Title: Building Security Locking Systems
1Building Security Locking Systems
- Tennessee Board of Regents
- Educational Seminar
- April 16, 2009
2Bruce HolmesChief of Police,Director of
Safety SecurityUniversity System of
Georgia404-656-2247404-831-2959
cellbruce.holmes_at_usg.edu
3Challenges today
- New student body
- Increased attention, awareness of campus security
status. - Shrinking budgets search for alternative, cost
effective methods for accomplishing security
objectives - Proliferation of technology based options
- Merging IT infrastructure security systems
- Pushing facility security systems to provide
personal protection services
4Myths Challenges
- One size does NOT fit all.
- Facilities often have unique challenges. (Data
based decisions) - Perception is reality
- Must be considered as a part of the evaluation
- Maintaining security while maintaining access to
education. - Processes/methods that appear overly difficult
for users are not effective.
5Facility security planning .
- Must.
- involve various campus constituents.
- Faculty, staff, public safety, students, and
others - Strive for consensus when possible
- base decisions on facility specific data.
- Gathering information is a simple process
- employ a comprehensive approach.
- Security Triangle
6Security Triangle 3 Ps
- Policies
- Procedures
- User-friendly processes
7Building Access Control?
- Access control is employing methods to restrict
and/or limit ones access to a facility. - Preventative Measures
- Staffed entrances
- Campus police/security
- Life-Safety and egress
- Door control/access methods devices
- Monitoring Surveillance
8Physical Security Planning
- Layer Approach
- Security is planned using a layered approach
- Outer Layer approach to building or access to
campus - Inner Layer exterior area immediately adjacent
to building including exterior doors and windows - Interior Layer inside areas
Outer Layer
Inner Layer
Interior Layer (Building)
9Example
10Data Driven Decision Making
- Need adequate information from various sources
- Crime statistics
- Building occupancy loads
- Programming information
- Inventory information
- Using data on which to base your decisions
increases your odds of asking the right question.
11Basic Planning Tools Info
Hazard/Vulnerability Analysis
May include mitigation factor to further
refine Relative Weight
12Basic Planning Tools Info
Hazard/Vulnerability Analysis w/Mitigation Factor
13Basic Planning Tools Info
- Facility Risk Assessment-Williams Library
14Basic Planning Tools Info
- Facility use information
- Users?
- Technology consider alternate securing methods
- Hours of facility operation
- Often academic buildings are operational 20 hours
a day. - Policies/Procedures/Practices
- Existing procedures
- Campus standards
- Key control
15Basic Planning Tools Info
User Matrix Barnes Science Building
16Establish Facility Access Goals
- Used to promote senior leadership buy-in and
support. - Others will understand basic concepts
- Better to understand and disagree vs. Not
knowing and not understanding. - Focuses budgetary expenditures
- Prevents rush to purchase latest-greatest
- Develops consistency for application of security
hardware, policies, procedures and processes
17Side bar - signage
18Locking Hardware
- Two Categories
- Technology based Non-technology based
- Non-technology based methods
- Barriers e.g. turn-styles, etc.
- Crime Prevention through Environmental Design
- Controlling access through staff receptionists,
security officers, etc.
19Physical Security Methods
- Locking hardware
- Door locks
- Key control policies and procedures
- Various forms of devices available
- Standard key-in-knob (KIK)
- Mechanical Combination (MC)
- Latch and bolt
20Pros Cons- Mechanical locks
Low to high security applications.
21Mechanical locks
- Majority of educational facilities are secured
using mechanical, stand-alone locks. Combination
systems are equally prevalent. - Common Security failures related to mechanical
locks are - Maintaining grand master-key system integrity
- Transfer of access
- Not locking doors
22Discussion - Mechanical system considerations
- Eliminate Grand Master Keying Concept
- Every door has a unique key.
- No One key fits more than one door.
- No suite masters, building masters, etc.
