Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Solutions: Set-back Then Sit Back

By Ron Smith
July 1, 2006
(Back) For existing and new construction, design in set-backs to provide greater security, especially in terms of guarding against loss of life. There are additional security features built-in and even hidden in the perimeter around a facility. In one example, hedgerows that line the building’s walkways and three sides of the perimeter conceal a series of steel and concrete-filled bollards, or posts. Concrete sitting benches alongside reinforced concrete planters filled with innocuous-looking flowers and decorative, lighted bollards that appear to be upscale lampposts prevent vehicles from gaining access to the lawn and building.


The 1995 bombing of the Alfred P. Murrah Federal Building in Okalahoma City and the subsequent attacks on September 11th served as a wakeup call that tighter care should be taken to shore up facilities.

What’s been set as requirements and learned by doing also are lessons for enterprise security tasked to protect buildings in the U.S. and abroad.

Beginning in 2003, the Department of Defense charged that all defense projects must meet or exceed anti-terrorism force protection regulations set by Unified Facilities Criteria (UFC) 4-010-01 DoD Minimum Anti-Terrorism Standards for Buildings. New regulations apply completely to new construction. If renovating, restoring, repairing or modifying, and project cost exceeds 50 percent replacement cost of the building, the standard requires that the remainder of the building be brought into compliance. If the renovation is less than 50 percent, it is recommended, though not required, that the new measures be incorporated.

(Front)
Little is left to chance regarding security on military bases. Targeted security levels at all military installments are derived by the individual installations in accordance with the DoD Security Engineering Planning Manual based on individual threat analysis and classification parameters. Military facilities must be designed by architectural/engineering firms with expertise in strict adherence to specified perimeter and building site security standards.

The goal of UFC 4-010-01 is to prevent mass casualties. The intent is not to protect buildings or classified government intelligence -- first and foremost, it is to protect lives.

Following are key strategies in designing site and perimeter security that not only diminish staff vulnerability, but also maintain aesthetic appeal, all while permitting accessibility to employees and the public alike.

(Inside Left)

Set-back distance

The top three strategies can be summed up in this way: Set-back. Set-back. Set-back.

The strategy to overcome a bomber like Timothy McVeigh to drive up, abandon his truck and detonate 4,800 pounds of fertilizer and fuel-based explosives within a few feet of a building is simple, cheap and extremely effective.

It’s a set-back. UFC DoD 4-010-01 mandates that a facility within a controlled perimeter, i.e. with vehicle access control at the entrance, and used as a “primary gathering building” (defined as that which houses 50 or more people), must have a minimum set-back of 25 meters from roadways and parking lots. Most installations are within a controlled perimeter. Because a manned guard station at a controlled perimeter allows searches of all entering vehicles, set-back standards can afford to be less rigid. In contrast, a similar facility outside a controlled perimeter is required to have a minimum set-back of nearly twice (45 meters) that specification.

Set-back distances include vehicle approaches from public roadways, interior roads, parking lots and drop-off points. Generally, the desire is to limit parking; today, parking under a building is generally prohibited. Drop-off areas for places such as medical facilities, childcare and schools are necessary, but the rule of thumb for drop-offs is to incorporate, yet control it. This means clearly delineated signage and pavement markings to indicate to drivers how they are permitted to approach and loop around for egress -- all under close observation.

Even if ideal set-backs are met, other security strategies typically are integrated, as well. Further, where minimum set-backs are not able to be met, set-back limitations can be offset with carefully calculated engineering strategies. For example, exterior walls can be reinforced to be made more resistant to blasts. Equip windows with laminated glazing to prevent flying glass shards and debris. Better secure door and window frames in the wall construction to prevent collapse or release in the event of a blast.

Set-backs also require a 10-meter unobstructed zone surrounding the building. This helps eliminate hiding places, such as an electrical and mechanical equipment or a trash dumpster, in which to place a bomb.

Several years ago, the existing Army reservist training facilities at Fort Meade reached its capacity. While a new facility was needed, space constraints required that the new Army Reservist Training Complex be placed just outside the confines of Fort Meade’s controlled perimeter. Spread over several acres, the 1,800-person reserve center, once completed, will serve as an enclave for army reserve, and requires the same DoD perimeter security requirements. Just south of Baltimore, the complex is bordered by Maryland Route 175, a busy public arterial highway.

(Inside Right)

Concealed devices

A major challenge is to design facilities that are highly secure yet do not feel like a maximum-security prison. The headquarters of the Army’s 101st Airborne Division at Fort Campbell is a contemporary, one-of-a-kind design that provides the tightest security measures but also makes these measures transparent in an aesthetically pleasing structure and park-like grounds.

Prominently placed on a grassy knoll near the main entrance, the V-shaped, two-level natural brick structure is formed in the shape of an eagle with an outdoor courtyard tucked between the wings. Visitors can walk its wide, meandering pathways lined with rows of manicured hedges that curve throughout the grounds and accommodate pedestrians and handicapped access from the parking areas. The grounds also feature a sloping landscaped area with ornamental flowering trees, perennial flowers and an expansive lawn, as well as military memorials and statuary, including an eagle fountain.

But camouflaged below the surface of this bucolic setting are techniques planned by the project’s engineering team. These include hidden bollards, drainage layout, natural barriers and even well-placed flower planters.

On one side, the perimeter is delineated with retaining walls, ranging in height from 3 to 7 feet. Pretty hedgerows that line the walkways and three sides of the perimeter conceal a series of steel and concrete-filled bollards, or posts with a stranded chain cable barrier system. Concrete sitting benches alongside reinforced concrete planters filled with innocuous-looking flowers and decorative, lighted bollards that appear to be upscale lampposts prevent vehicles from gaining access to the lawn and building. Larger trees and bushes along the access points help form a natural looking barrier, as well as use of higher than usual, non-mountable curb sections.

(Left)

Natural abilities

Contours in the grade also contribute to higher-level protection. Steep inclines, landscaping berms or dips in the grade offer site security and appear as natural elements. Fort Campbell incorporates a storm-water retention basin with a pitch steep enough to preclude truck access even when not filled with water.

Extra care must be taken to keep loading areas secure. For deliveries, service entry drives are equipped with an identification card reader. Should the threat heighten, it also provided with a crash-rated barrier arm gate and/or emergency hydraulic popup bollards that form a crash barrier.

New requirements also mandate that mailrooms be placed on the perimeter of the building. As an area where incoming and unknown parcels enter the facility and are sorted and distributed, segregating it from heavily populated areas can lessen collateral damage caused by an explosive device. Another requirement is to seal off the mailroom, isolating it from airborne contaminants, to minimize the effects of biological and chemical weapons.

Following strategies for enhancing security of both the perimeter and the building site will result in new and retrofit installations that will prove more secure than pre-9/11 design and, most critically, will prevent unnecessary loss of life.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ron Smith is a civil engineer and project manager for The Mason & Hanger Group. A graduate of the University of Maryland, he has been employed with Mason & Hanger for over 17 years. He can be reached at Ron.Smith@mhgrp.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • boston

    Looking Back at Boston: Responding to Multiple Threats with Mobile Command Solutions

    See More
  • cyber-hygiene-freepik1170x658.jpg

    Bouncing back after a cyberattack: A cyber resilience checklist

    See More
  • Ben Scaglione

    How to Fight Back Against Hackers

    See More

Related Products

See More Products
  • effective.jpg

    Effective Physical Security, 5th Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing