Most Popular Articles
Padlocks and gates no longer deter a thief. Either thieves are getting bolder (maybe desperate) or we have not yet done our job, or both. You can't help but think there must be something else we can do to secure our remote sites. Although there have been numerous articles written on this subject over the years, a systematic approach can offer a different perspective.
To understand the anatomy of a theft we can use an event-driven process chain. The objective of using an EPC for this discussion is to determine the step-by-step process of how a theft occurs so we can analyze where prevention or intervention can be applied. Hopefully the perpetrator can be stopped prior to any physical damage being done on the property. The cost of lost airtime, replacement and repair is primarily what we are trying to avoid. Catching a thief and bringing him to justice is just a secondary concern.
As the EPC is discussed, strategies to stop the progress of each stage are suggested. Some courses of action are recommended but it is easier to see now that you can add your own to the list. The major objective in this analysis is to deter the process as early as possible.
The perpetrator starts by surveying the property he hopes to hit. This stage may take from a simple drive by or multiple visits. Chances are he'll hit the same day he visits. One thing is for sure, he is looking for information that will help him decide to break-in or not. Unless he is a professional and knows you are keeping gold bullions in your remote site, he'll definitely look for an easier target if your facility looks like Fort Knox. However, if your site is like a candy store where all those goodies are in plain view, even kids will dare to break in.
Your main strategy at this stage is to give the impression that your facility is Fort Knox. Warning signs, surveillance cameras and public address (PA) systems will give loitering persons the awareness that they are being observed and will be considered as unwelcome guests in such a remote facility. Only the kamikaze-at-heart or the dumber-than-dumb will proceed beyond this point.
Let us say he decides to break in. His first job is to make an entry, preferably with his vehicle inside the property. His motto is “Get in, take with and get out!” Anything that can delay or stop him in the process can be a reason for him to give up the ploy.
One strategy is to render useless the tools that he brought with him for the job. Design the locking of the gate in such a way that a hammer, a bolt-cutter or a torch can not help him break in. Another concern is early detection and photo identification while the attempt is at its early stage. This is the best time for police officers to arrive at the scene.
The perp goes around the facility looking for valuable loot he can turn into merchandise. Copper can be a primary target due to its high resale value lately. This is information that the perp already knows so all he needs to do is look for the shiny yellow metal.
One strategy to foil this stage is to hide copper and/or make its re-sale value very low by putting tar on it. Tar may work for copper used as ground wire, on guy wires or any other places not on the ground where you can tread on them. You can cover copper straps on the ground with cement. Another possible action is to glue all copper straps with F26 to the cement floor. After curing, F26 bonds the copper strap so strongly on the floor that it will take a long time even with a pry bar to jolt out the copper. For someone in haste, this can be quite a feat to overcome.
Acceptable Use Policy blog comments powered by Disqus
[an error occurred while processing this directive]
Today in Radio History
The history of radio broadcasting extends beyond the work of a few famous inventors.
EAS Information More on EAS
The feed provides feeds for all US states and territories.
Need a calendar for your computer desktop? Use one of ours.
Information from manufacturers and associations about industry news, products, technology and business announcements.
Browse Back Issues[an error occurred while processing this directive]
Also in the January Issue
- Trends in Technology: AES-X210, The "Missing Piece" of AES67?
- FCC Proposes Online Publc File Rules for Radio
- RF Engineering: Licensing AM Stations Using Method of Moments
- Field Report: Zoom H6