Travel Reference
In-Depth Information
The foregoing items all relate to physical security. Remember, physi-
cal security is the primary concern. Make forced entry a very difficult
proposition for an assailant. There is no such thing as impregnability.
Given enough time and the right tools, any place, including heavily for-
tified positions, can be breached. If you ever travel to Israel, a trip to the
mountain fortress Masada will convince you of that fact. Masada was a
masterpiece of Herodian construction. Located 2,000 feet above the Dead
Sea (Yam Hamelach), it was accessible only through a narrow winding trail
known as the Snake Path. The narrow and torturous path allowed defend-
ers to kill attacking soldiers as they attempted to breach the walls. Almost
2,000 years ago, the Roman legions of Vespasian besieged Masada. After
numerous attempts to overcome the city failed, the Romans simply built
an enormous ramp on the far side of Masada, which allowed for a con-
ventional mass attack by legionnaires. Masada, once thought impregnable,
quickly fell. The point is that you cannot stop a determined attempt at
entry. All you can do is delay it. Fortunately, that is all that is required for
general security concerns. Make entry look difficult, and you have greatly
decreased your chance of being targeted for break-in. Make it even harder
actually to accomplish, and you have brought the odds down still further.
If it takes the bad guys time, they will most likely abort rather than risk
identification and arrest.
ALARM SYSTEMS AND VIDEO MONITORING
Once physical security issues are addressed, it is appropriate to examine
what additional steps may be taken to further enhance security. The next
step is to see what types of technological solutions are appropriate for the
location. The most common security technology is a simple alarm system
wherein sensors are affixed to all points of entry. When the alarm is set,
a complete electrical circuit is formed. Any attempt to open a door or
window “shorts” the system and sets off the alarm. The alarm may be
localized, with a siren that goes off when the system is breached. Other
systems are wired into a central station that receives the alarm and may
dispatch police or security units as necessary. Notification to the central
station also may be accomplished through the use of cell phone technol-
ogy. The system generally uses a telephone land line to make contact, with
the cell phone serving as a backup. In many Third World countries, where
phone service is unreliable, cell phone backup is a necessity. The added
Search WWH ::




Custom Search