590 likes | 974 Views
Building Security Locking Systems. Tennessee Board of Regents Educational Seminar April 16, 2009. Bruce Holmes Chief of Police, Director of Safety & Security University System of Georgia 404-656-2247 404-831-2959 cell bruce.holmes@usg.edu. Challenges today. New student body
E N D
Building Security Locking Systems Tennessee Board of Regents Educational Seminar April 16, 2009
Bruce HolmesChief of Police,Director of Safety & SecurityUniversity System of Georgia404-656-2247404-831-2959 cellbruce.holmes@usg.edu
Challenges today • New student body • Increased attention, awareness of campus security status. • Shrinking budgets – search for alternative, cost effective methods for accomplishing security objectives • Proliferation of technology based options • Merging IT infrastructure & security systems • Pushing facility security systems to provide personal protection services
Myths & Challenges • “One size does NOT fit all.” • Facilities often have unique challenges. (Data based decisions) • “Perception is reality” • Must be considered as a part of the evaluation • “Maintaining security while maintaining access to education.” • Processes/methods that appear overly difficult for users are not effective.
Facility security planning …. • Must…. • … involve various campus constituents. • Faculty, staff, public safety, students, and others • Strive for consensus when possible • …base decisions on facility specific data. • Gathering information is a simple process • …employ a comprehensive approach. • Security Triangle
Security Triangle – 3 P’s • Policies • Procedures • User-friendly processes
Building Access Control? • Access control is employing methods to restrict and/or limit ones access to a facility. • Preventative Measures • Staffed entrances • Campus police/security • Life-Safety and egress • Door control/access methods & devices • Monitoring & Surveillance
Physical Security Planning • Layer Approach • Security is planned using a layered approach • Outer Layer – approach to building or access to campus • Inner Layer – exterior area immediately adjacent to building including exterior doors and windows • Interior Layer – inside areas Outer Layer Inner Layer Interior Layer (Building)
Data Driven Decision Making • Need adequate information from various sources: • Crime statistics • Building occupancy loads • Programming information • Inventory information • “Using data on which to base your decisions increases your odds of asking the right question.”
Basic Planning Tools &Info Hazard/Vulnerability Analysis May include “mitigation – factor” to further refine Relative Weight
Basic Planning Tools &Info Hazard/Vulnerability Analysis w/Mitigation Factor
Basic Planning Tools & Info Facility Risk Assessment-Williams Library
Basic Planning Tools & Info • Facility use information • Users? • Technology – consider alternate securing methods • Hours of facility operation • Often academic buildings are operational 20 hours a day. • Policies/Procedures/Practices • Existing procedures • Campus standards • Key control
Basic Planning Tools & Info User Matrix – Barnes Science Building
Establish Facility Access Goals • Used to promote senior leadership buy-in and support. • Others will understand basic concepts • “Better to understand and disagree vs. Not knowing and not understanding.” • Focuses budgetary expenditures • Prevents rush to purchase “latest-greatest” • Develops consistency for application of security hardware, policies, procedures and processes
Locking Hardware • Two Categories • Technology based & Non-technology based • Non-technology based methods • Barriers – e.g. turn-styles, etc. • Crime Prevention through Environmental Design • Controlling access through staff – receptionists, security officers, etc.
Physical Security Methods • Locking hardware • Door locks • Key control policies and procedures • Various forms of devices available • Standard key-in-knob (KIK) • Mechanical Combination (MC) • Latch and bolt
Pros & Cons- Mechanical locks Low to high security applications.
Mechanical locks • Majority of educational facilities are secured using mechanical, stand-alone locks. Combination systems are equally prevalent. • Common Security failures related to mechanical locks are: • Maintaining grand master-key system integrity • “Transfer of access” • Not locking doors
Discussion - Mechanical system considerations • “Eliminate Grand Master Keying Concept” • Every door has a unique key. • No “One” key fits more than one door. • No suite masters, building masters, etc. • Can it be done? How would you approach the concept? • Obstacles? Difficulties?
“No Grand Master” • “Resident Advisory Group (Rag)” involved early in the decision process, (prior to building construction) • Security concerns and needs explained. Facility access/security plan, goals and objectives were shared with Rag. • Custodial Required to check out “floor keys” • One Dean had 47 keys to access her areas of responsibility.
Technology Security Systems • Costs dropping for high-tech solutions. • Security options being incorporated in fire surveillance/alarm systems, HVAC or building control systems, camera systems • Provider several options not afforded by mechanical systems.
Technology Based Systems • Systems increasingly move toward integrating existing network infrastructure in to security based systems. • Advantages: • Cost savings through use of existing infrastructure • Service support through existing personnel and/or vendors
Technology Based Systems • Disadvantages – • Taxing existing infrastructure • Confusion of mission for IT • Create additional security breach opportunities, e.g. hacking, vendors, repair personnel, etc. • Difficult to maintain network security of existing systems equivalent to security needs • Coordination of services across multiple disciplines, e.g. IT to Physical Plant to Public Safety to campus department to card office.
