Professional Documents
Culture Documents
Cert Review, CPP, 2018, Domain 5
Cert Review, CPP, 2018, Domain 5
Examination
Spring 2018
www.asishouston.org
ASIS INTERNATIONAL – HOUSTON CHAPTER https://www.vexels.com/vectors/preview/143499/skyline-houston-illustration
PHYSICAL SECURITY
PHYSICAL SECURITY
PAGE 3 /223
PHYSICAL SECURITY
Domain V Task Index
• Task 05/01 Conduct facility surveys to determine the current status of physical
security
– 05/01/01 Security protection equipment and personnel
– 05/01/02 Survey techniques
– 05/01/03 Building plans, drawings, and schematics
– 05/01/04 Risk assessment techniques
– 05/01/05 Gap analysis
• Task 05/02 Select, implement, and manage physical security strategies to mitigate
security risks
– 05/02/01 Fundamentals of security system design
– 05/02/02 Countermeasures
– 05/02/03 Budgetary projection development process
– 05/02/04 Bid package development and evaluation process
– 05/02/05 Vendor qualification and selection process
– 05/02/06 Final acceptance and testing procedures
– 05/02/07 Project management techniques
– 05/02/08 Cost-benefit analysis techniques
– 05/02/09 Labor-technology relationship
• Task 05/03 Assess the effectiveness of physical security measures by testing and
monitoring
– 05/03/01 Protection personnel, technology, and processes
– 05/03/02 Audit and testing techniques
– 05/03/03 Preventive and corrective maintenance for systems
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 4 /223
PHYSICAL SECURITY
CPTED
• Eight main categories of physical security measures…
1) CPTED
2) Physical barriers and site hardening
3) Physical entry and access control
4) Security lighting
5) Intrusion Detection
6) Video surveillance
7) Security personnel
8) Security policies and procedures
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 5 /223
PHYSICAL SECURITY
CPTED
• Crime Prevention Through Environmental Design (CPTED) (continued)…
– CPTED is the design or redesign of a venue to reduce crime opportunity and fear of crime through
• Natural means
• Mechanical means
• Procedural (organizational) means
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 6 /223
PHYSICAL SECURITY
CPTED
• Crime Prevention Through Environmental Design (CPTED) (continued)…
– CPTED is best applied using a multidisciplinary approach engaging the following stakeholders in working teams
• Planners
• Designers
• Architects
• Landscapers
• Law enforcement
• Security professionals
• Facility users (residents, employees, etc.)
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 7 /223
PHYSICAL SECURITY
CPTED
• Three classifications of CPTED strategies…
1) Mechanical measures
2) Organization measures
3) Natural or architectural measures
• CPTED strategies…
– Natural access control BASIC
– Natural surveillance BUILDING
– Natural territorial reinforcement BLOCKS
– Management and maintenance
– Legitimate activity support
– Compartmentalization
ASIS GDL FPSM-2009, Sect. 3.1.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 8 /223
PHYSICAL SECURITY
CPTED
• Crime prevention…
– While CPTED may not be able to stop determined terrorist attacks, even acts of terrorism usually start with
trespassing and unauthorized access as the property is scoped for vulnerabilities
• A criminal or terrorist may seek a different or more vulnerable target if the original target is not easily accessible or has a
proper security system in place
ASIS POA, Vol. 2, Sect. 3.2.7
– CPTED is congruent with the 3 D's: Deterring, detecting, and delaying aggressors
– Preventing crime and losses is inherent in many human functions, behaviors, and activities
• Crime prevention is not just something that police or security professionals do
ASIS POA, Vol. 2, Sect. 3.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 9 /223
PHYSICAL SECURITY
CPTED
• Territoriality…
– CPTED security standards focus on four categories
1) Perimeter and exterior security
• Parking area and parking controls
• Video surveillance monitoring
• Lighting with emergency backup
• Physical barriers (including landscaping and planting designs)
2) Entry security
• Intrusion detection system
• Upgrade to current life safety standards
• Mail, person, and package screening
• Entry control with video surveillance and electric door strikes
• High-security locks
3) Interior security
• Employee IDs and visitor controls
• Control of access to utilities
• Emergency power for critical systems
• Location of day care centers
4) Security planning
• Locations of tenants based on their particular security needs
• Blast standards (security glazing, bomb-resistant design and construction)
• The criteria balance cost-effectiveness, acceptance of some risk, and the need for federal buildings to be accessible to the public
ASIS POA, Vol. 2, Sect. 3.2.7
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 10 /223
PHYSICAL SECURITY
CPTED
• Territoriality (continued)…
– Perimeter definition and access control can deter unwanted pedestrian access to a garage or lot
• Fencing
• Level changes
• Ground-floor protection
• Other architectural and environmental barriers that channel people to designated entry points and discourage others
from hiding outside or inside the facility
– In CPTED terms, graffiti represents a designation of turf by gangs or vandals and should be removed as
quickly as possible
• Wall surfaces can be coated with graffiti-resistant epoxy paint
• Lighting levels can be increased in problem areas to increase the potential for natural surveillance
• Attempts to prevent graffiti tell vandals the property is the territory of its rightful owners
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 11 /223
PHYSICAL SECURITY
CPTED
• Building-in CPTED (continued)…
– Integrating CPTED during initial planning is more cost-effective than making changes after construction starts
• Once a property is built, it is much more difficult and expensive to make structural changes for security purposes
• Designing without security in mind can lead to
– Lawsuits
– Injuries
– Expensive retrofitting
– Need for additional security personnel
• Security measures added after construction may
– Distort important building functions
– Add to security personnel costs
– Result in exposed, unsightly installations
ASIS POA, Vol. 2, Sect. 3.1, 3.2, 3.2.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 12 /223
PHYSICAL SECURITY
CPTED
• Building-in CPTED (continued)…
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 13 /223
PHYSICAL SECURITY
CPTED
• Building-in CPTED (continued)…
– Questions to be answered about people who will occupy the new or renovated building
• Who are the users? (visitors, staff, service crew, sales)
• Why are the particular users there? (official business, visiting as guests)
• What is the information? (trade secrets, personnel records, classified information, operational or business plans, etc.)
• What format is the information? (personal knowledge, hardcopy, electronic media, models/prototypes, equipment, etc.)
• Why is the information worth protecting? (competition, critical technology, privacy, contractual/ legal restrictions, etc.)
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 14 /223
PHYSICAL SECURITY
CPTED
• Building-in CPTED (continued)…
– Steps to be considered when protecting government buildings from bombing attacks
• Establish a secure perimeter around the building, as far out as possible – setbacks of 100ft are suggested
• Design concrete barriers as flower planters, etc. and position them near curbs with less than 4ft between them to block cars
• Build a simple rectangular layout to minimize the diffraction effect when blast waves bounce off U- or L-shaped buildings
• Reduce or eliminate building ornamentation that could break away in a blast, causing further damage
• Provide unobstructed views around the facility site, and place the facility within view of other occupied facilities
PHYSICAL SECURITY
CPTED
• Building-in CPTED (continued)…
– Potential CPTED problems in schools
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 16 /223
PHYSICAL SECURITY
CPTED
• Building-in CPTED (continued)…
– The United States has no national guidelines or standards for bank facility lighting
• Some cities and states have standards
ASIS POA, Vol. 2, Sect. 3.2.6
• Low-growing plants should be set back 1 yard (1 m) from the edge of paths or walkways
• Low-growing shrubs should be kept no higher than 32 inches (81 cm) in height
• Thorny shrubs should be used in hiding places, areas of illegitimate activity, and under windows
– Thorny plantings may attract litter; a low perimeter fence may be needed to keep windblown debris away
• Hard landscaping should be vandal-resistant and not provide potential missiles, such as cobblestones or loose gravel
• Landscape features and furniture should not be climbing aids; furniture should be short-term use and not usable for sleeping
• Tree canopies should be trimmed up to 8ft to provide a clear line of site and reduce hiding spots
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 17 /223
PHYSICAL SECURITY
CPTED
• Building-in CPTED (continued)…
– Parking garages should be equipped with
• Ground-level metal screening, but not floor-to-ceiling (to prevent climbing to upper floors)
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 18 /223
PHYSICAL SECURITY
CPTED
• Building-in CPTED (continued)…
– Parking garages (continued)
• Elevators with glass for exterior visibility, along the exterior of the facility
• Adequate lighting
– To maximize natural surveillance, it is best to place a surface parking lot where it can be viewed from the road
and nearby occupied buildings
– Parking facility signage should include letters that are at least eight inches tall, and graphics should be used
instead of text whenever possible
– Interior of parking garages should be painted light colors to increase light reflection
ASIS POA, Vol. 2, Sect. 3.2.4
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 19 /223
PHYSICAL SECURITY
Security Technology
• Maturity model for security technologies…
– Research: The scientific basis is established, but the security application has not necessarily been identified. An
example could be the discovery of the ferroelectric properties of lithium niobate, a material that has been used
to sense IR energy in IR detectors.
– Level I: Concept feasibility is established in a laboratory demonstration.
– Level II: Research prototype. A prototype is hand-built in a laboratory, breaks a lot, and cannot withstand an
operational environment.
– Level III: Engineering prototype. This prototype has about 90 percent functionality; reliability is improving.
– Level IV: Field prototype. This fully functional prototype works in an operational environment; produces
reliable, repeatable results; is user-driven and accepted; and is ready to progress to full-scale production.
– Level V: Commercial off-the-shelf technology (COTS). Manufactured production units are available, with
infrastructure in place for replacement parts and technology support.
– Level VI: Performance testing. This testing is done to establish performance metrics, such as probability of
detection, NARs, vulnerability to defeat, performance degradation factors, and sensor-to-sensor interference.
This type of testing takes approximately 12 months for outdoor applications so that all weather conditions can
be observed.
– Level VII: Onsite testing. This is done to determine actual performance in the desired operational environment,
foliage, weather, and terrain, including integration into the site monitoring station.
– Level VIII: Nontechnical maturity factors. This is the site’s concept of operations, addressing such issues as how
the response force should use the information provided, how it should respond, and whether legal or policy
issues prevent use of the technology.
ASIS POA, Vol. 2, Sect. 4.3.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 20 /223
PHYSICAL SECURITY
Access Control and Entry Control
• Access control…
– Categories
• Manual
• Machine aided
• Automated
– Designed to
• Permit only authorized entry/exit
• Detect and prevent the entry of contraband
• Detect and prevent the unauthorized removal of assets
• Provide information to security officers for assessment
and response
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 21 /223
PHYSICAL SECURITY
Access Control and Entry Control
• Entry control…
– An entry control subsystem
• Is NOT an access control system
• Is part of the detection function
• Allows the movement of authorized personnel and material into and out of facilities
• Detects and possibly delays movement of unauthorized personnel and contraband
• Includes the following performance measures
– Throughput
– Error rates
• Refers to the physical equipment used to control the movement of people or material into an area
– Because the technical issues associated with the installation and use of entry control hardware are different than the administrative
controls required to manage authorized access, they require separate consideration in order to achieve an effective and integrated
subsystem
ASIS POA, Vol. 2, Introduction
ASIS POA, Vol. 2, Sect. 8
– The objectives of an entry control system used for physical protection are
• To permit only authorized persons to enter and exit
• To detect and prevent the entry or exit of contraband material (weapons, explosives, unauthorized tools, or critical assets)
• To provide information to security personnel to facilitate assessment and response
ASIS POA, Vol. 2, Sect. 8
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 22 /223
PHYSICAL SECURITY
Access Control and Entry Control
• Verification of authorization of personnel to enter a controlled area is usually based on…
• Types of tokens/credentials…
• Badge technologies…
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 23 /223
PHYSICAL SECURITY
Access Control and Entry Control
• Badge technologies (continued)…
– Bar code
• Widely used in retail trade to automatically identify products at the point of sale
• Sometimes used on coded credentials
• Varying widths of the bars and spaces between them establish the code
• An opaque covering increases security and becoming more common on bar codes
• 2-D bar codes are also used on credentials and are capable of storing more information than their 1-D bar codes
ASIS POA, Vol. 2, Sect. 8.1.4
– Proximity
• Non-contact card
• Classified by the method of powering the badge, operating frequency range of the badge, and read-only or read/write
capability
• A small RF transponder/transmitter is powered by an onboard battery (active) or it is
energized by the card reader (passive)
• Low-frequency badges are in the 125 kHz range
• High-frequency badges range from 2.5 MHz to over 1 GHz
• A read-only badge contains a specific code that is usually fixed at the time of manufacture
and cannot be changed
• A read/write badge usually contains a larger data field than read-only badges and can be
programmed by the system manager as required
ASIS POA, Vol. 2, Sect. 8.1.4
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 24 /223
PHYSICAL SECURITY
Access Control and Entry Control
• Badge technologies (continued)…
– Smart card
• The size of a standard bank credit card with an integrated circuit embedded in the card
• Gold contacts on the surface of the card allow for communication with a reading device
• Contactless smart cards use RF communications and do not have the gold contacts
• Memory-only circuits store only the badge number, user’s name, and other information
• True smart card: 8 kb to 64 kb microprocessor
• Main advantages: Large memory and its high degree of resistance to forgery or compromise
• Ability to encrypt communications
• Can be prohibitively expensive
• Homeland Defense Presidential Directive 12 (HSPD12)
– Signed by President George W. Bush in August 2004
– Directs the entire federal government and all contract agencies to use a single, high-security credential
– Based on Federal Information Processing Standard 201 (FIPS 201)
– Uses both contact and contactless smart card technology
– Primarily affects federal and federal contractor facilities
– GSA and NIST: Oversight for development and testing of credentials, related equipment and issuance procedures
ASIS POA, Vol. 2, Sect. 8.1.4
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 25 /223
PHYSICAL SECURITY
Access Control and Entry Control
• Personal identity verification systems…
– Biometrics
• Corroborate claimed identities on the basis of one or more unique
physical biometric characteristics of the individual
• Can differentiate between
– Verification
• The user initiates a claim of identity by presenting a credential,
PIN or password
• The user also presents a biometric feature for analysis
• The system performs a one-to-one comparison of the biometric data on the
credential, or linked to the PIN/password in a database, with the presented
biometric feature
• The system verifies the identity of the user and determines access authorization
based on privileges in the database
– Recognition
• The user does not initiate the transaction with a credential, but offers a biometric
feature
• The system attempts to identify the unknown individual based on the feature
• The system performs a one-to-many comparison against a database
• The system either finds a match and recognizes the user and determines access
authorization based on privileges in the database, or it does not recognize the user and
prevents entry
– All personal identity verification systems consider three things
• The uniqueness of the feature used for identification
• The variability of the characteristic
• The difficulty of implementing the system that processes the characteristic
– Type I error rate: False rejection of a valid user
– Type II error rate: False acceptance of an invalid user
– Equal error rate: Cross-over point where Type I and Type II errors are equal
• Not necessarily the point at which the device should be operated
• Not the lowest point for either type of error
ASIS POA, Vol. 2, Sect. 8.1.5
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 26 /223
PHYSICAL SECURITY
Access Control and Entry Control
• Personal identity verification systems (continued)…
– Fingerprints
• Used as a personnel identifier for more than 100 years
• Still considered one of the most reliable means of distinguishing one individual from another
• Most systems use image processing and pattern recognition
– Minutia points
– Ridge endings
– Bifurcations
• Some systems use the entire image for comparison
• Fingerprint acquisition methods
– Prism with a solid-state camera
– Ultrasound
– Direct imaging sensors with solid-state devices
– Capacitive
– Electric field
– Thermal
ASIS POA, Vol. 2, Sect. 8.1.5
– Hand/finger geometry
• Characterizes the shape of the hand
• Measures three-dimensional features of the hand such as the widths and lengths of fingers and the
thickness of the hand
• Generally measures the right hand face-down on a platen, but can also measure the left hand
face-up on the platen
• Utilizing a solid-state camera to image the hand, including from the side, a "feature vector" is
created
• Can achieve Type I and Type II error rates of less than 1%
• Also available as a two-finger geometry system (index and middle fingers)
ASIS POA, Vol. 2, Sect. 8.1.5
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 27 /223
PHYSICAL SECURITY
Access Control and Entry Control
• Personal identity verification systems (continued)…
– Eye pattern
• Imaging of the iris by a video camera
• Operates in the recognition mode
• 10-12" read distance (no physical contact)
• Eye is illuminated with visible light
• Some issues with glare from glasses - caused some
Type I errors, no Type II errors
• Transaction times are 4-5 seconds (experienced users)
• 2% of population cannot be enrolled due to blindness or
other eye issues
– Face
• Utilize distinguishing characteristics of the face
• Captured with video camera or thermal image
• Problems in development include
– Wide variations in the presentation of the face
– Lighting variations
– Not yet as reliable as other biometrics
– Can be useful in identifying wanted criminals or others on a watch list within a crowd
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 28 /223
PHYSICAL SECURITY
Access Control and Entry Control
• Personal identity verification systems (continued)…
– Voice
• Speech measurements: Waveform envelope, voice pitch period,
relative amplitude spectrum, resonant frequencies of vocal tract
• Minimal training
– Handwriting
• Used for many years by the banking industry
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 29 /223
PHYSICAL SECURITY
Access Control and Entry Control
• Access control barriers include…
– Doors
– Gates
– Turnstiles
– Elevators
ASIS GDL FPSM-2009, Sect. 3.3.1
• Electromechanical locks…
– Types
• Electric deadbolts
• Electric latch
• Electric strike
• Electric lockset
• Exit device
• Electromagnetic lock
– Fail safe: Device unlocks upon loss of power (but may stay latched - "positive latching")
– Fail secure: Device locks upon loss of power
PHYSICAL SECURITY
Alarm Communication and Display (AC&D)
• AC&D: Alarm communication and display…
– The part of a PPS that transports alarm and assessment information to a central point and presents the
information to a human operator
ASIS POA, Vol. 2, Sect. 7
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 31 /223
PHYSICAL SECURITY
Alarm Communication and Display (AC&D)
• Two critical elements of alarm communication and display…
– Transportation or communication of data
– Presentation or display of that data to a human operator in a meaningful manner
ASIS POA, Vol. 2, Sect. 7
• When an alarm event occurs, the AC&D system must communicate to the operator the following
information…
– Where an alarm has occurred
– What or who caused the alarm
– When the alarm happened
ASIS POA, Vol. 2, Sect. 7.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 32 /223
PHYSICAL SECURITY
Alarm Communication and Display (AC&D)
• Graphical User Interfaces (GUI's)…
– Limits the ways information is displayed and which operations are allowed
– Up to three windows displayed at once
– Operators should not have to move or resize windows to view information
– Menus should not be overcomplicated (no more than nine items and three levels)
– Common commands should be available as buttons; only commands valid in the current context available
– Visible buttons should be limited to nine, and include text labels
– Maps should eliminate excessive details, generally be 1:5000 in scale, interactive, and black-and-white
– No map should include more than 50 sensor icons (some may need to be grouped)
– Color should be used sparingly (no more than seven), and should not be required to operate the system
– Major commands should require only one mouse click or key press
– Annunciators should not override operations in progress
– Should avoid loud, continuous alarms or bright, flashing displays
– Commands should be available in several ways
(menu items, buttons, shortcut keys, etc.)
ASIS POA, Vol. 2, Sect. 7.5.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 33 /223
PHYSICAL SECURITY
Alarm Communication and Display (AC&D)
• Subsystems of an alarm communications and display (AC&D) system…
– Communications
– Line supervision and security
– Information handling
– Control and display
– Assessment
– Off-line subsystems
ASIS POA, Vol. 2, Sect. 7.1
• Speed of communications…
– No perceptible delay (tenths of a second)
– Sufficient bandwidth of communications media
– Appropriate communications protocols (or overhead)
ASIS POA, Vol. 2, Sect. 7.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 34 /223
PHYSICAL SECURITY
Alarm Communication and Display (AC&D)
• Communications security…
– Line protection
• Outside lines should be installed underground
• Inside wiring should be encased in conduit
• Underground telephone service connection, preferably from a distant utility pole
• Divide communications requirements between two providers
– Line supervision
• Simplest line supervision: End-of-line (EOL) resistor (detects open circuit, ground, wire-to-wire short)
• Higher protection
– Minimizing the permissible variance in circuit value
– Using quasi-random pulses, which must be recognized by the control equipment
– Using shifts in the transmission frequency
ASIS POA, Vol. 2, Sect. 7.4.1
– Scramblers
• Scramblers disguise interceptible communications
• Scrambler selection depends on the importance of the information, and the skill of the aggressor
• Two characteristics of voice that can be scrambled
– Frequency (pitch of the voice) (most typically scrambled)
– Amplitude (loudness)
• Frequency inverters: Simplest, low cost, tolerates poor communications channel; can be understood by trained listener
• Band splitters: Breaks up speech band in to smaller, inverted and re-arranged frequency bands - a 5-band splitter can generate
3,080 different combinations, 90% of which are no better than a frequency inverter
• Rolling band splitters: Continuously modifies the arrangement patterns of the band splitter, but some degree of information
can still be obtained by a trained listener
• Frequency or phase modulators: Similar to a rolling band splitter, but changes the phase rather than the frequency of the voice
- still susceptible to some small degree of intelligible communication
• Masking: Adds an outside signal into the voice band - typically only effective when used with another scrambler
• Rolling codes: Use of a pseudo-random generator creates varying key-streams used to decode the voice transmission for rolling
band splitters, frequency and phase modulators, and many masked voice scramblers.
ASIS POA, Vol. 2, Sect. 7.4.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 35 /223
PHYSICAL SECURITY
Alarm Communication and Display (AC&D)
• Transmission of alarm signals…
• Audio transmissions require the use of shielded, • In the U.S. power is usually transmitted at 60 Hz; in
twisted pairs of alternating current (AC) wires other countries, the transmission may be at different
frequencies
– Referred to in telephone parlance as voice-grade
lines • A device can be installed on the line to couple the
higher-frequency communication signals to the AC
– Alarm signals and audio transmissions may both wire path
be transmitted on the same pair of twisted,
shielded wires • At the receiver, the frequencies above 60 Hz are
ASIS POA, Vol. 2, Sect. 7.3.1
separated and displayed or recorded
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 36 /223
PHYSICAL SECURITY
Alarm Communication and Display (AC&D)
• Transmission of alarm signals (continued)…
– Optical fiber
• A system operating at 565 Mbits—565,000,000 bits per second—can support 8,064 telephone conversations per fiber
• Virtually any combination of video, data, and audio one at a time or simultaneously, one way or two ways, over a single fiber
• An optical fiber is a strand of high-purity spun glass, typically about the thickness of a human hair
• A laser or LED sends a modulated beam through the fiber, unattenuated and unchanged, to the other end, where it is decoded
– The LED is the light source of choice – it has a longer life without maintenance, and is less sensitive to humidity and power fluctuations
• Optical fibers can be used to carry voice-grade signals, video signals, and digital or data grade signals
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 37 /223
PHYSICAL SECURITY
Alarm Communication and Display (AC&D)
• Video transmission methods…
– Coaxial cable
• No processing required if transmission distance is short enough, typically 1,000 ft
• Longer transmissions can be achieved if the signal is amplified along the way
– Telephone lines
• Video signals on normal telephone circuits are converted to digital, then to audio signals
– The audio is reconverted to video at the receiving end
• Telecommunications are continuously amplified; there is no theoretical limit to the distance
• Signal can move from wire to microwave to satellite, as required by the phone switch
– Optical fiber
• Conversion from video to optical signals at the transmitter, reconverted at the receiver
• The transmission distance without amplification is 1 mile or more
• Real-time transmission
• Supports color or monochrome video equipment
• Data signals (PTZ, heater, other controls) are transmitted over the same optical fiber
• Three functions can be transmitted simultaneously in two directions on one fiber
– DC wire
• Video signals cannot be transmitted directly on DC lines
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 38 /223
PHYSICAL SECURITY
Alarm Communication and Display (AC&D)
• Three types of line transmission used in electronic protection systems…
– Loop (multiple points on a single circuit; addressed or non-addressed)
– Multiplexed signals should always be backed-up by a redundant means of communication, as the lost of a
multiplexed signal will interrupt multiple sensors.
PHYSICAL SECURITY
Alarm Communication and Display (AC&D)
• Wireless transmission…
– A wireless communication requires
• A transmitter to furnish radio frequency energy
• An antenna to radiate the energy into the atmosphere
• A receiver
• Power for the transmitter and receiver
– Wireless modulation
• AM: Amplitude modulation (variations are in the amplitude, or range, of the signal)
• FM: Frequency modulation (variations are in the frequency of the signal)
– Private communications systems may be interconnected with the public telephone network
when in compliance with Part 68 of the FCC rules, and when the telephone company is advised
of the FCC registration number and ringer equivalency rating on the equipment
ASIS POA, Vol. 2, Sect. 7.3.5
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 40 /223
PHYSICAL SECURITY
Alarm Communication and Display (AC&D)
• Wireless transmission (continued)…
– Cellular communications
• Service areas are divided into cells
• Cells are grouped into clusters
• Cells can be any shape
• Each cell in a cluster has a unique frequency, but frequencies are repeated in other clusters
• Power levels of transmitters are not sufficient to allow receipt of the same frequency in another cluster
• Call are "handed-off" between adjoining cells as the user moves through them
• U.S. cellular frequencies: 800 MHz(analog) or 1,900 MHz (digital)
• Other countries' cellular frequencies (in some cases): 900 MHz or 1,800 MHz
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 41 /223
PHYSICAL SECURITY
Alarm Communication and Display (AC&D)
• Wireless transmission (continued)…
– Wireless PABX (private automatic board exchange) uses low-power transmission with handheld phones within
a limited range - interceptible if not protected
– Local digital fixed wireless system - provided by a local telecommunications provider and serves as wireless
"home phones" to multiple subscribers (eliminates the need for wired home phone service)
ASIS POA, Vol. 2, Sect. 7.3.2
– Satellite communications
• GEO: Geo-stationary earth orbit satellites
– High altitudes (22,300 miles)
– Inherent signal delay
– Television, digital voice, fax, data, email
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 42 /223
PHYSICAL SECURITY
Alarm Communication and Display (AC&D)
• Wireless transmission (continued)…
– Microwave transmission
• Operates between 30-300 GHz
• Requires microwave generator, power amplifier, modulator, antenna
• One-way and two-way communications
• Often require FCC licenses
• Penetrates rain, fog, snow and man-made noise
• Used in television, multiplexed telephone, multiplexed alarm, and high-speed data transmissions
• Line-of-sight (LOS) required
ASIS POA, Vol. 2, Sect. 7.3.3
– Laser communication
http://scis.athabascau.ca/html/courses/comp200/fo/comp200/grphc060.html
• Light amplification by stimulated emission of radiation (LASER)
• Laser light is modulated at a very rapid rate
• A phot-detector at the receiver demodulates the laser
• Virtually impossible to intercept the beam without detection
• 4-mile transmission, line-of-sight
• Reflectors can be used with no LOS is possible, but
resolution quality is reduced
• Interference from snow, fog and rain
• No FCC license required
ASIS POA, Vol. 2, Sect. 7.3.4
PHYSICAL SECURITY
Intrusion Detection
• Intrusion detection…
– The process of detecting a person or vehicle attempting to gain unauthorized entry into an area
– Includes exterior and interior intrusion sensors, video alarm assessment, entry control, and alarm
communication systems working in combination
– Boundary is a sphere for detecting surface, air, underwater, or underground intrusions.
– Exterior: Emphasis on or slightly above the ground surface (airborne detection increasing)
ASIS POA, Vol. 2, Sect. 4.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 44 /223
PHYSICAL SECURITY
Intrusion Detection
• Sensors are the basic building blocks of an intrusion detection system…
– They initiate the detection function of the security system, indicating an intrusion attempt
or a tamper event
If the sensor is inappropriate for the operating environment or the threat, or is not installed,
operated, maintained, and tested properly, the output of the entire system is severely limited,
becoming a greater burden than benefit - sensor selection must match the application and
environment
- ASIS POA, Vol. 2, Sect. 4.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 45 /223
PHYSICAL SECURITY
Intrusion Detection
• Probability of detection (PD)…
– Perfect is a "1" - reality is always less than 1
– Confidence Level (CL) is often described in conjunction with PD
• Unstated CL implies a 90% or better confidence level
– PD is always conditional
– PD also varies by sophistication of threat (refer to DBT)
– When a high PD is required at all times and all weather conditions, use of multiple sensors
• Nuisance Alarm Rate (NAR)…
– A nuisance alarm is any alarm not caused by an intrusion
• The NAR identifies the number of nuisance alarms over a given period (ideally zero, but not realistic)
• Alarm assessment is needed to preserve manpower - without assessment, detection is incomplete
• Natural causes: vegetation, wildlife, weather conditions, etc.
• Industrial causes: ground vibration, debris moved by wind, electromagnetic interference, etc.
PHYSICAL SECURITY
Intrusion Detection
• Common sources of nuisance alarms for sensors…
– Thermal sources
– Meteorological sources
– Seismic sources
– Optical effects
– Wildlife
ASIS POA, Vol. 2, Sect. 4.4, 4.4.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 47 /223
PHYSICAL SECURITY
Intrusion Detection
• Vulnerability to Defeat…
– All sensors can be defeated
– The objective is to make the system very difficult to defeat
– Two general ways to defeat the system
• Bypass: - Going around the detection volume/limits
• Spoof: - Passing through the sensor’s normal detection zone without
generating an alarm
ASIS POA, Vol. 2, Sect. 4.1.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 48 /223
PHYSICAL SECURITY
Intrusion Detection
• Passive sensors…
– Two types
• Detect target-generated mechanical energy (walking, climbing, vibration, etc.)
• Detect target-emitted energy in a natural field of energy (heat, sound, magnetic fields, etc.)
– Sensors are harder to locate by aggressors because they do not emit energy
– Safer to use in explosive environments
– Passive infrared, mechanical activity (walking/climbing), vibration, etc.
• Active sensors…
– Transmit energy and detect changes to it
– Include transmitter and receiver (bi-static)
– Create fewer nuisance alarms
– Microwave, active infrared, RF, etc.
ASIS POA, Vol. 2, Sect. 4.3.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 49 /223
PHYSICAL SECURITY
Intrusion Detection
• Types of motion detectors…
– Microwave
– PIR
– Dual technology
– Ultrasonic
– Beam detectors
ASIS GDL FPSM-2009,
Sect. 3.5.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 50 /223
PHYSICAL SECURITY
Intrusion Detection
• Wireless sensors…
– May be motion detectors, line/point sensors, etc.
– Operate in the 300MHz or 900 MHz bands
– Transmitters (sensors) sleep until they go into alarm
– Transmit "state-of-health" messages at pre-determined intervals
– Issues include
• Collisions - multiple messages received at the same time, causing none to be read
• Fading - degradation of signal due to distance
• Interference - other signals overpowering the sensors' signals
– Resolution to issues include
• Spread-spectrum transmissions
• Dithering of state-of-health transmission timing
ASIS POA, Vol. 2, Sect. 4.4.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 51 /223
PHYSICAL SECURITY
Intrusion Detection
• UL / ANSI standards applicable to intrusion sensors…
– 365 Police Station Connected Burglar Alarm Units and Systems
– 606 Linings and Screens for Use with Burglar Alarm Systems
– 609 Local Burglar Alarm Units and Systems
– 611 Central-Station Burglar Alarm Systems
– 634 Connectors and Switches for Use with Burglar Alarm Systems
– 636 Hold-Up Alarm Units and Systems
– 639 Intrusion Detection Units
– 681 Installation and Classification of Mercantile and Bank Burglar Alarm Systems
– 1037 Anti-Theft Alarms and Devices
– 1076 Proprietary Burglar Alarm Units and Systems
– 1610 Central Station Burglar Alarm Units
– 1635 Digital Burglar Alarm Communicator Units
– 1641 Installation and Classification of Residential Burglar Alarm Systems
ASIS POA, Vol. 2, Sect. 4.2.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 52 /223
PHYSICAL SECURITY
Intrusion Detection
• Exterior application sensors are divided into three categories…
– Buried line
– Fence-associated
– Freestanding
ASIS POA, Vol. 2, Sect. 4.3.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 53 /223
PHYSICAL SECURITY
Intrusion Detection
• Exterior, perimeter intrusion sensors (continued)…
– Fence disturbance sensors
• Passive, visible, terrain-following
• Attached to fence
• Detect motion or shock
• May be one of several technologies
– Fiber-optic
– Strain-sensing cable
– Vibration-sensing, etc.
• Nuisance alarm sources are common, including wind,
rain/hail, nearby vibrations (i.e. traffic, etc.)
• Can be defeated by crossing over the fence without touching it,
or tunneling under the fence
• Fence posts should flex/move no more than 1/2" against a
50lb force at 5 feet of height
• Fence fabric should flex/move no more than 2.5" against a
30lb force centered between posts
– Sensor fences
• Passive, visible, terrain-following
• The sensor cables form the fence itself
• Horizontally-stretched, high-tension wires, at 4" or less apart
• Includes taut-wire fences
• Designed to detect climbing, separation of wires, or cutting
• Less susceptible to nuisance alarms - requires about 25lbs of
force to activate alarm
• Can be defeated by crossing over the fence without
touching it, or tunneling under the fence
ASIS POA, Vol. 2, Sect. 4.3.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 54 /223
PHYSICAL SECURITY
Intrusion Detection
• Exterior, perimeter intrusion sensors (continued)…
– Electric field or capacitance sensors
• Active, visible, terrain-following
• Detects change in "capacitive coupling" in wires isolated from the fence itself
• Range can extend to 3.3 feet (more nuisance alarms)
• Susceptible to lightning, rain, small animals, motion of the fence itself
• Requires good electrical grounding
• Less susceptible to crossing over or tunneling under the fence
ASIS POA, Vol. 2, Sect. 4.3.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 55 /223
PHYSICAL SECURITY
Intrusion Detection
• Exterior, perimeter intrusion sensors (continued)…
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 56 /223
PHYSICAL SECURITY
Intrusion Detection
• Exterior, perimeter intrusion sensors (continued)…
– Perimeter detection systems should use protection-in-depth philosophies, relying on two or more simultaneous
lines of detection, especially in high-security facilities
• Complementary sensors may also be considered to increase the effectiveness of a sensor deployment
– Each sensor brings its own strengths and weaknesses to the overall security plan - complementary sensors do not have the same
nuisance sources and probability of detection under each possible scenario
– Sensors should be prioritized for assessment purposes - higher PD sensors have first priority
– Sensor combinations operate in two ways
• OR basis: Either sensors triggers the alarm; higher PD, higher NAR
• AND basis: Both sensors are required to trigger the alarm; lower PD, lower NAR
• Clear zones bounded by fences on both sides are preferable for perimeter detection systems
– No sensors should be mounted on the outside fence
• Configuration of multiple sensors should be arranged to provide overlapping coverage AND separate lines of coverage
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 57 /223
PHYSICAL SECURITY
Intrusion Detection
• Exterior, perimeter intrusion sensors (continued)…
– Barriers designed to delay intrusion should be placed along the inner fence line of a dual-fence line clear zone,
to prevent tampering with the barriers without first traversing the detection zone
– A clear zone "compromise" width between 10 and 15 yards facilitates reduction of nuisance alarms (wide) and
high resolution for alarm assessment by cameras (narrow)
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 58 /223
PHYSICAL SECURITY
Intrusion Detection
• Interior intrusion sensors…
– Interior intrusion sensors are highly effective against insider threats when the following, complementary
measures are in place
• Administrative procedures
• Access controls
• Material monitoring
ASIS POA, Vol. 2, Sect. 4.4
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 59 /223
PHYSICAL SECURITY
Intrusion Detection
• Interior intrusion sensors (continued)…
– Electromechanical sensors
• Passive, visible, line/point sensors
• Magnetic reed switches (doors, windows, etc.)
• Balanced magnetic switches (BMSs) or bias magnets –
higher sensitivity than reed switches, less susceptible to spoofing
• Hall effect switch detects field of magnet - no moving parts - measures charge separation and
polarity - most advanced switch
• Continuity/break wire - wires embedded or attached to surface, activated by cutting (security
screens, etc.), low NAR (May use optic fibers instead of wires)
– Vibration sensors
• Passive, visible or covert
• Jiggle switches
• Inertial switches: metal ball mounted on metal contacts –
detects vibration frequencies between 2-5kHz
• Piezoelectric sensors: sensing element that flexes at frequencies between 5-50kHz
• Fiber-optic cables detect microbending caused by vibration
– Glass-break sensors
• Glass-mounted, passive (vibration activated); detect >=20kHz vibrations
• Glass-mounted, active; generate vibrations received by another device
elsewhere on the glass (lower NAR)
• Ceiling-mounted, passive; listen for frequency of breaking glass; volumetric by design; not
vibration activated
– Interior motion sensors
• Monostatic microwave (common)
• Passive infrared (PIR) (common)
• Dual technology
• Video motion detection (VMD)
ASIS POA, Vol. 2, Sect. 4.4.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 60 /223
PHYSICAL SECURITY
Intrusion Detection
• Interior intrusion sensors (continued)…
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 61 /223
PHYSICAL SECURITY
Intrusion Detection
• Interior intrusion sensors (continued)…
– Microwave
• Active, visible, volumetric
• 10GHz frequency range; senses Doppler Shift of returned frequency
• Best positioned to sense aggressors moving towards or away from sensor; slow-moving targets may spoof microwave sensors
• Microwave horn, printed circuit planar, or phased array antenna
• Various detection patterns available; concave portion of detection zone is vulnerable
• Penetrates most glass and normal wall materials (not metal)
• Immune to high air turbulence and temperature/humidity changes; susceptible to "pattern drift" and can reflect off metal
• Often used in automatic door openers; multiple microwave sensors in the same area must be on different frequencies
• Ionized gas in fluorescent lighting can reflect microwaves and cause nuisance alarms
– Proximity sensors
• Pressure mats
– Largely obsolete - replaced by motion detectors
– Detected weight of 5-20 lbs per square foot
– Still used in security portals (man traps) to prevent tailgating - based on valid user's weight in database
• Capacitance sensors
– Large, electrical condenser that radiates energy
– Detects changes in capacitive coupling between antenna and the ground
– Target touches protected object and absorbs some of the radiated energy, generating an alarm
ASIS POA, Vol. 2, Sect. 4.4.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 62 /223
PHYSICAL SECURITY
Video Surveillance
• Video surveillance systems…
– Alternative names for "CCTV“: Digital Imaging System (DIS) or Visual Imaging System (VIS)
ASIS POA, Vol. 2, Sect. 5.4
– When selecting a video surveillance system, use a systems approach rather than a components approach
ASIS GDL FPSM-2009, Sect. 3.6.1.3
– Legal considerations
• Avoid cameras where reasonable expectation of privacy exists
• Covert cameras are generally legal but consult an attorney
• Dummy cameras are a liability; they provide a false expectation
of protection
• Signs re of video monitoring are acceptable (be careful of wording)
• Recorded video must meet standards for quality, time/date stamp,
and % of scene occupied by the subject (among other things and
depending on the jurisdiction) to be admissible as evidence
• In some jurisdictions, the presence of a unique scene identifier in
recorded video is required
• Digital watermarking is utilized with varying degrees of success
ASIS POA, Vol. 2, Sect. 5.10
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 63 /223
PHYSICAL SECURITY
Video Surveillance
• Three reasons for cameras in security applications…
– Obtain visual information about something that has happened (most important)
– Detection of activities
– Recording of incidents
– Assessment of alarms/incidents
ASIS GDL FPSM-2009, Sect. 3.6
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 64 /223
PHYSICAL SECURITY
Video Surveillance
• Main elements of a video surveillance system…
– Field of view (FOV)
– Scene
– Lens
– Camera (including mounting hardware)
– Transmission medium
– Monitor
– Recording equipment (analog or digital)
– Control equipment
ASIS GDL FPSM-2009, Sect. 3.6
4) PTZ unit
5) Controller (aka keyboard, joystick, etc.)
6) Switcher (or sequential switcher, quad splitter, multiplexer ("mux"), matrix switcher
7) Lens
8) Video transmitter/receiver
9) Amplifier
10)Video recorder
ASIS POA, Vol. 2, Sect. 5.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 65 /223
PHYSICAL SECURITY
Video Surveillance
• Three main components of a digital video surveillance system…
1) Camera
2) Digital electronic signal carrier
3) PC with software
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 66 /223
PHYSICAL SECURITY
Video Surveillance
• Designing the VSS…
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 67 /223
PHYSICAL SECURITY
Video Surveillance
• Designing the VSS (continued)…
– Steps for design
1) Define the system’s purpose
2) Define each camera's purpose
3) Define the areas to be viewed by each camera
4) Choose a camera style
5) Choose the proper lens
6) Determine best transmission method
7) Layout control area
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 68 /223
PHYSICAL SECURITY
Video Surveillance
• Video resolution…
– Resolution (limitation of resolution) is determined by the following, in order
1) The camera
2) The transmission method
3) The weakest link in the video system interface
4) The reproduction capability of the storage system
– Limiting factors
• Analog video recorders average a playback of 325 horizontal lines (very low)
• DVR's digitize analog signals, dropping 25% of the resolution
• Sloppy installation or cheap coaxial cable costs 10-15% of resolution
• Digital compression also reduces resolution
ASIS POA, Vol. 2, Sect. 5.7
– Analog resolution
• The monitor paints horizontal sweep lines one at a time, left to right, top to bottom
• The monitor paints an equal or greater number of vertical sweep lines
• A pixel is the intersection of the horizontal and vertical sweep lines
• The more pixels a monitor displays, the better the overall resolution or quality of detail within the image
• Vertical resolution is restricted by NTSC4 or PAL5 standards
• Horizontal resolution is the most common measurement of the quality because it is limited only by the camera imager,
monitor, and bandwidth
• 2:1 interlace pattern
– The monitor first paints the odd-numbered horizontal sweep lines of the image
– The monitor resweeps the screen with the even-numbered horizontal sweep lines
– This process creates 60 fields (half pictures) of information per second in NTSC
– This process creates 50 fields per second in PAL
– Combining one odd field and one even field of video information produces one complete frame or picture of analog video.
– In NTSC the viewer sees 30 complete frames per second
– In PAL the viewer sees 25 complete frames per second
ASIS POA, Vol. 2, Sect. 5.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 69 /223
PHYSICAL SECURITY
Video Surveillance
• Video resolution (continued)…
– Digital resolution
• Does not use 2:1 interlace
• Digital images are presented on the monitor as a full grid of small, colored squares, or pixels
• Real-time digital video may not be represented by 30 frames per second
– Real time is based on the needs of the application, on a camera-by-camera basis
– Perhaps 20% of cameras in a system may be recording at a different frame rate from the other cameras
– Video is no longer held to NTSC or PAL standards; Instead it is held to the various digital standards established for visual media
– Digital standards vary around the world, but all digital knowledge is being standardized on a universal basis
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 70 /223
PHYSICAL SECURITY
Video Surveillance
• Video resolution (continued)…
– All IP cameras measure resolution as a multiple of the Common Intermediate Format (CIF) (about half the
average 325 horizontal lines; not recommended as a usable standard for storage)
• 1/4 CIF = 176 X 120 (3,520 pixels or 0.003 megapixels)
• CIF = 352 x 240 (84,480 pixels or 0.08 megapixels)
• 4 CIF = 704 x 480 (337,920 pixels, or 0.3 megapixels)
• 16 CIF = 1408 x 960 (1,351,680 pixels, or 1.3 megapixels)
• 32 CIF = 2816 x 1920 (5,405,720 pixels, or 5.4 megapixels)
ASIS POA, Vol. 2, Sect. 5.6.1
PHYSICAL SECURITY
Video Surveillance
• Fields of View (FOV)…
– Three considerations when determining video surveillance fields of view (FOV)
• Target (person, vehicle, etc.)
• Activity (assault, slight-of-hand, etc.)
• Purpose (identification vs general monitoring, etc.)
ASIS GDL FPSM-2009, Sect. 3.6.1.1
• Action identification
– Ability to identify and document exactly what happened
– Frame rate is particularly important
– Automated triggers can be used (integration with sensors)
• Scene identification
– Ability to accurately identify a location
– Includes ability to read accurate character generation on the screen
ASIS POA, Vol. 2, Sect. 5.2
http://www.ncitymacs.com/CamPage.html
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 72 /223
PHYSICAL SECURITY
Video Surveillance
• Fields of View (FOV) (continued)…
– Theoretical identification views of a digital VSS
• General: Cannot distinguish clothing and colors - pixelated zoom [5 pixels/ft]
• Detect: Detect but not identify person-sized object - no significant detail on zoom [11 pixels/ft]
• Recognize: High degree of accuracy identifying and separating known individuals - good detail on zoom [35 pixels/ft]
• Subject Identification: Establish identity beyond shadow of a doubt - excellent detail on zoom [46 pixels/ft]
• License Plate Identification: Identification of license plates - excellent detail on zoom [70 pixels/ft]
– Identification of an object in video means the ability to differentiate between peoples' identities.
– Cameras should not auto-pan more than 45 degrees left or right of the major focus
ASIS POA, Vol. 2, Sect. 5.5
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 73 /223
PHYSICAL SECURITY
Video Surveillance
• Cameras…
– While different camera models are commonly used in the same video surveillance system, it is critical to ensure
compatibility of language and format between manufacturers
ASIS POA, Vol. 2, Sect. 5.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 74 /223
PHYSICAL SECURITY
Video Surveillance
• Cameras (continued)…
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 75 /223
PHYSICAL SECURITY
Video Surveillance
• Cameras (continued)…
– Camera features
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 76 /223
PHYSICAL SECURITY
Video Surveillance
• Camera lenses…
– The lens is one of the few elements of a video system not converting to digital
• Various functions of the lens can be automated (auto-iris, zoom/varifocal, focus)
ASIS POA, Vol. 2, Sect. 5.4
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 77 /223
PHYSICAL SECURITY
Video Surveillance
• Camera lenses (continued)…
– The human eye has peripheral vision equal to approximately 2.5 times that of a standard lens
• 1" format camera = 25mm lens (standard/human eye)
• 1/2" format camera = 12.5mm lens (standard/human eye)
• 1/3" format camera = 8mm lens (standard/human eye)
• 1/4" format camera = 6mm lens (standard/human eye)
• 2/3" format camera = 16mm lens (standard/human eye)
ASIS POA, Vol. 2, Sect. 5.6.2, 5.7
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 78 /223
PHYSICAL SECURITY
Video Surveillance
• Video storage/recording…
– When storing and using security video, it is important to decide whether the system’s purpose is to
• Verify information
• Prove information
• Aid a prosecution with the information
• This decision helps determine the type of video imaging, degree of quality or resolution, and frame rate
– The only reason to reduce bandwidth and storage space is cost. Methods to reduce these requirements include
– Types of recorders
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 79 /223
PHYSICAL SECURITY
Locking Systems
• Locks…
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 80 /223
PHYSICAL SECURITY
Locking Systems
• Primary types of locks…
– Warded (first type, very weak security, skeleton keys, old houses, antiques)
– Lever (18th century, more security than warded locks, master keyable, safe deposit boxes)
– Pin tumbler (19th century, Linus Yale, most widely used, can be high security, residential/
office locks, master-keyable)
– Wafer tumbler (sometimes double-bitted keys, mostly furniture locks, lower security than pin
tumblers, master-keyable)
– Dial combination (safes, mechanical or electronic, many combinations (dial #'s to the
power of spins))
PHYSICAL SECURITY
Locking Systems
• Locking systems…
– If it is not clear who has access to what spaces, a locking program is not secure
– If it is not possible to provide multiple levels of access, the program is not convenient
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 82 /223
PHYSICAL SECURITY
Locking Systems
• Locking system considerations…
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 83 /223
PHYSICAL SECURITY
Locking Systems
• Locking policy should do the following…
– Require a systematic approach be taken to the use of locks for security purposes
– Assign specific responsibility for the development of the lock program
– Make all persons responsible for compliance with the program requirements
ASIS POA, Vol. 2, Sect. 8.3.3
• Master keying…
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 84 /223
PHYSICAL SECURITY
Lighting
• Three primary functions of security lighting…
– Deter criminal activity
– Life safety functions
– Support of video surveillance
ASIS POA, Vol. 2, Sect. 6
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 85 /223
PHYSICAL SECURITY
Lighting
• Terms…
– Lumen: The quantity of light emitted by a lamp
• A typical 100 watt incandescent bulb outputs about 1700 lumens
– Lux: The metric measure of illuminance (lumens per square meter); 1 FC = 10.76 lux (approximately 10:1 ratio)
– Reflectance: The percentage of light reflected from a scene, which depends on the incident light angle, and the
texture and composition of the reflecting surface
ASIS POA, Vol. 2, Sect. 6.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 86 /223
PHYSICAL SECURITY
Lighting
• Light color…
– White balance is the automatic adjustment within the camera for the color temperature of the light source
• Ranges from 2,200 to 7,000 degrees Kelvin
– Infrared spectrum
700 nm to 1,100 nm
– Ultraviolet spectrum
10 nm to 400 nm
ASIS POA, Vol. 2, Sect. 6.6
NASA
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 87 /223
PHYSICAL SECURITY
Lighting
• Light uniformity and coverage…
– Uniformity: The measurement of variation in lighting levels
• Working environments are 1 : 0.7
• Pedestrian walkway is 4 : 1
• Roadway is 10 : 1
• Higher uniformity levels provide better depth perception and greater perception of security
ASIS POA, Vol. 2, Sect. 6.3
– Along building facades where individual exterior objects cannot be adequately lit,
providing a high contrast will give good identification of shape and movement - flood
lights work well for this purpose
– A bright white, horizontal strip along the interior walls of parking structures provides
higher contrasts and facilitates object identification
ASIS POA, Vol. 2, Sect. 6.5
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 88 /223
PHYSICAL SECURITY
Lighting
• Light uniformity and coverage (continued)…
– The amount of light necessary to produce a usable video signal from any video
camera is a function of these factors
• The type and brightness of the source
• The amount of light energy illuminating the scene of interest
• The portion of the light reflected from the scene
• The amount of light transmitted by the lens to the imager
• The sensitivity of the imaging device itself
ASIS POA, Vol. 2, Sect. 6.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 89 /223
PHYSICAL SECURITY
Lighting
• Lighting implications to video surveillance (continued)…
– Lighting considerations for video surveillance
• CRI
• Reflectance of materials
• Directionality of reflected light
ASIS POA, Vol. 2, Sect. 6.6
– The two most important parameters of a lighting system for video surveillance are its
• Minimum intensity
• Evenness of illumination
– Cameras are light-averaging devices - All lighting in the camera’s FOV must be even, not just the target area
– The sensitivity of a CCTV camera can be defined as the minimum amount of illumination required to produce a
specified output signal. The following factors are involved in producing a video signal
• Illuminance level of the scene
• Spectral distribution of the illumination source
• Object reflectance
• Total scene reflectance
• Camera lens aperture
• Camera lens transmittance INCANDESCENT
& HALOGEN TRIPHOSPHORE
METAL
• Spectral response of the camera imager FLUORESCENT
HALIDE COATED HIGH
FLUORESCENT
• Video amplifier gain, bandwidth, MERCURY PRESSURE
SODIUM
CLEAR
MERCURY LOW
PRESSURE
and signal-to-noise ratio SODIUM
• Electronic processing circuitry
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 90 /223
PHYSICAL SECURITY
Lighting
• Lighting implications to video surveillance (continued)…
– Camera sensitivity may sometimes be overstated based on these two, commonly used factors
• Higher scene reflectance than normally encountered
• Greater transmittance than is commonly available in standard auto-iris lenses with neutral density spot filters
ASIS POA, Vol. 2, Sect. 6.1
– A minimum of 1.5 fc is required for a camera system using an f/1.8 or faster lens and a solid-state imager
• This assumes reflectivity of 25%
• This also assumes a light : dark ratio of no more than 4:1
• 4:1 ratio is allowed to creep to 6:1 as materials age
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 91 /223
PHYSICAL SECURITY
Lighting
• Protective lighting…
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 92 /223
PHYSICAL SECURITY
Lighting
• Lamp comparisons…
– High-intensity discharge (HID) lamps
• Metal halide
• Mercury vapor
• High-pressure sodium
• Require an electrical arc within a gas to generate illumination
• Require steady electrical voltage - cannot tolerate fluctuations in power
• Require lengthy hot restart times - up to 20 minutes - because the tube must cool to re-generate the arc
• Offered with two tubes, one used at a time, to reduce restart times
• Should have back-up power in security/safety areas
ASIS POA, Vol. 2, Sect. 6.2, 6.4
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 93 /223
PHYSICAL SECURITY
Lighting
• Lighting levels…
– Rule of thumb for outside lighting: You should be able to read a driver's license or newspaper with some
eyestrain
ASIS GDL FPSM-2009, Sect. 3.4.2
https://www.archtoolbox.com/materials-systems/electrical/recommended-lighting-levels-in-buildings.html
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 94 /223
PHYSICAL SECURITY
Lighting
• Lighting levels (continued)…
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 95 /223
PHYSICAL SECURITY
Lighting
• Lighting levels (continued)…
– For pedestrian walkways and roadways, vertical lighting illuminates the path
and helps identify potholes or other tripping hazards. Horizontal lighting aids in
the identification of pedestrians and camera usage
ASIS POA, Vol. 2, Sect. 6.5
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 96 /223
PHYSICAL SECURITY
Lighting
• Lighting levels (continued)…
– Light output in an office or other clean environment declines by 3 to 4% each year due to dirt accumulation on
lighting fixtures and bulbs
• Recommended light cleaning cycle is every three years
• A dirty environment may result in a reduction of up to 20% per year in light output due to dirty lighting
ASIS POA, Vol. 2, Sect. 6.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 97 /223
PHYSICAL SECURITY
Barriers
• Barrier types…
– Natural
– Structural (man-made)
• Barrier purposes…
– Physically and psychologically deters the undetermined
– Delays the determined
– Channels authorized traffic
– Discourages unauthorized access that takes place by
• Accident
• Force
• Stealth
– Explicitly defines territorial boundaries
– May be used to prevent views of the facility
– May be used to prevent placement of listening devices
• Barrier notes…
– Should be supported by interior clear zone whose width
depends on the threat
– Should be supplemented by sensors and/or other security
measures
– Should not provide concealment opportunities or climbing aids
– Should not obstruct lighting, video surveillance, or intrusion
detection
– Should not facilitate observation of the facility
ASIS GDL FPSM-2009, Sect. 3.2.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 98 /223
PHYSICAL SECURITY
Barriers
• Structural barriers…
– Walls, doors, windows, roofs, floors, etc.
ASIS POA, Vol. 2, Sect. 9.3
• Balanced design…
– Layered barriers provide equal delay –
no weak links
– Barrier penetration begins two feet in front of
the barrier, and ends two feet beyond it
ASIS POA, Vol. 2, Sect. 9.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 99 /223
PHYSICAL SECURITY
Barriers
• Fences and walls…
– Are the most common perimeter barriers
– Define areas and give notice of a protected property line
– Demonstrate commitment to security and may stop a casual trespasser
– Channel traffic and reduce the required number of security personnel
– Provide intrusion detection and/or video surveillance zone
– Force intruders to demonstrate intent to enter the property
– Must be maintained
ASIS GDL FPSM-2009, Sect. 3.2.1.1
– Walls are generally more resistant to penetration than are doors, windows, vents, and other openings
• Most walls can be breached with the right tools
• Using explosives and cutting tools, an adversary can make a "crawl hole" through 18" reinforced concrete in under five minutes
• Increasing wall thickness usually adds only a moderate delay against explosives, even though the amount of explosive needed
increases substantially with wall thickness
• Ordinary reinforced concrete walls can be penetrated quickly because they are generally designed to support structural loads,
not to thwart or delay penetration
• Placing two or more reinforced concrete walls in series results in longer penetration delays than using one wall that is as thick
as the two walls combined
• Removing the rebar often takes longer than removing the concrete; delay can be increased by using additional rebar,
increasing rebar size, or decreasing rebar spacing
• Use earth cover or other overburden to delay access to the wall itself
• Hardening a normally constructed building against forcible penetration for a significant period is rarely practical or cost-
effective
ASIS POA, Vol. 2, Sect. 9.3, 9.3.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 100 /223
PHYSICAL SECURITY
Barriers
• Fences…
– Wire toppers on fences do not prevent intrusion, but rolls of barbed tape on or near them can increase delay
• One of the most cost-effective additions to a fence is to attach a roll of barbed tape to the outriggers
• Typically, barbed-tape rolls are placed inside an outer perimeter fence and outside an inner (double) fence
• The direction of the outriggers makes little difference in fence climbing times
• Directing the outriggers to point toward the inside does eliminate the handgrip used by intruders when
climbing over the fence
ASIS POA, Vol. 2, Sect. 9.2.1
– Inner fence-lines (double fence areas such as prisons) are spaced a minimum of 10 - 20 ft
from the outer fence-line
ASIS GDL FPSM-2009, Sect. 3.2.1.1.2
– Wooden, picket fence slats should be spaced apart no more than 1-3/4", and the
horizontal rails (top vs bottom) should be 50" apart
ASIS GDL FPSM-2009, Sect. 3.2.1.1.8
– Electrified fencing
• Most industrial, electrified fences are 8' tall with 20 wires fitted to the inside of the chain
link perimeter fence
• Pulses electrical energy 45 times per minute
• Two types
– All live wire "deterrent" fence (less common)
– "Monitored" fence (more common)
– Expanded metal
• Four basic types
– Standard/regular
– Grating
– Flattened
– Architectural or decorative
ASIS GDL FPSM-2009, Sect. 3.2.1.1.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 101 /223
PHYSICAL SECURITY
Barriers
• Gates…
– Establish points of entry and exit to an area defined by fences and walls
– Limit or prohibit the flow of pedestrian or vehicular traffic
– Establish a controlled traffic pattern
– Should provide equal levels of delay as perimeter fences
ASIS POA, Vol. 2, Sect. 9.2.2
• Doors…
– While walls may be hardened, doors tend to be a weak link in a structure because of their functional
requirements and associated hardware
• If the door assembly cannot be sufficiently enhanced (door, frame, hinges, bolt and lock), it may not be cost-effective to
upgrade the building structure
• Most common exterior doors are 1 3/4" thick with 16 or 18 gauge steel surface sheets, usually hollow or filled with composite
material
• It only takes about one minute to defeat exposed hinges and remove the door from the frame
– This vulnerability can be mitigated by welding the hinge pin heads to the hinge knuckles, using the hidden
"stud-in-hole" method, or affixing a Z-strip to the rear face of the door
ASIS POA, Vol. 2, Sect. 9.3.2
– Most industrial windows and doors can be penetrated in less than one minute
ASIS POA, Vol. 2, Sect. 9.3
– Door classifications
• Standard industrial doors
• Personnel doors
• Attack-and bullet-resistant doors
• Vehicle access doors
• Vault doors
• Blast-resistant doors
• Turnstile gates
ASIS POA, Vol. 2, Sect. 9.3.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 102 /223
PHYSICAL SECURITY
Barriers
• Doors (continued)…
– Unnecessary, external doors should be eliminated, as well as unnecessary, external (exposed) door hardware
• Doors can be reinforced with steel plates on their surfaces, heavy duty hinges, and filling frames with concrete
• Installing wood cores in metal doors, especially using redwood, increases the delay time for thermal cutting tools by 3x or 4x
• Prying or spreading the jamb from the door usually only requires 1/2" to 3/4" of space to defeat the lock
– This vulnerability can be mitigated with welded, 2" wide metal strips (astragals or block plates), concrete-filled frames and high
security deadbolts
ASIS POA, Vol. 2, Sect. 9.3.2
• Windows…
– Windows can be hardened with additional or heavier fasteners in the
frames, or by welding the frames
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 103 /223
PHYSICAL SECURITY
Barriers
• Windows (continued)…
– Wire glass
• Used often in fire doors and fire windows
• The 1/4" material is fabricated with diamond, square, or hexagonal wire patterns
• Can be penetrated with hand tools in about 20 seconds
– Laminated glass
• Made of two or more panes of annealed float, sheet, or plate glass
• Bonded to a layer or layers of plastic
– Security glass that is 9/16" thick requires 15 minutes of work with hand tools to produce a crawl-through hole
• Utility portals…
– "Utility ports" are openings other than doors and windows,
through which maintenance and other functions might be
performed
– Most tunnels used to link buildings are not protected very well
PHYSICAL SECURITY
Barriers
• Roofs…
– Can be enhanced in several ways (new and existing)
• Enhancing membranes with embedded screen
• Adding several inches of rigid insulation
• Using concrete reinforced with deformed steel bars and expanded steel mesh
• Forming larger rebar into several rows or layers for reinforced concrete
• Increasing the number of fasteners and adding structural members to corrugated roofs
• Using mechanical fasteners or joints and a continuous weld and heavier gauge material on metal roof systems
• Using larger rebar to strengthen the flange area of precast concrete tee beams
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 105 /223
PHYSICAL SECURITY
Barriers
• Vehicle barriers…
– A moving vehicle possesses kinetic energy, which must be dissipated by the vehicular barrier
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 106 /223
PHYSICAL SECURITY
Barriers
• Vehicle barriers (continued)…
• A ramming vehicle passes through or over it and is still a functioning vehicle or a second vehicle is
driven through the breached barrier, or
• The vehicle barrier is removed or bridged and a functional vehicle passes through or over it
– Vehicle barriers outside the detection and assessment zone are not recommended
ASIS POA, Vol. 2, Sect. 9.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 107 /223
PHYSICAL SECURITY
Barriers
• Dispensable barriers…
– Materials include
• Rigid polyurethane foam
• Stabilized aqueous foam (also fire retardant; can include irritants)
• Smoke or fog
• Sticky thermoplastic foam
• Various entanglement devices
ASIS POA, Vol. 2, Sect. 9.3.5
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 108 /223
PHYSICAL SECURITY
Barriers
• Dispensable barriers (continued)…
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 109 /223
PHYSICAL SECURITY
Safes and Vaults
• Categories…
– Safes weighing less than 750 lbs are considered portable and UL standards
require they be anchored in place
ASIS POA, Vol. 2, Sect. 9.4
– Should not be used where they can fall during a fire, as they may break open
and allow compromise of the contents
ASIS POA, Vol. 2, Sect. 9.4.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 110 /223
PHYSICAL SECURITY
Safes and Vaults
• Fire resistant safes (continued)…
– Electronic media containers are designed to protect contents to 125 or 150 degrees, and 80% humidity, for one,
two, three and four hours periods (125-1, 150-1, 125-2, 150-2, etc.)
• Burglary safes…
– GSA-approved safes come in six classes for protection against forcible or surreptitious entry, and are used for
storing classified information
ASIS POA, Vol. 2, Sect. 9.4.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 111 /223
PHYSICAL SECURITY
Safes and Vaults
• Vaults…
– Rooms that may be built to theft-resistant or fire-resistant (less expensive) standards
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 112 /223
PHYSICAL SECURITY
Contraband Detection
• Methods…
– Manual search – Explosives detection (bulk and trace)
– Metal detectors – Chemical and biological agent detection
– Package searches (x-ray, etc.)
ASIS POA, Vol. 2, Sect. 8.2
– Manual search
• Advantages: Low hardware investment, flexibility
• Disadvantages: Slow throughput, higher labor costs
ASIS POA, Vol. 2, Sect. 8.2.1
– Metal detectors
• Magnetometer
– Passive technology detects changes to Earth's magnetic field caused by ferromagnetic materials
– Does not detect non-magnetic metals
– Outdated; not used for many years
• Continuous wave
– No longer commercially available
– Active technology detects changes to its own magnetic field
– Generates a "steady-state" magnetic field 100 Hz to 25 kHz
– Requires the subject/package to pass between transmitter and receiver coils
– Magnitude of response depends on metal's conductivity, magnetic properties, shape and size, and orientation
• Pulsed field
– Active technology detects eddy currents in metals produced by pulses
– 400 to 500 pulses per second
– Magnitude of response depends on metal's conductivity, magnetic properties, shape and size, and orientation
– Object orientation has less effect on results
• Handheld
– Better for detecting small amounts of metal
– Considered more intrusive
– Takes more time and manpower
ASIS POA, Vol. 2, Sect. 8.2.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 113 /223
PHYSICAL SECURITY
Contraband Detection
• Methods (continued)…
– Package searches
• Manual or active interrogation
– Single-energy-transmission X-ray (low penetration, simple applications, not effective for explosives detection)
– Higher-energy X-ray and multiple-energy X-ray (screening large, dense containers and vehicles)
– Computed tomography (CT)
– Backscatter X-ray
• Low-Z materials: Materials with low atomic numbers ("Z-numbers"); materials starting with
hydrogen and ending with Z-number 26, Aluminum
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 114 /223
PHYSICAL SECURITY
Contraband Detection
• Methods (continued)…
– Bulk explosives detection
• Macroscopic, detonable amounts of explosives
• Usually uses ionizing radiation that is not safe for use on people
• Can determine calculated mass, density, nitrogen, carbon, oxygen content, and
effective atomic (Z) number
• Multiple-energy X-rays and backscatter X-rays more readily identify low Z-number materials
• High-energy X-rays are large, fixed mechanisms designed to scan large cargo containers
– May be combined with backscatter X-ray technology for detection of low Z-number materials
– Instead of X-rays, these devices may use gamma rays or neutrons for detection (very high penetrating)
• Thermal neutron activation (TNA): Detects the presence of nitrogen through gamma wavelengths
• Pulsed fast neutron absorption (PFNA): Determines carbon and oxygen content
• Determination of nitrogen, carbon and oxygen content lends more accuracy to separating explosives from food items
• Food items/cargo cannot be irradiated at energy levels of more than 10 milli-electron volts (MeV) (international law)
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 115 /223
PHYSICAL SECURITY
Contraband Detection
• Methods (continued)…
– Bulk explosives detection (continued)
• Low-dose backscatter X-ray technology is safe for humans, producing ~10 microrem per dose
(NRC limit is 100 millirem per year)
• CT scans spin sensors on a gantry around the package and produce a 3D image that detects small threat masses; may be
subject to high NARs
• Quadruple resonance (QR) technology uses pulsed low-energy radio waves to detect nitrogen-rich materials
– Can be defeated by shielding contents/materials with thin sheets of metal, but can detect and report the shielding efforts
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 116 /223
PHYSICAL SECURITY
Contraband Detection
• Methods (continued)…
– Trace explosives detection
• Sampling methods
• Challenges
– Low vapor phase concentrations of several common high explosives (parts per billion and parts per trillion)
– Absorption of explosive molecules upon most materials at room temperature and decomposition
upon moderate heating or exposure to high energy, and thus, loss of significant sample material in collection and transport
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 117 /223
PHYSICAL SECURITY
Contraband Detection
• Methods (continued)…
– Trace explosives detection (continued)
• Technologies
– Ion mobility spectrometry (IMS): Ni-63, ion drift time, Faraday plate; low NAR, sensitive, easy operation, robust, low maintenance
– Colorimetry: sprays, test paper, ampoule; portability is excellent, but high NAR, strong smell, disposal of chemicals
– Chemiluminescence: photochemical detection, fast gas chromatograph, nitrogen oxide, ozone, nitrogen dioxide, phototube,
photoemission, electron capture detectors (ECD's); excellent sensitivity to common high explosives but must expensive, longest
analysis time, more maintenance
– Mass spectrometry: magnetic and electric fields, mass-to-charge ratio, quadrupole mass
spectrometry, quadrupole ion trap time of flight, ion detector, parent ions, daughter ions,
many configurations; gold standard, high specificity, low limits of detection but high cost,
high maintenance, and expert operators required
– Canine olfaction: Very mobile and effective, but not generally used for check-points
(fixed locations), requires skilled handlers and healthy dogs, frequent rest breaks,
constant retraining, and recurring cost of handlers
– Trace explosives detection portals: Uses puffer in conjunction with an ion mobility
spectrometer or mass spectrometer, 10-25 seconds to screen a subject, automated
detection, high sensitivity, non-invasive but large, expensive (~$150k),
and high maintenance.
ASIS POA, Vol. 2, Sect. 8.2.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 118 /223
PHYSICAL SECURITY
Contraband Detection
• Methods (continued)…
– Chemical agent detection
• Uses point sensors at perimeters
– Most biological agents are not immediately lethal, impacting necessary response times
– Usually requires several hours for collection and analysis of air samples
ASIS POA, Vol. 2, Sect. 8.2.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 119 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• The primary objectives of a PPS are…
• Detection
• Delay
• Response
– Deterrence is a secondary objective because
relying on deterrence is risky
ASIS POA, Vol. 2, Sect. 3
– Aggravating factors
• Improper or limited training
• Ineffective or non-existent procedures
ASIS POA, Vol. 2, Sect. Intro
• System…
– A "system" is a collection of products, processes or both combined to provide a solution to a problem or goal
– Systems, not components, are optimized to yield the most effective design solution to the problem
– ASIS definition of "systems approach to problem solving": A logical method for problem solving in which a
comprehensive solution is developed in relation to a problem having several dimensions
ASIS POA, Vol. 2, Sect. 1.1
– In the security context, a system is a combination of equipment, personnel, and procedures, coordinated and
designed to ensure optimum achievement of the system’s stated objectives
ASIS POA, Vol. 2, Sect. 12.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 120 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• PPS Integration…
– "Integration" is the combination of a variety of components such as people, technology and procedures
– The security manager must simply be able to oversee the process of providing an integrated system solution to
physical security problems
– The business goals and objectives of the enterprise frame the high-level PPS goals and objectives
– Business elements such as budget, time to complete, and staff availability define the limits of what can be
accomplished using a PPS
– The security manager should engineer the PPS by using the building blocks of people, procedures, and
technology
ASIS POA, Vol. 2, Sect. 1.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 121 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• PPS Integration (continued)…
– "Delay-in-depth" = "Protection-in-depth"
ASIS POA, Vol. 2, Sect. 9.1
– The effect produced on the adversary by a system that provides protection-in-depth will be
• To increase uncertainty about the system
• To require more extensive preparations prior to attacking the system
• To create additional steps where the adversary may fail or abort the mission
ASIS POA, Vol. 2, Sect. 2.1.1
– Regardless of how the investigation tool is used, it is an important design element in a PPS and should be used
when appropriate
– In addition to use of the investigative tool, some corporations are applying more resources to the use of
technical surveillance countermeasures, such as sweeps and searches for electronic bugging devices
– Procedural changes can be cost-effective solutions to physical protection issues, although when used by
themselves they will only protect assets from the lowest threats
ASIS POA, Vol. 2, Sect. 2.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 122 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• PPS Analysis…
– Analysis evaluates whether the PPS’s people, procedures, and technology are achieving the PPS functions of
detection, delay, and response
• Also referred to as a site survey or vulnerability assessment
• May be qualitative or quantitative
ASIS POA, Vol. 2, Sect. 11.1
– Qualitative analysis
• Lower-security applications
• i.e. retail, restaurants, small businesses, etc.
– Quantitative analysis
• Higher-security applications
• Unacceptably high impact, despite level of probability
• i.e. museums, refineries, airports, etc.
