1 / 55

Building Security Locking Systems

Building Security Locking Systems. Tennessee Board of Regents Educational Seminar April 16, 2009. Bruce Holmes Chief of Police, Director of Safety & Security University System of Georgia 404-656-2247 404-831-2959 cell bruce.holmes@usg.edu. Challenges today. New student body

zita
Download Presentation

Building Security Locking Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Building Security Locking Systems Tennessee Board of Regents Educational Seminar April 16, 2009

  2. Bruce HolmesChief of Police,Director of Safety & SecurityUniversity System of Georgia404-656-2247404-831-2959 cellbruce.holmes@usg.edu

  3. Challenges today • New student body • Increased attention, awareness of campus security status. • Shrinking budgets – search for alternative, cost effective methods for accomplishing security objectives • Proliferation of technology based options • Merging IT infrastructure & security systems • Pushing facility security systems to provide personal protection services

  4. Myths & Challenges • “One size does NOT fit all.” • Facilities often have unique challenges. (Data based decisions) • “Perception is reality” • Must be considered as a part of the evaluation • “Maintaining security while maintaining access to education.” • Processes/methods that appear overly difficult for users are not effective.

  5. Facility security planning …. • Must…. • … involve various campus constituents. • Faculty, staff, public safety, students, and others • Strive for consensus when possible • …base decisions on facility specific data. • Gathering information is a simple process • …employ a comprehensive approach. • Security Triangle

  6. Security Triangle – 3 P’s • Policies • Procedures • User-friendly processes

  7. Building Access Control? • Access control is employing methods to restrict and/or limit ones access to a facility. • Preventative Measures • Staffed entrances • Campus police/security • Life-Safety and egress • Door control/access methods & devices • Monitoring & Surveillance

  8. Physical Security Planning • Layer Approach • Security is planned using a layered approach • Outer Layer – approach to building or access to campus • Inner Layer – exterior area immediately adjacent to building including exterior doors and windows • Interior Layer – inside areas Outer Layer Inner Layer Interior Layer (Building)

  9. Example

  10. Data Driven Decision Making • Need adequate information from various sources: • Crime statistics • Building occupancy loads • Programming information • Inventory information • “Using data on which to base your decisions increases your odds of asking the right question.”

  11. Basic Planning Tools &Info Hazard/Vulnerability Analysis May include “mitigation – factor” to further refine Relative Weight

  12. Basic Planning Tools &Info Hazard/Vulnerability Analysis w/Mitigation Factor

  13. Basic Planning Tools & Info Facility Risk Assessment-Williams Library

  14. Basic Planning Tools & Info • Facility use information • Users? • Technology – consider alternate securing methods • Hours of facility operation • Often academic buildings are operational 20 hours a day. • Policies/Procedures/Practices • Existing procedures • Campus standards • Key control

  15. Basic Planning Tools & Info User Matrix – Barnes Science Building

  16. Establish Facility Access Goals • Used to promote senior leadership buy-in and support. • Others will understand basic concepts • “Better to understand and disagree vs. Not knowing and not understanding.” • Focuses budgetary expenditures • Prevents rush to purchase “latest-greatest” • Develops consistency for application of security hardware, policies, procedures and processes

  17. Side bar - signage

  18. Locking Hardware • Two Categories • Technology based & Non-technology based • Non-technology based methods • Barriers – e.g. turn-styles, etc. • Crime Prevention through Environmental Design • Controlling access through staff – receptionists, security officers, etc.

  19. Physical Security Methods • Locking hardware • Door locks • Key control policies and procedures • Various forms of devices available • Standard key-in-knob (KIK) • Mechanical Combination (MC) • Latch and bolt

  20. Pros & Cons- Mechanical locks Low to high security applications.

  21. Mechanical locks • Majority of educational facilities are secured using mechanical, stand-alone locks. Combination systems are equally prevalent. • Common Security failures related to mechanical locks are: • Maintaining grand master-key system integrity • “Transfer of access” • Not locking doors

  22. Discussion - Mechanical system considerations • “Eliminate Grand Master Keying Concept” • Every door has a unique key. • No “One” key fits more than one door. • No suite masters, building masters, etc. • Can it be done? How would you approach the concept? • Obstacles? Difficulties?

  23. “No Grand Master” • “Resident Advisory Group (Rag)” involved early in the decision process, (prior to building construction) • Security concerns and needs explained. Facility access/security plan, goals and objectives were shared with Rag. • Custodial Required to check out “floor keys” • One Dean had 47 keys to access her areas of responsibility.

  24. Technology Security Systems • Costs dropping for high-tech solutions. • Security options being incorporated in fire surveillance/alarm systems, HVAC or building control systems, camera systems • Provider several options not afforded by mechanical systems.

  25. Technology Based Systems • Systems increasingly move toward integrating existing network infrastructure in to security based systems. • Advantages: • Cost savings through use of existing infrastructure • Service support through existing personnel and/or vendors

  26. Technology Based Systems • Disadvantages – • Taxing existing infrastructure • Confusion of mission for IT • Create additional security breach opportunities, e.g. hacking, vendors, repair personnel, etc. • Difficult to maintain network security of existing systems equivalent to security needs • Coordination of services across multiple disciplines, e.g. IT to Physical Plant to Public Safety to campus department to card office.

