403 10
DESCRIPTION
403-10TRANSCRIPT
Chapter Ten: Physical and Procedural Security
http://video.foxbusiness.com/v/932711473001/wikileaks-freedom-of-press-and-national-security/
IntroductionSome factors that determine the
requirements for an individual system include a determination of what is the
actual risk or threat, what type of equipment is needed to protect the assets
of the organization, what methods are appropriate and the methods and means to deploy the whole package. Measures must be layered to provide diversity and
redundancy.
The primary function of a barrier is to delay the intruder as much as possible
and to force him to use methods of attack that are more conspicuous and noisy. As
the value of the target increases, however, the strength of the barrier must
increase proportionately. The trade-off between delay time and detection time is
perhaps the single most important consideration in designing a barrier.
Walls
At a minimum a good perimeter barrier should discourage an
impulsive attacker. To be effective a wall must be at least eight feet high
and must be substantially built. The wall should have a minimum
thickness at the top of nine inches and the foundation should have no
easy accessible footholds.
Fences
The fence itself needs to be sufficiently high, at least eight feet and should have at least six feet clear space on either side. Chain link fence is the most commonly used and is relatively cost effective. It should have a
mesh no larger than two inches and should be topped with some sort of barbed wire extending at an
outward angle. For airports, the U.S. government requires that the fence be at least 11 gauge wire.
Fence must also always be flush with the ground. If the facility is located in a sandy soil or loose soil area,
the fence needs to extend down into the ground.
Gates and Doors
Any opening larger than 20 cm must be adequately secured. All access points must be as secure as the fence or wall it breaches. To
fail to do so simply nullifies the physical barrier. Additionally, it must be adequately secured
when closed and the hinges must be sealed in order to prevent lifting. Separate pedestrian
and vehicle gates are essential. Doors need to be of solid timber or metal construction. If of
wooden construction they should be at least 44 cm thick but preferably 50 cm. A strong door
however is of little use if it can be pulled off the hinge.
1. Enable only those persons authorized to have access to secured areas to obtain that access.2. Immediately deny access at the access point to individuals whose access authority has changed.3. Have the capability of zone coding, so that it can admit or deny access by area.4. Have the capability of time-coding, being able to admit or deny access by time and date.
Access control restricts the ability of unauthorized individuals from gaining access to a specific area. Access control systems assure the proper identification of personnel across multiple facilities and locations on a selective basis, to secure areas.
The TSA obligates that access control systems must:
Smart Cards
They possess one or more integrated circuit chips capable of storing a great deal of
information and interpreting it. Smart cards are very complicated entities. It is just this
complexity which might doom them in the market place. They require sophisticated
microprocessors and exhaustive authorization procedures. Cards do not provide effective
security in the wrong hands. The card does not know who is holding it and the machine reading the signal or data does not know
either. An access card can simply not identify a specific individual using the card.
Biometrics
http://video.foxbusiness.com/search?q=Biometrics
a. Fingerprint—optical scanning of a finger which is matched to a database.b. Signature recognition—relies on the fact that individuals write with distinct motion and pressure. Forgers can duplicate the appearance but not the style.c. Hand geometry—utilizes the physical attributes of the hand such as the length of fingers.d. Speaker verification—utilizes the uniqueness of voice patterns.e. Eye retina—analyzes the blood vessel pattern of the retina.
Employees should all need to enroll their fingerprints or some other unique physical trait into a database. Currently, the following types are available commercially.
Locks
A lock is a mechanical device designed to prevent access to the object it protects. Locks are probably the most commonly used means of controlling access to
an area. The basic purpose of a lock and key system is to deter unauthorized entry. Two mechanical
principles are usually combined to defeat the intruder. The first is to utilize fixed obstructions to prevent use
except with an appropriate key and the second involves the use of movable levers that must be
aligned to function. Locks are still very valuable in that they increase the time an intruder needs to actually gain access. That time can be used to increase the
probability of being detected.
Volumes have been written on locks and how to defeat
them. Whatever type of lock is used, the longer it
takes to attack the lock, the greater the exposure for the
intruder.
