Retreat Security Planning and Analysis, by Tobin

Planning
The key to successful defense is defense in depth. In each layer of security it’s imperative to have a full 360 degree protection afforded by whatever measures, methods or technology you employ. Where it’s simply not possible to secure your entire perimeter due to terrain or financial limitations, it’s important to know what’s not completely protected, why it’s not protected, and what it’s not protected against.
To plan your retreat security, start at the conceptual level. Define what is to be protected. It might be your primary residence, or it might simply be a cache containing bug-out supplies. Decide now what the parameters of a successful defense look like (My food is untouched, 50% of my food is untouched, 25% of my food is untouched, there are no bullet holes in my roof, etc…). Identify, in writing, the consequences of failing to achieve the specified parameters. Doing these things serves two purposes. First, it will help you do develop the proper scope for your plan. Second, it will help you make some difficult decisions regarding rules of engagement and alternatives planning.

Threat Assessment
Next, you have to consider what the threat looks like. The threats are specific to your situation and you have to decide what level of threat you’re willing or obtain the capacity to defend against. City dwellers might be faced with threats like small bands of unskilled scavengers, or large groups of semi-skilled gang members with reasonably good equipment, where the rural resident may be more likely to encounter small groups of highly skilled woodsmen. Your specific threat is entirely dependent on where you are, and who is there with you.
What the threat looks like will dictate how you prepare for it, and it’s definitely not a “one size fits all” exercise. Decide now what your rules of engagement are, and the level of threat that initiates a flight response versus a fight response. A threat that is larger, more skilled, or better equipped than what you prepared for will simply overwhelm your physical security system. For example, a threat capable of long-distance attack may never engage your security at all while still being able to attack people or things at the resource. Concentrating on high-speed avenues of approach will be appropriate for opportunistic or vehicle mounted threats, but completely ineffective against the savvy scavenger with a modicum of hunting skill.
Failure to identify the threat correctly might result in too much security, which could have been invested in food water or power, or too little security, which will result in someone else gaining the benefit of your preparations.

Security System Design
All security systems have to incorporate three key fundamentals – detection, delay, and response. You must be able to detect an intruder to be able to respond to him, and you must be able to respond before he reaches the critical resource.

Detection
Intrusion detection ability comes in many forms, and they have been discussed exhaustively here and elsewhere. Our primary concern is that the detection capability is effective, layered, and sustainable.
It’s imperative that your sensor system have a high probability of detection with a low false alarm rate (FAR)–where we don’t know why the alarm went off) and nuisance alarm rate (NAR)–where we know why the alarm went off, but it wasn’t something we wanted to detect). In other words, it’s good if the dog barks, but not if it barks at everything… or nothing at all. It’s also important to note that people are notoriously poor sensors. Studies conducted by Sandia National Laboratory indicate that a human has a 2% probability of detection under normal conditions, and that they are only effective for the first 20 minutes of a watch. In other words, invest in technology if funding and opportunity allow you to.
Using cumulative probability equations it’s fairly easy to determine that several less than perfect sensors arrayed in series can be more effective that one reasonably good sensor operating alone. One layer of sensors operating at 90% probability of detection (PD) will cost a fortune and provide a 90% cumulative probability of detection (PDC). Two layered sensors operating at 70% PD will offer a PDC of 91% at a lower total price:

PDC = 1-(1-PD1)(1-PD2)
= 1-(1-0.7)(1-.07)
= 1- (.09)
= 91%

If possible, place sensors at the perimeter of your property and again at a defined line within your property. As shown in the example above, two layers of average quality detection devices are more likely to detect a bad guy than one layer of good sensors.

Sustainability of detection devices will be a key issue. If your detection solution is electronic, you have to have means of providing electricity. Fortunately, many technical solutions are designed to work off of 12 volt DC electric or AA batteries and have low power requirements. It’s important that you pay attention to the technical specifications when purchasing equipment. It’s prudent to acquire replacement units or parts in the event that equipment malfunctions or is damaged. Electronic sensors and associated support equipment may not be within your budget. If this is the case, you may elect to go with more cost-effective biological sensors (dogs, geese and others). They will have a reduced capacity to warn you when intruders are coming because they can’t observe your entire perimeter and they, like people, are easily distracted. They require some level of preparation with respect to food and health care, though this should be manageable for most budgets. The major drawback to biological sensors is that while cost effective to purchase and maintain, the opportunity to keep spares on the storage rack isn’t there. In the event that your biological sensors are damaged, replacements may be difficult to obtain,

Delay
The objective of an effective delay system is to delay the bad guy from reaching the objective long enough for the good guys to get dressed, grab their arms, and engage him in a firefight. In practical terms, the bad guy’s timeline from engaging the security system (encountering the outermost sensors) to execution of objective is usually measured in seconds. Your job is to make it enough seconds that you can respond before it’s over.

