Physical Security (25%) Flashcards

1
Q

CPTED

What are the 8 Main categories of Physical Security Measures

A
  1. CPTED (Crime-Prevention Through Environmental Design
  2. Physical barriers & site hardening
  3. Physical entry & access control
  4. Security Lighting
  5. Intrusion Detection
  6. Video Surveillance
  7. Security Personnel
  8. Security policies & procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CPTED

What can lead to a reduction in the opportunity fear & incidence of predatory, stranger-to-stranger type crime?

A

Proper design & effective use of the built environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CPTED

¿Qué puede también resultar en una mejora de la calidad de vida: cómo y dónde vivimos, trabajamos y jugamos?

A

CPTED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CPTED

CPTED should be integrated into…?

A

The design & function of the buildings or location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CPTED

All Human Space…

A

Has some designated purpose

Has social, cultural, legal or physical definitions that prescribe the desired & acceptable behaviors

Is designed to support & control the desired & acceptable behaviors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CPTED

CPTED is the design or redesign of a venue to reduce crime opportunity & fear of crime through?

A

Natural Means

Mechanical Means

Procedural (organizational) means

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CPTED

At its core, CPTED is based on common sense & a heightened awareness about how people use their space for legitimate & criminal intentions

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CPTED

3 Classes of CPTED Strategies

A
  1. Mechanical measures
  2. Organizational measures
  3. Natural or architectural measures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CPTED Strategies

A

Natural access control

Natural surveillance

Natural territorial reinforcement

Management & maintenance

Legitimate activity support

Compartmentalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CPTED

Methods for implementing CPTED

A

Organized methods (staffing)

Mechanical methods (technical products)

Natural methods (site planning, design, landscaping, signage)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CPTED

Once the first window is broken, vandalism and/or other crime quietly follow if it is not prepared

A

Broken Window Theory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CPTED

CPTED is congruent with the 3 D’s

A

Deterring

Detecting

Delaying aggressors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CPTED

Preventing crime & losses is inherent in many human functions behaviors & activities

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CPTED

CPTED security standards focus on 4 categories

A
  1. Perimeter & exterior security
  2. Entry security
  3. Interior security
  4. Security planning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CPTED

Types of CPTED Security Zones

A
  1. Unrestricted zones
  2. Controlled zones - authorized personnel in these general areas
  3. Restricted zones - authorized personnel in these specific areas
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CPTED

Deterrence is achieved through…?

A

Measures that potential adversaries perceive as too difficult to defeat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CPTED

For the security professional, CPTED is a set of management tools targeting…?

A

Places

Behavior

Design & Use of Space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CPTED

What is more cost-effective than making changes after construction starts

A

Integrating CPTED during the initial planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CPTED

Whenever possible, security planning should begin during…?

A

Site Selection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CPTED

CPTED is intended to be integrated throughout the construction process

A

Programming

Schematic Design (SD)

Design Development (DD)

Construction documents or working drawings (CD)

Bids for construction & selection of contractor (RFP)

Security needs should be addressed int he programming phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CPTED

Establish a secure perimeter around the building as far out as possible… setbacks how far?

A

100 ft. is suggested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CPTED

Where should you position concrete flower planters etc…?

A

Near curbs less than 4 ft between them to block cars

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CPTED

Locate parking as far from the building as practical & place it within view of occupied rooms or facilities