• Requires immediate, onsite response to events
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 123 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• PPS Analysis (continued)…
COMPLIANCE-BASED (QUALITATIVE)
PERFORMANCE-BASED (QUANTITATIVE)
"Feature-based"
Easier to perform
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 124 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• PPS Analysis (continued)…
...countering threats
...reducing vulnerabilities
• Detection
– Probability of detection
– Time for communication and assessment
– Frequency of nuisance alarms
– Delay
– Time to defeat obstacles
• Response
– Probability of accurate communication to response force
– Time to communicate
– Probability of deployment to adversary location
– Time to deploy
– Response force effectiveness
ASIS POA, Vol. 2, Sect. 2.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 125 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• PPS Analysis (continued)…
– A key principle of analysis is that an initial baseline must first be established; upgrades are then
considered if the baseline shows that the PPS does not meet goals and objectives
ASIS POA, Vol. 2, Sect. 11.1
– Interruption
• Arrival of responders at a deployed location to halt adversary progress, which may lead to neutralization
• Probability of Interruption (PI)
– Neutralization
• Defeat of the adversaries by responders in a face-to-face engagement
• Probability of Neutralization (PN)
– Adversary path
• An ordered series of actions against a facility, which, if completed, results compromise of assets
– A neutralization analysis is completed for any facility with an immediate response intention to
confront adversaries
• Neutralization is the force continuum, ranging from mere presence to deadly force
• Neutralization analysis represents a measure of response force capability, proficiency, training, and tactics
• Assumes interruption has already occurred
• Can use qualitative (low, med, high likelihood of neutralization based on force advantage in numbers,
weapons, skill, etc.) and quantitative (generally determined by computer modeling) techniques
ASIS POA, Vol. 2, Sect. 11.3.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 126 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• PPS Analysis (continued)…
– Adversary sequence diagram (ASD)
• A functional representation of the PPS at a facility that is used to describe the specific protection elements present
• The ASD illustrates the paths that adversaries can follow to accomplish sabotage, theft or other harm
• There are three basic steps in creating an ASD for a specific site
– Describing the facility by separating it into adjacent physical areas
– Defining protection layers and path elements between the adjacent areas
– Recording detection and delay values for each path element
• A path analysis is conducted first to determine whether a system has sufficient detection and delay to result in interruption
– The path analysis uses estimated performance measures, based on
the defined threat tools and tactics, to predict weaknesses in
the PPS along all credible adversary paths into the facility
• For a specific PPS and a specific threat, the most
vulnerable path (the path with the lowest probability
of interruption, or PI) can be determined
• Using PI as the measure of path vulnerability, multiple
paths can be compared and an estimate of overall
PPS vulnerability can be made
• The biggest mistake in ASD is to follow a single
path from off-site to the target location and only
do an analysis on that path
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 127 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• PPS Analysis (continued)…
– Adversary sequence diagram (ASD) (continued)
• The best method for creating an ASD is to walk or drive around the exterior of the area, then repeat the same inside
– This is supplemented by the use of site drawings showing overall site layout and specific interior building details
• One ASD is required for each asset location
• Sabotage incidents require evaluation of only entry paths, as exit paths become irrelevant once the damage is done
• ASD's should be executed for day/night, open/closed, and other contradicting conditions of the facility
• "Scenario analysis" is sometimes used as a substitute for defined threats in the ASD process, but this can lead to gaps in
analysis
• Preferred approach: Analyze PPS using defined threats and path analysis, then generate scenarios by looking at weak paths
• Steps for scenario analysis
– Develop attacks and tactics designed to exploit weak paths. Consider attacks during different facility states using the defined threat
and capability
– Modify performance estimates for path elements using these tactics or under these states
– Document the assumptions used and the results of the scenario analysis
• Scenario analysis must also consider the possibility of concurrent attacks on multiple assets, concurrent threat objectives (i.e.
theft and sabotage, etc.), and attack by multiple threat teams
• Worst-case scenarios, or attacks, are utilized in neutralization analysis because they predict the lowest response effectiveness
– PPS response includes personnel and the communications system they use
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 128 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• PPS Design…
– Proper use and application of the integrated security systems design process is the most important element in
the defense against dynamic threats and potential catastrophic losses
ASIS POA, Vol. 2, Sect. 12.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 129 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• PPS Design (continued)…
PHYSICAL/GEOGRAPHIC
– Particularly important factors in system design ENVIRONMENT
are the environment and unique needs of the facility
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 130 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process…
• Procurement
• Installation
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 131 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
– Phase 1, Planning and Assessment (continued)
• Planning and Assessment phase: The first phase of any security design project
• Referred to as the Programming, or Schematic Design (SD) phase in the architectural process
• Consists of gathering all relevant pre-design asset information and analyzing it in terms of project
requirements and constraints
• Three key ingredients in the planning phase determine its eventual success
– A multidisciplinary and committed approach from either a single individual or project team is needed
– Spending the necessary time and effort in the planning phase results in a more accurate and responsive
design solution, reduced risks, reduced overall costs of potential losses, and increased longevity and
effectiveness of the installed systems
– Decisions made during the planning and assessment phase must be made on the basis of sound
and relevant risk and asset environmental information
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 132 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
• A thorough planning process must evaluate all asset vulnerabilities, and list specific functional
requirements and resultant protection strategies
• The planning and assessment phase results in a conceptual design solution that categorizes
vulnerabilities by their criticality and identifies the most preferred and cost-effective
protection scheme to mitigate or eliminate asset risks
• Another important outcome of the planning phase is the development of the business case
for the new or upgraded security systems
– Systems will be evaluated not only on quality and reliability but also on cost
– The business case documents the impact of the design solution on the business, the necessary
investments, expected quantifiable savings, and other metrics that allow decision makers to make
investment decisions on a security project
– The main feature of a security business case is a series of economic metrics (return on
investment, payback, net present value of cash flow, etc.) used to justify the security solution up
the management chain
– A formal presentation on the security needs, business case, costs and benefits, alternatives, and
impact on operations is often mandatory before the expenditure of capital
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 133 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
• The requirements definition should focus on preventing, delaying, or modifying risk consequences
• The level of protection for a group of assets must meet the protection needs of the most critical
asset in the group. However, the designer of a security system may separate a critical asset for
specific protection instead of protecting the entire group at that higher level
• A security system built on absolute objectives, such as total denial of unauthorized entry (100%
confidence), will either be impossible to design or so costly as to be impractical
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 134 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
• The basis of design becomes the designer's means to obtain consensus from the design team on
– The goals and objectives of the project
– What will constitute the project
– How the project will secure the assets
• Implementing the Basis of Design is not the time to identify engineering details, prepare budgets,
or identify and debate specific countermeasures
– This is the time when the project is first conceived
– This is the time when the requirements are derived from a rigorous risk assessment
– This is the time when subsystem functional descriptions are provided to indicate eventual
system performance
– This is the time when initial site surveys may be accomplished to gather information on
existing conditions, measures, and needs for upgrades or additions
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 135 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
– Phase 1, Planning and Assessment (continued)
• The Conceptual Design, also called a Design Concept, is the last task of Phase 1 Planning and Assessment
– The Design Concept incorporates the basis of design; documents the findings, conclusions, and
recommendations from any initial surveys; and is the first opportunity to document the project’s design
– The designer formulates a complete security solution for the assets to be protected
– The security solution typically consists of protection strategies grouped together to form an asset
protection program or augment an existing one
– The solution normally includes security systems complemented by procedures and personnel
– The solution is expressed in general narrative and descriptive terms accompanied by an initial
budgetary estimate for design and construction
– A Design Concept's detail should never be more than a top-level description of the various
anticipated security system elements, subsystems, and support systems
– From an architectural perspective, the Design Concept is usually referred to as the initial conceptual design or
schematic development (SD) phase
– The intended subsystems should be narratively described in the concept, as should their interaction with one
another to form a complete system
• The concept level is the ideal time to seek management approval since the project team has reached consensus on
the project's scope and sufficient detail has been developed to create an initial budget
– Cost effectiveness criteria that might be used include
• Operational restrictions
• Nuisance alarm susceptibility
• Installation cost
• Maintenance costs
• Probability of detection
• Mean-time between-failure
• Contribution to manpower reduction
• Contribution to asset vulnerability
• Reduced risk, normally expressed in the monetary
consequence of loss or destruction
ASIS POA, Vol. 2, Sect. 12.3.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 136 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
• Various design criteria that may have to be considered, in addition to what vulnerabilities are
addressed, when selecting countermeasures
– Codes and standards: National, state, local, building, fire, internal, etc.
– Quality: Consistent and balanced (cost vs quality) selection of products
– Capacity: Design for sufficient capacities (throughput, card holders, transactions, etc.) with 10-
15% spare capacity
– Performance: Particularly integration requirements (i.e. ACS with CCTV, etc.)
– Features: Summary of major system features
– Cost: Primarily design fees and installation costs; initial budget usually required
– Operations: Operational requirements need to be called out
– Culture and image: Corporate image, mission, objectives, values must be respected
– Monitoring and response: System monitoring and response objectives
– Preliminary cost estimate: Conceptual-level budget, including capital and operational costs
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 137 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
– Phase 2 Design and Documentation may be split into two phases in the construction industry
• A greater level of detail in the design will lead to better responses from
bidders and lower project costs
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 138 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
– Phase 2, Design and Documentation (continued)
• A security specification should include, at a minimum
– Instructions to bidders with a list of all documents included in the contract documents
– List of project references
– Functional description of the complete systems design, its intended functional operation in a concept of
operations, maintenance and warranty requirements, quality assurance provisions, and installation
schedule
– List of design drawings
– List and description of products and services to be included in the contract
– List of required products and services included in other contracts (such as electrical door hardware,
which is provided and installed under the door hardware contract but must be connected to the
security system by the security contractor)
– List of applicable codes and standards
– Support services, such as drawing, sample and documentation submittals, commissioning, testing,
training, warranty, maintenance, and spare parts
– Technical descriptions of all major subsystems and their components, including
• Capacity
• Capability
• Expandability
• Performance and operational parameters
• Environmental operating parameters
• Installation and integration details
• Appearance and finish
• Acceptable makes and models
– General site conditions, installation standards and quality control standards
• Division 28 ("Div 28") is the Electronic Safety and Security section of the Construction
Specifications Institute (CSI) MasterFormat specifications template that includes 50 sections total
(not all used)
– Each division, or section, is divided into three parts: General, Products, and Execution
ASIS POA, Vol. 2, Sect. 12.6.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 139 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
• Security systems drawings are always considered secondary to the specifications (specs take
precedence)
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 140 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
– Phase 3, Procurement
• The type of procurement should be determined before or at the start of the design phase because
the type of procurement determines the level of detail required in the construction documents
(CDs)
• Sole Source
– May be the most appropriate for small projects
– This method of procurement is recommended only where the security owner has the capability to
perform the security needs analysis and has good prior knowledge of systems and prices
– Positives
• The construction documents are usually simple, reducing owner design costs and saving time
– Negatives
• There is a tendency to focus on hardware and technology only, leaving the equally important personnel,
procedures, and facilities subsystems for others
• The owner may tend to skip the all-important security planning process and rely on advice from a contractor
with a vested interest in selling equipment
• Without a competitive bidding process, the organization has no means of comparing prices
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 141 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 142 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 143 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
• In an RFP or IFB, the pre-bid conference should be held one week after CD's are issued for bid
– Mathematical errors
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 144 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
– Phase 4, Installation
• The second step in installing the PPS is for the contractor to visit the site to ensure conditions agree
with designs
– The contractor should be required to prepare a written report of all changes to the site or conditions
that will affect performance of the system
– The contractor should be instructed not to take any corrective action without written permission from the
customer
– It is also important that the contractor inspect, test, and document all existing physical protection
equipment and signal lines that will be incorporated into the new system
ASIS POA, Vol. 2, Sect. 12.9.1
• The POA manual refers security system component installation standards to the NFPA 731: Standard
for the Installation of Electronic Premises Security Systems (2011)
ASIS POA, Vol. 2, Sect. 12.9.2
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
• Technical excerpts from NFPA 731 regarding installation of security systems (continued)
– Cabling
• Should be run in 1/2" or larger rigid conduit with threaded connections (no EMT, armored cable, flex conduit, etc.)
• Should not be placed in conduits or raceways or other compartments with other building wiring
• Flexible power cords should not be used (power should be hard-piped)
– Grounding in accordance with NFPA 70: National Electrical Code, articles 250 and 800
– All enclosure penetrations from the bottom unless otherwise required
– All signal and data transmission lines should be supervised according to UL 1076: Standard for
Proprietary Burglar Alarm Units and Systems (1995) and should alarm on a current
change of 10% or more
– Interior electronics are installed in NEMA Type 12 enclosures
– Exterior electronics and electronics installed in corrosive environments are installed in NEMA Type 4x
enclosures
– Laminated name plates should be affixed to all components, 1/8" thick white, 1" x 3" in size, 1/4" black block
lettering
– All work should conform to the following codes
• Currently adopted National Electrical Code (NEC)
• Applicable federal, state, and local codes
• Currently adopted uniform building code
• Local electrical code as applicable
• Occupational Safety and Health Act (OSHA) standards
• Any additional codes effective at the job site
• Americans with Disabilities Act (ADA)
• All materials should conform to the following codes:
• National Electrical Manufacturers Association (NEMA)
• American National Standards Institute (ANSI)
• Underwriters Laboratories, Inc. (UL)
ASIS POA, Vol. 2, Sect. 12.9.2, 12.9.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 146 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
• In determining what tests to conduct on security systems, several factors should be considered
– Prioritizing of site-specific threats
– Identification of worst-case scenarios (lowest probability of detection, shortest amount of delay, various
pathways into a facility)
– Identification of system functions (detection, assessment, delay) that are most critical in protecting
company assets
– Determination of each subsystem’s assumed detection probabilities and vulnerability to defeat
– Determination of the time for assessment of incidents (immediate assessment versus delayed assessment)
– Identification of the last possible points at which an adversary must be detected to allow adequate
response by the facility protective force
– Comparison of vulnerabilities against findings and resolution of past security inspections and incidents
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 147 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 148 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 149 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
• Reliability Testing
– Conducted in alternating phases of testing and evaluation to allow for validation of the tests and corrective
actions
– Should not be started until the customer notifies the contractor, in writing, that:
• Acceptance testing has been satisfactorily completed
• Training (if specified) has been completed
• All outstanding deficiencies have been corrected
– The contractor should have one representative available 24/7 during testing
– The customer should terminate testing whenever the system fails to perform as specified
– Phase I Testing
• 24/7 for 15 consecutive calendar days, including holidays
• No repairs during this phase of testing unless authorized by the customer in writing
• Proceed to Phase II if no failures during Phase 1
– Phase I Assessment
• Identify all failures, determine causes of all failures, repair all failures, and deliver a written report to the customer
• About a week after receiving the report, the customer should convene a test review meeting at the job site to
discuss the results
• Customer may set a restart date or require Phase I be repeated
• The testing and assessment cycles continue until the testing is satisfactorily completed, then proceeds to Phase II
– Phase II Testing
• 24/7 for 15 consecutive calendar days, including holidays
• No repairs during this phase of testing unless authorized by the customer in writing
– Phase II Assessment
• Identify all failures, determine causes of all failures, repair all failures, and deliver a written report
to the customer
• About a week after receiving the report, the customer should convene a test review meeting at the
job site to discuss the results
• Customer may set a restart date or require Phase I be repeated
• The testing and assessment cycles continue until the testing is satisfactorily completed
ASIS POA, Vol. 2, Sect. 12.11.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 150 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
• After-implementation Tests
– Operational tests performed periodically to prove correct system operation, but do not involve verification
of equipment operating specifications
– Performance tests verify equipment conforms with equipment or system specifications
– Post-maintenance tests are operational tests conducted after preventive or remedial maintenance
– Subsystem tests ensure large parts of the system are all working together as originally designed
– Limited scope tests are used to test a complex system broken down into several subsystems tested
separately, which is useful when difficult and time-consuming to test the entire system at one time
– Evaluation tests are periodic, independent tests of the PPS to validate the vulnerability analysis and ensure
overall effectiveness is being maintained. An evaluation test should be performed at least once a year
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 151 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
• Training
– All the technological and procedural precautions in the world will be ineffective if they are not executed properly
– Through well-conceived, well-executed security training programs, personnel can
• Be better prepared to prevent incidents from happening
• Respond properly to incidents that do arise
• Contribute to recovery efforts more effectively
• Without appropriate training, personnel are more likely to contribute to security risks accidentally
ASIS POA, Vol. 2, Sect. 12.10
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
• Warranty
– The common time for the contractor to report to the job site to address a warranty issue is within four
hours of the problem report
– The contractor should inventory spares to allow quick repairs instead of waiting for manufacturers to
deliver replacements
ASIS POA, Vol. 2, Sect. 12.11.5
• Maintenance
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 153 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
• Maintenance (continued)
– Indications of a poor maintenance program
• Frequent system failures
• Cursory testing procedures
• An inordinate number of components awaiting repair
ASIS POA, Vol. 2, Sect. 12.12
– When contracting for maintenance services, the customer and the contractor should
• Agree on the basis of the contract document
• Document in detail the components of the systems that are to be maintained
• Set out the service levels for each component or subsystem
• Define roles and responsibilities of the parties to the agreement
• Agree on pricing and payments
• Set out how the agreement will be managed and administered
– Typically, maintenance and warranty costs equal 11% of the total capital systems construction cost
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 154 /223
PHYSICAL SECURITY
Physical Protection Systems (PPS) Deployment Methodology
• Systems Design Process (continued)…
• Maintenance (continued)
– Typical preventive maintenance tasks
• Inspect the cabinets to ensure that voltage warning signs exist on equipment like power supplies
• Ensure that security system warning signs, if installed, are in their proper location
• Inspect enclosures for damage, unauthorized openings, and corrosion of metallic objects. Repair and paint as
required
• Inspect air passages and remove any blockage
• Inspect, investigate, and solve conditions for unusual odors
• Inspect locking devices. Repair as required
• As equipment is operated and tested, listen to, investigate, and solve conditions for unusual noises
• Inspect equipment mounting for proper installation
• Inspect for loose wiring and components.
• Inspect electrical connections for discoloration or corrosion. Repair as required
• Inspect electrical insulation for discoloration and degradation. Repair as required
• Inspect equipment grounding components such as conductors and connections. Repair as required
• Clean equipment. Remove debris, dirt, and other foreign deposits from all components and areas of non-
encapsulated
equipment, such as ventilated control panels
• Tighten electrical connections
• Torque all electrical connections to the proper design value
• Perform operational tests periodically to prove correct subsystem operation, not necessarily to verify equipment
operating specifications
• Open protected doors
• Walk into protected rooms
• Test metal detectors by passing metal through the detection area
• Prove operation of fence disturbance sensors by shaking the fence
• Conduct visual checks and operational tests of the CCTV system, including switchers, peripheral equipment,
interface panels, recording devices, monitors, video equipment electrical and mechanical controls, and
picture quality from each camera
• Check operation of duress buttons and tamper switches
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER ASIS POA, Vol. 2, Sect. 12.12.2
David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 155 /223
PHYSICAL SECURITY
Security Officers
• Purpose…
– A security officer post is any location or combination of activities for which a trained
human being is necessary, and includes three key concepts
1) A location or combination of activities
2) Necessary human being
3) Training and competence to accomplish the required activities
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 156 /223
PHYSICAL SECURITY
Security Officers
• Statistics…
– Security officers represent the largest segment of security sector employees and are the largest cost element in
the majority of security operating budgets
ASIS POA, Vol. 3, Sect. 2
– Personnel costs are generally the largest item in the operating budget of a security department
ASIS POA, Vol. 3, Sect. 5.1.1
– As of 2006, about 85% of all critical infrastructures in the United States were already protected by private
security personnel
ASIS POA, Vol. 1, Sect. 7.1.3
– The U.S. Department of Labor forecast that security officer jobs would increase by 14% between 2008 and
2018, faster than the average growth rate for all occupations
ASIS POA, Vol. 3, Sect. 1.1
– The security staffs of the U.S. increased by 13% after 9/11/01, and had risen
to 1.1 million employees by 2002
• About 55% of these were employed by contract agencies
• About 6 out of 7 of these were full-time workers
• Many of the remaining were off-duty police officers
ASIS POA, Vol. 3, Sect. 1
– Hallcrest reports
• Compares the U.S. security industry to public law enforcement
• Determined that security personnel greatly outnumber police officers
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 157 /223
PHYSICAL SECURITY
Security Officers
• Deployment…
– Structures of security operations
• Vertical model
– "Hierarchical model"
– Authority starts at the top
• Shamrock model
– Three leaf shamrock
– Leaf 1: professionals, managers, skilled technicians
– Leaf 2: third-party suppliers
– Leaf 3: part-time and temporary workers (flexible)
• Network model
– "Flattened", "horizontal", or "open" model
– Connections between employees and multiple supervisors
– Security department itself is networked to other departments
ASIS POA, Vol. 3, Sect. 1.9.1 - 1.9.3
– Security officers are best used as part of a complete protection plan, not as a stand-alone resource
• Because they are expensive, their use should be evaluated periodically
ASIS POA, Vol. 3, Sect. 1.1
– The deployment of security officer personnel must be guided by rational and objective business criteria
ASIS POA, Vol. 3, Sect. 2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 158 /223
PHYSICAL SECURITY
Security Officers
• Deployment (continued)…
– The number of officers required for a facility is determined by several factors, including
• Physical complexity and size of the facility
• Number of employees
• Nature of work
• Number of entrances (and hours they are open)
• Value and amount of assets being protected
• Number of patrols needed
• Number of escorts and special assignments needed
– A 24/7 post requires a minimum of 4.2 officers (168 hours @ 40 hour shifts)
• 4.5 to compensate for sick, vacation, and holiday leave
ASIS POA, Vol. 3, Sect. 1.3
– Most enterprises do not carry special liability insurance for officers because they are covered by the provisions
of a commercial liability policy
ASIS POA, Vol. 3, Sect. 1.11.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 159 /223
PHYSICAL SECURITY
Security Officers
• Deployment (continued)…
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 160 /223
PHYSICAL SECURITY
Security Officers
• Basic functions…
– Monitoring of assets from a central control facility ASIS POA, Vol. 3, Sect. 1.4.8
– Emergency response
– Dealing with disturbed people
– Special assignments
ASIS POA, Vol. 3, Sect. 1.4
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 161 /223
PHYSICAL SECURITY
Security Officers
• Rank and authority…
– The efficiency of the security force depends on the adequacy and skill of its supervisors
– Security officer supervisors are selected on the basis of their knowledge of the job and demonstrated
administrative and leadership abilities
– The current trend is to abandon the military or paramilitary model and organize along
supervisory lines used by businesses
ASIS POA, Vol. 3, Sect. 1.9
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 162 /223
PHYSICAL SECURITY
Security Officers
• Regulation…
– ASIS private security officer guidelines recommend state regulation of the
following for private security firms
– Background investigations
– Training and continuing education
– Insurance
– Licensing
– Oversight bodies
• The guidelines further recommend the following selection criteria for security officers
– Criminal history
– Education
– Citizenship
– Fingerprinting
– Photographs
– Drug screening
– Other personal information related to the applicant
ASIS POA, Vol. 1, Sect. 7.5.3
– In general, state and local regulations tend to use the following categories to license security companies
• Security officers; proprietary officers are often exempt. This category typically includes armored car personnel
• Armed versus unarmed security officers
• Private investigators; executive protection personnel, if addressed, may fall under this category
• Alarm companies
• Guard dogs; animals specifically trained for drug or bomb detection are typically regulated by a separate government division
• Polygraph operators
• Consultants
• Process servers
• Locksmiths • Bouncers
• Repossession agents • Motorcade escorts
• Claims adjusters • Special police
ASIS POA, Vol. 7, Sect. 6.3.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 163 /223
PHYSICAL SECURITY
Security Officers
• Regulation (continued)…
– Requirements that may be specified in state security regulations, with the most common listed first
• Age, citizenship, and experience standards
• Good character
• Lack of felony or specified misdemeanor convictions
• Lack of material omissions or falsehoods in the application
• Lack of previous conviction for operating without a license
• Not being a public law enforcement officer
• Not having been dishonorably discharged from U.S. military service
• Lack of current mental illness
ASIS POA, Vol. 7, Sect. 6.3
– Efforts to regulate the entire security industry suffer from a lack of uniform momentum. Despite calls for
regulation in the 1970s, 1980s, and 1990s, little regulation has been instituted
ASIS POA, Vol. 7, Sect. 6.2.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 164 /223
PHYSICAL SECURITY
Security Officers
• Regulation (continued)…
– Federal regulatory efforts (mostly failed)
• Security Officers Employment Standards Act of 1991. Introduced by then-Senator Al Gore, it attempted to
introduce basic hiring and training requirements for the security industry. The bill was killed
• Security Officers Quality Assurance Act of 1992. Introduced by Representative Matthew Martinez of California, this
legislation, now dead, broke new ground by proposing that regulations apply to all security personnel, whether
employed by security contractors (thus contract security officers) or other employers (proprietary security officers)
• Private Security Officer Quality Assurance Act of 1993. Introduced by Representative Matthew Martinez of
California, this bill did not pass either, but like its predecessors, its intent was to require states to ensure the quality
of security services and the competence of private security officers. Compliance with the bill was to be a
requirement for eligibility to receive certain federal funds
• Private Security Officer Quality Assurance Act of 1995. Introduced by Representatives Bob Barr of Georgia and
Matthew Martinez of California, this never-passed bill was intended to expedite state reviews of criminal records
of applicants for private security officer employment. The bill also suggested employer licensing, classroom
and in-service training, and state reciprocity. The bill was characterized as a “Sense of Congress,” meaning it
would not be binding even if passed but that Congress thinks it is a good idea. Sought to address
delays in obtaining AFIS results
• Law Enforcement and Industrial Security Cooperation Act of 1996. This never-passed bill was
intended to create a commission to encourage cooperation between public sector law enforcement agencies and
private sector security professionals to control crime
• Private Security Officer Employment Authorization Act of 2004. This law, enacted as Section 6402 of the
Intelligence Reform and Terrorism Prevention Act of 2004, authorizes a fingerprint-based check of state and
national criminal history records to screen prospective and current private security officers. The bill is intended to
provide security employers with access, through the states, to the FBI national criminal history record database. It
requires written consent from employees before such searches and employee access to any information received,
and it establishes criminal penalties for the knowing and intentional use of information obtained through criminal
history record searches for purposes other than determining an individual’s suitability for employment as a private
security officer. In practice, the states have been very slow to establish systems to facilitate this process
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 165 /223
PHYSICAL SECURITY
Security Officers
• Regulation (continued)…
– Recommendations resulting from the 1972 Rand Report on private security in the U.S.
• Government regulation should be applied as uniformly as possible
• Regulation should be at the state level
• Directors and managers of in-house security services as well as owners and managers of contract security services should be
licensed
• All employees of both proprietary and contract security organizations should be registered by the state
• Each licensee and registrant should meet minimum standards or qualifications (which could vary among types of licensees and
registrants)
• State regulatory agencies should conduct background investigations of each applicant for a license or registration (i.e., for all
security employees, proprietary and contract), including a criminal records check and prior employment verification for a
period of seven years
• All new applicants for licensing and registration should have completed high school or its equivalent or must pass a special
literacy test
• Experience in private security should be required before a license is granted.
A bachelor’s degree (or higher) should be permitted to substitute for some of the
experience requirement. Law enforcement experience may be a substitute for the
security experience requirement
• Licensees should meet a minimum bond or insurance requirement
• State agencies should require minimum training programs for all types of private
security personnel
• Separate training programs should be required for different security positions,
such as guard, investigator, polygraph operator, and central station alarm responder
ASIS POA, Vol. 7, Sect. 6.3.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 166 /223
PHYSICAL SECURITY
Security Officers
• Regulation (continued)…
– Rand Report… (continued)
• Instructors’ schools should be accredited by the state regulatory agency
• Currently employed security personnel should be given one year to meet the training requirements
• Private security personnel should be prohibited from carrying concealed firearms while on duty. Company-furnished weapons
should remain on company property during off-hours
• Statutory liability should be imposed on private security businesses for weapons abuses by their employees against private
citizens
• Regulatory agencies should have the authority and resources to spot-check private security records and operations
• Local police and insurance companies should forward to the regulatory agency any information coming to their attention
involving major complaints or incidents involving security personnel
• Prior criminal convictions related to potential abuses in private security should be a basis for denying registration or licensing
• Evidence obtained by illegal search by private individuals should be subject to
suppression either on a per se basis (as is the case for evidence illegally seized by law
enforcement personnel) or ad hoc, with the judge or magistrate weighing the equities
• Uniformed private security personnel should be forbidden to engage in interrogation
or interviewing
• Jurisdictions should regulate the color and style of private security uniforms, as well
as the use of police titles by private security personnel
• Any firm hiring the services of an independent security contractor should be held liable
for any negligent failure to control the contract staff
• The federal government should consider funding a research center to evaluate the
effectiveness of private security personnel. Its findings should be included in an
overhauled statistical reporting system to be maintained by the insurance industry
ASIS POA, Vol. 7, Sect. 6.3.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 167 /223
PHYSICAL SECURITY
Security Officers
• Qualifications…
– The essential personal attributes for a private security officer are
• Good character • Knowledge of the job
• Proper behavior and ability to handle people • Education
• Neat appearance • Ethics
– In addition to the mental ability to complete administrative tasks and make judgments,
the security officer must also have the physical ability to observe, listen, report, and
function in emergencies
ASIS POA, Vol. 3, Sect. 2.1.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 168 /223
PHYSICAL SECURITY
Security Officers
• Qualifications (continued)…
– Minimum criteria for private security officers
• 18 years of age (unarmed); 21 years of age (armed)
• Armed personnel must comply with U.S. Public Law 104-208 Section 658 (known as the Lautenberg amendment), which
forbids anyone convicted of domestic violence (felony or misdemeanor) from possessing a firearm or ammunition
• Possess a valid state driver’s license (if applicable)
• No conviction, guilty plea or nolo contendere to
– A felony
– A misdemeanor involving moral turpitude, acts of dishonesty, acts against governmental authority (including the
use or possession of a controlled substance within a seven-year period)
– Any crime in any jurisdiction involving the sale, delivery, or manufacture of a controlled substance
• No declaration by any court to be incompetent by reason of mental disease or defect (unless the declaration
has been removed or expunged)
• Subject to a state criminal record check and FBI criminal history check before permanent employment
– These actions must be taken before arming any private security officer
• They must furnish information about all prior employment
• The employer should make a reasonable effort to verify the last seven years of employment
history, and check three personal references
• They must pass a recognized preemployment drug-screening test
ASIS POA, Vol. 3, Sect. 1.5.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 169 /223
PHYSICAL SECURITY
Security Officers
• Training…
– Competency refers to an individual’s ability, skills, and qualifications to perform the necessary duties
ASIS POA, Vol. 3, Sect. 2.1.3
– The seeds of today’s security officer training efforts can be seen in the development of apprenticeships, formal
and informal training efforts, government and private studies, and training guidelines and standards
ASIS POA, Vol. 3, Sect. 4.1
– It is good practice to provide a set number of pre-assignment training hours at the contract agency’s expense
• Such an arrangement may help reduce turnover by making the agency bear the cost of training replacements
ASIS POA, Vol. 3, Sect. 5.2.1
– The quality of assets protection is a direct function of local training and local supervision
ASIS POA, Vol. 3, Sect. 2.6
– The quality of the service provided by a contract agency is directly related to the quality of local supervision
and local training
ASIS POA, Vol. 3, Sect. 5.1.4
– Unless officers are properly trained and closely supervised, they may not
provide the protection required
ASIS POA, Vol. 3, Sect. 1.9
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 170 /223
PHYSICAL SECURITY
Security Officers
• Training (continued)…
– Shift supervisors
• Train and direct the shift officers
• Are front-line managers
• Are the key to mentoring, staff turnover, and employee satisfaction
ASIS POA, Vol. 3, Sect. 2.6
– To accomplish training objectives, the supervisor must visit each guard post
• A better alternative—unless prohibited by collective bargaining terms—is to have the
supervisor perform some post relief
ASIS POA, Vol. 3, Sect. 2.6
PHYSICAL SECURITY
Security Officers
• Training (continued)…
– An initial period of general security instruction should be given as soon as the officer reports for duty.
Instruction on specific duties can be given as the duties are assigned
ASIS POA, Vol. 3, Sect. 4.9.11
– The two reasons for testing the security operations program are to identify residual risks and identify necessary
changes within the organization
ASIS POA, Vol. 3, Sect. 1.9
– Hallcrest Report I (1985, Cunningham & Taylor) found that contract security firms had inadequate employee
selection and training standards
The key to effective guard use is training - ASIS POA, Vol. 2, Sect. 10.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 172 /223
PHYSICAL SECURITY
Security Officers
• Evaluation…
– The lack of evaluation of security officers causes problems at salary review time
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 173 /223
PHYSICAL SECURITY
Security Officers
• Arming…
– One of the greatest liabilities an organization faces involves issuing deadly weapons to security officers
• Some think when a contract security vendor is properly contracted, most of the liability is shifted to the vendor
– Legal actions usually involve anyone remotely associated with a situation
• Payment for vendor services indicates acceptance of the vendor’s management style and practices; thus, crucial policies and
protocols should be prescribed by the organization that employs the vendor
– The decision whether to arm an officer should be based on the existence of one of these conditions
• There is a greater danger to life safety without the weapon
• The officer may reasonably be expected to use fatal force
– Facility management assumes several responsibilities for armed officers
• Proper training of the officers to be armed
• Selection of the appropriate firearms and ammunition
• Proper maintenance of the firearms by a qualified gunsmith
• Maintenance of records of the foregoing actions
• An adequate level of liability insurance
– Other considerations regarding use of deadly weapons
• Conditions when weapons may be issued
• Persons who get a weapon, and the type of weapon and ammunition issued
• Quality and reliability of the weapon at time of issue, and repair and
maintenance of the weapon by a qualified armorer
• Accountability for the specific weapon and its ammunition, and specified
training with the weapon
• Conditions when weapons may be used, and safety precautions
for the issuance and carrying of weapons
• Return or surrender of the weapon when not required for authorized use
• Secure storage for weapons when not in use (weapons unloaded,
separated from ammunition, locked in approved container)
• Accurate records of each of the preceding points
– Use of non-lethal weapons should also be covered in policy statements
ASIS POA, Vol. 3, Sect. 1.7, 1.7.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 174 /223
PHYSICAL SECURITY
Security Officers
• Contract vs proprietary…
– Contract security: Third party employer of officers
• Less expensive (most prominent advantage)
• Pool of replacement workers typically readily available
• No need for customer to deal with vacations, sick time, discipline, hiring/terminations
• Wider range of expertise available
• Some insulation from liability
• Higher turn-over, potentially lower quality, sometimes less well-trained, not as loyal
– Contract security firm representatives usually reduce costs to sell their service
• Low-bid contractors may often lower quality to compensate for the lower price
• It is the responsibility of the customer to develop detailed bid specs that clearly
identify requirements, including wages, benefits, and performance expectations
• Helps avoid low-bid, poor-performance results
ASIS POA, Vol. 3, Sect. 1.10
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 175 /223
PHYSICAL SECURITY
Security Officers
• Reports…
– From the first day on the job, security personnel should realize their observations, reports, or findings, coupled
with their demeanor and their ability to articulate events, may be the key to the verdict in a trial immediately or
years after an event, even if they have left the job
– Security reports and logs are admissible in legal proceedings as entries made in
the regular course of business and are therefore exceptions to the evidentiary
rule against hearsay
– Be regularly maintained
– Record an event of which the recorder had personal knowledge or which was reported to
the recorder by one who had personal knowledge and a duty to report
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 176 /223
PHYSICAL SECURITY
Security Officers
• Reports (continued)…
– Report forms that force positive statements are better than those that expect the officer to formulate a
narrative
– Whether manual or electronic in format, security logs generally fall into two classes: the main or control log and
the individual post log
ASIS POA, Vol. 3, Sect. 2.7.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 177 /223
PHYSICAL SECURITY
Security Officers
• Policy and procedure…
– Failure of security personnel to follow operating procedures could lead to lawsuits over
• Failure to adhere to duty guidelines (officers engage in conduct beyond their established duties)
• Breach of duty (officers engage in unreasonable conduct)
• Proximate cause (the officer was the immediate cause of injury to a victim)
• Foreseeability (refers to events, especially those that could cause loss, harm, or
damage, that the officers or management could have determined were likely to happen)
ASIS POA, Vol. 2, Sect. 12.9.4
– Post orders are the most important written instructions for the security force, and
• Express the policies of the protected enterprise
• Summarize required officer duties
• Avoid the problems of word-of-mouth instructions
• Provide a basis for site-specific training
ASIS POA, Vol. 3, Sect. 2.5
– Post orders are based on standard operating procedures (SOPs), which should be site-specific
ASIS POA, Vol. 3, Sect. 2.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 178 /223
PHYSICAL SECURITY
Security Officers
• Policy and procedure (continued)…
• An officer with a 12th-grade education (or less) should not be expected to read and understand the professional language or
jargon of someone with an advanced education
• Reading time is inversely related to reading comprehension – the longer it takes to read a passage, the less likely it will be
accurately understood or remembered.
– Reading time is a function of both the structure of the passage and the reading skill of the individual
• The use of vocabulary should emphasize plain meaning and avoid jargon, nuances, and ambiguity
• Post orders should be available at each guard post and kept current and accessible. They are the vital link between the
requirements of the client and the ability of the security officer to effectively meet those requirements
• Post orders require a coordinated effort – care must be taken to ensure no contradictory orders are in use
PHYSICAL SECURITY
Security Officers
• Fatigue…
– Individuals awake for more than 17 hours are likely to reach a dangerous level of mental fatigue
ASIS POA, Vol. 3, Sect. 3.2
– Frequent rotations of officers in monotonous and demanding environments, like a control center, can help
alleviate officer fatigue
ASIS POA, Vol. 3, Sect. 3.4.1
– The most effective way to maintain officer vigilance is to systematically rotate the security officer’s duties, at
two- to four-hour intervals, between fixed posts and roving patrol (both foot and mobile) assignments
ASIS POA, Vol. 3, Sect. 3.6.8
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 180 /223
PHYSICAL SECURITY
Security Officers
• Fatigue (continued)…
– A few of the problems associated with automation and human monitoring are
• Increased monitoring load for the operator with concomitant attention lapses
• High degree of operator responsibility with little to do
• Loss in manual skill proficiency by the operator
• Out-of-the-loop problems for the operator
• Automation replacing human pattern recognition abilities with less competent sensors
• Creation of the “cry wolf” syndrome whereby a high false alarm rate causes the operator to ignore
indications of system malfunction so that malfunction rates detected drop nearly to zero
• Inadequate displays that do not support optimal operator performance and do not allow
for individuals’ differing abilities to remain vigilant
• Automation problems being misdiagnosed so that erroneous corrective
measures are taken
• Failure to recognize subtle vigilance problems until after a large
number of automation-related accidents
ASIS POA, Vol. 3, Sect. 3.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 181 /223
PHYSICAL SECURITY
Security Officers
• Fatigue (continued)…
• Principle 1: Shift lag. Use a shift plan that maintains human circadian entrainment to the local, 24-hour light/dark cycle.
Usually, rapidly rotating plans are better at this than slowly rotating plans
• Principle 2: Shift length. Use a shift length of no more than eight hours, with the exception of using a 12-hour shift length for
jobs with low physical and emotional work stresses
• Principle 3: Night shifts. Schedule minimal consecutive night shifts in the shift plan, preferably no more than three in a row
• Principle 4: Recovery. Schedule 24 hours of recovery (not “time off”) after each night shift
• Principle 6: Days off. Schedule at least 104 days off per year (equal to 52 weekends)
• Principle 7: Equity. Provide all workers with equal demands for long duty days, night work, and weekend
work, as well as equal access to good-quality time off and weekends off
• Principle 8: Predictability. Ensure that the schedule is so easy to understand that workers may
apply simple arithmetic to predict their actual work and free days well into the future
• Principle 9: Good-quality time off. Schedule long, contiguous periods of time off;
operationally, this translates into three or more consecutive days off
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 182 /223
PHYSICAL SECURITY
Security Officers
• Contracting for security services…
– The first step in contracting for security officers is to determine the organization's contracting rules, then
• Buyer beware
• Properly evaluate the needs of the organization to be protected
• Acquire information and know the state of the art
• Analyze the advantages and disadvantages of each service
• Avoid panic decision making
ASIS POA, Vol. 3, Sect. 5.1
– The most important aspect required to ensure adequate guard agency performance is a genuine commitment
to partnership with the client
– The more specific and detailed the information a client provides, the greater the likelihood of getting quality
service at a competitive price
ASIS POA, Vol. 3, Sect. 5.1.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 183 /223
PHYSICAL SECURITY
Security Officers
• Contracting for security services (continued)…
– Solicitation summary
• Gives vendors as much information as possible to produce comprehensive proposal packages, and contains
– Statement of purpose that identifies the tasks to be performed by the security personnel
– Client contact person
– Particulars regarding the bidders’ conference
– Letter of intent for vendors
– Proposal submission requirements
– Modification or withdrawal of proposals
– Post-opening withdrawals
– Late proposals, withdrawals, or modifications
– Bidders’ right of appeal
– Payment policies
– Amendments to the RFP
– Details of any proposed discussion between vendor and client
– Procurement rules
– Challenges based on unfairness
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 184 /223
PHYSICAL SECURITY
Security Officers
• Contracting for security services (continued)…
– Building the Scope of Work (SOW) for contract guard services is based on
• Examination of the site
• Layout of facilities
• Building design
• Internal business processes
• Corporate culture
• Security objective
• Contract length
ASIS POA, Vol. 3, Sect. 5.1.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 185 /223
PHYSICAL SECURITY
Security Officers
• Contracting for security services (continued)…
– Customers should specify hourly pay rates rather than allowing bidding guard agencies to do so
• Significant disparities can lower morale and job satisfaction, increase turnover, and eventually erode security service levels
• As a general guideline, the lowest wages received by the contract security officer should at least equal the entry wages paid to
the proprietary positions
• Security managers facing bureaucratic purchasing functions should be sure that they—and not the purchasing staff—set the
contract compensation policy
ASIS POA, Vol. 3, Sect. 5.1.4
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 186 /223
PHYSICAL SECURITY
Security Officers
• Contracting for security services (continued)…
– Supervisory roles are generally determined by the number of personnel at the site (or total hours)
• If officers work more than 400 hours per week, the contracting organization should hire its own (proprietary) security
supervisor
– Seven measures on which contract security companies can be assessed (at minimum)
1) Employment and reference checks
2) Psychological testing (where allowed)
3) Polygraph testing (where allowed)
4) Minimum qualifications at local jurisdiction level
5) Management qualifications
6) Selection process for officers
7) Turn-over / tenure / seniority
ASIS POA, Vol. 3, Sect. 5.3.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 187 /223
PHYSICAL SECURITY
High Rise Security Issues
• Definition…
– Generally, a high-rise structure extends higher than the maximum reach of available fire-fighting equipment
• Set variously between 75 and 100 feet, or approximately 7-10 stories
• The exact height of a high-rise is specified by local fire and building codes
• In such facilities, fires must be fought from inside the building rather than from outside
• Urban area, accessible from public streets, mixed occupancy, public assembly areas, retail spaces, and conventional office use
• Concepts…
– Open buildings. Access is typically unrestricted at the building entry level as well as to individual floors. There
may be an unrestrictive security or concierge desk to assist visitors and others
– Closed buildings. Access to elevator banks is controlled and visitors are managed
– Hybrid buildings. For a major tenant, one or more elevator banks may be controlled while other elevator banks
to other floors are open
– Multi-mode: Operations controls vary according to time of day, traffic, occupancy level, or day of week
• Business hours: Regular mode of building security
• Intermediate hours: 1-2 hours before and after regular business hours, possibly some hours on Saturday, entry doors are open
but visitors may be subject to stricter controls
• Off-hours or after-hours: Nighttime, weekends and holidays, higher levels of security are maintained and building entry doors
are locked, requiring access permissions to enter
ASIS POA, Vol. 6, Sect. 2.3.4
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 188 /223
PHYSICAL SECURITY
High Rise Security Issues
• Access control…
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 189 /223
PHYSICAL SECURITY
High Rise Security Issues
• Access control (continued)…
– Floor control can be accomplished several ways in a high rise
• Programmable elevators
• Elevator cabs with card readers
• Escorts for visitors
• Employee awareness of piggybacking and tailgating
• Turnstiles at the ground floor elevator bank
• Controlled elevator landings (with or without reception)
– Service or freight elevators pose special problems in all high-rise structures because they often serve all levels
of a building
• If they are self-service, the entire building security program may be compromised unless the service cars are
– Programmed not to access sensitive floors without special arrangements
– Locked at hoist-away doors on sensitive floors
– Locked at service vestibule or lobby doors, where applicable
– Service elevators also offer an opportunity for unauthorized movement of property from or between accessible
floors, which can be addressed by
• Assigning an operator to the service elevators
• Making service elevators available only on request to Security
• Avoiding use of service elevators by regular traffic
ASIS POA, Vol. 6, Sect. 2.3.5
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 190 /223
PHYSICAL SECURITY
High Rise Security Issues
• Access control (continued)…
– If use of stairwells is allowed, they should have access controls and intercoms connected to Security
ASIS POA, Vol. 6, Sect. 2.3.5
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 191 /223
PHYSICAL SECURITY
High Rise Security Issues
• Life Safety…
– The first step in assuring life safety is to comply with local building and fire codes applicable to
the structure
• The first priority in life safety systems is fire detection
• High rise fire detection systems must pinpoint the floor and location of the potential fire, which may require
the supplemental use of other devices, personnel or procedures
– Some codes prohibit the fire alarm system from performing any function other than fire life
safety and further prohibit the use of any component or device that has not been approved for
fire life safety applications
• Depending on local authorities, this may preclude the use of fire alarm systems to monitor or control security
devices
• It may also preclude the use of a security system to monitor or control a fire life safety device
– When sprinklers are present, the chances of dying in a fire and property loss per fire are cut by
one- to two-thirds, compared to fires reported to fire departments where sprinklers are not
present
– When sprinklers do not produce satisfactory results, the reasons usually involve one or more of
the following
1) Partial, antiquated, poorly maintained, or inappropriate systems
2) Explosions or flash fires that overpower the system before it can react
3) Fires very close to people who can be killed before a system can react
ASIS POA, Vol. 6, Sect. 2.2.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 192 /223
PHYSICAL SECURITY
High Rise Security Issues
• Life Safety (continued)…
– Standpipe systems can significantly improve the efficiency of manual firefighting operations by
eliminating the need for long and cumbersome hoses
– Water is the primary extinguishing agent in most high-rises, but others may be
• Dry chemical and wet chemical systems (used mainly for restaurant hoods, ducts, and cooking appliances
found in kitchens and cafeterias)
• Carbon dioxide, halon and halon replacement systems (used in electrical switchgear rooms and in
computer and data processing installations)
– The most significant factors affecting life safety in high-rise structures are
• Early detection and precise location of incipient hazards
• Reliable communications throughout the structure and with outside agencies
• Assurance of safe escape routes
• Prompt application of appropriate control measures
• Fire extinguishment
• Containment or replacement of contaminated air
• Shutoff or filtration of drinking water
• Containment and removal of explosives
ASIS POA, Vol. 6, Sect. 2.2.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 193 /223
PHYSICAL SECURITY
High Rise Security Issues
• Security and Intrusion Detection…
– The "layered security" approach applies to normal facilities is
• Outer ring: Property boundary, or perimeter
• Middle ring: Building walls
• Inner ring: Interior controls
– Protection measures in a high rise should involve a cooperative effort between the building owner and manager
and the tenants themselves
ASIS POA, Vol. 6, Sect. 2.3.1
– Selective site hardening of a building can be accomplished with these building materials, typically involved
during construction, not later when the cost is substantially higher and the install more difficult
• Standard masonry
• Blast-resistive reinforced concrete
• Sheet metal
• Polycarbonates
• Acrylic material
• Compressed fiberglass
• Ballistic fabrics
• Bullet-resistive glass
• Window films
• Hardening and controlling the elevator lobby and stairwell doors is less expensive than hardening individual offices or spaces
ASIS POA, Vol. 6, Sect. 2.3.6
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 194 /223
PHYSICAL SECURITY
High Rise Security Issues
• Security and Intrusion Detection (continued)…
– It is important to have a central location within the high-rise structure where the security systems and
equipment can be monitored and controlled
• No attempt should be made to use the system control center in any way other than as a dedicated facility
– Monitoring personnel are sometimes expected to handle both the system demands and the spot demands of persons passing the area
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 195 /223
PHYSICAL SECURITY
High Rise Security Issues
• Security and Intrusion Detection (continued)…
– Intrusion alarms should be used on stairwell doors where non-emergency use is not allowed
• Where stairwell doors are generally locked against re-entry, it is appropriate to dispatch a security officer to the floor of the
alarm and another to the stairwell one floor above the alarmed floor
– Fresh air intakes should not be overlooked in the protection plan, as these are vulnerable to airborne
contaminants
• A grille or baffle should be installed at a 90 degree angle to the air intake to eliminate direct access to the intake, and the unit
should be fitted with intrusion alarms
• Mounting air intakes well above ground is a superior security solution
– The most dangerous or critical points for attack against telecommunications lines in a high rise are located at
points after all the building services are connected with one or two main trunk cables, still in the structure
• All access points to the cables should be protected
ASIS POA, Vol. 6, Sect. 2.3.5
– Since communications within a high rise can be cut to upper floors by severing the cables in common riser
areas, alarm signal and communications systems should be distributed so that localized points can operated
independently even with communications with a central control panel or processor has been disrupted
ASIS POA, Vol. 6, Sect. 2.2.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 196 /223
PHYSICAL SECURITY
High Rise Security Issues
• Video Surveillance…
– Typical high rise camera locations
• Critical entry or exit areas
• Pedestrian access points operated remotely
• Access points at which access control devices are installed
• Passenger and service elevators
• Sensitive interior spaces
• Vehicle entrances and exits
• Covert surveillance areas
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 197 /223
PHYSICAL SECURITY
Dogs in Security
• History of dog use…
– The Greeks and Romans used large, mastiff-type dogs with armor and
blade-studded leather collars during warfare
– After the discovery of gunpowder, dogs were used in military operations
primarily as sentries, scouts, messengers and guards for prisoners and
supplies
– During World War II, the U.S. military used about 10,000 dogs
– Today, armed forces throughout the world continue to use dogs for many
tasks
– The organized use of dogs for law enforcement dates back to at least 1899
when the town of Ghent, Belgium, established a law enforcement training
program for dogs
• By 1906, police were using 50 to 60 dogs in that city
– Around 1910, dogs were used by law enforcement agencies in England and
Germany
– By 1956, the Baltimore Police Department began an experimental program,
pioneering the law enforcement use of dogs in the United States
– Dogs are now in regular use in law enforcement agencies around the world
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 198 /223
PHYSICAL SECURITY
Dogs in Security
• Breeds…
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 199 /223
PHYSICAL SECURITY
Dogs in Security
• Breeds (continued)…
– Dogs in the Herding group share a great ability to control the movement of
other animals, and include
• Uses…
• Aggressive attack
• Building searches
• Detection of explosives and incendiary accelerants
(substances that boost fires)
• Drug detection
• Guarding or holding a person in a location
• Protection or patrol of areas, with or without handlers
• Tracking
ASIS POA, Vol. 6, Sect. 1.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 200 /223
PHYSICAL SECURITY
Dogs in Security
• Uses (continued)…
– The usual assets protection tasks for which dogs are selected and trained include these
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 201 /223
PHYSICAL SECURITY
Dogs in Security
• Qualifications…
– Aggressiveness categories
• Over-aggressive (difficult to train, may bite others than the aggressor, continues to react after
aggressor is gone)
• Under-aggressive (cowers or hides when approached by aggressor, difficult or impossible to
train)
• Moderately aggressive (easiest to train, ideal for protection use, becomes alert to aggressor,
suspicious, and is eager to move towards the aggressor)
ASIS POA, Vol. 6, Sect. 1.2.6
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 202 /223
PHYSICAL SECURITY
Dogs in Security
• Qualifications (continued)…
– To qualify for protection work, a dog should – The most popular protection breeds in the U.S.
