Monday, January 28, 2013

School Security, a Continuous Journey


School Security


Images of Sandy Hook Elementary School, like those of the World Trade Center on September 11, 2001 are etched into our national psyche.  And like the events of 9/11, the Newtown Connecticut travesty has changed the way we look at physical security. 

Barefoot treks through airport security, emptying our pockets before passing through metal detectors at courthouses and government facilities, identity verification at office buildings and schools; with every terrorist attack or attempt; with each troubled youth’s revenge-seeking on the innocent, we erect higher walls, stronger  barriers to deter  intruders. But are we all not suffering inconvenience as well? Yes, but we accept it in order to feel we have some semblance of safety. But can we be assured of that safety?

The answer is no, pure and simple. There is no such thing as being completely safe. We can only work at it. Seeking security is, and must continue to be, an everyday job. And just as every job has its own job description and skills requirements, every building or facility has its own specific route of approach, points of entry and interior passageways. Specific buildings call for specific solutions.


Built-in Challenges

 Let’s look at school security. Have you ever considered the vast differences in age, architecture and infrastructure of this country’s school buildings?  These are the very things that hamper security.  When I look back at my years teaching, I realize I experienced the extremes –and not just because they were on opposite coasts



New York City schools, many built in the early twentieth century are multi-storied with one main entrance leading into a vestibule and the office, then giving way to a warren of hallways and staircases.  An intruder cannot access a classroom directly, but once he’s in the building, there are many places to hide while he plots his route.







California schools, especially those springing up in the 50’s, 60’s and 70’s are spread out and airy, taking advantage of the flat open terrain and the 
warmer climate. There are no hallways or corridors, instead each classroom is entered directly from outdoors. Quite often the office is located at the front of the complex with no physical connection to the rest of the school. Given this type of lay-out, one can see that it would be quite easy for an intruder to bypass scrutiny and walk directly into a classroom.


 I taught back in the 1970’s and 80’s, years that were mercifully free of incident. If any one wanted to barge into either type of school, there was little to stop them; doors remained unlocked during school hours, the only security measure being a sign posted in front of the school: 




Prevent, Deter, Notify

 As the school officials of today scramble to make it as hard as possible for a gunman to gain entry, the first concept they must embrace is that there is no one size fits all approach. Just as clothing comes in different sizes and styles to fit and flatter different bodies, security can and must be tailored to each building. But if they bear in mind that the main objective is to prevent, or at least deter unwanted visitors, there are three solutions they can tailor to their own specific building or campus.  

Perimeter security
No one is suggesting erecting ten foot walls around the school, although they would keep unwanted people out. In lieu of that, placing IP cameras on the exterior of the building will thwart anyone planning on sneaking into the school.





 Cameras utilizing motion detectors will send video accompanied by an alert to a dedicated computer at which point the administrator or security official monitoring it can communicate with the visitor over an IPbased intercom.








Access control
An IP-based door access control system is the next barrier in preventing entry should an interloper succeed in alluding the cameras and security.  With an IP based access control system, only duly appointed personnel are issued credentials or badges that will unlock the door.
 Facing a securely locked door, an intruder will be, if not deterred, at least delayed since he has no means of unlocking it. And if he tries to force the door, the  visitor management system will send an alarm to the computer in the security office alerting them to the need to notify police, and with some VMS ,the accompanying video feed will be dispatched to police headquarters. Having such situational awareness, enables the responding officers to have a plan in effect before they even set foot on school grounds.

Emergency Preparedness.  


The school-wide paging system serves as a way to alert teachers, students, and staff that there is the potential of an intruder. Many schools are finding that an IP-based paging system is well-suited for this.




 Everyone should know what measures they must take and do so immediately. Such reflex-like reaction can come only from school-wide preparedness.  And preparedness comes only with consistent, persistent training - teacher training and school wide lock-down drills.

  Drills should be held frequently with selected students responsible for drawing shades and blinds, turning off lights,






while everyone huddles in an area out of sight and out of the direct line of any windows or doors. Needless to say, if the school does not have a policy of keeping doors locked from the inside, the teacher needs to lock the door.



  Hopefully no one will experience the real thing but if the unthinkable happens, the drills impart experience and the repeated experience will result in speedy compliance.

No, school days are not like they once were. These changing times call for planning not paranoia. Everyone is part of the plan – students, teachers, administrators, custodians, and security officials, as well as parents. If parents are kept in the loop, they should feel better (which is not to say good) knowing a concrete, well-rehearsed protocol is in place.

Remember security is not a destination since complete safety can never be reached. But security can be a journey and the best vehicles for that journey are training and technology.

Kintrnonics is committed to security. Our sales engineers are available to answer your questions and help you design a security solution tailored to your building's needs. They can be reached at 914-944-3425 or visit www.kintronics.com or fill out this  information form and someone will respond promptly. 
  

Wednesday, January 2, 2013

IP Access Control - Locking up Your Security


In this, our final entry about IP-based Access Control we will examine the locking devices that secure the doors and respond to the systems commands.
To recap what we have already covered: with an IP-based reader, such as an Isonas Power-Net reader, there is no need to install and wire a control panel. Since each reader has an IP connection, all intelligence is right there at the door. A host Windows PC running Crystal Matrix software manages the system. Once the administrator has customized the desired access control, Crystal Matrix sends the information to each of the readers so all entry requests can be processed locally.
No power wires are needed either since the reader can use Power over Ethernet (PoE).  Each reader can then be equipped with a data/power pigtail connection so that it can connect to the door for input from the proximity access card and relay output to control its locking device.

Strikes and Locks
No, this is not a new variation of baseball. Strikes and locks are locking devices.
Electric Strikes
An electric strike only controls the entry side. Upon exit, the door can be freely opened. Like a fixed strike found in a standard lock, the electric strike presents a ramped surface to the latch so the door can close and lock.

There are two types of electric strikes.

  •         A Fail-secure strike, also known as fail-locked or non-fail safe requires electric current to be applied to it in order to open. Power can be either AC or DC, with DC offering silent operation except for a click when the lock releases, and AC causing the unit to buzz. Should there be a power failure, the strike would remain locked from the outside but as noted the knob or handle can always be turned from inside the facility to allow egress.
  •         Fail-safe, also known as fail-open is just the opposite,  requiring electrical current to be applied to the strike in order to lock. Fail-safe strikes run only on DC power, and in the case of a power failure the door could be pushed or pulled open.

Whether the electric strike is fail-secure or fail-safe, it is important that the lock require no more than 500ma of current in order to allow the reader to be powered over Ethernet.

Magnetic Locks
A magnetic lock consists of an electromagnet attached to the door frame and an armature plate attached to the door.

 A constant electric current passes through the electro-magnet so that it is magnetically attracted to the armature plate, in effect, keeping the door locked until the reader interrupts the current. Since an access card must be used on either side of the door, magnetic locks are ideal in high security facilities that keep track of when a user enters and when he exits. Every request to open can be stored on the Crystal Matrix data base.
Locks on exterior doors can require higher magnetic force while those on interior doors could require less. In order to maintain safety, auxiliary power supplies should be installed in a fire panel so that the locks can be released in an emergency.

Knock Knock. Who's There?
It's great to know how the IP reader communicates with the locking device but how does it know who's "a-knocking" to get in?
That would be by means of a proximity device credential used for identification. This device might be a thin card, a key fob, a clam shell, or a cap tag. See Making Access Control Easier, part 2 for an explanation of each of these.

But how does the reader actually read the information stored on any of these? 

RFID stands for Radio Frequency Identification and is a wireless non-contact system used for identification and or tracking. Electronic tags store the data and transmit it to readers using radio-frequency electromagnetic fields. RFID can use kilohertz, megahertz or gigahertz wavelengths. Isonas credential tags and the PowerNet reader-controller communicate at 125 KHz.

RFID is ideal for access control since it works rain or shine, in heat and cold, in bright sun-light or dusty air. Neither batteries nor pin codes are needed, and each credential’s ID holds unique information. All the bearer has to do is present the tag within a few inches of the reader-controller and wait for the electric strike or magnetic lock to release.

We cannot leave access control without considering emergency situations. In most states, fire codes require some sort of over-ride device to allow a quick exit. One solution is to install a Request to Exit (REX) button.


A REX button is particularly necessary with a magnetic lock which requires reader-controller permission on both sides of the door. A REX button, installed on the exit side of the door and fitted with a pigtail and hooked up to Ethernet cabling, when pushed would automatically open the door.




If you are ready to use your existing IP network for real-time control of your facility's security, visit www.kintronics.com to see your options or call 1-800-431-1658 to speak to a Kintronics sales engineer who can tailor a system to fit you needs.Or if you'd prefer simply fill out this information request form for a quick response.