Delay can come from mechanical obstacles, or it can come from distance. The effectiveness of an obstacle is measured in seconds. An 8 foot chain link fence can be scaled by a human in 10 seconds, and so it’s worth 10 seconds in timeline calculations. Distance is also accounted for in seconds, but is dependant on the movement rate of the bad guy. 100 meters is worth 25 seconds of delay if the bad guy is moving at 4 meters per second. Having a large property can be an asset if your security system is set up properly, but is not, in and of itself, an asset. The only barriers or distances that matter are those that are observed by a sensor system.

Specific delay systems have also been discussed exhaustively here and elsewhere. It’s important to note that barriers effective against one threat may be far less effective against another. For example, anti-vehicle ditch works will provide infinite delay for most vehicles but only a few seconds delay for a bad guy on foot. On the other hand, a wide open field may delay a bad guy on foot for minutes, while delaying a vehicle only a few seconds.

Response
The term Response, in the context of physical security, refers to the people; the tactics, techniques, and procedures (TTP); and the equipment used to neutralize the bad guys. Here’s where you have to ask yourself four questions:
1.) Do I have enough people to secure my critical resource?
2.) Do I have the right training?
3.) Do I have the right equipment?
4.) Do I have alternative plans?

Under optimum conditions, the US military operates under the assumption that it takes 5.2 people to man each security post 24 hours a day, seven days a week. This assumption accounts for eight hour days, leaves of absence, sick time, and all of the variables that mean people won’t be coming to work. It’s likely that you won’t have the manpower to support more than a post or two under these conditions. The fewer people you have to man each post means that, in order to maintain proper security, other tasks start to go undone. If you have only two people per post, for example, that means 12 hour shifts seven days a week with no rest – leaving no significant time for farming, gardening, or other tasks. The alternatives are to accomplish other tasks while abandoning security requirements, or to make arrangements before TSHTF to group with other like-minded people to provide around the clock security.

Proper training for response forces is imperative. At a minimum, each person must be familiar with the rules of engagement and the standard operation procedures required to accomplish the mission. In many cases, this will mean that you need to define what the mission is and how it’s to be done and put it in writing. Additionally, you have to define the threshold for response and the threshold for flight – put that in writing too. Every member of your response force should be proficient in every weapon system employed. Ideally, they’re all using the same weapon type, but in the event that they’re not, they need to be able to use each other’s arms. Every member of the security force should also be familiar with the terrain out to the maximum effective range of their weapons. Advanced training with firearms is desirable, but not always cost effective for groups of any size. If you ask, I’m certain you’ll be provided with contact information for half a dozen quality sources for firearms training.

Proper equipment and familiarity with the equipment breeds confidence in your security forces. Ideally, all of your people will have identical gear. This will ensure that spare parts are available and that weapon magazines are interchangeable in a firefight. A proper kit will include firearms, ammunition, protective gear, restraint devices, and non-lethal weaponry. Suitable arms for your security forces will be of a weight and configuration that can be handled by all of your personnel, chambers a round suitable for your purpose, and has a maximum effective range that can reach the edge of your perimeter (unless you have a really huge place!). The bottom line answer to the question “what’s the best rifle?” is – the one your personnel can use effectively to put rounds on target. Military security forces in garrison typically carry 120 rounds of 5.56mm ammunition when armed with an M16. Depending on your arms, you may vary the load out, but in a firefight you really want as much ammunition as you can carry on an “all the time” basis. Protective gear, whether in the form of body armor or defensive fighting positions (DFPs), should be able to handle impacts from any ammunition common in the retreat’s region. For body armor, [NIJ] level IV protection is desirable, though the type and manufacturer of the armor is really a matter of taste. DFPs should be constructed with overhead cover – more for comfort than protection (unless the neighbors have mortars) – and double thick sandbag walls. Restraint devices are for the bad guys that make it through the initial firefight, or for the bad guys who surrender before a firefight takes place. There are a number of items that fit this category, though I won’t offer specific discussion about any of them except to say that heavy duty wire ties work really well in this capacity. Last, each of your personnel should have access to less-than lethal control methods. Most likely, your rules of engagement don’t go directly from harsh words to lethal firefight – neither should your equipment.

If you’ve given the threat sufficient thought, then you’ll recognize that the security situation will vary widely by the level of threat present in your area. While you are planning, make sure that you address as many of the conceivable scenarios as you can. Once you reach that threshold between viable defense and non-viable defense, put together pre-planned alternatives to standing and fighting. Make sure your group knows when to bug-out and where to go. If possible, pre-position bug-out caches to facilitate these plans.

In conclusion, proper retreat security is a huge, but manageable task as long as you approach it in the correct context. The specifics on how you address individual elements within the fundamental areas of Detection, Delay, and Response are less important than addressing them in a balanced and systematic way. In order to detect the bad guy, you have to have a means of detection, it has to be effective, and it has to be on. In order to slow the bad guy down, you have to have obstacles that are pertinent to his preferred mode of travel, you have to have enough of them so that his total travel time is longer than it takes your personnel to get within rifle range, and they have to be observed. To respond effectively and neutralize the bad guy, your response forces have to numerous enough to counter bad guy forces, they have to know the rules, and they must have and be familiar with their equipment. Lastly, in a “no-win” situation, everyone has to know when and how to get out, and where to go.