Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical Security

Fighting Crime With Flower Power

By Harry Erickson
November 22, 2011

Sure, most parts of the U.S. may be headed for a long winter, but spring will eventually come! And with it comes an opportunity to fight crime.

Here’s a new concept: battling the bad guys with Bougainvillea? Foil felons with Fuchsias, and chase criminals with Camellias? Can flowers actually help prevent crime at your property? The answer is “yes.” Flowers and landscape plants can not only beautify your property, but can be an effective crime fighting tool as well.

Historically, we have relied on methods of security that are of the “target hardening” variety such as locks, gates and iron bars to prevent crime. These visible security devices are valuable, but sometimes limited in their effectiveness. Today, many are turning to the softer side of crime prevention, and complimenting locks and deadbolts with landscape plants, flowers and other design features to provide an additional layer of safety and security.

CPTED focuses on how the environment contributes to the crime rate, and incorporates design features to remove the opportunity for crime. Crimes occur because there is opportunity for the criminal to commit the crime. Many times the physical design of one property offers more opportunity than the next for the criminal to operate. By incorporating CPTED, you can lessen the opportunity for crime, making your property a less attractive target for criminals.

The one aspect of CPTED, Natural Surveillance, is that criminals feel less comfortable in areas where they are being watched, or may be seen. Keeping shrubs and trees trimmed to maintain the feeling of openness and visibility makes the criminal element feel like they are at risk of getting caught. On the other hand, legitimate users of an area feel safer because they can see what is going on around them and can see potential threats and respond quicker. A property with overgrown and unkempt landscape is an invitation for criminals. 

Natural Access Control utilizes landscape plants and other natural design elements to channel people away from unauthorized areas. For instance, a paved walkway lined with flowers strongly suggests the approved route to a proper entrance. A thorny vine or rose bush can restrict access to windows or a graffiti-plagued wall, and add beauty to the property as well. The goal of using landscape plants is not necessarily to prevent, but to discourage trespassing into unauthorized areas. This is accomplished in a more subtle way rather than overwhelming the environment with the presence of “hard” security measures.

Territorial Reinforcement is based on the idea that criminals feel less comfortable operating in areas where they perceive someone is in control. Territorial Reinforcement utilizes “Pride in Ownership” to send a clear message that the people responsible for a property take pride in it and will challenge someone coming there to commit crimes. Utilizing decorative pavers or colored concrete and freshly planted flowers to identify private property gives residents a sense of territoriality and projects the image that someone is responsible for the property. Criminals are less likely to commit crimes where they feel that there are people who take an interest in the property and will protect it.

Take a look around your property and decide if it offers added opportunity for crime. Is it an attractive target for criminals due to the lack of a little TLC, or does it project the image that care has been taken to maintain it? Remember, an overgrown ficus tree can offer opportunity for a criminal to operate unnoticed. On the other hand, a delicate row of daisies can be a subtle but powerful guardian, protecting your property, while looking good doing it. 

KEYWORDS: crime flowers prevent property

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Harry Erickson, CPTED Security Consultants

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Fighting Hate Crime in Canada with Security Infrastructure

    See More
  • Fighting Crime with IP-Enabled Security

    See More
  • checkout counter with credit card chip reader

    Fighting workplace theft with advanced access controls

    See More

Related Products

See More Products
  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing