Keeping the Bad Guys Out

Keeping the Bad Guys Out

Facilities may require something simple and low-tech

Protecting government agencies requires the widest palette of security solutions with facilities ranging from a storefront military recruitment center to a bustling international airport or a biological research center. No matter the facility’s size, location or the people and assets being protected, security begins at building entries and perimeters. It is about keeping the bad guys out.

The technology exists to meet the threats of an armed disgruntled former employee or even a common burglar. The challenge is having the right technology at the right place before it is needed.

Protecting the Perimeter

Sometimes perimeter protection solutions are simple and low-tech. Fencing, gates and immoveable barriers, such as bollards, are ideal for protecting perimeters. Fencing can be made stronger by adding razor wire to discourage climbers. Setting the fence into concretefilled trenches can slow diggers. By weaving fiber optic cable woven through the fence it’s possible to detect people attempting to cut their way into the facility. Look for nearby trees or outbuildings that could be used to scale the fence. Burying twisted-pair cable throughout the perimeter helps detect movement across open areas.

Many government installations, such as nuclear power plants, ports and airports are fronted or surrounded by a lake, river or other body of water. Anchored and/or floating fences made of stainless steel rope help block water access.

Explosive-filled vehicles have become the weapon of choice among many terrorists. Specialized fencing, made from the same cable used to stop fighter jets landing on aircraft carriers, is capable of stopping a 15,000-pound truck traveling at speeds of up to 50 miles per hour. Make sure to look for a fence’s K-rating, a measure of how much kinetic energy—speed plus weight—it can resist.

Gates provide both pedestrian and vehicular entries. They should be designed so a government security officer can open them after verifying visitors’ identities and reason to enter. This can be accomplished by a manned presence at the gate or remotely using video intercoms. These units allow an officer in a security operations center (SOC) to see and have a two-way conversation with visitors before unlocking a gate or raising a barrier.

Installing surveillance cameras add a wider views of entries and facility perimeters. Cameras are force-multipliers providing an extra set of “eyes” on a critical facility. High-resolution cameras can capture license plate or boat registration numbers, while low-light thermal cameras allow operators to view night images.

Ground and fence sensors can be integrated with the video system to trigger and direct cameras to view an alarm site for verification of events and recording images for later investigation. Another security layer, video analytics, is used for detecting movement within a camera’s field of view. The software-based tools continuously monitor video, even if a security guard has stepped away from the console.

Blue-light topped emergency towers and wall stations allow distressed employees in parking lots or on walkways to get into immediate contact with security officers for help or to report suspicious activities. They can even be used to assist visitors needing help with directions.

Entry Security

Security needs to know more about a visitor’s intentions as they reach a building entry. That’s easier to accomplish when there’s only one public entry. Fencing, landscaping and signage help direct people to the proper door.

Although glass doors are popular in many government buildings, they don’t offer the same level of protection provided by a solid-core wood or metal door. In all cases, doors need to be locked throughout the day using an electromechanical lock.

Video intercoms let security officers see and talk with visitors before remotely unlocking a door. Military recruitment centers are good examples. After a gunman shot and killed five military personnel at a Tennessee recruitment center in 2015, the Army Corp of Engineers was charged with increasing the centers’ security. Many are located in strip mall storefronts. The doors are now kept locked with video intercoms used to let visitors in. One-button units are used for single service branch offices. Multi-tenant entry stations are installed when two or more branches share a facility.

Access control systems are ideal for use at employee entries. A key pad and assigned PINs allow employees to quickly enter. Cards and readers are another choice—but proximity cards are the better choice as aging magstripe technology is easier to clone. Mobile credentialing has become a viable choice, particularly for larger government enterprise facilities. The use of smartphones adds another layer of identity authentication with a biometric or PIN required to unlock the device. There’s no place for mechanical locks and keys, which easily can be lost, stolen or copied and key management in a government facility with hundreds of employees and nearly as many doors is a nightmare.

All government employees should wear a photo ID badge at all times to identify them. Color-coded badges can indicate what area an employee is approved to access.

Visitors should present a government-issued ID to run through a visitor management system. The system will record who entered and at what time, as well as comparing the person’s name against criminal and local watch list databases. Once cleared for entry, the system takes a picture of the visitor and creates a temporary ID badge with a clearly noted expiration date.

Interior Security

It is also best to keep interiors doors locked. That’s especially true of areas where executives or other potential high-target employees work. For example, many courthouses install video intercoms in hallways leading to judges’ chambers. Each judge and a receptionist have desk stations to monitor entry requests.

Prisons use audio intercoms as a safety precaution along prisoner transport hallways. Call stations have a button for immediate communications with the security operations center. A second button activates an alarm and moves PTZ surveillance cameras to record at the site. Each door has a system on both sides. The key is to ensure guards are never more than 20 feet from an intercom.

Intercoms and/or access control readers are often placed outside records rooms, evidence storage, laboratories and areas storing or dispensing pharmaceuticals. These and other areas requiring higher levels of security often add biometric readers using fingerprint and iris scans to ensure identity authentication.

Surveillance cameras are vital in hallways, stairwells and doorways. Municipal operators of stadiums and arenas often choose 4K cameras for their ability to provide highly detailed video. Also, fewer 4K units are required to cover large areas as compared to analog or standard HD cameras.

Government agencies are looking more often to real-time incident management systems that monitor the data from the access control and video systems. Users define alarm situations, such as a fight in a stadium or a door improperly left open. Matches result in an alarm in the security operations center or on smartphones carried by patrolling guards.

Each of these elements—video, access, sensors and analytical data—needs to be integrated and centralized in one location. The integrated SOC is the day-to-day heart of security and safety operations. Every aspect of the security effort is collected and reviewed here. That’s why it’s important to have someone with decision-making capabilities onsite at all times.

Emergencies

Their size, responsibilities and locations make government agencies prime targets for terrorists or other criminals. Emergencies can happen at any time. That is why it’s important to plan ahead—not to simply react in the middle of a crisis. Plans need to be put into writing and shared with all agency employees. Each should have a role during a crisis. Then, the plan needs to be practiced frequently.

Clear communications are vital during any manmade or natural emergency. Intercoms can be used to provide vital data throughout buildings, while speakers allow them to reach people outdoors. Computer- based emergency communications systems can share information via email with employees not at work and, if appropriate, be used to notify local law enforcement of any situations.

This is not an all-inclusive look at the tools available for government security use but does show how different systems and plans can integrate to create a stronger solution. And with the term “government” being so broad, it’s easy to see why there’s no one-sizefits- all plan.

That is a good reason for engaging a systems integrator experienced at working with large-scale and/or sensitive government facilities. With a full security plan in place, it’s possible to ensure the continued operation of vital services provided by local, state and federal agencies.

This article originally appeared in the October 2018 issue of Security Today.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”