Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The Herd Instinct

By John J. Strauchs
July 1, 2008
Call it the herd instinct. Many creatures herd together for the protection provided by being part of the larger group. So why shouldn’t security executives?


There are many personalities in the herd, but when it comes to safety and security, it is better to run with the group.

I’ve worked in the security industry for several decades but there was always one conundrum that I couldn’t explain. Why aren’t best practices always practiced?

It seemed to be counterintuitive. I’m not saying that security practitioners are doing things that are wrong. Rather, there are better ways of doing some things. I think I finally figured it out. Looking to the natural world, many creatures herd together for the protection provided by being part of a large group. This is true for wildebeest, herring, geese, butterflies, horses, cattle and countless other animals.

Isn’t it reasonable that humans would have the same innate instinct for self-
protection?

Most men – virtually all men – wore hats until the mid to late 1950s, and then they suddenly stopped. Some credit John F. Kennedy with having struck the death knell for hats because he didn’t wear one to his inaugural in 1961. Yes, I do know that a lot of body heat is lost through the head; but with the exception of very cold climates, hats don’t serve much of a purpose and certainly not in major temperate cities for people who work indoors. So why did men wear hats for many decades?

They wore hats because everyone else wore hats.

There are echoes of a Gary Trudeau’s Doonesbury comic strip of many years ago. The first panel shows a Congressman praising a young man for a creative and marvelous suggestion he submitted. The praise is effusive. In one of the last panels, however, the older politician says that “we, of course, can’t do this. It’s never been done before.”

There is immense comfort and protection by staying with practices and conventions that everyone knows. This is what is commonly dubbed conventional wisdom. I prefer to call it the “herd instinct.”
Not to get too literary for a security audience, but I am reminded of a poem, the Eagle and the Mole by Elinor Wylie.

“Avoid the reeking herd,
Shun the polluted flock,
Live like that stoic bird,
The eagle of the rock”

So what are some of these best practices that are being ignored? Let’s look at a few.


“Why aren’t best practices always practiced?” asked John Strauchs. He sees the impact of the herd instinct.

IDENTIFICATION BADGES

The standard ID badge is the size of a credit card and has a photo of the badge owner that usually measures about an inch square.  It would take the eyes of an eagle for a security officer or co-worker to match the photo with the person wearing the badge at a distance of five or six feet.  I am reminded of my time at CIA Headquarters many years ago.  To quell occasional boredom, some “techies” got a little frisky and counterfeited a CIA badge.  They inserted a photograph of a bunny with pink ears and labeled it Agent 007.  It was two weeks of daily use before the miscreant was finally caught by a CIA security officer.


Most specialists agree that the photo image should be double in size.  Why not fill the entire badge with an image.  If a badge is lost, most agencies and companies don’t want any identifiable information on the badge other than perhaps a P.O. Box, anyway.



LOBBY SECURITY STATIONS

How many office buildings have you seen where the security station is installed in a kiosk or counter in the center of a busy lobby? The desk attendants are constantly distracted by visitors with questions. Would-be criminals can easily determine what kind of security the building has. In the worst cases, the security video monitors are behind the console operator. Put the security console in the least rentable space and out of sight.


DESIGN-BUILD PROJECTS

Costs are the chief determinant in the design-build process.  These contracts tend to be fixed-price deals.


It is obvious that the construction company’s profits increase if the building can be built below the construction cost estimate.  They cut corners and prefer price over quality.  I recall one occasion when a general contractor directed me to stop rejecting a security subcontractor’s incompetent shop drawings because it was affecting the project schedule.  My experience is that design-build projects end up costing the building owner more than traditional design-bid-then-build projects, and often end up in litigation.




REQUEST-TO-EXIT (REX) SENSORS THAT UNLOCK DOORS

If an exit door is along a heavily used corridor, REXs that have been configured to unlock a door allow a would-be intruder to wait at the door until someone inside passes by. Electric strikes allow free exiting at all times.  The REX should be configured to only suppress an alarm each time an authorized exit occurs.  With rare exceptions, they should not unlock.  Besides, it’s redundant!




SECURITY VIDEO/QUAD-DISPLAYS

A lot of bleeding occurs at the cutting edge of technology.  These devices are still called “Quads” because when they were introduced into the market only four scenes were inserted.  Today, a video display multiplexer can place numerous camera scenes on a single monitor, to the point that the console operator sees little detail. Moreover, if poorly specified, the individual windows show jittery and jumpy motion, making matters worse.


SECURITY VIDEO/WALL OF MONITORS

Unlike honeybees that have hundreds of facets in their compound eyes, humans can’t effectively watch more than about nine to 12 video monitors.  Despite that, video walls of 30, 40 and even 50 or more, monitors are not uncommon.

SECURITY VIDEO AUDIO-PANNING CAMERAS AUTO-SWITCHING MONITORS

Related to the poor practice described above, console operators working an eight hour shift (a problem in itself) cannot “see” anything if the scene is constantly changing and/or switching, particularly if there is continual pedestrian traffic.  Console designs should be based on a “passive” layout and all security video should be event-activated.


ACCESS CONTROL/NOT PREVENTING TAILGATING

If a single door can be tailgated, especially fire exits used by smokers, the entire access control program is jeopardized.  In my experience, the vast majority (my guess is 90 percent) of office buildings (governmental and commercial) are vulnerable.




PIR BLINDING

Although using glass to blind a passive infrared sensor (PIR) is a fairly rare attack method, manufacturers can fix this shortcoming easily and inexpensively. The detection logic should generate an alarm if the sensor suddenly stops seeing infrared energy beyond three microns of wavelength.  So why don’t they do it?


This is only a sampling of ignored best practices.  I could go on for many pages.


Consider eight hour console shifts, pick-ups pulling wire through conduits, building owners not contracting for construction observation services, using RG-59 coax instead of fiber optic cabling, believing that razor ribbon delays intrusions (or fences for that matter), installing electric strikes on double-leaf doors, failing to install time-delayed unlocking of fire exits, allowing 22 American Wire Gauge (awg) wire to be used, and so forth.  But, I’ll stop here for now.  


Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John J. Strauchs, principal of Strauchs LLC, has 40 years of experience in security and intelligence. Comments and criticisms welcomed at john.strauchs@strauchs-llc.com

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Protecting the Herd

    See More
  • MythBusters Are Busted

    See More
  • Carl Froggett headshot.jpg

    Carl Froggett joins Deep Instinct as Chief Information Officer

    See More

Related Products

See More Products
  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing