Physical Security (25%) Flashcards
CPTED
What are the 8 Main categories of Physical Security Measures
- CPTED (Crime-Prevention Through Environmental Design
- Physical barriers & site hardening
- Physical entry & access control
- Security Lighting
- Intrusion Detection
- Video Surveillance
- Security Personnel
- Security policies & procedures
CPTED
What can lead to a reduction in the opportunity fear & incidence of predatory, stranger-to-stranger type crime?
Proper design & effective use of the built environment
CPTED
¿Qué puede también resultar en una mejora de la calidad de vida: cómo y dónde vivimos, trabajamos y jugamos?
CPTED
CPTED
CPTED should be integrated into…?
The design & function of the buildings or location
CPTED
All Human Space…
Has some designated purpose
Has social, cultural, legal or physical definitions that prescribe the desired & acceptable behaviors
Is designed to support & control the desired & acceptable behaviors
CPTED
CPTED is the design or redesign of a venue to reduce crime opportunity & fear of crime through?
Natural Means
Mechanical Means
Procedural (organizational) means
CPTED
At its core, CPTED is based on common sense & a heightened awareness about how people use their space for legitimate & criminal intentions
CPTED
3 Classes of CPTED Strategies
- Mechanical measures
- Organizational measures
- Natural or architectural measures
CPTED Strategies
Natural access control
Natural surveillance
Natural territorial reinforcement
Management & maintenance
Legitimate activity support
Compartmentalization
CPTED
Methods for implementing CPTED
Organized methods (staffing)
Mechanical methods (technical products)
Natural methods (site planning, design, landscaping, signage)
CPTED
Once the first window is broken, vandalism and/or other crime quietly follow if it is not prepared
Broken Window Theory
CPTED
CPTED is congruent with the 3 D’s
Deterring
Detecting
Delaying aggressors
CPTED
Preventing crime & losses is inherent in many human functions behaviors & activities
CPTED
CPTED security standards focus on 4 categories
- Perimeter & exterior security
- Entry security
- Interior security
- Security planning
CPTED
Types of CPTED Security Zones
- Unrestricted zones
- Controlled zones - authorized personnel in these general areas
- Restricted zones - authorized personnel in these specific areas
CPTED
Deterrence is achieved through…?
Measures that potential adversaries perceive as too difficult to defeat
CPTED
For the security professional, CPTED is a set of management tools targeting…?
Places
Behavior
Design & Use of Space
CPTED
What is more cost-effective than making changes after construction starts
Integrating CPTED during the initial planning
CPTED
Whenever possible, security planning should begin during…?
Site Selection
CPTED
CPTED is intended to be integrated throughout the construction process
Programming
Schematic Design (SD)
Design Development (DD)
Construction documents or working drawings (CD)
Bids for construction & selection of contractor (RFP)
Security needs should be addressed int he programming phase
CPTED
Establish a secure perimeter around the building as far out as possible… setbacks how far?
100 ft. is suggested
CPTED
Where should you position concrete flower planters etc…?
Near curbs less than 4 ft between them to block cars
CPTED
Locate parking as far from the building as practical & place it within view of occupied rooms or facilities
CPTED
Landscaping Considerations
Low growing plants should be set back 1 yard from the edge of paths or walkways
Low-growing shrubs should be kept no higher than 32” in height
Tree canopies should be trimmed up to 8’ to provide a clear line of the site & reduce hiding spots
CPTED
Parking garages should be equipped with what?
- 3 ft. or higher shrubs/trees should be 10-15 ft. from the structure
- Booths should have 360 degrees visibility & a means of communication
- No public restrooms but should be within view of the booth
- One vehicle entry/exit should be used if possible (based on traffic volume)
- Open-walled, upper levels to allow natural surveillance & permit hearing of calls for help
- Egress only exterior pedestrian doors
CPTED
Parking Garages (ctd…)
- Potholes in solid walls for visibility
- Stairwells & elevators in a central location visible from both
- Stairwells visible from exterior & offering no hiding place & no roof access
- Elevators with glass for exterior visibility along the exterior of the facility
- Access only to the lobby from the garage elevators or stairs
- Adequate lighting
Access Control
Refers to the process of managing databases or other records & determining the parameters of authorized entry, such as who or what will be granted access when they may enter where access will occur
Access Control
Access Control
Categories of Access Control
Manual
Machine Aided
Automated
Access Control
Types of attacks used to defeat access controls
Deceit
Direct Physical Attack
Technical Attack
Entry Control
An entry control subsystem includes the following performance measures…
Throughout
Error Rates
Entry Control
An Entry Control Subsystem
- is not an access control system
- Is part of the detection system
- Allows the movement of authorized personnel & material into & out of facilities
- Detects & possibly delays movement of unauthorized personnel & contraband
- Refers to the physical equipment used to control the movement of people or material into an area
Entry Control
Objections of an entry control system used for physical protection are…
- To permit authorized persons to enter & exit
- To detect & prevent the entry or exit of contraband material (weapons, explosions, unauthorized tools, or critical assets)
- To provide information to security personnel to facilitate assessment & response
Entry Control
Verification of authorization of personnel to enter a controlled area is usually based on…
- Carrying a valid credential (what you have)
- Knowing a valid PIN (what you know)
- Possessing the proper, unique physical characteristics on file (who you are)
Badge Technologies
Magnetic Stripe (“mag stripe”)
- Widely used in commercial credit/debit cards
- Low-coercivity (“LoCo”) cards are 300 oersteds; easy to erase; typical of credit/debit cards
- High-coercivity (Hi - CO) cards are 2500 to 4000 oersteds; hard to erase, but can be done with rare_earth magnets; typical of company badges
- Easily forged, duplicated (can use proprietary encoding schemes but not common)
Access & Entry Control
Badge Technologies
- Magnetic Stripe
- Bar Code
- Proximity
- Smart Card
Access/Entry Control
Badge Technologies Proximity…
- Small RF transponder/transmitter is powered by an onboard battery (active) or it is energized by the card reader (passive)
- Low-frequency badges are in the 125 KHz range
- High-frequency badges range from 2.5 MHz to over 1 GHz
Access/Entry Control
Badge Technologies - Smart Card
- Gold contacts on the surface of the card allow for communication with a reading device
- Contactless smart cards use RF communications & do not have the gold contacts
- Main advantages: Large memory & its high degree of resistance to forgery or compromise
- Ability to encrypt communications
- Can be prohibitively expensive
- Homeland Defense Presidential Directive (HSPD 12)
Access/Entry Control
Personal Identity Verification System
Biometrics
- Corroborate claimed identities on the basis of one or more unique physical biometric characteristics of the individual
- Can differentiate between: verification & recognition
Access/Entry Control
Personal identify verification systems
All personal identity verification systems consider 3 things
- The uniqueness of the feature used for identification
- The variability of the characteristic
- The difficulty of implementing the system that processes the characteristic
Personal identity verification systems
Type 1 error rate:
False rejection of a valid user
Personal identity verification systems
Type II Error rate
False acceptance of an invalid user
Access/Entry Control
Personal identity verification systems
Equal error rate
- Cross-over point where Type 1 & Type 2 errors are equal
- Not necessarily the point at which the device should be operated
- Not the lowest point for either type of error
Access/Entry Control
Personal identity verification systems
Finger Prints
- Still considered one of the most reliable means of distinguishing one individual from another
- Most systems use image processing & pattern recognition
Minutia points
Ridge endings
Bifurcations
Access/Entry Control
Personal identity verification systems
Hand/Finger Geometry
- Characterizes the shape of the hand
- Measures 3-dimensional features of the hand such as the widths & lengths & the thickness of the hand
Personal Identity Verification System
Eye Pattern
- Imaging of iris by a video camera
- Operates in the recognition mode
- 10 - 12” read distance (no physical contact)
- 2% of population cannot be enrolled due to blindness or other eye issues
Personal identity verification system
Face
- Utilize distinguishing characteristics of the face
- Captured with video camera or thermal image
Personal identity verification system
Voice
- Speech measurements: waveform envelope, voice pitch period, relative amplitude spectrum, resonant frequencies of the vocal tract
- Low security, easily deployed, more public acceptance (low distrust)
Personal identity verification system
Handwriting
- Used for many years by the bank
- Signatures can be easily forged
- Handwriting dynamics include displacement velocity & acceleration
Access/Entry Control
Access control barriers include…
Doors
Gates
Turnstiles
Elevators
Access/Entry Control
Vehicle access controls are…
Manual
Electronic
Access/Entry Control
Electro-Mechanical Lock Types
- Electric deadbolts
- Electric latch
- Electric strike
- Electric lockset
- Exit device
- Electromagnetic lock
Access/Entry Control
Device unlocks upon loss of power (but may stay latched - “positive latching”)
Fail Safe
Access/Entry Control
Device locks upon loss of power
Fail Secure
Access/Entry Control
Single action / motion egress
One action/motion required to release door to exit
Alarm Communications & Display (AC&D)
The part of a PPS that transports alarm & assessment information to a central point & presents the information to a human operator
AC&D: Alarm Communication & Display
The most important measure of AC&D Effectiveness?
How well it quickly & clearly communicates alarm data from sensors to the system
AC&D
Two critical elements of alarm communication & display
- Transportation or communication of data
- Presentation or display of that data to a human operator in a meaningful manner
AC&D
When an alarm occurs, the AC&D system must communicate to the operator the following information
- When an alarm has occurred
- What or who caused the alarm
- When the alarm happened
AC&D
Security communications require the following assurances
- The integrity of the communications medium (availability of the message path)
- The integrity of the message (complete & errorless transmission of the data)
- Timeliness of the transmission (data communication within an appropriate time frame)
- Message security (accessibility of the communication to authorized persons only)
AC&D
Communications Security - Line Protection
- Outside lines should be installed underground
- Inside wiring should be encased in conduit
AC&D
Communication Security - Line Supervision
Simplest line supervision: End-of-line (EOC) resister (detects open circuit, ground, wire-to-wire short)
AC&D
Communication Security - Scramblers
- Disguise interceptible communications
- 2 characteristics of voice that can be scrambled
frequency (pitch of voice) (most typically scrambled)
Amplitude (loudness)
AC&D
Transmission of Alarm Signals
Alarm signals may be transmitted on an unshielded pair of direct current (DC) Conductors
AC&D
Signals also may be transmitted on…
Lines installed to carry electric power
AC&D
Optical Fiber
A strand of high-purity, spun glass, typically about the thickness of a human hair
AC&D
Optical fibers can be used to carry…
- Voice-grade signals
- Video signals
- Digital or data grade signals
AC&D
Optical fibers differ from a conventional metal wire in several ways
- Not affected by (EMI) or (RFI)
- Don’t carry electrical current nor radiate signals
- Can carry many more multiplexed messages
- Much smaller & lighter than conventional
- Flexible & can take an irregular course from P to P
- Not vulnerable to interception by acoustical or inductive coupling
AC&D
Optical Fiber
Optical fiber is less expensive than copper
AC&D
Video Transmission Methods
Coaxial Cable
Telephone Lines
Optical Fiber
Dedicated Twisted Pair
DC Wire
AC&D
Video Transmission Methods
No processing required if transmission distance is short enough, typically 1,000 ft.
Video Transmission Methods
The transmission distance without amplification is 1 mile or more
Optical Fiber
AC&D
Good performance can be achieved at wire distances of up to 4,000 ft.
Dedicated Twisted Pair
AC&D
Video signals cannot be transmitted directly on DC lines
DC Wire
AC&D
3 Types of line transmission used in electronic protection systems
Loop
Point-to-Point
Multi-plexed
AC&D
Two methods used to separate multiplexed signals
- Time division multiplexing (TDM)
- Frequency division multiplexing (FDM)
AC&D
A wireless communication requires
- A transmitter to furnish radio frequency energy
- An antenna to radiate the energy into the atmosphere
- A receiver
- Power for the transmitter & receiver
AC&D
Wireless Transmission
Any unscrambled or unencrypted communication transmitted by wireless technology should be considered available for interception
AC&D
Voice radio (2-way radio) cost & power are determined by
- The distance required to communicate
- Barriers in the transmission path
- Signal interference in the area
AC&D
Microwave Transmission
- Operates between 30 - 300 GHz
- Requires microwave generator, power, amplifier, modulation, antenna
- One-way & two-way communications
- Often require FCC licenses
- Penetrates rain, fog, snow & man-made noise
- Used in television, multiplexed telephone, multiplexed alarm & high-speed data transmissions
- Line-of-sight (LOS) required
AC&D
Laser Communication
- Light amplification by stimulated emission of radiation (LASER)
- Laser light is modulated at a very rapid rate
- A photo-detector at the receiver demodulates the laser
- Virtually impossible to intercept without detection
- A 4-mile transmission line of sight
- Reflected can be used but the resolution is reduced
- interference from snow, fog, and rain
- No FCC license required
AC&D
Most common causes of wireless interference
- Signals from other transmitters
- Industrial & atmosphere noise
Intrusion Detection
The process of detecting a person or vehicle attempting to gain unauthorized entry into an area
Intrusion Detection
Intrusion Detection
Considerations for intrusion detection systems
- Should meet security needs of the facility
- Should operate in harmony with other systems
- Should not interfere with business operations
- Should be cost effective
Intrusion Detection
Basic building blocks of an intrusion detection systems
Sensors
Intrusion Detection
Detection criteria for a sensor or sensor system includes
- What will be detected
- What actions are expected
- Weight or speed of movement
- Probability of detection required
Intrusion Detection
3 main characteristics of intrusion sensor performance are…
- Probability of detection (PD)
- Nuisance Alarm Rate (NAR)
- Vulnerability to Defeat
Intrusion Detection
If the sensor is inappropriate for the operating environment or threat, or not installed, operated, maintained & tested properly, the output of an entire system, is severely limited, becoming a greater burden than a benefit - sensor selection must match the application & environment
Intrusion Detection
Probability of Detection
- Perfect is a “1” - reality is always less than “1”
- Confidence Level (CL) is often described in conjunction with PD - unstated CL implies a 90% or better confidence level
- PD is always conditional
- PD also varies by the sophistication of threat
- When high PD is required at all times & all weather conditions, use of multiple sensors
Intrusion Detection
Probability of Detection
PD depends primarily on these facts:
- Target to be detected (walk, crawl, tunneling etc…)
- Sensor hardware design
- Installation conditions
- Sensitivity adjustment
- Weather conditions
- Condition of the equipment
Intrusion Detection
A nuisance alarm is any alarm not caused by an intrusion
- The NAR identifies the number of nuisance alarms over a given period (ideally zero, but not realistic)
- Alarm assessment is needed to preserve manpower without assessment, detection is incomplete
- Natural causes: vegetation, wildlife, weather conditions, etc…
- Industrial causes: ground vibration, debris moved by wind, electromagnetic interference, etc..
Intrusion Detection
A false alarm is a nuisance alarm generated by the equipment itself
- Acceptable false alarm rate (FAR) should also be specified
- Poor design inadequate maintenance or component failure
Intrusion Detection
Vulnerability to Defeat
- All sensors can be defeated
- The objective is to make the system very difficult to defeat
- Two general ways to defeat the system
Bypass: going around the detection
Spoof: passing through sensor’s normal detection zone without generating the alarm
Intrusion Detection
Occurrence of a potential intrusion event…
Intrusion
A change in the condition being monitored
State
Intrusion Detection
Loss of electrical power: or failure of the sensor itself
Fault Event
Intrusion Detection
Opening, shorting, or grounding of the device circuitry, the enclosure of control panels
Tamper
Intrusion Detection
Five ways of classifying intrusion sensors
- Passive or active (interior & exterior)
- Covert or overt (interior & exterior)
- LOS or Terrah following (exterior only)
- Volumetric or line detection (point) (interior & exterior)
- Application (interior & exterior)
Intrusion Detection
Two types of passive sensors
- Detect target-generated mechanical energy (walking climbing vibration)
- Detect target-emitted energy in a natural field of energy (heat, sound, magnetic field etc…)
Passive Sensors
- Sensors are harder to locate by aggressors because they do not emit energy
- Safer to use in an explosive environment
- Passive infrared, mechanical activity (walking climbing) vibration etc…
Active Sensors
- Transmit energy & detect changes to it
- Includes transmitter & receiver (bi-static)
- Create fewer nuisance alarms
- Microwave, infrared, RF etc..
Separate Transmitter & Receiver
Bistatic
Transmitter & Receiver are Combined
Monostatic
Detect interruption at a fixed, or volume of space
Volumetric Sensors
Detect intrusion at a specific point or alarm time
Line or Point Sensors
Intrusion Detection
Types of motion detectors
Microwave
PIR
Dual Technology
Ultrasonic
Beam Detectors
Intrusion Detection
Video Motion Detectors (VMD)
- Passive, covert, line-of-sight
- Exterior or interior applications
- Sufficient lighting & resolution required
- Nuisance alarms can be plentiful - flickering lights, vegetation movement, animals, rain, camera noise
- Analytics improve NAR
- Digital is more sophisticated but analog is less expensive
- Most VMDs susceptible to very slow movement
VMD
Video Motion Detection is based on pixel changes
- Changes in brightness or contrast
- Local movement across adjacent cells
- The speed of motion across all cells
- Size of objects within cells
- Global changes across most or all cells
Wireless Sensors
Operate in the 300 MHz or 900 MHz bands
Issues with wireless sensors include
- Collisions: multiple messages received at the same time causing none to be read
- Fading: degradation of the signal due to distance
- Interference: other signals overpowering the sensor’s signals
Line supervision techniques
- Reverse polarity
- Sound monitoring
- Radio class C
- Steady direct current class B
- Tone
- Digital classes A & AB
Exterior application sensors are divided into 3 categories
Buried Line
Fence-associated
Free Standing
Exterior perimeter intrusion sensors
- Typically used by government, nuclear, & correctional facilities
- Ported coaxial cables
- Fence disturbance sensors
- Sensor fences
- Electric field or capacitance
- Bistatic microwave sensors
- Exterior video motion detectors (VMDs)
Ported Coaxial Cables
- “Leaky Coax”
- Active, covert, terrain-following
- Buried underground
- Respond to objects with high dielectric constant or high conductivity (humans, vehicles, etc)
- Outer jacket of cable is “ported” to allow the signal to leak out
- Range is 1.5 to 3 ft above the surface & about 3 - 6 ft wider than the cable separation
- Nuisance alarms sources include metals, water, utility lines, large quantities of salt or metals in soil
Fence Disturbance Sensors
- Passive visible terrain-following
- Attached to fence
- Detect motion or shock
- One of several technologies: fiber-optic, strain-sensing vibration-sensing
- Nuisance alarm sources are common, including wind rain/hail, nearby vibrations
- Can be defeated by crossing over the fence w/o touching it or tunneling under
- Fence posts should flex/move no more than .5” against a 50 lb. force at 5 ft height
- Fence fabric should flex/move no more than 2.5” against a 30 lb. force centered between posts
Sensor Fences
- Passive, visible, terrain-following
- Sensor cables form the fence itself
- Horizontal-stretched high tension wires at 4” or less apart
- Includes taut-wire fences
- Designed to detect climbing, separation of wires or cutting
- Less susceptible to nuisance alarms - requires about 25 lbs. of force to activate the alarm
- Can be defeated by crossing over the fence w/o touching it, or tunneling under the fence
Electric field or capacitance sensors
- Active, visible, terrain-following
- Detects change in “capacitive-coupling” in wires isolated from the fence itself
- Range can extend to 3.3 ft (more nuisance alarms)
- Susceptible to lightning, rain, small animals, motion of the fence itself
- Requires good electrical grounding
- Less susceptible to crossing over or tunneling under fence
Free-Standing Infrared Sensors
- Active, visible, line-of-sight, free standing
- .9 micron wavelengths - invisible to the human eye
- Beam is transmitted through a “collimating” lens & received by a “collecting” lens
- Multiple beams required for higher security applications (typically a 2” x 6” detection range)
- Nuisance alarm sources include snow, fog, dust, vegetation, etc…
Bistatic Microwave Sensors
- active, visible, line-of-sight, freestanding
- 10 GHz or 24 GHz spectrum
- “Vector Sum”: Direct & reflected microwave energy received by the receiver
- Susceptible to crawling or rolling under beam if the ground is not very flat or distance between antennae is more than 120 yds.
Offset Distance: zone of no detection about 10 yds. out from the transmitting antenna - requires overlapping zones of 20 yds
Bistatic Microwave Sensors (Ctd..)
- Sensor bed surface is composed of 4” of 1.5” or smaller gravel to eliminate nuisance alarms from standing water
- The largest detection zone is midway between sensors - approximately 4 yds wide x 3 yds high
- Nuisance alarm sources include vegetation higher than 1-2”, loose chain link fabric, heavy snow
Exterior, perimeter intrusion sensors
Perimeter detection systems should use protection-in-dept philosophies,** relying on **two or more simultaneous lines of detection, especially in high-security facilities
Exterior, perimeter intrusion sensors
Complimentary sensors may also be considered to increase the effectiveness of a sensor deployment
- each sensor brings its own strengths & weaknesses to the overall security plan - complementary sensors do not have the same nuisance sources & probability of detection under each possible scenario
- Sensors should be prioritized for assessment purposes - higher PD sensors have first priority
- Configuration of multiple sensors should be arranged to provide overlapping coverage AND separate lines of coverage
Exterior, perimeter intrusion sensors
Sensor combinations operate in two ways
- OR basis: Either sensors trigger the alarm high PD, higher NAR
- AND basis: Both sensors are required to trigger the alarm, lower PD, lower NAR
Perimeter-in-depth philosophies
Clear zones bounded by fences on both sides are preferable for perimeter detection systems
No sensors should be mounted on the outside fence
Exterior, perimeter intrusion sensors
Physical & environmental conditions affecting perimeter detection system
Topography (gullies, slopes, water, etc)
Vegetation (motion from wind, sources of concealment/cover)
Wildlife (large animal interference with sensors, small animal burrowing & chewing
Background noise (wind, traffic, EMI, seismic activity)
Climate & weather
Soil & pavement (soil conductivity, seismic conductivity)
Exterior, perimeter intrusion sensors
Barriers designed to delay intrusion should be placed along the inner fenceline of a dual-fence line clear zone, to prevent tampering with the barriers without first traversing the detection zone
Exterior, perimeter intrusion sensors
A clear zone “compromise” width between 10 & 15 yds. facilities reduction of nuisance alarms (wide) & high resolution for alarm assessment by cameras (narrow)
Interior intrusion sensors
Interior application sensors are divided into 3 categories
Boundary - penetration
Interior - motion
Proximity - sensors
Interior intrusion sensors
Two important physical conditions that affect sensor performance
Building or room construction
Equipment & objects that occupy the space
Interior intrusion sensors
Electromechanical Sensors
- Passive, visible, line/point sensors
- Magnetic reed switches (doors, windows, etc..)
- Balanced magnetic switches (BMSs) or bias magnets higher sensitivity than reed switches, less susceptible to spoofing
- Hall effect switch detects field of magnet-no moving parts - measures charge separation & polarity - most advanced switch
- Continuity/break wire - wires embedded or attached to surface, activated by cutting (security screens) low NAR (may use optic fibers instead)
Interior intrusion sensors
Vibration Sensors
- Passive visible or covert
- Jiggle switches
- Inertial switches: a metal ball mounted on metal contacts - detects vibration frequencies between 2-5 KHz
- Piezoelectric sensors: sensing element that flexes at frequencies between 5-50 KHz
- Fiber-optic cables detect micro-bending caused by vibration
Glass-break Sensors
- Glass-mounted, passive (vibration activated); detect > = 20 KHz vibrations
- Glass-mounted, active; generate vibrations received by another device elsewhere on the glass (lower NAR)
- Ceiling-mounted, passive; listen for the frequency of breaking glass; volumetric by design; not vibration activated
Interior Motion Sensors
- Monostatic microwave (common)
- Passive infrared (PIR) (Common)
- Dual Technology
- Video motion detection (VMD)
Interior intrusion sensors
Passive Infrared (PIR)
- Passive to human heat approximately equal to heat from the 50-watt incandescent light bulb
- Responds to infrared energy in the walkthrough band between 8 & 14mm
- Minimum Resolvable Temperature: Difference in heat between target & background (can be as low as 1-degree Celsius)
Interior intrusion sensors
Microwave
- Active, visible, volumetric
- 10 GHz frequency range: senses doppler shift of the returned frequency
- Best positioned to sense aggressors moving towards or away from a sensor; slow-moving targets may spoof microwave sensors
- Microwave horn, printed circuit planar, or phased array antenna
- Various detection patterns available; concave portion of detection zone is vulnerable
Microwave
- Penetrates most glass & normal wall materials (not metal)
- Immune to high air turbulence & temperature /changes; susceptible to “pattern drift”
- Often used in automatic door openers; multiple microwave sensors in the same area must be on different frequencies
- Ionized gas in fluorescent lighting can reflect microwaves & cause nuisance alarms
Proximity Sensors
- Pressure Mats
- Capacitance Sensors
Pressure Mats
- Largely obsolete - replaced by motion detectors
- Detected weight 5-20 lbs per sq. ft
- Still used in security portals (man traps) to prevent tailgating - based on valid user’s weight in database
Capacitance Sensors
- Large, electrical condenser that radiates energy
- Detects changes in capacitive coupling between antenna & the ground
- Target touches protected object & absorbs some of the radiated energy generating on alarm
CPTED
Should be divided into smaller, more clearly defined areas or zones
Defensible space, per Oscar Newman
Video surveillance systems
When selecting a video surveillance
Uses a systems approach rather than a components approach
Video surveillance systems
The following parameters determine the effectiveness of a video assessment subsystem
- Minimum time between sensor alarm & video display
- Complete video coverage of the sensor detection zone (called the assessment zone when sensors & video are integrated)
- Ability to classify a 1 ft. target at the far edge of the assessment zone
- Vertical field of view at the far edge of exterior detection zone = height of a standard fence & person climbing it
Parameters Ctd…
- Continuous operation, 24/7
- Minimal sensitivity to environmental conditions, for all cameras
- Minimal obscuration of the assessment zone (such as trees, fences, furniture, etc)
- Camera FOV & recording system integration displays the alarm source to an operator
Video Surveillance
3 reasons for cameras in security applications
- Obtain visual information about something that is happening (most important)
- Obtain visual information about something that has happened (most important)
- Deter undesirable activities
Video Surveillance
Primary uses of video surveillance systems
Detection of Activities
Recording of Incidents
Assessment of Alarms/Incidents
Video Surveillance
Main elements of video surveillance systems
Field of View (FOV)
Scene
Lens
Camera (including mounting hardware)
Transmission Medium
Monitor
Recording Equipment (analog/digital)
Control Equipment
Video Surveillance
Three main components of an analog video surveillance system
Camera
Transmission Cable
Monitor
Video Surveillance
3 main components of a digital video surveillance system
Camera
Digital electronic signal center
PC with software
Video Surveillance
In designing a video surveillance application security managers should keep in mind
- Video surveillance is a visual tool of security & should be applied accordingly
- Video surveillance systems should always be designed with future growth or changes to the needs of the application in mind
Designing Video Surveillance Ctd…
No matter what, the equipment of the system will become obsolete
- Obsolete does not necessarily mean ineffective or out of date for the application
- If a system is obsolete but performing well, its because the original application was correctly designed to meet performance needs
Key points for designing VS systems
- Once simplified the most complex electronic system can be managed by almost anyone
- The application drives the choice of equipment not the other way around
Video Surveillance
Simple Rules For Design
Keep system in perspective
Design generically
Design for best options first (budget after)
Don’t feel driven to build the system all at once
Video Surveillance
Steps for design
- Define the system’s purpose
- Define each camera’s purpose
- Define the area to be viewed by each camera
- Choose a camera style
- Choose the proper lens
- Determine best transmission method
- Layout control area
Video Surveillance
Resolution is determined by the following in order
- Camera
- The transmission method
- The weakest link in the video system interface
- The reproduction capability of the storage system
Limiting Factors
- Analog video recorders average a playback of 225 horizontal lines (very low)
- DVR’s digitize analog signals, dropping 25% of the resolution
- Sloppy installation or cheap coaxial cable costs 10 - 15% resolution
- Digital compression also reduces the resolution
Video Surveillance
All IP cameras measure resolution as a multiple of the Common Intermediate Format (CiF) about half the average 325 horizontal lines; not recommended as a usable standard for storage
- 1/4 CIF = 176 x 120 (3,520 pixels or .003 MPX)
- CIF = 352 x 240 (84,480 pixels or .08 MPX)
- 4 CIF = 704 x 480 (337,920 pixels or 0.3 MPX)
- 16 CIF = 1408 x 960 (1,351,680 pixels or 1.3 MPX)
- 32 CIF = 2816 x 1920 (5,405,720 pixels or 5.4 MPX)
- A 4 mp camera = resolution of 400 ASA film
- A 6mp camera = resolution of 100 ASA film
- most effective & current standard for digital video compression is the H.264 compression algorithm
3 Considerations when determining video surveillance field & view (FOV)
Target (person, vehicles, etc…)
Activity (assault, slight of hand)
Purpose (identification vs. general monitoring)
Video surveillance systems are designed to be only two things
Visual assessment (what’s happening now)
Visual documentation (What happened previously)
3 Theoretical identification views of an analog VSS
1. Subject identification
2. Action identification
3. Scene identification
VS - Fields of view (FOV)
Theoretical identification views of a digital VSS
General: Can’t distinguish clothing & color - pixelated zoom (5 pix/ft)
Monitor: General vehicle/human traffic flows - no serious detail on zoom (7 pix/ft)
Detect: Detect but not identify person-sized object - no significant detail on zoom (4 pix/ft)
Observe: Clothing/colors gain distinction - no good detail on zoom (18 pix/ft)
Recognize: High degree of accuracy identifying & separating known individuals - good detail on zoom (35 pix/ft)
ID views of a digital VSS
Subject ID: Establish identity beyond a shadow of a doubt - the excellent detail on zoom (48 pix)
License Plat ID: ID of license plates - excellent detail on zoom (70 pix)
Facial Recog: Extreme details - excellent detail on zoom (88 pix)
VS - FOV
Identification of an object in video means…
The ability to differentiate between people’s identity
VS - FOV
Classification of an object in video means…
The ability to differentiate between humans animals etc…
VS - FOV
Cameras should not be required to view more than one major and one more minor objective
VS - FOV
Cameras should not auto-pan more than how many degrees left or right of the major focus
45 Degrees
VS - Cameras
Major Types of Cameras
Analog
Digital / IP
Infrared
Thermal
VS - Cameras
4 Main Types of Cameras
- Standard analog CCD cameras
- IP address
- Infrared cameras
- Thermal cameras
VS - Cameras
3 basic styles of IP Cameras
- Standard
- Megapixel
- Smart (edge analytics etc.)
VS - Cameras
Infrared cameras require…?
IR Source
VS - Cameras
Which cameras do not require an IR source?
Thermal Cameras
VS - Cameras
Camera selection criteria, in order of importance
- Sensitivity (light)
- Resolution (image quality)
- Features (WDR, IR, analytics, etc)
VS - Cameras
Placement of cameras is dictated by
Angle of View
Pixels Per Foot
VS - Cameras
3 Basic sensitivities of cameras
Full - Light
Lower - Light
Low - Light
VS - Cam Lenses
The camera is selected before the lens
The lens is selected based on its ability to provide the desired identification information
VS - Cameras
The lens is one of the few elements of a video system not converting to digital
Various functions of the lens can be automated (auto-iris, zoom/varifocal, focus)
VS - Cameras
5 Main types of lenses
- Wide angle (best for 0 to 15’ ranges)
- Standard (best for 15 to 50’ range) equivalent to the view from the human eye)
- Telephoto (best for > 50’ range)
- Varifocal
- Zoom
VS - Camera lens
2 Differences between zoom & varifocal lenses
- The range of focal length is small in the varifocal
- Varifocal lenses do not have a tracking mechanism to align focal length with focus
VS - Video storage / recording
When storing & using security video, it is important to decide whether the system’s purpose is to…
Verify information
Prove information
Aid a prosecution with the information
VS - Surveillance / Recording
Types of Recorders
DVR: Analog inputs only, converted to digital in the box, stored on hard drive or external media
NVR: Analog or digital inputs, analog converted to digital, stored on hard drive or external media
Server / Cloud: Digital inputs stored on network storage devices
Locking Systems - Locks
- Most widely used methods of controlling physical access
- Among the oldest of security devices
- Should not be relied upon as the only means of physical protection for important assets
- Should always be used with complimentary protection measures
Locks
2 Classes of Locks
Mechanical
Electro-Mechanical
Locks
2 Major components of most mechanical locks
- A coded mechanism (key, cylinder, wheel pack, etc…)
- The fastening device (bolt, latch, etc…)
Locks
4 Component / Assembles of Locks
- Bolt or latch
- Keeper or strike
- Tumbler array
- Key
Locks
Vulnerabilities of mechanical locks
Attack by force (spreading, forcing, twisting, etc…)
Surreptitious attack (picking, raking, bumping, etc…)
Impressioning & try keys
Locks
- Warded (1st type, very weak security, skeleton keys, old houses, antiques)
- Lever (18th century, more security than warded locks, master keyable, safe deposit boxes)
- Pin tumbler (19th century, Linus Yale, most widely used, can be high security, residential/office locks, master-keyable
- Wafer tumbler (sometimes double-bitted boys, mostly furniture locks, lower security than pin tumblers, master-keyable
- Dial Combination (safes, mechanical or electronic
Locking Systems
Without ? security will usually degrade to more privacy
Lock Planning
Locking System Considerations
- Total number of locks
- Major categories of sectors of the system
- Security objectives
- Size & turnover of populations
- Related or supportive security subsystems
- Intelligence or information requirements
- Criticality of asset exposure
Locks
Proper lock planning requires…?
Combination of the “totality” of the area (strengths of doors & walls, drop ceilings, etc..)
Locks
Locking policy should do the following
- Require a systematic approach be taken to the use of locks for security purposes
- Assign specific responsibility for the development of the lock program
- Make all persons responsible for compliance with the program requirement
Locks
Lock Change Methods
- Re-arrange or rotate the locks among doors
- Re-key the locks (most effective
Locks
Master Keying
3 Major security difficulties
- Effective master key accountability
- Manipulations are easier
- Additional maintenance
Lighting
3 Primary functions of security lighting
- Deter criminal activity
- Life safety functions
- Support of video surveillance
Lighting
Typical Lighting Costs
Capitol (upfront costs) approx. 8%
Energy (approx. 88%
Maintenance (4%)
Lighting
Major components of a lighting system
Lamp (bulb)
Luminaire Hardware
Electrical Power
Lighting Terms
Quantity of light emitted by a lamp
Lumen
A typical 100-watt incandescent bulb outputs about 17000 lumens
Lighting Terms
The concentration of light over a particular area
Illuminance
- Floodlight generating 1k lumens illuminates 50’ away
- Spotlight generating 1k lumens illuminates a small area 50 ft away
- Both lights output the same lumens
- Each light generates a different level of illuminance from the same distance
Lighting Terms
The US measures of illuminance (lumens per sq. ft)
Foot Candles
Lighting Terms
Metric measure of illuminance (lumens per sq. meter) 1 FC = 10.76 lux (approximately 10:1 ratio)
Lighting Terms
Illuminance level of the scene
Scene Illuminance
Lighting Terms
Illuminance of the camera lens
Faceplate Illuminance
Lighting Terms
Lumens/watts (output divided by consumption)
Efficacy
Lighting Terms
Initial, cold start time of the light fixture
Strike Time
Lighting Terms
Re-Start time at a warm
Re-Strike Time
Lighting Terms
The percentage of light reflected from a scene which depends on the incident light angle, and the texture & composition of the reflecting surface
Reflectance
Lights - Color
Color rendition index (CRI)
- The scale of 0 to 100
- 70 to 80 CRI is good; above 80 is excellent 100 is daylight
Light Coverage
The measurement of variation in lighting levels
Uniformity
- Working environments are 1: 0.7
- A pedestrian walkway is 4:1
- A roadway is 10:1
- Higher uniformity levels provide better depth perception & greater perception of security
Light Uniformity & Coverage
What ration is preferred for a parking structure?
4:1 Uniformity Ratio
Landscaping environments can be expensive to light due to the numerous area of potential concealment
Lighting should be focused from the ground up into trees & shrubs to deter concealment
Lighting ratios in parking lots should not exceed…?
4:1
Lighting
A bright white, horizontal strip along the interior walls of parking structures provides higher contrasts & facilitates object identification
Lighting
Along with building facades where individual exterior objects cannot be adequately lit, providing a high contrast will give good identification of shape & movement - flood lights work well for this purpose
Lighting
What should the height of light poles in parking areas be to reduce shadows & dark spots?
12 - 14 Feet
Lighting
What kind of lighting is preferred outdoors because?
- Broader, more natural light distribution
- Requires fewer poles
- Is more aesthetically pleasing
High Mast Lighting
Lighting implications to video surveillance
The successful deployment of even the simplest VSS requires an understanding of…
- Relative levels of the scene illumination produced by natural sources
- The amount of light reflected from typical scenes
- The resultant faceplate illumination levels required by the variety of image tube & solid-state imagers
Light
Lighting considerations for video surveillance
- CRI
- Reflectance of materials
- Directionality of reflected light
The two most important parameters of a lighting system for video surveillance are its…?
- Minimum intensity
- Evenness of illumination
Light
Cameras are light-averaging devices - All lighting in the camera’s FOV must be…
Even, not just the target areas
Lighting
The sensitivity of a CCTV camera can be defined as the minimum amount of illumination required to produce a specified output signal
The following factors are involved in producing a video signal
- Illuminance level of the scene
- Spectral distribution of the illumination source
- Object reflectance
- Total scene reflectance
- Camera lens aperture
- Camera lens transmittance
- Spectral response of the camera imager
- Video amplifier gain, bandwidth, & signal-to-noise ration
- Electronic processing circuity
Lighting
Minimal output video signal is usually?
1 Volt peak-to-peak (VPP)
Lighting
Camera sensitivity may sometimes be overstated based on these two, commonly used factors
- Higher scene reflectance than normally encountered
- Greater transmittance than is commonly available in standard auto-iris lenses with neutral density spot filters
Lighting
A minimum of 1.5 fc is required for a camera system using on f / 1.8 or faster lens & a solid-state imager
- This assumes reflectivity of 25%
- This also assumes a light; dark ratio of no more than 4:1
- 4:1 ratio is allowed to creep to 6:1 as materials age
Protective Lighting
Protective Lighting Types
- Standby
- Continuous
- Moveable
- Emergency
- Glare projection
- Controlled
Lighting
General security lighting equipment
Streetlight
Searchlight
Floodlight
High Mast Lighting
Lighting
The number of luminaires required to cover an area is a function of…
- The area to be covered
- Light levels required
- The height of the luminaires & their design
- Type of lighting used
Lighting
Rule of thumb for outside lighting
You should be able to read a driver’s license or newspaper with some eyestrain
Lighting
The general rule for lighting levels with regard to Identification of subjects
- Detection (someone is there) - 0.5 fc
- Recognition (recognizing the person) - 1.0 fc
- Identification (evidentory) - 2.0 fc
Perimeter fence = 0.50 FC
Outer perimeter = 0.50 - 2.00 FC
Open area = 2.00 FC
Open parking lot = 0.20 - 0.90 fc
Covered parking lot = 5.00 fc
Pedestrian walkway = 0.20 fc
Pedestrian entrance = 5.00 fc
Vehicle entrance = 10.00 fc
Building facade = 0.50 - 2.00 fc
Gatehouse = 30.00 fc
Loading dock exterior = 0.20 - 5.00 fc
Loading bay = 15.00 fc
Office general = 30.00 - 50.00 fc
Office task = 50.00 - 30.00 fc
Interior public area = 10.00 - 20.00 fc
Retail store = 50.00 fc
Bank - lobby = 20.00 fc
Bank - teller = 50.00 fc
Bank - ATM = 15.00 fc
Lighting
Typical Reflectance Levels
- Asphalt = 5%
- Concrete (old) = 40%
- Concrete (new) = 25%
- Red bricks = 25%
- Grass = 40%
- Snow = 95%
Lighting
Lighting levels may cause a light trespass onto adjoining properties, including sidewalks & roadways
Lighting
Light trespass must not cause glare or excessive contrast to drivers & pedestrians, both on and off the organization’s property
Lighting
A dirty environment may result in a reduction of up to 20% per year in light output due to dirty lighting
Lighting
Lighting output in an office or other clean environment declines by 3 - 4% each year due to dirt accumulation on lighting fixtures & bulbs
Barrier Purposes
- Physically & psychologically deters the undetermined
- Delays the determined
- Channels authorized traffic
- Discourages unauthorized traffic that takes place by Accident Force Stealth
- Explicitly defines territorial boundaries
- May be used to preventing views of the facility
- May be used to preventing placement of listening devices
Barrier Notes
- Should be supported by interior clear zone whose width depends on the threat
- Should be supplemented by sensors and/or other security measures
- Should not provide concealment opportunities
- Should not obstruct lighting, video surveillance, or intrusion detection
- Should not facilitate observation of the facility
A dirty environment may result in a reduction of up to 20% per year in light output due to dirty lighting
Recommended Light Cleaning Cycle
Every 3 Years
Barrier Types
Natural
Structural
If a barrier’s effectiveness is uncertain it should be considered a potential obstacle
Selection & placement of barriers depend on the adversary’s objective
Balanced Design
What provides equal delay - No weak links?
Layered Barriers
Balanced Design
Barrier penetration begins how many feet in front of the barrier & ends how many feet beyond it
2 FT & 2 FT
Barriers
Fences & Walls
- Are the most common perimeter barriers
- Define areas & give notice of a protected property line
- Demonstrate commitment to security & may stop a casual trespasser
- Channel traffic & reduce the required number of security personnel
- Provide intrusion detection and/or video surveillance zone
- Force intruders to demonstrate intent
- Must be maintained
Barriers - Walls
Walls are generally more resistant to penetration than the doors, windows, vents, & other openings
- Most can be breached with the right tools
- Using explosives & cutting tools and adversary can make a “crawl hole” through 18” reinforced concrete in under 5 min.
- Increasing wall thickness usually adds only a moderate delay against explosives, even though the amount of explosive needed increases substantially with a wall thickness
- Ordinary reinforced concrete walls can be penetrated quickly because they are generally designed to support structural loads, not to thwart or delay penetration
Walls ctd…
- Placing two or more reinforced concrete walls in series results in longer penetration delays than using one wall that is thick as the two walls combined
- Removing the rebar often takes longer than removing the concrete; delay can be increased by using additional rebar; increasing rebar size, or decreasing rebar spacing
Walls ctd…
- Use earth cover or other overburden to delay access to the wall itself
- Hardening a normally constructed building against forcing penetration for a significant period is rarely practical or cost-effective
Fences
Wire toppers on fences do not prevent intrusion but rolls of barbed tape on or near them can increase delay…
Fences
One of the most cost-effective additions to a fence?
Attach a roll of barbed tape to the outriggers
Fences
Where are barbed-tape rolls normally placed
Inside an outer-perimeter fence & outside on inner (double) fence
Fences
Which direction should outriggers point in order to eliminate the hand grip used by intruders when climbing over the fence
Towards the inside
Fences
Inner-fence-lines (double fence areas such as prisons) are spaced how far from the outer fence-line?
10 - 20 Ft
Electrified Fencing
What is the design of most industrial electrified fences?
8 ft. tall with 20 wires fitted to the inside of the chain link perimeter fence
Fences
Electrified fences pulses electrical energy 45 times per minute
Fences
2 Types of Electrified Fences
- All live wire “deterrent” fence (less common)
- “Monitored” fence (more common)
Fences
4 Basic Types of Expanded Metal
Standard / Regular
Grating
Flattened
Architectural or Decorative
Barriers - Gates
- Establish points of entry & exit to an area defined by fences & walls
- Limit or prohibit the flow of pedestrian or vehicular traffic
- Establish a controlled traffic pattern
- Should provide equal levels of delay as perimeter
Barriers - Doors
While walls may be hardened, doors tend to be a weak link in a structure because of their functional requirements & associated hardware
Barriers - Doors
If the door assembly cannot be sufficiently enhanced it may not be cost-effective to upgrade the building structure
Barriers - Doors
Most common exterior doors are 1.75” thick with 16 or 18 gauge steel surface sheets, usually, hollow or filled with composite material
Barriers - Doors
How long does it take to defeat exposed hinges & remove the door from the frame
1 Minute
How can a door vulnerability be mitigated?
By welding the hinge pin heads to the hinge knuckles, using the hidden “stud-in-hole” method, or affixing a z-strip to the rear face of the door
Barriers - Doors
Door Classifications
- Standard industrial doors
- Personal doors
- Attack- and bullet - resistant doors
- Vehicle access doors
- Vault doors
- Blast-resistant doors
- Turnstile gates
Barriers - Doors
Unnecessary external doors should be eliminated as well as unnecessary, external (exposed) door hardware
Barriers - Doors
How can doors be reinforced?
Steel plates on their surfaces, heavy duty hinges, and filling frames with concrete
Barriers - Doors
What increases the delay time for thermal cutting tools by 3x or 4x?
Installing wood cares in metal doors especially using redwood
What only requires 1/2” to 3/4” of space to defeat the lock?
Prying or spreading the jamb from the door
How can it be mitigated? Welded 2” wide metal strips, concrete - filled frames and high security deadbolts
Barriers - Windows
How can windows be hardened?
Additional or heavier fasteners in the frames, or by welding the frames
Barriers - Windows
Transparent plastic glazing
- Some types are combustible & their use may be restricted by fire codes
- Acrylic plastic like Lucite & Plexiglass, if less than one inch thick, can be broken with hand tools in less than 10 seconds
- Polycarbonates resist impact about as well as bullet-resistant glass
- Lexan in 1/2” thickness resists hand-tool penetration for up to 2 minutes
- Thermal tool attacks require about one minute but cause combustion & the release of toxic gases
Barriers - Windows
Glass/polycarbonate composite glazing contains a tough core of what?
Polycarbonate between 2 layers of glass
Windows
Glass/polycarbonate composite glazing is developed for use in prisons
Windows
The thickest panels of glass/polycarbonate lasted 10 minutes against miscellaneous steel tools
Barriers - Windows
Used often in fire doors & fire windows?
Wire Glass
Windows ctd…
Wire Glass is made up of…?
1/4” material fabricated with diamond, square, or hexagonal wire patterns
How fast can wire glass be penetrated with hand tools?
20 Seconds
Laminated Glass
- Made of two or more panes of annealed float sheet, or plate glass
- Bonded to a layer or layers of plastic
Windows
Safety glass that is 1/4” thick can be penetrated in…?
30 Seconds
Security glass that is 9/16” thick requires 15 minutes of work w/ hand tools to produce a crawl-through hole
Barriers - Utility Portals
Openings other than doors & windows, through which maintenance & other functions might be performed
Utility Ports
Barriers - Roofs
Can be enhanced in several ways (new & existing)
- Enhancing membranes w/ embedded screen
- Added several inches of rigid insulation
- Using concrete reinforced with deformed steel bars & expanded steel mesh
- Forming larger rebar into several rows or layers for reinforced concrete
- Increasing the number of fasteners & adding structural members to corrugated roofs
- Using mechanical fasteners or joints & a continuous weld & heavier gauge material on metal roof systems
- Using larger rebar to strengthen the flange area of precast concrete tee beams
Barriers - Roofs
Contemporary roof types’ include the following
- Prestressed concrete tee beam
- Metal subdeck & reinforced concrete
- Metal roof deck with lightweight concrete
- Metal roof deck with insulation
- Metal Roof
- Reinforced concrete beam & slab
- Wood sheathing with membrane
Barriers - Roofs
Which roof improvements provide the best value
- Penetration tests suggest that barriers placed below the roof may be more effective against penetration than those in the roof itself
- The optimal distance between the roof & the secondary barrier is 10” to 12”
- Earth coverings of both roofs & walls are effective delay barriers
Vehicle Barriers
Types of barrier methodologies
- Vehicle arrestor (slows vehicle to a stop)
- Crash cushion (cushions the impact that stops a vehicle) (moderate distance)
- Inertia device (rigid, heavy moveable objects)
- Rigid device (fixed devices) { a very short distance - almost immediate }
Vehicle Barriers
A moving vehicle possesses kinetic energy, which must be dissipated by the vehicular barrier
Vehicle Barriers
Optimum vehicular barrier height?
Almost 30” but can vary depending on threat vehicles
Vehicle Barriers
Since cable barriers are easy to defeat with hand-held tools, they should be used only in areas well patrolled or monitored with sensors or cameras
Vehicle Barriers
DOD “K - ratings” for barriers / barricades
- K4 stops a 15,000 lb. vehicle at 30 mph
- K8 stops a 15,000 lb. vehicle at 40 mph
K12 stops a 15,000 lb. vehicle at 50 mph
Vehicle Barriers
Vehicle barriers outside the detection & assessment zone are not recommended
Vehicle Barriers
Private vehicles should be kept in secured areas as much as possible
Barriers - Dispensible Barriers
Typically includes the following elements
- Process for deciding when to activate the barrier
- Command & control hardware
- Material deployed to delay access or incapacitate an aggressor
- Dispensing mechanism
- Security officers on-site
Dispensible Barriers
Barriers isolate the aggressor….?
Visually
Acoustically
At Location
(or any combination of these)
Dispensible Barriers
Passive dispensable barriers have no command and control component making them less expensive (but riskier)
Dispensible Barriers
Systems last 10 to 25 years, and active systems require routine maintenance
Safes & Vaults
Safes weighing less than 750 lbs are considered portable & UL standards require they be anchored in place
Safes & Vaults
Burglary resistant safes do not generally protect against fire
Safes & Vaults
Burglary / Fire Resistant Containers
Some containers can achieve UL rating for burglary & fire resistance
Fire - Resistant Safes
UL Classifications
350-4 (formerly A)
350-2 (formerly B)
350-1 (formerly C)
Fire Resistant Safes
Classification / Testing process also includes
A drop-test & harsher temperature test than filling devices
Insulated filing devices UL Class
350 - 1 (formerly D)
350 - 2 (formerly E)
Fire Resistant Safes
Classification / Testing process does not include a drop test
Different types of safes designed for records protection
- Fire-resistant safes & record containers
- Insulated filing devices
- Containers to protect magnetic media
- Electronic media containers are designed to protect contents to 125 or 150 degrees & 80% humidity for 1, 2, 3 & 4 periods (125-1, 150-1, 125-2, 150-2 etc)
- Different types of safes designed for records
1. fire-resistant safes & record containers
2. Insulated firing devices
3. Containers to protect magnetic media
Safes
- The minimum thickness of a 4-hour vault wall is 12” for brick & 8” for reinforced concrete
- The minimum thickness for a 6-hour vault wall is 12” for brick and 10” for reinforced concrete
Fire Resistant Vaults
Construction Standards
- Reinforced concrete with steel rods at least 1/2” diameter, spaced 6” on center & running at right angles in both directions
- Rods are wired securely at intersections not over 12” apart in both directions & installed centrally in the wall or panel
- A brick protection used is filled solidly with the steel with concrete
Burglary Resistant Vaults
- Avoid exterior wall location
- All 6 surfaces of a vault should give equal protection
- Unreinforced concrete should never be penetrated
(vaults are designed to resist penetration for a defined period)
- # 4 (1/2”) rebar & smaller diameters can be cut w/ hand tools
Contraband
Methods of Contraband Detection
Manual search
Metal detectors
Package searches (x-ray, etc)
Explosives detection (bulk and trace)
Chemical and biological agent detection
Contraband
Advantages to a manual search
Low hardware investment, flexibility
Contraband
Disadvantages to manual search
Slow throughput, higher labor costs
Metal Detectors
Magnetometer
Continuous wave
Pulsed field
Handheld
Contraband
Materials with low atomic numbers (“Z-numbers”) materials starting with hydrogen and ending with Z-number 26, Aluminum
Low-Z Materials
Contraband
Bulk Explosives Detection
- Macroscopic, detonable amounts of explosives
- Targets specific threat amounts of explosives
- Usually uses ionizing radiation that is not safe for use on people
- Measures X-ray absorption coefficient, X-ray backscatter coefficient, dielectric constant, gamma or neutron interaction, or microwave or infrared emissions
- Can determine calculated mass, density, nitrogen, carbon, oxygen content, and effective atomic Z number
Bulk Explosives Detectin (ctd…)
- Multiple-energy X-rays and backscatter X-rays more readily identify low Z-number materials
- Hi-energy X-rays are large, fixed mechanisms designed to scan large cargo containers
What may be combined with backscatter X-ray technology for detection of low Z-number materials?
High-energy X-rays
What devices can use gama rays or neutrons for detection (very high penetrating)?
- Thermal neutron activation (TNA)
- Pulsed fast neutron absorption (PFNA)
Detects the presence of nitrogen through gamma wavelengths
Thermal Neutron Activation (TNA)
What determines carbon and oxygen content?
Pulsed Fast Neutron Absorption (PFNA)
Determination of nitrogen, carbon and oxygen content lends more accuracy to separating explosives from foot items
Food items/cargo cannot be irradiated at energy levels of more than 10 milli-electron volts (MeV) (international law)
Bulk Explosives Detection
What is safe for humans, producing 10 microrem per dose?
Low-dose backscatter X-ray technology
Bulk Explosives Detection (ctd…)
CT scans spin sensors on a gantry around the package and produce a 3D image that detects small threat masses; may be subject to high NAR’s
Quadruple resonance (QR) technology uses…
pulsed low-energy radio waves to detect nitrogen-rich materials
What uses laser interrogation and analysis of the spectrum of scattered light to identify threat materials?
- Cannot see through opaque packaging - designed for clear package searches
Raman Analysis
This detection is still under research and development - experiements with distance detection of explosives with infrared cameras, passive and active millimeter-wave imaging systems, and lasers sensing fluorescence or atomic emissions
Stand-off Detection
Trace Explosive Detection
Particles and vapor residues associated with handling explosives
-
Trace Explosives Detection
Key Performance Metrics
- Limit of detection (smallest detectable amount) (may be as low as < 1 nanogram)
- Selectivity (ability to distinguish one material from another)
Trace Explosives Detection
Sampling Methods
- Swipe (most efficient)
- Vapor (puffing) (less invasive)
Trace Explosives Detection
Challenges
- Low vapor phase concentrations of several common high explosives (parts per billion and parts per trillion)
- Packaging of explosives with oil-based gel or solvent
- Absorption of explosive molecules upon most materials at room temperature and decomposition upon moderate heating or exposure to high energy, and thus loss of significant sample material in collectin and transport
Trace Explosives Detection (ctd…)
Techologies
Low mobility spectrometry (IMS)
Colorimetry
Chemiluminescence
Mass Spectrometry
Fluorescence
Canine Olfaction
Trase Explosives Detection Portals
Contraband Detectin
Methods
Chemical agent detection
Biological agent detection
Contraband Detection
Chemical Agent Detection
Uses point sensors at perimeters
Goal is early warning
NAR is a serious consideration (due to high response level)
May not be appropriate for checkpoint screening
May use optical sensing methods
Contraband Detection
Biological Agent Detection
Different from chemical detection in two ways:
- Most biological agents are not immediately lethal, impacting necessary response times
- Usually requires several hours for collection and analysis of air samples
Physical Protection Systems (PPS) Deployment Methodology
The primary objectives of a PPS are…
Detection
Delay
Response
PPS Deployment Methodology
Biggest causes of vulnerabilities in a PPS…
Improper component selection
Improper installation and maintenance
Improper operation
Improper integration
PPS Deployment Methodology
A collection of products, processes or both combined to provide a solution to a problem or goal
System
PPS Deployment Methodology
Systems, not components, are optimized to yield the most effective design to the problem
PPS Deployment Methodology
A logical method for problem solving in which a comprehensive solution is developed in relation to a problem having several dimensions
ASIS definitionof “systems approach to problem solving”
PPS Deployment Methodology
In the security context, a system is a combination of…
equipment, personnel, and procedures, coordinated and designed to ensure optimum achievement of the system’s stated objectives
PPS Integration
The combination of a variety of components sucha as people, technology and procedures
Integration
PPS Integration
Who should engineer the PPS by using the building blocks of people procedures, and technology?
Security Manager
PPS Integration
In general, a well-designed, integrated PPS is more effective against lower-level threats than high-level threats
PPS Integration
“Delay-in-depth” = “Protection-in-depth”
PPS Integration
Access delay barriers types
Passive (walls, fences, locks, etc…)
Security Officers (most flexible, but expensive)
Dispensible (fogs, foams, etc)
PPS Integration
An effective PPS combines the following into an integrated system
People
Equipment (technology)
Procedures
PPS Integration
Regardless of how the investigation tool is used; it is an important design element in a PPS and should be used when appropriate
PPS Integration
Procedural changes can be cost-effective solutions to physical protection issues, although when used by themselves they will only protect assets from the lowest threats
PPS Analysis
Analysis of the PPS provides two key benefits
- It establishes the assumptions under which a design was formed
- It relates system performance to threats and assets, making possible a cost-benefit decision
PPS Analysis
Analysis evaluates whether the PPS’ people, procedures, and technology are achieving the PPS functions of detection, delay, and response
Also referred to as a site survey or vulnerability assessment
May be qualitative or quantitative
PPS Analysis
Qualitative Analysis
Lower-security applications
i.e. retail, restaurants, small businesses, etc…
PPS Analysis
Quantitative Analysis
Higher-security applicaitons
Unacceptably high impact, despite level of probability
ie. museums, refineries, airports, etc…
Require immediate, onsite response to events
PPS Analysis
Two basic analysis approaches are used in a vulnerability assessment (VA)
Compliance-based (Qualitative)
Performance-based (Quantitative)
PPS Analysis
What system is evaluated on the performance and cost-effectiveness of individual measures in
…Countering threats
…Reducing vulnerabilities
…decreasing risk exposure considered as an integrated whole
PPS Analysis
PPS performance measure are:
Detection
Response
PPS Performance Measures
Detection
Probability of detection
Time for communication and assessment
Frequency of nuisance alarms
Delay
Time to defeat obstacles
PPS Performance Measures
Response
Probability of accurate communication to response force
Time to communicate
Probability of deployment to adversary location
Time to deploy
Response force effectiveness
PPS Analysis
Interruption
Arrival of responders at a deployed location to halt adversary progress, which may lead to neutralization
Probability of Interruption (PI)
PPS Analysis
Neutralization
Defeat of the advesaries by responders in a face-to-face engagement
Probability of Neutralization (PN)
PPS Analysis
PPS Effectiveness (PE) = PI x PN
PPA Analysis
An ordered series of actions against a facility, which, if completed, results in compromise of assets
Adversary Path
PPS Analysis
Adversary Sequence Diagram (ASD)
A functional representation of the PPS at a fcility that is used to describe the specific protection elements present
Illustrates the paths that adversaries can follow to accomplish sabotage, theft or other harm
Adversary Sequence Diagram
There are three basic steps in creating an ASD for a specific site
- Describing the facility by separating it into adjacent physical areas
- Defining protection layers and path elements between the adjacent areas
- Recording detection and delay values for each path element
ASD
The biggest mistake in ASD is…
To follow a single path from off-site to the largest location and only do an analysis on that path
ASD ctd…
The best method for creating an ASD is…
To walk or drive around the exterior of the area, then repeat the same inside
ASD ctd…
Sabotage incidents require…
Evaluation of only entry paths, as exit paths become irrelevant once the damage is done
ASD ctd…
ASD’s should be executed for…
Day/night, open/closed, and other contradicting conditions fo the facility
ASD ctd…
Sometimes used as a substitute for defined threats in the ASD process, but this can lead to gaps in analysis
Scenario Analysis
ASD ctd…
Preferred Approach
Analyze PPS using defined threats and path analysis, then generate scenarios by looking at weak paths
ASD ctd…
Scenario analysis must also consider the possibility of concurrent attacks on multiple assets, concurrent threat objectives (i.e.. theft and sabotage, etc…), and attack by multiple threat teams
ASD ctd..
PPS response includes personnel and the communications system they use
ASD ctd…
The systems design process is a serial process
PPS Design
What is the most important element in the defense against dynamic threats and potential catastrophic losses?
Proper use and application of the integrated security systems design process
PPS Design
A well-engineered PPS exhibits the following characteristics
Protection-in-depth
Minimum consequence of component failure
Balanced Protection
PPS Design
The design process can be based on two criteria/approaches
Performance criteria (preferred method)
Feature criteria (“checlist” method that may ignore performance goals)
PPS Design
4 Elements of Physical Design
Deter
Detect
Delay
Respond
PPS Design
Important factors in system design are…
The environment and unique needs of the facility
PPS Design
The best PPS solutin is designed by considering
Threats
Risks
Vulnerabilities
Constraints
Systems Design Process
Systems Design Process Phases
Planning and assessment
Design and documentation
Procurement
Installation
PPS Design - Phase 1
Task 1, Identification of
Critical assets
Potential threats
Subsequent vulnerabilities
Likely risks
Functional requirements
PPS Design - Phase 1
Task 2
Analyze security requirements and formulate solutions or countermeasures concepts to reduce or eliminate vulnerabilities and mitigate risks
Systems Design Process - Phase 1
The first phase of any security design project
Planning and Assessment Phase
Systems Design Process - Phase 1
In the architectural process its referred to as…
Programming or Schematic Design (SD) phase
Systems Design Process - Phase 1
Consists of gathering all relevant pre-design asset information and analyzing it in terms of project requirements and constraints
Systems Design Process - Phase 1
Culminates in a security “basis of design”
The basis of design is the first and most important output of the design process
Focuses on specific project requirements and a conceptual design solution based on those requirements
Systems Design Process - Phase 1
the planning and assessment phase results in a conceptual design solution that categorizes vulnerabilities by their criticality and identifies the most preferred and cost-effective protection scheme to mitiage or eliminate asset risks
Systems Design Process - Phase 1
Another important outcome of the planning phase is the development of the business case for the new or upgraded security systems
Systems Design Process - Phase 1
Security design is just as dependant on collecting good data leading to informed decisions by knowledgeable people as is any other analytical process where a solution is engineered and constructed
Systems Design Process - Phase 1
The basis of design becomes the designer’s means to obtain consensus from the design tema on…
The goals and objectives of the project
What will constitute the project
How the project will secure the assets
Systems Design Process - Phase 1
Implementing the basis of design is not the time to identify engineering details, prepare budgets, or identify and debate specific countermeasures
Systems Design Process - Phase 1
The Conceptual Design, also called a Design Concept, is the last task of Phase 1 Planning and Assessment
Systems Design Process - Phase 1
A design concept’s detail should never be more than a top-level description of the various anticipated security system elements, subsystems, and support systems
Systems Design Process - Phase 1
From an architectural perspsective, the Design Concept is usually referred to as the initial conceptual design or schematic development (SD) phase
Systems Design Process - Phase 1
Most security designers identify four principal security strategies - prevention, detection, control and intervention - as the most important functional requirements of security design
Homeland security features five principal strategies: Preparation, prevention, detection, response, and recovery
Systems Design Process - Phase 1
