21. Related Security Systems
Chapter objectives
1. Learn about Photo ID Systems
2. Learn about Visitor Management Systems
3. Understand the Basics of Security Video
4. Learn about Many Types of Security Communications Systems
5. Learn about System Architectures Models for Campuses and Remote Sites
6. Pass a Quiz on Related Security Systems
CHAPTER OVERVIEW
Alarm/Access Control System functions can be expanded and improved by integrating them effectively with related Security Systems. In this chapter, we will discuss a wide variety of related security systems and how they can all be used together to make a more powerful and effective security program.
Systems discussed include Photo ID Systems and Visitor Management Systems. We will explore video systems and communications systems in some detail and how to interface them with Alarm/Access Control Systems to make a single powerful Security System. We will also review a variety of system architecture models for campuses and remote sites and also how security console functions can be improved by system architecture and analysis.
Alarm/Access Control System functions can be expanded and improved by integrating them effectively with related Security Systems. In this chapter, a wide variety of related security systems and how they can all be used together to make a more powerful and effective security program are discussed.
Systems discussed include Photo ID Systems and Visitor Management Systems, and video systems and communications systems are explored in detail as well as how to interface them with Alarm/Access Control Systems to make a single powerful Security System. Also reviewed are a variety of system architecture models for campuses and remote sites as well as how security console functions can be improved by system architecture and analysis.
Keywords: Architecture, Console, Functions, Integrating, Management, Photo ID, Remote Site, Visitor
Author Information:
Thomas L. Norman, CPP, PSP, CSC, Executive Vice President, Protection Partners International

Photo ID Systems

In the early days of access control before electronics, access cards carried all of the information that a guard at a gate needed to know to allow or deny access to the person wearing the card. The card had a facility code (usually a logo of some sort), the user's name and department, and a badge number. Most access cards also displayed a photo of the user so that the guard could compare the photo and the person wearing it to be certain that the bearer was in fact the person to which the card was issued. Additionally, the cards commonly displayed an array of colors that identified which areas of the facility the bearer was allowed to enter.
As electronic access control systems became more common, Photo ID systems were developed to work with them. Photo ID systems print all of the information on the actual face of the access card except for access authorizations, which of course is inherent in the electronic access card itself.
Photo ID Systems include:
• A Badging Computer that is connected to the Access Control System database
• A Badge Printer
• A Digital Camera, Backdrop, and Light
Large Photo ID operations use multiple computers, printers, and cameras to keep up with a constant stream of new users at factories and other such facilities with high employee hire and turnover rates.
Virtually all Alarm/Access Control Systems today have a Photo ID module available.

Visitor Management Systems

Although Access Control Systems were originally made to provide easy access for authorized Employees, Visitors also needed access. It is not a good idea to issue permanent Photo ID to every visitor.
Different organizations handle Visitor access in different ways. One of the best ways to accommodate visitors is by using a Visitor Management System. A Visitor Management System is designed to record Visitors into a Visitor Database and issue a Temporary Visitor Access Card that can be used at portals equipped with special Visitor Card Readers.
Temporary Visitor Access Cards are typically printed on card stock and include a photo of the visitor, his/her name, an expiration date, and a card number. The card may also bear a barcode corresponding to the Visitor Access Card number.
Although some facilities only use Visitor Management Systems to keep track of who came through the front door and use the cards as ID cards only for visitors while in the facility, other facilities make full use of Visitor Cards as access cards, used with the Access Control System to allow visitors unescorted access to designated controlled areas.
Some Visitor Management Systems track visitor access activity separately from Employee Access activity, although many Access Control Systems can be programmed to track both. Most Visitor Management System users also have at least some key entry (and exit) readers that use the Visitor Access Cards as well as Employee Access Cards. Often these readers are placed on Lobby Turnstiles equipped with both Proximity type readers to read Employee Access Cards and barcode readers to read Visitor Access Cards. Visitors are escorted elsewhere throughout the facility. The turnstiles record the Visitors going into and out of the facility.
Visitors can be tracked by date or frequency of visits and which employees they came to see as well as other data. The biggest advantage of the Visitor Access Cards is that they are disposable, unlike Employee Access Cards.

Security Video

Without a doubt, after the Alarm/Access Control System, the most important system for a Security Unit to have and use is a well-designed Security Video System. Video systems provide the ability to
• Assess events detected by the Alarm/Access Control System
• Observe all areas of the facility for inappropriate or suspicious activity
• Conduct investigations remotely
• Follow the movements of subjects of security events or investigations
• Produce visual evidence of security events
Today most video systems use analog video cameras and digital storage media; however, this is a snapshot in time. The trend is moving toward digital cameras and digital storage.

Video History You Need to Know

In the earliest days, security video was an expensive rarity, with even the largest multi-national corporations having no more than a few video cameras watching over their most critical assets.
Recorders were unheard of and each camera was wired to an individual video monitor, watched over by a 24 hour guard post.
Today, I have a 16 channel Digital Video Recorder and a complement of video cameras watching my home and property. When I received a telephone call in Beirut, Lebanon, from my alarm company in Houston, Texas, telling me that a glass break sensor had triggered on my home in Texas, I asked them to roll the police and then checked my video system to discover that my gardener was mowing the lawn next to the very window that reported the alarm. Although the police found nothing, a check of my home by my wife uncovered a small crack from a stone that was launched by the lawn mower. So how did we come from only a few cameras for multi-national firms to private individual assessing alarms from half-way around the world?
The answer is commoditization. I am old enough to remember when the first video cameras were produced for the market with a price of less than $1,000 each. Integrators exclaimed: “Oh the horror! This will be the end of the security video market! How will we ever be able to make money on security video if cameras are priced under $1,000?” Quite the opposite happened. Today security video is the largest segment of the security technology market and small security installers have evolved into large multi-national firms doing quite well, thank you.
As prices fell, consumer demand increased. The technology has gone through the following phases:
• 1960s: Individual cameras to individual monitors
• 1970s: Multiple cameras to sequential switchers to fewer monitors
• 1980s: Introduction of Quad Multiplexers, displaying four cameras on one monitor
• 1980s: Introduction of first Analog Matrix Switches
• 1980s: Introduction of first Video Recorders for security
• 1990s: Introduction of first 16 channel Digital Multiplexers
• 1990s: Introduction of first Time-lapse Video Recorders
• 2000s: Introduction of first Multiplexing Digital Video Recorders
• 2000s: Introduction of first Digital Video Cameras
• 2000s: Introduction of first Server-based Digital Archiving Solutions
• 2000s: Introduction of first Graphical User Interface (GUI)
• 2000s: Introduction of exotic security video cameras (Infrared, Laser Illuminated, etc.)
• 2010s: Further development of GUI-based Video Systems made Alarm/Access Control Systems an attachment to rather than the focus of Security Monitoring Systems
All of this was driven by continuously falling prices, and demand increased. Increasing demand has driven technological development.

Cameras and Lenses

Video cameras are an amazing invention. Light falls through a lens onto an imager and is converted into electric signals only to be re-assembled as an image on a video monitor or storage device. In the earliest days, this was all done using analog signals. Today, the imagers are digital devices (basically an array of transistors with no cover on the circuit so that light can fall directly onto the transistors). In the case of digital video cameras, this digital imaging device is converted through a standardized digital compression algorithm such as MJPEG, MPEG-4, or H.264, and it is transmitted via TCP/IP to a digital video recorder or server where it is distributed for display on a computer monitor and recorded onto a hard disk. That is the logical development of the industry. But we are not quite there yet.
For some unknown reason, in many (analog) cameras, the digital image is converted to an analog signal where it is transmitted over coaxial wire to the analog input of a digital video recorder where the analog image is converted into a digital image to be displayed and stored digitally. Ok, am I the only one wondering why they convert a digital image to an analog image only to re-convert it back to digital? This is how all technology evolves.
Today, the following types of cameras are available, and in most cases they are available in both analog and digital versions:
• Imager and Processor Options:
• Standard Resolution Color Video Camera (provides a color image under good lighting conditions)
• Low-light Video Camera (works well under low light and standard lighting conditions)
• Wide Dynamic Range (WDR)Video Camera (adjusts scene contrast to accommodate scenes with both light and shadow areas)
• Form Factor Options:
• Fixed Video Camera
• Fixed Dome Video Camera
• Pan/Tilt/Zoom (PTZ) Video Camera
• Dome PTZ Video Camera
• Mounting Options:
• Wall Mounting
• Ceiling Mounting
• Corner Mounting
• Pole Mounting
• Extendable Parapet Mounting
• Digital Options:
• Standard Resolution Cameras
• Mega-pixel (MP) Video Cameras (provides much higher resolution than standard video cameras)
• Lens Options:
• Fixed Standard Lens (fixed focal length)
• Vari-focal Lens (adjustable focal length to obtain the best scene view with just a single lens)
• Zoom Lens (remotely adjustable focal length)
• Fixed Iris (for fixed lighting conditions)
• Auto-iris (adjusts automatically to changing lighting conditions)
• MP Lens (extremely high resolution capabilities to bring the most out of MP Cameras — all MP cameras should be used with MP lenses)

Lighting and Light Sources

Lighting is essential to good video images. However good lighting is not always available so it pays to know how different cameras will perform under different lighting conditions. First, here is a basic primer on lighting.

Lighting Levels

• If we want to measure the amount (level) of visible light (illumination) in an area, we would be interested in knowing its Lux (metric) or footcandles (English) level.
• One footcandle (fc) is the amount of light equal to one candle at one foot (one lumen on a one square foot surface).
• Lighting can also be measured in Lux or Lumens per sq. ft.
• Multiply footcandles by 10.76891 to convert to Lux
• Multiply Lux by 0.09290304 to convert to footcandles
• Footcandles = Lumens per sq. ft. (no conversion necessary)
• A typical sunny day can measure between 5,000 fc and 10,000 fc
• An average room may be about 30 fc
• A full moon can provide about 0.2 fc of illumination

Lighting Sources

• Different types of lights yield different colors of light. Light is measured in Kelvin (color temperature). Video cameras work best with lighting that is as close as possible to natural overhead daylight at 12:00 noon (5,600 K).
• Color temperature affects how warm or cool we perceive the lighting to be. Lower Kelvin temperatures emit warmer light while higher Kelvin temperatures emit cooler light. Reddish colors (like a candle flame) are considered warm lights, whereas bluer colored lights (like moonlight) are considered cooler lights.
• Approximate Color Temperatures of various Lighting Sources:
• 1,700 K: Match Flame
• 1,700 K: Low Pressure Sodium Lamps
• 1,850 K: Candle Flame, Sunrise/Sunset
• 2,100 K: High Pressure Sodium Light Fixture
• 2,700 K: Tungsten Incandescent Light
• 2,900 K: Warm White Fluorescent Light
• 3,000 K: Halogen Light
• 3,700 K: Metal Halide Light
• 4,100 K: Moonlight
• 4,200 K: Cool White Fluorescent Light
• 5,000 K: Horizon Daylight
• 5,600–6,000 K: Natural Overhead Daylight at Noon
• 6,500 K: Overcast Daylight
• 7,000 K: Mercury Vapor Lamp

Important Facts about Lighting for Security Video

• Lighting can be either diffuse or direct. Direct lighting provides better contrast, but sometimes there is too much of a good thing.
• Lighting is best for video when it is overhead and diffuse with little or no reflections.
• Lighting problems to avoid include:
• Strong Side Lighting, such as from a window
• Backlighting, placing the subject in a shadow
• Very low lighting
• Strong reflections from shiny surfaces
• Viewing light sources directly

What We See

Our eyes automatically adjust color temperature so that we perceive the same general image under a wide variety of lighting conditions. Color temperature affects our mood more than our actual perception of the light color itself. However, this is not true for color video cameras, which render the color on the monitor screen exactly as the temperature it sees. Thus, one image taken under High Pressure Sodium Lights may appear yellow while another taken under Fluorescent light may appear green.

Auto-White Balance

Most color cameras today have an automatic white balance adjustment to assist them in displaying lighting that appears to be more true to the colors we see. While this circuit helps adjust for true color, the results are not always ideal.

Dynamic Range

Dynamic Range is the camera's ability to differentiate the extremes of light and dark within a scene, especially when one is close to the other. Wide Dynamic Range video cameras use processing circuitry to down-contrast light areas and dark areas so that the overall scene becomes more readable. Our eyes do this trick naturally. WDR works best, for example, when we need to see a subject close to or standing in front of a bright window.
WDR cameras should not be used everywhere. Using WDR in evenly lit scenes results in less overall contrast and a less readable scene.

Display Devices

Most display devices today are LCD or LED computer screens. Older display devices included Cathode Ray Tube (CRT) computer screens, Plasma screens, and Analog CRT Video monitors. The best display devices provide fast refresh rates, very high resolution, and very high contrast.

Video Recording Devices

In the early days of security video, video was recorded on Open Reel 2" Videotape Recorders. This was entirely impractical and soon gave way to recording video on VHS video cassettes. This was shortly followed by Time-lapse VHS recorders, which have given way to modern digital recording. Today, security video is recorded on either Digital Video Recorders (DVRs) or Network Video Recording Systems.
DVRs (Figure 21.1) receive either analog or digital video inputs (depending on the brand and model), and for analog inputs, they digitize the video (convert it from analog to a digital signal). Most DVRs also compress the video into a digital format that is more compact than raw video to save storage space. The video is stored on internal or attached hard disk drives (a few also have tape drives for back-up). DVRs may operate alone or networked together as a group. Most DVRs can support a workstation directly with intrinsic software or software that resides on the workstation. Networked DVRs provide the workstation with the ability to view multiple cameras on multiple DVRs. The key element defining DVRs is that cameras typically connect directly to the DVR.
B9780123820280000211/f21-01-9780123820280.jpg is missing
Figure 21.1
Digital video recorder.
© 2011 Pelco, Inc.
Network Video Recording systems are available in several versions, but they all share the ability to work only with pre-digitized sources that are received across the network, and not directly onto the recorder.
Some DVRs can connect with dedicated Network Video Recorders that are designed to work with specific brands of DVRs. Most Network Recording Systems are designed to work with Server-based Digital Video Systems. Server-based Digital Video Systems use a quantity rating from 1 to N servers (Figure 21.2). In a server-based system video cameras are digitally encoded either within the video camera (digital camera) or through a digital encoder. Both the cameras and the servers connect to the security system network. This allows cameras to be placed widely among floors, buildings, and campuses and still to all be centrally recorded on the servers with a minimum of wiring. This would not be possible using DVRs.
B9780123820280000211/f21-02-9780123820280.jpg is missing
Figure 21.2
Basic server architecture.
Server-based systems also have the advantage of being able to provide Fail-Over servers so that if one server fails, another takes its role instantly, recording to the same or different recording media. Fail-Over servers can also record to redundant media so that even if the media fails, the recording is intact.
Several video recording schemes are available using server-based systems. These include:
• Internal Hard Disk Storage
• Direct Attached Storage
• Network Attached Storage
• Storage Area Network
Internal Hard Disk Storage (HDS) is common on Fail-Over servers where the need to record may be short-term (such as hours or a couple of days). Internal HDS is also common on very small systems where there is only a single server and few cameras.
Direct Attached Storage (DAS; Figure 21.3) is usually configured as an external hard disk that is directly connected to the server (not through a network). This is also common on small systems with a single server. DAS usually provides more storage than HDS. DAS systems typically have from 1 to 8 hard disks in a common enclosure, and these are usually connected through a Firewire or USB-2 port.
B9780123820280000211/f21-03-9780123820280.jpg is missing
Figure 21.3
Direct attached storage.
Network Attached Storage (NAS; Figure 21.4) is generally similar to DAS in that it is a box of hard disks (Just a Bunch of Drives, JBOD) except that instead of the box connecting to a single server, it connects to the same network that the servers and cameras or encoders are connected to. NAS has the ability to share its storage across a small number of servers.
B9780123820280000211/f21-04-9780123820280.jpg is missing
Figure 21.4
Network attached storage.
A Storage Area Network (SAN; Figure 21.5) comprises one or more JBODs that are controlled by a SAN Switch. The SAN Switch directs incoming data from video sources (cameras and encoders) to the drives in the JBOD. SANs can store enormous amounts of data. It is not at all unusual to store over 200 Terabytes (TB) of video on SANs.
B9780123820280000211/f21-05-9780123820280.jpg is missing
Figure 21.5
Storage area network.
Both NAS and SAN storage configures multiple hard disk drives into RAID Arrays that provide more reliability and redundancy than conventional single-disk storage. The most common RAID Arrays for Security Video are RAID-0 and RAID-5. The RAID-0 storage mirror is two or more drives so that the data is completely redundant between the drives. RAID-0 is used for the server Operating Systems and Programs. RAID-5 uses “striping” to span the data across many drives. This process provides a great deal of reliability and redundancy of the data. RAID-5 storage is often used to store video and other data.

Video Motion Detectors

Of all the different types of alarm sensors, one of the most useful types is Video Motion Detection (VMD). VMD does what it says: it compares subsequent frames of video from a camera comparing one frame to the next looking for any differences between the subsequent frames. When the VMD sees a difference, an alarm is sent to the monitoring workstation. Virtually all VMDs break the image into many small cells and allow the user to identify which cells are to be used for motion detection and which will allow motion without creating an alarm. This is useful, for example, to detect motion in a storage yard while ignoring motion in an adjacent street. VMDs also let the user adjust sensitivity for each cell, and most have other useful settings to optimize the motion detection. VMDs were originally discrete hardware boxes, but now virtually all are in the form of software algorithms that are built into the DVRs or Archive Servers.

Video Analytics

VMDs are a very basic form of Video Analytic process. Just as an algorithm can be written to detect motion, so can many other algorithms be written to detect other specific behaviors within the scene view of the video camera. Common Video Analytics include:
• Object placed in the scene by a person and left behind
• Object removed (painting on wall, etc.)
• Loitering behavior
• Person going in one specific direction (entering through an exit-way)
• Object or person entering a defined detection zone
• Object or person leaving a defined detection zone
• Person, vehicle, or object stopping
• Fence trespassing detection
• Automatic Autonomous PTZ Tracking of a detected moving object, person, or vehicle
There are two basic types of Video Analytics: those that have specific algorithms to detect specific behaviors and a newer type that uses no algorithm at all. Instead the second type uses Artificial Intelligence (AI) to allow the Video Analytic to “learn” what normal behavior is within the scene view of the camera. Night versus day, busy at morning, lunch and evening rush hours and quiet in between, vehicle traffic moves according to normal traffic rules, and so forth. So when a pedestrian walks in through a vehicle exit gate. that action is detected as abnormal behavior. When a pedestrian walks across the scene carrying an AK-47, this is a profile that the system has never seen before so it yields an alarm. It would do the same if the person was carrying a banjo. When a fight breaks out inside a gymnasium, it yields an alarm. There is no specific algorithm for most of these but the AI system “learns” to detect unwanted behavior that might never have been imagined by the user. AI systems are the future of Video Analytics (Figure 21.6).
B9780123820280000211/f21-06-9780123820280.jpg is missing
Figure 21.6
Artificial intelligence video analytics.
The AlSight logo is a registered trademark of Behavioral Recognition Systems, Inc. (BRS Labs). Photograph courtesy of BRS Labs and used with permission.

Video System Interfaces

Video systems can interface to other systems in a variety of ways. The most common of these include:
• Dry Contact Interfaces (notify video system to display a camera in response to an alarm or may notify other system for an event in the video system)
• RS-232 Interface (receives a script to display a camera in response to an event on another computer or tell another system to perform an action for an event in the video system)
• RS-485 Interface (similar results to RS-232)
• TCP/IP Interface (essentially any function available; for example, having the Digital Video System pass a video frame or clip to the Alarm/Access Control System to file it in the same database as an associated alarm)

Security Communications

No matter how much people are enamored of electronic security systems, it is the physical and operational security that does the real heavy lifting of security programs. Electronic security systems serve as the eyes and ears of the security operations staff so that they can position guard assets where and when they are needed. It is Security Communications systems that provide the link between electronic security systems and the operations staff.

2-Way Radio

After an alarm is detected using the alarm system and assessed using the video system, the Security Console Officer will communicate with roving guards using 2-way radios to direct them to respond.
A good 2-way radio system should include:
• One or two 2-way radio base stations at the Security Console and possibly at the Security Manager's office
• A transmitter and radio antenna tower
• A sufficient supply of portable radios to allow all officers to carry one
• A sufficient supply of battery chargers for all portable radios
• One or more repeaters to reach distances beyond the reach of the portable radios or to reach into buildings where the signal is weakened by the structure
• Leaky-coax systems to allow the repeaters to transmit clear radio signals far underground where normal radio signals would be blocked
Today it is common to supply each security officer at a post or on patrol with an earpiece and microphone so that discrete messages can be communicated to remote officers and without disturbing those nearby.
Two-way radios are available in two common frequencies — Very High Frequency (VHF) and Ultra High Frequency, (UHF) — and two common types (analog and digital). Radios are available either openly transmitting or transmitting encrypted communications. Both VHF and UHF radios require licensing in most areas of the world. Most security organizations today prefer digital encrypted radios to ensure that security communications are not publically available.

Telephones

Telephones are the heart of all security communications with the greater organization and the outside world. Virtually all communications with other units of the organization are handled by the internal telephone system and Security Units routinely reach for the phone to call police, fire, ambulance, and other outside services.
Security Consoles should be equipped with two types of phones: PABX (or VOIP) and one or two fixed line phones that connect directly to the telephone company's Central Office (Fixed C.O. Line). Normally the console is equipped with one or more PABX or VOIP phone extensions, which provide connection to outside telephone lines and the organization's internal phone intercom system. This is the main telephone system that the Console will rely on for most outside communications.
The fixed C.O. Lines are used for emergencies. Typically two lines are used and these are programmed such that only one line must be called to reach both (rollover phone number). This is the number given to branch offices for emergencies. It is the number that voice alarm dialers at remote branches call to advise the Security Console of an alarm (if voice is used). And it is the line that the Security Console Officers will use when the PABS/VOIP lines are all down and not working (and you can bet that will happen).

Security Intercoms and Bullhorns

Most Security Units use a dedicated Security Intercom system to communicate with
• Drivers at vehicle access gates
• People at remote entry doors
• People inside Stairwells
• People at Loading Docks, etc.
• Suspicious people in Parking Lots, Maintenance Yards, etc., through Intercom Bullhorns
Security Intercoms provide access to Security for people all over the facility. Additionally the system, using intercom bullhorns, allows the Security Console Officers to address intruders and suspicious people outside and inside.
There are three common types of Field Intercom Stations:
• Standard Field Intercom Station (Mic/Speaker/Call Button)
• Interview Station (Mic/Speaker and no Call Button usually placed near a camera)
• Intercom Bullhorn (2-way communications at a distance)
Small intercom systems use 2 or 4 wires to communicate from one or more master stations to a number of intercom field stations. These systems use analog audio components and require extensive dedicated wiring. As such, they are relatively inflexible for expansion and functional changes.
Larger analog intercom systems use a centralized or network of matrix switches (one in each building) to connect field intercom stations to a common audio and control buss that runs between buildings and back to the Central Console.
Newer intercoms use a digital infrastructure (TCP/IP) to connect remote field stations anywhere in the world to intercom master stations also located anywhere in the world. They use the organization's own TCP/IP network for communications. This allows a single Security Console to monitor intercoms at the organization's facilities located around the world.
Finally, Hybrid Matrix Switchers allow migration of older intercoms to a digital infrastructure. These have an analog matrix switch and a digital intercom all built into one allowing the organization to use its existing analog intercom infrastructure while converting new work to digital, all answered from the same intercom master stations. These systems also allow older analog stations to be answered anywhere in the world.

