Physical Security & Community Defense Atlas Defense-only • No medical/food/water/shelter chapters • Built for offline mirroring
Risk management → site hardening → personal safety → community safety teams → incident intelligence → institutional patterns
⚑ Quick-Start Pack

Physical Security & Community Defense Resource Atlas

This is a defense-only atlas for building layered physical security, community safety capacity, and operational resilience in hostile, unstable, or degraded environments—without depending on centralized institutions as the default endpoint.

The resources below are pulled as individual documents and tools (not “hub-of-hubs”), structured for sequencing and offline use.

Lens low-trust, anti-capture, decentralized Method layered defense + acceptance + community protocols Constraint no weapons training, no harm facilitation Output printable / mirrorable core pack

How to read this atlas

Start with the Quick-Start Pack, then follow the sequencing inside each section: governance & risk → people skills → places → groups → intelligence.

Why these sources

Priority goes to field-tested doctrine, checklists, and frameworks that can be adapted to local context without heavy dependencies.

What “defense-only” means

No offensive tactics. No weapon instruction. Focus stays on prevention, deterrence, hardening, situational awareness, and crisis management.

Scope, boundaries, and adversarial bias checks

These guardrails prevent drift into topics outside the mandate and reduce “false completeness” caused by institutional or ideological bias.

Scope boundary: Physical security & defense only. Digital/cybersecurity, food/water/shelter, and medical are excluded as primary categories. Some documents contain those topics; they are included only where they serve physical security operations (e.g., evacuation, duty-of-care).

Bias Check: “Institutional capture” vs. “field reality”

Many security documents assume police, courts, and stable governance as default. In degraded contexts, those endpoints may not exist or may be adversarial. Favor resources that: (a) specify principles, (b) expose assumptions, and (c) can be executed locally.

What to watch for
  • Over-reliance on compliance (security as policy theatre, not capability).
  • Over-reliance on “call authorities” as the only response pathway.
  • Hardening without acceptance (visible fortification that escalates hostility).
  • “Checklist-only security” without risk assessment and local threat modeling.

Sequencing rule: people → places → groups

Physical security fails when trained people and clear group protocols do not exist. This atlas sequences learning as: risk management → personal/family → site hardening → community teams → incident intelligence.

Why the order matters
  • Hardening without training increases complacency and creates single points of failure.
  • Training without protocols produces fragmentation and panic under stress.
  • Protocols without incident intelligence degrade into superstition and rumor.

Quick-Start Pack (print-first)

Minimum viable set to build an end-to-end physical security program: doctrine, skills, site design, community operations, incident intelligence, and prevention architecture.

Print priority: These are selected for usefulness under degraded connectivity. Most have stable PDF URLs.
  • GPR8 (Humanitarian Security Risk Management)
  • Security to Go (GISF) + Module 8 (Facilities)
  • SRM Basic Guide (Smaller NGOs)
  • Safer Access (ICRC)
  • Stay Safe (IFRC)
  • SIIM Handbook (Incident reporting & analysis)
  • Get in Formation (Community Safety Toolkit)
  • Community Safety Plans Manual (GIZ)
  • Our Spirit / Highway of Tears (Indigenous-led toolkit)
  • Kidpower “People Safety” skills
  • Victim-defined safety planning (VAWnet)
  • Survivor safety planning (Survived & Punished)
  • ICA CPTED Methodology White Paper
  • FEMA 426 + Building Vulnerability Checklist
  • Cardiff Model Toolkit (CDC)
  • Violence Prevention: the evidence (WHO)
  • INSPIRE (Ending violence against children)

GPR8: Humanitarian Security Risk Management (PDF)

ODI / Humanitarian Practice Network Operational SRM doctrine

Sector-standard security risk management framework: context → threats → mitigation → incident response → learning loops.

Use backbone doctrine Format long PDF Mode organizational + field
How to extract value fast
  • Use it as the “governance layer” for all other tools (risk appetite, roles, review cycles).
  • Pull templates/processes into local SOPs: risk assessment cadence, incident response, training, debriefs.

Security to Go (GISF) — full guide (PDF)

Global Interagency Security Forum Rapid deployment SRM

Fast-start checklists for building basic safety/security systems in new or rapidly changing contexts.

Use field execution Format modular Note contains digital modules
Extraction focus (physical security)
  • Module 8 (office/compound/residence security) is the primary physical-security steal.
  • Module 10 (travel safety) and Module 11 (hibernation/relocation/evac) connect movement to site security.
  • Ignore digital security modules if out-of-scope for this atlas.

Security Risk Management: A Basic Guide for Smaller NGOs (PDF)

EISF / GISF SRM minimum viable system

Compact SRM blueprint for small teams: roles, minimum processes, and practical templates.