The importance of having a redundant security system (multiple layers of security) is based on the 10 principles of probability developed by the French mathematician and astronomer Marquis de Laplace (1749 - 1827)
Systems Design Process - Phase 2
Design and Documentation may be split into two phases in the construction idustry
Design Development (DD)
Construction Documents (CD)
Systems Design Process - Phase 2
Design Development (DD)
Generally DD includes a preliminary design (30-35%) following the conceptual design and concludes with a 50%-60%
Systems Design Process - Phase 2
Construction Documents (CD)
Generally starts with a 60% design and passes through a 90% submission and conclused with 100% CD set
Systems Design Process - Phase 2
The CD set consists of three elements
- Contractual details (usually the Div 01 spec for large projects)
- Specification (Div 28 for security on large projects)
- Drawings (not required for a services contract, like guards)
Systems Design Process - Phase 2
The objective of Phase 2 (DD) is…
To complete the design and to document the process to the level of detail necessary for the chosen method of procurement
Systems Design Process - Phase 2
Division 28 (Div28) is the Electronic Safety and Security section of the construction specifications institute (CSI) MasterFormat specifications template that includes 50 sections total (not all used)
Each division, or section, is divided into three parts:
General
Products
Executiong
Systems Design Process - Phase 2
Security systems drawings are always considered secondary to the specifications (specs take precedence)
Systems Design Process - Phase 2
Drawings include the following types
- Plans (top view, map-like view of system component placement int he facility
- Elevations (views of vertical surfaces that show mounting heights and locations of wall-mounted devices
- Details (define elements of the system in more detail
- Risers (chart-like reprentations of complete subsystems such as CCTV or access control
- Hardware schedules (tables that provide detailed component information
Systems Design Process - Phase 2
Key factors to be considered in hardening of a facility
Stand-off distance
Structural integrity of the premises
Prevention of progressive collapse
Redundancy of operating systems
Systems Design Process - Phase 3
Procurement
The type of procurement should be determined before or at the start of the design phase because the type of procurement determines the level of detail required in the construction documents (CDs)
Systems Design Process - Phase 3
Three major forms of security systems procurement
- Sole source
- Request for proposal (RFP)
- Invitationfor bid (IFB)
Systems Design Process - Phase 3
Sole Source
- May be the most appropriate for small projects
- This method of procurement is recommended only where the security owner has the capability to perform the security needs analysis and has good prior knowledge of systems and prices
Systems Design Process - Phase 3
Sole Source
Positives
The construction documents are usually simple, reducing owner design costs and saving time
Systems Design Process - Phase 3
Sole Source
Negatives
- There is a tendency to focus on hardware and technology only, leaving the equally important personnel, procedures, and facilities subsystems for others
- The owner may tend to skip the all-important security planning process and rely on advice from a contractor with a vested interest in selling equipment
- Without a competitive bidding process, the organization has no means of comparing prices
Systems Design Process - Phase 3
RFP
Almost always based on a set of detailed design and construction deocuments
Specifications are usually generic and performance-based
Equipment makes and models are often listed with the phrase “or approved equal”
The owner typically procures a security business partner, not just a one-time security systems installer
An RFP response may be open to any contractor or it may be limited to a list of prequalified contractors
Systems Design Process - Phase 3
RFP (ctd…)
- In addtion to providing a cost proposal, a proposer must submit a technical proposal that describes the firm’s understanding of the requirements and how the objectives will be met
- It is common to allow responders to propose alternate solutions, called “alternates”
- The RFP need not restrict the organization to accept the lowest bid. Instead, it aims to obtain the best value
- If price will not be the determining factor in vendor selection, the RFP should say so
- A contractor’s response to an RFP usually takes longer to prepare than responses to other types of procurement because both a technical and a cost proposal must be prepared
Systems Design Process - Phase 3
IFB
- Commonly used by government and other organizations whose procurement procedures require that projects be competitively bid and that the award be given to the lowest qualified, responsive bidder
- No technical proposals or alternative solutions are sought, so the construction documents must be extremely explicit
- The onus of selecting equipment makes and models, and the accuracy of the security system design, is placed solely on the design team
Systems Design Process - Phase 3
IFB
- Bidders submit a cost proposal or bid, which may contain unit pricing and whatever price breakdown is requested
- The award is then made, usually wihtout negotion to the lowest qualified bidder who has conformed to the bidding instructions
- The IFB requires additional time and cost in design and specification, but typically needs only one or two weeks of procurement time, depending on the size and complexity of the project
Systems Design Process - Phase 3
IFB (ctd…)
- It is common to require bids to be sealed and delivered by a specific time to a specific location:
- At the time and place, the bids are opened (often publicly) and the apparent winner is announced
- Contracts are signed when the apparent winner’s proposal has been checked for completeness, accuracy, and qualifications
Systems Design Process - Phase 3
In an RFP or IFB, the pre-bid conference should be held one week after CD’s are issued for bid
Systems Design Process - Phase 4
Installation
The most important step in stalling the PPS
to plan correctly
PPS Systems Design Process - Phase 4
Second step in installing the PPS
for the contractor to visit the site to ensure conditions agree with designs
PPS Systems Design Process - Phase 4
Four types of Installation Tests
Pre-delivery or factory acceptance tests
Site acceptable tests
Reliability or availability tests
After-acceptance tests
PPS Systems Design Process - Phase 4
Factory Acceptance Testing
Demonstrate system performance complies with specified requirements in accordance with approved factory test procedures
PPS Systems Design Process - Phase 4
Site Acceptance Test
Contractor should verify all previous test results, diagnostics and calibrations two weeks prior to acceptance testing
PPS Systems Design Process - Phase 4
Reliability Testing
Conducted in alternating phases of testing and evaluation to allow for validation of the tests and corrective actions
PPS Systems Design Process - Phase 4
After-implementation Tests
Operational tests
Performance tests
Post-maintenance tests
Subsystem tests
Limited scope tests
Evaluation tests
PPS Systems Design Process - Phase 4
All the technological and procedural precautions in the world will be ineffective if they are not executed properly
PPS Systems Design Process - Phase 4
Without appropriate training, personnel are more likely to contribute to security risks accidentally
PPS Systems Design Process - Phase 4
The common time for the contractor to report to the job site to address a warranty issue is
within four hours of the problem report
PPS Systems Design Process - Phase 4
A PPS maintenance agreement typically includes two categories of services
- Remedial maintenance that corrects faults upon failures
- Preventitive maintenance consists of scheduled maintenance to keep the PPS in good operating condition
PPS Systems Design Process - Phase 4
Indications of a poor maintenance program
Frequent system failures
Cursory testing procedures
An inordinate number of components awaiting repair
PPS Systems Design Process - Phase 4
Typically, maintenance and warranty costs equal 11% of the total capital systems construction cost
Security Officers - Purpose
A human being is needed if the post requires the ability to
Discriminate among events, persons, circumstances, or physical objects based on complex and varying criteria
Conduct rational dialogue with people face-to-face and discern next actions based on such communication
Use physical force or the threat of it to restrain one or more persons
Exercise judgement to determine a logical course of mental or physical activity
Provide reports detailing their activities on an ongoing basis
Security Officers - Purpose
A security officer post is any location or combination of activities for which a trained human being is necessary and includes three key concepts:
- A location or combination of activities
- Necessary human being
- Training and competence to accomplish the required activities
Security Officers
Security officers represent the largest segment of security sector employees and are the largest cost element in the majority of security operating budgets
Security Officers
What are generally the largest item in the operating budget of a security department
Personnel Costs
Security Officers
Private security outnumbers….. in the U.S. by 3 to 1?
Law Enforcement
Security Officers - Deployment
Structures of security operations - Vertical Model
“Hierarchical model”
Authority starts at the top
Security Officers - Deployment
Structures of security operations - Shamrock Model
Three leaf shamrock
Leaf 1: Professionals, managers, and skilled technicians
Leaf 2: third-party suppliers
Leaf 3: Part-time and temporary workers (flexible)
Security Officers - Deployment
Structures of security operations - Network Model
“Flattened” “Horizontal” or “open” model
Connections between employees and multiple supervisors
Security department itself is networked to other departments
Security Officers - Deployment
The number of officers required for a facility is determined by several factors, including:
Physical complexity and size of the facility
Number of employees
Nature of work
Number of entrances (and hours they are open)
Value and amount of assets being protected
Number of patrols needed
Number of escorts and special assignments needed
Security Officers - Deployment
A 24/7 post requires a minimum of 4.2 officers (168 hours @ 40 hour shifts)
4.5 to compensate for sick, vacation, and holiday leave
Security Officers - Basic Functions
Where personal recognition for access-control purposes is required, under low-density queuing, a remote operator could control three or four access points
Security Officer - Rank & Authority
The efficiency of the security force depends on the adquacy and skill of its supervisors
Security Officers - Rank & Authority
Security officer supervisors are selected on the basis of their knowledge of the job and demonstrated administrative and leadership abilities
Security Officers - Regulation
Jurisdictions use two different methods for regulating security activity
- Requiring the licensing of the primary controlled business - the individual or corporate applicant must typically apply for and obtain a license before engaging in the regulated activity
- The second method applies to the licensing or registration of employees fo the business other than those named on the original application