Implementation of technology • Technology provides opportunities in several areas: • Increased surveillance w/o staff costs increasing • Provide records of ingress • Provide reporting of security issues such as door propping, entry/exit of individuals. • Provide timed access to facilities • Technology creates unique challenges: • Purchase and installation costs • Maintenance/upkeep costs • Repair times increased • Reliance on additional technologies increases security concerns • Staff training requirements for operations and upkeep
Card Access Systems • Card access – increasingly popular, and advances in technology are beginning to reduce costs for purchase • Card access forms • Magnetic Stripe • Barium Ferrite • Bar Code • Wiegand – ‘antenna card’ • Proximity card • Smart card
Card access–Operational challenges • “Tail-gating” • Perceived security • Life safety concerns and resulting operations • Monitoring vs. surveillance • Added security concerns with use of computer technology. E.g. readers susceptible to hacking, card information, etc.
Technology based considerations • Ability to incorporate card access in to existing financial card systems? • Need to identify: • Who has access to card system(s)? • Who has authority to control card? • What if financial use is no longer needed? • What if access control is changed but not $? • Situations to discuss among campus groups • What if a public safety officer needs to confiscate an access card that has financial use?
Shared Card Method One Card Security Control Retail Services Control
Card Access - Considerations • Identify limitations in emergency situations • Loss of power – mag locks open for life safety needs? • Loss of connectivity • Establish procedures for –denying access, allowing access to emergency responders, etc.
Biometric Devices • Technologies becoming increasingly affordable for more common applications: • Biometrics include: • Voice • Finger geometry • Handwriting • Hand-print • Face geometry • Iris & retinal scanning • Biometrics introduce individual verification to security access
Biometric Devices • Advantages – • Identify individual versus a key, card or other device • Costs are coming down • Becoming more acceptable to consumer • Unique identifiers • Use to protect data, network log-ins, in addition to facility access.
Biometric Devices • Disadvantages • Not as reliable • Operation impacted by environment • e.g. lotion, temperature, dust, etc. • Often require secondary access method for verification • Increased reliance on third party vendors for support • Network infrastructure requirements
Considerations when evaluating technology based systems • Add complexity to facility access • Reliance on vendors – maintenance costs • Competing campus systems may conflict • Multiple cards, mixed use cards, multiple locking methods • Increased training needs for staff • Prevent accidental security lapses • Ability to adequately utilize system services
“Simple System” COMPLICATED?
Future Trends - Concerns • Single Solution systems • One system to provide: • HVAC controls, Life safety functions, door access • Advantages • One vendor, one call for concerns • No confusion on responsibilities • Challenges • Reliance on a sole vendor – “all eggs in one basket” • Increased uses – increased potential for failure • System access roles
Future Trends-Concerns • Multiple Platforms, one card system • Mag stripe cards • Use of multiple, separate systems with one card. • Advantages • Allows separation of key roles/responsibilities, reducing confusion, and/or turf wars. • Challenges • Clearly establishing base-line specifications early • Vendor resistance
Future Trends - Opportunities • Notification/User Interaction Systems • Available with several systems, capabilities continue to expand. • Tracking systems – ability to track items or people. • Costs are quickly dropping as it becomes a ‘software’ capability. • Continued push to reduce costs through security technology • Challenges are the reliance on technologies where decisions are required.
Discussion – Specific Applications • Ability to lock classroom doors from inside?
Ability to lock classrooms from inside? • Unfortunately, the answer to this question will vary from institution to institution and potentially facility to facility. • Concerns w/classroom locking method: • Costs • Potential for other crimes to be committed • Disruption of classes/operations if door is accidentally secured • Consider: • Type of doors and locking systems in place • “dead-bolt” system – accessibility, etc.
Lock Classrooms • Things to do • Study committee • Gather all data • Crime Reports • Interview w/campus mental health professionals • Virginia Tech after action review • Evaluate on a facility specific or program specific level
Shooter scenarios, how can building, facility access reduce potential injuries? • Consider the security triangle when evaluating facility security issues. • People – suspects from past incidents primarily have been members of the community • Processes – allowed facility/security access was afforded to all suspects. Policies would not have prevented access. • Physical Security – no preventative value. Protective value would have been increased • Concerns: • Implementation of locking mechanisms may increase opportunities for other crimes
Shooter situations • Predominately have had levels of pre-planning. • Columbine – video, purchases days & weeks in advance of needed materials/supplies • Virginia Tech – locking doors, video messages, preparation.
Discussion • Establishing facility access restrictions? • “No faculty/staff/students from 11:00 pm to 6:00am. NO EXCEPTIONS”
Establishing facility access restrictions? • Clearly identified time periods where faculty/staff are not authorized in a facility. • Concerns: • Research faculty requiring access at varying times • Maintaining experiments during power outages • Tasks: • Involve impacted faculty and staff • Identify needs based on facility • Accommodate where possible • Use information gathered for future construction/renovation projects
Camera technology • Camera technology has evolved dramatically over the past 10 years reducing costs for consumers. • Internet Protocol based cameras offer an inexpensive option that utilizes existing IT infrastructure. • Installation is becoming easier as equipment becomes more, “Use and replace”