Use minimal operating standard Format concise PDF

Safer Access: A Guide for All National Societies (PDF)

International Committee of the Red Cross Acceptance-based security

Operational security by perception, acceptance, and access—how to reduce risk via stakeholder relations and neutrality practices.

Use acceptance + access layer Format deep PDF

Stay Safe: Guide to a Safer Mission (PDF)

IFRC Personal/volunteer security + management

Security culture, personal safety behaviors, and management practices for humanitarian deployments and volunteer operations.

Use individual + org behaviors Format handbook

SIIM Handbook (PDF): Security Incident Information Management

Insecurity Insight Incident capture → analysis → action

Tools and templates for incident reporting systems, taxonomy, analysis, and learning loops.

Use intelligence layer Format toolkit PDF

Get in Formation: A Community Safety Toolkit (PDF)

Vision Change Win Community safety teams

Community defense practices: de-escalation, patrol roles, event safety, safety culture, and team operations.

Use grassroots operating playbook Format worksheets & scripts

Developing Community Safety Plans (GIZ) — Manual (PDF)

GIZ Participatory safety planning

Facilitation methods to map local risks, design interventions, and build owned safety infrastructure.

Use participatory planning engine Format facilitator manual

Our Spirit: Community Safety Toolkit (Toolkit intro)

Our Spirit / Highway of Tears Initiative Community safety in high-risk corridors

Indigenous-led safety toolkit adapted from Highway of Tears work; supports missing-person response and community safety capacity.

Use culturally-grounded community safety Note multi-part web toolkit

Kidpower: People Safety Skills (Library)

Kidpower International Non-weapon self-protection skills

Boundary-setting, situational awareness, de-escalation, and last-resort escape skills for kids, teens, and adults.

Use training curriculum base Format articles + handouts

Victim-Defined Safety Planning (PDF)

VAWnet / Greater Hartford Legal Aid IPV safety planning doctrine

Safety planning anchored in victim priorities; includes broader security needs beyond physical violence.

Use survivor-centered planning Format concise PDF

ICA CPTED Methodology White Paper (PDF)

International CPTED Association Method over checklists

Methodological rigor for CPTED: evidence gathering, ethics, collaborative analysis, and coherent recommendation design.

Use built-environment methodology Format white paper

FEMA 426 / BIPS 06: Reference Manual to Mitigate Attacks (PDF)

DHS / FEMA Facility hardening patterns

Threat/hazard, asset value, vulnerability → protective design patterns (standoff, glazing, access control, layouts).

Use professional hardening doctrine Note designed for high-risk facilities

CDC Cardiff Model Toolkit (PDF)

US CDC Violence hotspot intelligence

Operational method to combine hospital + law enforcement data to map violence hotspots and target prevention.

Use local situational awareness Format toolkit PDF

Violence Prevention: The Evidence (WHO) — briefings (PDF)

World Health Organization Evidence base

Seven briefings summarizing what works in violence prevention across multiple domains (interpersonal and self-directed).

Use evidence sieve for programs Format compiled PDF

INSPIRE: Seven Strategies for Ending Violence Against Children (PDF)

WHO / UNICEF / UNODC & partners Prevention architecture

Evidence-backed strategy suite for reducing violence against children; integrates law, norms, safe environments, services, and education.

Use program architecture Format technical package

Risk management backbone

Doctrine and minimum viable systems for security risk management (SRM): threat modeling, mitigation planning, and learning loops.

GPR8 (PDF)

Use as the root schema: terminology, SRM process, governance, and accountability patterns.

Recommended extraction
  • Define: risk appetite, decision rights, escalation triggers, and review cadence.
  • Build a “security operating system”: SOPs + training + incident reporting + after-action reviews.

SRM Basic Guide for Smaller NGOs (PDF)

Minimum viable SRM for small teams: roles, templates, and practical steps that scale upward.

Security to Go — Module 7: Security Plan (PDF)

How to convert risk assessment outputs into a usable security plan and staff procedures.

ICRC Safer Access (PDF)

Acceptance-based protection: stakeholder mapping, perception management, and access negotiation patterns.

ICRC SAFE Manual (landing page)

Updated replacement for “Staying Alive”; holistic security and safety management at individual level in operations context.

Note on “mirror” PDF
  • The PDF mirror is included for offline use. Where possible, keep the ICRC publication page as the canonical reference.

Safety First (Save the Children) (PDF)

Field safety and security handbook: threat awareness, travel, site security, and incident handling.

Staying Alive (ICRC) (PDF)

Classic security guidelines for conflict areas; still useful as patterns and checklists (superseded by SAFE).

IFRC Stay Safe (PDF)

Personal security behaviors + security management systems; useful for volunteer-based networks and distributed teams.

Operational principle: SRM quality is measured by execution under stress: training frequency, incident capture quality, and continuous improvement—not the number of policies.