- Can it be done? How would you approach the
concept? - Obstacles? Difficulties?
23No Grand Master
- Resident Advisory Group (Rag) involved early in
the decision process, (prior to building
construction) - Security concerns and needs explained. Facility
access/security plan, goals and objectives were
shared with Rag. - Custodial Required to check out floor keys
- One Dean had 47 keys to access her areas of
responsibility.
24Technology Security Systems
- Costs dropping for high-tech solutions.
- Security options being incorporated in fire
surveillance/alarm systems, HVAC or building
control systems, camera systems - Provider several options not afforded by
mechanical systems.
25Technology Based Systems
- Systems increasingly move toward integrating
existing network infrastructure in to security
based systems. - Advantages
- Cost savings through use of existing
infrastructure - Service support through existing personnel and/or
vendors
26Technology Based Systems
- Disadvantages
- Taxing existing infrastructure
- Confusion of mission for IT
- Create additional security breach opportunities,
e.g. hacking, vendors, repair personnel, etc. - Difficult to maintain network security of
existing systems equivalent to security needs - Coordination of services across multiple
disciplines, e.g. IT to Physical Plant to Public
Safety to campus department to card office.
27Implementation of technology
- Technology provides opportunities in several
areas - Increased surveillance w/o staff costs increasing
- Provide records of ingress
- Provide reporting of security issues such as door
propping, entry/exit of individuals. - Provide timed access to facilities
- Technology creates unique challenges
- Purchase and installation costs
- Maintenance/upkeep costs
- Repair times increased
- Reliance on additional technologies increases
security concerns - Staff training requirements for operations and
upkeep
28Card Access Systems
- Card access increasingly popular, and advances
in technology are beginning to reduce costs for
purchase - Card access forms
- Magnetic Stripe
- Barium Ferrite
- Bar Code
- Wiegand antenna card
- Proximity card
- Smart card
29(No Transcript)
30Card accessOperational challenges
- Tail-gating
- Perceived security
- Life safety concerns and resulting operations
- Monitoring vs. surveillance
- Added security concerns with use of computer
technology. E.g. readers susceptible to hacking,
card information, etc.
31Technology based considerations
- Ability to incorporate card access in to existing
financial card systems? - Need to identify
- Who has access to card system(s)?
- Who has authority to control card?
- What if financial use is no longer needed?
- What if access control is changed but not ?
- Situations to discuss among campus groups
- What if a public safety officer needs to
confiscate an access card that has financial use?
32Shared Card Method
One Card
Security Control
Retail Services Control
33Card Access - Considerations
- Identify limitations in emergency situations
- Loss of power mag locks open for life safety
needs? - Loss of connectivity
- Establish procedures for denying access,
allowing access to emergency responders, etc.
34Biometric Devices
- Technologies becoming increasingly affordable for
more common applications - Biometrics include
- Voice
- Finger geometry
- Handwriting
- Hand-print
- Face geometry
- Iris retinal scanning
- Biometrics introduce individual verification to
security access
35Biometric Devices
- Advantages
- Identify individual versus a key, card or other
device - Costs are coming down
- Becoming more acceptable to consumer
- Unique identifiers
- Use to protect data, network log-ins, in addition
to facility access.
36Biometric Devices
- Disadvantages
- Not as reliable
- Operation impacted by environment
- e.g. lotion, temperature, dust, etc.
- Often require secondary access method for
verification - Increased reliance on third party vendors for
support - Network infrastructure requirements
37Biometric Advantages/disadvantages
38Considerations when evaluating technology based
systems
- Add complexity to facility access
- Reliance on vendors maintenance costs
- Competing campus systems may conflict
- Multiple cards, mixed use cards, multiple locking
methods - Increased training needs for staff
- Prevent accidental security lapses
- Ability to adequately utilize system services
39Simple System COMPLICATED?
