Blog

How to prevent attacks with improved security - Part 3

How to prevent attacks with improved security - Part 3

Core Tactical Services

How to prevent attacks with improved security - Part 3

Welcome back. I am sure that by now some of you have already looked at your premises and started drafting up your plan. Others may have by now, already done a practice or two. I would be extremely interested to hear how those went.

This week we are going to start moving to the exterior or perimeter as we refer to it as. Let’s start with the most common perception of the perimeter - the fence.

- THE PERIMETER FENCE

Many people like to view the perimeter fence as their first defence mechanism. We at CORE TACTICAL SERVICES disagree with this. 

It should be used as your first deterrent and can be quite successfully incorporated into your systems as an early warning mechanism.

The key to this section is to view it as a deterrent and not as a defence mechanism. The criminal element has many advanced forms of technology and will easily beat the system irrespective of the amount of technology you have fitted on it.

THE KEY IS TO REMEMBER THAT IT, IF EQUIPPED PROPERLY, MERELY ACTS AS AN ADVANCED WARNING OF POSSIBLE BREACHES.

- VISIBILITY

By visibility, we mean the area on the inside AND OUTSIDE of your fence.

Let us look at the INSIDE first:

• As pretty as what the Wifey’s shrubs, bushes and trees may be, ensure that you are not creating blind spots which limit your visibility and provide hiding places for any “undesirable elements”.

• Make sure that all shrubs and bushes are either below the knees in height or that the bottom trunk is bare form the ground to waist height. This assist in mitigating cover which they may otherwise have given.

• Make sure that you can clearly see your perimeter fence.

Now moving on to the OUTSIDE.

• Make sure that is a “clear area” around your fence of at least 5 meters. This makes it very difficult for anyone to hide in tall grass or vegetation whilst digging under or cutting your fence.

• Definitely no overhanging trees. This makes it easy for someone to climb the tree and drop down into your premises. Also check for overhanging branches and trim back where necessary.

• Trees should be at least 10meters away from the perimeter fence if possible.

The more open space you can give yourself on the in and outside of your perimeter fence, the better. Remember that the intruder wants to surprise you without you raising the alarm or activating your emergency plan. The more open spaces, the easier it is to see undesirables and the greater the risk is for them.

- ACCESS CONTROL

This is also known as the “weak link”. It is well documented that this is one of the intruder's most favoured methods of gaining access to your premises. This is usually where there is a fair amount of coverage for the intruder to hide behind. This is especially so with motorised gates which typically require a strong and relatively large structure to handle the load.

If you do not have an electronic gat, this is also typically the point where you would have to stop and exit your vehicle to open the gate. Both situations make you a vulnerable target.

To try and mitigate an attack at the gate, try the following:

• Cut the grass short and do it regularly.

• Ensure that the drainage ditch is as shallow as possible.

• Grass in the drainage ditch is short to non-existent.

• No trees, bushes, or shrubs near the gate. 100 meters is recommended - although not always possible. Try for at least 20 meters if possible.

• Do not build an elaborate structure for your main gate which would make it easy for suspects to hide behind. If your structure must be elaborate you MUST kit it out with an electronic or remote-controlled gate.

- CELLULAR TELEPHONES

Although cell phones are wonderful pieces of technology, they are only good when they are working. DO NOT ditch your more antiquated handheld radio in favour of cellular technology. “Old fashioned” radios are still extremely useful when your network is down and are generally a lot sturdier than today’s modern cellular telephones.

With modern-day cellular phones, most people have an I.C.E. (In case of emergency) number programmed into their phones. Under normal circumstances, this is fine and well, but if your kids are phoning you whilst at home, they are blocking you from phoning out for help.

To overcome this problem, you can leave your number programmed as I.C.E. and then generate a secondary I.C.E. number, lets call it ICE HOME. Programme a neighbour’s number into the I.C.E. HOME number so that your kids are calling someone familiar to them in the event of panic. They will relate better to a voice that they know and trust. Your neighbours can then in turn alert the Farm watch or Neighbourhood watch and mobilise resources.

Ideally the adult’s phones should be programmed to DIFFERENT emergency service numbers and the kid’s phones to the closest neighbours. NOTE - silly as it sounds make sure that the phones are programmed to different numbers and not the same.

A break down of this would then look something like this:

Dads phone - 10111 or local SAPS number

Mom’s phone - Farm Response Unit or Neighbourhood watch

Kid 1 - Neighbour 1

Kid 2 - Neighbour 2

- ALARMS AND GADGETS

There is an absolute myriad of security systems available which can be installed. Often security companies will punt the “big ticket” systems to ensure maximum gain from the sale. Make sure that you investigate thoroughly and carry out an extremely strict due diligence test PRIOR to signing into any lengthy contracts or installing what appears to be expensive technology.

Technology and alarms do help but remember that they are just aids. In addition to this most of the systems are reactive in nature. By this I mean that the suspect has already breached your perimeter by activating an alarm.

Ideally you want to receive the alarm when the assailants are trying to breach your perimeter. This will provide you with the necessary time to activate your emergency plan that you have practiced and implemented.

Thanks for reading through this week’s tips and advice. As always, I look forward to your comments and suggestions/ questions.

Stay safe and catch us next week for the final chapter on securing your farm/home.

How to prevent attacks with improved security - Part 3

Core Tactical Services

Core Tactical Services (CTS) delivers tailor-made security and protection services to the greater Gansbaai community. The team at CTS has multi-dimensional skillsets, and this commitment to perfection has made it the leading choice in security solution excellence. With the community and safety at th...

View Profile

What is Xplorio?

Xplorio is your local connection allowing you to find anything and everything about a town.

Watch the Gansbaai Video
Read More

Recent Posts

Serving with Integrity and Transparency!

Serving with Integrity and Transparency!

We strive to operate with integrity, honesty, and transparency in all our interactions.

Core Tactical Services: Trusted Security

Core Tactical Services: Trusted Security

Our team is dedicated to creating a safe and secure environment for our clients

Ensuring Safety During Voting Period

Ensuring Safety During Voting Period

Core Tactical Services (CTS) is gearing up for the upcoming voting period next week!

Infield Tactics - November 2022

Infield Tactics - November 2022

Infield Tactics for November 2022.

GET A SECURITY SYSTEM

GET A SECURITY SYSTEM

Having a security system can save your life.

ANTI-HIJACKING TIPS

ANTI-HIJACKING TIPS

One of the highest crimes in South Africa is hijackings.