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

CPTED

Landscaping Considerations

A

Low growing plants should be set back 1 yard from the edge of paths or walkways

Low-growing shrubs should be kept no higher than 32” in height

Tree canopies should be trimmed up to 8’ to provide a clear line of the site & reduce hiding spots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CPTED Parking garages should be equipped with what?
## Footnote - 3 ft. or higher shrubs/trees should be 10-15 ft. from the structure - Booths should have 360 degrees visibility & a means of communication - No public restrooms but should be within view of the booth - One vehicle entry/exit should be used if possible (based on traffic volume) - Open-walled, upper levels to allow natural surveillance & permit hearing of calls for help - Egress only exterior pedestrian doors
26
CPTED Parking Garages (ctd...)
## Footnote - Potholes in solid walls for visibility - Stairwells & elevators in a central location visible from both - Stairwells visible from exterior & offering no hiding place & no roof access - Elevators with glass for exterior visibility along the exterior of the facility - Access only to the lobby from the garage elevators or stairs - Adequate lighting
27
Access Control Refers to the process of managing databases or other records & determining the parameters of authorized entry, such as who or what will be granted access when they may enter where access will occur
Access Control
28
Access Control Categories of Access Control
Manual Machine Aided Automated
29
Access Control Types of attacks used to defeat access controls
Deceit Direct Physical Attack Technical Attack
30
Entry Control An entry control subsystem includes the following performance measures...
Throughout Error Rates
31
Entry Control An Entry Control Subsystem
- is not an access control system - Is part of the detection system - Allows the movement of authorized personnel & material into & out of facilities - Detects & possibly delays movement of unauthorized personnel & contraband - Refers to the physical equipment used to control the movement of people or material into an area
32
Entry Control Objections of an entry control system used for physical protection are...
- To permit authorized persons to enter & exit - To detect & prevent the entry or exit of contraband material (weapons, explosions, unauthorized tools, or critical assets) - To provide information to security personnel to facilitate assessment & response
33
Entry Control Verification of authorization of personnel to enter a controlled area is usually based on...
1. Carrying a valid credential (what you have) 2. Knowing a valid PIN (what you know) 3. Possessing the proper, unique physical characteristics on file (who you are)
34
Badge Technologies Magnetic Stripe ("mag stripe")
- Widely used in commercial credit/debit cards - Low-coercivity ("LoCo") cards are 300 oersteds; easy to erase; typical of credit/debit cards - High-coercivity (Hi - CO) cards are 2500 to 4000 oersteds; hard to erase, but can be done with rare\_earth magnets; typical of company badges - Easily forged, duplicated (can use proprietary encoding schemes but not common)
35
Access & Entry Control Badge Technologies
- Magnetic Stripe - Bar Code - Proximity - Smart Card
36
Access/Entry Control Badge Technologies Proximity...
- Small RF transponder/transmitter is powered by an **onboard battery (active)** or it is energized by the **card reader (passive)** **-** Low-frequency badges are in the **125 KHz range** - High-frequency badges range from **2.5 MHz to over 1 GHz**
37
Access/Entry Control Badge Technologies - Smart Card
- Gold contacts on the surface of the card allow for communication with a reading device - Contactless smart cards use RF communications & do not have the gold contacts - Main advantages: Large memory & its high degree of resistance to forgery or compromise - Ability to encrypt communications - Can be prohibitively expensive - Homeland Defense Presidential Directive (HSPD 12)
38
Access/Entry Control Personal Identity Verification System Biometrics
- Corroborate claimed identities on the basis of one or more unique physical biometric characteristics of the individual - Can differentiate between: **_verification & recognition_**
39
Access/Entry Control Personal identify verification systems All personal identity verification systems consider 3 things
- The uniqueness of the feature used for identification - The variability of the characteristic - The difficulty of implementing the system that processes the characteristic
40
Personal identity verification systems Type 1 error rate:
False rejection of a valid user
41
Personal identity verification systems Type II Error rate
False acceptance of an invalid user
42
Access/Entry Control Personal identity verification systems **Equal error rate**
- **Cross-over point where Type 1 & Type 2 errors are equal** **- Not necessarily the point at which the device should be operated** **- Not the lowest point for either type of error**
43
Access/Entry Control Personal identity verification systems **Finger Prints**
- Still considered one of the most reliable means of distinguishing one individual from another - Most systems use image processing & pattern recognition **Minutia points** **Ridge endings** **Bifurcations**
44
Access/Entry Control Personal identity verification systems **Hand/Finger Geometry**
- Characterizes the shape of the hand - Measures 3-dimensional features of the hand such as the widths & lengths & the thickness of the hand
45
Personal Identity Verification System Eye Pattern
- Imaging of iris by a video camera - Operates in the recognition mode - 10 - 12" read distance (no physical contact) - 2% of population cannot be enrolled due to blindness or other eye issues
46
Personal identity verification system **Face**
**- Utilize distinguishing characteristics of the face** **- Captured with** **video** **camera or thermal image**
47
Personal identity verification system Voice
- Speech measurements: waveform envelope, voice pitch period, relative amplitude spectrum, resonant frequencies of the vocal tract - Low security, easily deployed, more public acceptance (low distrust)
48
Personal identity verification system Handwriting
- Used for many years by the bank - Signatures can be easily forged - Handwriting dynamics include displacement velocity & acceleration
49
Access/Entry Control Access control barriers include...
Doors Gates Turnstiles Elevators
50
Access/Entry Control Vehicle access controls are...
Manual Electronic
51
Access/Entry Control Electro-Mechanical Lock Types
- Electric deadbolts - Electric latch - Electric strike - Electric lockset - Exit device - Electromagnetic lock
52
Access/Entry Control Device unlocks upon loss of power (but may stay latched - "positive latching")
Fail Safe
53
Access/Entry Control Device locks upon loss of power
Fail Secure
54
Access/Entry Control Single action / motion egress
One action/motion required to release door to exit
55
Alarm Communications & Display (AC&D) The part of a PPS that transports alarm & assessment information to a central point & presents the information to a human operator
AC&D: Alarm Communication & Display
56
The most important measure of AC&D Effectiveness?
How well it quickly & clearly communicates alarm data from sensors to the system
57
AC&D Two critical elements of alarm communication & display
- **Transportation or communication of data** **- Presentation or display of that data to a human operator in a meaningful manner**
58
AC&D When an alarm occurs, the AC&D system must communicate to the operator the following information
**- When an alarm has occurred** **- What or who caused the alarm** **- When the alarm happened**
59
AC&D Security communications require the following assurances
**- The integrity of the communications medium (availability of the message path)** **- The integrity of the message (complete & errorless transmission of the data)** **- Timeliness of the transmission (data communication within an appropriate time frame)** **- Message security (accessibility of the communication to authorized persons only)**
60
AC&D Communications Security - Line Protection
**- Outside lines should be installed underground** **- Inside wiring should be encased in conduit**
61
AC&D Communication Security - Line Supervision
**Simplest line supervision:** End-of-line (EOC) resister (detects open circuit, ground, wire-to-wire short)
62
AC&D Communication Security - Scramblers
- Disguise interceptible communications - 2 characteristics of voice that can be scrambled frequency (pitch of voice) (most typically scrambled) Amplitude (loudness)
63
AC&D **Transmission of Alarm Signals**
Alarm signals may be transmitted on an unshielded pair of direct current (DC) Conductors
64
AC&D Signals also may be transmitted on...
Lines installed to carry electric power
65
AC&D Optical Fiber
**A strand of high-purity, spun glass, typically about the thickness of a human hair**
66
AC&D Optical fibers can be used to carry...
**- Voice-grade signals** **- Video signals** **- Digital or data grade signals**
67
AC&D Optical fibers differ from a conventional metal wire in several ways
- Not affected by (EMI) or (RFI) - Don't carry electrical current nor radiate signals - Can carry many more multiplexed messages - Much smaller & lighter than conventional - Flexible & can take an irregular course from P to P - Not vulnerable to interception by acoustical or inductive coupling
68
AC&D Optical Fiber
Optical fiber is less expensive than copper
69
AC&D Video Transmission Methods
## Footnote **Coaxial Cable** **Telephone Lines** **Optical Fiber** **Dedicated Twisted Pair** **DC Wire**
70
AC&D Video Transmission Methods
No processing required if transmission distance is short enough, typically 1,000 ft.
71
Video Transmission Methods The transmission distance without amplification is 1 mile or more
Optical Fiber
72
AC&D Good performance can be achieved at wire distances of up to 4,000 ft.
Dedicated Twisted Pair
73
AC&D Video signals cannot be transmitted directly on DC lines
DC Wire
74
AC&D 3 Types of line transmission used in electronic protection systems
Loop Point-to-Point Multi-plexed
75
AC&D Two methods used to separate multiplexed signals
- Time division multiplexing (TDM) - Frequency division multiplexing (FDM)
76
AC&D A wireless communication requires
- A transmitter to furnish radio frequency energy - An antenna to radiate the energy into the atmosphere - A receiver - Power for the transmitter & receiver
77
AC&D Wireless Transmission
Any unscrambled or unencrypted communication transmitted by wireless technology should be considered available for interception
78
AC&D Voice radio (2-way radio) cost & power are determined by
- The distance required to communicate - Barriers in the transmission path - Signal interference in the area
79
AC&D Microwave Transmission
**- Operates between 30 - 300 GHz** **- Requires microwave generator, power, amplifier, modulation, antenna** **- One-way & two-way communications** **- Often require FCC licenses** **- Penetrates rain, fog, snow & man-made noise** **- Used in television, multiplexed telephone, multiplexed alarm & high-speed data transmissions** **- Line-of-sight (LOS) required**
80
AC&D Laser Communication
**- Light amplification by stimulated emission of radiation (LASER)** **- Laser light is modulated at a very rapid rate** **- A photo-detector at the receiver demodulates the laser** **- Virtually impossible to intercept without detection** **- A 4-mile transmission line of sight** **- Reflected can be used but the resolution is reduced** **- interference from snow, fog, and rain** **- No FCC license required**
81
AC&D Most common causes of wireless interference
**- Signals from other transmitters** **- Industrial & atmosphere noise**
82
Intrusion Detection The process of detecting a person or vehicle attempting to gain unauthorized entry into an area
Intrusion Detection
83
Intrusion Detection Considerations for intrusion detection systems
## Footnote **- Should meet security needs of the facility** **- Should operate in harmony with other systems** **- Should not interfere with business operations** **- Should be cost effective**
84
Intrusion Detection Basic building blocks of an intrusion detection systems
Sensors
85
Intrusion Detection Detection criteria for a sensor or sensor system includes
## Footnote **- What will be detected** **- What actions are expected** **- Weight or speed of movement** **- Probability of detection required**
86
Intrusion Detection 3 main characteristics of intrusion sensor performance are...
**-** **Probability** **of detection (PD)** **- Nuisance Alarm Rate (NAR)** **- Vulnerability to Defeat**
87
Intrusion Detection If the sensor is inappropriate for the operating environment or threat, or not installed, operated, maintained & tested properly, the output of an entire system, is severely limited, becoming a greater burden than a benefit - sensor selection must match the application & environment
88
Intrusion Detection Probability of Detection
- Perfect is a "1" - reality is always less than "1" - Confidence Level (CL) is often described in conjunction with PD - unstated CL implies a 90% or better confidence level - PD is always conditional - PD also varies by the sophistication of threat - When high PD is required at all times & all weather conditions, use of multiple sensors
89
Intrusion Detection Probability of Detection PD depends primarily on these facts:
- Target to be detected (walk, crawl, tunneling etc...) - Sensor hardware design - Installation conditions - Sensitivity adjustment - Weather conditions - Condition of the equipment
90
Intrusion Detection A nuisance alarm is any alarm not caused by an intrusion
- The NAR identifies the number of nuisance alarms over a given period (ideally zero, but not realistic) - Alarm assessment is needed to preserve manpower without assessment, detection is incomplete - Natural causes: vegetation, wildlife, weather conditions, etc... - Industrial causes: ground vibration, debris moved by wind, electromagnetic interference, etc..
91
Intrusion Detection A **_false alarm_** is a nuisance alarm generated by the equipment itself
- Acceptable false alarm rate (FAR) should also be specified - Poor design inadequate maintenance or component failure
92
Intrusion Detection Vulnerability to Defeat
- All sensors can be defeated - The objective is **to make the system very difficult to defeat** - Two general ways to defeat the system **Bypass: going around the detection** **Spoof: passing through sensor's normal detection zone without generating the alarm**
93
Intrusion Detection Occurrence of a potential intrusion event...
Intrusion
94
A change in the condition being monitored
State
95
Intrusion Detection Loss of electrical power: or failure of the sensor itself
Fault Event
96
Intrusion Detection Opening, shorting, or grounding of the device circuitry, the enclosure of control panels
Tamper
97
Intrusion Detection Five ways of classifying intrusion sensors
1. Passive or active (interior & exterior) 2. Covert or overt (interior & exterior) 3. LOS or Terrah following (exterior only) 4. Volumetric or line detection (point) (interior & exterior) 5. Application (interior & exterior)
98
Intrusion Detection Two types of passive sensors
1. Detect target-generated mechanical energy (walking climbing vibration) 2. Detect target-emitted energy in a natural field of energy (heat, sound, magnetic field etc...)
99
Passive Sensors
- Sensors are harder to locate by aggressors because they do not emit energy - Safer to use in an explosive environment - Passive infrared, mechanical activity (walking climbing) vibration etc...
100
Active Sensors
- Transmit energy & detect changes to it - Includes transmitter & receiver (bi-static) - Create fewer nuisance alarms - Microwave, infrared, RF etc..
101
Separate Transmitter & Receiver
Bistatic
102
Transmitter & Receiver are Combined
Monostatic
103
Detect interruption at a fixed, or volume of space
Volumetric Sensors
104
Detect intrusion at a specific point or alarm time
Line or Point Sensors
105
Intrusion Detection Types of motion detectors
Microwave PIR Dual Technology Ultrasonic Beam Detectors
106
Intrusion Detection Video Motion Detectors (VMD)
- Passive, covert, line-of-sight - Exterior or interior applications - Sufficient lighting & resolution required - Nuisance alarms can be plentiful - flickering lights, vegetation movement, animals, rain, camera noise - Analytics improve NAR - Digital is more sophisticated but analog is less expensive - Most VMDs susceptible to very slow movement
107
VMD Video Motion Detection is based on pixel changes
- Changes in brightness or contrast - Local movement across adjacent cells - The speed of motion across all cells - Size of objects within cells - Global changes across most or all cells
108
Wireless Sensors
**Operate in the 300 MHz or 900 MHz bands**
109
Issues with wireless sensors include
## Footnote **- Collisions: multiple messages received at the same time causing none to be read** **- Fading: degradation of the signal due to distance** **- Interference: other signals overpowering the sensor's signals**
110
Line supervision techniques
- Reverse polarity - Sound monitoring - Radio class C - Steady direct current class B - Tone - Digital classes A & AB
111
Exterior application sensors are divided into 3 categories
Buried Line Fence-associated Free Standing
112
Exterior perimeter intrusion sensors
- Typically used by government, nuclear, & correctional facilities - Ported coaxial cables - Fence disturbance sensors - Sensor fences - Electric field or capacitance - Bistatic microwave sensors - Exterior video motion detectors (VMDs)
113
Ported Coaxial Cables
**- "Leaky Coax"** **- Active, covert, terrain-following** **- Buried underground** **- Respond to objects with high dielectric constant or high conductivity (humans, vehicles, etc)** **-** **Outer** **jacket of** **cable** **is "ported" to allow the signal to leak out** **-** **Range** **is 1.5 to 3 ft above the surface & about 3 - 6 ft wider than the cable separation** **- Nuisance alarms sources include metals, water, utility lines, large quantities of salt or metals in soil**
114
Fence Disturbance Sensors
- Passive visible terrain-following - Attached to fence - Detect motion or shock - One of several technologies: fiber-optic, strain-sensing vibration-sensing - Nuisance alarm sources are common, including wind rain/hail, nearby vibrations - Can be defeated by crossing over the fence w/o touching it or tunneling under - **Fence posts should flex/move no more than .5" against a 50 lb.** **force** **at 5 ft height** **-** Fence fabric should flex/move no more than 2.5" against a 30 lb. force centered between posts
115
Sensor Fences
- Passive, visible, terrain-following - Sensor cables form the fence itself - Horizontal-stretched high tension wires at 4" or less apart - Includes taut-wire fences - Designed to detect climbing, separation of wires or cutting - Less susceptible to nuisance alarms - requires about 25 lbs. of force to activate the alarm - Can be defeated by crossing over the fence w/o touching it, or tunneling under the fence
116
Electric field or capacitance sensors
- Active, visible, terrain-following - Detects change in "capacitive-coupling" in wires isolated from the fence itself - Range can extend to 3.3 ft (more nuisance alarms) - Susceptible to lightning, rain, small animals, motion of the fence itself - Requires good electrical grounding - Less susceptible to crossing over or tunneling under fence
117
Free-Standing Infrared Sensors
- Active, visible, line-of-sight, free standing - .9 micron wavelengths - invisible to the human eye - Beam is transmitted through a "collimating" lens & received by a "collecting" lens - Multiple beams required for higher security applications (typically a 2" x 6" detection range) - Nuisance alarm sources include snow, fog, dust, vegetation, etc...
118
Bistatic Microwave Sensors
- active, visible, line-of-sight, freestanding - 10 GHz or 24 GHz spectrum - "Vector Sum": Direct & reflected microwave energy received by the receiver - Susceptible to crawling or rolling under beam if the ground is not very flat or distance between antennae is more than 120 yds. Offset Distance: zone of no detection about 10 yds. out from the transmitting antenna - requires overlapping zones of 20 yds
119
Bistatic Microwave Sensors (Ctd..)
- Sensor bed surface is composed of 4" of 1.5" or smaller gravel to eliminate nuisance alarms from standing water - The largest detection zone is midway between sensors - approximately 4 yds wide x 3 yds high - Nuisance alarm sources include vegetation higher than 1-2", loose chain link fabric, heavy snow
120
Exterior, perimeter intrusion sensors Perimeter detection systems should use **_protection-in-dept philosophies,**_ relying on _**two or more simultaneous lines of detection_,** especially in high-security facilities
121
Exterior, perimeter intrusion sensors Complimentary sensors may also be considered to increase the effectiveness of a sensor deployment
- each sensor brings its own strengths & weaknesses to the overall security plan - complementary sensors do not have the same nuisance sources & probability of detection under each possible scenario - Sensors should be prioritized for assessment purposes - higher PD sensors have first priority - Configuration of multiple sensors should be arranged to provide overlapping coverage AND separate lines of coverage
122
Exterior, perimeter intrusion sensors Sensor combinations operate in two ways
1. OR basis: Either sensors trigger the alarm high PD, higher NAR 2. AND basis: Both sensors are required to trigger the alarm, lower PD, lower NAR
123
Perimeter-in-depth philosophies Clear zones bounded by fences on both sides are preferable for perimeter detection systems
No sensors should be mounted on the outside fence
124
Exterior, perimeter intrusion sensors Physical & environmental conditions affecting perimeter detection system
**Topography** (gullies, slopes, water, etc) **Vegetation** (motion from wind, sources of concealment/cover) **Wildlife** (large animal interference with sensors, small animal burrowing & chewing **Background noise** (wind, traffic, EMI, seismic activity) **Climate & weather** **Soil & pavement** (soil conductivity, seismic conductivity)
125
Exterior, perimeter intrusion sensors Barriers designed to delay intrusion should be placed **along the inner fenceline of a dual-fence line clear zone, to prevent tampering with the barriers without first traversing the detection zone**
126
Exterior, perimeter intrusion sensors **A clear zone "compromise" width between 10 & 15 yds.** facilities reduction of nuisance alarms (wide) & high resolution for alarm assessment by cameras (narrow)
127
Interior intrusion sensors Interior application sensors are divided into 3 categories
Boundary - penetration Interior - motion Proximity - sensors
128
Interior intrusion sensors Two important physical conditions that affect sensor performance
**Building or room construction** **Equipment & objects that occupy the space**
129
Interior intrusion sensors Electromechanical Sensors
- Passive, visible, line/point sensors - Magnetic reed switches (doors, windows, etc..) - Balanced magnetic switches (BMSs) or bias magnets higher sensitivity than reed switches, less susceptible to spoofing - Hall effect switch detects field of magnet-no moving parts - measures charge separation & polarity - most advanced switch - Continuity/break wire - wires embedded or attached to surface, activated by cutting (security screens) low NAR (may use optic fibers instead)
130
Interior intrusion sensors Vibration Sensors
- Passive visible or covert - Jiggle switches - Inertial switches: a metal ball mounted on metal contacts - detects vibration frequencies between 2-5 KHz - Piezoelectric sensors: sensing element that flexes at frequencies between 5-50 KHz - Fiber-optic cables detect micro-bending caused by vibration
131
Glass-break Sensors
- Glass-mounted, passive (vibration activated); detect \> = 20 KHz vibrations - Glass-mounted, active; generate vibrations received by another device elsewhere on the glass (lower NAR) - Ceiling-mounted, passive; listen for the frequency of breaking glass; volumetric by design; not vibration activated
132
Interior Motion Sensors
- Monostatic microwave (common) - Passive infrared (PIR) (Common) - Dual Technology - Video motion detection (VMD)
133
Interior intrusion sensors Passive Infrared (PIR)
- Passive to human heat approximately equal to heat from the 50-watt incandescent light bulb - Responds to infrared energy in the walkthrough band between 8 & 14mm - Minimum Resolvable Temperature: Difference in heat between target & background (can be as low as 1-degree Celsius)
134
Interior intrusion sensors Microwave
- Active, visible, volumetric - 10 GHz frequency range: senses doppler shift of the returned frequency - Best positioned to sense aggressors moving towards or away from a sensor; slow-moving targets may spoof microwave sensors - Microwave horn, printed circuit planar, or phased array antenna - Various detection patterns available; concave portion of detection zone is vulnerable
135
Microwave
- Penetrates most glass & normal wall materials (not metal) - Immune to high air turbulence & temperature /changes; susceptible to "pattern drift" - Often used in automatic door openers; multiple microwave sensors in the same area must be on different frequencies - Ionized gas in fluorescent lighting can reflect microwaves & cause nuisance alarms
136
Proximity Sensors
- Pressure Mats - Capacitance Sensors
137
Pressure Mats
- Largely obsolete - replaced by motion detectors - Detected weight 5-20 lbs per sq. ft - Still used in security portals (man traps) to prevent tailgating - based on valid user's weight in database
138
Capacitance Sensors
- Large, electrical condenser that radiates energy - Detects changes in capacitive coupling between antenna & the ground - Target touches protected object & absorbs some of the radiated energy generating on alarm
139
CPTED Should be divided into smaller, more clearly defined areas or zones
Defensible space, per Oscar Newman
140
Video surveillance systems When selecting a video surveillance
Uses a _systems approach_ rather than a _components approach_
141
Video surveillance systems The following parameters determine the effectiveness of a video assessment subsystem
- Minimum time between sensor alarm & video display - Complete video coverage of the sensor detection zone (called the assessment zone when sensors & video are integrated) - Ability to classify a 1 ft. target at the far edge of the assessment zone - Vertical field of view at the far edge of exterior detection zone = height of a standard fence & person climbing it
142
Parameters Ctd...
- Continuous operation, 24/7 - Minimal sensitivity to environmental conditions, for all cameras - Minimal obscuration of the assessment zone (such as trees, fences, furniture, etc) - Camera FOV & recording system integration displays the alarm source to an operator
143
Video Surveillance 3 reasons for cameras in security applications
- Obtain visual information about something that is happening (most important) - Obtain visual information about something that has happened (most important) - Deter undesirable activities
144
Video Surveillance Primary uses of video surveillance systems
Detection of Activities Recording of Incidents Assessment of Alarms/Incidents
145
Video Surveillance Main elements of video surveillance systems
Field of View (FOV) Scene Lens Camera (including mounting hardware) Transmission Medium Monitor Recording Equipment (analog/digital) Control Equipment
146
Video Surveillance Three main components of an analog video surveillance system
Camera Transmission Cable Monitor
147
Video Surveillance 3 main components of a digital video surveillance system
Camera Digital electronic signal center PC with software
148
Video Surveillance In designing a video surveillance application security managers should keep in mind
- Video surveillance is a visual tool of security & should be applied accordingly - Video surveillance systems should always be designed with future growth or changes to the needs of the application in mind
149
Designing Video Surveillance Ctd... No matter what, the equipment of the system will become obsolete
- Obsolete does not necessarily mean ineffective or out of date for the application - If a system is obsolete but performing well, its because the original application was correctly designed to meet performance needs
150
Key points for designing VS systems
- Once simplified the most complex electronic system can be managed by almost anyone - The application drives the choice of equipment not the other way around
151
Video Surveillance Simple Rules For Design
Keep system in perspective Design generically Design for best options first (budget after) Don't feel driven to build the system all at once
152
Video Surveillance Steps for design
- Define the system's purpose - Define each camera's purpose - Define the area to be viewed by each camera - Choose a camera style - Choose the proper lens - Determine best transmission method - Layout control area
153
Video Surveillance Resolution is determined by the following in order
1. Camera 2. The transmission method 3. The weakest link in the video system interface 4. The reproduction capability of the storage system
154
Limiting Factors
- **Analog video recorders average a playback of 225 horizontal lines (very low)** **- DVR's digitize analog signals, dropping 25% of the resolution** **- Sloppy installation or cheap coaxial cable costs 10 - 15% resolution** - Digital compression also reduces the resolution
155
Video Surveillance All IP cameras measure resolution as a multiple of the Common Intermediate Format (CiF) about half the average 325 horizontal lines; not recommended as a usable standard for storage
- 1/4 CIF = 176 x 120 (3,520 pixels or .003 MPX) - CIF = 352 x 240 (84,480 pixels or .08 MPX) - 4 CIF = 704 x 480 (337,920 pixels or 0.3 MPX) - 16 CIF = 1408 x 960 (1,351,680 pixels or 1.3 MPX) - 32 CIF = 2816 x 1920 (5,405,720 pixels or 5.4 MPX) - A 4 mp camera = resolution of 400 ASA film - A 6mp camera = resolution of 100 ASA film - most effective & current standard for digital video compression is the H.264 compression algorithm
156
3 Considerations when determining video surveillance field & view (FOV)
Target (person, vehicles, etc...) Activity (assault, slight of hand) Purpose (identification vs. general monitoring)
157
Video surveillance systems are designed to be only two things
**Visual assessment (what's happening now)** **Visual documentation (What happened previously)**
158
3 Theoretical identification views of an analog VSS
**1. Subject identification** **2. Action identification** **3. Scene identification**
159
VS - Fields of view (FOV) Theoretical identification views of a digital VSS
**_General:_** Can't distinguish clothing & color - pixelated zoom (5 pix/ft) **_Monitor:_** General vehicle/human traffic flows - no serious detail on zoom (7 pix/ft) **_Detect:_** Detect but not identify person-sized object - no significant detail on zoom (4 pix/ft) **_Observe:_** Clothing/colors gain distinction - no good detail on zoom (18 pix/ft) **_Recognize:_** High degree of accuracy identifying & separating known individuals - good detail on zoom (35 pix/ft)
160
ID views of a digital VSS
**_Subject ID_**: Establish identity beyond a shadow of a doubt - the excellent detail on zoom (48 pix) **_License Plat ID_**: ID of license plates - excellent detail on zoom (70 pix) **_Facial Recog_**: Extreme details - excellent detail on zoom (88 pix)
161
VS - FOV Identification of an object in video means...
The ability to differentiate between people's identity
162
VS - FOV Classification of an object in video means...
The ability to differentiate between humans animals etc...
163
VS - FOV Cameras should not be required to view more than one major and one more minor objective
164
VS - FOV Cameras should not auto-pan more than how many degrees left or right of the major focus
45 Degrees
165
VS - Cameras Major Types of Cameras
Analog Digital / IP Infrared Thermal
166
VS - Cameras 4 Main Types of Cameras
1. Standard analog CCD cameras 2. IP address 3. Infrared cameras 4. Thermal cameras
167
VS - Cameras 3 basic styles of IP Cameras
1. Standard 2. Megapixel 3. Smart (edge analytics etc.)
168
VS - Cameras Infrared cameras require...?
IR Source
169
VS - Cameras Which cameras do not require an IR source?
Thermal Cameras
170
VS - Cameras Camera selection criteria, in order of importance
1. Sensitivity (light) 2. Resolution (image quality) 3. Features (WDR, IR, analytics, etc)
171
VS - Cameras Placement of cameras is dictated by
Angle of View Pixels Per Foot
172
VS - Cameras 3 Basic sensitivities of cameras
Full - Light Lower - Light Low - Light
173
VS - Cam Lenses The camera is selected before the lens
The lens is selected based on its ability to provide the desired identification information
174
VS - Cameras The lens is one of the few elements of a video system not converting to digital
Various functions of the lens can be automated (auto-iris, zoom/varifocal, focus)
175
VS - Cameras 5 Main types of lenses
1. Wide angle **(best for 0 to 15' ranges)** 2. Standard **(best for 15 to 50' range)** equivalent to the view from the human eye) 3. Telephoto **(best for \> 50' range)** 4. Varifocal 5. Zoom
176
VS - Camera lens 2 Differences between zoom & varifocal lenses
- The range of focal length is small in the varifocal - Varifocal lenses do not have a tracking mechanism to align focal length with focus
177
VS - Video storage / recording When storing & using security video, it is important to decide whether the system's purpose is to...
Verify information Prove information Aid a prosecution with the information
178
VS - Surveillance / Recording Types of Recorders
**DVR:** Analog inputs only, converted to digital in the box, stored on hard drive or external media **NVR**: Analog or digital inputs, analog converted to digital, stored on hard drive or external media **Server / Cloud:** Digital inputs stored on network storage devices
179
Locking Systems - Locks - Most widely used methods of controlling physical access - Among the oldest of security devices - Should not be relied upon as the only means of physical protection for important assets - Should always be used with complimentary protection measures
180
Locks 2 Classes of Locks
Mechanical Electro-Mechanical
181
Locks 2 Major components of most mechanical locks
- A coded mechanism (key, cylinder, wheel pack, etc...) - The fastening device (bolt, latch, etc...)
182
Locks 4 Component / Assembles of Locks
1. Bolt or latch 2. Keeper or strike 3. Tumbler array 4. Key
183
Locks Vulnerabilities of mechanical locks
**Attack by force (spreading, forcing, twisting, etc...)** **Surreptitious attack (picking, raking, bumping, etc...)** **Impressioning & try keys**
184
Locks **- Warded** (1st type, very weak security, skeleton keys, old houses, antiques) **- Lever** (18th century, more security than warded locks, master keyable, safe deposit boxes) **- Pin tumbler** (19th century, Linus Yale, most widely used, can be high security, residential/office locks, master-keyable **- Wafer tumbler** (sometimes double-bitted boys, mostly furniture locks, lower security than pin tumblers, master-keyable - Dial Combination (safes, mechanical or electronic
185
Locking Systems Without ? security will usually degrade to more privacy
Lock Planning
186
Locking System Considerations
- Total number of locks - Major categories of sectors of the system - Security objectives - Size & turnover of populations - Related or supportive security subsystems - Intelligence or information requirements - Criticality of asset exposure
187
Locks Proper lock planning requires...?
Combination of the "totality" of the area (strengths of doors & walls, drop ceilings, etc..)
188
Locks Locking policy should do the following
- Require a systematic approach be taken to the use of locks for security purposes - Assign specific responsibility for the development of the lock program - Make all persons responsible for compliance with the program requirement
189
Locks Lock Change Methods
- Re-arrange or rotate the locks among doors - Re-key the locks (most effective
190
Locks Master Keying 3 Major security difficulties
1. Effective master key accountability 2. Manipulations are easier 3. Additional maintenance
191
Lighting 3 Primary functions of security lighting
1. Deter criminal activity 2. Life safety functions 3. Support of video surveillance
192
Lighting Typical Lighting Costs
Capitol (upfront costs) approx. 8% Energy (approx. 88% Maintenance (4%)
193
Lighting Major components of a lighting system
Lamp (bulb) Luminaire Hardware Electrical Power
194
Lighting Terms Quantity of light emitted by a lamp
Lumen A typical 100-watt incandescent bulb outputs about 17000 lumens
195
Lighting Terms The concentration of light over a particular area
Illuminance - Floodlight generating 1k lumens illuminates 50' away - Spotlight generating 1k lumens illuminates a small area 50 ft away - Both lights output the same lumens - Each light generates a different level of illuminance from the same distance
196
Lighting Terms The US measures of illuminance (lumens per sq. ft)
Foot Candles
197
Lighting Terms Metric measure of illuminance (lumens per sq. meter) 1 FC = 10.76 lux (approximately 10:1 ratio)
198
Lighting Terms Illuminance level of the scene
Scene Illuminance
199
Lighting Terms Illuminance of the camera lens
Faceplate Illuminance
200
Lighting Terms Lumens/watts (output divided by consumption)
Efficacy
201
Lighting Terms Initial, cold start time of the light fixture
Strike Time
202
Lighting Terms Re-Start time at a warm
Re-Strike Time
203
Lighting Terms The percentage of light reflected from a scene which depends on the incident light angle, and the texture & composition of the reflecting surface
Reflectance
204
Lights - Color Color rendition index (CRI)
- The scale of 0 to 100 - 70 to 80 CRI is good; above 80 is excellent 100 is daylight
205
Light Coverage The measurement of variation in lighting levels
Uniformity - Working environments are 1: 0.7 - A pedestrian walkway is 4:1 - A roadway is 10:1 - Higher uniformity levels provide better depth perception & greater perception of security
206
Light Uniformity & Coverage What ration is preferred for a parking structure?
4:1 Uniformity Ratio
207
Landscaping environments can be expensive to light due to the numerous area of potential concealment
Lighting should be focused from the ground up into trees & shrubs to deter concealment
208
Lighting ratios in parking lots should not exceed...?
4:1
209
Lighting A bright white, horizontal strip along the interior walls of parking structures provides higher contrasts & facilitates object identification
210
Lighting Along with building facades where individual exterior objects cannot be adequately lit, providing a high contrast will give good identification of shape & movement - flood lights work well for this purpose
211
Lighting What should the height of light poles in parking areas be to reduce shadows & dark spots?
12 - 14 Feet
212
Lighting What kind of lighting is preferred outdoors because? - Broader, more natural light distribution - Requires fewer poles - Is more aesthetically pleasing
High Mast Lighting
213
Lighting implications to video surveillance The successful deployment of even the simplest VSS requires an understanding of...
- Relative levels of the scene illumination produced by natural sources - The amount of light reflected from typical scenes - The resultant faceplate illumination levels required by the variety of image tube & solid-state imagers
214
Light Lighting considerations for video surveillance
- CRI - Reflectance of materials - Directionality of reflected light
215
The two most important parameters of a lighting system for video surveillance are its...?
- Minimum intensity - Evenness of illumination
216
Light Cameras are light-averaging devices - All lighting in the camera's FOV must be...
Even, not just the target areas
217
Lighting The sensitivity of a CCTV camera can be defined as the minimum amount of illumination required to produce a specified output signal The following factors are involved in producing a video signal
- Illuminance level of the scene - Spectral distribution of the illumination source - Object reflectance - Total scene reflectance - Camera lens aperture - Camera lens transmittance - Spectral response of the camera imager - Video amplifier gain, bandwidth, & signal-to-noise ration - Electronic processing circuity
218
Lighting Minimal output video signal is usually?
1 Volt peak-to-peak (VPP)
219
Lighting Camera sensitivity may sometimes be overstated based on these two, commonly used factors
- Higher scene reflectance than normally encountered - Greater transmittance than is commonly available in standard auto-iris lenses with neutral density spot filters
220
Lighting A minimum of 1.5 fc is required for a camera system using on f / 1.8 or faster lens & a solid-state imager
- This assumes reflectivity of 25% - This also assumes a light; dark ratio of no more than 4:1 - 4:1 ratio is allowed to creep to 6:1 as materials age
221
Protective Lighting Protective Lighting Types
1. Standby 2. Continuous 3. Moveable 4. Emergency 5. Glare projection 6. Controlled
222
Lighting General security lighting equipment
Streetlight Searchlight Floodlight High Mast Lighting
223
Lighting The number of luminaires required to cover an area is a function of...
- The area to be covered - Light levels required - The height of the luminaires & their design - Type of lighting used
224
Lighting Rule of thumb for outside lighting
You should be able to read a driver's license or newspaper with some eyestrain
225
Lighting The general rule for lighting levels with regard to Identification of subjects
- Detection (someone is there) - 0.5 fc - Recognition (recognizing the person) - 1.0 fc - Identification (evidentory) - 2.0 fc
226
Perimeter fence = 0.50 FC Outer perimeter = 0.50 - 2.00 FC Open area = 2.00 FC Open parking lot = 0.20 - 0.90 fc Covered parking lot = 5.00 fc Pedestrian walkway = 0.20 fc Pedestrian entrance = 5.00 fc Vehicle entrance = 10.00 fc
Building facade = 0.50 - 2.00 fc Gatehouse = 30.00 fc Loading dock exterior = 0.20 - 5.00 fc Loading bay = 15.00 fc Office general = 30.00 - 50.00 fc Office task = 50.00 - 30.00 fc Interior public area = 10.00 - 20.00 fc Retail store = 50.00 fc Bank - lobby = 20.00 fc Bank - teller = 50.00 fc Bank - ATM = 15.00 fc
227
Lighting Typical Reflectance Levels
- Asphalt = 5% - Concrete (old) = 40% - Concrete (new) = 25% - Red bricks = 25% - Grass = 40% - Snow = 95%
228
Lighting Lighting levels may cause a _light trespass_ onto adjoining properties, including _sidewalks_ & _roadways_
229
Lighting Light trespass must not cause glare or excessive contrast to drivers & pedestrians, both on and off the organization's property
230
Lighting A dirty environment may result in a reduction of up to 20% per year in light output due to dirty lighting
231
Lighting Lighting output in an office or other clean environment declines by 3 - 4% each year due to dirt accumulation on lighting fixtures & bulbs
232
Barrier Purposes
- Physically & psychologically deters the undetermined - Delays the determined - Channels authorized traffic - Discourages unauthorized traffic that takes place by **Accident Force Stealth** - Explicitly defines territorial boundaries - May be used to preventing views of the facility - May be used to preventing placement of listening devices
233
Barrier Notes
- Should be supported by interior clear zone whose width depends on the threat - Should be supplemented by sensors and/or other security measures - Should not provide concealment opportunities - Should not obstruct lighting, video surveillance, or intrusion detection - Should not facilitate observation of the facility
234
A dirty environment may result in a reduction of up to _20% per year_ in light output due to dirty lighting
235
Recommended Light Cleaning Cycle
Every 3 Years
236
Barrier Types
Natural Structural
237
If a barrier's effectiveness is uncertain it should be considered a potential obstacle
238
**_Selection & placement of barriers_** depend on the adversary's objective
239
Balanced Design What provides equal delay - No weak links?
Layered Barriers
240
Balanced Design Barrier penetration begins how many feet in front of the barrier & ends how many feet beyond it
2 FT & 2 FT
241
Barriers Fences & Walls
- Are the most common perimeter barriers - Define areas & give notice of a protected property line - Demonstrate commitment to security & may stop a casual trespasser - Channel traffic & reduce the required number of security personnel - Provide intrusion detection and/or video surveillance zone - Force intruders to demonstrate intent - Must be maintained
242
Barriers - Walls Walls are generally more resistant to penetration than the doors, windows, vents, & other openings
- Most can be breached with the right tools - Using explosives & cutting tools and adversary can make a "crawl hole" through 18" reinforced concrete in under 5 min. - Increasing wall thickness usually adds only a moderate delay against explosives, even though the amount of explosive needed increases substantially with a wall thickness - Ordinary reinforced concrete walls can be penetrated quickly because they are generally designed to support structural loads, not to thwart or delay penetration
243
Walls ctd...
- Placing two or more reinforced concrete walls in series results in longer penetration delays than using one wall that is thick as the two walls combined - Removing the rebar often takes longer than removing the concrete; delay can be increased by using additional rebar; increasing rebar size, or decreasing rebar spacing
244
Walls ctd...
- Use earth cover or other overburden to delay access to the wall itself - Hardening a normally constructed building against forcing penetration for a significant period is rarely practical or cost-effective
245
Fences Wire toppers on fences do not prevent intrusion but rolls of barbed tape on or near them can increase delay...
246
Fences One of the most cost-effective additions to a fence?
Attach a roll of barbed tape to the outriggers
247
Fences Where are barbed-tape rolls normally placed
Inside an outer-perimeter fence & outside on inner (double) fence
248
Fences Which direction should outriggers point in order to eliminate the hand grip used by intruders when climbing over the fence
**Towards the inside**
249
Fences Inner-fence-lines (double fence areas such as prisons) are spaced how far from the outer fence-line?
10 - 20 Ft
250
Electrified Fencing What is the design of most industrial electrified fences?
**8 ft. tall with 20 wires** fitted to the inside of the chain link perimeter fence
251
Fences Electrified fences pulses electrical energy 45 times per minute
252
Fences 2 Types of Electrified Fences
1. All live wire "deterrent" fence (less common) 2. "Monitored" fence (more common)
253
Fences 4 Basic Types of Expanded Metal
Standard / Regular Grating Flattened Architectural or Decorative
254
Barriers - Gates
- Establish points of entry & exit to an area defined by fences & walls - Limit or prohibit the flow of pedestrian or vehicular traffic - Establish a controlled traffic pattern - Should provide equal levels of delay as perimeter
255
Barriers - Doors While walls may be hardened, doors tend to be a weak link in a structure because of their functional requirements & associated hardware
256
Barriers - Doors If the door assembly cannot be sufficiently enhanced it may not be cost-effective to upgrade the building structure
257
Barriers - Doors Most common exterior doors are **1.75" thick with 16 or 18 gauge steel surface sheets,** usually, hollow or filled with composite material
258
Barriers - Doors How long does it take to defeat exposed hinges & remove the door from the frame
1 Minute
259
How can a door vulnerability be mitigated?
By welding the hinge pin heads to the hinge knuckles, using the hidden "stud-in-hole" method, or affixing a z-strip to the rear face of the door
260
Barriers - Doors Door Classifications
- Standard industrial doors - Personal doors - Attack- and bullet - resistant doors - Vehicle access doors - Vault doors - Blast-resistant doors - Turnstile gates
261
Barriers - Doors Unnecessary external doors should be eliminated as well as unnecessary, external (exposed) door hardware
262
Barriers - Doors How can doors be reinforced?
Steel plates on their surfaces, heavy duty hinges, and filling frames with concrete
263
Barriers - Doors What increases the delay time for thermal cutting tools by 3x or 4x?
Installing wood cares in metal doors especially using redwood
264
What only requires 1/2" to 3/4" of space to defeat the lock?
Prying or spreading the jamb from the door How can it be mitigated? Welded 2" wide metal strips, concrete - filled frames and high security deadbolts
265
Barriers - Windows How can windows be hardened?
Additional or heavier fasteners in the frames, or by welding the frames
266
Barriers - Windows Transparent plastic glazing
- Some types are combustible & their use may be restricted by fire codes - Acrylic plastic like Lucite & Plexiglass, if less than one inch thick, can be broken with hand tools in less than 10 seconds - Polycarbonates resist impact about as well as bullet-resistant glass - Lexan in 1/2" thickness resists hand-tool penetration for up to 2 minutes - Thermal tool attacks require about one minute but cause combustion & the release of toxic gases
267
Barriers - Windows Glass/polycarbonate composite glazing contains a tough core of what?
Polycarbonate between 2 layers of glass
268
Windows Glass/polycarbonate composite glazing is developed for use in prisons
269
Windows The thickest panels of glass/polycarbonate lasted 10 minutes against miscellaneous steel tools
270
Barriers - Windows Used often in fire doors & fire windows?
Wire Glass
271
Windows ctd... Wire Glass is made up of...?
1/4" material fabricated with diamond, square, or hexagonal wire patterns
272
How fast can wire glass be penetrated with hand tools?
20 Seconds
273
Laminated Glass
- Made of two or more panes of annealed float sheet, or plate glass - Bonded to a layer or layers of plastic
274
Windows Safety glass that is 1/4" thick can be penetrated in...?
30 Seconds
275
Security glass that is 9/16" thick requires 15 minutes of work w/ hand tools to produce a crawl-through hole
276
Barriers - Utility Portals Openings other than doors & windows, through which maintenance & other functions might be performed
Utility Ports
277
Barriers - Roofs Can be enhanced in several ways (new & existing)
- Enhancing membranes w/ embedded screen - Added several inches of rigid insulation - Using concrete reinforced with deformed steel bars & expanded steel mesh - Forming larger rebar into several rows or layers for reinforced concrete - Increasing the number of fasteners & adding structural members to corrugated roofs - Using mechanical fasteners or joints & a continuous weld & heavier gauge material on metal roof systems - Using larger rebar to strengthen the flange area of precast concrete tee beams
278
Barriers - Roofs Contemporary roof types' include the following
- Prestressed concrete tee beam - Metal subdeck & reinforced concrete - Metal roof deck with lightweight concrete - Metal roof deck with insulation - Metal Roof - Reinforced concrete beam & slab - Wood sheathing with membrane
279
Barriers - Roofs Which roof improvements provide the best value
- Penetration tests suggest that barriers placed below the roof may be more effective against penetration than those in the roof itself - The optimal distance between the roof & the secondary barrier is 10" to 12" - Earth coverings of both roofs & walls are effective delay barriers
280
Vehicle Barriers Types of barrier methodologies
- Vehicle arrestor (slows vehicle to a stop) - Crash cushion (cushions the impact that stops a vehicle) (moderate distance) - Inertia device (rigid, heavy moveable objects) - Rigid device (fixed devices) { a very short distance - almost immediate }
281
Vehicle Barriers A moving vehicle possesses _kinetic energy_, which must be _dissipated by the vehicular barrier_
282
Vehicle Barriers Optimum vehicular barrier height?
Almost 30" but can vary depending on threat vehicles
283
Vehicle Barriers Since cable barriers are easy to defeat with hand-held tools, they should be used only **_in areas well patrolled or monitored with sensors or cameras_**
284
Vehicle Barriers DOD "K - ratings" for barriers / barricades
- K4 stops a 15,000 lb. vehicle at 30 mph - K8 stops a 15,000 lb. vehicle at 40 mph K12 stops a 15,000 lb. vehicle at 50 mph
285
Vehicle Barriers Vehicle barriers outside the detection & assessment zone **are not recommended**
286
Vehicle Barriers Private vehicles should be kept in secured areas as much as possible
287
Barriers - Dispensible Barriers Typically includes the following elements
- Process for deciding when to activate the barrier - Command & control hardware - Material deployed to delay access or incapacitate an aggressor - Dispensing mechanism - Security officers on-site
288
Dispensible Barriers Barriers isolate the aggressor....?
Visually Acoustically At Location (or any combination of these)
289
Dispensible Barriers Passive dispensable barriers have **no command and control component making them less expensive** (but riskier)
290
Dispensible Barriers Systems last **10 to 25 years**, and active systems require **routine maintenance**
291
Safes & Vaults Safes weighing **less than 750 lbs** are considered **portable & UL standards require they be anchored in place**
292
Safes & Vaults Burglary resistant safes do not generally protect against fire
293
Safes & Vaults Burglary / Fire Resistant Containers
Some containers can achieve UL rating for burglary & fire resistance
294
Fire - Resistant Safes UL Classifications
350-4 (formerly A) 350-2 (formerly B) 350-1 (formerly C)
295
Fire Resistant Safes Classification / Testing process also includes
A drop-test & harsher temperature test than filling devices
296
Insulated filing devices UL Class
350 - 1 (formerly D) 350 - 2 (formerly E)
297
Fire Resistant Safes Classification / Testing process does not include a drop test
298
Different types of safes designed for records protection
- Fire-resistant safes & record containers - Insulated filing devices - Containers to protect magnetic media
299
- Electronic media containers are designed to protect contents to 125 or 150 degrees & 80% humidity for 1, 2, 3 & 4 periods (125-1, 150-1, 125-2, 150-2 etc) - Different types of safes designed for records 1. fire-resistant safes & record containers 2. Insulated firing devices 3. Containers to protect magnetic media
300
Safes - The minimum thickness of a 4-hour vault wall is 12" for brick & 8" for reinforced concrete - The minimum thickness for a 6-hour vault wall is 12" for brick and 10" for reinforced concrete
301
Fire Resistant Vaults Construction Standards
- Reinforced concrete with steel rods at least 1/2" diameter, spaced 6" on center & running at right angles in both directions - Rods are wired securely at intersections not over 12" apart in both directions & installed centrally in the wall or panel - A brick protection used is filled solidly with the steel with concrete
302
Burglary Resistant Vaults
- Avoid exterior wall location - All 6 surfaces of a vault should give equal protection - Unreinforced concrete should never be penetrated (vaults are designed to resist penetration for a defined period) - #4 (1/2") rebar & smaller diameters can be cut w/ hand tools
303
Contraband Methods of Contraband Detection
Manual search Metal detectors Package searches (x-ray, etc) Explosives detection (bulk and trace) Chemical and biological agent detection
304
Contraband Advantages to a manual search
Low hardware investment, flexibility
305
Contraband Disadvantages to manual search
Slow throughput, higher labor costs
306
Metal Detectors
Magnetometer Continuous wave Pulsed field Handheld
307
Contraband Materials with low atomic numbers ("Z-numbers") materials starting with hydrogen and ending with Z-number 26, Aluminum
Low-Z Materials
308
Contraband Bulk Explosives Detection
- Macroscopic, detonable amounts of explosives - Targets specific threat amounts of explosives - Usually uses ionizing radiation that is not safe for use on people - Measures X-ray absorption coefficient, X-ray backscatter coefficient, dielectric constant, gamma or neutron interaction, or microwave or infrared emissions - Can determine calculated mass, density, nitrogen, carbon, oxygen content, and effective atomic Z number
309
Bulk Explosives Detectin (ctd...)
- Multiple-energy X-rays and backscatter X-rays more readily identify low Z-number materials - Hi-energy X-rays are large, fixed mechanisms designed to scan large cargo containers
310
What may be combined with backscatter X-ray technology for detection of low Z-number materials?
High-energy X-rays
311
What devices can use gama rays or neutrons for detection (very high penetrating)?
- Thermal neutron activation (TNA) - Pulsed fast neutron absorption (PFNA)
312
Detects the presence of nitrogen through gamma wavelengths
Thermal Neutron Activation (TNA)
313
What determines carbon and oxygen content?
Pulsed Fast Neutron Absorption (PFNA)
314
**Determination of nitrogen,** carbon and oxygen content lends more accuracy to separating explosives from foot items
315
Food items/cargo cannot be irradiated at energy levels of more than 10 milli-electron volts (MeV) **(international law)**
316
Bulk Explosives Detection What is safe for humans, producing 10 microrem per dose?
Low-dose backscatter X-ray technology
317
Bulk Explosives Detection (ctd...) CT scans spin sensors on a gantry around the package and produce a 3D image that detects small threat masses; may be subject to high NAR's
318
Quadruple resonance (QR) technology uses...
pulsed low-energy radio waves to detect nitrogen-rich materials
319
What uses laser interrogation and analysis of the spectrum of scattered light to identify threat materials? - Cannot see through opaque packaging - designed for clear package searches
Raman Analysis
320
This detection is still under research and development - experiements with distance detection of explosives with infrared cameras, passive and active millimeter-wave imaging systems, and lasers sensing fluorescence or atomic emissions
Stand-off Detection
321
Trace Explosive Detection
Particles and vapor residues associated with handling explosives -
322
Trace Explosives Detection Key Performance Metrics
- Limit of detection (smallest detectable amount) (may be as low as \< 1 nanogram) - Selectivity (ability to distinguish one material from another)
323
Trace Explosives Detection Sampling Methods
- Swipe (most efficient) - Vapor (puffing) (less invasive)
324
Trace Explosives Detection Challenges
- Low vapor phase concentrations of several common high explosives (parts per billion and parts per trillion) - Packaging of explosives with oil-based gel or solvent - Absorption of explosive molecules upon most materials at room temperature and decomposition upon moderate heating or exposure to high energy, and thus loss of significant sample material in collectin and transport
325
Trace Explosives Detection (ctd...) Techologies
Low mobility spectrometry (IMS) Colorimetry Chemiluminescence Mass Spectrometry Fluorescence Canine Olfaction Trase Explosives Detection Portals
326
Contraband Detectin Methods
Chemical agent detection Biological agent detection
327
Contraband Detection Chemical Agent Detection
Uses point sensors at perimeters Goal is early warning NAR is a serious consideration (due to high response level) May not be appropriate for checkpoint screening May use optical sensing methods
328
Contraband Detection Biological Agent Detection
Different from chemical detection in two ways: 1. Most biological agents are not immediately lethal, impacting necessary response times 2. Usually requires several hours for collection and analysis of air samples
329
Physical Protection Systems (PPS) Deployment Methodology The primary objectives of a PPS are...
Detection Delay Response
330
PPS Deployment Methodology Biggest causes of vulnerabilities in a PPS...
Improper component selection Improper installation and maintenance Improper operation Improper integration
331
PPS Deployment Methodology A collection of products, processes or both combined to provide a solution to a problem or goal
System
332
PPS Deployment Methodology Systems, not components, are optimized to yield **the most effective design to the problem**
333
PPS Deployment Methodology A logical method for problem solving in which a comprehensive solution is developed in relation to a problem having several dimensions
ASIS definitionof "systems approach to problem solving"
334
PPS Deployment Methodology In the security context, a system is a combination of...
equipment, personnel, and procedures, coordinated and designed to ensure optimum achievement of the system's stated objectives
335
PPS Integration The combination of a variety of components sucha as people, technology and procedures
Integration
336
PPS Integration Who should engineer the PPS by using the building blocks of people procedures, and technology?
Security Manager
337
PPS Integration In general, **a well-designed, integrated PPS** is more effective against lower-level threats than high-level threats
338
PPS Integration **"Delay-in-depth" = "Protection-in-depth"**
339
PPS Integration Access delay barriers types
Passive (walls, fences, locks, etc...) Security Officers (most flexible, but expensive) Dispensible (fogs, foams, etc)
340
PPS Integration An effective PPS combines the following into an integrated system
People Equipment (technology) Procedures
341
PPS Integration Regardless of how the investigation tool is used; it is an important design element in a PPS and should be used when appropriate
342
PPS Integration Procedural changes can be cost-effective solutions to physical protection issues, although when used by themselves they will only protect assets from the lowest threats
343
PPS Analysis Analysis of the PPS provides two key benefits
1. It establishes the assumptions under which a design was formed 2. It relates system performance to threats and assets, making possible a cost-benefit decision
344
PPS Analysis Analysis evaluates whether the PPS' people, procedures, and technology are achieving the PPS functions of detection, delay, and response
Also referred to as a site survey or vulnerability assessment May be qualitative or quantitative
345
PPS Analysis Qualitative Analysis
Lower-security applications i.e. retail, restaurants, small businesses, etc...
346
PPS Analysis Quantitative Analysis
Higher-security applicaitons Unacceptably high impact, despite level of probability ie. museums, refineries, airports, etc... Require immediate, onsite response to events
347
PPS Analysis Two basic analysis approaches are used in a vulnerability assessment (VA)
Compliance-based (Qualitative) Performance-based (Quantitative)
348
PPS Analysis What system is evaluated on the performance and cost-effectiveness of individual measures in
...Countering threats ...Reducing vulnerabilities ...decreasing risk exposure considered as an integrated whole
349
PPS Analysis PPS performance measure are:
Detection Response
350
PPS Performance Measures Detection
Probability of detection Time for communication and assessment Frequency of nuisance alarms Delay Time to defeat obstacles
351
PPS Performance Measures Response
Probability of accurate communication to response force Time to communicate Probability of deployment to adversary location Time to deploy Response force effectiveness
352
PPS Analysis Interruption
Arrival of responders at a deployed location to halt adversary progress, which may lead to neutralization Probability of Interruption (PI)
353
PPS Analysis Neutralization
Defeat of the advesaries by responders in a face-to-face engagement Probability of Neutralization (PN)
354
PPS Analysis PPS Effectiveness (PE) = **PI x PN**
355
PPA Analysis An ordered series of actions against a facility, which, if completed, results in compromise of assets
Adversary Path
356
PPS Analysis **Adversary Sequence Diagram (ASD)**
A functional representation of the PPS at a fcility that is used to describe the specific protection elements present Illustrates the paths that adversaries can follow to accomplish sabotage, theft or other harm
357
Adversary Sequence Diagram There are three basic steps in creating an ASD for a specific site
1. Describing the facility by separating it into adjacent physical areas 2. Defining protection layers and path elements between the adjacent areas 3. Recording detection and delay values for each path element
358
ASD The biggest mistake in ASD is...
To follow a single path from off-site to the largest location and only do an analysis on that path
359
ASD ctd... The best method for creating an ASD is...
To walk or drive around the exterior of the area, then repeat the same inside
360
ASD ctd... Sabotage incidents require...
Evaluation of only entry paths, as exit paths become irrelevant once the damage is done
361
ASD ctd... ASD's should be executed for...
Day/night, open/closed, and other contradicting conditions fo the facility
362
ASD ctd... Sometimes used as a substitute for defined threats in the ASD process, but this can lead to gaps in analysis
Scenario Analysis
363
ASD ctd... Preferred Approach
Analyze PPS using defined threats and path analysis, then generate scenarios by looking at weak paths
364
ASD ctd... Scenario analysis must also consider the possibility of concurrent attacks on multiple assets, concurrent threat objectives (i.e.. theft and sabotage, etc...), and attack by multiple threat teams
365
ASD ctd.. PPS response includes personnel and the communications system they use
366
ASD ctd... The systems design process is **a serial process**
367
PPS Design What is the most important element in the defense against dynamic threats and potential catastrophic losses?
**Proper use and application of the integrated security systems design process**
368
PPS Design A well-engineered PPS exhibits the following characteristics
Protection-in-depth Minimum consequence of component failure Balanced Protection
369
PPS Design The design process can be based on two criteria/approaches
Performance criteria (preferred method) Feature criteria ("checlist" method that may ignore performance goals)
370
PPS Design 4 Elements of Physical Design
Deter Detect Delay Respond
371
PPS Design Important factors in system design are...
The environment and unique needs of the facility
372
PPS Design The best PPS solutin is designed by considering
Threats Risks Vulnerabilities Constraints
373
Systems Design Process Systems Design Process Phases
Planning and assessment Design and documentation Procurement Installation
374
PPS Design - Phase 1 Task 1, Identification of
Critical assets Potential threats Subsequent vulnerabilities Likely risks Functional requirements
375
PPS Design - Phase 1 Task 2
Analyze security requirements and formulate solutions or countermeasures concepts to reduce or eliminate vulnerabilities and mitigate risks
376
Systems Design Process - Phase 1 The first phase of any security design project
Planning and Assessment Phase
377
Systems Design Process - Phase 1 In the architectural process its referred to as...
Programming or Schematic Design (SD) phase
378
Systems Design Process - Phase 1 Consists of gathering all relevant pre-design asset information and analyzing it in terms of project requirements and constraints
379
Systems Design Process - Phase 1 Culminates in a security "basis of design"
The basis of design is the first and most important output of the design process Focuses on specific project requirements and a conceptual design solution based on those requirements
380
Systems Design Process - Phase 1 the planning and assessment phase results in a conceptual design solution that categorizes vulnerabilities by their criticality and identifies the most preferred and cost-effective protection scheme to mitiage or eliminate asset risks
381
Systems Design Process - Phase 1 Another important outcome of the planning phase is the development of the business case for the new or upgraded security systems
382
Systems Design Process - Phase 1 Security design is just as dependant on collecting good data leading to informed decisions by knowledgeable people as is any other analytical process where a solution is engineered and constructed
383
Systems Design Process - Phase 1 The basis of design becomes the designer's means to obtain consensus from the design tema on...
The goals and objectives of the project What will constitute the project How the project will secure the assets
384
Systems Design Process - Phase 1 **Implementing the basis of design** is not the time to identify engineering details, prepare budgets, or identify and debate specific countermeasures
385
Systems Design Process - Phase 1 **The Conceptual Design, also called a Design Concept**, is the last task of Phase 1 Planning and Assessment
386
Systems Design Process - Phase 1 A design concept's detail should never be more than a top-level description of the various anticipated security system elements, subsystems, and support systems
387
Systems Design Process - Phase 1 From an architectural perspsective, the Design Concept is usually referred to as the **initial conceptual design or schematic development (SD) phase**
388
Systems Design Process - Phase 1 Most security designers identify four principal security strategies - **prevention, detection, control and intervention** - as the most important functional requirements of security design
Homeland security features five principal strategies: **Preparation, prevention, detection, response, and recovery**
389
Systems Design Process - Phase 1 The importance of having a redundant security system (multiple layers of security) is based on the 10 principles of probability developed **by the French mathematician and astronomer Marquis de Laplace (1749 - 1827)**
390
Systems Design Process - Phase 2 Design and Documentation may be split into two phases in the construction idustry
Design Development (DD) Construction Documents (CD)
391
Systems Design Process - Phase 2 Design Development (DD)
Generally DD includes a preliminary design (30-35%) following the conceptual design and concludes with a 50%-60%
392
Systems Design Process - Phase 2 Construction Documents (CD)
Generally starts with a 60% design and passes through a 90% submission and conclused with 100% CD set
393
Systems Design Process - Phase 2 The CD set consists of three elements
1. Contractual details (usually the Div 01 spec for large projects) 2. Specification (Div 28 for security on large projects) 3. Drawings (not required for a services contract, like guards)
394
Systems Design Process - Phase 2 The objective of Phase 2 (DD) is...
To complete the design and to document the process to the level of detail necessary for the chosen method of procurement
395
Systems Design Process - Phase 2 Division 28 (Div28) is the Electronic Safety and Security section of the construction specifications institute (CSI) MasterFormat specifications template that includes 50 sections total (not all used)
Each division, or section, is divided into three parts: General Products Executiong
396
Systems Design Process - Phase 2 Security systems drawings are always considered secondary to the specifications (specs take precedence)
397
Systems Design Process - Phase 2 Drawings include the following types
- **Plans (**top view, map-like view of system component placement int he facility - **Elevations** (views of vertical surfaces that show mounting heights and locations of wall-mounted devices **- Details** (define elements of the system in more detail **- Risers** (chart-like reprentations of complete subsystems such as CCTV or access control **- Hardware schedule**s (tables that provide detailed component information
398
Systems Design Process - Phase 2 Key factors to be considered in hardening of a facility
Stand-off distance Structural integrity of the premises Prevention of progressive collapse Redundancy of operating systems
399
Systems Design Process - Phase 3 Procurement **The type of procurement should be determined before or at the start of the design phase** because the type of procurement determines the level of detail required in the construction documents (CDs)
400
Systems Design Process - Phase 3 Three major forms of security systems procurement
1. Sole source 2. Request for proposal (RFP) 3. Invitationfor bid (IFB)
401
Systems Design Process - Phase 3 Sole Source
- May be the most appropriate for small projects - This method of procurement is recommended only where the security owner has the capability to perform the security needs analysis and has good prior knowledge of systems and prices
402
Systems Design Process - Phase 3 Sole Source
Positives The construction documents are usually simple, reducing owner design costs and saving time
403
Systems Design Process - Phase 3 Sole Source
Negatives ## Footnote 1. There is a tendency to focus on hardware and technology only, leaving the equally important personnel, procedures, and facilities subsystems for others 2. The owner may tend to skip the all-important security planning process and rely on advice from a contractor with a vested interest in selling equipment 3. Without a competitive bidding process, the organization has no means of comparing prices
404
Systems Design Process - Phase 3 RFP
## Footnote Almost always based on a set of detailed design and construction deocuments Specifications are usually generic and performance-based Equipment makes and models are often listed with the phrase "or approved equal" The owner typically procures a security business partner, not just a one-time security systems installer An RFP response may be open to any contractor or it may be limited to a list of prequalified contractors
405
Systems Design Process - Phase 3 RFP (ctd...)
- In addtion to providing a cost proposal, a proposer must submit a technical proposal that describes the firm's understanding of the requirements and how the objectives will be met - It is common to allow responders to propose alternate solutions, called "alternates" - The RFP need not restrict the organization to accept the lowest bid. Instead, it aims to obtain the best value - If price will not be the determining factor in vendor selection, the RFP should say so - A contractor's response to an RFP usually takes longer to prepare than responses to other types of procurement because both a technical and a cost proposal must be prepared
406
Systems Design Process - Phase 3 IFB
- Commonly used by government and other organizations whose procurement procedures require that projects be competitively bid and that the award be given to the lowest qualified, responsive bidder - No technical proposals or alternative solutions are sought, so the construction documents must be extremely explicit - The onus of selecting equipment makes and models, and the accuracy of the security system design, is placed solely on the design team
407
Systems Design Process - Phase 3 IFB
- Bidders submit a cost proposal or bid, which may contain **unit pricing and whatever price breakdown is requested** - The award is then made, usually wihtout negotion **to the lowest qualified bidder who has conformed to the bidding instructions** - The IFB requires additional time and cost in design and specification, but **typically needs only one or two weeks of procurement time, depending on the size and complexity of the project**
408
Systems Design Process - Phase 3 IFB (ctd...)
- It is common to require bids to be **sealed and delivered by a specific time to a specific location:** * **At the time and place, the bids are opened (often publicly)** and the apparent winner is announced * Contracts are signed when the apparent winner's proposal has been checked for **completeness, accuracy, and qualifications**
409
Systems Design Process - Phase 3 In an RFP or IFB, the pre-bid conference should be held **one week after CD's are issued for bid**
410
Systems Design Process - Phase 4 Installation The most important step in stalling the PPS
to plan correctly
411
PPS Systems Design Process - Phase 4 Second step in installing the PPS
for the contractor to visit the site to ensure conditions agree with designs
412
PPS Systems Design Process - Phase 4 Four types of Installation Tests
Pre-delivery or factory acceptance tests Site acceptable tests Reliability or availability tests After-acceptance tests
413
PPS Systems Design Process - Phase 4 Factory Acceptance Testing
Demonstrate system performance complies with specified requirements in accordance with approved factory test procedures
414
PPS Systems Design Process - Phase 4 Site Acceptance Test
Contractor should verify all previous test results, diagnostics and calibrations two weeks prior to acceptance testing
415
PPS Systems Design Process - Phase 4 Reliability Testing
Conducted in alternating phases of testing and evaluation to allow for validation of the tests and corrective actions
416
PPS Systems Design Process - Phase 4 After-implementation Tests
Operational tests Performance tests Post-maintenance tests Subsystem tests Limited scope tests Evaluation tests
417
PPS Systems Design Process - Phase 4 All the technological and procedural precautions in the world will be ineffective **if they are not executed properly**
418
PPS Systems Design Process - Phase 4 **Without appropriate training**, personnel are more likely to contribute to security risks accidentally
419
PPS Systems Design Process - Phase 4 The common time for the contractor to report to the job site to address a warranty issue is
**within four hours of the problem report**
420
PPS Systems Design Process - Phase 4 A PPS maintenance agreement typically includes two categories of services
1. Remedial maintenance that corrects faults upon failures 2. Preventitive maintenance consists of scheduled maintenance to keep the PPS in good operating condition
421
PPS Systems Design Process - Phase 4 Indications of a poor maintenance program
Frequent system failures Cursory testing procedures An inordinate number of components awaiting repair
422
PPS Systems Design Process - Phase 4 Typically, maintenance and warranty costs equal **11% of the total capital systems construction cost**
423
Security Officers - Purpose A human being is needed if the post requires the ability to
Discriminate among events, persons, circumstances, or physical objects based on complex and varying criteria Conduct rational dialogue with people face-to-face and discern next actions based on such communication Use physical force or the threat of it to restrain one or more persons Exercise judgement to determine a logical course of mental or physical activity Provide reports detailing their activities on an ongoing basis
424
Security Officers - Purpose A security officer post is any location or combination of activities for which a trained human being is necessary and includes three key concepts:
1. A location or combination of activities 2. Necessary human being 3. Training and competence to accomplish the required activities
425
Security Officers **Security officers** represent the largest segment of security sector employees and are the largest cost element in the majority of security operating budgets
426
Security Officers What are generally the largest item in the operating budget of a security department
Personnel Costs
427
Security Officers Private security outnumbers..... in the U.S. by 3 to 1?
Law Enforcement
428
Security Officers - Deployment Structures of security operations - Vertical Model
"Hierarchical model" Authority starts at the top
429
Security Officers - Deployment Structures of security operations - Shamrock Model
Three leaf shamrock Leaf 1: Professionals, managers, and skilled technicians Leaf 2: third-party suppliers Leaf 3: Part-time and temporary workers (flexible)
430
Security Officers - Deployment Structures of security operations - Network Model
"Flattened" "Horizontal" or "open" model Connections between employees and multiple supervisors Security department itself is networked to other departments
431
Security Officers - Deployment The number of officers required for a facility is determined by several factors, including:
Physical complexity and size of the facility Number of employees Nature of work Number of entrances (and hours they are open) Value and amount of assets being protected Number of patrols needed Number of escorts and special assignments needed
432
Security Officers - Deployment A 24/7 post requires a minimum of 4.2 officers (168 hours @ 40 hour shifts)
4.5 to compensate for sick, vacation, and holiday leave
433
Security Officers - Basic Functions Where personal recognition for access-control purposes is required, under low-density queuing, a remote operator **could control three or four access points**
434
Security Officer - Rank & Authority The efficiency of the security force depends on **the adquacy and skill of its supervisors**
435
Security Officers - Rank & Authority Security officer supervisors are selected on **the basis of their knowledge of the job and demonstrated administrative and leadership abilities**
436
Security Officers - Regulation Jurisdictions use two different methods for regulating security activity
1. Requiring the licensing of the primary controlled business - the individual or corporate applicant must typically apply for and obtain a license before engaging in the regulated activity 2. The second method applies to the licensing or registration of employees fo the business other than those named on the original application
437
Security Officers Recommendations resulting from the 1972 Rand Report on private security in the U.S.
- Government regulation should be applied as uniformly as possible - Regulation should be at the state level - Directors and managers of in-house security services as well as owners and managers of contract security services should be licensed - All employees of both proprietary and contract security organization should be registered by the state - Each license and registrant should meet minimum standards or qualifications (which could vary among types of licensees and registrants
438
Rand Report
- State regulatory agencies should conduct background investigations of each applicant for a license or registration (i.e.. for all security employees, proprietary and contract), including a criminal records check and prior employment verification for a period of seven years - All new applicants for licensing and registration should have completed high school or it equivalent or must pass a special literacy test - Experience in private security should be required before a license is granted. A bachelor's degre (or higher) should be permitted to substitute for some of the experience requirement.
439
Rand Report
- Licenses should meet a minimum bond or insurance requirement - State agencies should require minimum training programs for all types of private security personnel - Separate training programs should be required for different security positions, such as guard, investigator, polygraph operator, and central station alarm responder - Instructors' schools shold be accredited by the state regulatory agency
440
Rand Report
- Currently employed security personnel should be given on year to meet the training requirements - Private security personnel should be prohibited from carrying concealed firearms while on duty. Company-furnished weapons shold remain on company proprty during off-hours - Statutory liability shold be imposed on private security businesses for weapons abuses by their employees against private citizens
441
Rand Report
- Regulatory agencies should hav the authority and resources to spot-check private security records and operations - Local police and insurance companies should forward to the regulatory agency any information coming to their attention involving major complaints or incidents involving security personnel - Prior criminal convictions related to potential abuses in private security should be a basis for denying registration or licening
442
Rand Report
- Evidence obtained by illegal search by private individuals should be subject to suppression either on a per se basis (as is the case for evidence illegally seized by law enforcement) or ad hoc, with the judge or magistrate weighing the equities - Uniformed private security personnel should be forbidden to engage in interrogation or interviewing - Jurisdictioins should regulate the color and style of private security uniforms, as well as the use of police titles by private seucrity personnel
443
Rand Report
- Any firm hiring the services of an independant security contractor should be held liable for any negligent failure to control the contract staff - The federal government should consider funding a research center to evaluate the effectiveness of private security personnel. Its finding should be included in an overhauled statistical reporting system to be maintained by the insurance industry
444
Security Officers - Qualifications In addition to the mental ability to complete administrative tasks and make judgments, **the security officer must also have the physical ability to observe, listen, report, and function in emergencies**
445
Security Officers - Qualification Actions that must be taken before arming any private security officer
1. They must furnish information about all prior employment 2. The employer should make a reasonable effort to verify the last seven years of employment history, and check three personal references 3. They must pass a recognized pre-employment drug-screening test
446
Security Officer - Training Competency refers to...
An individual's ability, skills, and qualifications to perform the necessary duties
447
Sec Officer - Training It is good practice to **provide a set number of pre-assignment training hours at the contract agency's expense**
448
Security Officer - Training The quality of assets protection is a direct function of...?
Local training and local supervision
449
Security Officer - Training What is directly related to the quality of local supervision and local training?
The quality of the service provided by the contract agency
450
Security Officers - training Unless officers are properly trained and closely supervised, they may not provide the protection required
451
Security Officer - Training What determines security officer effectiveness and raises a question of the actual need for the post
Post-Specific Training
452
Security Officer - Training What should be given as soon as the officer reports for duty? Instruction on specific duties can be given as the duties are assigned
An initial period of general security
453
Security Officer - Training Two reasons for testing the security operations program
Identify residual risks Identify necessary changes within the organization
454
Security Officer - Training The quality of training is directly proportional to the **quantity of training**
455
Security Officer - Training **Hallcrest Report (1985, Cunningham & Taylor)** found that contract security firms had inadequate employee selection and training standards
456
Security Officer - Training The key to effective guard us is...
Training
457
Security Officer - Arming One of the greatest liabilities an organization faces involves...?
issuing deadly weapons to security officers
458
Security Officer - Arming Some think when a contract security vendor is properly contracted, most of the liability is shifted to the vendor
Legal actions usually involve anyone remotely associated with a situation
459
Security Officer - Arming Payment for vendor services indicates **acceptance of the vendor's management style and practice;** thus, crucial policies and protocols should be prescribed by **the organization that employs the vendor**
460
Security Officer - Arming The decision whether to arm an officer should be based on the existence of one of these two conditions
1. there is a greater danger to life safety without the weapon 2. The officer may reasonably be expected to use fatal force
461
Security Officer - Arming Facility management assumes several responsibilities for armed officers
- Property training of the officers to be armed - Selection of the appropriate firearms and ammunition - Proper maintenance of the firearms and ammunition - Proper maintenance of the firearms by a qualified gunsmith - Maintenance of records of the foregoing actions - An adequate level of liability insurance
462
Security Officer - Arming Other considerations regarding the use of deadly weapons
1. Conditions when weapons may be issued 2. Persons who get a weapon, and the type of weapon and ammo issued 3. Quality and reliability of the weapon at the time of issue, and repair and maintenance of the weapon by a qualified armorer 4. Accountability for the specific weapon and its ammunition, and specified training with the weapon
463
Security Officer - Arming Other considerations ctd...
5. Conditions when weapons may be used, and safety precautions for the issuance and carrying of weapons 6. Return or surrender of the weapon when not required for authorized use 7. Secure storage for weapons when not in use (weapons unloaded, separated from ammunition, locked in approved container) 8. Accurate records of each of the preceding points
464
Security Officer - Arming Use of non-lethal weapons should also be covered in policy statements
465
Security Officer - Contract vs. Proprietary Contract Security = 3rd party employers of officers
466
Security Officer - Contract vs. Proprietary Contract Security: Advantages
- Less expensive (most prominent advantage) - The pool of replacement workers typically readily available - No need for a customer to deal with vacations, sick time, discipline, hiring/termination - A wider range of expertise available - HIgh turn-over potentially lower quality, sometimes less well-trained, not as loyal
467
Security Officer - Contract vs. Proprietary Proprietary = Directly-employed officers
Factors: - More direct control of personnel selection, screening, training, supervision - Generally considered more loyal, less turn-over, better quality - more expensive - Must deal with discipline, salary determinations, vacations, sick time, etc...
468
Security Officer - Contract vs. Proprietary Direct-employed officers oversee contract officers; also called the "principal-agent" relationship
Hybrid Security
469
Security Officer - Contract vs. Proprietary Turnover costs
Due to advertising, interview time, background checks, hiring new employees processing and training - generally run \>=25% annual salary
470
Security Officer - Reports From the first day on the job, security personnel should realize their **observations, reports, or findings, coupled with their demeanor and their ability to articulate events,** may be the key to the verdict in a trial immediately or years after an event, even if they have left the job
471
Security Officer - Reports Every security incident should be treated **as if could result in a courtroom appearance**
472
Security Officer - Reports Security reports and logs are admissible in legal proceedings as entries made in the regular course of business and **are therefore exceptions to the evidentiary rule against hearsay**
473
Security Officer - Reports **The admissibility is pertinent in litigation, arbitration, or administrative matters in which the entry is the only evidence of the event.** To qualify, the report or log must
1. Be regularly maintained 2. Be maintained by a person as part of his or her regular duties 3. Record an event of which the recorder had personal knowledge or which was reported to the recorder by one who had personal knowledge and a duty to report
474
Security Officer - Reports Which forms are better than those that expect the officer to formulate a narrative?
Report forms that force positive statements
475
Security Officer - Reports Which report is the security log?
Central report document
476
Security Officer - Reports Whether manual or electronic in format, security logs generally fall into two classes:
Main or control log Individual past log
477
Security Officer - Policy & Procedure **Written instructions** must be reinforced through personal communication
478
Security Officer - Policy & Procedure What are the most important written instructions for the security force?
Post Orders
479
Security Officer - Policy & Procedure Post orders are also important for the following reasons:
1. Express the policies of the protected enterprise 2. Summarize required officer duties 3. Avoid the problems of word-of-mouth instructions 4. Provide a basis for site-specific training
480
Security Officer - Policy & Procedure Post orders should be developed with the following criteria in mind
- Each order deals with a single subject - Each order is as brief as possible - Each order is written in simple, easy-to-understand terms
481
Security Officer - Policy & Procedure Reading time is **inversely related to reading comprehension** - the longer it takes to read a passage, the less likely it will be accurately understood or remembered
Reading time is a function of both the structure of the passage and the reading skill of the individual
482
Security Officer - Policy & Procedure Post orders should be available at each guard post and kept current and accessible. **They are the vital link between the requirements of the client and the ability of the security officer to effectively meet those requirements**
483
Security Officers - Fatigue Individuals awake for **more than 17 hours** are likely to reach dangerous levels of mental fatigue
484
Security Officer - Fatigue The most effective way to maintain officer vigilance is to systemically rotate the security officer's duties, **at 2 &** **4 hour** **intervals**, between **fixed posts and roving patrol** (both foot and mobile) assignments
485
Security Officer - Fatigue Officers' schedules should allow for **meaningful rest,** including at least **two nights of unrestricted sleep** **between shift changes,** and limitations on days worked consecutively and hours worked per shift
486
Security Officer - Contracting for security services The first step in contracting for security officers is...
To determine the organization's contracting rules,
487
Security Officer - Contracting for security services Other steps in contracting for security officers
- Buyer beware - Properly evaluate the needs of the organization to be protected - Acquire information and know the state of the art - Analyze the advantages and disadvantages of each service - Avoid panic decision making
488
Security Officer - Contracting for security services Three criteria to consider when choosing a guard contractor
1. Consistent performance 2. Prompt, efficient and positive response to client concerns 3. Competitive pricing
489
Security Officer - Contracting for security services Clients should look for agencies that can substantiate a...?
Lower-than-average turnover rate
490
Security Officer - Contracting for security services Factors affecting guard agency performance
- Poor scheduling - Lack of adequate supervision - Limited opportunities for advancement - Little or no recognition
491
Security Officer - Contracting for security services The most important aspect required to ensure adequate guard agency performance is
a genuine commitment to partnership with the client
492
Security Officer - Contracting for Security Services **The more specific and detailed the information a client provides,** the greater the likelihood of getting quality service at a competitive price
493
Security Officer - Contracting for Security Services The Scope Of Work (SOW) should state
1. Security tasks 2. Days and hours of performance 3. Total number of hours to be worked
494
Security Officer - Contracting for Security Services Customers should specify hourly pay rates rather than allowing bidding guard agencies to do so
