Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResiliencePhysical Security

Security Programs

Leveraging K-9 capabilities within security

Implementing K-9 security programs requires taking a look at the individual organization’s needs, end goals and budget.

By Adam Stone
dogs

At the University of Maryland, Chief of Police and Director of Public Safety David Mitchell wanted the K-9 patrol program to be friendly and approachable, rather than intimidating. Image courtesy of UMD

February 3, 2023

In addition to security guards, a number of organizations make use of K-9 officers when patrolling their facilities. At Hudson Yards, the massive commercial and residential development on Manhattan’s West Side, canine patrols are on the front lines of security.

“Every delivery that comes into the campus reports to a vehicle screening area — which is about a block or two away from the main campus — they are checked in and screened via canine,” says John Beirne, Vice President of Security at Hudson Yards.

“We also have a second dog that acts as more or less a rover or deterrent, walking the campus. Both are looking for explosive components, anything that could be used to damage our loading docks or our building structures,” he says. “If somebody is out contemplating doing something here, we want them to see a canine onsite that is working in our open areas at irregular intervals. Having them visible provides a physical deterrent.”

Security professionals lean on canine capabilities for deterrence, inspections, incident response, bomb-sniffing and, increasingly, for firearms detection. A number of key best practices can help to make best use of these four-legged assets and to develop mature K-9 security programs.


k9 officers

Appearances matter

A primary consideration in K-9 patrols is perception. There’s always a balancing act to be struck here, and security professionals who use dogs say they put a lot of thought into ensuring that customers and other stakeholders are comfortable.

“I can put a floppy-ear Labrador retriever with a plain-clothes person, or a pointy-eared dog with sharp teeth and a fully-armed handler in a Kevlar vest. The more aggressive you get with the canine and the attire for the handler, the better the visual deterrent. But that could cause some threat or alarm to your employees,” says MSA Security Chief Executive Officer (CEO) Glen Kucera.

At the University of Maryland, Chief of Police and Director of Public Safety David Mitchell is especially sensitive to how students will perceive his dog patrols on campus.

“I love German Shepherds, but anybody in uniform with a German Shepherd conjures up a traditional patrol dog, which can look aggressive. We wanted a softer, gentler approach because these dogs work crowds; they’re walking around on the concourse of the football stadium,” he says.

K-9 experts distinguish between floppy-eared (Labrador types) and pointy-eared dogs. “The general public tends to be more afraid of pointy-ear dogs, so we use floppy-ear dogs in public-facing venues,” says Michael Larkin, Vice President of Commercial Services, Global K-9 Protection Group.

Markings help as well. “You can dress them up or dress them down. Put a vest on them and ‘do not touch’ signs. You’re doing that to elevate or deescalate what you’re trying to get across,” Larkin says.

At Hudson Yards, Beirne leans heavily on markings, both to alert the public to the dog’s role and to ensure the dog handlers can operate without interference. “You don’t want [handlers] wearing plain clothes, looking as though they’re out walking their dog,” he says. “I want the public to know who they are, so they wear tactical cargo pants with a jacket that identifies them. They usually have a hat on [that says] ‘canine handler.’ We don’t want it to be too over the top, but we want it to stick out a little bit, so people know exactly what they are.”

At Caesars Entertainment, Special Response Team (SRT) and K-9 Program Manager Steve Martinez takes a similar approach. “We want our guests to feel comfortable and safe,” he says. “Our dogs wear a vest with the Caesars logo on it, showing that they are a working dog. We also have a patch on there that says: ‘Do not pet.’ We don’t want our guests to just randomly approach our dogs, because they are working dogs and they don’t need any distractions while they are working.”


k9 officers


Best practices for K-9 patrols

Beyond managing perception, a number of other key best practices can help security professionals to deploy canines successfully.

It starts with a consideration of physical spaces. “Before you even find your dogs, you need a place to train and a place to kennel them,” Martinezsays. “When Caesars Entertainment hired me, one of the first things I had to do was help design and build the Caesars Kennel, a nine-bay kennel facility we built out of an old store location that Caesars owned.”

From there, Martinez set about strategizing his patrols. Like others, he was looking to balance the use of the dogs, putting them to work for routine inspections and also making them available for incident response.

