Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The Herd Instinct

By John J. Strauchs
July 1, 2008
Call it the herd instinct. Many creatures herd together for the protection provided by being part of the larger group. So why shouldn’t security executives?


There are many personalities in the herd, but when it comes to safety and security, it is better to run with the group.

I’ve worked in the security industry for several decades but there was always one conundrum that I couldn’t explain. Why aren’t best practices always practiced?

It seemed to be counterintuitive. I’m not saying that security practitioners are doing things that are wrong. Rather, there are better ways of doing some things. I think I finally figured it out. Looking to the natural world, many creatures herd together for the protection provided by being part of a large group. This is true for wildebeest, herring, geese, butterflies, horses, cattle and countless other animals.

Isn’t it reasonable that humans would have the same innate instinct for self-
protection?

Most men – virtually all men – wore hats until the mid to late 1950s, and then they suddenly stopped. Some credit John F. Kennedy with having struck the death knell for hats because he didn’t wear one to his inaugural in 1961. Yes, I do know that a lot of body heat is lost through the head; but with the exception of very cold climates, hats don’t serve much of a purpose and certainly not in major temperate cities for people who work indoors. So why did men wear hats for many decades?

They wore hats because everyone else wore hats.

There are echoes of a Gary Trudeau’s Doonesbury comic strip of many years ago. The first panel shows a Congressman praising a young man for a creative and marvelous suggestion he submitted. The praise is effusive. In one of the last panels, however, the older politician says that “we, of course, can’t do this. It’s never been done before.”

There is immense comfort and protection by staying with practices and conventions that everyone knows. This is what is commonly dubbed conventional wisdom. I prefer to call it the “herd instinct.”
Not to get too literary for a security audience, but I am reminded of a poem, the Eagle and the Mole by Elinor Wylie.

“Avoid the reeking herd,
Shun the polluted flock,
Live like that stoic bird,
The eagle of the rock”

So what are some of these best practices that are being ignored? Let’s look at a few.


“Why aren’t best practices always practiced?” asked John Strauchs. He sees the impact of the herd instinct.

IDENTIFICATION BADGES

The standard ID badge is the size of a credit card and has a photo of the badge owner that usually measures about an inch square.  It would take the eyes of an eagle for a security officer or co-worker to match the photo with the person wearing the badge at a distance of five or six feet.  I am reminded of my time at CIA Headquarters many years ago.  To quell occasional boredom, some “techies” got a little frisky and counterfeited a CIA badge.  They inserted a photograph of a bunny with pink ears and labeled it Agent 007.  It was two weeks of daily use before the miscreant was finally caught by a CIA security officer.


Most specialists agree that the photo image should be double in size.  Why not fill the entire badge with an image.  If a badge is lost, most agencies and companies don’t want any identifiable information on the badge other than perhaps a P.O. Box, anyway.



LOBBY SECURITY STATIONS

How many office buildings have you seen where the security station is installed in a kiosk or counter in the center of a busy lobby? The desk attendants are constantly distracted by visitors with questions. Would-be criminals can easily determine what kind of security the building has. In the worst cases, the security video monitors are behind the console operator. Put the security console in the least rentable space and out of sight.


DESIGN-BUILD PROJECTS

Costs are the chief determinant in the design-build process.  These contracts tend to be fixed-price deals.


It is obvious that the construction company’s profits increase if the building can be built below the construction cost estimate.  They cut corners and prefer price over quality.  I recall one occasion when a general contractor directed me to stop rejecting a security subcontractor’s incompetent shop drawings because it was affecting the project schedule.  My experience is that design-build projects end up costing the building owner more than traditional design-bid-then-build projects, and often end up in litigation.




REQUEST-TO-EXIT (REX) SENSORS THAT UNLOCK DOORS

If an exit door is along a heavily used corridor, REXs that have been configured to unlock a door allow a would-be intruder to wait at the door until someone inside passes by. Electric strikes allow free exiting at all times.  The REX should be configured to only suppress an alarm each time an authorized exit occurs.  With rare exceptions, they should not unlock.  Besides, it’s redundant!




SECURITY VIDEO/QUAD-DISPLAYS

A lot of bleeding occurs at the cutting edge of technology.  These devices are still called “Quads” because when they were introduced into the market only four scenes were inserted.  Today, a video display multiplexer can place numerous camera scenes on a single monitor, to the point that the console operator sees little detail. Moreover, if poorly specified, the individual windows show jittery and jumpy motion, making matters worse.


SECURITY VIDEO/WALL OF MONITORS

Unlike honeybees that have hundreds of facets in their compound eyes, humans can’t effectively watch more than about nine to 12 video monitors.  Despite that, video walls of 30, 40 and even 50 or more, monitors are not uncommon.

SECURITY VIDEO AUDIO-PANNING CAMERAS AUTO-SWITCHING MONITORS

Related to the poor practice described above, console operators working an eight hour shift (a problem in itself) cannot “see” anything if the scene is constantly changing and/or switching, particularly if there is continual pedestrian traffic.  Console designs should be based on a “passive” layout and all security video should be event-activated.


ACCESS CONTROL/NOT PREVENTING TAILGATING

If a single door can be tailgated, especially fire exits used by smokers, the entire access control program is jeopardized.  In my experience, the vast majority (my guess is 90 percent) of office buildings (governmental and commercial) are vulnerable.




PIR BLINDING

Although using glass to blind a passive infrared sensor (PIR) is a fairly rare attack method, manufacturers can fix this shortcoming easily and inexpensively. The detection logic should generate an alarm if the sensor suddenly stops seeing infrared energy beyond three microns of wavelength.  So why don’t they do it?


This is only a sampling of ignored best practices.  I could go on for many pages.


Consider eight hour console shifts, pick-ups pulling wire through conduits, building owners not contracting for construction observation services, using RG-59 coax instead of fiber optic cabling, believing that razor ribbon delays intrusions (or fences for that matter), installing electric strikes on double-leaf doors, failing to install time-delayed unlocking of fire exits, allowing 22 American Wire Gauge (awg) wire to be used, and so forth.  But, I’ll stop here for now.  


Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John J. Strauchs, principal of Strauchs LLC, has 40 years of experience in security and intelligence. Comments and criticisms welcomed at john.strauchs@strauchs-llc.com

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • MythBusters Are Busted

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!