Showing posts with label Access Control. Show all posts
Showing posts with label Access Control. Show all posts

Tuesday, June 1, 2021

Use Backup Power For EM Locks

Use Backup Power For EM Locks 

Access control, one of the key components of a comprehensive security solution, comes in many different varieties. Essentially there are two components, the lock (i.e. the physical mechanism keeping the door locked) and the access control system (such as a card reader, biometric reader, keypad etc, which opens the lock).
Most locks
can be set to function in one of the following ways:

Fail-safe: in the event of a loss of power supply, the lock will automatically unlock, ensuring that people can still exit through the door (safety first)

Fail-secure: in the event of a loss of power supply, the lock will automatically lock, meaning people are unable to enter (or exit) through the door (security first)

It therefore only takes a loss of power to make a fail-safe lock ineffective. Of course there can be a battery backup supply installed, but the battery will have a limited lifespan, perhaps not more than a couple of hours, which limits the time available for the power supply issue to be resolved. Fail-secure locks are therefore better for doors which require higher security, but carry greater risk for safety as there could be people trapped inside the building.

When the main power fails, many believe maglocks must leave doors unlocked.

However, battery backed up maglocks are allowed according to IBC / NFPA code. It just needs to be done properly. We examine the five critical steps for using backing up maglock power correctly:

·        Understanding Codes

·        Calculating Power Budgets

·        Factoring In Power Source

·        Connecting Power Supply Fire Alarm Loops

·        Including The AHJ

In this note, we look at what the code actually says about power backups for maglocks, where they might be illegal, and how to do it right when allowed.

Multiple Factors

When it comes to preventing your Electromagnetic locks (mag-locks) doors from being unsecured when power drops, there are three basic considerations to make:

·        Codes: Understanding the applicable codes and how they apply to a building's use of maglocks is the fundamental start.

·        Engineering: Translating those code requirements into a compliant design.

·        The AHJ: Getting approval from the relevant authority is the last, and maybe most critical aspect of the process.

Codes

Accounting for about 80% of the access control in use, mag-locks operate by an electromagnetic strip attached to the door frame which aligns with an armature attached to the door. The lock can be fail-safe (whereby the electromagnet releases the armature) or fail-secure (whereby the electromagnet attracts the armature) depending on the use and safety standards.

Surprising to many, national codes do not forbid the use of battery backed up maglocks, despite the dominant 'free egress must always be possible' theme. If codes indeed forbid battery backups, these exceptions are made at the local level. However, their use is allowed if done correctly. Take a look at these passages, covering the full scope of controlled openings regardless of occupancy code:

·        NFPA 101 (2012) 7.2.1.5.6 (Electrically Controlled Egress Door Assemblies)

·        NFPA 101 (2012) 7.2.1.6.2 (Access-Controlled Egress Door Assemblies)

·        NFPA 72 (2012) 21.9.1 Electrically Locked Doors

·        IBC 1008.1.9.9 (2012)

The fundamental relevant clause cited is:

Loss of power to the listed hardware must automatically unlock the door.

However, the clause does not prohibit the use of backup power. Any electric lock in the direction of egress shall be connected to the fire alarm system and unlock when the system is activated or when power is lost.

The local jurisdiction may have a variation of these 'model codes' that take exception to the rules, so maintaining local awareness of using maglocks or backup power to them is a crucial step, often undertaken when meeting the AHJ. (See the last section in this artical.)

Calculating Power Budgets

Knowing how long a battery will keep a maglock locked is crucial. Maglocks are typically high demand devices that can drain batteries rapidly as the current draw of maglock is continuous, unlike other lock types that only use power when unlocking.

Take this example 500 pound maglock that requires 320mA at 12 VDC or 170mA at 24VDC:

Assume a 12VDC backup system furnished with two 5 amp hour batteries that must keep four maglocked doors (two sets of double doors) energized. The locks alone consume over 1.25 amps per hour, so with a 10 amp supply, doors will fall unlocked in less than eight hours. As such, prolonged outages may still require manual security response, such as guard staff mechanically locking normally maglocked doors.

Calculating this demand is complicated by other devices that must also be powered in the access system, typically the controllers, readers, and even some RTE devices like PIR motion detectors. The total demand associated with the backup supply may quickly shave the backup power duration to mere minutes in a large system, and ample capacity is a matter of careful design.

Designing Battery Backup - Device / Door Priority

Part of designing a battery backup system may be prioritizing specific (perimeter) doors to stay locked, but leaving others (inside) unlocked when power drops. Of course, the decision must conform with facility security management plans, but in the interest of maximizing uptime for critical doors, others may need to be excluded.

Factoring In Controller Power Support

However, even if one specifies sufficient batteries, a door controller may not support passing sufficient power for the period desired for battery back up power.

Normally, the maglock will be powered by main power and power will be switched on/off by controller contacts.  However, in cases when main power fails or the access designer connects maglocks as field-powered devices, power may then supplied and routed through the controller itself. Flat out, many controller contacts are not designed or rated to deliver substantial amps for long periods.  

While card readers may draw modest amounts of power (ie: 35mA - 100mA), the controller's output relay contacts may not be rated to pass through sufficient amperage to power maglocks (ie: 125mA - 850mA+)

(Note: Later versions of eIDC32 do not include this output power limitation.)

It is because of this limitation, and the way that codes address 'direct interruption' of power to maglocks, that most maglocks are best installed using a separate linear power supply, not powered by pass-thru capacity in the controller.

Batteries vs UPS vs Generators

It is worth noting that batteries are not always the only, or even preferred method, of backup power. UPS devices or batteries, as noted in UPS Backup Power for Security Guide, are the most unitized and least expensive to deploy, but run duration is always a concern. As a result, especially in critical infrastructure or services facilities, the entire building may be backed up by a generator. In this case, the supply is generally much more substantial and runs into hundreds of amps per hour. In these situations, the run length of the backup system may simply not be a realistic problem.

Power Supply Fire Alarm Loops

The codes are clear on one engineering point: when the fire alarm activates, all power to maglock must drop. This typically is implemented by tying the linear power supply into the fire alarm via an input loop.  When the alarm is pulled, it sends a signal to the supply that it must cut power to whatever device is wired to it.

Most access panel and maglock manufacturers include these instructions, although they are typically vague on details in how to connect their components so that it happens.  In many cases, the install instructions state 'Installer must wire controller and/or power supply to stop issuing power when local fire alarm is activated', or similar. However, connection plans for doing this are not hard to accomplish if understood graphically. 

For example, take this Kisi access control knowledge base schematic that shows this common connection graphically: 

Power to the maglock is directly issued by a linear power supply, that in turn is triggered to drop power when a fire alarm is detected at the controller.  Alternatively, the power supply itself may include fire alarm input contacts instead of connecting to a door controller. As previously noted, however, this power drop may apply to every device connected to the supply: readers, controllers, RTE and more.

This may leave the door unsecured, and the main motivation of 'occupant safety' takes a clear precedence over 'building security'. Therefore, schematically planning out where each device is powered, and under what conditions backup power is supplied, should not be oversimplified.

Including The AHJ

Even after all this is done, the answer might still be "no".  If the local authority having jurisdiction, or AHJ, does not approve, the idea is dead. There are two basic reasons why local AHJs may not accept the idea:

·        First Responder Access: AHJs simply do not want any possibility that firefighters cannot enter a building because the door is locked.

·        System Malfunction: Alternatively, some AHJs refuse backed up maglocks because if the fire alarm interface malfunctions, the batteries could potentially keep the door locked and trap panicked occupants inside a dangerous building.

As a result, some areas outright forbid using backup power of these types of door locks as a matter of local exception and take any decision out of the hands of local inspectors.

Proceed Cautiously

These issues describe why maglocks are hated or deemed too difficult to work with by many. While using maglocks may be less expensive or easier to install that other types of electric locks, they are not always the best choice. If the opening design is too restrictive or costly to employ other lock types, then backup power must be supplied to keep doors locked.

Working through a code compliant design and getting approval of the AHJ become a priority for the new access system.

Before you make any decisions about what lock is best for your site, it's important to first think carefully about what your site requires in terms of safety and security, and to evaluate how risk can be reduced to ensure that security related incidents won’t interrupt your business operations.

Another key consideration is the state of the site itself: if you are adding access control to a site after its completion, it may be easier (and certainly more cost effective) to opt to use wireless locks as installing all the components and wires for mag-locks and electric strike locks will require a lot of additional time, labor and effort.

Some end-user opt for a combination of locks, installing a mag-lock and an electric strike lock on a single door to ensure that it is safe, secure and is able to accurately record movements of people in and out of the door at all times. However, in this case, it may just be simpler and more cost effective to install a wireless lock. 

If you still aren't sure what type of lock and access control system best meets your needs, feel free to get in touch with one of our experts via ssaintegrate@gmail.com. Before selecting vendor / installer check and verify they are authorized or not to execute your access control system.

Tuesday, December 1, 2020

Hands-Free Upgrade of Access Control System

Hands-Free Upgrade of Access Control System 

Access control systems also let employers restrict the locations each employee can enter, setting levels of security to balance their workers' safety and convenience. When an employee leaves the company, their credentials can simply be deactivated to prevent them from gaining unauthorized access. With access control security, you know who enters your business, when they enter and what door they use. These systems also include analytics that allow you to track where your employees are. In addition, they allow you to section off rooms or areas to authorized employees and receive reports of suspicious activity, such as if someone tries to enter an area where they don't belong. 
Social Distancing is the new norm of life and need to be practiced across the daily paths. While the governing authorities work for developing solutions to take care of human life, it is essential for various establishments to work out their own precautionary measurements to create safe and risk-free environment. Wireless access control systems are fast and easy to install. They save time and money for sites that have hard-to-wire buildings, remote gates and elevator applications. Addressing COVID-19 Concerns by Upgrading Existing or Non-Existing Access Control System to Hands-Free Wireless access control with non-Chinese factory product. 
Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems.

How long before your phone replaces your access credentials at work? Mobile devices are everywhere. Number of mobile phone users alone was forecast to reach over 4.7 billion this year, with more than 60% of the world’s population already owning a mobile phone.  Smartphones have already begun to replace traditional lock-and-key setups in the home, and with the business world continuing to move in a more smartphone focused direction, a world where you tap your phone to gain access to your office probably isn’t too far off. The technology already exists, but implementation is not without its hurdles. While generally outweighed by the benefits, there are several potential challenges when it comes to using your Smartphone as a credential. Smartphone have become ubiquitous, but cards and FOBs are still cheaper to produce. Even though users are likely to have their phone on them constantly, access badges usually include a picture and are always meant to be visible. Still, as the technology improves, it’s likely that Smartphone verification is going to become more prevalent. One application that we’re seeing growth in is for mobile-enabled workforces to use smartphones and mobile devices as keys to gain access to secured buildings, rooms and areas. As this trend becomes more commonplace, it’s worth weighing the pros and cons.

 

Mobile Benefits

Firstly, let’s look at the benefit of using your smart phone as access credentials for your building.

  • ·  Smartphones are more secure than traditional access cards or FOBs. With the introduction of biometrics in modern smart phones (fingerprint sensors and face ID), even though someone might be able to get their hands on someone else’s phone, it’s no guarantee that they’ll be able to unlock it.
  • ·     Smartphone-based credentials are very difficult to clone.
  • ·  Smartphone-based implementations can reduce installation costs by leveraging an asset that everyone is already carrying around with them.
  • ·    Smartphone credentials are capable of much more than traditional card-based systems. Smart phones are capable of Multi-Factor Authentication (MFA), location awareness, mass notifications, and revocation can be done remotely.
  • ·      HR should be thrilled with a smartphone app-based access control system, as much less time will be needed to set up and issue credentials than issuing new keys and cards or replacing them. 

Finally, if you choose a provider who has created a secure app with credential storage in a secure cloud or location other than the phone, the security is even greater. Biometrics (the use of fingerprints) can even be used to access the key, since smartphones now include that capability. 

Essentially, even if someone did manage to steal the phone and crack the pin to open it, they would still need the proper information (or fingertips) to open up the app and access the key. 

A strong app will also have deep levels of encryption that will prevent the Bluetooth signal from simply being copied and replayed to open the lock.

Potential Challenges

Of course, as new technology emerges, there will be pushback. This isn’t a bad thing as it forces developers to overcome roadblocks to make systems as secure as possible. The difficulty comes from separating valid objections from merely an aversion to change. Going forward, the biggest issues with mobile credentials are:
·       Physical return of credentials. When someone parts ways with an employer, a physical access card or FOB would be collected. With a smart phone-based system (especially in a case where employees are bringing their own devices) this is obviously problematic. You can’t ask an employee to turn in their. The only solution to this problem is to ensure that your protocol for remotely disabling credentials is foolproof. If it is, this issue becomes a benefit, as you can revoke credentials at any time. Forgetting to have a card turned in or encountering any resistance from an employee is no longer a factor.
·   
Lack of a picture ID. With many physical access cards, a photo of the employee will be added as a second form visual verification. These cards are often clipped to an employee’s shirt or belt making it visible at all times and allowing people to identify them immediately. Phones are generally kept in pockets and would only be brought out at an access point. This issue’s importance will vary based on your business’ level of sensitivity when it comes to your assets or people. Additionally, all modern access control systems allow for a head shot to appear when credentials are presented to a reader. If a picture has been taken of the employee, and someone is present to identify them, they can verify that the person who presented the card or phone is the proper individual. It’s even possible to speak with the person in video which will allow for facial recognition with CCTV integration with the access control software.

One reason for the high expected growth for usage of smartphones as digital access control keys is that mobile technology is already widely used for identification, authentication, authorization and accountability in computer information systems. Another reason is that using mobile devices as keys aligns perfectly with the mobile-first preferences of today’s workforces. Using mobile devices as keys not only delivers a convenient user-experience. It also helps boost operational efficiency and satisfaction of today’s mobile-enabled workforces. As important, it represents a more cost-effective, simpler way for companies to manage identification credentials as it eliminates numerous manual tasks related to handling, printing, distributing and disposing of physical identity badges.

When all is said and done, one of the biggest benefits that those who choose to implement mobile credentials will see is lower installation costs. The SIA points out that “A smartphone credential adds significant functionality over a traditional credential and is always upgradeable to add new capabilities – all for the same cost, or less…Also, users do not require a reader to enter a door, so enterprises can eliminate readers on most doors to keep the entrance looking clean and to reduce installation costs.” When you couple this with the other benefits of mobile credentials, it becomes clear that this will more than likely become the preferred method of access control for most workplaces in the near future.


ASSA ABLOY, Suprema being a pioneer in multiple doors opening and access controlling technology, provides such critical solutions suitable for wide segments of commercial spaces. With easy and safe access for authorized personal, without compromising on the security needs of the organizations, the contactless access readers and exit switches for sliding and swinging door operators. 

Aperio is first Wireless Online Access Control technology that enables mechanical locks to be wirelessly linked to an existing access control system. In terms of formats, three common methods of mobile credentials are used in access:

  • BLE (Bluetooth Low Energy)
  • NFC (Near Field Communication)
  • App Based Credentials

‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience.

Structurally which method is used makes a big difference for overall mobile access performance. In general, access manufacturer data sheets will detail which/how many methods are available with their product, with each method having different limitations and benefits.

The breakdown below shows the major differences between types:

For example, notice the difference in Range between the three formats. While NFC range is short (typically less than 9 inches), the range for BLE is longer at ~150 feet, while App systems essentially have ranges only limited by Wi-Fi and cellular connectivity.
In other cases, which method is used impacts reliability too. For example, with HID Mobile, using BLE is less reliable for connecting to the reader than NFC, and because different phone types may limit which method is options used, overall user experience is often determined by which mobile access method they use.
Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction.
Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets.
The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards.

The first problem is usability: compatibility and speed.
While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market.
 
Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems however, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards.
The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market.

While BLE technology helps resolve the compatibility problem of mobile access cards, we can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market.

Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication.

MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin.
 
This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader.
 
By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience.


Thursday, October 1, 2020

WORSHIP SURVEILLANCE DETECTION

WORSHIP SURVEILLANCE DETECTION

India has one place of worship for every 400 people, more than the countrywide spread of educational and medical institutions put together. And it does not seem that the pattern is going to change soon.
We often come and go from our Houses of Worship (HOW) with very little thought about who may be watching our activities. If we have implemented basic security precautions, we are probably comfortable in our setting. Security and worship can be successfully blended for those who worship in your facility. No house of worship (HOW), whether a church, mosque, temple, or synagogue is exempt from crime, whether committed by an internal member, a stranger, or as a random act of terrorism. On 5th September 2018 District Magistrate Srinagar, Dr Syed Abid Rasheed Shah, has ordered for installation of CCTV cameras in and around all prominent shrines, mosques and temples in the district.


Terrorists often gather significant pieces of information from open sources such as Google Maps and social media post­ings. They collect a lot of data about their target of interest and eventually they will conduct physical surveillance. After collecting initial data about the HOW, the terrorists will begin to survey the location, trying to determine the best time and mode of attack. Terrorists may look for a soft target that will bring instant publicity and maximize impact. A soft target can be a facility that doesn’t lock its doors or provide any type of security. Finding no resistance to their surveillance, they quickly realize there will be little or no threats to their safety, allowing them easy access in and out of the building. Depending on their plan of attack, they may send more skilled members to collect additional information by conducting surveillance inside and outside of the facility.
Risk Assessment
How do you know if someone is watching your facility? First, as a member it is always important that you are aware of who is in the parking lot. Be aware of any cars with people sitting in them that are in close proximity to your facility.
Now we need to find out risk factor in terrorists’ eyes.
Red Zones:
Terrorists seek locations to position themselves in what are referred to as red zones. These zones will normally meet the following three requirements:
1)  View of the target. Terrorists want to observe vulner­abilities so they need a good view. They will note the times of services. They will note how many people are there at any given time, seeking the opportunity to kill the maximum number possible with as little effort as possible. They will observe who comes and goes from the facility and will note the established patterns of behavior.
2)  Cover and concealment. Terrorists need to be able to apply cover and concealment tactics. While they are viewing the intended target, they do not wish to be observed by you.
3)  Safety and Exit. Terrorists do not want to be appre­hended and thus seek a safe exit which provides a quick exit, should their presence be observed.

Green Zones
As you are entering and exiting from your HOW, it is important that you are observant of suspicious activities.
Following are a few suspicious activities you might observe around your facility:
• Someone taking notes or photos who stops abruptly when approached
• Someone pointing at the target or casually looking around
• Circling the block repeatedly in a taxi or vehicle.
• Car, van, or truck parked nearby with occupants taking notes or photos.
• Circling the block repeatedly in a taxi or vehicle.
• Drawings or maps observed in a vacant car, van, or truck.
• Interest in security systems/someone enters and asks about the security system
• Someone glancing away or appearing to be nervous when approached.
• Someone enters the facility claiming to be looking for someone, and they appear overly interested in the physical layout of the building


The above listed activities may or may not indicate that your location is under surveillance. However, if observed, they should be noted and reported immediately. Another consideration as terrorist activities increase is that if law enforcement personnel are able to observe those conducting surveillance, it could result in lives being saved by collecting and sharing intelligence information. Otherwise, terrorists may move onto the next facility, which could result in many casualties. Regardless, the decision to question those conducting hostile surveillance or conduct additional surveil­lance must be made by law enforcement or a trained security team member.
Securing Worship
This part I divided into three (3) sections:
• Interior security
• Exterior security
• Procedural and/or best practices

• Interior security by
1.   Access Control:
Controlling and limiting access is one of the most important steps that can be taken to improve security. Some Worship staff and worshippers will not be comfortable with restricting access.

• Establish policies to maintain access control
• Limit access to childcare, business offices, cash counting area, and media rooms.
• Always install the latest patches and updates when prompted. This mitigates many hacking programs that rely on outdated vulnerabilities in your software. Set your computer to auto install updates.
• Doors and windows should be secured when the building is vacant.
• Limit points of access. When opening your facility, consider the event, the number of people, and the location of the event. Limit access by only opening doors that are close to the area being used. Do not open every door.
•  Establish checkpoints based on need--and staff accordingly. A checkpoint is an entry where all people and things are screened based upon the security plan for the current threat environment.
•  Keys for critical areas and master keys must be especially controlled.

2.   Burglar Alarm:
• Establish policies to maintain burglar alarm system.
• Ensure an alarm system covers access points and key areas where expensive items are housed.
• Use a reliable monitoring vendor and ensure contact information remains current.
• Develop a policy that addresses response to alarms.
• Install panic alarms at public reception areas where employees can initiate emergency procedures when suspicious persons approach and request access.

3.   Fire Alarm:
•  Ensure adequate addressable fire alarm coverage. The local fire department can help with determining what is needed for your facility.
• Develop a policy that addresses response to alarms.

4.   CCTV System:
Camera coverage should be considered for critical areas (such as areas with children, the business office, the clergy’s office, etc.) and access points. They can also be focused around items that are most likely to be stolen. For places of worship with little capital to spend, a camera with audio that can be monitored from a cell phone may be purchased for about $250 - $2500.

•  A Camera system can also serve as an alarm system by using video analytics and integrating with access control systems.
• Cameras should capture every door and point of entry. Additionally, cameras should be in the infant care rooms, daycare rooms, and areas where children play/eat/etc.
• If cameras are installed in daycare centers, inform parents and caretakers that you would be storing digital data of their children.
• Always install the latest patches and updates when prompted. This mitigates many hacking programs that rely on outdated vulnerabilities in your software. Set your computer to auto install updates.

Considering that places of worship are often targets of attacks, crime, and other losses, it is our belief that by auditing CCTV video footage as a standard operating procedure, and delivering a new powerful signage that states ‘WE CHECK CCTV EVERYDAY', far more benefits will accrue to them.

5.   Doors:
• Ideally doors should be wood or steel with a solid frame.
• Hinge pins should be located on the interior of door, or capped, if on the outside to prevent easy removal.

6.   Windows:
• Ensure that windows are secured prior to closing and latches are in working order.
• If windows are opened for air circulation, only open windows that are monitored and/or located where
people cannot climb through.

Exterior Security
Exterior security controls encourage us to think about how best to secure the perimeter of the church, parking lots, playground areas, and mass drop-off areas. Research says most violent crimes at faith-based organizations, more than 70% of the acts occurred outside the building on ministry grounds or parking lots.
• Consider enhancing perimeter security by adding a decorative fence—whether aluminium, board, stone, brick and/or multiple combinations thereof.
• Secure points of entry when no events are taking place. If your facility has back entrances and parking lots, these should be locked off.
• Remove potential fire hazards, such as trash and debris. Keep dumpsters in a locked dumpster pad.
• Consider vehicle barriers and/or bollards for vulnerable entries, special events, or in case of a terrorist threat when stand-off distance is required for vehicles. Barriers can be as simple as strategic parking of staff vehicles or as complex as a built-in place.
• Identify exterior hiding places, equipment vulnerabilities, utilities entries/shutoffs, fire department connections and hydrants. Check them for signs of activity before any event.
• Lights should be placed on all doors and windows. Motion detector lights should be considered for doors and windows. Ensure all lights are in working order.
• Lights should be on from dust to dawn. Consider lights with solar panels as this may reduce the cost of the energy.
• Larger facilities may need an officer to direct traffic. This will ensure timely entry and parking. The officer(s) can patrol the parking lots during the services. This task can also be completed by members of your “security team.” Outfit them in high-visibility vests and radios.
• Camera coverage is recommended for the exterior of the facility. Every area from the entrances to the parking lots should be covered. Some cameras only record when motion is detected, others record 24-7. Cameras can be monitored from the inside by your security team members and remotely on hand held devices as needed or based upon analytics,
• "Cameras never lie". But, how will a user ever know, unless he 'sees' what the camera 'saw'. Do audit own CCTV video footage as a standard operating procedure, for them to achieve optimal benefits from CCTV video, which includes (a) crime, fraud and loss prevention (b) faster solving of crime (c) risk mitigation (d) compliance issues and continuous improvement and so on.
• Appoint a “security leader” to oversee the development and implementation of the security plan. Schedule regular meetings to review procedures and incidents.
• Develop a “Welcoming Committee” of individuals and/or ushers who are trained in security detection and emergency responses.
• Conduct evacuation drills with staff and volunteers. Attend firearms training if your committee recommends that individuals are armed during services and special events.

"Considering that places of Worship are often targets of attacks, crime, and other losses, 'COM-SUR', the world's only CCTV video footage auditing, smart backup, and standardized intelligent reporting software is available for free to all places of Worship world-over, as part of our corporate social responsibility.

Places of Worship will need to take care of the hardware, installation, training, and so on; which can easily be carried out by their system integrators, who will need to be approved and trained by us. Besides a registration and training fee, a small consulting and administration fee will be charged by COM-SUR from the system integrator".

Resources:
Crime Prevention for Houses of Worship, 2nd edition, by Paula L. Ratliff. Published by AISIS International, 2015.
https://www.ifsec.events/india/visit/news-and-updates/com-sur-will-be-integrated-ai-ml-technologies-offer-holistic-solutions
https://timesofindia.indiatimes.com/city/agra/kasganj-cctv-cameras-to-be-set-up-at-worship-places-in-sensitive-areas/articleshow/62823320.cms
https://www.newindianexpress.com/cities/bengaluru/2019/apr/26/police-top-brass-meets-heads-of-places-of-worship-malls-1969148.html
https://defendry.com/4-ways-to-improve-security-at-your-place-of-worship/


Thursday, April 16, 2020

Integrate Systems against Power Problems

Integrate Systems against Power Problems

Security system installers must consider all the factors impacting success of a system to provide a more comprehensive value to clients.

Acompelling case can be made for how important security systems are in protecting facilities, assets, employees and customers, and few would disagree that investing in a comprehensive plan to secure a business is a wise decision.

Demand for home technology is growing, and homeowners might start with a trial DIY security experience. After challenging setup and maintenance, they’ll reach out to a security dealer, seeking service, support and expertise.

When problems with power, such as surges, spikes, blackouts, or brownouts occur, it is imperative that security systems go on unfazed. The prospect of protecting all of the systems involved can be daunting, but a granular approach can simplify the process greatly.


Power issues are growing, especially as homes with many large appliances and TVs, take on additional power draws like security cameras, sound systems, etc. These issues can be hard to detect, but could be noticed, for example in a TV room: When a mini fridge cycles on when an air conditioner is also running, you may notice that the lights flicker or dim. These fluctuations are damaging to equipment, as well as other issues such as electromagnetic and radio frequency interference, over/under voltage, ICE–inrush current, etc. that are also often present. Over time, they can damage equipment or lessen its lifespan.
There are seven critical areas that must be operational in the event of a power problem:
1.  Cameras & Recording Devices — Back up camera power supplies and recording hardware devices like: NVR or DVR with at least one hour of battery backup time from a uninterruptible power supply or UPS.
2.  Access Control — These systems typically have a low power requirement, meaning they can be inexpensively backed up with a small UPS that provides a significant amount of runtime. Once at least one hour of battery backup time from a UPS.
3.  Fire Alarm Systems — Power requirements for fire alarm and signaling systems are specified in the National Fire Alarm and Signaling Code (NFPA). The code requires a system to have either two sources of power (primary and secondary) or a single Uninterruptible Power Supply (UPS). Where primary and secondary power supplies are used, the secondary supply can consist of batteries or batteries plus a standby generator. For a basic fire alarm system that uses primary power with batteries only as secondary power, the battery capacity must be sufficient "to operate the system under quiescent load (system operating in a non-alarm condition) for a minimum of 24 hours" and then still be able to operate "all alarm notification appliances" and all other connected loads for a period of five minutes. The code specifies that the net capacity be based on two different demand rates (quiescent and alarm) for two different durations (24 hours and 5 minutes). Your Fire Detection OEM can share battery calculation excels to ensure correct Voltage & AH.
4. Emergency Communications Emergency communications systems (ECSs) used for mass notification or for in-building fire emergency voice/alarm communications service have the same 24-hour quiescent load requirement but require 15 minutes of full-load alarm capacity. This is because these systems are usually operated for longer periods during an emergency. They sometimes may be used for 30 - 60 minutes, but only under partial load as announcements are made to certain floors. They might then be called upon to operate under an increased or even full load for some period. The code requirement for 15 minutes of full load should be evaluated by the system designer in conjunction with a risk analysis to determine if a larger capacity should be provided.
5. Emergency Lighting — Functioning emergency lights with reliable backup power is required to comply with state building codes, fire codes, insurance standards, and OSHA standards. Emergency lights are standard in new commercial and high occupancy residential buildings.
A UPS battery provides power to the emergency lighting inverter to support the lighting load. Passive Standby static inverter emergency lighting systems are ideal for use with fluorescent and incandescent lighting.
6.   Intrusion Detection — The first line of defense against unauthorized access, these systems often include a small onboard battery; this can be effectively backed up with a small UPS for added protection.
7.   Telephone Systems Communications in an emergency are critical, and backup of the telephone system is key to a complete security plan. This includes UPSs for both the main system, and workstations.
8.   Building Automation System BMS is a computer-based environment that manages a building’s HVAC, ventilation, lighting, Fire Pumps, AHU, VRV and Plumbing etc. critical devices feeding the BMS including DDC should be supported by an uninterruptible power supply (UPS) that ensures continued operation in case of a power outage till two hours. Ideally, those UPS units should be remotely managed to ensure the best performance possible, but differing communication standards between systems have created some challenges for building system managers.


A complete security plan for any organization, whether it’s a business, school, or government entity, must focus on each area of the system’s requirements for power protection. With each piece working in harmony, the next power problem will not turn into a disaster.