“We do a proactive patrol where we go through our properties with high visibility. If bad guys are looking at our property as a target, they’ll see that we have dogs working the property,” he says. “We also go to what we call ‘productive’ areas — where it’s more likely that explosives could be found, like a baggage room. We look at the check-in areas, and the dogs will routinely walk through there sniffing the bags to see if there’s any explosives in the bag.”

Beirne says that his team utilizes K-9 patrols for different tasks depending on the time of day. “Our busy hours down at our vehicle screening area are from about 6 to 9 a.m., and in order to process the vehicles quickly, we’ll have both dogs down there,” he says. “Once we get a lull in the action around 9 or 10 a.m., that other dog retreats back up to the campus to become more of a physical deterrent.”

Martinez adds that he uses his canines for reactive response. “Let’s say we get a call of a bomb threat in a particular area of one of our hotels: we’ll respond with canines to that location and check it out to make sure it’s safe,” he says. “We also have a lot of times when people forget baggage: they check out early, or they go to the machines and gamble and they forget their bags. We get a lot of unattended bags, and we’ll send our canines to check them out to ensure that the bags are safe to handle.”

At the University of Maryland, Mitchell has been especially focused on utilizing canine capabilities for special events. “We have Big 10 games in our football stadium and our basketball arena. We have VIPs coming to campus: we’ve had the President of the United States here on multiple occasions, a former First Lady, members of Congress,” he says. “It makes sense to be able to check venues and make sure that there’s nothing coming in that shouldn’t come in.”

Some security professionals will leverage outside expertise for the actual dog-handling tasks. Mitchell has chosen to train his own campus cops for the work. This takes a little more effort, he says, but it yields some particular benefits.


The right handler

When it comes to dog handlers, “you want people who have the right disposition,” Mitchell explains, and that will be willing to take care of the dog. “There are times you have to go to the vet. They’re like kids in a way, because they get colds and they don’t feel good on a certain day. Having a partner that has fur and four legs is a lot of extra work.” In addition to care, Mitchell says handlers need to have customer-service skills so they can interact with the public in a friendly manner.

Not everyone is a good fit. “You have to apply for this. The dog has got to fit with your family. It needs to fit in with other pets. And this is a physically demanding position. You’re running obstacle courses per the training. You’re up and down a lot of stairs,” he says.

On the upside, having in-house handlers creates new opportunities for the security team and allows for growth opportunities. “Officers are interested in the job enlargement. They’re looking for ways to continue to be a police officer, while adding a different element [or skill] to their resume,” Mitchell says.


Firearms detection

Though many security professionals use K-9 teams for physical deterrence, specialty dogs can be utilized for different risks and security needs.

“Until recently, canines were most commonly used for patrolling and for explosives detection,” Kucera says. “In the past year or so, there’s been a program developed for canines to detect firearms, whether person-borne or sitting in a bag. If you feel your organization could be at risk for an active shooter, then you may want to utilize a canine to help mitigate that risk.”

Martinez is also exploring this use case. “We partnered with the Animal Foundation here in Las Vegas, and we actually adopted two dogs from that foundation and rescued them to train for firearms detection,” he says. “We do have nightclubs on our properties, and we typically will deploy the dog at the nightclub, those high-density crowded situations or events. We want to make sure no firearms get into those types of venues.”

Beirne says he’s also interested, but he is waiting to see how the security industry overall adapts to this new use case. “In the current climate today, firearms are a potential threat, and if canines could help mitigate that threat, that’s something we’re definitely interested in,” he says.

KEYWORDS: k9 K9 Security services security budget security officer security program

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Adam Stone is a contributing writer for Security magazine. He has covered IT issues in the public and private sectors for more than 20 years. In addition to following security trends, he writes on military technology, education-tech, government IT and diverse others issues.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • collage

    Leveraging non-traditional experience to drive your security career

    See More
  • SEC0221-Hosp-Feat-slide1_900px

    Hospitality security adjusts to COVID-19 constraints

    See More
  • SEC0821-Cover-Feat-slide1_900px

    Top de-escalation strategies and training for security leaders

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!