The advent of technology has been a wonderful blessing in that it has allowed us all exposure to a world of information never before revealed in such an unfettered and open forum. It helps neophyte as well as virtuoso businessmen and women conquer new business ventures with the push of a finger.
At the same time, however, the information available online benefits those that would seek to do others harm by providing valuable insight into the planning and execution of attacks on people and infrastructure.
The government with all its Intelligence agencies is normally very good at gathering intelligence on known groups and organizations through its many untold sources and disseminating that information to the proper people for both defensive and offensive operations.
They have had numerous successes with a variety of cases in which the actors were identified from social media, made operational mistakes or were just amateurs. And though their track record is outstanding, it is not bulletproof.
There are many that are adept in concealment and are identified only after an attack or crime had been perpetrated. The ambiguity with which one can covet in society is matched only by one’s knowledge and creativeness.
It is Important That There Are Layers In Your Security Plan So The Weaknesses Are Outweighed By The Strengths
Because the police and authorities can only respond to what they are aware of and they cannot be everywhere at once and the actors and the specific circumstances will always vary, it is paramount that we employ a system of layered security coupled with education to mitigate future acts.
A mobile active killer (MAK) is on campus, for example, how did he go unnoticed? A grassroots terrorist planted several pipe bombs around a shopping mall, why wasn’t he detected? A man walks into a movie theater or church and opens fire, were there any clues before the event that may have detected and possibly changed the outcome?
There are always gaps of vulnerability where the perpetrator can be identified. This is true of trained actors during pre-operational surveillance and through the deployment stages of an attack.
It is especially true of the less experienced actor, that must expose themselves repeatedly before launching the attack.
This then begs the question, “how do we as people and those that are administrators prevent or detect danger prior to an attack and significantly improve posturing for the potential crisis while ramping up reactive position?
If past cases have shown us anything it is that thinking and mindset must be formulated around the premise of preparation rather than hope.
The fact that conventional security personnel in a public place such as a shopping mall or campus far outnumber law enforcement or other highly trained security operators is one of the quintessential elements to the safety equation. These people are “the” people when it comes to your first line of defense in preventing or detecting a criminal act in that environment. And in regards to your home, it is you who is responsible for the safety of your loved ones.
Let’s face it, crime is not going away and neither is the incidence of violent acts such as active shootings and mobile active killers. Because of this we must take on the security mindset in devising an approach to our safety. And construct this thinking to include a layered approach to public safety as well as your own personal security.
The fact is that with some understanding and practice, the layered security approach provides significant opportunities for conventional security forces as well as everyday concerned citizens to adopt strategy and tactics that enhance current best practices.
So we begin to lay our foundation for greater preparation and planning by introducing the concept of layered security, which in the intelligence arena is known as “concentric rings of security.” This concept requires that you draw circles around your property or assets that need to be protected. This could be your home, office or for an administrator it could be a business or University.
The determination of how many circles you draw will depend on the level of threat and perhaps more importantly, the resources you can allocate. Generally speaking, the more circles the better, but the number is normally restricted by things such as financial considerations.
It is easy to add more circles as resources allow as long as each circle is clearly delineated and all circles are overlapping to allow for built in redundancy. It is also feasible to add or delete things that are included in a circle. For example, the inner circle could be just your house or a building whereas the walkway surrounding the house or building and everything that emanates out from there for 300 meters is the outer ring.
You May Think Your Home is Secure, But Where In The Routine Will A Criminal Be Detected?
Typically on the home front you will allocate less “manpower” in the outer ring, then you will employ for the inner ring where “access control” is absolutely critical to the welfare of all concerned in the household at any given time. However, keep in mind that the outer ring represents a very powerful opportunity to detect danger before it reaches the inner circle where your most critical assets reside…your family.
And this brings us to another very key consideration, which plays a vital role in countering this shapeless threat, mobile technology. It is in that outer ring that you can amp up your security because that is where you should begin to look for people and status changes regularly.
Mobile technology offers a critical tool to rapidly disseminate that information to you for early detection to mitigate the threat. Of course employing such technologies these days usually means connecting to a security company mobile monitoring plan, but the small investment may be worthwhile especially if it gives you peace of mind and a faster way with which to identify potential danger and alert authorities.
Obviously not every person walking around your neighborhood is seeking to perpetrate violence, but the ability to educate everyone in your family how to recognize and avoid dangerous situations in advance and evade when they cannot avoid coupled with rapid alerts to maintain the constant flow of dynamic information to all concerned is a key safety feature of mobile technology that cannot be ignored.
As the need for greater levels of security grows and evolves in accordance with the emerging threat environment that we now live, the need to develop new personal security strategies that enable the concerned citizen a method of faster recognition and alerts for rapid application of intelligence also increases.
Mobile technology puts the power of detection, vigilance and mitigation in the hands of homeowners these days while shrinking the security gap by enabling aspects of a layered security apparatus to counter those shapeless threats.