40Future Trends - Concerns
- Single Solution systems
- One system to provide
- HVAC controls, Life safety functions, door access
- Advantages
- One vendor, one call for concerns
- No confusion on responsibilities
- Challenges
- Reliance on a sole vendor all eggs in one
basket - Increased uses increased potential for failure
- System access roles
41Future Trends-Concerns
- Multiple Platforms, one card system
- Mag stripe cards
- Use of multiple, separate systems with one card.
- Advantages
- Allows separation of key roles/responsibilities,
reducing confusion, and/or turf wars. - Challenges
- Clearly establishing base-line specifications
early - Vendor resistance
42Future Trends - Opportunities
- Notification/User Interaction Systems
- Available with several systems, capabilities
continue to expand. - Tracking systems ability to track items or
people. - Costs are quickly dropping as it becomes a
software capability. - Continued push to reduce costs through security
technology - Challenges are the reliance on technologies where
decisions are required.
43Discussion Specific Applications
- Ability to lock classroom doors from inside?
44Ability to lock classrooms from inside?
- Unfortunately, the answer to this question will
vary from institution to institution and
potentially facility to facility. - Concerns w/classroom locking method
- Costs
- Potential for other crimes to be committed
- Disruption of classes/operations if door is
accidentally secured - Consider
- Type of doors and locking systems in place
- dead-bolt system accessibility, etc.
45Lock Classrooms
- Things to do
- Study committee
- Gather all data
- Crime Reports
- Interview w/campus mental health professionals
- Virginia Tech after action review
- Evaluate on a facility specific or program
specific level
46Shooter scenarios, how can building, facility
access reduce potential injuries?
- Consider the security triangle when evaluating
facility security issues. - People suspects from past incidents primarily
have been members of the community - Processes allowed facility/security access was
afforded to all suspects. Policies would not have
prevented access. - Physical Security no preventative value.
Protective value would have been increased - Concerns
- Implementation of locking mechanisms may increase
opportunities for other crimes
47Shooter situations
- Predominately have had levels of pre-planning.
- Columbine video, purchases days weeks in
advance of needed materials/supplies - Virginia Tech locking doors, video messages,
preparation.
48Discussion
- Establishing facility access restrictions?
- No faculty/staff/students from 1100 pm to
600am. NO EXCEPTIONS
49Establishing facility access restrictions?
- Clearly identified time periods where
faculty/staff are not authorized in a facility. - Concerns
- Research faculty requiring access at varying
times - Maintaining experiments during power outages
- Tasks
- Involve impacted faculty and staff
- Identify needs based on facility
- Accommodate where possible
- Use information gathered for future
construction/renovation projects
50Camera technology
- Camera technology has evolved dramatically over
the past 10 years reducing costs for consumers. - Internet Protocol based cameras offer an
inexpensive option that utilizes existing IT
infrastructure. - Installation is becoming easier as equipment
becomes more, Use and replace
51Camera Surveillance Monitoring
- Monitoring vs. Surveillance
- Monitoring staff intensive to watch camera
outputs - Surveillance images being recorded, often only
events that trigger camera activity - Majority of camera installations, primary
objective is not monitoring. - Primary uses for camera systems
- Crime solving
- Person identification
- Perceived deterrent
- Legal use as a record of events
- Security/Police patrols are not reduced through
deployment of cameras.
52Camera use
- Need to clearly establish intended use and
expectations - Monitoring vs. surveillance
- Identify expectation of privacy concerns
- Camera systems are easily employed to replace
locking mechanisms, staffing for entry points,
but are a great supplement for recording of
events.
53Camera Systems
- Camera systems are becoming user-friendly
making operation and upkeep easier. - Consider using cameras in a support role for
locking systems, staff support, and in
high-security applications as supporting
documentation.
54Questions
55Bruce HolmesChief of Police,Director of
Safety SecurityUniversity System of
Georgia404-656-2247404-831-2959
cellbruce.holmes_at_usg.edu