not been identified (risk identification 1st step of risk management) and at the end of the day the solutions / designs often fail to adequately address and mitigate the risks ending up with a piece meal reactive approach that results in huge brand trust issues, negative exposure and additional costs.

4.      Security advice in general is often being acquired from sales consultants, installers and other "experts' whose knowledge is often limited and subjective to their filed of expertise.

This article does not cover the pros and cons of the multitude of security and life safety technology solutions available for residential market but rather focuses on the continued opportunities of those responsible for improving on residential security design. Every building, large or small, creates a potential crime risk and planners and architects owe it to their clients to devise and implement effective security measures

Productivity, profitability, quality of life and life safety are concerns that affect policy makers—not specifically security or crime prevention for its own sake. Accordingly, chief executives, builders, architects, planners, engineers, and developers will have to change their way of thinking going forward.

Once you get behind the “eight ball,” so to speak, you will never get ahead of it; you are always playing catch up. Dealing with life-and-death situations, one should never be anywhere but ahead of the game or “eight ball.” The elements of risk that the security protection detail are assigned to avoid and eliminate should always be in arrears; ensure that those elements always have to chase and run to keep up. If you maintain and control your direction and objectives, then the risk factor or vulnerability is reduced substantially

Whilst there is a price to implement an effective risk assessment and management program, the price of not having the program is far higher in the long term, as overconfidence arises due to the “threat” usually being underestimated, and when the minimal program becomes necessary, it usually only has a minimal impact on the actual risk

In keeping with the theory that the quality of the physical environment impacts human behaviour, we know that crime prevention and community development go hand-in-hand. The essential role of the real estate developer is to see the “whole picture” and to see to it that physical design, resident’s participation, citizen participation, security, police and emergency service activities fit together.

In terms of physical design itself, the major task of real estate developer is change the current practice of appointing architects and or electrical engineers in designing the place specific residential estate crime prevention master plan strategy and instead look at appointing professional security consultant to analyse existing and planned physical design, determine how it relates to existing or potential crime patterns, and recommend physical design countermeasures.

Risk cannot be eliminated, but it can be managed. Risk can be reduced to a manageable level through the proper risk analysis research and assimilation of data—then, a thorough implementation of measures designed to terminate, treat, tolerate and or transfer the remaining factors associated with that risk.

Good security and crisis management policies and procedures evolve from an accurate analysis of perceived risk which is far more effective than developing such procedures / responses post incidents that can have devastating effects. You need to know exactly what you are up against. You will not know which policies and procedures are necessary until you have properly assessed your risk. Likewise, you will not be able to allocate effective crime prevention resources without an effective analysis of your risk profile. Everybody knows that in order to make an informed decision one does so through the assimilation of data.

The first step in ensuring an effective place specific residential estate crime prevention master plan strategy begins with performing a thorough risk analysis and environmental scan of the residential location, as well as ongoing monitoring and evaluation of the place-specific risk mitigation strategies identified and selected to effectively prevent crime.

In short “place-specific crime prevention” involves the diverse array of coordinated environmental design, property management, partnerships with the residents and the body corporates in complexes and estates and crime prevention strategies that can be deployed to reduce crime and fear of crime in a residential environment.

This is especially true since criminals’ modus operandi is often to act with the intelligence and involvement of people who work in, and who have access to, security estates. Often the threat from within is more devastating than the external threats. Consider how many home owners possess firearms?

It goes without saying that the most effective place-specific crime prevention strategies take into account the geographic, cultural, economic, and social characteristics of the target community.

Place-specific crime prevention approaches go beyond narrow theories about environmental design or defensible space. The integration of strategies to modify the use and management of places has strengthened environmental design or redesign as a practical approach to crime prevention in varied settings. Place-specific crime prevention builds on crime prevention through environmental design (CPTED, physical changes) and draws on the results of research on active crime prevention tactics (such as community policing and community crime prevention) to emphasize modification of design, use, and management of a specific place to prevent and reduce crime.

Crime Displacement

The decision to commit crime is structured by analysis of the type of crime, the time and place of crime, and the target of crime. Criminal tends to move away from committing the crime if they perceived it as difficult or potentially dangerous for them to commit.

This phenomenon—called crime displacement—has important implications for many residential estate development projects. By far, spatial displacement (movement of crime from a treatment area to an area nearby) is the form most commonly recognized

Crime displacement consists of five types of such as:

·        Temporal - Committing the intended crime at a different time

·        Tactical - Committing the intended crime in a different way

·        Target - Committing the intended crime type on a different target

·        Spatial - Committing the intended crime type to the same target in a different place

·        Functional - Committing a different type of crime

The following strategies listed below should provide a sound framework with which to view the possible interaction of a variety of crime prevention efforts to be considered:

Defensible space design strategies

Defensible space design strategies should be used in the design of new residential complexes to promote both the residential group’s territorial claim to its surroundings and its ability to conduct natural surveillance and typically covers the following:

Site design can stress the clustering of small numbers of residential units around private hallways, courtyards, and recreation areas. In these restricted zones, children can play, adults can relax, and strangers can easily be identified and questioned. Such private spaces can be created by internal and external building walls and access arrangements, and by the use of perceptual barriers such as low fences, shrubbery, and other boundary markers.

Site interrelationships design can be used to create semiprivate connecting and common spaces between and among the private family clusters. Walkways, vehicle access ways, parking areas, recreational facilities, lobbies, and laundry and shopping areas can be designed so that each cluster relates to them much like each resident of a cluster relates to his common private space. Physical design can be used to further extend the sense of territoriality and the possibility for informal social control.

Street design and design of other public spaces can be engineered to make these spaces into semi-public extensions of the residential clusters and their connectors. Closing streets to through traffic, installing benches and play areas near the streets, providing adequate lighting, and placing perceptual barriers to indicate the semi-public nature of the area can help to define these spaces as part of the shared residential group territory.

Surveillance-specific design can be used in each of the above design areas to increase general visibility by providing adequate lighting, by reducing or eliminating physical barriers to visibility, and by the visibility-promoting location of key areas (for example, entrances, lobbies, elevator waiting areas, recreational and parking areas) so as to be directly visible from as many points of view as possible.

Territorial defence strategies

Territorial defence strategies emphasize prevention of property-related crimes such as breaking and entering, auto theft, and household larceny. Within this group there are five related strategy areas: land use planning, building grounds security, building perimeter security, building interior security, and construction standards.

Land use planning strategies involve planning activities aimed at avoiding land use mixtures that have a negative impact on residential security, through zoning ordinances and development plan reviews.

Building grounds security strategies provide the first line of defence against unauthorized entry of the residential estate and offer social control mechanisms to prevent dangerous and destructive behaviour of visitors. The emphasis is on the access control and surveillance aspects of architectural design. The target environment might be a residential street, the side of a housing complex, or alleyways behind or between business establishments.

Building perimeter security strategies provide a second line of defence for protecting residential occupants and property by preventing unauthorized entries of buildings. They involve physical barriers, surveillance and intrusion detection systems, and social control mechanisms.

Building interior security strategies provide the third line of defence for protecting residential occupants and property by preventing unauthorized access to interior spaces and valuables through physical barriers, surveillance and intrusion detection systems, and social control mechanisms

Construction standards strategies involve building security codes that require construction techniques and materials that tend to reduce crime and safety hazards. These strategies deal both with code adoption and code enforcement.

Personal Defence Strategies

This strategic approach focuses on the prevention of violent or street crimes such as robbery, assault, and rape, and the reduction of fear associated with these crimes. Specific strategies included safe-streets-for-people, transportation, cash off- the-streets, and citizen intervention.

Safe-streets-for-people strategies involve planning principles derived primarily from the CPTED concepts of surveillance and activity support. Surveillance operates to discourage potential offenders because of the apparent risk of being seen and can be improved through various design modifications of physical elements of the street environment (e.g., lighting, fencing, and landscaping). Pedestrian traffic areas can be channelled to increase their use and the number of observers through such measures as creating malls, eliminating on street parking, and providing centralized parking areas.

Transportation strategies are aimed at reducing exposure to crime by improving public transportation. For example, transit waiting stations (bus, taxi rank) can be located near areas of safe activity and good surveillance, or the distance between stations can be reduced, which improves accessibility to specific residences, business establishments, and other traffic generating points.

Cash-off-the-streets strategies reduce incentives for crime by urging people not to carry unnecessary cash and provide commercial services that minimize the need to carry cash.

Resident Intervention, unlike the three previous activities, consists of strategies aimed at organizing and mobilizing residents to adopt proprietary interests and assume responsibility for the identification of their assets, personal security and maintenance of security

Crime Prevention Strategies

This approach involves security and police functions that support community-based prevention activities. There are two activities: security / police patrol and resident / security / police support.

Security / Police patrol strategies focus on ways in which police deployment procedures can improve their efficiency and effectiveness in responding to calls and apprehending offenders.

Resident / security and police support strategies consist of security and police operational support activities that improve resident, security and police relations and encourage citizens to cooperate with the security and police in preventing and reporting incidents

Confidence Restoration Strategies

Since commercial and residential environments involves activities that are aimed primarily at mobilizing residential and neighbourhood interest and support to implement needed CPTED changes. It goes without saying that without such interest and support, it is unlikely that programs of sufficient magnitude could possibly be successful, particularly in many high-crime-rate neighbourhoods where residents have lost hope. There are two specific strategy areas: investor confidence and neighbourhood identities.