Personal & family safety (non-weapon, civilian)

High-leverage resources for boundary-setting, situational awareness, de-escalation, and survivor-centered safety planning.

Kidpower People Safety Skills (library)

Teachable “people safety” skills for all ages: awareness, confidence, boundaries, help-seeking, and last-resort escape.

Victim-Defined Safety Planning (PDF)

Safety planning centered on survivor priorities; expands safety beyond “physical violence only.”

Safety Planning & IPV (Survived & Punished) (PDF)

Safety planning as community organizing; includes risk reduction and the harm of criminalization.

Creative Interventions Toolkit (PDF)

Community-based interventions to interpersonal violence; useful for building non-police pathways of safety and accountability.

Depth long Mode community accountability
Where it fits in this atlas
  • Use when building “third path” safety responses that do not default to the criminal-legal system.
  • Pairs well with Get in Formation and OVP Toolkit when building community safety infrastructure.
Training caution: Skills degrade without repetition. Prefer curricula with practice drills, scripts, and roleplay structures (Kidpower, Get in Formation).

Home/site hardening & CPTED

Built-environment patterns: natural surveillance, access control, territorial reinforcement, maintenance, and professional facility hardening guidance.

CPTED Overview (LISC)

Accessible CPTED introduction and practical framing for community spaces and neighborhoods.

ICA CPTED Methodology White Paper (PDF)

Methodological guardrails for CPTED work: data collection, ethics, evaluation, and coherent recommendations.

CPTED Guidelines for Queensland (PDF)

Modern CPTED guideline with principles and practices for planners, councils, police, and community stakeholders.

City of Las Vegas CPTED Handbook (PDF)

Applied CPTED handbook: lighting, layouts, and practical design tactics for reducing crime opportunity.

Essex CPTED Guide (PDF)

Concise CPTED guidance with clear tactics (lighting, visibility, streetscape, overlooked spaces).

FEMA 426 / BIPS 06 (PDF)

Facility hardening doctrine and vulnerability assessment patterns (standoff, glazing, access control, entry points).

FEMA 452: Risk Assessment How-To (PDF)

Systematic methodology for identifying assets, threats, vulnerabilities, and choosing mitigations.

FEMA 430: Site & Urban Design for Security (PDF)

Perimeter and site design patterns for protection: approaches, stand-off, and layered site defenses.

VA Physical Security & Resiliency Design Manual (PDF)

Deep design patterns for entry control, glazing, standoff, and layered security—highly stealable even outside healthcare.

Design heuristic: Prefer “low-profile protection” where possible—security measures that do not broadcast hostility or attract targeting.

Community safety teams & neighborhood defense (non-police, non-militarized)

How to structure local safety capacity: roles, training, de-escalation, patrol patterns, and participatory safety planning.

Get in Formation (PDF)

Core playbook for building community safety teams: de-escalation, event roles, safety culture, and response planning.

GIZ Community Safety Plans Manual (PDF)

Participatory safety planning methods: mapping risk, prioritizing interventions, governance and M&E loops.

Offices of Violence Prevention (OVP) Toolkit (PDF)

Blueprint for establishing and running local violence prevention offices with infrastructure, roles, and evaluation.

Community Safety Toolkit (Safety & Justice Challenge) (PDF)

Community-driven safety planning: concepts, indicators, engagement methods, and priority alignment.

National Neighborhood Watch Manual (PDF)

Structured neighborhood coordination, observation/reporting patterns, meetings, and sustainment mechanics.

Our Spirit Toolkit (web)

Indigenous-led community safety approach; designed for real-world missing-person and corridor risk conditions.

UNODC Crime Prevention Guidelines Handbook (PDF)

High-level prevention and safety architecture; useful for formalizing local safety strategy without militarization.

Core operating model: Team roles + scripts + training cadence + incident reporting + community feedback loops.

Event & mass-gathering security

Tools for planning security at gatherings, religious sites, schools, and community spaces—focused on layered, practical measures.

CISA Mass Gathering Security Planning Tool (PDF)

Framework + checklists for event planners: venue characteristics, planning steps, and protective measures.

CISA Physical Security Performance Goals (Faith-Based) (PDF)

Baseline measures for houses of worship and faith-based facilities: planning, access control, surveillance, response.

CISA K-12 School Security Guide (PDF)

Systems-based methodology for layered physical security planning in schools: detection, delay, and response.

CISA Active Shooter Emergency Action Plan (Guide) (PDF)

Preparedness and response planning framework: roles, communications, drills, and recovery considerations.

Design constraint: Security planning should preserve accessibility and community trust while reducing risk—avoid creating “fortress optics” that backfire.

Incident intelligence & reporting

Systems for capturing incident data, analyzing patterns, and turning observations into preventive action.

SIIM Handbook (PDF)

Incident reports, taxonomy, analysis templates, decision questions, and organizational feedback loops.

CDC Cardiff Model Toolkit (PDF)

Collect and combine health + law enforcement data to locate hotspots and target interventions.

Public Health Implementation Guidance (Cardiff Model) (PDF)

Practical implementation guidance (capacity, barriers, governance) for agencies adopting Cardiff-style partnerships.

Operational rule: If incident reporting is not easy, non-punitive, and fast, it will be bypassed—then rumor becomes “intel.”

Institutional & critical infrastructure patterns

Overbuilt institutional frameworks contain reusable patterns for layered physical security, assessment, and resiliency design.

FEMA 426 / BIPS 06 (PDF)

Protective design methods + vulnerability assessment checklists; foundational for facility hardening patterns.

FEMA 452 (PDF)

Risk assessment methodology to prioritize mitigations and justify spending decisions.

FEMA 430 (PDF)

Site and urban design patterns: perimeter, approach control, and stand-off strategies.

VA Physical Security & Resiliency Design Manual (PDF)

Deep patterns for entry control, glazing, blast considerations, and facility security planning.

APPA Physical Security Resources (page)

Utility-focused physical security resources (critical infrastructure hardening patterns).

ASIS: Protection of Assets — Physical Security (paid reference)

Professional reference volume (PSP-aligned) for physical protection systems and program design.

Why include a paid source
  • Many “free” sources summarize. This volume is a deep professional consolidation used for certification and program execution.
  • For low-trust environments, extract methodology and systems thinking, not institutional ideology.

CISA K-12 School Security Guide (PDF)

Detection–delay–response logic and layered measures are reusable for many facility types (not just schools).

Evidence & prevention architectures

Evidence filters to avoid “security theatre,” plus prevention packages that scale community safety without militarization.

WHO Violence Prevention: The Evidence (PDF)

Evidence summaries for prevention strategies—use as a sieve for local programs and funding priorities.

INSPIRE (PDF)

Seven strategy package for ending violence against children: safe environments, norms, services, and education.

CDC Cardiff Model Toolkit (PDF)

Data-driven violence prevention architecture: convert injury data into targeted interventions.

OVP Toolkit (PDF)

Institutionalizes prevention capacity at city/county level with defined roles and evaluation loops.

Prevention is physical security: A large fraction of physical threat reduction happens upstream via norms, environment design, and rapid response capacity.

Adversary doctrine (pattern-stealing)

Overbuilt state and professional doctrine contains reusable methods for assessment, deterrence, and layered protection—without adopting the politics.

DHS Active Shooter: How to Respond (PDF)

Plain-language response doctrine for public settings; pairs with CISA EAP materials.

FEMA 426 / BIPS 06 (PDF)

Threat modeling + vulnerability checklists + protective design patterns (standoff, glazing, entry control).

FEMA 452 (PDF)

Assessment methodology that can be repurposed for compounds, community sites, and critical assets.

CISA Faith-Based Physical Security Performance Goals (PDF)

Low-cost baseline practices; useful as a “security minimums” checklist for community sites.

UNODC Crime Prevention Handbook (PDF)

Policy-level crime prevention guidance; good for designing community safety programs that avoid coercive drift.

ASIS Protection of Assets — Physical Security

Professional physical security “sourcebook” used by practitioners for design and program implementation.

Extraction method: Steal the process (assessment, layers, drills, incident loops). Reject the assumption that centralized enforcement is always available or benevolent.

Offline mirroring checklist

Convert this atlas into a local “vault” for low-connectivity environments: download, hash, print, and store redundantly.

Mirror plan (practical)

A simple method to keep the pack usable when links rot or networks fail.

Checklist
  • Download PDFs (Quick-Start Pack first).
  • Store in two physical locations (primary + offsite).
  • Export a printed “index” page with filenames and short descriptions.
  • Optionally compute file hashes (SHA-256) and store alongside the index.

Local structure (suggested)

Folder naming that matches this atlas’s sequencing.

Folders
  • 01_Risk_Management
  • 02_Personal_Family_Safety
  • 03_Site_Hardening_CPTED
  • 04_Community_Safety_Teams
  • 05_Events_Mass_Gatherings
  • 06_Incident_Intelligence
  • 07_Institutional_Patterns
  • 08_Evidence_and_Prevention
Versioning: Keep this HTML file alongside the PDFs. When updating, increment the version badge in the sidebar and store the old copy as an archive snapshot.

Document notes

Metadata, update notes, and constraints.

Built as a single-file HTML page with embedded CSS and small JS helpers. Intended for offline use and local sharing.

Last compiled: 2026-03-05

Safety note: This atlas avoids weapon instruction and offensive tactics. It focuses on prevention, deterrence, hardening, situational awareness, and crisis management.