Public Address Systems

There are times when Security needs to speak to large numbers of people, such as immediately before or after a natural disaster, such as a hurricane or earthquake, in order to warn people and guide them to safety.
Many facilities are equipped with loudspeakers that play background music or “white noise” to make workspaces more livable. These systems can be used as Public Address (PA) Systems by adding PA amplifiers and a zoned switching circuit to lift the speakers from the primary music or noise source and place them onto the PA source.
Coupled with a microphone and zone selection switches at the Console (or using a computer microphone and zone switching system), those speakers that already exist in the workplace can serve a second valuable function.

Nextel™ Phones

Nextel phones are special cell phones that also have a 2-way radio function, allowing one user to speak hands-free with one or many other users. Groups of users can be set up so that the Maintenance or Security Unit can speak to technicians or guards. This is a great way to use one technology for two purposes.
Nextel phones can also be integrated into the Security Console just like 2-way radios using specialized adaptive hardware.

Voice Loggers

For every important communication, there will be some need to report it. The best way to make sure that the report is accurate is to record all verbal communications by using a Voice logger. Early Voice Loggers comprised reel-to-reel audio tape recorders and lots and lots of tape running at very slow speeds (15/16" per second). These were replaced by slow speed audio cassettes. Modern Voice Loggers use digital multi-track recording to log and preserve conversations from telephones, 2-way radios, intercoms, PA systems, and even Nextel Phones. All conversations are imprinted with a date/time code from a source that is synchronized with the Alarm/Access Control System and Digital Video System so that all communications can be heard in the context of events recorded in those systems as well.

Smart Phones and Tablets

One of the emerging technologies that shows great promise is the use of smart phones and tablet computers to send situational awareness, alarm, video, and even audio to roving guards who are responding to an alarm. These use the public cellular network to pipe high-speed data to the smart phones and tablets. Expect to see more of this in the future.

Consolidated Communication Systems

At many consoles it is common to see several telephones, a security intercom, 2-way radios, PA systems, and several different elevator intercoms (several for each building on a campus). Console Officers are expected to manage all of these different communications devices. Which they do … until there is an emergency such as an earthquake. Then, as they say, “all hell breaks loose.” And quite literally every communications device is ringing for attention. Remember now, the Security Console Officer has two ears, one mouth, and only one brain, so quite naturally he is incapable of answering all these urgent calls, including of course, those urgent calls for medical attention or say, people trapped in elevators. So how can he sort out the critical from the simply curious (“Uh, what just happened”)? The answer is a Consolidated Communications System (CCS).
A CCS manages all of the communications devices and prioritizes the calls into a queue for the Console Officer to answer. For example, for people trapped in an elevator, a recorded ring tone is heard by the Console officer when they push the elevator intercom inside the lift. This is a familiar and comforting sound that gives the Console Officer perhaps 20 seconds to answer (10 rings), after which the digital recording announces “There has been an emergency in the building that is placing a high demand on the Security Console. If you have a medical emergency please press the call button twice, otherwise, you are in a queue and please be patient for an answer.”
I first designed a CCS in the late 1980s for a campus of high-rise buildings. The design called for 100% custom technology. Today the major digital switch company makes a CCS that can integrate all types of communications hardware off-the-shelf and program it to perform functions like the one I just mentioned. CCSs are useful for large campus facilities and enterprise-class security organizations.

Security Architecture Models for Campuses and Remote Sites

As security systems grow from one building to a campus to multiple campuses, the organization can either treat them as individual separate systems or combine them into one single system under centralized management. This provides great economy of scale, greatly reducing operating costs and improving the probability of a consistent uniform application of corporate security policies.
The key to this is using a TCP/IP digital infrastructure to connect all systems at all facilities at all campuses into a single system.
Each individual building is equipped with a local area network (LAN). Individual systems of each building are allocated to a Virtual Local Area Network (VLAN) to segregate the functions and data of the different systems on the network. Each building is also on its own VLAN, so we have VLANs with sub-VLANs. Different campuses are connected together using Routers and Firewalls to further segregate security data from ordinary business data. Communications between facilities may be over a dedicated business network or across microwave connections, leased data lines, or the Internet. When the Internet is used, security data should be placed onto a Virtual Private Network (VPN), which isolates and encrypts the data to assure its integrity (Figure 21.7).
B9780123820280000211/f21-07-9780123820280.jpg is missing
Figure 21.7
Enterprise-class network.

Command, Control, and Communications Consoles

Command, Control, and Communications (C3) Consoles help Security Console Officers manage vast amounts of data in a coordinated fashion. The design of Security Consoles is as much art as science. I have never found one that could not be improved upon. One must accommodate all of the security technologies and truly understand and appreciate the functions the Console Officers must perform. These include but may not be limited to
• Responding to alarms
• Responding to access assistance requests
• Communicating with and Dispatching Guards
• Conducting Video Guard Tours
• Looking for Security Violations
• Looking for Safety Violations
• Looking for Security Vulnerabilities
• Conducting Video Surveillance and Counter-surveillance
• Reviewing Alarm/Access Control, Video, and Intercom System condition daily (in conjunction with roving guards) and updating a daily Security System Maintenance Condition Log
Consoles should be designed to place the most used equipment closest to the Console Officers. They should provide equipment redundancy (e.g., additional workstations and phones). They should provide a clear line of sight to video monitors and an adequate number of monitors to maintain vigilance while reviewing alarm video and maintaining surveillance operations.
Console Room Managers should also be placed in the Console Room where possible so that they can supervise the operations and maintain awareness of events.
Existing and new Security Console Rooms can be improved by spending several days working side by side with the Console Officers, categorizing their duties, and observing what makes their day easy and hard. (Believe me, they will have their complaints.)

Chapter Summary

1. Photo ID Systems include a
• Badging Computer that is connected to the Access Control System database
• Badge Printer
• Digital Camera, Backdrop, and Light
2. Large Photo ID operations use multiple computers, printers, and cameras to keep up with a constant stream of new users at factories and other such facilities with high employee hire and turnover rates.
3. One of the best ways to accommodate visitors is by using a Visitor Management System.
4. Some Visitor Management Systems track visitor access activity separately from Employee Access activity, although many Access Control Systems can be programmed to track both.
5. Video systems provide the ability to
• Assess events detected by the Alarm/Access Control System
• Observe all areas of the facility for inappropriate or suspicious activity
• Conduct investigations remotely
• Follow the movements of subjects of security events or investigations
• Produce visual evidence of security events
6. If we are interested in measuring the amount (level) of visible light (illumination) in an area, we are interested in knowing its Lux (metric) or footcandles (English) level. One footcandle is the amount of light equal to one candle at one foot (one lumen on a one square foot surface).
7. Different types of lights yield different colors of light. Light is measured in Kelvin (color temperature). Video cameras work best with lighting that is as close as possible to natural overhead daylight at 12:00 noon (5,600 K).
8. Most color cameras today have an automatic white balance adjustment to assist them in displaying lighting that appears to be more true to the colors we see.
9. Dynamic Range is the ability of a camera to differentiate the extremes of light and dark within a scene, especially when one is close to the other.
10. Most display devices today are LCD or LED computer screens.
11. Digital Video Recorders (DVRs) receive either analog or digital video inputs (depending on the brand and model), and for analog inputs they digitize the video (convert it from analog to a digital signal).
12. Network Video Recording systems are available in several versions, but the thing that they all share is that they work only with pre-digitized sources that are received across the network, not directly onto the recorder.
13. Several video recording schemes are available using server-based systems. These include:
• Internal Hard Disk Storage
• Direct Attached Storage
• Network Attached Storage
• Storage Area Network
14. The most useful type of alarm sensors is Video Motion Detection.
15. Common Video Analytics include:
• Object placed in the scene by a person and left behind
• Object removed (painting on wall, etc.)
• Loitering behavior
• Person going one specific direction (entering through an exit-way)
• Object or person entering a defined detection zone
• Object or person leaving a defined detection zone
• Person, vehicle, or object stopping
• Fence trespassing detection
• Automatic Autonomous PZT Tracking of a detected moving object, person, or vehicle
16. There are two basic types of Video Analytics: those that have specific algorithms to detect specific behaviors and a newer type that uses no algorithm at all.
17. Video systems can interface to other systems in a variety of ways. The most common of these include:
• Dry Contact Interfaces (notify video system to display a camera in response to an alarm or may notify other system for an event in the video system)
• RS-232 Interface (receives a script to display a camera in response to an event on another computer or tell another system to perform an action for an event in the video system)
• RS-485 Interface (similar results to RS-232)
• TCP/IP Interface (essentially any function available; for example having the Digital Video System pass a video frame or clip to the Alarm/Access Control System to file it in the same database as an alarm with which it is associated)
18. Security Communications systems provide the link between electronic security systems and the operations staff.
19. A good 2-way radio system should include:
• One or two 2-way radio base stations at the Security Console and possibly at the Security Manager's office
• A transmitter and radio antenna tower
• A sufficient supply of portable radios to allow all officers to carry one
• A sufficient supply of battery chargers for all portable radios
• One or more repeaters to reach distances beyond the reach of the portable radios or to reach into buildings where the signal is weakened by the structure
• Leaky-coax systems to allow the repeaters to transmit clear radio signals far underground where normal radio signals would be blocked
20. Telephones are the heart of all security communications with the greater organization and the outside world.
21. Most Security Units use a dedicated Security Intercom system to communicate with
• Drivers at vehicle access gates
• People at remote entry doors
• People inside Stairwells
• People at Loading Docks, etc.
• Suspicious people in Parking Lots, Maintenance Yards, etc., through Intercom Bullhorns
22. Public Address Systems can notify large quantities of people at the same time.
23. Nextel™ phones are special cell phones that also have a 2-way radio function, allowing one user to speak hands-free with one or many other users.
24. For every important communication, there will be some need to report it. The best way to make sure that the report is accurate is to record all verbal communications with a Voice loggers.
25. One of the emerging technologies that shows great promise is the use of smart phones and tablet computers to send situational awareness, alarm, video, and even audio to roving guards who are responding to an alarm.
26. A Consolidated Communications System (CCS) manages all verbal communications into and out of a Security Console.
27. A TCP/IP digital infrastructure can connect all systems at all facilities at all campuses into a single system.
28. Command, Control, and Communications (C3) Consoles help Security Console Officers manage vast amounts of data in a coordinated fashion.
Q&A
1) Photo ID Systems include:
a. A Badging Computer that is connected to the Access Control System database
b. A Badge Printer
c. A Digital Camera, Backdrop and Light
d. All of the above
2) Visitor Management Systems are designed to record Visitors into a Visitor Database and issue a ______________ that can be used at portals equipped with special Visitor Card Readers.
a. Guide dog
b. Temporary Visitor Access Card
c. Temporary Employee Access Card
d. Temporary Escort
3) Video Systems provide the ability to
a. Assess events detected by the Alarm/Access Control System
b. Identify celebrities when they are on site
c. Identify intruders inside the IT Server Room
d. Identify trends in surveillance
4) Good Lighting is essential to
a. Good moods among employees
b. Good video images
c. Good balance between interior and daylight
d. None of the above
5) Different types of lights yield different _________.
a. Lighting levels
b. Ambient light to daylight
c. Colors of light
d. None of the above
6) Light color is measured in degrees __________.
a. Kelvin
b. Kevin
c. Bacon
d. None of the above
7) Lighting can be either
a. Diffuse or Diffused
b. Diffuse or Direct
c. Direct or Overhead
d. Overhead or Underhanded
8) Lighting is best for video when it is overhead and diffuse with little or no __________.
a. Direction
b. Reflection
c. Announcement
d. None of the above
9) Dynamic Range is the ability of a camera to
a. Differentiate levels of color
b. Differentiate extremes of behavior
c. Differentiate the extremes of light and dark within a scene, especially when one is close to the other
d. None of the above
10) The best display devices provide fast
a. Refresh rates, very high resolution, and very high contrast
b. Refresh rates, very high ambient light, and very high optimum luminance
c. Nectar rates, very high lamberts, and optimum maximization
d. None of the above
11) Server Recording Schemes include:
a. Internal Hard Disk Storage (HDS), Direct Attached Storage (DAS)
b. Network Attached Storage (NAS), Storage Area Network (SAN)
c. Both a and b
d. Neither a nor b
12) Video Motion Detectors are a very basic form of
a. Analog acceptance log
b. Video analytic process
c. Arbitrary analysis
d. None of the above
13) Video Analytics may use
a. Specific algorithms to detect specific behaviors
b. Artificial Intelligence (AI) that learns what is normal behavior within the scene view of the camera
c. Neither a nor b
d. Both a and b
14) Video System Interfaces may include:
a. Dry Contact Interfaces, RS-232 Interface
b. RS-485 Interface
c. TCP/IP Interface
d. All of the above
15) 2-Way Radio is a form of
a. Announcement System
b. Security Communications
c. Video Communications System
d. None of the above
16) Security Communications Systems may include:
a. Telephones
b. Security Intercoms and Bullhorns
c. Public Address Systems
d. All of the above
17) Security Communications Systems may include:
a. Nextel™ Systems
b. Voice Loggers
c. Consolidated Communications Systems
d. All of the above
18) The key to building an Enterprise-Class Network is
a. Using RS-485
b. Using RS-232
c. Using a TCP/IP Ethernet Network
d. None of the above
Answers: 1) d, 2) b, 3) a, 4) b, 5) c, 6) a, 7) b, 8) b, 9) c, 10) a, 11) c, 12) b, 13) b, 14) d, 15) b, 16) d, 17) d, 18) c
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.149.29.71