Investor confidence strategies promote economic investment and, therefore, social and economic vitality.

Residential / Neighbourhood identity strategies build community pride and foster social cohesion

CPTED

The three basic CPTED processes of natural surveillance, natural access control, and territoriality should centre on the following simplistic strategies:

·        Provide clear border definition of controlled space;

·        Provide clearly marked transitional zones, which indicate movement from public to semi public to private space;

·        Relocate gathering areas to locations with natural surveillance and access control, or to locations away from the view of would-be offenders;

·        Place safe activities in unsafe locations to bring along the natural surveillance of these activities (to increase the perception of safety for normal users and risk for offenders);

·        Place unsafe activities in safe spots to overcome the vulnerability of these activities with the natural surveillance and access control of the safe area;

·        Re designate the use of space to provide natural barriers to conflicting activities;

·        Improve scheduling of space to allow for effective use, appropriate “critical intensity,” and the temporal definition of accepted behaviours;

·        Redesign or revamp space to increase the perception or reality of natural surveillance; and

·        Overcome distance and isolation through improved communication and design efficiencies

Designing out crime principles are based on five design and usage concepts:

1.      Surveillance;

2.      Access control;

3.      Territorial reinforcement;

4.      Target hardening (security measures); and

5.      Management and maintenance.

Design Opportunity Reducing Techniques:

1.      Increase the effort

·        Harden targets

·        Control access to facilities

·        Screen exits

·        Deflect offenders

·        Control tools/weapons

2.      Increase the risks

·        Extend guardianship

·        Assist natural surveillance

·        Reduce anonymity

·        Utilise place managers

·        Strengthen formal surveillance

3.      Reduce the rewards

·        Conceal targets

·        Remove targets

·        Identify property

·        Disrupt markets

·        Deny benefits

4.      Reduce provocations

·        Reduce frustration and stress.

·        Avoid disputes

·        Neutralise peer pressure

5.      Remove the excuses

·        Set rules.

·        Post instructions

·        Alert conscience

·        Assist compliance

These concepts are further separated into macro, meso and micro principles:

? Macro is represented in scale by structure plans and strategic infrastructure projects;

? Meso by subdivision plans and precinct-scaled studies; and

? Micro by detailed area plans and building design, building approvals and public space design    (streets, urban and public open spaces).

For example:

Access control principles - Access control involves the use of design features that deny offenders access to targets, reduce their escape opportunities and guide legitimate users through the environment. Natural access control involves the use of the environment to clearly mark borders and transitional zones to psychologically deter movement of illegitimate users into protected space. Human measures such as security guards can also be used. Further measures include security hardware, which is often referred to as target hardening.

Macro principles

·        Management of traffic patterns in order to moderate car-related crime (theft of vehicles, hijacking, get away vehicles).

·        Delineation and alignment of public access routes away from inappropriate environments.

Meso principles

·        Create places and streets that support legitimate uses in full view of the legitimate community.

·        Avoid cul-de-sacs linked by pedestrian routes unless part of a wider open space connection with surveillance.

·        Avoid use of back lanes without guardian surveillance from properties.

·        Minimise multiple escape routes.

Micro principles


·        Secure access against offenders with gates and defining structures.

·        Ramps and steps to create effective local access controls.

·        Changes of ground level delineate ownership or use changes.

·        Integrate security barriers, screens and burglar proofing as design elements not afterthoughts.

·        Careful consideration of scalable fences and bollards which may inhibit pursuit of offenders.


PROTECTIVE SYSTEMS

One’s approach to developing protective measures must be based on a systematic process resulting in an integrated protective system.

An effective protective system focuses on protecting specific assets against well-defined identified threats to acceptable levels of protection. The system must be designed and organized in-depth (layered approach) that contains mutually supporting elements all proactively coordinated to prevent gaps or overlaps in responsibilities and performance.

Effective protective systems integrate the following mutually supporting elements:

? Physical protective measures, including barriers, lighting, and electronic security systems (ESSs).

? Procedural security measures, including procedures in place before an incident and those employed in response to an incident. (These include procedures employed by asset owners and those applied by and governing the actions of guards.)

The following should be considered for system development procedures:

? The resources available.

? The assets to be protected.

? The threat to those assets.

? The risk levels applicable to those assets.

? The applicable regulatory requirements for protecting the assets.

? The applicable level of protection for those assets against the threat.

? Additional vulnerabilities to the assets (based on the threat).

SYSTEMS DEVELOPMENT

The key to applying a system approach successfully is to use a team approach. A team may include procurement, physical-security, intelligence, operations personnel; electrical consultants, IT, installation engineers; and the user of the assets.