• Be 'middle-sized' • German shepherd (better when correctly bred - no
– German shepherd: 24 - 26" in height, 75 to 90 lbs inbreeding)
– Doberman pinscher: 25 - 28" in height – Intelligent, faithful, responds well to training
• Have even temperament – Keen sense of smell
• Be inquisitive and intelligent – Strong; 500-600 lb/sq in bite force, enough to break a
• Be courageous (bold but not ferocious, not shy); never human arm
retreat – The breed has been 'watered down' by poor breeding
• Have 'hardness', or a willingness to overcome practices
challenges • Doberman pinscher
– Bred from a mix of German shepherd, Rottweiler,
• Have vitality and strength
black and tan terrier, and German pinscher
• Be any color
– Compact, muscular, powerful
• Respond well to training at about twelve months of age – Great endurance and speed
• Usually be male (not monorchid); females if spayed – Energetic, fearless - attacks without care for its own
• Not necessarily be purebred, but not be a shelter dog safety
• Not have been with the breeder for ASIS POA, Vol. 6, Sect. 1.4.1
more than 12 months
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 203 /223
PHYSICAL SECURITY
Dogs in Security
• Qualifications (continued)…
– In security, a dog’s senses of smell and hearing are most important; sight and touch are less so
– During the imprinting stages of training, a dog must be taught to rely on smell instead of sight, especially when
teaching building searches
– Dogs should be conditioned to use the fastest and easiest means of satisfying their basic needs
– A dog’s ability to detect scents is often described as being more than 100 times greater than that of humans
• A trained dog can sense an intruder’s airborne scent more than 250 yards away
• Dogs can distinguish between odors that seem identical to humans
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 204 /223
PHYSICAL SECURITY
Dogs in Security
• Training…
– Dogs are more intelligent than most other animals, except humans and non-human primates
• A dog’s intelligence is gauged in terms of how quickly he learns a command,
retains it, and his drive to follow it
• A vocabulary of about 20 words is normal, but some can respond to 100
• A dog may be deemed highly intelligent if it learns quickly by experience (unusual)
• Some dogs learn quickly but are difficult to train because they sulk or are stubborn
• Some dogs respond only to a handler they like
• Individual dogs differ in how much they want to please their pack
ASIS POA, Vol. 6, Sect. 1.2.3
– Two basic drives are prevalent in dogs used for security tasks
• The hunt drive
– Must be present to accomplish both detection and protection work
– Through training, the drive can be channeled to help the dog pursue and locate other items, such as drugs or lost children
– Due to their natural predator ability, dogs can be trained to attack humans without regard to their own safety
– The optimal canine is one with equal hunt and pack drives
– Through training, a dog’s natural drive is coupled with the desire for a reward
• Dogs should be conditioned to use the fastest and easiest means of satisfying their basic needs
ASIS POA, Vol. 6, Sect. 1.2.1, 1.2.2
– Dogs with little energy are difficult to train; over-energetic dogs can be trained to control their behavior
ASIS POA, Vol. 6, Sect. 1.2.5
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 205 /223
PHYSICAL SECURITY
Dogs in Security
• Training (continued)…
– Unlike most animals, a dog does not always require food rewards to work or train
• Kindness, shown by oral praise or a casual caress, is usually enough to motivate the dog
• More than any reward, the dog wants the approval of its handler—probably because of the pack instinct
• A friendly and trusting relationship is the motivation needed to train the dog to become highly efficient
• A tangible reward should not be routinely given after a dog has executed a command properly
ASIS POA, Vol. 6, Sect. 1.2.8
– Most common training methods (not every dog responds to the same method)
• Positive reinforcement (praise) tailored to the dog’s specific predominant drives
• Compulsion (negative corrections) through the handler’s voice or with equipment such as a shock collar
• Inducement (balls, toys, companionship, or food)
PHYSICAL SECURITY
Dogs in Security
• Training (continued)…
– Because of the restrictions on time and the effort needed to keep skills at the optimal level, generally a dog
should be trained specifically for protection or detection, not both
ASIS POA, Vol. 6, Sect. 1.4
– A single dog is generally not trained to detect both drugs and explosives for two reasons
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 207 /223
PHYSICAL SECURITY
Dogs in Security
• Training (continued)…
– Patrol dog training
• Trainer works with dog 4-12 weeks, and with dog and handler together for 2 weeks
• Trainer prefers dog to live with handler; cost is $4k - $5k (plus the dog)
– A dog taught with a handler knows to attack w/o command only when a violator escapes or attacks the handler
• Escorting handler is 10 ft behind and 2 ft right of the violator; the dog is off-leash to the left, directly behind the violator
ASIS POA, Vol. 6, Sect. 1.4.4
– Dogs used in the private sector should be given brief refresher training at least monthly
ASIS POA, Vol. 6, Sect. 1.4.2
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 208 /223
PHYSICAL SECURITY
Dogs in Security
• Detection…
– Dogs are the most efficient method for detecting drugs, explosives, and accelerants in most situations
– Detection is demanding and often boring for the dog because of long work periods without detecting a scent
• A detection dog can normally work effectively for twenty to sixty minutes
• If a search continues for a long time, the dog may become tired and lose interest
• If the dog loses interest and the handler cannot motivate it to continue, it must be given a break
• Noise and activity in an area may distract the dog
ASIS POA, Vol. 6, Sect. 1.5.3
– A single dog can be trained to patrol, protect areas, and detect substances, but usually substance detection
becomes a specialty because of the necessary training time
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 209 /223
PHYSICAL SECURITY
Dogs in Security
• Detection (continued)…
• For buildings and areas, the dog is most effective off-leash so it is not restricted and can search a larger area in less time
ASIS POA, Vol. 6, Sect. 1.4.4
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 210 /223
PHYSICAL SECURITY
Dogs in Security
• Detection (continued)…
– Drugs
• Typical scent-masking substances for drugs
– Perfume
– Gasoline
– Formaldehyde
• Typical false alerts for drugs
– Oregano
– Alfalfa
– Parsley
– Spices
– Any substance containing acetic acid can cause a false alert for heroin
• The average drug dog will detect the presence of a half-ounce (14 g) of marijuana or a
small amount of opium in a vehicle, a package, luggage, or a room of reasonable size
– Accelerants
• Dogs have been used to detect accelerants since 1987
• The value of the dog is its ability to discriminate between pyrolysis products (fire debris)
normally found at a fire and pyrolysis products containing an ignitable liquid
• Labrador retrievers are especially adept at this type of detection
• The dog can be 95% accurate
• Training is accomplished with 50% evaporated gasoline
• Dogs can also be used to detect accelerant scents from onlookers, in an effort to
identify the arsonist who has remained behind
• Dogs significantly reduce the time required to perform a fire investigation
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 211 /223
PHYSICAL SECURITY
Dogs in Security
• Detection (continued)…
– Explosives
• Explosives that can be detected by dogs
– Commercial dynamite (gelatin, TNT – trinitrotoluene)
– Smokeless powder
– C-4 plastic explosive
– Black powder (powder form, time fuse, safety fuse) and black powder substitutes
– Detonating cord (PETN [polyerythrytoltetranitrate]-based)
– Detonating cord containing RDX (cyclotrimethylene trinitramine)
– Binaries (such as Kinepak)
– Blasting agents
– Cast boosters
– Composition-B
– Emulsions and slurries
– Water gels
– Plastic explosives (such as Semtex)
– Tetryl
– Improvised explosives (ANFO [ammonium nitrate and fuel oil], chlorates, nitrates)
• Items that can cause false alerts in detection dogs (for explosives)
– Nitroglycerin pills or containers
– Back of television (nitrocellulose shellac)
– Blackboard chalk labels (nitrocellulose shellac)
– Grease pencils (nitrobenzene)
– Shoe polish (nitrobenzene or nitrotoluene)
– Pure glycerin (similar to nitroglycerin)
– Maraschino cherries (benzaldehyde)
ASIS POA, Vol. 6, Sect. 1.5.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 212 /223
PHYSICAL SECURITY
Dogs in Security
• Tracking…
– A tracking or trailing assignment (leasing the dog team) generally costs $1,500 - $2,000 for 24 hours
ASIS POA, Vol. 6, Sect. 1.5.4
– To search for a person who missing for some time, a dog specifically trained for such work should be obtained
– A dog can track better in grass and brush because human scent adheres well to those surfaces
– Paved or gravel areas and overpowering scents such as smoke, chemicals, fertilizer, burned grass, or spilled oil
and gasoline impede a dog’s tracking ability
– Human scent remains longer on cool, moist ground and dissipates rapidly in direct sunlight,
on extremely dry ground, and in excessive rain
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 213 /223
PHYSICAL SECURITY
Dogs in Security
• Tracking (continued)…
– Scent cannot pass through trees, bushes, large rocks, and high grass, but must go over, under, or around them
• Much perspiration is generated by feet; the scent escapes through shoes and clothing (majority of scent trails are left by feet)
– Tracking dogs can also smell the difference in the turned-up ground and crushed plants
– A trained dog in a boat can scent a person under the water and breathing through a tube
– Dogs with flat noses, such as the mastiff, boxer, and bulldog, are generally not as well suited for tracking
– Housedogs do not make optimal tracking dogs; their smell is diminished by the artificial environment
– Training a dog for tracking and trailing takes about two years and
can usually be done only by an expert
ASIS POA, Vol. 6, Sect. 1.4.4, 1.5, 1.5.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 214 /223
PHYSICAL SECURITY
Dogs in Security
• Protection…
– During a protective escort, the protected person should be in front of the dog and handler when on foot, and in
the back seat of a vehicle with the dog and handler in the front seat
ASIS POA, Vol. 6, Sect. 1.4.4
• Care…
– Feeding, environment, and health care are critical factors in maintaining a healthy, effective dog
ASIS POA, Vol. 6, Sect. 1.3
• Feeding…
– A dog requires 36 nutrients to remain in good health
• While carnivorous, dogs also need vegetables and cereals
• Like humans, dogs require carbohydrates, fats, proteins,
vitamins and minerals
– Dogs should be fed once per day, no longer than 20-30 minutes
– In the United States, if a dog food label indicates the food is “balanced” or “complete,” it meets or exceeds the
standards established by the American Association of Feed Control Officials (AAFCO)
ASIS POA, Vol. 6, Sect. 1.3.4
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 215 /223
PHYSICAL SECURITY
Dogs in Security
• Environment…
– Considerations in dog kenneling
• Noise
– Kept to a minimum to ensure dog gets enough rest
– Average sound level <75db per 24 hours
– 150-200 yards from residential or commercial areas
– Natural barriers around kennel to reduce noise and distractions
• Drainage
– Kennels should be above ground on a raised platform with slope underneath
– Drainage must be independent for each kennel to reduce cross contamination
• Water supply
– Approved for human consumption to avoid disease
• Fire protection
– One extinguisher per 2500 sq. ft (class A, water)
• Lighting, ventilation, heat
– Adequate lighting for safe operations at night
– All openings and ventilation must be able to be closed
– Ideal temperature, in general, is between 60 to 75 degrees
Fahrenheit (40% humidity)
• Area around the kennel
– 8' chain link fencing around dog runs - roofed for dogs that
can climb - appropriate signage on the fencing
• Sanitation
– Thoroughly cleaned every day, disinfected periodically
– Droppings should be removed often to avoid contamination,
and always before washing down the kennel
• Maintenance
– Inspect kennel every day, including water containers
• Feeding area
– Clean food preparation area
– Food/water containers cleaned daily
ASIS POA, Vol. 6, Sect. 1.3.1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 216 /223
PHYSICAL SECURITY
Dogs in Security
• Grooming…
– Grooming is essential for the care of the dog, but also aids in bonding
• Daily (preferably)
• Bathing is not part of the normal grooming routine, but necessary occasionally (not excessively)
• Should include inspection of all parts of the dog for indications of illness or injury
– Vertical ear canal: The portion of a dog's ear that can be seen
– Horizontal ear canal: Deeper section of the dog's ear that can't be seen
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 217 /223
PHYSICAL SECURITY
Dogs in Security
• Grooming (continued)…
– Symptoms of abnormality in a dog’s nose
• Persistently dry and dull nose
• Watery, yellowish, or red-tinged discharge
• Sneezing, snorting, and pawing at the nose
– In cold weather, long-haired dogs should have their paw-hair clipped to ease snow removal and cleaning
• Rock salt and other chemicals can be irritating to the pads of the paws
• If the dog works in areas where ice melting compounds are used, the paws should be thoroughly
rinsed and dried after contact to avoid irritation
ASIS POA, Vol. 6, Sect. 1.3.3
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 218 /223
PHYSICAL SECURITY
Dogs in Security
• Grooming (continued)…
– Indications of skin abnormality
• Reddening
• Scabbing
• Persistent scratching
• Shedding that is abnormal for the season or climate
• Loss of hair in one or more spots
• Dryness
• Loss of pliability
– Callus: The area on the outer side of the dog's elbows that is hairless
and thick-skinned, usually about an inch in diameter
– Dogs usually keep their nails at the proper length so the tips of the
nails do not touch the ground when they stand
• Any overly long, broken, or split nails must be given attention
• Handlers should not neglect the nails on the dewclaws—the innermost
claws—since they are not worn down by contact with the ground and may
grow until they curve back into the dog’s leg
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 219 /223
PHYSICAL SECURITY
Dogs in Security
• Healthcare…
• Canine distemper: Highly contagious, usually fatal, virus-borne (viral), prevented by immunization, airborne transmitted
• Infectious canine hepatitis: Virus-borne, usually young dogs, prevented by immunization, slow recovery, transmitted
through urine
• Leptospirosis ("lepto"): Bacteria-based, inter-species transmission, transmitted through urine, often spread by rodents
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 220 /223
PHYSICAL SECURITY
Dogs in Security
• Healthcare (continued)…
– Rabies: Inter-species transmission through saliva/bites, fatal within ten days of symptoms if not treated, effects
central nervous system, symptoms show in humans 3-6 weeks after bite, includes the following symptoms
• Sudden change in temperament
• Indiscriminate snapping and biting
• Excitement
• Difficulty in swallowing water or food
• Blank expression
• Slack jaw
• Excessive drooling from the mouth
• Paralysis and coma and ultimately death
• Rabid wild animals often lose their fear of humans and domestic animals
PHYSICAL SECURITY
Dogs in Security
• Healthcare (continued)…
– Most dog parasites are detrimental to the dog's health, and some can spread diseases to humans
• External parasites
– May be present in great numbers before symptoms show
– Ticks may live up to a year without a host; lice and mites must be on a host to live
– Fleas are the primary cause of tapeworm among dogs
– Biting lice eat skin tissue and sucking lice suck blood
– The dog scratching at ears and cocking its head may indicate the presence of ear mites
– Mange mites live in the dog's skin
• Demodectic mange (red mange) is common in short-haired dogs, includes small areas of hair loss, red/irritated appearance
• Sarcoptic mange (scabies) includes severe itching, irritation, hair loss, can be transmitted to humans
• Internal parasites
– Hookworms live in the dog's intestines, and are among the most harmful internal parasites, 1/2 to 3/4' long, suck blood, can be
swallowed or penetrate the dog's skin to infest it, includes symptoms of pale mouth/eye membranes, loose/bloody stools, weight loss
– Roundworms live in the dog's intestines, 2-8" long, rob the dog of nutrients, cause vomiting, diarrhea, weight loss, coughing
– Whipworms live in the dog's intestines, in between the size of hookworms and roundworms, cause diarrhea, weight loss, pale
mouth/eye membranes
– Tapeworms have many segments and a head, are long and flat like a ribbon, attach to the walls of the intestines, transmitted when
the dog eats fleas or an infected animal, cause diarrhea, loss of appetite/weight and unnoticeable symptoms
– Heartworms live in the heart and lungs of the dog, larvae are called microfilaria that transmit to other animals by being pulled from
the dog's blood by mosquitoes, interfere with heart functions and cause coughing, weight loss, difficulty in breathing, quick loss of
energy
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 222 /223
PHYSICAL SECURITY
Dogs in Security
• Liability…
– Dogs can be viewed as weapons, and as such, can result in criminal liability if caused to attack without
justification
ASIS POA, Vol. 6, Sect. 1.6.1
• Threatening a person
• Attacking a person
• Causing an accident that causes damages or injury
– A dog can be considered dangerous or vicious if the owner or controller knew or should have known of the
dog’s vicious propensities
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 223 /223
PHYSICAL SECURITY
Dogs in Security
• Liability (continued)…
– A dog can be used to detain a trespasser in a similar manner as the property owner could
• Reasonable force could be used to stop the trespass
• An attack of a trespasser that is unprovoked may constitute unnecessary force, resulting in liability for the handler and
property owner (vicarious liability)
• If the trespasser was seriously injured because he provoked the dog, there would be no liability
– Under the common law doctrine of vicious animals, a provocation that caused the animal to attack would be enough to remove the
animal from the class characterized as vicious
• If the trespasser can prove a true fear that the dog was going to attack, a reasonable defense would be permitted, and the
trespasser may be determined not to have provoked the dog, and the attack may be determined excessive force
ASIS POA, Vol. 6, Sect. 1.6.3
• Control the dog at all times when innocent persons may be harmed
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 01: Which of the following is NOT one of the systems design
processes?
B. Installation
C. Procurement
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 225 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 01: Which of the following is NOT one of the systems design
processes?
B. Installation
C. Procurement
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 226 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 02: What are the three, primary uses of video surveillance systems?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 227 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 02: What are the three, primary uses of video surveillance systems?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 228 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
A. Risers
B. Elevations
C. Plans
D. Schematics
E. Details
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 229 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
A. Risers
B. Elevations
C. Plans
D. Schematics
E. Details
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 230 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 04: In general, how much more light do color cameras require than
black and white cameras?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 231 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 04: In general, how much more light do color cameras require than
black and white cameras?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 232 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 233 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 234 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 235 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 236 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 07: What two basic drives are prevalent in dogs used for security
tasks?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 237 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 07: What two basic drives are prevalent in dogs used for security
tasks?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 238 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 08: CPTED landscaping guidelines dictate that shrubs should be kept
to a height no greater than ________ and tree limbs should be trimmed up
to ________ in height to promote surveillance.
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 239 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 08: CPTED landscaping guidelines dictate that shrubs should be kept
to a height no greater than ________ and tree limbs should be trimmed up
to ________ in height to promote surveillance.
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 240 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 241 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 242 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 10: How many officers are required to fill a 24/7 post?
A. 4.0
B. 4.2
C. 5.0
D. 5.5
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 243 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 10: How many officers are required to fill a 24/7 post?
A. 4.0
B. 4.2
C. 5.0
D. 5.5
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 244 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 11: Which of the following is not one of the three security
deficiencies associated with master keying a lock?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 245 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 11: Which of the following is not one of the three security
deficiencies associated with master keying a lock?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 246 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 12: What percentage of the total capital security systems installation
expense is typically representative of maintenance and warranty cost?
A. 6%
B. 11%
C. 16%
D. 21%
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 247 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 12: What percentage of the total capital security systems installation
expense is typically representative of maintenance and warranty cost?
A. 6%
B. 11%
C. 16%
D. 21%
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 248 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
B. Using quasi-random pulses, which must be recognized by the control equipment
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 249 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
B. Using quasi-random pulses, which must be recognized by the control equipment
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 250 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 251 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 252 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 253 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 254 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 255 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 256 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 17: Interior application sensors are divided into three categories.
Which of the following is NOT one of these categories?
B. Boundary-penetration
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 257 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 17: Interior application sensors are divided into three categories.
Which of the following is NOT one of these categories?
B. Boundary-penetration
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 258 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
A. 0.5 fc
B. 1.0 fc
C. 2.0 fc
D. 5.0 fc
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 259 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
A. 0.5 fc
B. 1.0 fc
C. 2.0 fc
D. 5.0 fc
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 260 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
A. 1%
B. 2%
C. 4%
D. 6%
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 261 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
A. 1%
B. 2%
C. 4%
D. 6%
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 262 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 20: When selecting a video system, use a ________ approach instead
of a components approach
A. Performance
B. Prescriptive
C. Systems
D. Integration
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 263 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 20: When selecting a video system, use a ________ approach instead
of a components approach
A. Performance
B. Prescriptive
C. Systems
D. Integration
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 264 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 21: Which of the following is NOT one of the three categories of
access control?
A. Manual
C. Person-controlled
D. Automated
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 265 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 21: Which of the following is NOT one of the three categories of
access control?
A. Manual
C. Person-controlled
D. Automated
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 266 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 267 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 268 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 23: Which of the following is NOT one of the biggest causes of
vulnerabilities in a Physical Protection System (PPS)?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 269 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 23: Which of the following is NOT one of the biggest causes of
vulnerabilities in a Physical Protection System (PPS)?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 270 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 24: Which of the following is not one of the major components of a
lighting system?
C. Wiring
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 271 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 24: Which of the following is not one of the major components of a
lighting system?
C. Wiring
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 272 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 273 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 274 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 275 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 276 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 277 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 278 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
E. Application
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 279 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
E. Application
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 280 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 29: Layered security for a high rise building includes which three,
general layers?
A. Building walls (outer), access to elevators and stairs (middle), and
individual floors (inner)
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 281 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 29: Layered security for a high rise building includes which three,
general layers?
A. Building walls (outer), access to elevators and stairs (middle), and
individual floors (inner)
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 282 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 30: Even though it can vary depending on the threat vehicle, the
optimum vehicle barrier height is…
A. 24”
B. 30”
C. 36”
D. 48”
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 283 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 30: Even though it can vary depending on the threat vehicle, the
optimum vehicle barrier height is…
A. 24”
B. 30”
C. 36”
D. 48”
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 284 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 31: What are the three main components of an analog video system?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 285 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 31: What are the three main components of an analog video system?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 286 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 32: Cost and power of a two-way radio system is determined by all
but which of the following?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 287 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 32: Cost and power of a two-way radio system is determined by all
but which of the following?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 288 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 33: A statement of work (SOW) for security officer services should
state all but which of the following?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 289 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 33: A statement of work (SOW) for security officer services should
state all but which of the following?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 290 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 291 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 292 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 35: Which camera can see in perfect darkness with no light source?
C. Thermal
D. Infrared
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 293 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 35: Which camera can see in perfect darkness with no light source?
C. Thermal
D. Infrared
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 294 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 36: Which of the following is NOT one of the three CPTED security
zones?
A. Unrestricted
C. Controlled
D. Restricted
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 295 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 36: Which of the following is NOT one of the three CPTED security
zones?
A. Unrestricted
C. Controlled
D. Restricted
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 296 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 297 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 298 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 299 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 300 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
A. 4 miles
B. 20 miles
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 301 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
A. 4 miles
B. 20 miles
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 302 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 303 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 304 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
A. 2:1
B. 4:1
C. 6:1
D. 1:1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 305 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
A. 2:1
B. 4:1
C. 6:1
D. 1:1
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 306 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 307 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 308 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 309 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 310 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 44: Which camera can see in perfect darkness but requires a light
source outside the visible spectrum?
C. Thermal
D. Infrared
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 311 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 44: Which camera can see in perfect darkness but requires a light
source outside the visible spectrum?
C. Thermal
D. Infrared
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 312 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
A. Natural access control, natural surveillance, and natural territorial reinforcement
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 313 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
A. Natural access control, natural surveillance, and natural territorial reinforcement
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 314 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 46: What are the three main components of a digital video system?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 315 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 46: What are the three main components of a digital video system?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 316 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 47: Of the eight classes of dogs, which two are typically used in
security?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 317 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 47: Of the eight classes of dogs, which two are typically used in
security?
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 318 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 48: Safes less than what weight are considered “portable?”
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com
PAGE 319 /223
PHYSICAL SECURITY
Practice Test 48 QUESTIONS
• Question 48: Safes less than what weight are considered “portable?”
Revised Spring 2018 ASIS INTERNATIONAL, HOUSTON CHAPTER David P. Cribbs, CPP, PSP | dpcribbs@gmail.com