How Tall is That Building

How Tall is That Building

All of Chicago knows the building as the Sears Tower, but some residents inside the tower have paid a fee to rename it the Willis Tower. Don’t tell a Chicagoan it’s the Willis Tower, however, you’ll just get a smirk and laugh.

How Tall is That BuildingThe Sears Tower is 1,450 feet tall without the antennae, which is a serious “moneymaker” in its own right. The building has 4.3 million square feet of rentable space, of which 3.8 million square feet is occupied. Overall, that’s 17 city blocks that need to be accounted for in terms of safety and security.

Security is a pre-eminent duty for U.S. Equities Asset Management, who oversees the management and leasing of the building.

Keith L. Kambic is very pleased and proud of his security from the ground floor up, as he should be. It begins at the front doors of the building where security staff actually greet tower workers and visitors before they enter the doors. Their goal is to get to know those people who work in the building, even open a door for them. Inside, security officers continue the greetings and engage the public to make sure people know where they are going and to ensure they are going in the right direction. This is, after all, 106 floors of offices and businesses.

“We work to foster a relationship with our security officers,” said Kambic, who is the director of security and life safety at Willis Tower. “Our security team, including myself, are contract employees. We want to make them feel like they’re family. What it comes down to are people, policy and procedures.”

Kambic’s goal is to help the tenants feel comfortable, because workers spend so much time in the building. There are more than 100 different tenants; United Airlines, for instance, occupies 750,000 square feet of space for their 4,500 employees.

More than 12,000 employees stream into the facility on a daily basis, and building officials believe that nearly as many visitors and guests arrive on a daily basis as well. More than 125 trucks use the buildings loading dock on a daily basis, and the 104 elevators are powered by two locomotive engines.

Building the skyscraper was done by using a different design, meaning that Willis Tower is actually nine buildings all tied together. At the very heart of the security are the turnstiles, still in use, that have at best guess allowed more than 150 million workers to come and go.

“We look at everything and train for everything,” said Kambic, who works with and trains 65 full-time security officers. Training is a key point with the tower managers, who also conduct annual drills with the Chicago Fire Department and employ evacuation drills for building workers.

**Interesting graphic by Mason Currey of Metropolismag.com:

How Tall is That Building

About the Author

Ralph C. Jensen is the Publisher of Security Today magazine.

Featured

  • Survey Shows Election Anxiety Crosses Party Lines

    New reports of election worker intimidation are raising concerns about election interference. A majority of Americans (71%) are worried about voter intimidation or safety at the polls, and 75% want security cameras at their voting place, according to a new national survey. Read Now

  • 66 Percent of Cybersecurity Pros Say Job Stress is Growing

    Sixty-six percent of cybersecurity professionals say their role is more stressful now than it was five years ago, according to the newly released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • Live from GSX 2024: Post-Show Recap

    Another great edition of GSX is in the books! We’d like to thank our great partners for this years event, NAPCO, LVT, Eagle Eye Networks and Hirsch, for working with us and allowing us to highlight some of the great solutions the companies were showcasing during the crowded show. Read Now

    • Industry Events
    • GSX
  • Research: Cybersecurity Success Hinges on Full Organizational Support

    Cybersecurity is the top technology priority for the vast majority of organizations, but moving from aspiration to reality requires a top-to-bottom commitment that many companies have yet to make, according to new research released today by CompTIA, the nonprofit association for the technology industry and workforce. Read Now

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3