As a general guideline, **the lowest wages received by the contract security officer should at least equal the entry wages paid to the proprietary positions**
495
Security Officer - Contracting for Security Services Supervisory roles are generally determined by the **number of personnel at the site (or total hours)**
If officers work more than 400 hours per week, the contracting organization should hire its own (proprietary) security supervisor
496
Security Officer - Contracting for Security Services Seven measures on which contract security companies can be assessed (at minimum)
1. Employment and reference checks 2. Psychological testing (where allowed) 3. Polygraph testing (where allowed) 4. Minimum qualifications at the local jurisdiction level 5. Management qualifications 6. Selection process for officers 7. Turn-over / tenure / seniority
497
High Rise Security Issues Generally, a high-rise structure extends higher than the maximum reach of available fire-fighting equipment
**Set variously between 75 and 100 feet, or approximately 7 - 10 stories**
498
High Rise - Concepts Access is typically **unrestricted** at the **building entry level** as well as to individual floors. There may be an **unrestrictive security or concierge desk** to assist visitors and others
Open Buildings
499
High Rise - Concepts Access to elevator banks is controlled and visitors are managed
Closed Buildings
500
High Rise - Concepts For a major tenant, one or more elevator banks may be controlled while other elevator banks to other floors are open
Hybrid Buildings
501
High Rise - Concepts Operations controls vary according to time of day, traffic, occupancy level, or day of week
Multi-Mode
502
High Rise - Access Control Three access control classes of space in a high rise
Public Access ## Footnote Leased Spaces Maintenance Spaces
503
High Rise - Access Control Sensitive spaces should be grouped **together in the same group of floors** serviced by a single set of elevators, **allowing more control over access**
504
High Rise - Access Control Floor control can be accomplished in several ways in a high rise
1. Programmable elevators 2. Elevator cabs with card readers 3. Escorts for visitors 4. Employee awareness of piggybacking and tailgating 5. Turnstiles at the ground floor elevator bank 6. Controlled elevator landings (with or without reception)
505
High Rise - Access Control What two factors control how building stairwells are secured?
1. Local fire and building code requirements 2. Whether inter-floor movement of building occupants via stairwells is allowed
506
High Rise - Access Control **Service or freight elevators** pose special problems in all high-rise structures because they often serve all levels of a building
507
High Rise - Access Control If the elevators are self-service, the entire building security program may be compromised unless the service cars are:
- programmed not to access sensitive floors without special arrangments - Locked at hoist away doors on sensitive floors - Locked at service vestibule or lobby doors, where applicable
508
High Rise - Access Control Service elevators also offer an opportunity for unauthorized movement of property from or between accessible floors, which can be addressed by:
- Assigning an operator to the service elevators - Making service elevators available only from a request to security - Avoiding use of service elevators by regular traffic
509
High Rise - Access Control If the use of stairwells is allowed, they should have **access controls and intercoms connected to S****ecurity**
510
High Rise - Access Control High-tower-function mortise locks
- Energized and locked at all times - Access control is accomplished by a key or reader - Power is controlled by the fire system: doors immediately unlock yet remain closed and latched, protecting the stairwell from smoke and fire
511
High Rise - Life Safety The first step in assuring life safety is **to comply with local building and fire codes applicable to the structure**
512
High Rise - Life Safety When sprinkler are present, the chances of dying in a fire and property loss per fire **are cut by 1/3 to 2/3,** compared to fires reported to fire departments where sprinklers are not present
513
High Rise - Life Safety When sprinklers do not produce satisfactory results, the reasons usually involve one or more of the following
1. Partial, antiquated, poorly maintained, or inappropriate systems 2. Explosions or flash fires that overpower the system before it can react 3. Fires very close to people who can be killed before a system can react
514
High Rise - Life Safety **Standpipe systems** can significantly improve the efficiency of manual firefighting operations by eliminating the need for long and cumbersome hoses
515
High Rise - Life Safety Water is the primary extinguishing agent in most high-rises, but others may be...
- Dry chemical and we chemical systems (used mainly for restaurant hoods, ducts, and cooking appliances found in kitchens and cafeterias - Carbon dioxide, Halon replacement systems (used in electrical switchgear rooms and in computer and data processing installations
516
High Rise - Life Safety The most significant factors affecting life safety in high-rise structures are:
- Early detection and precise location of incipient hazards - Reliable communications throughout the structure and with outside agencies - Assurance of safe escape routes - Prompt application of appropriate control measures - Fire extinguishment
517
High Rise - Life Safety Fire-fighting factors in high-rise structures ctd...
- Containment or replacement of contaminated air - Shutoff or filtration of drinking water - Containment and removal of explosives
518
High Rise - Security & Intrusion Detection The "layered security" approach applies to normal facilities is:
- Outer ring: Property boundary, or perimeter - Middle ring: Building walls - Inner ring: Interior controls
519
High Rise - Security & Intrusion Detection Layered Security for a high-rise
- Outer ring: Building walls - Middle ring: Access to elevators and stairs - Inner ring: Individual floors
520
High Rise - Security & Intrusion Detection Protection measures in a high rise should involve a cooperative effort between the building owner and manager and the tenants themselves
521
High Rise - Security & Intrusion Detection Hardening and controlling the elevator lobby and stairwell doors are l**ess expensive than hardening individual offices or spaces**
522
High Rise - Security & Intrusion Detection No attempt should be made to use the system control center in any way other **than as a dedicated facility**
523
High Rise - Security & Intrusion Detection If the system has been properly designed, ideally the monitoring and control station should be the most secure location in the structure
524
High Rise - Security & Intrusion Detection **Intrusion alarms** should be used on stairwell doors where non-emergency use is not allowed
525
High Rise - Security & Intrusion Detection Fresh air intakes should not be overlooked in the protection plan, as these are vulnerable to airborne contaminants
526
High Rise - Security & Intrusion Detection The most dangerous or critical points for an attack against telecommunications lines in a high rise are **located at points after all the building services are connected with one or two main truck cables still int he structures**
527
High Rise - Security & Intrusion Detection Since communications within a high rise can be cut to upper floors by severing the cables in a common riser areas **alarm signal and communication systems should be distributed so that localized points can operate independently** even with communications with a central control panel or processor has been disrupted
528
High Rise - Video Surveillance The number of security personnel in a high rise depends on **the type of occupancy and activities**
529
Dogs in Security - Breeds There are 150 breeds of dogs classified into eight classes:
1. Sporting 2. Hound 3. Working 4. Terrier 5. toy 6. Non-sporting 7. Herding 8. Miscellaneous
530
Dogs in Security - Breeds Security typically uses **working and herding dogs**
What matters most is the **overall drive of the individual dog once it has been trained for security work**
531
Dogs in Security - Breeds **Dogs in the Herding group** share a great ability to control the movement of other animals
532
Dogs in Security - Qualifications Dogs fall into one of three main sensitivity groups
1. Oversensitive (reacts excessively, difficult to train, unreliable, may have to do with the dog's history 2. Undersensitive (difficult to motivate, may not respond to commands, may not interpret affection as a reward) 3. Moderately sensitive (normal sensitivity to sound and touch, responds to commands, ideal for protection work
533
Dogs in Security - Qualifications Aggressiveness categories
Over-aggressive Under-aggressive Moderately- aggressive
534
Aggressiveness Categories difficult to train, may bit others than the aggressor, continues to react after aggressor is gon
Over-aggressive
535
Aggressiveness Categories Cowers or hides when approached by an aggressor, difficult or impossible to train
Under-Aggressive
536
Aggressiveness Categories Easiest to train, ideal for protection use, become alert to the aggressor, suspicious, and is eager to move towards the aggressor
Moderately aggressive
537
Dog - Qualifications Willingness refers to a dog's
- Response to commands - Attitude when carrying out duties - Reaction toward learning new duties
538
Dogs - Qualifications A dog is ranked **high in willingness if it continuously responds to a given command in an effort to fulfill it,** even though reward or correction cannot be easily perceived as being immediate
539
Dogs - Qualifications To qualify for protection work, a dog should
- Be 'middle-sized' - Have even temperament - Be inquisitive and intelligent - Be courageous (bold but not ferocious, not shy); never retreat - Have 'hardness', or a willingness to overcome challenges - Have vitality and strength - Be any color
540
Dogs - Qualifications Qualify for protection...
- Respond well to training at about twelve months of age - Usually be male (not monorchid); females if spayed - Not necessarily be purebred, but not be a shelter dog - Not have been with the breeder for more than 12 months
541
Dogs - Qualifications In security, what are a dog's most important senses?
Smell Hearing
542
Dogs - Qualifications During which stage of training must a dog be taught to rely on smell instead of sight, especially when teaching building searches?
Imprinting Stage
543
Dogs - Qualifications A dog's ability to detect scents is often described as...
Being more than **100 times greater than that of humans** *A trained dog can sense an intruder's airborne scent more than 250 yards away*
544
Dogs - Qualifications A dog's hearing is superior to humans' in **range and pitch**
the upper-frequency limit of the dog is about twice that of human beings, reaching **30,000 Hz or more**. In general, a dog's vision cannot be compared favorably with that of the normal human
545
Dogs - Training Dogs are more intelligent than most other animals, except humans and non-human primates
A vocabulary of about 20 words is normal, but some can respond to 100
546
Dogs - Training Two basic drives are prevalent in dogs used for security tasks
1. The hunt drive 2. The pack drive
547
Dogs - Training Hunt Drive
- Must be present to accomplish both detection and protection work - Through training, the drive can be channeled to help the dog pursue and locate other items, such as drugs or lost children - Due to their natural predator ability, dogs can be trained to attack humans without regard to their own safety
548
Dogs - Training Pack Drive
- When domesticated, the dog adopts humans as pack members and defends the pack as well as the territory the pack occupies
549
Dogs - Training The optimal canine is one with **equal HUNT and pack drives**
550
Dogs - Training More than any reward, the dog wants the approval of it handler - probably because of the pack instinct
551
Dogs - Training Most common training methods (not every dog responds to the same method)
1. Positive reinforcement (praise) tailored to the dog's specific predominant drives 2. Compulsion (negative corrections) through the handler's voice or with equipment such as a shock collar 3. Inducement (balls, toys, companionship, or food)
552
Dogs - Training A dog should never be corrected for clumsiness, slowness in learning, or because of an inability to understand what is expected
553
Dogs - Training Attributing human characteristics to animals
Anthropomorphism
554
Dogs - Training Because of the **restrictions on time and effort** needed to keep skills at the optimal level, generally a dog should be trained specifically for protection or detection, not both
555
Dogs - Training Two reasons why a single dog is generally not trained to detect both drugs and explosives
1. The possibility of confusing the dog in an actual search 2. the need for an aggressive search method when searching for drugs, and a passive on for bombs and explosives
556
Dogs - Training A detection dog must have continuous, daily training to maintain peak proficiency - perhaps two hours per day
557
Dogs - Training Basic training for detection work **runs six to eight weeks,** plus one or two weeks more to train a detection team
558
Dogs - Qualifications It takes about **nine months to a year** before a handler and a dog become highly effective together in pursuing the more difficult detection challenges
559
Dogs - Training A dog taught with a handler knows to attack without command **only when a violator escapes or attacks the handler**
560
Dogs - Training Escorting handler **is 10 ft. behind and 2 ft.** **right** **of the violator;** the dog is off-leash to the left, directly behind the violator
561
Dogs - Training The dog used in the private sector should be given **brief refresher training at least monthly**
562
Dogs - Detection Dogs are the most efficient method for...?
Detecting drugs, explosives and accelerants in most situations
563
Dogs - Detection What percentage does the detection reliability of a well-trained dog exceed?
95%
564
Dogs - Detection Detection is demanding and often boring for the dog because of long work periods without detecting a scent
- A detection dog can normally work effectively **for 20 - 60 minutes** - If a search continues for a long time, **the dog may become tired and lose interest** - If the dog loses interest and the handler cannot motivate it to continue, **it must be given a break** - **Noise and activity** in an area may distract the dog
565
Dogs - Detection A single dog can be trained to **patrol, protect areas, and detect substances,** but usually, **substance detection** becomes a specialty because of the necessary training time
566
Dogs - Detection Dogs can search...
- A 50 yard corridor of lockers in about 2 minutes - A vehicle in about 1.5 minutes - 125 packages in about 7 minutes - 50 boxes in about 3 minutes
567
Dogs - Detection Typical scent-masking substances for drugs
Perfume Gasoline Formaldehyde
568
Dogs - Detection Typical false-alerts for drugs
- Oregano - Alfalfa - Parsley - Spices - Any substance containing acetic acid can cause a false-alert for heroin
569
Dogs - Detection The average drug dog will detect the presence of a 1.2-ounce (14g) of marijuana or a small amount of opium in a vehicle, a package, luggage, or a room of reasonable size
570
Dogs - Detection (Accelerants) Dogs have been used to detect accelerants since...
1987
571
Dogs - Detection (Accelerants) Its ability to discriminate between pyrolysis products (fire debris) normally found at a fire and pyrolysis products containing an ignitable liquid
The value of the dog
572
Dogs - Detection (Accelerants) Which breed are especially adept at this type of detection
Labrador Retrievers
573
Dogs - Detection (Accelerants) How accurate can the dog be?
95% Accurate
574
Dogs - Detection (Accelerants) With what percent of evaporated gasoline is training accomplished?
50%
575
Dogs - Detection (Accelerants) Dogs can also be used to **detect accelerant scents from onlookers**, in an effort to **identify the arsonist who has remained behind**
576
Dogs - Detection (Accelerants) Dogs significantly reduce the time required to **perform a fire investigation**
577
Dogs - Detection (Explosives) Explosives that can be detected by dogs...
Commercial dynamite (gelatin, TNT - trinitrotoluene) Smokeless powder C-4 plastic explosive Black powder (powder form, time fuse, safety fuse) and black powder substitutes Detonating cord (PETN polyerythrytoltetranitrate-based Detonating cord containing RDX (cyclotrimethylene trinitramine)
578
Dogs - Detection (Explosives) Explosives that can be detected by dogs...ctd
Binaries (such as Kinepak) Blasting agents Cast boosters Composition - B Emulsions and slurries Water gels Plastic explosives (semtex) Tetryl Improvised explosive (ANFO ammonium nitrate and fuel oil, chlorates, nitrates
579
Dogs - Training (Explosives) Items that can cause false alerts in detection dogs (for explosives)
- Nitroglycerin pills or containers - Back of television (nitrocellulose shellac) - Blackboard chalk labels (nitrocellulose shellac) - Grease pencils (nitrobenzene) - Shoe polish (nitrobenzene or nitrotoluene) - Pure glycerin (similar to nitroglycerin) - Maraschino cherries (benzaldehyde)
580
Dogs - Tracking Protection dogs are usually not specifically **trained in tracking**
581
Dogs - Tracking A dog can **track better in grass and brush** because human scent adheres well to those surfaces
582
Dogs - Tracking Human scent remains longer **on cool, moist ground** and dissipates rapidly in direct sunlight, on extremely dry ground, and in excessive rain
583
Dogs - Tracking What can hold a scent for 12 hours in favorable weather?
Damp Sand
584
Dogs - Tracking Scents in what conditions last up to 24 hours (less than 3 hours for the opposite)
**vegetation and moist air, moderate winds, and no sun**
585
Dogs - Tracking What is the best time of day to track a scent?
Early mornings - higher temperatures reduce scents faster
586
Dogs - Tracking What improves scents
Humidity
587
Dogs - Tracking Scent cannot pass through what?
Trees, bushes, large rocks, and high grass Must go over, under, or around them
588
Dogs - Tracking **Perspiration** is the most distinctive scent in humans
- **Individuals who have been drinking** emit a different scent that disagrees with the dogs - Much perspiration is generated by feet; the scent escapes through shoes and clothing **(the** **majority** **of scent trails are let by feet)**
589
Dogs - Tracking Tracking dogs can also smell the difference in **the turned-up ground and crushed plants**
590
Dogs - Tracking A trained dog in a boat can **scent a person under the water and** **breathing** **through a tube**
591
Dogs - Tracking **Dogs with flat noses,** such as the mastiff, boxer, and bulldog, are generally not as well suited for tracking
592
Dogs - Tracking **Housedogs do not make optimal tracking dogs;** their smell is diminished by the artificial environment
593
Dogs - Tracking Training a dog for tracking and trailing **takes about two years** and can usually be done only by an expert
594
Dogs - Feeding A dog requires how many nutrients to remain in good health?
36
595
Dogs - Feeding Dogs should be fed **once per day,** no longer than **20 - 30 minutes**
596
Dogs - Grooming The area on the outer side of the dog's elbows that is hairless and thick-skinned, usually about an inch in diameter
Callus
597
Dogs - Healthcare Normal dog temperature range is?
101 - 102 degrees Fahrenheit​
598
Dogs - Liability Dogs can be **viewed as weapons,** and as such, can result in **criminal liability** if caused to attack without justification
599
Dogs - Liability Dogs can cause civil liability by...
- Threatening a person - Attacking a person - Causing an accident that causes damages or injury
600
Dogs - Liability **Civil liability may arise** when the dog is on or off duty
601
Dogs - Liability A dog can be considered dangerous or vicious if **the owner or controller knew or should have known of the dog's vicious propensities**
602
Dogs - Liability A dog can be used to **detain a trespasser in a similar manner as the property owner could**
603
What are the 3 points of the Security Triangle? /\_\
DeterDelayRespond
604
What are the 3 parts of the Security Plan?
1) Information2) Physical3) Personnel
605
What is the most important of the 3 parts of the Security plan?
Personnel Security
606
Risk Assessment based on Loss Event Profile - security problem evaluated in what 3 quantitative terms?
1) types of risks2) probability of those risks becoming actual losses3) criticality of how the loss impact is measured (in assets & income)
607
What are the 5 "D"s of the Physical security concepts?
1) Deter2) Deny3) Detect4) Delay5) Destroy
608
What the hell do they mean by "Destroy" as a security concept?
Mitigate
609
What's it called when you place progressively more difficult barriers/obstacles as lines of defense?
Protection in depth
610
What are the 3 types of security zones?
1) Restricted2) Controlled3) Unrestricted
611
What is a security cost-benefit analysis?
Costs of security operations vs savings / reductions
612
When is it OK to recommend non-cost effective security measures?
NEVER
613
There are 9 elements of security system design criteria. Which one is most important?
Cost
614
What does a perimeter barrier do?
Prevents / impedes an aggressor from crossing a perimeter boundary
615
What are the 5 types of physical barriers?
1) Natural2) Structural3) Human4) Animal5) Energy
616
Example of natural barriers
Rivers, creeks, cliffs
617
Example of structural barriers
berms, walls, doors, locks, glazing materials, plantings, ditches
618
Example of human barriers
Security officers, receptionists
619
Example of energy barriers
Intrusion detection and lighting
620
What are the 4 types of fencing?
1) chain link2) concertina3) barbed wire4) barbed tape
621
What's the most popular type of fence?
Chain link
622
How high should chain link fence be?
7 feet + 1 foot for top guard
623
What gauge wire should chain link fence use?
9 gauge
624
How big are the squares in chain link fences?
2"
625
How far apart should the posts be in a chain link fence?
10 feet
626
What do you make chain link fences out of when near the sea?
Vinyl
627
Where should chain link fences have twisted and barbed salvage?
At the top and bottom
628
What should a chain link fence be fastened to?
Rigid metal or reinforced posts set in concrete
629
Where should the bottom of a chain link fence fall?
Within 2 inches of hard ground
630
Why should the bottom of a chain link fence fall below the surface of the ground?
To compensate for shifting soil or sand
631
How high should standard barbed wire fencing be?
7 feet high
632
How far apart should the strands be between standard barbed wire?
6 inches
633
Standard barbed wire is what gauge?
Twisted 12 gauge
634
Standard barbed wire uses how many point barbs?
4
635
Top-guard supporting arms do what?
Are permanently affixed, and increase height of fence by 1 foot
636
Windows need to be protected if they are over what size?
96 sq inches
637
Windows need to be protected if they are what height from the ground?
Less than 18 feet from the ground
638
Windows need to be protected if they are how close to trees?
Less than 14 feet from trees
639
Interior manhole covers need to be protected if they are how large?
More than 10 inches in diameter
640
What is the weakest area of a window?
The glass
641
Installation of transparent or translucent glass or plastic
Window glazing
642
Glass type: sheet, plate, float - breaks into large pieces
Annealed or plate glass
643
Glass type: Street-level windows or displays; intervening layer of plastic material. High shatter resistant. Needs secured frame.
Laminated glass
644
What type of glass is preferred for blast mitigation?
Laminated glass
645
What type of glass is the most commonly used?
Laminated glass
646