Closed Circuit Television (CCTV)
Closed circuit television has become the most common security device in many applications, not just along a perimeter. The sophistication may range from simple fixed black and white
monitoring cameras to infrared capability. A significant enhancement to CCTV came with digitization. Video security
systems that protect large scale air, land, and sea transportation systems must be extremely reliable and meet a wide range of
image quality, communications, storage, and display requirements. Unfortunately, some of these attributes compete
with each other. Common to all of these requirements is the need for the utmost in system reliability. Video security systems
must be able to instantly and autonomously detect and compensate for transient and permanent faults not only in
themselves but also in the network and mass storage infrastructure on which they rely
Alarms
Should the fence, barrier, or wall be circumvented, alarm systems are the next
line of defense. Alarms can be silent, audible, or visual. There are three basic
types of alarm systems. They include intruder alarms, fire alarms, and special use
alarms. Intervention must occur to stop the actual intruder.
Signs
Signs, of course, will not stop an uninvited and unwanted intruder. However, they will redirect the inadvertent intruder or wandering visitor. All areas identified as
those needing to be restricted necessitate appropriate markings. As regards
transportation facilities, the TSA has determined that, at a minimum these
signs should be posted at intervals of no more than 100 feet.
Lighting
Adequate lighting on the perimeter is also a mandatory security function. The spread
of the light should be directed outward from the fence line. This will illuminate
the approach of an intruder and also obstruct the intruder’s view. An
unobstructed 20 foot view is useless if it is cloaked in complete darkness. No reliance
should be placed on street lights or adjacent lighting on other premises. They
cannot be controlled.
Exterior Alarm Sensors
A fence provides minimal protection. Lighting adds to the protection level.
However, the combination of a fence, proper lighting, and at least two sensors greatly increases the
probability that an intruder will be detected. Sensors can be expensive,
and the actual threat must be weighed against the cost.
Motion Detectors
These devices are based on the simple concept of detecting
motion. They operate by radio frequency or ultrasonic wave
transmission.
Microwave
Microwave motion detectors operate on the Doppler effect using an emitter and a
receiver. An energy field is transmitted into an area and monitored for a change in its pattern and frequency. Due to their
extremely high radio frequency, the microwave detection pattern can see “too
much” causing confusion as to what is actually a threat.
Electric Fields
They require a field generator that has a long field wire and a sense wire, that are placed parallel to
each other. If an intruder approaches the fence, the signal is
interrupted.
Vibration/Stress Detectors
These units can detect someone simply walking into a protected area from a completely concealed unit. Near fences they can be installed
under ground in order to follow along the terrain and the actual weight of
the intruder affects the system. Most systems can be adjusted for sensitivity so that small animals do not trigger it.
Infrared Motion Detectors
Active Infrared- Active infrared systems are photoelectric using visible or invisible
pulsed infrared beams. Passive Infrared- An infrared detector literally sets a “virtual” barrier along a path. Passive infrared detectors do not
even emit any energy. They are passive in that they do not transmit a signal for an
intruder to disturb. They are in the strictest sense only receivers which detect the body
heat of an intruder.
Glass Breaking Detectors
and a second space coverage type of
acoustical sensors that protect all the glass in a specific
area.
There are two categories of these. One which attaches directly to the glass being protected
The Control Room
All of the unique devices installed in a complete security system need to be controlled from a
central point.
Continuous Power
Unless a security system has power, it is severely
handicapped. Alarm systems should always be programmed
to report a current failure or low battery conditions. Testing
of the back-up system is critical.
The student should have developed a sense of what components of an effective security system might be lacking in a particular environment
and be able to take countermeasures consistent with the threat and vulnerability of a
particular transportation environment.
Case Study: Sometime between midnight on December 24th and 7 am on the morning of December 25th, UConn was burglarized. An alarm company, contracted for by
UConn, had received two separate alarm signals. A guard was dispatched but failed to gain entrance to the building. Later, a second company, which was monitoring a CCTV system saw burglars and called the police. However, it was too late and all of the
computers in one building were stolen. Will a disclaimer of liability in the contract stand
up in court? How could UConn have protected itself better?
Discussion Questions and Exercises
1. Define the components of an adequate barrier. 2. Local communities usually pass ordinances to curtail false alarm responses by the police. From the user’s standpoint is this an advantage or a disadvantage?3. Discuss the disadvantages of a CCTV system.4. In providing for security needs, are aesthetics important to the security manager? 5. How do private security officers assist public police in your jurisdiction?6. List the parts of an alarm system.7. Design a storage building that will contain transportation assets. Include locks, lighting, and alarms that would be appropriate.8. Obtain data from you local police on false alarms in your community.
9. Explain the pros and cons of modern biometrics.10. How has digitalization transformed CCTV?