  27. Implementation of technology • Technology provides opportunities in several areas: • Increased surveillance w/o staff costs increasing • Provide records of ingress • Provide reporting of security issues such as door propping, entry/exit of individuals. • Provide timed access to facilities • Technology creates unique challenges: • Purchase and installation costs • Maintenance/upkeep costs • Repair times increased • Reliance on additional technologies increases security concerns • Staff training requirements for operations and upkeep

  28. Card Access Systems • Card access – increasingly popular, and advances in technology are beginning to reduce costs for purchase • Card access forms • Magnetic Stripe • Barium Ferrite • Bar Code • Wiegand – ‘antenna card’ • Proximity card • Smart card

  29. Card access–Operational challenges • “Tail-gating” • Perceived security • Life safety concerns and resulting operations • Monitoring vs. surveillance • Added security concerns with use of computer technology. E.g. readers susceptible to hacking, card information, etc.

  30. Technology based considerations • Ability to incorporate card access in to existing financial card systems? • Need to identify: • Who has access to card system(s)? • Who has authority to control card? • What if financial use is no longer needed? • What if access control is changed but not $? • Situations to discuss among campus groups • What if a public safety officer needs to confiscate an access card that has financial use?

  31. Shared Card Method One Card Security Control Retail Services Control

  32. Card Access - Considerations • Identify limitations in emergency situations • Loss of power – mag locks open for life safety needs? • Loss of connectivity • Establish procedures for –denying access, allowing access to emergency responders, etc.

  33. Biometric Devices • Technologies becoming increasingly affordable for more common applications: • Biometrics include: • Voice • Finger geometry • Handwriting • Hand-print • Face geometry • Iris & retinal scanning • Biometrics introduce individual verification to security access

  34. Biometric Devices • Advantages – • Identify individual versus a key, card or other device • Costs are coming down • Becoming more acceptable to consumer • Unique identifiers • Use to protect data, network log-ins, in addition to facility access.

  35. Biometric Devices • Disadvantages • Not as reliable • Operation impacted by environment • e.g. lotion, temperature, dust, etc. • Often require secondary access method for verification • Increased reliance on third party vendors for support • Network infrastructure requirements

  36. Biometric –Advantages/disadvantages

  37. Considerations when evaluating technology based systems • Add complexity to facility access • Reliance on vendors – maintenance costs • Competing campus systems may conflict • Multiple cards, mixed use cards, multiple locking methods • Increased training needs for staff • Prevent accidental security lapses • Ability to adequately utilize system services

  38. “Simple System” COMPLICATED?

  39. Future Trends - Concerns • Single Solution systems • One system to provide: • HVAC controls, Life safety functions, door access • Advantages • One vendor, one call for concerns • No confusion on responsibilities • Challenges • Reliance on a sole vendor – “all eggs in one basket” • Increased uses – increased potential for failure • System access roles

  40. Future Trends-Concerns • Multiple Platforms, one card system • Mag stripe cards • Use of multiple, separate systems with one card. • Advantages • Allows separation of key roles/responsibilities, reducing confusion, and/or turf wars. • Challenges • Clearly establishing base-line specifications early • Vendor resistance

  41. Future Trends - Opportunities • Notification/User Interaction Systems • Available with several systems, capabilities continue to expand. • Tracking systems – ability to track items or people. • Costs are quickly dropping as it becomes a ‘software’ capability. • Continued push to reduce costs through security technology • Challenges are the reliance on technologies where decisions are required.

  42. Discussion – Specific Applications • Ability to lock classroom doors from inside?

  43. Ability to lock classrooms from inside? • Unfortunately, the answer to this question will vary from institution to institution and potentially facility to facility. • Concerns w/classroom locking method: • Costs • Potential for other crimes to be committed • Disruption of classes/operations if door is accidentally secured • Consider: • Type of doors and locking systems in place • “dead-bolt” system – accessibility, etc.

  44. Lock Classrooms • Things to do • Study committee • Gather all data • Crime Reports • Interview w/campus mental health professionals • Virginia Tech after action review • Evaluate on a facility specific or program specific level

  45. Shooter scenarios, how can building, facility access reduce potential injuries? • Consider the security triangle when evaluating facility security issues. • People – suspects from past incidents primarily have been members of the community • Processes – allowed facility/security access was afforded to all suspects. Policies would not have prevented access. • Physical Security – no preventative value. Protective value would have been increased • Concerns: • Implementation of locking mechanisms may increase opportunities for other crimes

  46. Shooter situations • Predominately have had levels of pre-planning. • Columbine – video, purchases days & weeks in advance of needed materials/supplies • Virginia Tech – locking doors, video messages, preparation.

  47. Discussion • Establishing facility access restrictions? • “No faculty/staff/students from 11:00 pm to 6:00am. NO EXCEPTIONS”

  48. Establishing facility access restrictions? • Clearly identified time periods where faculty/staff are not authorized in a facility. • Concerns: • Research faculty requiring access at varying times • Maintaining experiments during power outages • Tasks: • Involve impacted faculty and staff • Identify needs based on facility • Accommodate where possible • Use information gathered for future construction/renovation projects

  49. Camera technology • Camera technology has evolved dramatically over the past 10 years reducing costs for consumers. • Internet Protocol based cameras offer an inexpensive option that utilizes existing IT infrastructure. • Installation is becoming easier as equipment becomes more, “Use and replace”

More Related