ASSETS

Any effective protective systems should always be developed for specific assets. The goal of security is to protect life safety, facilities, buildings assets etc. The risk-analysis must be used to identify assets at risk. This process must include identifying all mission-essential or vulnerable areas

RISK LEVELS

Risk assessments must be performed in order to determine risk levels— assessing the value of the assets to their users and the likelihood of leading to value and likelihood ratings.

Asset value is determined by considering the following three elements:

? The criticality of the asset for its user and the institution as a whole.

? How easily the asset can be replaced.

? Some measure of the asset’s relative value.

The relative value differs for each asset. For some assets, the relative value is measured in terms of monetary cost.

The likelihood of the threat / risk must be assessed for each applicable aggressor category by:

a.      considering the asset’s value to the aggressor,

b.      the history of or potential for aggressors attempting to compromise the asset, and

c.      the vulnerability of the asset based on existing or planned protective measures

REGULATORY REQUIREMENTS

The risk level is the basis for determining the required protective measures for assets identified to be protected.

For each asset type, there will be:

a.      physical protective measures

b.      minimum regulatory / by law compliance requirements

c.      procedural security measures and counteraction measures.

THREAT IDENTIFICATION

The threat must be described in specific terms to help determine which of the institutions assets are vulnerable in order to determine and establish the necessary protective measures. This description should include the type of tactics that aggressors will use to compromise the asset such as (weapons, tools, techniques etc which are mostly likely to be used in an attempt). For example, the threat might be a forced-entry threat using body mass, specific hand, physical object, mechanical or power tools to occupy a venue.

The types of threat descriptions (known as the design-basis threat) should be used to design detailed protective systems to mitigate the institutions risks identified.

LEVEL OF PROTECTION

Having performed a threat analysis, the next step is to determine the desired level of protection to be adopted which applies to the design of a protective system against a specified threat (for example, breaking and entering, student unrest, armed robbery, pilfering, and so forth). The level of protection is based on the asset’s value rating. The level increases as the asset’s value rating increases. There are separate levels of protection for each risk mitigation intervention.

VULNERABILITIES

Vulnerabilities refer to the gaps in one’s asset protection framework. These are identified by considering the tactics associated with the threat and the levels of protection that are associated with those tactics. For example, the general design strategy for forced entry is to provide a way to detect attempted intrusion and to provide barriers to delay the aggressors until a response force arrives. Vulnerabilities may involve inadequacies in intrusion-detection systems (IDSs) and barriers.

PROTECTIVE MEASURES

Having identified where one’s vulnerabilities are the appropriate protective intervention and measures must then be identified to mitigate them. The key to effective development of protective systems is a partnership between physical security personnel and the installation engineers.

THE INTEGRATED PROTECTIVE SYSTEM

Protective systems integrate physical protective measures and security procedures to protect assets against a design-basis threat. The characteristics of integrated systems include deterrence, detection, defence, and defeat.

DETERRENCE

A potential aggressor who perceives a risk of being caught may be deterred from attacking an asset. The effectiveness of deterrence varies with the aggressor’s sophistication, the asset’s attractiveness, and the aggressor’s objective. Although deterrence is not considered a direct design objective, it may be a result of the design.

DETECTION

An effective integrated detection measure should be designed too:

a.      senses an act of aggression,

b.      assesses the validity of the detection, and

c.      communicates the appropriate information to a response force.

A effective detection system must provide all three of these capabilities to be effective.

Detection measures may detect an aggressor’s movement via an IDS, or they may detect weapons and tools via X-ray machines or metal and explosive detectors. Detection measures may also include access-control elements that assess the validity of identification (ID) credentials. These control elements may provide a programmed response (admission or denial), or they may relay information to a response force.

DEFENSE

Defensive measures protect an asset from aggression by delaying or preventing an aggressor’s movement toward the asset or by shielding the asset from attack. Defensive measures Delay aggressors from gaining access by using tools in a forced entry.

These measures include barriers along with a first response force.

? Prevent an aggressor’s movement toward an asset. These measures provide barriers to movement and obscure lines of sight to assets.

? Protect the asset from the effects of tools, weapons, and explosives.

Defensive measures may be active or passive. Active defensive measures are manually or automatically activated in response to acts of aggression. Passive defensive measures do not depend on detection or a response. They include such measures as blast-resistant building components and fences. Guards may also be considered as a defensive measure

DEFEAT

Most protective systems depend on response personnel to defeat an aggressor. Although defeat is not a design objective, defensive and detection systems must be designed to accommodate (or at least not interfere with) response-force activities

In closing when incorporating physical design changes, integrated intelligent driven technology solutions and management changes based on the findings of a risk and environmental scan analysis —enhanced security, improved property management, and greater resident involvement— when integrated will effectively contribute to preventing criminal activity, reduce disorder, improve safety, and enhance the quality of life in residential settings

要查看或添加评论,请登录

Christopher Cobb的更多文章

社区洞察

其他会员也浏览了