Useful Online CPTED Tool

Author: Ethan Ace, Published on May 23, 2012

While CPTED is often ignored in designing security systems, it offers significant value. CPTED, that is, Crime Prevention through Environmental Design, can reduce the opportunity for crime and the installation and maintenance costs required by extensive security systems. British organization Secured By Design has released an online planning tool for those building residential blocks to provide guidance for these concerns. In this update, we overview the tool, and show practical examples of environmental improvements which impact surveillance systems.

Overview

The Secured By Design Toolkit walks users through 15 separate scenarios in the design of a small residential housing block, both single-family rowhomes and multi-tenant housing. Examples for parking, access, play areas, lighting, and more are given, first showing the "wrong" design, followed by SBD's recommendations, based on CPTED principles, along with explanations for each. For those unfamiliar with CPTED, this is a good example of many of its principles.

Applications for Video Surveillance

Most of the recommendations given in the tool are not explicitly systems-related, as CPTED is based more on psychology and human behavior, but some of the examples given may have benefits for video surveillance.

Landscape Obstructing View

For example, in this scenario, shrubs have grown too tall, and tree canopies are left too low to the ground, obstructing residents' views of outdoor areas, and potential wrongdoing:

This is a common issue in surveillance, as well, as camera mounted at 12-15' on these buildings would be obstructed by trees, and the shrubbery provides plenty of hiding spots for criminals. The recommendations are trimming of the shrubs to 1m and keeping tree canopies above 2m for proper view, seen in this image:

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

Coverage of Access Routes

In this second example, pedestrian and vehicular access roads allow multiple routes into the parking area, and rear garden access, while limiting surveillance by residents with high walls and trees.

In the updated example, only a single road accesses parking, ending in a cul-de-sac. As a result, only residents and their guests should use the access road, greatly limiting the number of vehicles entering. Additionally, pedestrian paths are private, restricted to resident use, to limit foot traffic and rear garden access:

This redesign may also help camera coverage, as only one entry/exit must be covered, and the changed shape of the parking areas allows for greater visibility.

Nighttime Lighting

In this last example, the parking area is lit with only low lighting bollards, providing little light, and creating shadows.

The ow light level plus variations between light and shadow make for poor visibility by both human observers, as well as cameras. In the recommendations, tall luminaire lighting replaces bollards, providing white light with a high color rendition index, and higher overall lighting level, conditions much more appropriate for surveillance.

CPTED Resources

For those interested in learning more about CPTED, a variety of resources are available.

Comments : PRO Members only. Login. or Join.

Related Reports on Tools

Visio For Video Surveillance Design on Feb 20, 2018
Many integrators have standardized on AutoCAD for camera layouts but new users may be overwhelmed by its learning curve. Microsoft's Visio...
Project Plans for Security Integrators on Jan 26, 2018
How do security integrators typically plan projects? A detailed playbook with step by step execution? Just go out and do it? Somewhere in...
Access Control Job Walk Guide on Sep 26, 2017
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
Favorite Integrator Tablets 2017 on Sep 11, 2017
What percentage of integrators use tablets? Which tablets do they prefer? Apple? Android? Windows? Tablets have become popular integrator tools...
Favorite Network Termination Tools on Sep 06, 2017
Thomas Carlyle said "Man is a tool-using animal. Without tools he is nothing, with tools he is all." For security integrators, their tools are...
Vulnerability Directory For Access Control Cards on Aug 14, 2017
Knowing which access credentials are insecure can be unclear, especially because most look and feel the same. Even the most insecure 125 kHz types...
Hikvision Security Code Cracked on Aug 08, 2017
Hikvision's 'security code' feature has been cracked and a program generating security codes is being distributed online. IPVM has obtained and...
Directory of 40 IP Camera Manufacturer Discovery Tools on Jun 19, 2017
Locating the IP address of a DHCP client or factory defaulted device on a network is often a difficult task.  In another report, we discussed...
Bluebeam Revu Security Floorplan Estimation App Test on Jun 15, 2017
Bluebeam Revu is a construction design markup tool that claims it is "used by 94% of top US contractors", but what role does it have for physical...
How Integrators Use IPVM on May 24, 2017
150 integrators explained how they use IPVM and how it helps them stay informed and improve their business.  The 4 main uses integrators cited for...

Most Recent Industry Reports

Visio For Video Surveillance Design on Feb 20, 2018
Many integrators have standardized on AutoCAD for camera layouts but new users may be overwhelmed by its learning curve. Microsoft's Visio...
Health Care Insurance Integrator Benefits Statistics on Feb 20, 2018
How common and how much healthcare coverage is typically provided by security companies? 150+ integrators explained how their companies provide the...
Hikvision Deletes Genetec Support on Feb 20, 2018
There will be no peace between Hikvision and Genetec. A year after Genetec expelled Hikvision (and Huawei, citing Chinese government control...
Change Orders - Sometimes Necessary, Sometimes Unethical on Feb 19, 2018
Change orders are a common element in project sales. Sometimes they are a necessity and appropriate ways to deal with arising issues, but sometimes...
Bosch Merges Video, Intrusion and Access Businesses on Feb 19, 2018
Bosch is merging their "video systems, intrusion detection, as well as its access control and management software business units to form a single...
Why 3VR Failed on Feb 16, 2018
3VR destroyed transformed ~$65 million in VC funding into a $6.9 million exit. The reason they failed is simple. They bet on analytics. They...
"Fear Mongering": Hikvision USA Cybersecurity Director Dismisses Chinese Government Ownership Concerns on Feb 16, 2018
The facts are: The Chinese government created Hikvision and is Hikvision's controlling shareholder. Hikvision's Chairman, a Communist Party...
16:9 vs 4:3 Video Aspect Ratio Statistics on Feb 16, 2018
What aspect ratio do security integrators prefer? The 'standard' 4:3 or the 'wide' 16:9 one? 100+ integrators told us what they preferred, with...
Mercury Releases New Series 3 Redboard Access Panels on Feb 15, 2018
Mercury Security has their first major product release post-HID buyout, and things literally look different. The Series 3 SIO boards now are red...
Last Chance February 2018 Camera Course on Feb 15, 2018
This is the last chance to get into the Winter camera course, starts next Tuesday. Register now. IPVM provides the best education, live online...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact