Physical Security (25%) Flashcards
CPTED
What are the 8 Main categories of Physical Security Measures
- CPTED (Crime-Prevention Through Environmental Design
- Physical barriers & site hardening
- Physical entry & access control
- Security Lighting
- Intrusion Detection
- Video Surveillance
- Security Personnel
- Security policies & procedures
CPTED
What can lead to a reduction in the opportunity fear & incidence of predatory, stranger-to-stranger type crime?
Proper design & effective use of the built environment
CPTED
¿Qué puede también resultar en una mejora de la calidad de vida: cómo y dónde vivimos, trabajamos y jugamos?
CPTED
CPTED
CPTED should be integrated into…?
The design & function of the buildings or location
CPTED
All Human Space…
Has some designated purpose
Has social, cultural, legal or physical definitions that prescribe the desired & acceptable behaviors
Is designed to support & control the desired & acceptable behaviors
CPTED
CPTED is the design or redesign of a venue to reduce crime opportunity & fear of crime through?
Natural Means
Mechanical Means
Procedural (organizational) means
CPTED
At its core, CPTED is based on common sense & a heightened awareness about how people use their space for legitimate & criminal intentions
CPTED
3 Classes of CPTED Strategies
- Mechanical measures
- Organizational measures
- Natural or architectural measures
CPTED Strategies
Natural access control
Natural surveillance
Natural territorial reinforcement
Management & maintenance
Legitimate activity support
Compartmentalization
CPTED
Methods for implementing CPTED
Organized methods (staffing)
Mechanical methods (technical products)
Natural methods (site planning, design, landscaping, signage)
CPTED
Once the first window is broken, vandalism and/or other crime quietly follow if it is not prepared
Broken Window Theory
CPTED
CPTED is congruent with the 3 D’s
Deterring
Detecting
Delaying aggressors
CPTED
Preventing crime & losses is inherent in many human functions behaviors & activities
CPTED
CPTED security standards focus on 4 categories
- Perimeter & exterior security
- Entry security
- Interior security
- Security planning
CPTED
Types of CPTED Security Zones
- Unrestricted zones
- Controlled zones - authorized personnel in these general areas
- Restricted zones - authorized personnel in these specific areas
CPTED
Deterrence is achieved through…?
Measures that potential adversaries perceive as too difficult to defeat
CPTED
For the security professional, CPTED is a set of management tools targeting…?
Places
Behavior
Design & Use of Space
CPTED
What is more cost-effective than making changes after construction starts
Integrating CPTED during the initial planning
CPTED
Whenever possible, security planning should begin during…?
Site Selection
CPTED
CPTED is intended to be integrated throughout the construction process
Programming
Schematic Design (SD)
Design Development (DD)
Construction documents or working drawings (CD)
Bids for construction & selection of contractor (RFP)
Security needs should be addressed int he programming phase
CPTED
Establish a secure perimeter around the building as far out as possible… setbacks how far?
100 ft. is suggested
CPTED
Where should you position concrete flower planters etc…?
Near curbs less than 4 ft between them to block cars
CPTED
Locate parking as far from the building as practical & place it within view of occupied rooms or facilities
CPTED
Landscaping Considerations
Low growing plants should be set back 1 yard from the edge of paths or walkways
Low-growing shrubs should be kept no higher than 32” in height
Tree canopies should be trimmed up to 8’ to provide a clear line of the site & reduce hiding spots
CPTED
Parking garages should be equipped with what?
- 3 ft. or higher shrubs/trees should be 10-15 ft. from the structure
- Booths should have 360 degrees visibility & a means of communication
- No public restrooms but should be within view of the booth
- One vehicle entry/exit should be used if possible (based on traffic volume)
- Open-walled, upper levels to allow natural surveillance & permit hearing of calls for help
- Egress only exterior pedestrian doors
CPTED
Parking Garages (ctd…)
- Potholes in solid walls for visibility
- Stairwells & elevators in a central location visible from both
- Stairwells visible from exterior & offering no hiding place & no roof access
- Elevators with glass for exterior visibility along the exterior of the facility
- Access only to the lobby from the garage elevators or stairs
- Adequate lighting
Access Control
Refers to the process of managing databases or other records & determining the parameters of authorized entry, such as who or what will be granted access when they may enter where access will occur
Access Control
Access Control
Categories of Access Control
Manual
Machine Aided
Automated
Access Control
Types of attacks used to defeat access controls
Deceit
Direct Physical Attack
Technical Attack
Entry Control
An entry control subsystem includes the following performance measures…
Throughout
Error Rates
Entry Control
An Entry Control Subsystem
- is not an access control system
- Is part of the detection system
- Allows the movement of authorized personnel & material into & out of facilities
- Detects & possibly delays movement of unauthorized personnel & contraband
- Refers to the physical equipment used to control the movement of people or material into an area
Entry Control
Objections of an entry control system used for physical protection are…
- To permit authorized persons to enter & exit
- To detect & prevent the entry or exit of contraband material (weapons, explosions, unauthorized tools, or critical assets)
- To provide information to security personnel to facilitate assessment & response
Entry Control
Verification of authorization of personnel to enter a controlled area is usually based on…
- Carrying a valid credential (what you have)
- Knowing a valid PIN (what you know)
- Possessing the proper, unique physical characteristics on file (who you are)
Badge Technologies
Magnetic Stripe (“mag stripe”)
- Widely used in commercial credit/debit cards
- Low-coercivity (“LoCo”) cards are 300 oersteds; easy to erase; typical of credit/debit cards
- High-coercivity (Hi - CO) cards are 2500 to 4000 oersteds; hard to erase, but can be done with rare_earth magnets; typical of company badges
- Easily forged, duplicated (can use proprietary encoding schemes but not common)
Access & Entry Control
Badge Technologies
- Magnetic Stripe
- Bar Code
- Proximity
- Smart Card
Access/Entry Control
Badge Technologies Proximity…
- Small RF transponder/transmitter is powered by an onboard battery (active) or it is energized by the card reader (passive)
- Low-frequency badges are in the 125 KHz range
- High-frequency badges range from 2.5 MHz to over 1 GHz
Access/Entry Control
Badge Technologies - Smart Card
- Gold contacts on the surface of the card allow for communication with a reading device
- Contactless smart cards use RF communications & do not have the gold contacts
- Main advantages: Large memory & its high degree of resistance to forgery or compromise
- Ability to encrypt communications
- Can be prohibitively expensive
- Homeland Defense Presidential Directive (HSPD 12)
Access/Entry Control
Personal Identity Verification System
Biometrics
- Corroborate claimed identities on the basis of one or more unique physical biometric characteristics of the individual
- Can differentiate between: verification & recognition
Access/Entry Control
Personal identify verification systems
All personal identity verification systems consider 3 things
- The uniqueness of the feature used for identification
- The variability of the characteristic
- The difficulty of implementing the system that processes the characteristic
Personal identity verification systems
Type 1 error rate:
False rejection of a valid user
Personal identity verification systems
Type II Error rate
False acceptance of an invalid user
Access/Entry Control
Personal identity verification systems
Equal error rate
- Cross-over point where Type 1 & Type 2 errors are equal
- Not necessarily the point at which the device should be operated
- Not the lowest point for either type of error
Access/Entry Control
Personal identity verification systems
Finger Prints
- Still considered one of the most reliable means of distinguishing one individual from another
- Most systems use image processing & pattern recognition
Minutia points
Ridge endings
Bifurcations
Access/Entry Control
Personal identity verification systems
Hand/Finger Geometry
- Characterizes the shape of the hand
- Measures 3-dimensional features of the hand such as the widths & lengths & the thickness of the hand
Personal Identity Verification System
Eye Pattern
- Imaging of iris by a video camera
- Operates in the recognition mode
- 10 - 12” read distance (no physical contact)
- 2% of population cannot be enrolled due to blindness or other eye issues
Personal identity verification system
Face
- Utilize distinguishing characteristics of the face
- Captured with video camera or thermal image
Personal identity verification system
Voice
- Speech measurements: waveform envelope, voice pitch period, relative amplitude spectrum, resonant frequencies of the vocal tract
- Low security, easily deployed, more public acceptance (low distrust)
Personal identity verification system
Handwriting
- Used for many years by the bank
- Signatures can be easily forged
- Handwriting dynamics include displacement velocity & acceleration
Access/Entry Control
Access control barriers include…
Doors
Gates
Turnstiles
Elevators
Access/Entry Control
Vehicle access controls are…
Manual
Electronic
Access/Entry Control
Electro-Mechanical Lock Types
- Electric deadbolts
- Electric latch
- Electric strike
- Electric lockset
- Exit device
- Electromagnetic lock
Access/Entry Control
Device unlocks upon loss of power (but may stay latched - “positive latching”)
Fail Safe
Access/Entry Control
Device locks upon loss of power
Fail Secure
Access/Entry Control
Single action / motion egress
One action/motion required to release door to exit
Alarm Communications & Display (AC&D)
The part of a PPS that transports alarm & assessment information to a central point & presents the information to a human operator
AC&D: Alarm Communication & Display
The most important measure of AC&D Effectiveness?
How well it quickly & clearly communicates alarm data from sensors to the system
AC&D
Two critical elements of alarm communication & display
- Transportation or communication of data
- Presentation or display of that data to a human operator in a meaningful manner
AC&D
When an alarm occurs, the AC&D system must communicate to the operator the following information
- When an alarm has occurred
- What or who caused the alarm
- When the alarm happened
AC&D
Security communications require the following assurances
- The integrity of the communications medium (availability of the message path)
- The integrity of the message (complete & errorless transmission of the data)
- Timeliness of the transmission (data communication within an appropriate time frame)
- Message security (accessibility of the communication to authorized persons only)
AC&D
Communications Security - Line Protection
- Outside lines should be installed underground
- Inside wiring should be encased in conduit
AC&D
Communication Security - Line Supervision
Simplest line supervision: End-of-line (EOC) resister (detects open circuit, ground, wire-to-wire short)
AC&D
Communication Security - Scramblers
- Disguise interceptible communications
- 2 characteristics of voice that can be scrambled
frequency (pitch of voice) (most typically scrambled)
Amplitude (loudness)
AC&D
Transmission of Alarm Signals
Alarm signals may be transmitted on an unshielded pair of direct current (DC) Conductors
AC&D
Signals also may be transmitted on…
Lines installed to carry electric power
AC&D
Optical Fiber
A strand of high-purity, spun glass, typically about the thickness of a human hair
AC&D
Optical fibers can be used to carry…
- Voice-grade signals
- Video signals
- Digital or data grade signals
AC&D
Optical fibers differ from a conventional metal wire in several ways
- Not affected by (EMI) or (RFI)
- Don’t carry electrical current nor radiate signals
- Can carry many more multiplexed messages
- Much smaller & lighter than conventional
- Flexible & can take an irregular course from P to P
- Not vulnerable to interception by acoustical or inductive coupling
AC&D
Optical Fiber
Optical fiber is less expensive than copper
AC&D
Video Transmission Methods
Coaxial Cable
Telephone Lines
Optical Fiber
Dedicated Twisted Pair
DC Wire
AC&D
Video Transmission Methods
No processing required if transmission distance is short enough, typically 1,000 ft.
Video Transmission Methods
The transmission distance without amplification is 1 mile or more
Optical Fiber
AC&D
Good performance can be achieved at wire distances of up to 4,000 ft.
Dedicated Twisted Pair
AC&D
Video signals cannot be transmitted directly on DC lines
DC Wire
AC&D
3 Types of line transmission used in electronic protection systems
Loop
Point-to-Point
Multi-plexed
AC&D
Two methods used to separate multiplexed signals
- Time division multiplexing (TDM)
- Frequency division multiplexing (FDM)
AC&D
A wireless communication requires
- A transmitter to furnish radio frequency energy
- An antenna to radiate the energy into the atmosphere
- A receiver
- Power for the transmitter & receiver
AC&D
Wireless Transmission
Any unscrambled or unencrypted communication transmitted by wireless technology should be considered available for interception
AC&D
Voice radio (2-way radio) cost & power are determined by
- The distance required to communicate
- Barriers in the transmission path
- Signal interference in the area
AC&D
Microwave Transmission
- Operates between 30 - 300 GHz
- Requires microwave generator, power, amplifier, modulation, antenna
- One-way & two-way communications
- Often require FCC licenses
- Penetrates rain, fog, snow & man-made noise
- Used in television, multiplexed telephone, multiplexed alarm & high-speed data transmissions
- Line-of-sight (LOS) required
AC&D
Laser Communication
- Light amplification by stimulated emission of radiation (LASER)
- Laser light is modulated at a very rapid rate
- A photo-detector at the receiver demodulates the laser
- Virtually impossible to intercept without detection
- A 4-mile transmission line of sight
- Reflected can be used but the resolution is reduced
- interference from snow, fog, and rain
- No FCC license required
AC&D
Most common causes of wireless interference
- Signals from other transmitters
- Industrial & atmosphere noise
Intrusion Detection
The process of detecting a person or vehicle attempting to gain unauthorized entry into an area
Intrusion Detection
Intrusion Detection
Considerations for intrusion detection systems
- Should meet security needs of the facility
- Should operate in harmony with other systems
- Should not interfere with business operations
- Should be cost effective
Intrusion Detection
Basic building blocks of an intrusion detection systems
Sensors
Intrusion Detection
Detection criteria for a sensor or sensor system includes
- What will be detected
- What actions are expected
- Weight or speed of movement
- Probability of detection required
Intrusion Detection
3 main characteristics of intrusion sensor performance are…
- Probability of detection (PD)
- Nuisance Alarm Rate (NAR)
- Vulnerability to Defeat
Intrusion Detection
If the sensor is inappropriate for the operating environment or threat, or not installed, operated, maintained & tested properly, the output of an entire system, is severely limited, becoming a greater burden than a benefit - sensor selection must match the application & environment
Intrusion Detection
Probability of Detection
- Perfect is a “1” - reality is always less than “1”
- Confidence Level (CL) is often described in conjunction with PD - unstated CL implies a 90% or better confidence level
- PD is always conditional
- PD also varies by the sophistication of threat
- When high PD is required at all times & all weather conditions, use of multiple sensors
Intrusion Detection
Probability of Detection
PD depends primarily on these facts:
- Target to be detected (walk, crawl, tunneling etc…)
- Sensor hardware design
- Installation conditions
- Sensitivity adjustment
- Weather conditions
- Condition of the equipment
Intrusion Detection
A nuisance alarm is any alarm not caused by an intrusion
- The NAR identifies the number of nuisance alarms over a given period (ideally zero, but not realistic)
- Alarm assessment is needed to preserve manpower without assessment, detection is incomplete
- Natural causes: vegetation, wildlife, weather conditions, etc…
- Industrial causes: ground vibration, debris moved by wind, electromagnetic interference, etc..
Intrusion Detection
A false alarm is a nuisance alarm generated by the equipment itself
- Acceptable false alarm rate (FAR) should also be specified
- Poor design inadequate maintenance or component failure
Intrusion Detection
Vulnerability to Defeat
- All sensors can be defeated
- The objective is to make the system very difficult to defeat
- Two general ways to defeat the system
Bypass: going around the detection
Spoof: passing through sensor’s normal detection zone without generating the alarm
Intrusion Detection
Occurrence of a potential intrusion event…
Intrusion
A change in the condition being monitored
State
Intrusion Detection
Loss of electrical power: or failure of the sensor itself
Fault Event
Intrusion Detection
Opening, shorting, or grounding of the device circuitry, the enclosure of control panels
Tamper
Intrusion Detection
Five ways of classifying intrusion sensors
- Passive or active (interior & exterior)
- Covert or overt (interior & exterior)
- LOS or Terrah following (exterior only)
- Volumetric or line detection (point) (interior & exterior)
- Application (interior & exterior)
Intrusion Detection
Two types of passive sensors
- Detect target-generated mechanical energy (walking climbing vibration)
- Detect target-emitted energy in a natural field of energy (heat, sound, magnetic field etc…)
Passive Sensors
- Sensors are harder to locate by aggressors because they do not emit energy
- Safer to use in an explosive environment
- Passive infrared, mechanical activity (walking climbing) vibration etc…
Active Sensors
- Transmit energy & detect changes to it
- Includes transmitter & receiver (bi-static)
- Create fewer nuisance alarms
- Microwave, infrared, RF etc..
Separate Transmitter & Receiver
Bistatic
Transmitter & Receiver are Combined
Monostatic
Detect interruption at a fixed, or volume of space
Volumetric Sensors
Detect intrusion at a specific point or alarm time
Line or Point Sensors
Intrusion Detection
Types of motion detectors
Microwave
PIR
Dual Technology
Ultrasonic
Beam Detectors
Intrusion Detection
Video Motion Detectors (VMD)
- Passive, covert, line-of-sight
- Exterior or interior applications
- Sufficient lighting & resolution required
- Nuisance alarms can be plentiful - flickering lights, vegetation movement, animals, rain, camera noise
- Analytics improve NAR
- Digital is more sophisticated but analog is less expensive
- Most VMDs susceptible to very slow movement
VMD
Video Motion Detection is based on pixel changes
- Changes in brightness or contrast
- Local movement across adjacent cells
- The speed of motion across all cells
- Size of objects within cells
- Global changes across most or all cells
Wireless Sensors
Operate in the 300 MHz or 900 MHz bands
Issues with wireless sensors include
- Collisions: multiple messages received at the same time causing none to be read
- Fading: degradation of the signal due to distance
- Interference: other signals overpowering the sensor’s signals
Line supervision techniques
- Reverse polarity
- Sound monitoring
- Radio class C
- Steady direct current class B
- Tone
- Digital classes A & AB
Exterior application sensors are divided into 3 categories
Buried Line
Fence-associated
Free Standing
Exterior perimeter intrusion sensors
- Typically used by government, nuclear, & correctional facilities
- Ported coaxial cables
- Fence disturbance sensors
- Sensor fences
- Electric field or capacitance
- Bistatic microwave sensors
- Exterior video motion detectors (VMDs)
Ported Coaxial Cables
- “Leaky Coax”
- Active, covert, terrain-following
- Buried underground
- Respond to objects with high dielectric constant or high conductivity (humans, vehicles, etc)
- Outer jacket of cable is “ported” to allow the signal to leak out
- Range is 1.5 to 3 ft above the surface & about 3 - 6 ft wider than the cable separation
- Nuisance alarms sources include metals, water, utility lines, large quantities of salt or metals in soil
Fence Disturbance Sensors
- Passive visible terrain-following
- Attached to fence
- Detect motion or shock
- One of several technologies: fiber-optic, strain-sensing vibration-sensing
- Nuisance alarm sources are common, including wind rain/hail, nearby vibrations
- Can be defeated by crossing over the fence w/o touching it or tunneling under
- Fence posts should flex/move no more than .5” against a 50 lb. force at 5 ft height
- Fence fabric should flex/move no more than 2.5” against a 30 lb. force centered between posts
Sensor Fences
- Passive, visible, terrain-following
- Sensor cables form the fence itself
- Horizontal-stretched high tension wires at 4” or less apart
- Includes taut-wire fences
- Designed to detect climbing, separation of wires or cutting
- Less susceptible to nuisance alarms - requires about 25 lbs. of force to activate the alarm
- Can be defeated by crossing over the fence w/o touching it, or tunneling under the fence
Electric field or capacitance sensors
- Active, visible, terrain-following
- Detects change in “capacitive-coupling” in wires isolated from the fence itself
- Range can extend to 3.3 ft (more nuisance alarms)
- Susceptible to lightning, rain, small animals, motion of the fence itself
- Requires good electrical grounding
- Less susceptible to crossing over or tunneling under fence
Free-Standing Infrared Sensors
- Active, visible, line-of-sight, free standing
- .9 micron wavelengths - invisible to the human eye
- Beam is transmitted through a “collimating” lens & received by a “collecting” lens
- Multiple beams required for higher security applications (typically a 2” x 6” detection range)
- Nuisance alarm sources include snow, fog, dust, vegetation, etc…
Bistatic Microwave Sensors
- active, visible, line-of-sight, freestanding
- 10 GHz or 24 GHz spectrum
- “Vector Sum”: Direct & reflected microwave energy received by the receiver
- Susceptible to crawling or rolling under beam if the ground is not very flat or distance between antennae is more than 120 yds.
Offset Distance: zone of no detection about 10 yds. out from the transmitting antenna - requires overlapping zones of 20 yds
Bistatic Microwave Sensors (Ctd..)
- Sensor bed surface is composed of 4” of 1.5” or smaller gravel to eliminate nuisance alarms from standing water
- The largest detection zone is midway between sensors - approximately 4 yds wide x 3 yds high
- Nuisance alarm sources include vegetation higher than 1-2”, loose chain link fabric, heavy snow
Exterior, perimeter intrusion sensors
Perimeter detection systems should use protection-in-dept philosophies,** relying on **two or more simultaneous lines of detection, especially in high-security facilities
Exterior, perimeter intrusion sensors
Complimentary sensors may also be considered to increase the effectiveness of a sensor deployment
- each sensor brings its own strengths & weaknesses to the overall security plan - complementary sensors do not have the same nuisance sources & probability of detection under each possible scenario
- Sensors should be prioritized for assessment purposes - higher PD sensors have first priority
- Configuration of multiple sensors should be arranged to provide overlapping coverage AND separate lines of coverage
Exterior, perimeter intrusion sensors
Sensor combinations operate in two ways
- OR basis: Either sensors trigger the alarm high PD, higher NAR
- AND basis: Both sensors are required to trigger the alarm, lower PD, lower NAR
Perimeter-in-depth philosophies
Clear zones bounded by fences on both sides are preferable for perimeter detection systems
No sensors should be mounted on the outside fence
Exterior, perimeter intrusion sensors
Physical & environmental conditions affecting perimeter detection system
Topography (gullies, slopes, water, etc)
Vegetation (motion from wind, sources of concealment/cover)
Wildlife (large animal interference with sensors, small animal burrowing & chewing
Background noise (wind, traffic, EMI, seismic activity)
Climate & weather
Soil & pavement (soil conductivity, seismic conductivity)
Exterior, perimeter intrusion sensors
Barriers designed to delay intrusion should be placed along the inner fenceline of a dual-fence line clear zone, to prevent tampering with the barriers without first traversing the detection zone
Exterior, perimeter intrusion sensors
A clear zone “compromise” width between 10 & 15 yds. facilities reduction of nuisance alarms (wide) & high resolution for alarm assessment by cameras (narrow)
Interior intrusion sensors
Interior application sensors are divided into 3 categories
Boundary - penetration
Interior - motion
Proximity - sensors
Interior intrusion sensors
Two important physical conditions that affect sensor performance
Building or room construction
Equipment & objects that occupy the space
Interior intrusion sensors
Electromechanical Sensors
- Passive, visible, line/point sensors
- Magnetic reed switches (doors, windows, etc..)
- Balanced magnetic switches (BMSs) or bias magnets higher sensitivity than reed switches, less susceptible to spoofing
- Hall effect switch detects field of magnet-no moving parts - measures charge separation & polarity - most advanced switch
- Continuity/break wire - wires embedded or attached to surface, activated by cutting (security screens) low NAR (may use optic fibers instead)
Interior intrusion sensors
Vibration Sensors
- Passive visible or covert
- Jiggle switches
- Inertial switches: a metal ball mounted on metal contacts - detects vibration frequencies between 2-5 KHz
- Piezoelectric sensors: sensing element that flexes at frequencies between 5-50 KHz
- Fiber-optic cables detect micro-bending caused by vibration
Glass-break Sensors
- Glass-mounted, passive (vibration activated); detect > = 20 KHz vibrations
- Glass-mounted, active; generate vibrations received by another device elsewhere on the glass (lower NAR)
- Ceiling-mounted, passive; listen for the frequency of breaking glass; volumetric by design; not vibration activated
Interior Motion Sensors
- Monostatic microwave (common)
- Passive infrared (PIR) (Common)
- Dual Technology
- Video motion detection (VMD)
Interior intrusion sensors
Passive Infrared (PIR)
- Passive to human heat approximately equal to heat from the 50-watt incandescent light bulb
- Responds to infrared energy in the walkthrough band between 8 & 14mm
- Minimum Resolvable Temperature: Difference in heat between target & background (can be as low as 1-degree Celsius)
Interior intrusion sensors
Microwave
- Active, visible, volumetric
- 10 GHz frequency range: senses doppler shift of the returned frequency
- Best positioned to sense aggressors moving towards or away from a sensor; slow-moving targets may spoof microwave sensors
- Microwave horn, printed circuit planar, or phased array antenna
- Various detection patterns available; concave portion of detection zone is vulnerable
Microwave
- Penetrates most glass & normal wall materials (not metal)
- Immune to high air turbulence & temperature /changes; susceptible to “pattern drift”
- Often used in automatic door openers; multiple microwave sensors in the same area must be on different frequencies
- Ionized gas in fluorescent lighting can reflect microwaves & cause nuisance alarms
Proximity Sensors
- Pressure Mats
- Capacitance Sensors
Pressure Mats
- Largely obsolete - replaced by motion detectors
- Detected weight 5-20 lbs per sq. ft
- Still used in security portals (man traps) to prevent tailgating - based on valid user’s weight in database
Capacitance Sensors
- Large, electrical condenser that radiates energy
- Detects changes in capacitive coupling between antenna & the ground
- Target touches protected object & absorbs some of the radiated energy generating on alarm
CPTED
Should be divided into smaller, more clearly defined areas or zones
Defensible space, per Oscar Newman
Video surveillance systems
When selecting a video surveillance
Uses a systems approach rather than a components approach
Video surveillance systems
The following parameters determine the effectiveness of a video assessment subsystem
- Minimum time between sensor alarm & video display
- Complete video coverage of the sensor detection zone (called the assessment zone when sensors & video are integrated)
- Ability to classify a 1 ft. target at the far edge of the assessment zone
- Vertical field of view at the far edge of exterior detection zone = height of a standard fence & person climbing it
Parameters Ctd…
- Continuous operation, 24/7
- Minimal sensitivity to environmental conditions, for all cameras
- Minimal obscuration of the assessment zone (such as trees, fences, furniture, etc)
- Camera FOV & recording system integration displays the alarm source to an operator
Video Surveillance
3 reasons for cameras in security applications
- Obtain visual information about something that is happening (most important)
- Obtain visual information about something that has happened (most important)
- Deter undesirable activities
Video Surveillance
Primary uses of video surveillance systems
Detection of Activities
Recording of Incidents
Assessment of Alarms/Incidents
Video Surveillance
Main elements of video surveillance systems
Field of View (FOV)
Scene
Lens
Camera (including mounting hardware)
Transmission Medium
Monitor
Recording Equipment (analog/digital)
Control Equipment
Video Surveillance
Three main components of an analog video surveillance system
Camera
Transmission Cable
Monitor
Video Surveillance
3 main components of a digital video surveillance system
Camera
Digital electronic signal center
PC with software
Video Surveillance
In designing a video surveillance application security managers should keep in mind
- Video surveillance is a visual tool of security & should be applied accordingly
- Video surveillance systems should always be designed with future growth or changes to the needs of the application in mind
Designing Video Surveillance Ctd…
No matter what, the equipment of the system will become obsolete
- Obsolete does not necessarily mean ineffective or out of date for the application
- If a system is obsolete but performing well, its because the original application was correctly designed to meet performance needs
Key points for designing VS systems
- Once simplified the most complex electronic system can be managed by almost anyone
- The application drives the choice of equipment not the other way around
Video Surveillance
Simple Rules For Design
Keep system in perspective
Design generically
Design for best options first (budget after)
Don’t feel driven to build the system all at once
Video Surveillance
Steps for design
- Define the system’s purpose
- Define each camera’s purpose
- Define the area to be viewed by each camera
- Choose a camera style
- Choose the proper lens
- Determine best transmission method
- Layout control area
Video Surveillance
Resolution is determined by the following in order
- Camera
- The transmission method
- The weakest link in the video system interface
- The reproduction capability of the storage system
Limiting Factors
- Analog video recorders average a playback of 225 horizontal lines (very low)
- DVR’s digitize analog signals, dropping 25% of the resolution
- Sloppy installation or cheap coaxial cable costs 10 - 15% resolution
- Digital compression also reduces the resolution
Video Surveillance
All IP cameras measure resolution as a multiple of the Common Intermediate Format (CiF) about half the average 325 horizontal lines; not recommended as a usable standard for storage
- 1/4 CIF = 176 x 120 (3,520 pixels or .003 MPX)
- CIF = 352 x 240 (84,480 pixels or .08 MPX)
- 4 CIF = 704 x 480 (337,920 pixels or 0.3 MPX)
- 16 CIF = 1408 x 960 (1,351,680 pixels or 1.3 MPX)
- 32 CIF = 2816 x 1920 (5,405,720 pixels or 5.4 MPX)
- A 4 mp camera = resolution of 400 ASA film
- A 6mp camera = resolution of 100 ASA film
- most effective & current standard for digital video compression is the H.264 compression algorithm
3 Considerations when determining video surveillance field & view (FOV)
Target (person, vehicles, etc…)
Activity (assault, slight of hand)
Purpose (identification vs. general monitoring)
Video surveillance systems are designed to be only two things
Visual assessment (what’s happening now)
Visual documentation (What happened previously)
3 Theoretical identification views of an analog VSS
1. Subject identification
2. Action identification
3. Scene identification
VS - Fields of view (FOV)
Theoretical identification views of a digital VSS
General: Can’t distinguish clothing & color - pixelated zoom (5 pix/ft)
Monitor: General vehicle/human traffic flows - no serious detail on zoom (7 pix/ft)
Detect: Detect but not identify person-sized object - no significant detail on zoom (4 pix/ft)
Observe: Clothing/colors gain distinction - no good detail on zoom (18 pix/ft)
Recognize: High degree of accuracy identifying & separating known individuals - good detail on zoom (35 pix/ft)
ID views of a digital VSS
Subject ID: Establish identity beyond a shadow of a doubt - the excellent detail on zoom (48 pix)
License Plat ID: ID of license plates - excellent detail on zoom (70 pix)
Facial Recog: Extreme details - excellent detail on zoom (88 pix)
VS - FOV
Identification of an object in video means…
The ability to differentiate between people’s identity
VS - FOV
Classification of an object in video means…
The ability to differentiate between humans animals etc…
VS - FOV
Cameras should not be required to view more than one major and one more minor objective
VS - FOV
Cameras should not auto-pan more than how many degrees left or right of the major focus
45 Degrees
VS - Cameras
Major Types of Cameras
Analog
Digital / IP
Infrared
Thermal
VS - Cameras
4 Main Types of Cameras
- Standard analog CCD cameras
- IP address
- Infrared cameras
- Thermal cameras
VS - Cameras
3 basic styles of IP Cameras
- Standard
- Megapixel
- Smart (edge analytics etc.)
VS - Cameras
Infrared cameras require…?
IR Source
VS - Cameras
Which cameras do not require an IR source?
Thermal Cameras
VS - Cameras
Camera selection criteria, in order of importance
- Sensitivity (light)
- Resolution (image quality)
- Features (WDR, IR, analytics, etc)
VS - Cameras
Placement of cameras is dictated by
Angle of View
Pixels Per Foot
VS - Cameras
3 Basic sensitivities of cameras
Full - Light
Lower - Light
Low - Light
VS - Cam Lenses
The camera is selected before the lens
The lens is selected based on its ability to provide the desired identification information
VS - Cameras
The lens is one of the few elements of a video system not converting to digital
Various functions of the lens can be automated (auto-iris, zoom/varifocal, focus)
VS - Cameras
5 Main types of lenses
- Wide angle (best for 0 to 15’ ranges)
- Standard (best for 15 to 50’ range) equivalent to the view from the human eye)
- Telephoto (best for > 50’ range)
- Varifocal
- Zoom
VS - Camera lens
2 Differences between zoom & varifocal lenses
- The range of focal length is small in the varifocal
- Varifocal lenses do not have a tracking mechanism to align focal length with focus
VS - Video storage / recording
When storing & using security video, it is important to decide whether the system’s purpose is to…
Verify information
Prove information
Aid a prosecution with the information
VS - Surveillance / Recording
Types of Recorders
DVR: Analog inputs only, converted to digital in the box, stored on hard drive or external media
NVR: Analog or digital inputs, analog converted to digital, stored on hard drive or external media
Server / Cloud: Digital inputs stored on network storage devices
Locking Systems - Locks
- Most widely used methods of controlling physical access
- Among the oldest of security devices
- Should not be relied upon as the only means of physical protection for important assets
- Should always be used with complimentary protection measures
Locks
2 Classes of Locks
Mechanical
Electro-Mechanical
Locks
2 Major components of most mechanical locks
- A coded mechanism (key, cylinder, wheel pack, etc…)
- The fastening device (bolt, latch, etc…)
Locks
4 Component / Assembles of Locks
- Bolt or latch
- Keeper or strike
- Tumbler array
- Key
Locks
Vulnerabilities of mechanical locks
Attack by force (spreading, forcing, twisting, etc…)
Surreptitious attack (picking, raking, bumping, etc…)
Impressioning & try keys
Locks
- Warded (1st type, very weak security, skeleton keys, old houses, antiques)
- Lever (18th century, more security than warded locks, master keyable, safe deposit boxes)
- Pin tumbler (19th century, Linus Yale, most widely used, can be high security, residential/office locks, master-keyable
- Wafer tumbler (sometimes double-bitted boys, mostly furniture locks, lower security than pin tumblers, master-keyable
- Dial Combination (safes, mechanical or electronic
Locking Systems
Without ? security will usually degrade to more privacy
Lock Planning
Locking System Considerations
- Total number of locks
- Major categories of sectors of the system
- Security objectives
- Size & turnover of populations
- Related or supportive security subsystems
- Intelligence or information requirements
- Criticality of asset exposure
Locks
Proper lock planning requires…?
Combination of the “totality” of the area (strengths of doors & walls, drop ceilings, etc..)
Locks
Locking policy should do the following
- Require a systematic approach be taken to the use of locks for security purposes
- Assign specific responsibility for the development of the lock program
- Make all persons responsible for compliance with the program requirement
Locks
Lock Change Methods
- Re-arrange or rotate the locks among doors
- Re-key the locks (most effective
Locks
Master Keying
3 Major security difficulties
- Effective master key accountability
- Manipulations are easier
- Additional maintenance
Lighting
3 Primary functions of security lighting
- Deter criminal activity
- Life safety functions
- Support of video surveillance
Lighting
Typical Lighting Costs
Capitol (upfront costs) approx. 8%
Energy (approx. 88%
Maintenance (4%)
Lighting
Major components of a lighting system
Lamp (bulb)
Luminaire Hardware
Electrical Power
Lighting Terms
Quantity of light emitted by a lamp
Lumen
A typical 100-watt incandescent bulb outputs about 17000 lumens
Lighting Terms
The concentration of light over a particular area
Illuminance
- Floodlight generating 1k lumens illuminates 50’ away
- Spotlight generating 1k lumens illuminates a small area 50 ft away
- Both lights output the same lumens
- Each light generates a different level of illuminance from the same distance
Lighting Terms
The US measures of illuminance (lumens per sq. ft)
Foot Candles
Lighting Terms
Metric measure of illuminance (lumens per sq. meter) 1 FC = 10.76 lux (approximately 10:1 ratio)
Lighting Terms
Illuminance level of the scene
Scene Illuminance
Lighting Terms
Illuminance of the camera lens
Faceplate Illuminance
Lighting Terms
Lumens/watts (output divided by consumption)
Efficacy
Lighting Terms
Initial, cold start time of the light fixture
Strike Time
Lighting Terms
Re-Start time at a warm
Re-Strike Time
Lighting Terms
The percentage of light reflected from a scene which depends on the incident light angle, and the texture & composition of the reflecting surface
Reflectance
Lights - Color
Color rendition index (CRI)
- The scale of 0 to 100
- 70 to 80 CRI is good; above 80 is excellent 100 is daylight
Light Coverage
The measurement of variation in lighting levels
Uniformity
- Working environments are 1: 0.7
- A pedestrian walkway is 4:1
- A roadway is 10:1
- Higher uniformity levels provide better depth perception & greater perception of security
Light Uniformity & Coverage
What ration is preferred for a parking structure?
4:1 Uniformity Ratio
Landscaping environments can be expensive to light due to the numerous area of potential concealment
Lighting should be focused from the ground up into trees & shrubs to deter concealment
Lighting ratios in parking lots should not exceed…?
4:1
Lighting
A bright white, horizontal strip along the interior walls of parking structures provides higher contrasts & facilitates object identification
Lighting
Along with building facades where individual exterior objects cannot be adequately lit, providing a high contrast will give good identification of shape & movement - flood lights work well for this purpose
Lighting
What should the height of light poles in parking areas be to reduce shadows & dark spots?
12 - 14 Feet
Lighting
What kind of lighting is preferred outdoors because?
- Broader, more natural light distribution
- Requires fewer poles
- Is more aesthetically pleasing
High Mast Lighting
Lighting implications to video surveillance
The successful deployment of even the simplest VSS requires an understanding of…
- Relative levels of the scene illumination produced by natural sources
- The amount of light reflected from typical scenes
- The resultant faceplate illumination levels required by the variety of image tube & solid-state imagers
Light
Lighting considerations for video surveillance
- CRI
- Reflectance of materials
- Directionality of reflected light
The two most important parameters of a lighting system for video surveillance are its…?
- Minimum intensity
- Evenness of illumination
Light
Cameras are light-averaging devices - All lighting in the camera’s FOV must be…
Even, not just the target areas
Lighting
The sensitivity of a CCTV camera can be defined as the minimum amount of illumination required to produce a specified output signal
The following factors are involved in producing a video signal
- Illuminance level of the scene
- Spectral distribution of the illumination source
- Object reflectance
- Total scene reflectance
- Camera lens aperture
- Camera lens transmittance
- Spectral response of the camera imager
- Video amplifier gain, bandwidth, & signal-to-noise ration
- Electronic processing circuity
Lighting
Minimal output video signal is usually?
1 Volt peak-to-peak (VPP)
Lighting
Camera sensitivity may sometimes be overstated based on these two, commonly used factors
- Higher scene reflectance than normally encountered
- Greater transmittance than is commonly available in standard auto-iris lenses with neutral density spot filters
Lighting
A minimum of 1.5 fc is required for a camera system using on f / 1.8 or faster lens & a solid-state imager
- This assumes reflectivity of 25%
- This also assumes a light; dark ratio of no more than 4:1
- 4:1 ratio is allowed to creep to 6:1 as materials age
Protective Lighting
Protective Lighting Types
- Standby
- Continuous
- Moveable
- Emergency
- Glare projection
- Controlled
Lighting
General security lighting equipment
Streetlight
Searchlight
Floodlight
High Mast Lighting
Lighting
The number of luminaires required to cover an area is a function of…
- The area to be covered
- Light levels required
- The height of the luminaires & their design
- Type of lighting used
Lighting
Rule of thumb for outside lighting
You should be able to read a driver’s license or newspaper with some eyestrain
Lighting
The general rule for lighting levels with regard to Identification of subjects
- Detection (someone is there) - 0.5 fc
- Recognition (recognizing the person) - 1.0 fc
- Identification (evidentory) - 2.0 fc
Perimeter fence = 0.50 FC
Outer perimeter = 0.50 - 2.00 FC
Open area = 2.00 FC
Open parking lot = 0.20 - 0.90 fc
Covered parking lot = 5.00 fc
Pedestrian walkway = 0.20 fc
Pedestrian entrance = 5.00 fc
Vehicle entrance = 10.00 fc
Building facade = 0.50 - 2.00 fc
Gatehouse = 30.00 fc
Loading dock exterior = 0.20 - 5.00 fc
Loading bay = 15.00 fc
Office general = 30.00 - 50.00 fc
Office task = 50.00 - 30.00 fc
Interior public area = 10.00 - 20.00 fc
Retail store = 50.00 fc
Bank - lobby = 20.00 fc
Bank - teller = 50.00 fc
Bank - ATM = 15.00 fc
Lighting
Typical Reflectance Levels
- Asphalt = 5%
- Concrete (old) = 40%
- Concrete (new) = 25%
- Red bricks = 25%
- Grass = 40%
- Snow = 95%
Lighting
Lighting levels may cause a light trespass onto adjoining properties, including sidewalks & roadways
Lighting
Light trespass must not cause glare or excessive contrast to drivers & pedestrians, both on and off the organization’s property
Lighting
A dirty environment may result in a reduction of up to 20% per year in light output due to dirty lighting
Lighting
Lighting output in an office or other clean environment declines by 3 - 4% each year due to dirt accumulation on lighting fixtures & bulbs
Barrier Purposes
- Physically & psychologically deters the undetermined
- Delays the determined
- Channels authorized traffic
- Discourages unauthorized traffic that takes place by Accident Force Stealth
- Explicitly defines territorial boundaries
- May be used to preventing views of the facility
- May be used to preventing placement of listening devices
Barrier Notes
- Should be supported by interior clear zone whose width depends on the threat
- Should be supplemented by sensors and/or other security measures
- Should not provide concealment opportunities
- Should not obstruct lighting, video surveillance, or intrusion detection
- Should not facilitate observation of the facility
A dirty environment may result in a reduction of up to 20% per year in light output due to dirty lighting
Recommended Light Cleaning Cycle
Every 3 Years
Barrier Types
Natural
Structural
If a barrier’s effectiveness is uncertain it should be considered a potential obstacle
Selection & placement of barriers depend on the adversary’s objective
Balanced Design
What provides equal delay - No weak links?
Layered Barriers
Balanced Design
Barrier penetration begins how many feet in front of the barrier & ends how many feet beyond it
2 FT & 2 FT
Barriers
Fences & Walls
- Are the most common perimeter barriers
- Define areas & give notice of a protected property line
- Demonstrate commitment to security & may stop a casual trespasser
- Channel traffic & reduce the required number of security personnel
- Provide intrusion detection and/or video surveillance zone
- Force intruders to demonstrate intent
- Must be maintained
Barriers - Walls
Walls are generally more resistant to penetration than the doors, windows, vents, & other openings
- Most can be breached with the right tools
- Using explosives & cutting tools and adversary can make a “crawl hole” through 18” reinforced concrete in under 5 min.
- Increasing wall thickness usually adds only a moderate delay against explosives, even though the amount of explosive needed increases substantially with a wall thickness
- Ordinary reinforced concrete walls can be penetrated quickly because they are generally designed to support structural loads, not to thwart or delay penetration
Walls ctd…
- Placing two or more reinforced concrete walls in series results in longer penetration delays than using one wall that is thick as the two walls combined
- Removing the rebar often takes longer than removing the concrete; delay can be increased by using additional rebar; increasing rebar size, or decreasing rebar spacing
Walls ctd…
- Use earth cover or other overburden to delay access to the wall itself
- Hardening a normally constructed building against forcing penetration for a significant period is rarely practical or cost-effective
Fences
Wire toppers on fences do not prevent intrusion but rolls of barbed tape on or near them can increase delay…
Fences
One of the most cost-effective additions to a fence?
Attach a roll of barbed tape to the outriggers
Fences
Where are barbed-tape rolls normally placed
Inside an outer-perimeter fence & outside on inner (double) fence
Fences
Which direction should outriggers point in order to eliminate the hand grip used by intruders when climbing over the fence
Towards the inside
Fences
Inner-fence-lines (double fence areas such as prisons) are spaced how far from the outer fence-line?
10 - 20 Ft
Electrified Fencing
What is the design of most industrial electrified fences?
8 ft. tall with 20 wires fitted to the inside of the chain link perimeter fence
Fences
Electrified fences pulses electrical energy 45 times per minute
Fences
2 Types of Electrified Fences
- All live wire “deterrent” fence (less common)
- “Monitored” fence (more common)
Fences
4 Basic Types of Expanded Metal
Standard / Regular
Grating
Flattened
Architectural or Decorative
Barriers - Gates
- Establish points of entry & exit to an area defined by fences & walls
- Limit or prohibit the flow of pedestrian or vehicular traffic
- Establish a controlled traffic pattern
- Should provide equal levels of delay as perimeter
Barriers - Doors
While walls may be hardened, doors tend to be a weak link in a structure because of their functional requirements & associated hardware
Barriers - Doors
If the door assembly cannot be sufficiently enhanced it may not be cost-effective to upgrade the building structure
Barriers - Doors
Most common exterior doors are 1.75” thick with 16 or 18 gauge steel surface sheets, usually, hollow or filled with composite material
Barriers - Doors
How long does it take to defeat exposed hinges & remove the door from the frame
1 Minute
How can a door vulnerability be mitigated?
By welding the hinge pin heads to the hinge knuckles, using the hidden “stud-in-hole” method, or affixing a z-strip to the rear face of the door
Barriers - Doors
Door Classifications
- Standard industrial doors
- Personal doors
- Attack- and bullet - resistant doors
- Vehicle access doors
- Vault doors
- Blast-resistant doors
- Turnstile gates
Barriers - Doors
Unnecessary external doors should be eliminated as well as unnecessary, external (exposed) door hardware
Barriers - Doors
How can doors be reinforced?
Steel plates on their surfaces, heavy duty hinges, and filling frames with concrete
Barriers - Doors
What increases the delay time for thermal cutting tools by 3x or 4x?
Installing wood cares in metal doors especially using redwood
What only requires 1/2” to 3/4” of space to defeat the lock?
Prying or spreading the jamb from the door
How can it be mitigated? Welded 2” wide metal strips, concrete - filled frames and high security deadbolts
Barriers - Windows
How can windows be hardened?
Additional or heavier fasteners in the frames, or by welding the frames
Barriers - Windows
Transparent plastic glazing
- Some types are combustible & their use may be restricted by fire codes
- Acrylic plastic like Lucite & Plexiglass, if less than one inch thick, can be broken with hand tools in less than 10 seconds
- Polycarbonates resist impact about as well as bullet-resistant glass
- Lexan in 1/2” thickness resists hand-tool penetration for up to 2 minutes
- Thermal tool attacks require about one minute but cause combustion & the release of toxic gases
Barriers - Windows
Glass/polycarbonate composite glazing contains a tough core of what?
Polycarbonate between 2 layers of glass
Windows
Glass/polycarbonate composite glazing is developed for use in prisons
Windows
The thickest panels of glass/polycarbonate lasted 10 minutes against miscellaneous steel tools
Barriers - Windows
Used often in fire doors & fire windows?
Wire Glass
Windows ctd…
Wire Glass is made up of…?
1/4” material fabricated with diamond, square, or hexagonal wire patterns
How fast can wire glass be penetrated with hand tools?
20 Seconds
Laminated Glass
- Made of two or more panes of annealed float sheet, or plate glass
- Bonded to a layer or layers of plastic
Windows
Safety glass that is 1/4” thick can be penetrated in…?
30 Seconds
Security glass that is 9/16” thick requires 15 minutes of work w/ hand tools to produce a crawl-through hole
Barriers - Utility Portals
Openings other than doors & windows, through which maintenance & other functions might be performed
Utility Ports
Barriers - Roofs
Can be enhanced in several ways (new & existing)
- Enhancing membranes w/ embedded screen
- Added several inches of rigid insulation
- Using concrete reinforced with deformed steel bars & expanded steel mesh
- Forming larger rebar into several rows or layers for reinforced concrete
- Increasing the number of fasteners & adding structural members to corrugated roofs
- Using mechanical fasteners or joints & a continuous weld & heavier gauge material on metal roof systems
- Using larger rebar to strengthen the flange area of precast concrete tee beams
Barriers - Roofs
Contemporary roof types’ include the following
- Prestressed concrete tee beam
- Metal subdeck & reinforced concrete
- Metal roof deck with lightweight concrete
- Metal roof deck with insulation
- Metal Roof
- Reinforced concrete beam & slab
- Wood sheathing with membrane
Barriers - Roofs
Which roof improvements provide the best value
- Penetration tests suggest that barriers placed below the roof may be more effective against penetration than those in the roof itself
- The optimal distance between the roof & the secondary barrier is 10” to 12”
- Earth coverings of both roofs & walls are effective delay barriers
Vehicle Barriers
Types of barrier methodologies
- Vehicle arrestor (slows vehicle to a stop)
- Crash cushion (cushions the impact that stops a vehicle) (moderate distance)
- Inertia device (rigid, heavy moveable objects)
- Rigid device (fixed devices) { a very short distance - almost immediate }
Vehicle Barriers
A moving vehicle possesses kinetic energy, which must be dissipated by the vehicular barrier
Vehicle Barriers
Optimum vehicular barrier height?
Almost 30” but can vary depending on threat vehicles
Vehicle Barriers
Since cable barriers are easy to defeat with hand-held tools, they should be used only in areas well patrolled or monitored with sensors or cameras
Vehicle Barriers
DOD “K - ratings” for barriers / barricades
- K4 stops a 15,000 lb. vehicle at 30 mph
- K8 stops a 15,000 lb. vehicle at 40 mph
K12 stops a 15,000 lb. vehicle at 50 mph
Vehicle Barriers
Vehicle barriers outside the detection & assessment zone are not recommended
Vehicle Barriers
Private vehicles should be kept in secured areas as much as possible
Barriers - Dispensible Barriers
Typically includes the following elements
- Process for deciding when to activate the barrier
- Command & control hardware
- Material deployed to delay access or incapacitate an aggressor
- Dispensing mechanism
- Security officers on-site
Dispensible Barriers
Barriers isolate the aggressor….?
Visually
Acoustically
At Location
(or any combination of these)
Dispensible Barriers
Passive dispensable barriers have no command and control component making them less expensive (but riskier)
Dispensible Barriers
Systems last 10 to 25 years, and active systems require routine maintenance
Safes & Vaults
Safes weighing less than 750 lbs are considered portable & UL standards require they be anchored in place
Safes & Vaults
Burglary resistant safes do not generally protect against fire
Safes & Vaults
Burglary / Fire Resistant Containers
Some containers can achieve UL rating for burglary & fire resistance
Fire - Resistant Safes
UL Classifications
350-4 (formerly A)
350-2 (formerly B)
350-1 (formerly C)
Fire Resistant Safes
Classification / Testing process also includes
A drop-test & harsher temperature test than filling devices
Insulated filing devices UL Class
350 - 1 (formerly D)
350 - 2 (formerly E)
Fire Resistant Safes
Classification / Testing process does not include a drop test
Different types of safes designed for records protection
- Fire-resistant safes & record containers
- Insulated filing devices
- Containers to protect magnetic media
- Electronic media containers are designed to protect contents to 125 or 150 degrees & 80% humidity for 1, 2, 3 & 4 periods (125-1, 150-1, 125-2, 150-2 etc)
- Different types of safes designed for records
1. fire-resistant safes & record containers
2. Insulated firing devices
3. Containers to protect magnetic media
Safes
- The minimum thickness of a 4-hour vault wall is 12” for brick & 8” for reinforced concrete
- The minimum thickness for a 6-hour vault wall is 12” for brick and 10” for reinforced concrete
Fire Resistant Vaults
Construction Standards
- Reinforced concrete with steel rods at least 1/2” diameter, spaced 6” on center & running at right angles in both directions
- Rods are wired securely at intersections not over 12” apart in both directions & installed centrally in the wall or panel
- A brick protection used is filled solidly with the steel with concrete
Burglary Resistant Vaults
- Avoid exterior wall location
- All 6 surfaces of a vault should give equal protection
- Unreinforced concrete should never be penetrated
(vaults are designed to resist penetration for a defined period)
- # 4 (1/2”) rebar & smaller diameters can be cut w/ hand tools
Contraband
Methods of Contraband Detection
Manual search
Metal detectors
Package searches (x-ray, etc)
Explosives detection (bulk and trace)
Chemical and biological agent detection
Contraband
Advantages to a manual search
Low hardware investment, flexibility
Contraband
Disadvantages to manual search
Slow throughput, higher labor costs
Metal Detectors
Magnetometer
Continuous wave
Pulsed field
Handheld
Contraband
Materials with low atomic numbers (“Z-numbers”) materials starting with hydrogen and ending with Z-number 26, Aluminum
Low-Z Materials
Contraband
Bulk Explosives Detection
- Macroscopic, detonable amounts of explosives
- Targets specific threat amounts of explosives
- Usually uses ionizing radiation that is not safe for use on people
- Measures X-ray absorption coefficient, X-ray backscatter coefficient, dielectric constant, gamma or neutron interaction, or microwave or infrared emissions
- Can determine calculated mass, density, nitrogen, carbon, oxygen content, and effective atomic Z number
Bulk Explosives Detectin (ctd…)
- Multiple-energy X-rays and backscatter X-rays more readily identify low Z-number materials
- Hi-energy X-rays are large, fixed mechanisms designed to scan large cargo containers
What may be combined with backscatter X-ray technology for detection of low Z-number materials?
High-energy X-rays
What devices can use gama rays or neutrons for detection (very high penetrating)?
- Thermal neutron activation (TNA)
- Pulsed fast neutron absorption (PFNA)
Detects the presence of nitrogen through gamma wavelengths
Thermal Neutron Activation (TNA)
What determines carbon and oxygen content?
Pulsed Fast Neutron Absorption (PFNA)
Determination of nitrogen, carbon and oxygen content lends more accuracy to separating explosives from foot items
Food items/cargo cannot be irradiated at energy levels of more than 10 milli-electron volts (MeV) (international law)
Bulk Explosives Detection
What is safe for humans, producing 10 microrem per dose?
Low-dose backscatter X-ray technology
Bulk Explosives Detection (ctd…)
CT scans spin sensors on a gantry around the package and produce a 3D image that detects small threat masses; may be subject to high NAR’s
Quadruple resonance (QR) technology uses…
pulsed low-energy radio waves to detect nitrogen-rich materials
What uses laser interrogation and analysis of the spectrum of scattered light to identify threat materials?
- Cannot see through opaque packaging - designed for clear package searches
Raman Analysis
This detection is still under research and development - experiements with distance detection of explosives with infrared cameras, passive and active millimeter-wave imaging systems, and lasers sensing fluorescence or atomic emissions
Stand-off Detection
Trace Explosive Detection
Particles and vapor residues associated with handling explosives
-
Trace Explosives Detection
Key Performance Metrics
- Limit of detection (smallest detectable amount) (may be as low as < 1 nanogram)
- Selectivity (ability to distinguish one material from another)
Trace Explosives Detection
Sampling Methods
- Swipe (most efficient)
- Vapor (puffing) (less invasive)
Trace Explosives Detection
Challenges
- Low vapor phase concentrations of several common high explosives (parts per billion and parts per trillion)
- Packaging of explosives with oil-based gel or solvent
- Absorption of explosive molecules upon most materials at room temperature and decomposition upon moderate heating or exposure to high energy, and thus loss of significant sample material in collectin and transport
Trace Explosives Detection (ctd…)
Techologies
Low mobility spectrometry (IMS)
Colorimetry
Chemiluminescence
Mass Spectrometry
Fluorescence
Canine Olfaction
Trase Explosives Detection Portals
Contraband Detectin
Methods
Chemical agent detection
Biological agent detection
Contraband Detection
Chemical Agent Detection
Uses point sensors at perimeters
Goal is early warning
NAR is a serious consideration (due to high response level)
May not be appropriate for checkpoint screening
May use optical sensing methods
Contraband Detection
Biological Agent Detection
Different from chemical detection in two ways:
- Most biological agents are not immediately lethal, impacting necessary response times
- Usually requires several hours for collection and analysis of air samples
Physical Protection Systems (PPS) Deployment Methodology
The primary objectives of a PPS are…
Detection
Delay
Response
PPS Deployment Methodology
Biggest causes of vulnerabilities in a PPS…
Improper component selection
Improper installation and maintenance
Improper operation
Improper integration
PPS Deployment Methodology
A collection of products, processes or both combined to provide a solution to a problem or goal
System
PPS Deployment Methodology
Systems, not components, are optimized to yield the most effective design to the problem
PPS Deployment Methodology
A logical method for problem solving in which a comprehensive solution is developed in relation to a problem having several dimensions
ASIS definitionof “systems approach to problem solving”
PPS Deployment Methodology
In the security context, a system is a combination of…
equipment, personnel, and procedures, coordinated and designed to ensure optimum achievement of the system’s stated objectives
PPS Integration
The combination of a variety of components sucha as people, technology and procedures
Integration
PPS Integration
Who should engineer the PPS by using the building blocks of people procedures, and technology?
Security Manager
PPS Integration
In general, a well-designed, integrated PPS is more effective against lower-level threats than high-level threats
PPS Integration
“Delay-in-depth” = “Protection-in-depth”
PPS Integration
Access delay barriers types
Passive (walls, fences, locks, etc…)
Security Officers (most flexible, but expensive)
Dispensible (fogs, foams, etc)
PPS Integration
An effective PPS combines the following into an integrated system
People
Equipment (technology)
Procedures
PPS Integration
Regardless of how the investigation tool is used; it is an important design element in a PPS and should be used when appropriate
PPS Integration
Procedural changes can be cost-effective solutions to physical protection issues, although when used by themselves they will only protect assets from the lowest threats
PPS Analysis
Analysis of the PPS provides two key benefits
- It establishes the assumptions under which a design was formed
- It relates system performance to threats and assets, making possible a cost-benefit decision
PPS Analysis
Analysis evaluates whether the PPS’ people, procedures, and technology are achieving the PPS functions of detection, delay, and response
Also referred to as a site survey or vulnerability assessment
May be qualitative or quantitative
PPS Analysis
Qualitative Analysis
Lower-security applications
i.e. retail, restaurants, small businesses, etc…
PPS Analysis
Quantitative Analysis
Higher-security applicaitons
Unacceptably high impact, despite level of probability
ie. museums, refineries, airports, etc…
Require immediate, onsite response to events
PPS Analysis
Two basic analysis approaches are used in a vulnerability assessment (VA)
Compliance-based (Qualitative)
Performance-based (Quantitative)
PPS Analysis
What system is evaluated on the performance and cost-effectiveness of individual measures in
…Countering threats
…Reducing vulnerabilities
…decreasing risk exposure considered as an integrated whole
PPS Analysis
PPS performance measure are:
Detection
Response
PPS Performance Measures
Detection
Probability of detection
Time for communication and assessment
Frequency of nuisance alarms
Delay
Time to defeat obstacles
PPS Performance Measures
Response
Probability of accurate communication to response force
Time to communicate
Probability of deployment to adversary location
Time to deploy
Response force effectiveness
PPS Analysis
Interruption
Arrival of responders at a deployed location to halt adversary progress, which may lead to neutralization
Probability of Interruption (PI)
PPS Analysis
Neutralization
Defeat of the advesaries by responders in a face-to-face engagement
Probability of Neutralization (PN)
PPS Analysis
PPS Effectiveness (PE) = PI x PN
PPA Analysis
An ordered series of actions against a facility, which, if completed, results in compromise of assets
Adversary Path
PPS Analysis
Adversary Sequence Diagram (ASD)
A functional representation of the PPS at a fcility that is used to describe the specific protection elements present
Illustrates the paths that adversaries can follow to accomplish sabotage, theft or other harm
Adversary Sequence Diagram
There are three basic steps in creating an ASD for a specific site
- Describing the facility by separating it into adjacent physical areas
- Defining protection layers and path elements between the adjacent areas
- Recording detection and delay values for each path element
ASD
The biggest mistake in ASD is…
To follow a single path from off-site to the largest location and only do an analysis on that path
ASD ctd…
The best method for creating an ASD is…
To walk or drive around the exterior of the area, then repeat the same inside
ASD ctd…
Sabotage incidents require…
Evaluation of only entry paths, as exit paths become irrelevant once the damage is done
ASD ctd…
ASD’s should be executed for…
Day/night, open/closed, and other contradicting conditions fo the facility
ASD ctd…
Sometimes used as a substitute for defined threats in the ASD process, but this can lead to gaps in analysis
Scenario Analysis
ASD ctd…
Preferred Approach
Analyze PPS using defined threats and path analysis, then generate scenarios by looking at weak paths
ASD ctd…
Scenario analysis must also consider the possibility of concurrent attacks on multiple assets, concurrent threat objectives (i.e.. theft and sabotage, etc…), and attack by multiple threat teams
ASD ctd..
PPS response includes personnel and the communications system they use
ASD ctd…
The systems design process is a serial process
PPS Design
What is the most important element in the defense against dynamic threats and potential catastrophic losses?
Proper use and application of the integrated security systems design process
PPS Design
A well-engineered PPS exhibits the following characteristics
Protection-in-depth
Minimum consequence of component failure
Balanced Protection
PPS Design
The design process can be based on two criteria/approaches
Performance criteria (preferred method)
Feature criteria (“checlist” method that may ignore performance goals)
PPS Design
4 Elements of Physical Design
Deter
Detect
Delay
Respond
PPS Design
Important factors in system design are…
The environment and unique needs of the facility
PPS Design
The best PPS solutin is designed by considering
Threats
Risks
Vulnerabilities
Constraints
Systems Design Process
Systems Design Process Phases
Planning and assessment
Design and documentation
Procurement
Installation
PPS Design - Phase 1
Task 1, Identification of
Critical assets
Potential threats
Subsequent vulnerabilities
Likely risks
Functional requirements
PPS Design - Phase 1
Task 2
Analyze security requirements and formulate solutions or countermeasures concepts to reduce or eliminate vulnerabilities and mitigate risks
Systems Design Process - Phase 1
The first phase of any security design project
Planning and Assessment Phase
Systems Design Process - Phase 1
In the architectural process its referred to as…
Programming or Schematic Design (SD) phase
Systems Design Process - Phase 1
Consists of gathering all relevant pre-design asset information and analyzing it in terms of project requirements and constraints
Systems Design Process - Phase 1
Culminates in a security “basis of design”
The basis of design is the first and most important output of the design process
Focuses on specific project requirements and a conceptual design solution based on those requirements
Systems Design Process - Phase 1
the planning and assessment phase results in a conceptual design solution that categorizes vulnerabilities by their criticality and identifies the most preferred and cost-effective protection scheme to mitiage or eliminate asset risks
Systems Design Process - Phase 1
Another important outcome of the planning phase is the development of the business case for the new or upgraded security systems
Systems Design Process - Phase 1
Security design is just as dependant on collecting good data leading to informed decisions by knowledgeable people as is any other analytical process where a solution is engineered and constructed
Systems Design Process - Phase 1
The basis of design becomes the designer’s means to obtain consensus from the design tema on…
The goals and objectives of the project
What will constitute the project
How the project will secure the assets
Systems Design Process - Phase 1
Implementing the basis of design is not the time to identify engineering details, prepare budgets, or identify and debate specific countermeasures
Systems Design Process - Phase 1
The Conceptual Design, also called a Design Concept, is the last task of Phase 1 Planning and Assessment
Systems Design Process - Phase 1
A design concept’s detail should never be more than a top-level description of the various anticipated security system elements, subsystems, and support systems
Systems Design Process - Phase 1
From an architectural perspsective, the Design Concept is usually referred to as the initial conceptual design or schematic development (SD) phase
Systems Design Process - Phase 1
Most security designers identify four principal security strategies - prevention, detection, control and intervention - as the most important functional requirements of security design
Homeland security features five principal strategies: Preparation, prevention, detection, response, and recovery
Systems Design Process - Phase 1
The importance of having a redundant security system (multiple layers of security) is based on the 10 principles of probability developed by the French mathematician and astronomer Marquis de Laplace (1749 - 1827)
Systems Design Process - Phase 2
Design and Documentation may be split into two phases in the construction idustry
Design Development (DD)
Construction Documents (CD)
Systems Design Process - Phase 2
Design Development (DD)
Generally DD includes a preliminary design (30-35%) following the conceptual design and concludes with a 50%-60%
Systems Design Process - Phase 2
Construction Documents (CD)
Generally starts with a 60% design and passes through a 90% submission and conclused with 100% CD set
Systems Design Process - Phase 2
The CD set consists of three elements
- Contractual details (usually the Div 01 spec for large projects)
- Specification (Div 28 for security on large projects)
- Drawings (not required for a services contract, like guards)
Systems Design Process - Phase 2
The objective of Phase 2 (DD) is…
To complete the design and to document the process to the level of detail necessary for the chosen method of procurement
Systems Design Process - Phase 2
Division 28 (Div28) is the Electronic Safety and Security section of the construction specifications institute (CSI) MasterFormat specifications template that includes 50 sections total (not all used)
Each division, or section, is divided into three parts:
General
Products
Executiong
Systems Design Process - Phase 2
Security systems drawings are always considered secondary to the specifications (specs take precedence)
Systems Design Process - Phase 2
Drawings include the following types
- Plans (top view, map-like view of system component placement int he facility
- Elevations (views of vertical surfaces that show mounting heights and locations of wall-mounted devices
- Details (define elements of the system in more detail
- Risers (chart-like reprentations of complete subsystems such as CCTV or access control
- Hardware schedules (tables that provide detailed component information
Systems Design Process - Phase 2
Key factors to be considered in hardening of a facility
Stand-off distance
Structural integrity of the premises
Prevention of progressive collapse
Redundancy of operating systems
Systems Design Process - Phase 3
Procurement
The type of procurement should be determined before or at the start of the design phase because the type of procurement determines the level of detail required in the construction documents (CDs)
Systems Design Process - Phase 3
Three major forms of security systems procurement
- Sole source
- Request for proposal (RFP)
- Invitationfor bid (IFB)
Systems Design Process - Phase 3
Sole Source
- May be the most appropriate for small projects
- This method of procurement is recommended only where the security owner has the capability to perform the security needs analysis and has good prior knowledge of systems and prices
Systems Design Process - Phase 3
Sole Source
Positives
The construction documents are usually simple, reducing owner design costs and saving time
Systems Design Process - Phase 3
Sole Source
Negatives
- There is a tendency to focus on hardware and technology only, leaving the equally important personnel, procedures, and facilities subsystems for others
- The owner may tend to skip the all-important security planning process and rely on advice from a contractor with a vested interest in selling equipment
- Without a competitive bidding process, the organization has no means of comparing prices
Systems Design Process - Phase 3
RFP
Almost always based on a set of detailed design and construction deocuments
Specifications are usually generic and performance-based
Equipment makes and models are often listed with the phrase “or approved equal”
The owner typically procures a security business partner, not just a one-time security systems installer
An RFP response may be open to any contractor or it may be limited to a list of prequalified contractors
Systems Design Process - Phase 3
RFP (ctd…)
- In addtion to providing a cost proposal, a proposer must submit a technical proposal that describes the firm’s understanding of the requirements and how the objectives will be met
- It is common to allow responders to propose alternate solutions, called “alternates”
- The RFP need not restrict the organization to accept the lowest bid. Instead, it aims to obtain the best value
- If price will not be the determining factor in vendor selection, the RFP should say so
- A contractor’s response to an RFP usually takes longer to prepare than responses to other types of procurement because both a technical and a cost proposal must be prepared
Systems Design Process - Phase 3
IFB
- Commonly used by government and other organizations whose procurement procedures require that projects be competitively bid and that the award be given to the lowest qualified, responsive bidder
- No technical proposals or alternative solutions are sought, so the construction documents must be extremely explicit
- The onus of selecting equipment makes and models, and the accuracy of the security system design, is placed solely on the design team
Systems Design Process - Phase 3
IFB
- Bidders submit a cost proposal or bid, which may contain unit pricing and whatever price breakdown is requested
- The award is then made, usually wihtout negotion to the lowest qualified bidder who has conformed to the bidding instructions
- The IFB requires additional time and cost in design and specification, but typically needs only one or two weeks of procurement time, depending on the size and complexity of the project
Systems Design Process - Phase 3
IFB (ctd…)
- It is common to require bids to be sealed and delivered by a specific time to a specific location:
- At the time and place, the bids are opened (often publicly) and the apparent winner is announced
- Contracts are signed when the apparent winner’s proposal has been checked for completeness, accuracy, and qualifications
Systems Design Process - Phase 3
In an RFP or IFB, the pre-bid conference should be held one week after CD’s are issued for bid
Systems Design Process - Phase 4
Installation
The most important step in stalling the PPS
to plan correctly
PPS Systems Design Process - Phase 4
Second step in installing the PPS
for the contractor to visit the site to ensure conditions agree with designs
PPS Systems Design Process - Phase 4
Four types of Installation Tests
Pre-delivery or factory acceptance tests
Site acceptable tests
Reliability or availability tests
After-acceptance tests
PPS Systems Design Process - Phase 4
Factory Acceptance Testing
Demonstrate system performance complies with specified requirements in accordance with approved factory test procedures
PPS Systems Design Process - Phase 4
Site Acceptance Test
Contractor should verify all previous test results, diagnostics and calibrations two weeks prior to acceptance testing
PPS Systems Design Process - Phase 4
Reliability Testing
Conducted in alternating phases of testing and evaluation to allow for validation of the tests and corrective actions
PPS Systems Design Process - Phase 4
After-implementation Tests
Operational tests
Performance tests
Post-maintenance tests
Subsystem tests
Limited scope tests
Evaluation tests
PPS Systems Design Process - Phase 4
All the technological and procedural precautions in the world will be ineffective if they are not executed properly
PPS Systems Design Process - Phase 4
Without appropriate training, personnel are more likely to contribute to security risks accidentally
PPS Systems Design Process - Phase 4
The common time for the contractor to report to the job site to address a warranty issue is
within four hours of the problem report
PPS Systems Design Process - Phase 4
A PPS maintenance agreement typically includes two categories of services
- Remedial maintenance that corrects faults upon failures
- Preventitive maintenance consists of scheduled maintenance to keep the PPS in good operating condition
PPS Systems Design Process - Phase 4
Indications of a poor maintenance program
Frequent system failures
Cursory testing procedures
An inordinate number of components awaiting repair
PPS Systems Design Process - Phase 4
Typically, maintenance and warranty costs equal 11% of the total capital systems construction cost
Security Officers - Purpose
A human being is needed if the post requires the ability to
Discriminate among events, persons, circumstances, or physical objects based on complex and varying criteria
Conduct rational dialogue with people face-to-face and discern next actions based on such communication
Use physical force or the threat of it to restrain one or more persons
Exercise judgement to determine a logical course of mental or physical activity
Provide reports detailing their activities on an ongoing basis
Security Officers - Purpose
A security officer post is any location or combination of activities for which a trained human being is necessary and includes three key concepts:
- A location or combination of activities
- Necessary human being
- Training and competence to accomplish the required activities
Security Officers
Security officers represent the largest segment of security sector employees and are the largest cost element in the majority of security operating budgets
Security Officers
What are generally the largest item in the operating budget of a security department
Personnel Costs
Security Officers
Private security outnumbers….. in the U.S. by 3 to 1?
Law Enforcement
Security Officers - Deployment
Structures of security operations - Vertical Model
“Hierarchical model”
Authority starts at the top
Security Officers - Deployment
Structures of security operations - Shamrock Model
Three leaf shamrock
Leaf 1: Professionals, managers, and skilled technicians
Leaf 2: third-party suppliers
Leaf 3: Part-time and temporary workers (flexible)
Security Officers - Deployment
Structures of security operations - Network Model
“Flattened” “Horizontal” or “open” model
Connections between employees and multiple supervisors
Security department itself is networked to other departments
Security Officers - Deployment
The number of officers required for a facility is determined by several factors, including:
Physical complexity and size of the facility
Number of employees
Nature of work
Number of entrances (and hours they are open)
Value and amount of assets being protected
Number of patrols needed
Number of escorts and special assignments needed
Security Officers - Deployment
A 24/7 post requires a minimum of 4.2 officers (168 hours @ 40 hour shifts)
4.5 to compensate for sick, vacation, and holiday leave
Security Officers - Basic Functions
Where personal recognition for access-control purposes is required, under low-density queuing, a remote operator could control three or four access points
Security Officer - Rank & Authority
The efficiency of the security force depends on the adquacy and skill of its supervisors
Security Officers - Rank & Authority
Security officer supervisors are selected on the basis of their knowledge of the job and demonstrated administrative and leadership abilities
Security Officers - Regulation
Jurisdictions use two different methods for regulating security activity
- Requiring the licensing of the primary controlled business - the individual or corporate applicant must typically apply for and obtain a license before engaging in the regulated activity
- The second method applies to the licensing or registration of employees fo the business other than those named on the original application
Security Officers
Recommendations resulting from the 1972 Rand Report on private security in the U.S.
- Government regulation should be applied as uniformly as possible
- Regulation should be at the state level
- Directors and managers of in-house security services as well as owners and managers of contract security services should be licensed
- All employees of both proprietary and contract security organization should be registered by the state
- Each license and registrant should meet minimum standards or qualifications (which could vary among types of licensees and registrants
Rand Report
- State regulatory agencies should conduct background investigations of each applicant for a license or registration (i.e.. for all security employees, proprietary and contract), including a criminal records check and prior employment verification for a period of seven years
- All new applicants for licensing and registration should have completed high school or it equivalent or must pass a special literacy test
- Experience in private security should be required before a license is granted. A bachelor’s degre (or higher) should be permitted to substitute for some of the experience requirement.
Rand Report
- Licenses should meet a minimum bond or insurance requirement
- State agencies should require minimum training programs for all types of private security personnel
- Separate training programs should be required for different security positions, such as guard, investigator, polygraph operator, and central station alarm responder
- Instructors’ schools shold be accredited by the state regulatory agency
Rand Report
- Currently employed security personnel should be given on year to meet the training requirements
- Private security personnel should be prohibited from carrying concealed firearms while on duty. Company-furnished weapons shold remain on company proprty during off-hours
- Statutory liability shold be imposed on private security businesses for weapons abuses by their employees against private citizens
Rand Report
- Regulatory agencies should hav the authority and resources to spot-check private security records and operations
- Local police and insurance companies should forward to the regulatory agency any information coming to their attention involving major complaints or incidents involving security personnel
- Prior criminal convictions related to potential abuses in private security should be a basis for denying registration or licening
Rand Report
- Evidence obtained by illegal search by private individuals should be subject to suppression either on a per se basis (as is the case for evidence illegally seized by law enforcement) or ad hoc, with the judge or magistrate weighing the equities
- Uniformed private security personnel should be forbidden to engage in interrogation or interviewing
- Jurisdictioins should regulate the color and style of private security uniforms, as well as the use of police titles by private seucrity personnel
Rand Report
- Any firm hiring the services of an independant security contractor should be held liable for any negligent failure to control the contract staff
- The federal government should consider funding a research center to evaluate the effectiveness of private security personnel. Its finding should be included in an overhauled statistical reporting system to be maintained by the insurance industry
Security Officers - Qualifications
In addition to the mental ability to complete administrative tasks and make judgments, the security officer must also have the physical ability to observe, listen, report, and function in emergencies
Security Officers - Qualification
Actions that must be taken before arming any private security officer
- They must furnish information about all prior employment
- The employer should make a reasonable effort to verify the last seven years of employment history, and check three personal references
- They must pass a recognized pre-employment drug-screening test
Security Officer - Training
Competency refers to…
An individual’s ability, skills, and qualifications to perform the necessary duties
Sec Officer - Training
It is good practice to provide a set number of pre-assignment training hours at the contract agency’s expense
Security Officer - Training
The quality of assets protection is a direct function of…?
Local training and local supervision
Security Officer - Training
What is directly related to the quality of local supervision and local training?
The quality of the service provided by the contract agency
Security Officers - training
Unless officers are properly trained and closely supervised, they may not provide the protection required
Security Officer - Training
What determines security officer effectiveness and raises a question of the actual need for the post
Post-Specific Training
Security Officer - Training
What should be given as soon as the officer reports for duty? Instruction on specific duties can be given as the duties are assigned
An initial period of general security
Security Officer - Training
Two reasons for testing the security operations program
Identify residual risks
Identify necessary changes within the organization
Security Officer - Training
The quality of training is directly proportional to the quantity of training
Security Officer - Training
Hallcrest Report (1985, Cunningham & Taylor) found that contract security firms had inadequate employee selection and training standards
Security Officer - Training
The key to effective guard us is…
Training
Security Officer - Arming
One of the greatest liabilities an organization faces involves…?
issuing deadly weapons to security officers
Security Officer - Arming
Some think when a contract security vendor is properly contracted, most of the liability is shifted to the vendor
Legal actions usually involve anyone remotely associated with a situation
Security Officer - Arming
Payment for vendor services indicates acceptance of the vendor’s management style and practice; thus, crucial policies and protocols should be prescribed by the organization that employs the vendor
Security Officer - Arming
The decision whether to arm an officer should be based on the existence of one of these two conditions
- there is a greater danger to life safety without the weapon
- The officer may reasonably be expected to use fatal force
Security Officer - Arming
Facility management assumes several responsibilities for armed officers
- Property training of the officers to be armed
- Selection of the appropriate firearms and ammunition
- Proper maintenance of the firearms and ammunition
- Proper maintenance of the firearms by a qualified gunsmith
- Maintenance of records of the foregoing actions
- An adequate level of liability insurance
Security Officer - Arming
Other considerations regarding the use of deadly weapons
- Conditions when weapons may be issued
- Persons who get a weapon, and the type of weapon and ammo issued
- Quality and reliability of the weapon at the time of issue, and repair and maintenance of the weapon by a qualified armorer
- Accountability for the specific weapon and its ammunition, and specified training with the weapon
Security Officer - Arming
Other considerations ctd…
- Conditions when weapons may be used, and safety precautions for the issuance and carrying of weapons
- Return or surrender of the weapon when not required for authorized use
- Secure storage for weapons when not in use (weapons unloaded, separated from ammunition, locked in approved container)
- Accurate records of each of the preceding points
Security Officer - Arming
Use of non-lethal weapons should also be covered in policy statements
Security Officer - Contract vs. Proprietary
Contract Security = 3rd party employers of officers
Security Officer - Contract vs. Proprietary
Contract Security: Advantages
- Less expensive (most prominent advantage)
- The pool of replacement workers typically readily available
- No need for a customer to deal with vacations, sick time, discipline, hiring/termination
- A wider range of expertise available
- HIgh turn-over potentially lower quality, sometimes less well-trained, not as loyal
Security Officer - Contract vs. Proprietary
Proprietary = Directly-employed officers
Factors:
- More direct control of personnel selection, screening, training, supervision
- Generally considered more loyal, less turn-over, better quality
- more expensive
- Must deal with discipline, salary determinations, vacations, sick time, etc…
Security Officer - Contract vs. Proprietary
Direct-employed officers oversee contract officers; also called the “principal-agent” relationship
Hybrid Security
Security Officer - Contract vs. Proprietary
Turnover costs
Due to advertising, interview time, background checks, hiring new employees processing and training - generally run >=25% annual salary
Security Officer - Reports
From the first day on the job, security personnel should realize their observations, reports, or findings, coupled with their demeanor and their ability to articulate events, may be the key to the verdict in a trial immediately or years after an event, even if they have left the job
Security Officer - Reports
Every security incident should be treated as if could result in a courtroom appearance
Security Officer - Reports
Security reports and logs are admissible in legal proceedings as entries made in the regular course of business and are therefore exceptions to the evidentiary rule against hearsay
Security Officer - Reports
The admissibility is pertinent in litigation, arbitration, or administrative matters in which the entry is the only evidence of the event. To qualify, the report or log must
- Be regularly maintained
- Be maintained by a person as part of his or her regular duties
- Record an event of which the recorder had personal knowledge or which was reported to the recorder by one who had personal knowledge and a duty to report
Security Officer - Reports
Which forms are better than those that expect the officer to formulate a narrative?
Report forms that force positive statements
Security Officer - Reports
Which report is the security log?
Central report document
Security Officer - Reports
Whether manual or electronic in format, security logs generally fall into two classes:
Main or control log
Individual past log
Security Officer - Policy & Procedure
Written instructions must be reinforced through personal communication
Security Officer - Policy & Procedure
What are the most important written instructions for the security force?
Post Orders
Security Officer - Policy & Procedure
Post orders are also important for the following reasons:
- Express the policies of the protected enterprise
- Summarize required officer duties
- Avoid the problems of word-of-mouth instructions
- Provide a basis for site-specific training
Security Officer - Policy & Procedure
Post orders should be developed with the following criteria in mind
- Each order deals with a single subject
- Each order is as brief as possible
- Each order is written in simple, easy-to-understand terms
Security Officer - Policy & Procedure
Reading time is inversely related to reading comprehension - the longer it takes to read a passage, the less likely it will be accurately understood or remembered
Reading time is a function of both the structure of the passage and the reading skill of the individual
Security Officer - Policy & Procedure
Post orders should be available at each guard post and kept current and accessible. They are the vital link between the requirements of the client and the ability of the security officer to effectively meet those requirements
Security Officers - Fatigue
Individuals awake for more than 17 hours are likely to reach dangerous levels of mental fatigue
Security Officer - Fatigue
The most effective way to maintain officer vigilance is to systemically rotate the security officer’s duties, at 2 & 4 hour intervals, between fixed posts and roving patrol (both foot and mobile) assignments
Security Officer - Fatigue
Officers’ schedules should allow for meaningful rest, including at least two nights of unrestricted sleep between shift changes, and limitations on days worked consecutively and hours worked per shift
Security Officer - Contracting for security services
The first step in contracting for security officers is…
To determine the organization’s contracting rules,
Security Officer - Contracting for security services
Other steps in contracting for security officers
- Buyer beware
- Properly evaluate the needs of the organization to be protected
- Acquire information and know the state of the art
- Analyze the advantages and disadvantages of each service
- Avoid panic decision making
Security Officer - Contracting for security services
Three criteria to consider when choosing a guard contractor
- Consistent performance
- Prompt, efficient and positive response to client concerns
- Competitive pricing
Security Officer - Contracting for security services
Clients should look for agencies that can substantiate a…?
Lower-than-average turnover rate
Security Officer - Contracting for security services
Factors affecting guard agency performance
- Poor scheduling
- Lack of adequate supervision
- Limited opportunities for advancement
- Little or no recognition
Security Officer - Contracting for security services
The most important aspect required to ensure adequate guard agency performance is
a genuine commitment to partnership with the client
Security Officer - Contracting for Security Services
The more specific and detailed the information a client provides, the greater the likelihood of getting quality service at a competitive price
Security Officer - Contracting for Security Services
The Scope Of Work (SOW) should state
- Security tasks
- Days and hours of performance
- Total number of hours to be worked
Security Officer - Contracting for Security Services
Customers should specify hourly pay rates rather than allowing bidding guard agencies to do so
As a general guideline, the lowest wages received by the contract security officer should at least equal the entry wages paid to the proprietary positions
Security Officer - Contracting for Security Services
Supervisory roles are generally determined by the number of personnel at the site (or total hours)
If officers work more than 400 hours per week, the contracting organization should hire its own (proprietary) security supervisor
Security Officer - Contracting for Security Services
Seven measures on which contract security companies can be assessed (at minimum)
- Employment and reference checks
- Psychological testing (where allowed)
- Polygraph testing (where allowed)
- Minimum qualifications at the local jurisdiction level
- Management qualifications
- Selection process for officers
- Turn-over / tenure / seniority
High Rise Security Issues
Generally, a high-rise structure extends higher than the maximum reach of available fire-fighting equipment
Set variously between 75 and 100 feet, or approximately 7 - 10 stories
High Rise - Concepts
Access is typically unrestricted at the building entry level as well as to individual floors. There may be an unrestrictive security or concierge desk to assist visitors and others
Open Buildings
High Rise - Concepts
Access to elevator banks is controlled and visitors are managed
Closed Buildings
High Rise - Concepts
For a major tenant, one or more elevator banks may be controlled while other elevator banks to other floors are open
Hybrid Buildings
High Rise - Concepts
Operations controls vary according to time of day, traffic, occupancy level, or day of week
Multi-Mode
High Rise - Access Control
Three access control classes of space in a high rise
Public Access
Leased Spaces
Maintenance Spaces
High Rise - Access Control
Sensitive spaces should be grouped together in the same group of floors serviced by a single set of elevators, allowing more control over access
High Rise - Access Control
Floor control can be accomplished in several ways in a high rise
- Programmable elevators
- Elevator cabs with card readers
- Escorts for visitors
- Employee awareness of piggybacking and tailgating
- Turnstiles at the ground floor elevator bank
- Controlled elevator landings (with or without reception)
High Rise - Access Control
What two factors control how building stairwells are secured?
- Local fire and building code requirements
- Whether inter-floor movement of building occupants via stairwells is allowed
High Rise - Access Control
Service or freight elevators pose special problems in all high-rise structures because they often serve all levels of a building
High Rise - Access Control
If the elevators are self-service, the entire building security program may be compromised unless the service cars are:
- programmed not to access sensitive floors without special arrangments
- Locked at hoist away doors on sensitive floors
- Locked at service vestibule or lobby doors, where applicable
High Rise - Access Control
Service elevators also offer an opportunity for unauthorized movement of property from or between accessible floors, which can be addressed by:
- Assigning an operator to the service elevators
- Making service elevators available only from a request to security
- Avoiding use of service elevators by regular traffic
High Rise - Access Control
If the use of stairwells is allowed, they should have access controls and intercoms connected to Security
High Rise - Access Control
High-tower-function mortise locks
- Energized and locked at all times
- Access control is accomplished by a key or reader
- Power is controlled by the fire system: doors immediately unlock yet remain closed and latched, protecting the stairwell from smoke and fire
High Rise - Life Safety
The first step in assuring life safety is to comply with local building and fire codes applicable to the structure
High Rise - Life Safety
When sprinkler are present, the chances of dying in a fire and property loss per fire are cut by 1/3 to 2/3, compared to fires reported to fire departments where sprinklers are not present
High Rise - Life Safety
When sprinklers do not produce satisfactory results, the reasons usually involve one or more of the following
- Partial, antiquated, poorly maintained, or inappropriate systems
- Explosions or flash fires that overpower the system before it can react
- Fires very close to people who can be killed before a system can react
High Rise - Life Safety
Standpipe systems can significantly improve the efficiency of manual firefighting operations by eliminating the need for long and cumbersome hoses
High Rise - Life Safety
Water is the primary extinguishing agent in most high-rises, but others may be…
- Dry chemical and we chemical systems (used mainly for restaurant hoods, ducts, and cooking appliances found in kitchens and cafeterias
- Carbon dioxide, Halon replacement systems (used in electrical switchgear rooms and in computer and data processing installations
High Rise - Life Safety
The most significant factors affecting life safety in high-rise structures are:
- Early detection and precise location of incipient hazards
- Reliable communications throughout the structure and with outside agencies
- Assurance of safe escape routes
- Prompt application of appropriate control measures
- Fire extinguishment
High Rise - Life Safety
Fire-fighting factors in high-rise structures ctd…
- Containment or replacement of contaminated air
- Shutoff or filtration of drinking water
- Containment and removal of explosives
High Rise - Security & Intrusion Detection
The “layered security” approach applies to normal facilities is:
- Outer ring: Property boundary, or perimeter
- Middle ring: Building walls
- Inner ring: Interior controls
High Rise - Security & Intrusion Detection
Layered Security for a high-rise
- Outer ring: Building walls
- Middle ring: Access to elevators and stairs
- Inner ring: Individual floors
High Rise - Security & Intrusion Detection
Protection measures in a high rise should involve a cooperative effort between the building owner and manager and the tenants themselves
High Rise - Security & Intrusion Detection
Hardening and controlling the elevator lobby and stairwell doors are less expensive than hardening individual offices or spaces
High Rise - Security & Intrusion Detection
No attempt should be made to use the system control center in any way other than as a dedicated facility
High Rise - Security & Intrusion Detection
If the system has been properly designed, ideally the monitoring and control station should be the most secure location in the structure
High Rise - Security & Intrusion Detection
Intrusion alarms should be used on stairwell doors where non-emergency use is not allowed
High Rise - Security & Intrusion Detection
Fresh air intakes should not be overlooked in the protection plan, as these are vulnerable to airborne contaminants
High Rise - Security & Intrusion Detection
The most dangerous or critical points for an attack against telecommunications lines in a high rise are located at points after all the building services are connected with one or two main truck cables still int he structures
High Rise - Security & Intrusion Detection
Since communications within a high rise can be cut to upper floors by severing the cables in a common riser areas alarm signal and communication systems should be distributed so that localized points can operate independently even with communications with a central control panel or processor has been disrupted
High Rise - Video Surveillance
The number of security personnel in a high rise depends on the type of occupancy and activities
Dogs in Security - Breeds
There are 150 breeds of dogs classified into eight classes:
- Sporting
- Hound
- Working
- Terrier
- toy
- Non-sporting
- Herding
- Miscellaneous
Dogs in Security - Breeds
Security typically uses working and herding dogs
What matters most is the overall drive of the individual dog once it has been trained for security work
Dogs in Security - Breeds
Dogs in the Herding group share a great ability to control the movement of other animals
Dogs in Security - Qualifications
Dogs fall into one of three main sensitivity groups
- Oversensitive (reacts excessively, difficult to train, unreliable, may have to do with the dog’s history
- Undersensitive (difficult to motivate, may not respond to commands, may not interpret affection as a reward)
- Moderately sensitive (normal sensitivity to sound and touch, responds to commands, ideal for protection work
Dogs in Security - Qualifications
Aggressiveness categories
Over-aggressive
Under-aggressive
Moderately- aggressive
Aggressiveness Categories
difficult to train, may bit others than the aggressor, continues to react after aggressor is gon
Over-aggressive
Aggressiveness Categories
Cowers or hides when approached by an aggressor, difficult or impossible to train
Under-Aggressive
Aggressiveness Categories
Easiest to train, ideal for protection use, become alert to the aggressor, suspicious, and is eager to move towards the aggressor
Moderately aggressive
Dog - Qualifications
Willingness refers to a dog’s
- Response to commands
- Attitude when carrying out duties
- Reaction toward learning new duties
Dogs - Qualifications
A dog is ranked high in willingness if it continuously responds to a given command in an effort to fulfill it, even though reward or correction cannot be easily perceived as being immediate
Dogs - Qualifications
To qualify for protection work, a dog should
- Be ‘middle-sized’
- Have even temperament
- Be inquisitive and intelligent
- Be courageous (bold but not ferocious, not shy); never retreat
- Have ‘hardness’, or a willingness to overcome challenges
- Have vitality and strength
- Be any color
Dogs - Qualifications
Qualify for protection…
- Respond well to training at about twelve months of age
- Usually be male (not monorchid); females if spayed
- Not necessarily be purebred, but not be a shelter dog
- Not have been with the breeder for more than 12 months
Dogs - Qualifications
In security, what are a dog’s most important senses?
Smell
Hearing
Dogs - Qualifications
During which stage of training must a dog be taught to rely on smell instead of sight, especially when teaching building searches?
Imprinting Stage
Dogs - Qualifications
A dog’s ability to detect scents is often described as…
Being more than 100 times greater than that of humans
A trained dog can sense an intruder’s airborne scent more than 250 yards away
Dogs - Qualifications
A dog’s hearing is superior to humans’ in range and pitch
the upper-frequency limit of the dog is about twice that of human beings, reaching 30,000 Hz or more.
In general, a dog’s vision cannot be compared favorably with that of the normal human
Dogs - Training
Dogs are more intelligent than most other animals, except humans and non-human primates
A vocabulary of about 20 words is normal, but some can respond to 100
Dogs - Training
Two basic drives are prevalent in dogs used for security tasks
- The hunt drive
- The pack drive
Dogs - Training
Hunt Drive
- Must be present to accomplish both detection and protection work
- Through training, the drive can be channeled to help the dog pursue and locate other items, such as drugs or lost children
- Due to their natural predator ability, dogs can be trained to attack humans without regard to their own safety
Dogs - Training
Pack Drive
- When domesticated, the dog adopts humans as pack members and defends the pack as well as the territory the pack occupies
Dogs - Training
The optimal canine is one with equal HUNT and pack drives
Dogs - Training
More than any reward, the dog wants the approval of it handler - probably because of the pack instinct
Dogs - Training
Most common training methods (not every dog responds to the same method)
- Positive reinforcement (praise) tailored to the dog’s specific predominant drives
- Compulsion (negative corrections) through the handler’s voice or with equipment such as a shock collar
- Inducement (balls, toys, companionship, or food)
Dogs - Training
A dog should never be corrected for clumsiness, slowness in learning, or because of an inability to understand what is expected
Dogs - Training
Attributing human characteristics to animals
Anthropomorphism
Dogs - Training
Because of the restrictions on time and effort needed to keep skills at the optimal level, generally a dog should be trained specifically for protection or detection, not both
Dogs - Training
Two reasons why a single dog is generally not trained to detect both drugs and explosives
- The possibility of confusing the dog in an actual search
- the need for an aggressive search method when searching for drugs, and a passive on for bombs and explosives
Dogs - Training
A detection dog must have continuous, daily training to maintain peak proficiency - perhaps two hours per day
Dogs - Training
Basic training for detection work runs six to eight weeks, plus one or two weeks more to train a detection team
Dogs - Qualifications
It takes about nine months to a year before a handler and a dog become highly effective together in pursuing the more difficult detection challenges
Dogs - Training
A dog taught with a handler knows to attack without command only when a violator escapes or attacks the handler
Dogs - Training
Escorting handler is 10 ft. behind and 2 ft. right of the violator; the dog is off-leash to the left, directly behind the violator
Dogs - Training
The dog used in the private sector should be given brief refresher training at least monthly
Dogs - Detection
Dogs are the most efficient method for…?
Detecting drugs, explosives and accelerants in most situations
Dogs - Detection
What percentage does the detection reliability of a well-trained dog exceed?
95%
Dogs - Detection
Detection is demanding and often boring for the dog because of long work periods without detecting a scent
- A detection dog can normally work effectively for 20 - 60 minutes
- If a search continues for a long time, the dog may become tired and lose interest
- If the dog loses interest and the handler cannot motivate it to continue, it must be given a break
- Noise and activity in an area may distract the dog
Dogs - Detection
A single dog can be trained to patrol, protect areas, and detect substances, but usually, substance detection becomes a specialty because of the necessary training time
Dogs - Detection
Dogs can search…
- A 50 yard corridor of lockers in about 2 minutes
- A vehicle in about 1.5 minutes
- 125 packages in about 7 minutes
- 50 boxes in about 3 minutes
Dogs - Detection
Typical scent-masking substances for drugs
Perfume
Gasoline
Formaldehyde
Dogs - Detection
Typical false-alerts for drugs
- Oregano
- Alfalfa
- Parsley
- Spices
- Any substance containing acetic acid can cause a false-alert for heroin
Dogs - Detection
The average drug dog will detect the presence of a 1.2-ounce (14g) of marijuana or a small amount of opium in a vehicle, a package, luggage, or a room of reasonable size
Dogs - Detection (Accelerants)
Dogs have been used to detect accelerants since…
1987
Dogs - Detection (Accelerants)
Its ability to discriminate between pyrolysis products (fire debris) normally found at a fire and pyrolysis products containing an ignitable liquid
The value of the dog
Dogs - Detection (Accelerants)
Which breed are especially adept at this type of detection
Labrador Retrievers
Dogs - Detection (Accelerants)
How accurate can the dog be?
95% Accurate
Dogs - Detection (Accelerants)
With what percent of evaporated gasoline is training accomplished?
50%
Dogs - Detection (Accelerants)
Dogs can also be used to detect accelerant scents from onlookers, in an effort to identify the arsonist who has remained behind
Dogs - Detection (Accelerants)
Dogs significantly reduce the time required to perform a fire investigation
Dogs - Detection (Explosives)
Explosives that can be detected by dogs…
Commercial dynamite (gelatin, TNT - trinitrotoluene)
Smokeless powder
C-4 plastic explosive
Black powder (powder form, time fuse, safety fuse) and black powder substitutes
Detonating cord (PETN polyerythrytoltetranitrate-based
Detonating cord containing RDX (cyclotrimethylene trinitramine)
Dogs - Detection (Explosives)
Explosives that can be detected by dogs…ctd
Binaries (such as Kinepak)
Blasting agents
Cast boosters
Composition - B
Emulsions and slurries
Water gels
Plastic explosives (semtex)
Tetryl
Improvised explosive (ANFO ammonium nitrate and fuel oil, chlorates, nitrates
Dogs - Training (Explosives)
Items that can cause false alerts in detection dogs (for explosives)
- Nitroglycerin pills or containers
- Back of television (nitrocellulose shellac)
- Blackboard chalk labels (nitrocellulose shellac)
- Grease pencils (nitrobenzene)
- Shoe polish (nitrobenzene or nitrotoluene)
- Pure glycerin (similar to nitroglycerin)
- Maraschino cherries (benzaldehyde)
Dogs - Tracking
Protection dogs are usually not specifically trained in tracking
Dogs - Tracking
A dog can track better in grass and brush because human scent adheres well to those surfaces
Dogs - Tracking
Human scent remains longer on cool, moist ground and dissipates rapidly in direct sunlight, on extremely dry ground, and in excessive rain
Dogs - Tracking
What can hold a scent for 12 hours in favorable weather?
Damp Sand
Dogs - Tracking
Scents in what conditions last up to 24 hours (less than 3 hours for the opposite)
vegetation and moist air, moderate winds, and no sun
Dogs - Tracking
What is the best time of day to track a scent?
Early mornings - higher temperatures reduce scents faster
Dogs - Tracking
What improves scents
Humidity
Dogs - Tracking
Scent cannot pass through what?
Trees, bushes, large rocks, and high grass
Must go over, under, or around them
Dogs - Tracking
Perspiration is the most distinctive scent in humans
- Individuals who have been drinking emit a different scent that disagrees with the dogs
- Much perspiration is generated by feet; the scent escapes through shoes and clothing (the majority of scent trails are let by feet)
Dogs - Tracking
Tracking dogs can also smell the difference in the turned-up ground and crushed plants
Dogs - Tracking
A trained dog in a boat can scent a person under the water and breathing through a tube
Dogs - Tracking
Dogs with flat noses, such as the mastiff, boxer, and bulldog, are generally not as well suited for tracking
Dogs - Tracking
Housedogs do not make optimal tracking dogs; their smell is diminished by the artificial environment
Dogs - Tracking
Training a dog for tracking and trailing takes about two years and can usually be done only by an expert
Dogs - Feeding
A dog requires how many nutrients to remain in good health?
36
Dogs - Feeding
Dogs should be fed once per day, no longer than 20 - 30 minutes
Dogs - Grooming
The area on the outer side of the dog’s elbows that is hairless and thick-skinned, usually about an inch in diameter
Callus
Dogs - Healthcare
Normal dog temperature range is?
101 - 102 degrees Fahrenheit
Dogs - Liability
Dogs can be viewed as weapons, and as such, can result in criminal liability if caused to attack without justification
Dogs - Liability
Dogs can cause civil liability by…
- Threatening a person
- Attacking a person
- Causing an accident that causes damages or injury
Dogs - Liability
Civil liability may arise when the dog is on or off duty
Dogs - Liability
A dog can be considered dangerous or vicious if the owner or controller knew or should have known of the dog’s vicious propensities
Dogs - Liability
A dog can be used to detain a trespasser in a similar manner as the property owner could
What are the 3 points of the Security Triangle? /_\
DeterDelayRespond
What are the 3 parts of the Security Plan?
1) Information2) Physical3) Personnel
What is the most important of the 3 parts of the Security plan?
Personnel Security
Risk Assessment based on Loss Event Profile - security problem evaluated in what 3 quantitative terms?
1) types of risks2) probability of those risks becoming actual losses3) criticality of how the loss impact is measured (in assets & income)
What are the 5 “D”s of the Physical security concepts?
1) Deter2) Deny3) Detect4) Delay5) Destroy
What the hell do they mean by “Destroy” as a security concept?
Mitigate
What’s it called when you place progressively more difficult barriers/obstacles as lines of defense?
Protection in depth
What are the 3 types of security zones?
1) Restricted2) Controlled3) Unrestricted
What is a security cost-benefit analysis?
Costs of security operations vs savings / reductions
When is it OK to recommend non-cost effective security measures?
NEVER
There are 9 elements of security system design criteria. Which one is most important?
Cost
What does a perimeter barrier do?
Prevents / impedes an aggressor from crossing a perimeter boundary
What are the 5 types of physical barriers?
1) Natural2) Structural3) Human4) Animal5) Energy
Example of natural barriers
Rivers, creeks, cliffs
Example of structural barriers
berms, walls, doors, locks, glazing materials, plantings, ditches
Example of human barriers
Security officers, receptionists
Example of energy barriers
Intrusion detection and lighting
What are the 4 types of fencing?
1) chain link2) concertina3) barbed wire4) barbed tape
What’s the most popular type of fence?
Chain link
How high should chain link fence be?
7 feet + 1 foot for top guard
What gauge wire should chain link fence use?
9 gauge
How big are the squares in chain link fences?
2”
How far apart should the posts be in a chain link fence?
10 feet
What do you make chain link fences out of when near the sea?
Vinyl
Where should chain link fences have twisted and barbed salvage?
At the top and bottom
What should a chain link fence be fastened to?
Rigid metal or reinforced posts set in concrete
Where should the bottom of a chain link fence fall?
Within 2 inches of hard ground
Why should the bottom of a chain link fence fall below the surface of the ground?
To compensate for shifting soil or sand
How high should standard barbed wire fencing be?
7 feet high
How far apart should the strands be between standard barbed wire?
6 inches
Standard barbed wire is what gauge?
Twisted 12 gauge
Standard barbed wire uses how many point barbs?
4
Top-guard supporting arms do what?
Are permanently affixed, and increase height of fence by 1 foot
Windows need to be protected if they are over what size?
96 sq inches
Windows need to be protected if they are what height from the ground?
Less than 18 feet from the ground
Windows need to be protected if they are how close to trees?
Less than 14 feet from trees
Interior manhole covers need to be protected if they are how large?
More than 10 inches in diameter
What is the weakest area of a window?
The glass
Installation of transparent or translucent glass or plastic
Window glazing
Glass type: sheet, plate, float - breaks into large pieces
Annealed or plate glass
Glass type: Street-level windows or displays; intervening layer of plastic material. High shatter resistant. Needs secured frame.
Laminated glass
What type of glass is preferred for blast mitigation?
Laminated glass
What type of glass is the most commonly used?
Laminated glass
Glass type: safety and security 3-5 times stronger, and 5 times as heat resistant. Breaks into small pieces
Tempered glass
What are the purposes of protective lighting?
PsychologicalObject illuminationPhysical deterrent
What are the keys to using protective lighting?
Reduce manpowerProtection of officersRelieves officers for other duties
What are the 4 types of outdoor security lighting?
1) Continuous2) Standby3) Movable4) Emergency
What are lumens?
Light output
Intensity of light falling on a surface measured in foot-candles
Luminance
Measures how bright the light is when it reaches 1 foot from the source
Foot candles
What is the illumination of piers, docks, and open decks (water approach)?
1 foot candle
What is the minimum lighting for the perimeter of restricted areas?
0.40 foot candles
Human eye and a lens see an object when light reflected from that object
Reflectance
Ability of a lamp to faithfully reproduce the color seen in an object
Color Rendition Index (CRI)
Measure of warmth or coolness of a light
Corrected Color Temperature (CCT)
What kind of lamp is accurate as to CRI, used outdoors, and complement CCTV systems?
Metal halide
What is the optimum place for perimeter fence lighting?
Located within the protected area, and above the fence
What are the 6 types of lighting systems?
1) Continous2) Glare method3) Controlled4) Standby5) Portable6) Emergency lighting
Lighting system: a series of lights to maintain uniform lighting during hours of darkness
Continuous
Lighting system: light glares into the eye of a potential intruder
Glare method
Lighting system: Illuminates a limited space (ie fence line or road)
Controlled
Lighting system: Lit when required, standby lighting (auto or manual)
Standby
Lighting system: Manually operated search lights (eg flashlights)
Portable
Lighting system: Duplicate any others, limited to power failures, and depend on alternative power.
Emergency lighting
According to the NFPA, when should emergency lighting illuminate?
Within 10 seconds of a power failure
What should the illumination of a loading bay be?
15 foot candles
What type of wall is most resistant to explosion blast?
Reinforced concrete
Access control is designed to permit:
only authorized persons and vehicles
Access control is designed to detect and prevent entry of:
contraband
Access control is designed to detect and prevent the unauthorized removal of:
valuable assets
Access control provides information to:
facilitate assessment and response
What are the 3 types of access control?
1) Guards2) Card readers3) Biometric readers
What is the most common type of card reader?
Photo ID
What is the most commonly used coded card technology?
Magnetic stripe
What are the 3 basic parts to an Intrusion Detection System (IDS)?
1) Alarm sensor2) Communications path3) Annunciator or sound device
What are the 5 purposes of an IDS?
1) Economize2) Substitute3) Supplement4) Deter-Detect-Delay5) Respond
What is a microwave system based on?
the Doppler effect
Motion detector not impacted by air turbulence
Microwave system
Motion detector that penetrates non-metal
Microwave system
What is the most widely used motion detector?
Infrared (active and passive (PIR))
What is the best motion detector for a room with outside noise?
Ultrasonic
Ultrasonic must be kept how far away from air ducts?
At least 10 feet
What is the best alarm to put on a safe?
Capacitance device
What 3 elements make up the fire triangle?
/_\ 1) Heat2) Fuel3) Oxygen
Once heat, fuel and oxygen occur, this chemical reaction occurs:
Pyrolysis
Fire device: photoelectric
smoke detector
Fire device: blocks beam or enters refraction chamber and reflects light into photo cell
Smoke detector
Fire device: sensitive to invisible products of combustion
Ionization
Fire device: noted for early warning
Ionization
Fire device: When temperature reaches certain set temperature or rises too quickly
Thermal detector
Fire device: Detects flames and glowing embers that are infrared and unseen by the human eye
Flame detector
Class of fire: Paper, trash, wood, fiber
Class A
Class of fire: Gasoline, oil, cleaning solvents
Class B
Class of fire: electrical circuits such as generators, motors, fuse boxes
Class C
Class of fire: combustible metals such as sodium, magnesium, potassium
Class D
Class of fire: Combustible cooking fuels (vegetable or animal oils/fats)
Class K
Used to extinguish Class A
water/water fog or chemical type
Used to extinguish Class B
CO2 or water fog or dry chemical type
Used to extinguish Class C
CO2 and dry chemical type
Used to extinguish Class D
Dry powder which smothers and coats
Used to extinguish Class K
Wet chemicals, water based solutions of potassium carbonate, acetate, or citrate
Wire commincation: what is the enunciator?
Alarm signal board
How does optical fiber work?
Modulated light beams
What is multiplexing?
Transmission of several simultaneous messages on the same medium
What is Time Division Multiplexing (TDM)?
Events occur in a prescribed time sequence one at a time, shorter distance
What is Frequency Division Multiplexing (FDM)?
Simultaneous, multi-channel, longer distance
the amount of light on lens (critical to lighting choices)
Illuminance
What is the rule of thumb for officers watching monitors?
Less than 10 monitorsLess than 2 hoursto reduce fatigue
Temperature at which paper may be destroyed
350 degreesF
Electronic process media can begin to deteriorate at:
150 degrees F
Interior height of a vault should not exceed:
12 feet
The sensor which is used when air turbulence is present in the protected room and when there are no potential false alarm sources outside the room and in the field of the detector:
Acoustic detector
The sensor which is used when light air turbulence, vibration and motion outside the room are present:
Acoustic detector
The sound wave sensor
Ultrasonic sensor
This type of sensor is not influenced by exterior noise; reacts only to movement within a protected area; can be adjusted so the movement of air caused by fire will activate an alarm
Ultrasonic
What are the 2 major types of protective barriers?
1) Structural2) Natural
What are the 3 basic purposes of barriers?
1) Deter / delay2) Psychological deterrent3) Supplement/complement security personnel needs
What should positive barriers be established for?1)2)3)
1) Controlling car/foot traffic flow2) Checking ID of personnel entering/leaving3) Defining a buffer zone for more highly classified areas
When the greatest degree of security is essential, what should be installed on the perimeter?
Two lines of structural barriers
Two lines of structural barriers should be separated by not less than ________ feet and no more than __________ feet for best protection and control.
15 feet150 feet
Four types of fencing authorized for use in protecting restricted areas are?
1) Chain link2) Barbed wire3) Concertina4) Barbed tape
Chain link fences must be how high, excluding top guard?
7 feet
Chain link fences must be what gauge or heavier?
9 gauge
Chain link fences must have what size mesh openings?
2 inches per side or smaller
Chain link fences should have what at the top and bottom?
Twisted and barbed salvage
How must chain link fences be fastened?
To rigid metal or reinforced concrete posts set in concrete
On hard ground or paving, chain link fences must come how close to the ground?
Within 2 inches
On soft ground, chain link fences must reach below the surface deep enough to what?
Compensate for shifting soil or sand
Standard barbed wire is what kind of strand and what gauge?
Twisted, double strand, 12 gauge
How many points on barbs on barbed wire fences?
4
Barbs on barbed wire fences should be spaced how?
Equally apart
Barbed wire fencing should be at least how high, excluding top guard?
7 feet
Barbed wire fencing must be firmly affixed to posts not more than how many feet apart?
6
On barbed wire fencing, the distance between strands will not exceed how many inches?
6
On barbed wire fencing, one wire will be interlaced how?
Vertically and midway between posts
Commercially manufactured wire coil of high-strength steel barbed wire clipped together at intervals to form a cylinder is called:
concertina barbed wire
Opened concertina wire is ____ feet long and ____ feet in diamater
50, 3
The barbed tape system is composed of 3 things:
1) Barbed wire2) Barbed tape dispenser3) Concertina tape
Barbed tape is fabricated from a steel strip with a minimum breaking system of how many pounds?
500
The overall width of barbed tape is what?
3/4 of an inch
Barbed tape has _______ barbs spaced at ______ intervals along each side
7/16 inch barbs1/2 inch intervals
A top guard is an overhang made of what?
Barbed wire or barbed tape
A top guard faces in what direction?
outward and upward
What angle is a top guard positioned at?
45 degrees
How are the top guard’s supporting arms attached?
Permanently affixed to the top of fence posts
How much do top guards increase the height of a fence?
By at least 1 foot
What must be installed on the supporting arms of a top guard?
3 strands of barbed wire, spaced 6 inches apart
Manhole covers must be secured when they are how large?
10 inches or more in diameter
Unavoidable drainage ditches, culverts, vents, ducts, and other openings having a cross-sectional area of what size must be protected by securely fastened welded bar grills?
96 inches
A clear zone should exist between the perimeter barrier and where?
Exterior structures, parking areas, and natural or manmade features
How big should the clear zone be between the perimeter barrier and exterior structures / parking areas?
20 feet or more
A clear zone of 50 feet or more should exist between the perimeter barrier and structures within the protected areas except when?
When a building wall constitutes part of the perimeter barrier
It is practically impossible to build a protective barrier that cannot be penetrated by what?
a human or heavy armor
What are the 3 main lines of defense for physical security?
1) Perimeter barriers2) Exterior walls, ceilings, roofs, and floors of buildings3) Interior areas within the building
What is the first line of defense for physical security?
Perimeter barriers
Where are perimeter barriers located?
At the outer edge of the property
What is the second line of defense for physical security?
Exterior walls, ceilings, roofs, and floors of the buildings themselves
What is the most frequently used fencing for security purposes?
Chain link fencing
What is a major advantage of chain link security fencing?
Visibility on both sides of the perimeter barrier to police and security officer
What is a major disadvantage of chain-link fencing?
It creates an “institution-like atmosphere”.
All nuts and bolts holding hardware attachments on a chain link fence should be:
welded
The gate in a security perimeter barrier should be how high?
As high as the adjoining barrier (fence)
How may a top guard on a gate be different than a top guard on a fence?
It may be vertical
How frequently should you have signs along the perimeter stating that the property is not open to the public and intruders will be prosecuted?
Not more than 100 ft intervals
If possible, ________________ should be locked from the inside.
All doors except one
The door not locked from the inside should be where?
On a well-lighted, police-patrolled street
The door not locked from the inside should be used by whom?
All employees coming and leaving work
Fire exit doors, required by building codes, are ___________ for security but _______ for safety.
Undesirable for securitynecessary for safety
How are fire exit doors openable?
By pushing against a panic bar on the inside.
Security of a fire exit door is enhanced by the use of what?
audible alarms
Unusually long warehouse doors should be secured how?
Padlocked on the inside at both ends
What are 2 ways door hinge pins exposed to the outside can protected?
1) By spot welding2) By inserting a headless machine screw in a pre-drilled hole through a leaf of the hinge
What kinds of doors are a definite security risk?
Hollow core
Intruders probably won’t use a window how high from the ground?
18 feet or higher
Windows should be secured if they are how far from trees?
14 feet
Windows should be secured if they are how far from adjoining buildings?
14 feet
Windows should be secured if they are how large?
96 square inches
Windows should be secured if they are how far from the ground?
18 feet
What are 4 protective coverings for windows?
1) Burglary-resistant glass2) Protective iron or steel bars3) A good grade of heavy steel mesh4) Chain-link fencing
How many break-ins occur through window glass?
Over 50%
Who makes the burglary-resistant “safety glass”?
Underwriter’s Laboratories
Who makes the burglary-resistant plastic glazing called TUFFAK?
Rohm and Haas
Who makes the burglary-resistant plastic glazing called LEXAN?
General Electric
Who makes the burglary-resistant acrylic-glazing material sold as Plexiglas?
Rohm and Haas
Special security problems are created by these 6 conditions which breach the perimeter barrier:
1) Sidewalk elevators2) Utility tunnels3) Operational tunnels4) Storm sewers5) Storm doors6) Piers, docks, and wharves
The button, magnetic switch, or thermostat that will cause system to alarm
Actuator
This is the monitor. Technically, it is the visual or audible signaling device that indicates conditions of the associated circuits.
Annunciator
The property of two or more objects which enables them to store electrical energy in an electrostatic field between them.
Capacitance
Records a change in capacitance or electrostatic fields to detect penetration through windows, ventilators, and other openings
Capacitance Proximity Sensor
Can be used to detect attempted penetration into safes or storage cabinets
Capacitance Proximity Sensor
Material which transmits electric current
Conductor
Examples of material which transmits electric current
Wire and cable
The terminal box for all sensors
Control Unit
A term applied to a system designed so that if a component fails to function properly, the system will, by a signal or otherwise, indicate its incapacity
Fail-Safe
Used to call for assistance
Duress sensor
What does a duress sensor consist of?
A hand or foot operated switch
Activation of sensors for which no cause can be determined
False Alarm
The combination of components to include sensors, control units, transmission lines and monitor units integrated to operate in a specified manner
Intrusion Detection System
Devices that initiate alarm signals by sensing the stimulus, change, or condition for which designed
Intrusion Detection Sensors
An electronic bell for outdoor or indoor use in the vicinity of a protected area
Local Audible Alarm
A radio/radar frequency (RF) transceiver which detects motion
Microwave sensor
A microwave sensor has a frequency range of GHz, which is what?
a billion cycles per second
A device that senses and reports on the condition of the system
Monitor
Detects movement inside the area to be protected
Motion Sensor
Detects the sounds of forced entry throughout walls, ceilings, and doors
Passive Ultrasonic Sensor
Detects entry through doors, windows, walls, or any other openings into the protected area
Penetration Sensor
An interruption of a light beam transmitted to the receiver causes this to alarm:
Photoelectric System
A photoelectric system consists of what 2 separate units?
1) a transmitter2) a receiver
The frequency range of sound that is above the capabilities of normal human hearing
Ultrasonic
In intrusion detection systems, ultrasonic is used in what range?
Between 21,500 and 26000 Hz (cycles per second)
Detects by frequency shift the motion of an intruder inside the protected area
Ultrasonic Motion Sensor
Detects forced entry through metal barriers placed over windows and ventilators or attempts to drill, saw, or cut through walls, ceilings, floors or doors
Vibration Sensor
What are the 3 purposes of intrusion detection alarm systems?
1) To economize on people2) To substitute in place of other security measures3) To supplement by providing additional controls
What are the 5 basic principles of operation of intrusion detection systems?
1) Breaking of an electrical circuit2) Interrupting a light beam3) Detecting sound4) Detecting vibration5) Detecting a change in capacitance due to penetration of an electrostatic field
What are the 4 types of electro-mechanical alarm systems?
1) Metallic foil2) Magnetic switches3) Wire service detection4) Pressure mats, ribbons, or wafers
What are the 6 types of Volumetric alarm systems?
1) Capacitance2) Vibration3) Microwave4) Ultrasonic5) Passive Infrared6) Photo Electric
Type of alarm system: The protective circuits activate a visual or audible signal in the immediate vicinity of the object of protection
Local alarm system
Type of alarm system: This system is one in which the installation-owned system is a direct extension of the police and/or fire alarm systems.
Auxiliary system
What is the least effective alarm detection system?
Auxiliary
Type of alarm system: In this system, alarms are transmitted to a central station outside the installation from which appropriate action is taken to notifying local police or fire departments
Central station system
Type of alarm system: It is similar to the central station system except is owned by, and located on, the installation.
Proprietary system
Which alarm detection system responds to alarms with the installation’s own security or firefighting personnel?
Proprietary system
What are the 3 basic parts of an alarm system?
1) Sensor2) Circuit3) Annunciator
What does the sensor do?
It’s the triggering device
What does the circuit do?
Carries the message to the signaling apparatus
What does the annunciator do?
It is the signaling system or device
What are the 4 functions an alarm system could have?
1) Detection of fire2) Detection of intrusion3) Emergency notification4) Monitoring of equipment or facility conditions
What estimated percentage of all alarms are false?
90-98%
What are the 3 most common causes of false alarms?
1) User negligence2) Poor installation or servicing3) Faulty equipment
CCTV consists of what 4 elements?
1) Television cameras2) Monitor3) Connecting circuits4) Power source
Protective lighting is important in what 3 ways?
1) Deters violators2) Assists security force3) Essential element of an integrated physical security program
Protective lighting is _____________ to maintain
Inexpensive
Protective lighting will probably reduce the need for what?
security forces
Protective lighting may provide personal protection for security forces how?
By reducing the element of surprise by an intruder
Protective lighting requires ______ intensity than working light.
Less
When planning protective lighting, you must consider:1)2)3)
1) Effects of local weather2) Fluctuating voltages in power source3) Using a ledger to maintain burning time record based on life-expectancy of the lamp
All limited and exclusion areas musat have protective lighting on a permanent basis where?
Both the perimeter and access control points
Lighting must be positioned to do what to the security force?
1) Prevent glare to security force2) Avoid silhouetting the security force
The perimeter band of lighting must provide a minimum intensity of what measured 6 inches above the ground?
0.2 foot candles
How far must the perimeter band of lighting extend?
At least 30 feet outside the exclusion area barrier
Lighting inside exclusion areas or on structures containing nuclear weapons must be of sufficient intensity to enable what?
Detection of persons in the area or at structure entrances
Lighting at entrance control points must be of sufficient intensity to enable guards to what?
compare and identify bearers and badges
Protective lighting systems must be operated when?
During hours of darkness
Failure of one or more lights should not affect:
the operation of remaining lights
________________ should be adequate to sustain the protective lighting of all vital areas and structures.
The stand-by power source
The cone of illumination from light source should be directed where?
Downward & away from the protected area / security personnel
Where should the light source for perimeter fence lighting be located?
Within the protected area and above the fence
An effective light system must provide means of what?
Convenient control and maintenance
Protective lighting should never be used alone, but what?
With other security measures
Protective lighting should enable security force to do what?
Observe without being seen
Good protective lighting should consist of ______________ light upon bordering areas
adequate and even
Good protective lighting should consist of ____________ in eyes of intruder
glaring lights
Good protective lighting should consist of _________ light on security patrol routes
little
What are the 2 basic systems used to provide effective protective lighting?
1) Light boundaries and approaches2) Light area and structures within general boundaries of property
To be effective, protective lighting should:1) Act as _____2) Make __________ likely
Act as deterrentMake detection likely
What are the 4 general types of protective lighting systems?
1) Continuous2) Standby3) Movable4) Emergency
What is the most common protective lighting system?
Continuous
What lighting systems consist of stationary luminaries?
Continuous & Standby
What are the 2 primary methods of employing continuous lighting?
1) Glare projection2) Controlled lighting
What lighting system has luminaries that are not continuously lighted?
Standby
What lighting system consists of manually operated movable searchlights which may be either lighted either during darkness or only as needed?
Movable
What lighting system is usually used to supplement continuous or standby lighting?
Movable
What lighting system may duplicate the other three systems in whole or in part?
Emergency
What lighting system is limited to times of power failure or other crisis?
Emergency
What lighting system depends on alternative power sources such as portable generators or batteries
Emergency
How should piers and docks be safeguarded?
By illuminating both water approaches and the pier area
Decks on open piers should be illuminated to at least _____ foot candles
1
Water approaches, extending to a distance of _____ feet from the pier, should be illuminated to at least _____ foot candles
100 feet0.5 foot candles
The circuit of lighting arrangements should be arranged so that failure of any one lamp will not:
leave a critical or vulnerable position in darkness
Where should feeder lines be located?
Undeground (or sufficiently inside the perimeter in the case of overhead wiring)
Why should feeder lines be underground?
to minimize sabotage or vandalism from outside the perimeter
What foot candles on horizontal plane at ground level are recommended for the perimeter of outer area?
0.15
What foot candles on horizontal plane at ground level are recommended for perimeter of restricted area?
0.4
What foot candles on horizontal plane at ground level are recommended for vehicular entrances?
1
What foot candles on horizontal plane at ground level are recommended for pedestrian entrances?
2
What foot candles on horizontal plane at ground level are recommended for sensitive inner areas?
0.15
What foot candles on horizontal plane at ground level are recommended for sensitive inner structures?
1
What foot candles on horizontal plane at ground level are recommended for entrances?
0.1
What foot candles on horizontal plane at ground level are recommended for open yards?
0.2
What foot candles on horizontal plane at ground level are recommended for decks on open piers?
1
What is one candle power?
The amount of light emitted by one standard candle
What is one lumen?
The amount of light required to light an area of one square foot to one candle power
What is one foot candle?
One lumen of light per square foot of space
How is the intensity of illumination measured?
In foot candles
What is an example of incandescent lighting?
the common light bulb
What are 2 advantages of incandescent lighting?
1) Instant2) Light can be reflected or diffused
What are the 2 major types of gaseous discharge lamps?
1) Mercury vapor2) Sodium vapor
What color do mercury vapor lights give off?
Soft blue
What color do sodium vapor lights give off?
Soft yellow
How long do gaseous discharge lamps take to light when cold?
2-5 minutes
How long do gaseous discharge lamps take to light when hot?
5+ minutes
Gaseous discharge lamps are ____ effective than incandescent
more
What kind of lamps are widely used where fog is a problem?
Gaseous discharge lamps
What kind of lamps are frequently found on bridges and highways?
Gaseous discharge lamps
The four basic types of lights with security applications are:
1) Floodlights2) Searchlights3) Fresnels4) Street lights
This type of light is directional, with some diffusion to light specific areas
Floodlights
This type of light project light in a concentrated beam
Searchlights
This type of light is appropriate for use in instances calling for illumination of boundaries
searchlights
This type of light uses wide beam unites used to extend the illumination in long, horizontal strips
Fresnels
Fresnels project a narrow beam approximately ______ degrees in the horizontal and _______ in the vertical plane
180 degrees horizontal15-30 degrees vertical
This type of light is an appropriate application to light parameters since light light is lost vertically
Fresnels
This type of light produces a diffused light widely used in parking areas
Street lights
What is the most accepted and widely-used security device?
The lock
Locks should not be considered bars to entry, but ___________.
Delay devices
Can a key lock be picked?
Yes, by an expert
Two downsides to key locks are the possibility of what?
losscompromise
Can a conventional combination lock be picked?
Not picked, but opened by a skillful manipulator
If you need a high degree of protection for highly-classified or important material, you should use what kind of combination lock?
Manipulation-resistant combination lock
For containers of highly-important items, you’d use what kind of combination lock?
A combo lock with 4 or more tumblers
Where can relocking devices be found?
Attached to a safe or vault door
Five features of interchangeable cores:
1) quickly replaced2) can be keyed into overall complete locking system3) Economical4) System is flexible5) Simplified record keeping
What is a digital combination door locking device?
A cypher lock
What kind of lock offers no security and is the worst selection for security?
Warded locks
Wafer locks are also known as
disc tumbler locks
What kind of lock is used on most cars, desks and cabinets?
Wafer lock
Rank these in order from least to most secure:Wafer lockWarded lockPin tumbler lock
Warded lockWafer lockPin tumbler lock
What kind of lock is used extensively in commercial, military, and residential security?
Pin tumbler locks
¿Qué tipo de cerraduras se usan en las cajas de seguridad y son difíciles de abrir?
Cerraduras de palanca
What kind of lock is opened by pressing a series of numbered buttons in proper sequence?
Code-operated locks
What kind of lock uses keys that are etched, embossed, or contain a pattern or copper flecks?
Card operated locks
Card operated locks can be either _____________ or ________.
Electrical or electromagnetic
What kind of lock holds the door closed by magnetism?
Electromagnetic locks
What kind of lock should be hardened and strong enough to resist prying?
Padlocks
Padlocks should be ________ at all times, even when not securing an area.
Locked
What kind of keying system is a key to a single lock within a master key system?
Change key
What kind of keying system is a key which will open all the locks within a particular area in a facility?
Submaster key
What kind of keying system is a key which will open all the locks when two or more submaster systems exist?
Master key
What kind of keying system is a key that will open everything in a system involving two or more master key groups?
Grand-master key
Keys should be accessible only to whom?
Those whose official duties require access
How often should combinations to safe locks and padlocks securing containers for classified information be changed?
At least every 12 months
When should the combinations to safe locks and padlocks securing containers for classified information be changed early?1)2)
1) Loss or possible compromise2) Discharge, suspension, or reassignment of anyone having knowledge of the combination
More frequent rotation of ___________________ may be required in certain circumstances
key padlocks
When selecting combination numbers, what should be avoided?
Multiple & simple ascending or descending arithmetical series
Use of keys must be based on the same general concept applied to what?
Safe combinations
How often should inventories of key systems be conducted?
At least annually
When a key is issued, the following should be recorded:1)2)3)4)5)
1) Key number2) Name of person3) His/her position4) Date of issuance5) Any other relevant data
When a key is lost, circumstances should be:
investigated & set forth in writing
Master keys should be kept at:
a minimum
Traffic control includes the following:1)2)3)4)
1) ID of employees and visitors2) Directing movements of employees & visitors3) Package control4) Control of trucks & private cars
All visitors must be required to:
identify themselves.
What kind of access should visitors be limited to?
Predetermined, unrestricted areas
What is the most practical system of identification?
Badges or ID cards
To be effective, how large should the photo be on an ID?
At least 1-inch square
How often should badge photos be updated?
Every 2-3 years, and when facial appearance changes
A badge system is only as effective as its:
enforcement
Packages brought in should be:
inspected
In most cases, what kind of inspection will suffice for packages?
spot checking
Any policy relative to package control must be _____________.
widely publicized in advance
Where possible, the parking area should be _________________ from all other areas of the facility.
separated
Parking area should be protected from:
intruders
Employees and visitors going to and from cars should pass through _______________ manned by _______________.
pedestrian gates manned by security personnel.
In comparison to other security elements, guards areA) expensiveB) inexpensiveC) comparable
expensive
Who usually receives higher hourly wages, proprietary guards or contract guards?
Proprietary
What are 3 advantages of proprietary guards?
1) Less turnover2) More familiarity with facilities3) Tend to be more loyal
What are 3 disadvantages of proprietary guards?
1) Higher cost2) May be required to join union3) Problem ensuring back-up personnel
5 advantages of contract guards:
1) cheaper2) Fewer admin & payroll related responsibilities3) Contractor responsible for scheduling & supervision4) Able to obtain extra guards when needed5) Security firm usually accepts liability in civil suits
Disadvantages of contract guards:1)2)3)4)
1) Lack of training2) Less loyal3) Large turnover4) Not familiar with plant
Training programs for private security personnel are generally:
inadequate
How many hours of formal pre-assignment training should unarmed guards have?
8
How many additional hours of training should unarmed guards have in their first 3 months of assignment?
32
What is the minimum recommended age for private security personnel?
18 years old
What’s the minimum education for private security personnel?
High school or equivalent
Armed personnel should have what kind of vision and hearing?
Vision: correctable to 20/20Hearing: ordinary conversation at 10 feet with each ear
Unarmed personnel should have what kind of vision and hearing?
Just no physical defects that would hinder job performance
Armed security personnel should be required to successfully complete what?
A 24 hour firearms course including legal & policy requirements OR submit evidence of competency & proficiency prior to assignment
How often should armed personnel be required to qualify with the firearm?
At least once every 12 months
What are the additional recommended qualifications set forth by the task force that armed guards must have that unarmed guards do not necessarily need?1)2)3)4)
1) No felonies involving weapons2) No felonies or misdemeanors that reflect ability to perform as an armed guard3) No physical defects that would hinder job performance4) Complete training for armed personnel
A peace officer is generally allowed wider discretion than a private citizen with what?
making arrests or apprehensions
The reputation of a peace officer often carries with it the right to what?
carry deadly weapons
The status of peace officer may open ________________ not otherwise available
channels of communication
A disadvantage of having a peace officer is that they are also subject to:
due process
A disadvantage of a peace officer is that they may be subject to emergency:
draft or mobilization orders of local authorities
What is the number of personnel required to cover a single post around the clock, providing coverage for 3 eight hour shifts?
4.5
The process of conducting an exhaustive physical examination and thorough inspection of all operational systems and procedures of a facility is known as:
a security survey
The 4 purposes of a security survey:
1) Determine existing state of security2) Locate weakness in defenses3) Determine degree of protection required4) Produce recommendations establishing a total security program
Who should conduct a security survey?1)2)
1) Staff security personnel2) Qualified security specialists (both of whom should have had training in the field)
No checklists exists that could be universally applied for survey purposes, because:
no two facilities are alike
A security survey is known by a number of different terms, such as1)2)
1) Risk analysis2) Risk assessment
What are the 3 key steps in a risk assessment process?1)2)3)
1) Determine value, impact, and cost of any asset should it be lost due to natural or man-made forces2) Determine the degree of vulnerability of the facility to damage or attack by natural or man-made forces3) Determine the degree of probability that natural or man-made forces will strike any given facility
What are the 3 ways the “vulnerability of a facility” to damage or attack may be determined?
1) Inspection of the facility by an experienced inspector2) Examination of the facility’s record of losses3) Determination whether the high-value property or items are properly safeguarded from theft by insiders
Security surveys determine existing vulnerabilities to:
injury, death, damage, or destruction by natural causes
Security surveys determine existing vulnerabilities of corporate assets due to:
outside criminal activityORcriminal activity within organizations
Security surveys determine existing conditions of:
physical security of corporate property
Security surveys measure effectiveness of:
current security police
Security surveys measure compliance of:
employees to security rules
Security surveys conduct internal audit to determine:
fraud
Security surveys inspect overall condition within facility which cause:
security probelms
Security surveys investigate _____________________ in the community from a standpoint of interaction within the facility.
Environmental conditions
One of the big differences between physical security surveys and crime prevention surveys is that physical security measures are oriented more towards _____________-, but crime prevention measures focus on ______________.
Security of property and facilitiesDeterrence of criminal activity regardless of physical safeguards
When conducting a security survey, __________ should always be obtained.
Written authority
When conducting a security survey, any ______________ should be reviewed.
previous surveys
When conducting a security survey, a(n) _________________ tour should be made.
orientation
When conducting a security survey, _____________ should be taken of objects or situations that are difficult to describe.
photographs
When conducting a security survey, there should be a review with who of all deficiencies found?
Local plant supervisors
When conducting a security survey, how should you ascertain if deficiencies have been corrected?
With a follow-up survey
When conducting a security survey, a ____________ should be prepared.
Cost-benefit analysis
The direct comparison of the costs of the operation of the security unit and all security measures with the amount of corporate property saved or recovered as well as reduction of losses caused by injuries and lost production time
Cost-benefit analysis
When conducting a security survey, no security measure should be recommended which is not:
cost effective
What are the 2 categories used to describe the measure of protection of safes?
1) Fire resistive2) Burglary & robbery resistive
Rating safes in the area of fire protection is done through:1)2)
1) Safe Manufacturers National Association2) Underwriter’s Laboratories
Which rater of fire protection is only seen on older safes, because they are no longer in existence?
SMNA (Safe Manufacturers National Association)
When did UL cease the use of letter classifications?
After 1972
UL classifications now indicate what on their labels?
The type of container and the level of protection
Fire resistive safes give very little resistance against what?
Safecrackers
Once exposed to a fire, a fire-resistive safe does not have what?
The degree of protection for which it was originally rated
350-4Temperature?Time?Impact?Old Label?Fire/Money?
2000 degrees F4 hoursImpact - YesOld Label - AFire
350-2Temperature?Time?Impact?Old Label?Fire/Money?
1850 degrees F2 hoursImpact - YesOld Label - BFire
350-1Temperature?Time?Impact?Old Label?Fire/Money?
1700 degrees F1 hourImpact - Yes Old Label - CFire
350-1 (Insulated)Temperature?Time?Impact?Old Label?Fire/Money?
1700 degrees F1 hourImpact - NoOld Label - DFire
350-1/2Temperature?Time?Impact?Old Label?Fire/Money?
1550 degrees F1/2 hourImpact - No Old Label - EFire
150-4Temperature?Time?Impact?Old Label?Fire/Money?
2000 degrees F4 hoursImpact - YesOld Label - NoneFire
150-2Temperature?Time?Impact?Old Label?Fire/Money?
2000 1850 degrees F2 hoursImpact - YesOld label - noneFire
150-1Temperature?Time?Impact?Old Label?Fire/Money?
1700 degrees F1 hourImpact - YesOld label - noneFire
What UL ratings are designed for Computer Media Storage Classification?
The 150’s
What UL class is not impact resistant?
Insulated Record Containers
What temperatures are computer media storage containers rated to protect by UL?
1700-2000 degrees
Burglary and robbery-resistive mercantile safes are classified by the design features of what?
The door, wall and lock
TL-15 is resistant to what?
Tools
TL-15 has what weight?
At least 750 lbs, or anchored
TL-15 has what body?
At least 1-inch thick steel or equal
TL-15 attack is what?
Door and front face must resist attack with common hand & electric tools for 15 minutes
TL-30 is resistant to what?
Tools
TL-30 has what weight?
At least 750 lbs, or anchored
TL-30 must have what body?
At least 1-inch thick steel or equal
TL-30 attack is what?
Door & front face must resist attack with common hand and electric tools, plus abrasive cutting wheels and power saws, for 30 minutes
TRTL-30 is resistant to what?
Tools and torches
In 1980, UL stopped issuing the TRTL-30 label and replaced it with what label?
TRTL-30X6
What does the x6 in TRTL-30X6 mean?
Equal protection on all 6 sides
TRTL-30 has what weight?
At least 750 lbs
TRTL-30 has what attack?
Door and front face must resist attack with all tools, as well as oxy-fuel gas cutting or welding torches for 30 minutes
TRTL-30X6 is resistant to what?
Tools and torches
TRTL 30X6 has what weight?
At least 750 lbs
TRTL-30X6 has what attack?
Door and ENTIRE BODY must resist attack with all tools and torches, as well as electric impact hammers and oxy-fuel gas cutting or welding torches for 30 minutes
TXTL-60 is resistant to what?
Tools, torches, and explosives
TXTL-60 has what weight?
At least 1000 lbs
TXTL-60 has what attack?
Door and body must resist attack from all tools, torches, as well as eight ounces of nitroglycerin or its equal for 60 minutes
As a general rule, the door of a burglary resistive safe must be made of what material and thickness?
Steel, 1.5 inches thick
What is the safecracking method that is accomplished by knocking off the combination dial and drilling a hole to expose the locking device?
Drilling or punching
What is the safecracking method that uses high temperature oxyacetylene torches to cut an opening in the wall or door of the safe?
Burning
What’s another word for an oxyacetylene torch?
Burning bar
What is the safecracking method that attacks the seams of metal plates with pry bars and other tools to peel back layers of metal, thus exposing either the locking mechanism or the interior?
Peeling
What is the safecracking method that is similar to peeling, except it can be accomplished against a solid, metal-walled container within a thin wall?
Ripping
What is the safecracking method utilized to reveal the position of the combination and mechanism necessary to open the safe?
X-ray
What is the safecracking method that uses nitroglycerin and plastic explosives?
Explosives
What safecracking method has lost popularity?
Explosives
What are some of the power tools used to crack safes?
Rotary devicesHydraulic toolsPower drills
What is the technique that very few safecrackers have the skill to use?
Manipulation
No safe is:
impenetrable
How should a safe that weighs less than 750 lbs be secured?
Anchored to the building structure
What is a vault?
An enlarged safe
What is the body of a vault made of?
High quality, reinforced concrete
Where are vaults usually located?
At or below ground level
How thick are a vault’s doors?
At least 6 inches thick
How thick should the walls, ceiling, and floor of a vault be?
Twice as thick as the door but never less than 12 inches.
What are the 2 types of alarm systems a vault should be supported by?
1) Capacitance2) Vibration
Who establishes the ratings for vaults?
Insurance Services Office (ISO)
What are the 2 phases of the system design process?
Planning & Design
The planning phase consists of collecting _____________ and formulating _____________.
Collecting information on security needs, objectives, & constraintsFormulating concepts for security countermeasures
The planning phase includes the development of what?
The business & economic justification
The planning phase includes documentation that is clear and complete to ensure what?
Consistent & accurate interpretation by vendors for procurement and implementation
A combination of equipment, peresonnel, and procedures design, coordinated in such a way as to assure optimum achievement of the system’s stated security objectives
System
The logical and symbiotic combination of the technology, supported bye the staffing and procedural elements
Integration
Used to develop countermeasure solutions to the problems identified by a vulnerability assessment
Requirements Definition
The mission or objectives of the integrated security system (ISS) mus reflect and support what?
The overall mission
Level of confidence factor for each requirement must focus on what?
Preventing, delaying or modifying the consequences
The ground rules for the design and selection of subsystems and components
Design Criteria
Also known as functional requirements
Design Criteria
The design criteria fall into a number of categories based on:
Expected performanceOperational and financial considerationsStyle & designCodes & standards
Design criteria - codes and standards
National and local building codessafety codes and laws
Design criteria - Quality
Sensible levels are needs to ensure costs are kept in check
Design criteria - Capacity
Size and space requirements affect the design solutions and impact anticipated expansion
Design criteria - Performance
Detailed in the system specs. Include interface, reliability, and maintainability
Design criteria - Features
Major system features should be defined
Design criteria - Cost
Most common constraint & should be defined in a budget
What is the most common constraint of design criteria?
Cost
Design criteria - Operations
Need to have minimum negative impact on productivity
Design criteria - Culture and image
Greatly factors into the implementation of security programs in the corporate environment and the acceptance of change
Design criteria - monitoring and response
Proprietary vs. off site monitoring
Minimum Security Specifications - Instructions to bidders
List of all documents included in the contract
Minimum Security Specifications - Functional description
Intended operation and installations schedule
Minimum Security Specifications - 3 lists needed
1) List of all products & services included in the contract2) List of all products & services required but part of another contract3) List of applicable codes & standards
Minimum Security Specifications - Support services
Drawings, submittal, testing, training, warranty, maintenance
Minimum Security Specifications - Technical descriptions of all…
major subsystems and components
Minimum Security Specifications - General….
site conditions
Procurement - Used for smaller projects and usually involves a pre-qualified contractor
Sole source
Procurement - Commonly used by non-government organization.
Request for proposal
This type of procurement’s specifications can be generic and performance based
Request for proposal
Procurement - Used by government when a competitive bid is required and the award be given the lowest *qualified* bidder
Invitation for bid
¿Qué proceso utiliza un administrador de seguridad para establecer prioridades en la protección de activos?
- Encuesta de auditoria
- Encuesta de seguridad
- Análisis o evaluación de riesgos.
- Revisión de inspección
- Tanto byc
- Todas las anteriores
E. Tanto byc
The degree of protection desired in any installation is predicated on an analysis of which of the following?
- Cost and vulnerability
- Cost and criticality
- Criticality and vulnerability
- Vulnerability and environmental conditions
- None of the above
C. Criticality and vulnerability