Glass type: safety and security 3-5 times stronger, and 5 times as heat resistant. Breaks into small pieces
Tempered glass
647
What are the purposes of protective lighting?
PsychologicalObject illuminationPhysical deterrent
648
What are the keys to using protective lighting?
Reduce manpowerProtection of officersRelieves officers for other duties
649
What are the 4 types of outdoor security lighting?
1) Continuous2) Standby3) Movable4) Emergency
650
What are lumens?
Light output
651
Intensity of light falling on a surface measured in foot-candles
Luminance
652
Measures how bright the light is when it reaches 1 foot from the source
Foot candles
653
What is the illumination of piers, docks, and open decks (water approach)?
1 foot candle
654
What is the minimum lighting for the perimeter of restricted areas?
0.40 foot candles
655
Human eye and a lens see an object when light reflected from that object
Reflectance
656
Ability of a lamp to faithfully reproduce the color seen in an object
Color Rendition Index (CRI)
657
Measure of warmth or coolness of a light
Corrected Color Temperature (CCT)
658
What kind of lamp is accurate as to CRI, used outdoors, and complement CCTV systems?
Metal halide
659
What is the optimum place for perimeter fence lighting?
Located within the protected area, and above the fence
660
What are the 6 types of lighting systems?
1) Continous2) Glare method3) Controlled4) Standby5) Portable6) Emergency lighting
661
Lighting system: a series of lights to maintain uniform lighting during hours of darkness
Continuous
662
Lighting system: light glares into the eye of a potential intruder
Glare method
663
Lighting system: Illuminates a limited space (ie fence line or road)
Controlled
664
Lighting system: Lit when required, standby lighting (auto or manual)
Standby
665
Lighting system: Manually operated search lights (eg flashlights)
Portable
666
Lighting system: Duplicate any others, limited to power failures, and depend on alternative power.
Emergency lighting
667
According to the NFPA, when should emergency lighting illuminate?
Within 10 seconds of a power failure
668
What should the illumination of a loading bay be?
15 foot candles
669
What type of wall is most resistant to explosion blast?
Reinforced concrete
670
Access control is designed to permit:
only authorized persons and vehicles
671
Access control is designed to detect and prevent entry of:
contraband
672
Access control is designed to detect and prevent the unauthorized removal of:
valuable assets
673
Access control provides information to:
facilitate assessment and response
674
What are the 3 types of access control?
1) Guards2) Card readers3) Biometric readers
675
What is the most common type of card reader?
Photo ID
676
What is the most commonly used coded card technology?
Magnetic stripe
677
What are the 3 basic parts to an Intrusion Detection System (IDS)?
1) Alarm sensor2) Communications path3) Annunciator or sound device
678
What are the 5 purposes of an IDS?
1) Economize2) Substitute3) Supplement4) Deter-Detect-Delay5) Respond
679
What is a microwave system based on?
the Doppler effect
680
Motion detector not impacted by air turbulence
Microwave system
681
Motion detector that penetrates non-metal
Microwave system
682
What is the most widely used motion detector?
Infrared (active and passive (PIR))
683
What is the best motion detector for a room with outside noise?
Ultrasonic
684
Ultrasonic must be kept how far away from air ducts?
At least 10 feet
685
What is the best alarm to put on a safe?
Capacitance device
686
What 3 elements make up the fire triangle?
/\_\ 1) Heat2) Fuel3) Oxygen
687
Once heat, fuel and oxygen occur, this chemical reaction occurs:
Pyrolysis
688
Fire device: photoelectric
smoke detector
689
Fire device: blocks beam or enters refraction chamber and reflects light into photo cell
Smoke detector
690
Fire device: sensitive to invisible products of combustion
Ionization
691
Fire device: noted for early warning
Ionization
692
Fire device: When temperature reaches certain set temperature or rises too quickly
Thermal detector
693
Fire device: Detects flames and glowing embers that are infrared and unseen by the human eye
Flame detector
694
Class of fire: Paper, trash, wood, fiber
Class A
695
Class of fire: Gasoline, oil, cleaning solvents
Class B
696
Class of fire: electrical circuits such as generators, motors, fuse boxes
Class C
697
Class of fire: combustible metals such as sodium, magnesium, potassium
Class D
698
Class of fire: Combustible cooking fuels (vegetable or animal oils/fats)
Class K
699
Used to extinguish Class A
water/water fog or chemical type
700
Used to extinguish Class B
CO2 or water fog or dry chemical type
701
Used to extinguish Class C
CO2 and dry chemical type
702
Used to extinguish Class D
Dry powder which smothers and coats
703
Used to extinguish Class K
Wet chemicals, water based solutions of potassium carbonate, acetate, or citrate
704
Wire commincation: what is the enunciator?
Alarm signal board
705
How does optical fiber work?
Modulated light beams
706
What is multiplexing?
Transmission of several simultaneous messages on the same medium
707
What is Time Division Multiplexing (TDM)?
Events occur in a prescribed time sequence one at a time, shorter distance
708
What is Frequency Division Multiplexing (FDM)?
Simultaneous, multi-channel, longer distance
709
the amount of light on lens (critical to lighting choices)
Illuminance
710
What is the rule of thumb for officers watching monitors?
Less than 10 monitorsLess than 2 hoursto reduce fatigue
711
Temperature at which paper may be destroyed
350 degreesF
712
Electronic process media can begin to deteriorate at:
150 degrees F
713
Interior height of a vault should not exceed:
12 feet
714
The sensor which is used when air turbulence is present in the protected room and when there are no potential false alarm sources outside the room and in the field of the detector:
Acoustic detector
715
The sensor which is used when light air turbulence, vibration and motion outside the room are present:
Acoustic detector
716
The sound wave sensor
Ultrasonic sensor
717
This type of sensor is not influenced by exterior noise; reacts only to movement within a protected area; can be adjusted so the movement of air caused by fire will activate an alarm
Ultrasonic
718
What are the 2 major types of protective barriers?
1) Structural2) Natural
719
What are the 3 basic purposes of barriers?
1) Deter / delay2) Psychological deterrent3) Supplement/complement security personnel needs
720
What should positive barriers be established for?1)2)3)
1) Controlling car/foot traffic flow2) Checking ID of personnel entering/leaving3) Defining a buffer zone for more highly classified areas
721
When the greatest degree of security is essential, what should be installed on the perimeter?
Two lines of structural barriers
722
Two lines of structural barriers should be separated by not less than ________ feet and no more than __________ feet for best protection and control.
15 feet150 feet
723
Four types of fencing authorized for use in protecting restricted areas are?
1) Chain link2) Barbed wire3) Concertina4) Barbed tape
724
Chain link fences must be how high, excluding top guard?
7 feet
725
Chain link fences must be what gauge or heavier?
9 gauge
726
Chain link fences must have what size mesh openings?
2 inches per side or smaller
727
Chain link fences should have what at the top and bottom?
Twisted and barbed salvage
728
How must chain link fences be fastened?
To rigid metal or reinforced concrete posts set in concrete
729
On hard ground or paving, chain link fences must come how close to the ground?
Within 2 inches
730
On soft ground, chain link fences must reach below the surface deep enough to what?
Compensate for shifting soil or sand
731
Standard barbed wire is what kind of strand and what gauge?
Twisted, double strand, 12 gauge
732
How many points on barbs on barbed wire fences?
4
733
Barbs on barbed wire fences should be spaced how?
Equally apart
734
Barbed wire fencing should be at least how high, excluding top guard?
7 feet
735
Barbed wire fencing must be firmly affixed to posts not more than how many feet apart?
6
736
On barbed wire fencing, the distance between strands will not exceed how many inches?
6
737
On barbed wire fencing, one wire will be interlaced how?
Vertically and midway between posts
738
Commercially manufactured wire coil of high-strength steel barbed wire clipped together at intervals to form a cylinder is called:
concertina barbed wire
739
Opened concertina wire is ____ feet long and ____ feet in diamater
50, 3
740
The barbed tape system is composed of 3 things:
1) Barbed wire2) Barbed tape dispenser3) Concertina tape
741
Barbed tape is fabricated from a steel strip with a minimum breaking system of how many pounds?
500
742
The overall width of barbed tape is what?
3/4 of an inch
743
Barbed tape has _______ barbs spaced at ______ intervals along each side
7/16 inch barbs1/2 inch intervals
744
A top guard is an overhang made of what?
Barbed wire or barbed tape
745
A top guard faces in what direction?
outward and upward
746
What angle is a top guard positioned at?
45 degrees
747
How are the top guard's supporting arms attached?
Permanently affixed to the top of fence posts
748
How much do top guards increase the height of a fence?
By at least 1 foot
749
What must be installed on the supporting arms of a top guard?
3 strands of barbed wire, spaced 6 inches apart
750
Manhole covers must be secured when they are how large?
10 inches or more in diameter
751
Unavoidable drainage ditches, culverts, vents, ducts, and other openings having a cross-sectional area of what size must be protected by securely fastened welded bar grills?
96 inches
752
A clear zone should exist between the perimeter barrier and where?
Exterior structures, parking areas, and natural or manmade features
753
How big should the clear zone be between the perimeter barrier and exterior structures / parking areas?
20 feet or more
754
A clear zone of 50 feet or more should exist between the perimeter barrier and structures within the protected areas except when?
When a building wall constitutes part of the perimeter barrier
755
It is practically impossible to build a protective barrier that cannot be penetrated by what?
a human or heavy armor
756
What are the 3 main lines of defense for physical security?
1) Perimeter barriers2) Exterior walls, ceilings, roofs, and floors of buildings3) Interior areas within the building
757
What is the first line of defense for physical security?
Perimeter barriers
758
Where are perimeter barriers located?
At the outer edge of the property
759
What is the second line of defense for physical security?
Exterior walls, ceilings, roofs, and floors of the buildings themselves
760
What is the most frequently used fencing for security purposes?
Chain link fencing
761
What is a major advantage of chain link security fencing?
Visibility on both sides of the perimeter barrier to police and security officer
762
What is a major disadvantage of chain-link fencing?
It creates an "institution-like atmosphere".
763
All nuts and bolts holding hardware attachments on a chain link fence should be:
welded
764
The gate in a security perimeter barrier should be how high?
As high as the adjoining barrier (fence)
765
How may a top guard on a gate be different than a top guard on a fence?
It may be vertical
766
How frequently should you have signs along the perimeter stating that the property is not open to the public and intruders will be prosecuted?
Not more than 100 ft intervals
767
If possible, ________________ should be locked from the inside.
All doors except one
768
The door not locked from the inside should be where?
On a well-lighted, police-patrolled street
769
The door not locked from the inside should be used by whom?
All employees coming and leaving work
770
Fire exit doors, required by building codes, are ___________ for security but _______ for safety.
Undesirable for securitynecessary for safety
771
How are fire exit doors openable?
By pushing against a panic bar on the inside.
772
Security of a fire exit door is enhanced by the use of what?
audible alarms
773
Unusually long warehouse doors should be secured how?
Padlocked on the inside at both ends
774
What are 2 ways door hinge pins exposed to the outside can protected?
1) By spot welding2) By inserting a headless machine screw in a pre-drilled hole through a leaf of the hinge
775
What kinds of doors are a definite security risk?
Hollow core
776
Intruders probably won't use a window how high from the ground?
18 feet or higher
777
Windows should be secured if they are how far from trees?
14 feet
778
Windows should be secured if they are how far from adjoining buildings?
14 feet
779
Windows should be secured if they are how large?
96 square inches
780
Windows should be secured if they are how far from the ground?
18 feet
781
What are 4 protective coverings for windows?
1) Burglary-resistant glass2) Protective iron or steel bars3) A good grade of heavy steel mesh4) Chain-link fencing
782
How many break-ins occur through window glass?
Over 50%
783
Who makes the burglary-resistant "safety glass"?
Underwriter's Laboratories
784
Who makes the burglary-resistant plastic glazing called TUFFAK?
Rohm and Haas
785
Who makes the burglary-resistant plastic glazing called LEXAN?
General Electric
786
Who makes the burglary-resistant acrylic-glazing material sold as Plexiglas?
Rohm and Haas
787
Special security problems are created by these 6 conditions which breach the perimeter barrier:
1) Sidewalk elevators2) Utility tunnels3) Operational tunnels4) Storm sewers5) Storm doors6) Piers, docks, and wharves
788
The button, magnetic switch, or thermostat that will cause system to alarm
Actuator
789
This is the monitor. Technically, it is the visual or audible signaling device that indicates conditions of the associated circuits.
Annunciator
790
The property of two or more objects which enables them to store electrical energy in an electrostatic field between them.
Capacitance
791
Records a change in capacitance or electrostatic fields to detect penetration through windows, ventilators, and other openings
Capacitance Proximity Sensor
792
Can be used to detect attempted penetration into safes or storage cabinets
Capacitance Proximity Sensor
793
Material which transmits electric current
Conductor
794
Examples of material which transmits electric current
Wire and cable
795
The terminal box for all sensors
Control Unit
796
A term applied to a system designed so that if a component fails to function properly, the system will, by a signal or otherwise, indicate its incapacity
Fail-Safe
797
Used to call for assistance
Duress sensor
798
What does a duress sensor consist of?
A hand or foot operated switch
799
Activation of sensors for which no cause can be determined
False Alarm
800
The combination of components to include sensors, control units, transmission lines and monitor units integrated to operate in a specified manner
Intrusion Detection System
801
Devices that initiate alarm signals by sensing the stimulus, change, or condition for which designed
Intrusion Detection Sensors
802
An electronic bell for outdoor or indoor use in the vicinity of a protected area
Local Audible Alarm
803
A radio/radar frequency (RF) transceiver which detects motion
Microwave sensor
804
A microwave sensor has a frequency range of GHz, which is what?
a billion cycles per second
805
A device that senses and reports on the condition of the system
Monitor
806
Detects movement inside the area to be protected
Motion Sensor
807
Detects the sounds of forced entry throughout walls, ceilings, and doors
Passive Ultrasonic Sensor
808
Detects entry through doors, windows, walls, or any other openings into the protected area
Penetration Sensor
809
An interruption of a light beam transmitted to the receiver causes this to alarm:
Photoelectric System
810
A photoelectric system consists of what 2 separate units?
1) a transmitter2) a receiver
811
The frequency range of sound that is above the capabilities of normal human hearing
Ultrasonic
812
In intrusion detection systems, ultrasonic is used in what range?
Between 21,500 and 26000 Hz (cycles per second)
813
Detects by frequency shift the motion of an intruder inside the protected area
Ultrasonic Motion Sensor
814
Detects forced entry through metal barriers placed over windows and ventilators or attempts to drill, saw, or cut through walls, ceilings, floors or doors
Vibration Sensor
815
What are the 3 purposes of intrusion detection alarm systems?
1) To economize on people2) To substitute in place of other security measures3) To supplement by providing additional controls
816
What are the 5 basic principles of operation of intrusion detection systems?
1) Breaking of an electrical circuit2) Interrupting a light beam3) Detecting sound4) Detecting vibration5) Detecting a change in capacitance due to penetration of an electrostatic field
817
What are the 4 types of electro-mechanical alarm systems?
1) Metallic foil2) Magnetic switches3) Wire service detection4) Pressure mats, ribbons, or wafers
818
What are the 6 types of Volumetric alarm systems?
1) Capacitance2) Vibration3) Microwave4) Ultrasonic5) Passive Infrared6) Photo Electric
819
Type of alarm system: The protective circuits activate a visual or audible signal in the immediate vicinity of the object of protection
Local alarm system
820
Type of alarm system: This system is one in which the installation-owned system is a direct extension of the police and/or fire alarm systems.
Auxiliary system
821
What is the least effective alarm detection system?
Auxiliary
822
Type of alarm system: In this system, alarms are transmitted to a central station outside the installation from which appropriate action is taken to notifying local police or fire departments
Central station system
823
Type of alarm system: It is similar to the central station system except is owned by, and located on, the installation.
Proprietary system
824
Which alarm detection system responds to alarms with the installation's own security or firefighting personnel?
Proprietary system
825
What are the 3 basic parts of an alarm system?
1) Sensor2) Circuit3) Annunciator
826
What does the sensor do?
It's the triggering device
827
What does the circuit do?
Carries the message to the signaling apparatus
828
What does the annunciator do?
It is the signaling system or device
829
What are the 4 functions an alarm system could have?
1) Detection of fire2) Detection of intrusion3) Emergency notification4) Monitoring of equipment or facility conditions
830
What estimated percentage of all alarms are false?
90-98%
831
What are the 3 most common causes of false alarms?
1) User negligence2) Poor installation or servicing3) Faulty equipment
832
CCTV consists of what 4 elements?
1) Television cameras2) Monitor3) Connecting circuits4) Power source
833
Protective lighting is important in what 3 ways?
1) Deters violators2) Assists security force3) Essential element of an integrated physical security program
834
Protective lighting is _____________ to maintain
Inexpensive
835
Protective lighting will probably reduce the need for what?
security forces
836
Protective lighting may provide personal protection for security forces how?
By reducing the element of surprise by an intruder
837
Protective lighting requires ______ intensity than working light.
Less
838
When planning protective lighting, you must consider:1)2)3)
1) Effects of local weather2) Fluctuating voltages in power source3) Using a ledger to maintain burning time record based on life-expectancy of the lamp
839
All limited and exclusion areas musat have protective lighting on a permanent basis where?
Both the perimeter and access control points
840
Lighting must be positioned to do what to the security force?
1) Prevent glare to security force2) Avoid silhouetting the security force
841
The perimeter band of lighting must provide a minimum intensity of what measured 6 inches above the ground?
0.2 foot candles
842
How far must the perimeter band of lighting extend?
At least 30 feet outside the exclusion area barrier
843
Lighting inside exclusion areas or on structures containing nuclear weapons must be of sufficient intensity to enable what?
Detection of persons in the area or at structure entrances
844
Lighting at entrance control points must be of sufficient intensity to enable guards to what?
compare and identify bearers and badges
845
Protective lighting systems must be operated when?
During hours of darkness
846
Failure of one or more lights should not affect:
the operation of remaining lights
847
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ should be adequate to sustain the protective lighting of all vital areas and structures.
The stand-by power source
848
The cone of illumination from light source should be directed where?
Downward & away from the protected area / security personnel
849
Where should the light source for perimeter fence lighting be located?
Within the protected area and above the fence
850
An effective light system must provide means of what?
Convenient control and maintenance
851
Protective lighting should never be used alone, but what?
With other security measures
852
Protective lighting should enable security force to do what?
Observe without being seen
853
Good protective lighting should consist of ______________ light upon bordering areas
adequate and even
854
Good protective lighting should consist of ____________ in eyes of intruder
glaring lights
855
Good protective lighting should consist of _________ light on security patrol routes
little
856
What are the 2 basic systems used to provide effective protective lighting?
1) Light boundaries and approaches2) Light area and structures within general boundaries of property
857
To be effective, protective lighting should:1) Act as \_\_\_\_\_2) Make __________ likely
Act as deterrentMake detection likely
858
What are the 4 general types of protective lighting systems?
1) Continuous2) Standby3) Movable4) Emergency
859
What is the most common protective lighting system?
Continuous
860
What lighting systems consist of stationary luminaries?
Continuous & Standby
861
What are the 2 primary methods of employing continuous lighting?
1) Glare projection2) Controlled lighting
862
What lighting system has luminaries that are not continuously lighted?
Standby
863
What lighting system consists of manually operated movable searchlights which may be either lighted either during darkness or only as needed?
Movable
864
What lighting system is usually used to supplement continuous or standby lighting?
Movable
865
What lighting system may duplicate the other three systems in whole or in part?
Emergency
866
What lighting system is limited to times of power failure or other crisis?
Emergency
867
What lighting system depends on alternative power sources such as portable generators or batteries
Emergency
868
How should piers and docks be safeguarded?
By illuminating both water approaches and the pier area
869
Decks on open piers should be illuminated to at least _____ foot candles
1
870
Water approaches, extending to a distance of _____ feet from the pier, should be illuminated to at least _____ foot candles
100 feet0.5 foot candles
871
The circuit of lighting arrangements should be arranged so that failure of any one lamp will not:
leave a critical or vulnerable position in darkness
872
Where should feeder lines be located?
Undeground (or sufficiently inside the perimeter in the case of overhead wiring)
873
Why should feeder lines be underground?
to minimize sabotage or vandalism from outside the perimeter
874
What foot candles on horizontal plane at ground level are recommended for the perimeter of outer area?
0.15
875
What foot candles on horizontal plane at ground level are recommended for perimeter of restricted area?
0.4
876
What foot candles on horizontal plane at ground level are recommended for vehicular entrances?
1
877
What foot candles on horizontal plane at ground level are recommended for pedestrian entrances?
2
878
