Order Now

Internal Building Security

Today, the problem of physical security is of the utmost important. The emergence of new threats, such as the threat of terror attacks, raises the problem of enhancing existing systems of physical security. At the same time, effective physical security should be based on fundamental principles which minimize the risk of threats to physical security. In this regard, the development of modern physical security should include multiple layers which include building security, grounds security, access control systems, and perimeter security. In addition, modern physical security is unthinkable without the wide implementation of advanced technologies, which increase substantially the reliability of modern security systems and minimize threats to physical security system. On the other hand, technological advancements often confront new threats that stimulate the wider implementation of new technologies, but the main point in the development of an effective physical security system is the development of multiple layers of physical security.

On analyzing basic principles of physical security, it is important to lay emphasis on the fact that the first layer of physical security should start with the perimeter security. In actuality, this means that the physical security system should start with fencing of the territory which is supposed to be protected by the physical security system. In actuality, modern physical security may include different forms of perimeter security. Fencing is not the only form that can be used in the modern physical security system but it is probably the simplest mechanism of the protection of the perimeter of the territory which is to be protected. Today, more effective security mechanisms can be used, including barbed wire, warning signs, metal barriers vehicle height restrictors, site lighting and trenches. In this respect, it is possible to distinguish security elements which serve to warn about the protection of the territory or building and elements which raise physical obstacles to an unauthorized intrusion. For instance, warning signs warn potential intruders that the territory is secured and protected. At the same time, barbed wire, metal barriers, vehicle height restrictors and other elements create the physical protection of the perimeter and the building. In such a way, the perimeter security has two purposes: physical protection of the perimeter and warning of potential intruders that the territory is protected. At the same time, the perimeter should be under the control of the security service, which should have a possibility to survey the perimeter permanently.

The second layer of physical security is mechanical protection of the building, which includes doors, locks, gates and other mechanical elements of physical protection (Anderson, 2004). However, today, the use of conventional mechanical elements of physical security such as locks is inconvenient, especially in areas and buildings where a large number of people need to have access to the secured territory or building. In order to maintain the high level of security and protect the protected area or building from an unauthorized intrusion, new, electronic access control elements are used. In fact, electronic access control is based on the use of electronic systems of recognition of individuals that can be admitted to the restricted area or building. Today, various elements of electronic access control are introduced. For instance, fingerprint security systems are widely used. In these systems fingerprints are used for the identity authentication.

Furthermore, the building security and grounds security should be protected with the third layer of the physical security system. As a rule, intrusion detection systems or alarms are used at the third layer of the physical security system. In actuality, intrusion detection systems and alarms are used to identify the unauthorized intrusion, when an intruder has already entered the building or restricted area (Hayward, 2004). Today, modern technologies allow fast identification of an intruder because modern technologies allow using sensors that react on movements, sounds, breaking windows, doors, and so on. In such a way, when the unauthorized intrusion is identified by an intrusion detection systems or alarms, the security service gets the information about the intrusion and responds immediately.

However, intrusion detection systems and alarms are not always effective and there is a risk that intruders can overcome these security systems. This is why, today, video monitoring is widely used. At this point, it is worth mentioning the fact that video monitoring should be used at all layers of the physical security system. In actuality, this means that the perimeter should be surveyed by the security service via video monitoring. At the next layer of the physical security, the video monitoring should show the security service the surrounding of the building, doors, windows, corridors, grounds and all the areas where intrusion can be detected.

In such a way, the multiple layer physical security system is reliable and highly effective. At the same time, such physical security provides ample opportunities for the full protection of the restricted area or building and such system meets basic principles of the physical security for intrusion can be detected at any layer of the physical security system, which is under the permanent control of the security service.

While developing the security system, it is necessary to take into consideration that its security officers can be granted with the police power, such as special or commissioned officers, or, alternatively security officers can be not granted with police and arrest powers. In such a situation, depending on the power granted to security officers they actions may differ consistently. In actuality, security officers who are not granted with the police and arrest powers naturally cannot arrest people or, to put it more precisely, to take them into custody. Instead, they can limit the actions of individuals who offense patients or health care professionals or whose actions threaten to life, health and property of people and public safety. However, these security officers cannot arrest offenders, but they can locate them and call the police which should conduct the arrest procedure, if necessary. It is important to lay emphasis on the fact that security officers, who are not granted with the police and arrest powers, should respect rights and liberties of offenders. Moreover, they should ensure that offenders, if they are located, should be safely conveyed to the police.

As for security officers, who are granted with the police and arrest powers, their actions should basically meet the arrest procedure and powers granted to police officers. In this respect, the arrest procedure start with the arrest of a person and the accused person is taken into custody. When the person is taken into custody, he or she should be informed about his or her rights. This right is known as the Miranda right. In fact, the case of Ernesto Miranda produced a significant impact on the development of the American justice system and procedure of the detainment or arrest. In this respect, Ernesto Miranda maybe viewed as the victim of the violation of his rights, which are now considered to be commonly accepted and absolutely normal, while in the past suspects could be interrogated even without being informed about their rights. In such a context, Ernesto Miranda was the first person who made the US justice system and law enforcement agencies to change the attitude to suspects, because he was a victim of the ignorance of his rights. To put it more precisely, on analyzing the Miranda’s case, it should be said that he was arrested as a suspect because police believed that he was the offender who raped a girl.

However, the police had no evidence but the description of the vehicle of the offender and a part of its license plate number, which met the vehicle and plate number of Miranda. In the result of a two-hour interrogation the police got the confession of Miranda on the basis of which he had undergone the trial and was sentence to a long term, twenty to thirty years, in prison. It is important to underline that his attorney was not present during the interrogation and Miranda was not aware of his rights. The following Miranda vs. Arizona case was an attempt to reconsider the Miranda’s case and release him since his attorneys, Flynn and Frank, who were reputable criminal defense attorneys, argued that Miranda’s rights defined in the 5th Amendment were violated. The court’s decision was positive and ruled that suspects should be informed about their rights before they are interrogated. However, Miranda was not released from the prison because the ruling of the court was not valid at the moment of his arrest and all the procedures met the current norms. In such a way, security officers should observe the Miranda rights of offenders.

At the same time, security officers, whether they are granted with the police and arrest powers or not, need the permanent training to get all the information about changes in legislation and legal procedures in order to observe rights and liberties of offenders and conduct detention of offenders in accordance to existing legal norms. At this point, the proper organization of training is very important. Basically, the security system should involve specialists who are able to train the personnel, namely security officers. Among these specialists, it is possible to single out a person who is acquainted with legal arrest procedures and police powers. This may be a former police officer or a person with juridical education and experience of work in the justice system or police. In addition, it is important to employ a psychologist since security officers should not only be able to stop offensive actions, but they should be also able to prevent offensive actions. In this regard, the knowledge of legal procedures is not enough, instead, security officers should human psychology and conflict management in order to be able to cope with offenders or prevent their offensive actions. Security officers should be aware of their responsibility and liability in case of the misuse of power or improper actions.



Anderson, R. (2004). Security Engineering. New York: Routledge.
Hayward, K. J. (2004). City Limits: Crime, Consumerism and the Urban Experience. New York: Random House.
Williams, G. (2010). Modern Security Systems. New York: Random House.