What foot candles on horizontal plane at ground level are recommended for sensitive inner areas?
0.15
879
What foot candles on horizontal plane at ground level are recommended for sensitive inner structures?
1
880
What foot candles on horizontal plane at ground level are recommended for entrances?
0.1
881
What foot candles on horizontal plane at ground level are recommended for open yards?
0.2
882
What foot candles on horizontal plane at ground level are recommended for decks on open piers?
1
883
What is one candle power?
The amount of light emitted by one standard candle
884
What is one lumen?
The amount of light required to light an area of one square foot to one candle power
885
What is one foot candle?
One lumen of light per square foot of space
886
How is the intensity of illumination measured?
In foot candles
887
What is an example of incandescent lighting?
the common light bulb
888
What are 2 advantages of incandescent lighting?
1) Instant2) Light can be reflected or diffused
889
What are the 2 major types of gaseous discharge lamps?
1) Mercury vapor2) Sodium vapor
890
What color do mercury vapor lights give off?
Soft blue
891
What color do sodium vapor lights give off?
Soft yellow
892
How long do gaseous discharge lamps take to light when cold?
2-5 minutes
893
How long do gaseous discharge lamps take to light when hot?
5+ minutes
894
Gaseous discharge lamps are ____ effective than incandescent
more
895
What kind of lamps are widely used where fog is a problem?
Gaseous discharge lamps
896
What kind of lamps are frequently found on bridges and highways?
Gaseous discharge lamps
897
The four basic types of lights with security applications are:
1) Floodlights2) Searchlights3) Fresnels4) Street lights
898
This type of light is directional, with some diffusion to light specific areas
Floodlights
899
This type of light project light in a concentrated beam
Searchlights
900
This type of light is appropriate for use in instances calling for illumination of boundaries
searchlights
901
This type of light uses wide beam unites used to extend the illumination in long, horizontal strips
Fresnels
902
Fresnels project a narrow beam approximately ______ degrees in the horizontal and _______ in the vertical plane
180 degrees horizontal15-30 degrees vertical
903
This type of light is an appropriate application to light parameters since light light is lost vertically
Fresnels
904
This type of light produces a diffused light widely used in parking areas
Street lights
905
What is the most accepted and widely-used security device?
The lock
906
Locks should not be considered bars to entry, but \_\_\_\_\_\_\_\_\_\_\_.
Delay devices
907
Can a key lock be picked?
Yes, by an expert
908
Two downsides to key locks are the possibility of what?
losscompromise
909
Can a conventional combination lock be picked?
Not picked, but opened by a skillful manipulator
910
If you need a high degree of protection for highly-classified or important material, you should use what kind of combination lock?
Manipulation-resistant combination lock
911
For containers of highly-important items, you'd use what kind of combination lock?
A combo lock with 4 or more tumblers
912
Where can relocking devices be found?
Attached to a safe or vault door
913
Five features of interchangeable cores:
1) quickly replaced2) can be keyed into overall complete locking system3) Economical4) System is flexible5) Simplified record keeping
914
What is a digital combination door locking device?
A cypher lock
915
What kind of lock offers no security and is the worst selection for security?
Warded locks
916
Wafer locks are also known as
disc tumbler locks
917
What kind of lock is used on most cars, desks and cabinets?
Wafer lock
918
Rank these in order from least to most secure:Wafer lockWarded lockPin tumbler lock
Warded lockWafer lockPin tumbler lock
919
What kind of lock is used extensively in commercial, military, and residential security?
Pin tumbler locks
920
¿Qué tipo de cerraduras se usan en las cajas de seguridad y son difíciles de abrir?
Cerraduras de palanca
921
What kind of lock is opened by pressing a series of numbered buttons in proper sequence?
Code-operated locks
922
What kind of lock uses keys that are etched, embossed, or contain a pattern or copper flecks?
Card operated locks
923
Card operated locks can be either _____________ or \_\_\_\_\_\_\_\_.
Electrical or electromagnetic
924
What kind of lock holds the door closed by magnetism?
Electromagnetic locks
925
What kind of lock should be hardened and strong enough to resist prying?
Padlocks
926
Padlocks should be ________ at all times, even when not securing an area.
Locked
927
What kind of keying system is a key to a single lock within a master key system?
Change key
928
What kind of keying system is a key which will open all the locks within a particular area in a facility?
Submaster key
929
What kind of keying system is a key which will open all the locks when two or more submaster systems exist?
Master key
930
What kind of keying system is a key that will open everything in a system involving two or more master key groups?
Grand-master key
931
Keys should be accessible only to whom?
Those whose official duties require access
932
How often should combinations to safe locks and padlocks securing containers for classified information be changed?
At least every 12 months
933
When should the combinations to safe locks and padlocks securing containers for classified information be changed early?1)2)
1) Loss or possible compromise2) Discharge, suspension, or reassignment of anyone having knowledge of the combination
934
More frequent rotation of ___________________ may be required in certain circumstances
key padlocks
935
When selecting combination numbers, what should be avoided?
Multiple & simple ascending or descending arithmetical series
936
Use of keys must be based on the same general concept applied to what?
Safe combinations
937
How often should inventories of key systems be conducted?
At least annually
938
When a key is issued, the following should be recorded:1)2)3)4)5)
1) Key number2) Name of person3) His/her position4) Date of issuance5) Any other relevant data
939
When a key is lost, circumstances should be:
investigated & set forth in writing
940
Master keys should be kept at:
a minimum
941
Traffic control includes the following:1)2)3)4)
1) ID of employees and visitors2) Directing movements of employees & visitors3) Package control4) Control of trucks & private cars
942
All visitors must be required to:
identify themselves.
943
What kind of access should visitors be limited to?
Predetermined, unrestricted areas
944
What is the most practical system of identification?
Badges or ID cards
945
To be effective, how large should the photo be on an ID?
At least 1-inch square
946
How often should badge photos be updated?
Every 2-3 years, and when facial appearance changes
947
A badge system is only as effective as its:
enforcement
948
Packages brought in should be:
inspected
949
In most cases, what kind of inspection will suffice for packages?
spot checking
950
Any policy relative to package control must be \_\_\_\_\_\_\_\_\_\_\_\_\_.
widely publicized in advance
951
Where possible, the parking area should be _________________ from all other areas of the facility.
separated
952
Parking area should be protected from:
intruders
953
Employees and visitors going to and from cars should pass through _______________ manned by \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_.
pedestrian gates manned by security personnel.
954
In comparison to other security elements, guards areA) expensiveB) inexpensiveC) comparable
expensive
955
Who usually receives higher hourly wages, proprietary guards or contract guards?
Proprietary
956
What are 3 advantages of proprietary guards?
1) Less turnover2) More familiarity with facilities3) Tend to be more loyal
957
What are 3 disadvantages of proprietary guards?
1) Higher cost2) May be required to join union3) Problem ensuring back-up personnel
958
5 advantages of contract guards:
1) cheaper2) Fewer admin & payroll related responsibilities3) Contractor responsible for scheduling & supervision4) Able to obtain extra guards when needed5) Security firm usually accepts liability in civil suits
959
Disadvantages of contract guards:1)2)3)4)
1) Lack of training2) Less loyal3) Large turnover4) Not familiar with plant
960
Training programs for private security personnel are generally:
inadequate
961
How many hours of formal pre-assignment training should unarmed guards have?
8
962
How many additional hours of training should unarmed guards have in their first 3 months of assignment?
32
963
What is the minimum recommended age for private security personnel?
18 years old
964
What's the minimum education for private security personnel?
High school or equivalent
965
Armed personnel should have what kind of vision and hearing?
Vision: correctable to 20/20Hearing: ordinary conversation at 10 feet with each ear
966
Unarmed personnel should have what kind of vision and hearing?
Just no physical defects that would hinder job performance
967
Armed security personnel should be required to successfully complete what?
A 24 hour firearms course including legal & policy requirements OR submit evidence of competency & proficiency prior to assignment
968
How often should armed personnel be required to qualify with the firearm?
At least once every 12 months
969
What are the additional recommended qualifications set forth by the task force that armed guards must have that unarmed guards do not necessarily need?1)2)3)4)
1) No felonies involving weapons2) No felonies or misdemeanors that reflect ability to perform as an armed guard3) No physical defects that would hinder job performance4) Complete training for armed personnel
970
A peace officer is generally allowed wider discretion than a private citizen with what?
making arrests or apprehensions
971
The reputation of a peace officer often carries with it the right to what?
carry deadly weapons
972
The status of peace officer may open ________________ not otherwise available
channels of communication
973
A disadvantage of having a peace officer is that they are also subject to:
due process
974
A disadvantage of a peace officer is that they may be subject to emergency:
draft or mobilization orders of local authorities
975
What is the number of personnel required to cover a single post around the clock, providing coverage for 3 eight hour shifts?
4.5
976
The process of conducting an exhaustive physical examination and thorough inspection of all operational systems and procedures of a facility is known as:
a security survey
977
The 4 purposes of a security survey:
1) Determine existing state of security2) Locate weakness in defenses3) Determine degree of protection required4) Produce recommendations establishing a total security program
978
Who should conduct a security survey?1)2)
1) Staff security personnel2) Qualified security specialists (both of whom should have had training in the field)
979
No checklists exists that could be universally applied for survey purposes, because:
no two facilities are alike
980
A security survey is known by a number of different terms, such as1)2)
1) Risk analysis2) Risk assessment
981
What are the 3 key steps in a risk assessment process?1)2)3)
1) Determine value, impact, and cost of any asset should it be lost due to natural or man-made forces2) Determine the degree of vulnerability of the facility to damage or attack by natural or man-made forces3) Determine the degree of probability that natural or man-made forces will strike any given facility
982
What are the 3 ways the "vulnerability of a facility" to damage or attack may be determined?
1) Inspection of the facility by an experienced inspector2) Examination of the facility's record of losses3) Determination whether the high-value property or items are properly safeguarded from theft by insiders
983
Security surveys determine existing vulnerabilities to:
injury, death, damage, or destruction by natural causes
984
Security surveys determine existing vulnerabilities of corporate assets due to:
outside criminal activityORcriminal activity within organizations
985
Security surveys determine existing conditions of:
physical security of corporate property
986
Security surveys measure effectiveness of:
current security police
987
Security surveys measure compliance of:
employees to security rules
988
Security surveys conduct internal audit to determine:
fraud
989
Security surveys inspect overall condition within facility which cause:
security probelms
990
Security surveys investigate _____________________ in the community from a standpoint of interaction within the facility.
Environmental conditions
991
One of the big differences between physical security surveys and crime prevention surveys is that physical security measures are oriented more towards \_\_\_\_\_\_\_\_\_\_\_\_\_-, but crime prevention measures focus on \_\_\_\_\_\_\_\_\_\_\_\_\_\_.
Security of property and facilitiesDeterrence of criminal activity regardless of physical safeguards
992
When conducting a security survey, __________ should always be obtained.
Written authority
993
When conducting a security survey, any ______________ should be reviewed.
previous surveys
994
When conducting a security survey, a(n) _________________ tour should be made.
orientation
995
When conducting a security survey, _____________ should be taken of objects or situations that are difficult to describe.
photographs
996
When conducting a security survey, there should be a review with who of all deficiencies found?
Local plant supervisors
997
When conducting a security survey, how should you ascertain if deficiencies have been corrected?
With a follow-up survey
998
When conducting a security survey, a ____________ should be prepared.
Cost-benefit analysis
999
The direct comparison of the costs of the operation of the security unit and all security measures with the amount of corporate property saved or recovered as well as reduction of losses caused by injuries and lost production time
Cost-benefit analysis
1000
When conducting a security survey, no security measure should be recommended which is not:
cost effective
1001
What are the 2 categories used to describe the measure of protection of safes?
1) Fire resistive2) Burglary & robbery resistive
1002
Rating safes in the area of fire protection is done through:1)2)
1) Safe Manufacturers National Association2) Underwriter's Laboratories
1003
Which rater of fire protection is only seen on older safes, because they are no longer in existence?
SMNA (Safe Manufacturers National Association)
1004
When did UL cease the use of letter classifications?
After 1972
1005
UL classifications now indicate what on their labels?
The type of container and the level of protection
1006
Fire resistive safes give very little resistance against what?
Safecrackers
1007
Once exposed to a fire, a fire-resistive safe does not have what?
The degree of protection for which it was originally rated
1008
350-4Temperature?Time?Impact?Old Label?Fire/Money?
2000 degrees F4 hoursImpact - YesOld Label - AFire
1009
350-2Temperature?Time?Impact?Old Label?Fire/Money?
1850 degrees F2 hoursImpact - YesOld Label - BFire
1010
350-1Temperature?Time?Impact?Old Label?Fire/Money?
1700 degrees F1 hourImpact - Yes Old Label - CFire
1011
350-1 (Insulated)Temperature?Time?Impact?Old Label?Fire/Money?
1700 degrees F1 hourImpact - NoOld Label - DFire
1012
350-1/2Temperature?Time?Impact?Old Label?Fire/Money?
1550 degrees F1/2 hourImpact - No Old Label - EFire
1013
150-4Temperature?Time?Impact?Old Label?Fire/Money?
2000 degrees F4 hoursImpact - YesOld Label - NoneFire
1014
150-2Temperature?Time?Impact?Old Label?Fire/Money?
2000 1850 degrees F2 hoursImpact - YesOld label - noneFire
1015
150-1Temperature?Time?Impact?Old Label?Fire/Money?
1700 degrees F1 hourImpact - YesOld label - noneFire
1016
What UL ratings are designed for Computer Media Storage Classification?
The 150's
1017
What UL class is not impact resistant?
Insulated Record Containers
1018
What temperatures are computer media storage containers rated to protect by UL?
1700-2000 degrees
1019
Burglary and robbery-resistive mercantile safes are classified by the design features of what?
The door, wall and lock
1020
TL-15 is resistant to what?
Tools
1021
TL-15 has what weight?
At least 750 lbs, or anchored
1022
TL-15 has what body?
At least 1-inch thick steel or equal
1023
TL-15 attack is what?
Door and front face must resist attack with common hand & electric tools for 15 minutes
1024
TL-30 is resistant to what?
Tools
1025
TL-30 has what weight?
At least 750 lbs, or anchored
1026
TL-30 must have what body?
At least 1-inch thick steel or equal
1027
TL-30 attack is what?
Door & front face must resist attack with common hand and electric tools, plus abrasive cutting wheels and power saws, for 30 minutes
1028
TRTL-30 is resistant to what?
Tools and torches
1029
In 1980, UL stopped issuing the TRTL-30 label and replaced it with what label?
TRTL-30X6
1030
What does the x6 in TRTL-30X6 mean?
Equal protection on all 6 sides
1031
TRTL-30 has what weight?
At least 750 lbs
1032
TRTL-30 has what attack?
Door and front face must resist attack with all tools, as well as oxy-fuel gas cutting or welding torches for 30 minutes
1033
TRTL-30X6 is resistant to what?
Tools and torches
1034
TRTL 30X6 has what weight?
At least 750 lbs
1035
TRTL-30X6 has what attack?
Door and ENTIRE BODY must resist attack with all tools and torches, as well as electric impact hammers and oxy-fuel gas cutting or welding torches for 30 minutes
1036
TXTL-60 is resistant to what?
Tools, torches, and explosives
1037
TXTL-60 has what weight?
At least 1000 lbs
1038
TXTL-60 has what attack?
Door and body must resist attack from all tools, torches, as well as eight ounces of nitroglycerin or its equal for 60 minutes
1039
As a general rule, the door of a burglary resistive safe must be made of what material and thickness?
Steel, 1.5 inches thick
1040
What is the safecracking method that is accomplished by knocking off the combination dial and drilling a hole to expose the locking device?
Drilling or punching
1041
What is the safecracking method that uses high temperature oxyacetylene torches to cut an opening in the wall or door of the safe?
Burning
1042
What's another word for an oxyacetylene torch?
Burning bar
1043
What is the safecracking method that attacks the seams of metal plates with pry bars and other tools to peel back layers of metal, thus exposing either the locking mechanism or the interior?
Peeling
1044
What is the safecracking method that is similar to peeling, except it can be accomplished against a solid, metal-walled container within a thin wall?
Ripping
1045
What is the safecracking method utilized to reveal the position of the combination and mechanism necessary to open the safe?
X-ray
1046
What is the safecracking method that uses nitroglycerin and plastic explosives?
Explosives
1047
What safecracking method has lost popularity?
Explosives
1048
What are some of the power tools used to crack safes?
Rotary devicesHydraulic toolsPower drills
1049
What is the technique that very few safecrackers have the skill to use?
Manipulation
1050
No safe is:
impenetrable
1051
How should a safe that weighs less than 750 lbs be secured?
Anchored to the building structure
1052
What is a vault?
An enlarged safe
1053
What is the body of a vault made of?
High quality, reinforced concrete
1054
Where are vaults usually located?
At or below ground level
1055
How thick are a vault's doors?
At least 6 inches thick
1056
How thick should the walls, ceiling, and floor of a vault be?
Twice as thick as the door but never less than 12 inches.
1057
What are the 2 types of alarm systems a vault should be supported by?
1) Capacitance2) Vibration
1058
Who establishes the ratings for vaults?
Insurance Services Office (ISO)
1059
What are the 2 phases of the system design process?
Planning & Design
1060
The planning phase consists of collecting _____________ and formulating \_\_\_\_\_\_\_\_\_\_\_\_\_.
Collecting information on security needs, objectives, & constraintsFormulating concepts for security countermeasures
1061
The planning phase includes the development of what?
The business & economic justification
1062
The planning phase includes documentation that is clear and complete to ensure what?
Consistent & accurate interpretation by vendors for procurement and implementation
1063
A combination of equipment, peresonnel, and procedures design, coordinated in such a way as to assure optimum achievement of the system's stated security objectives
System
1064
The logical and symbiotic combination of the technology, supported bye the staffing and procedural elements
Integration
1065
Used to develop countermeasure solutions to the problems identified by a vulnerability assessment
Requirements Definition
1066
The mission or objectives of the integrated security system (ISS) mus reflect and support what?
The overall mission
1067
Level of confidence factor for each requirement must focus on what?
Preventing, delaying or modifying the consequences
1068
The ground rules for the design and selection of subsystems and components
Design Criteria
1069
Also known as functional requirements
Design Criteria
1070
The design criteria fall into a number of categories based on:
Expected performanceOperational and financial considerationsStyle & designCodes & standards
1071
Design criteria - codes and standards
National and local building codessafety codes and laws
1072
Design criteria - Quality
Sensible levels are needs to ensure costs are kept in check
1073
Design criteria - Capacity
Size and space requirements affect the design solutions and impact anticipated expansion
1074
Design criteria - Performance
Detailed in the system specs. Include interface, reliability, and maintainability
1075
Design criteria - Features
Major system features should be defined
1076
Design criteria - Cost
Most common constraint & should be defined in a budget
1077
What is the most common constraint of design criteria?
Cost
1078
Design criteria - Operations
Need to have minimum negative impact on productivity
1079
Design criteria - Culture and image
Greatly factors into the implementation of security programs in the corporate environment and the acceptance of change
1080
Design criteria - monitoring and response
Proprietary vs. off site monitoring
1081
Minimum Security Specifications - Instructions to bidders
List of all documents included in the contract
1082
Minimum Security Specifications - Functional description
Intended operation and installations schedule
1083
Minimum Security Specifications - 3 lists needed
1) List of all products & services included in the contract2) List of all products & services required but part of another contract3) List of applicable codes & standards
1084
Minimum Security Specifications - Support services
Drawings, submittal, testing, training, warranty, maintenance
1085
Minimum Security Specifications - Technical descriptions of all...
major subsystems and components
1086
Minimum Security Specifications - General....
site conditions
1087
Procurement - Used for smaller projects and usually involves a pre-qualified contractor
Sole source
1088
Procurement - Commonly used by non-government organization.
Request for proposal
1089
This type of procurement's specifications can be generic and performance based
Request for proposal
1090
Procurement - Used by government when a competitive bid is required and the award be given the lowest \*qualified\* bidder
Invitation for bid
1091
¿Qué proceso utiliza un administrador de seguridad para establecer prioridades en la protección de activos? 1. Encuesta de auditoria 2. Encuesta de seguridad 3. Análisis o evaluación de riesgos. 4. Revisión de inspección 5. Tanto byc 6. Todas las anteriores
E. Tanto byc
1092
The degree of protection desired in any installation is predicated on an analysis of which of the following? 1. Cost and vulnerability 2. Cost and criticality 3. Criticality and vulnerability 4. Vulnerability and environmental conditions 5. None of the above
C. Criticality and vulnerability