19

System Implementation

Abstract

This chapter includes information on system maintenance and management, management approaches and types of system implementations, security command center operational implementations and issues, closing out the project and dealing with offenders who try to circumvent the system. Security systems must be maintained and managed effectively.

System implementation issues include staffing requirements and security/safety policy development and compliance programs. Closing out the project should include success-measuring metrics and a lessons learned session.

Keywords

Access-controlled doors

Operational implementations

Output control point

Redundant monitoring console

Introduction

This chapter includes information on system maintenance and management, management approaches and types of system implementations, security command center operational implementations and issues, closing out the project, and dealing with offenders who try to circumvent the system.

System Maintenance and Management

Maintenance

Each integrated security system requires constant maintenance. Strangely, this comes as a surprise to many owners who would never think about running their cars for two years without oil changes and fluid and tire pressure checks but nonetheless wait until something breaks in the integrated security system before they call a maintenance technician. These are the same owners who have a scheduled maintenance program for the elevator, building automation system (BAS), roof, windows, and other parts of the building, but make no budget for maintaining the security system.

Integrated security systems should be maintained on a standard schedule. Depending on the size and scope of the system, the maintenance could be bimonthly, monthly, weekly, or even daily. Each component should be checked for its normal working order on at least a weekly basis. However, this does not have to be performed by a contract maintenance technician but, rather, can and should be performed by the security console officer staff.

Weekly system testing requires a console officer and a roving guard or maintenance technician. One walks and tests, and the other confirms the test results. Each access-controlled door, alarm, and output control point should be tested weekly. Access-controlled doors should be tested for operation—not just for the electronics but also for the operation of the door. This can be done easily on a guard tour. The roving tester should carry a clipboard and follow a standard checklist. Any discrepancies in operation should be noted on the clipboard. Alarms, output control points, cameras, and intercoms can all be tested while on the guard tour walk.

Any items that are found to be out of specification can be adjusted or repaired on the next scheduled maintenance visit (usually bimonthly) if it is a noncritical element, or sooner if it is a critical system element. System maintenance must be conducted routinely on the security system hardware and the information technology (IT) infrastructure, servers, workstations, operating systems, and software. This must be under the authority of a knowledgeable individual who:

 Understands the security program and its goals, methods, and tactics.

 Understands the security equipment and their normal operating conditions.

 Can determine if a problem is operational, electronic, or IT related.

 Has good oversight and management skills.

 Has been given responsibility, authority, and budget for maintenance.

Many organizations believe that the security contractors often are not well suited to maintain the entire system because many contractors do not employ adequate IT-trained service technicians. That will change. At the same time, many IT service organizations are discovering that they can install and service IT-based security systems. Some of these organizations are rushing in to fill the void.

IT-based integrated security systems must be maintained by a group that is competent in the maintenance of IT systems. That is often not the installing security contractor, whose competence is limited to the edge devices and software. I often recommend that maintenance of the IT infrastructure, operating systems, and software be placed under the authority of the organization’s IT department.

The decision as to who should be in charge of maintenance is important and must be made on the basis of technical competence and political sensitivity. In the end, it is essential for the organization to understand that the security system helps to provide physical security for the entire organization. To the extent that it is well maintained, it can do that job. To the extent that it is not well maintained, it cannot, and that creates exploitable vulnerabilities in the organization’s security.

Management

Electronics is a tool of the security management program, of cohesive security management, not a segregated program unto itself. The integrated electronic security system is there to assist the security operations force, not to replace it. The data that the system gathers must be acted on by patrol officers, so the two functions should both be managed by the corporate security manager or director, who makes and implements corporate security policies and procedures.

It is not uncommon in the third world to segregate the management of the guard and electronics monitoring functions to two different managers, who may for cultural or political reasons not be inclined to work together. The reason stated for this segregation is so that neither would have total control of the security program and that there would be checks and balances on the overall program. This approach is doomed to fail in a security program. The result is always that there is essentially no communications between the two segregated and essential security programs. In one such case, the guard force was not receiving information from the console operators to direct it to respond to alarms; the operators were simply recording alarms and observing the independent, uncoordinated activities of the guards who were “in the dark” about events that the security console operators knew about. The guards, of course, also did not know that the console officers had a habit of taking naps on the night shift, turning off alarms in order to sleep. Was this critical government facility on which the entire government depended protected by its security force and electronics program? Not at all. This installation, in which the electronics security manager mostly used the available equipment to “tell on” any breaches of protocol by the guard force, served no useful security purpose. It had instead created a hopelessly uninformed guard force with a multi-million-dollar investment in electronics that was of little value to the organization. It is important to integrate the guard and electronics programs to the advantage of the guard force and therefore to the advantage of the organization.

Management Approaches: Types of System Implementations

Monitored Systems

Full-Time System Monitoring

Often, larger systems, such as might be at a corporate headquarters or campus facility, are monitored on a full-time basis with a console that is constantly monitored by one or more operators. In enterprise-class systems, there may be multiple console stations, each with its own operator monitoring dozens to hundreds of remote sites. Any facility that has full-time monitoring should be equipped with a complete security command center—that is, a dedicated room with appropriate lighting, ergonomic chairs, and a redundant monitoring console to ensure business continuity in the event the primary console fails or becomes unavailable due to a catastrophic event. Each console should have multiple screens,1 a microphone, speakers, a radio, a telephone and a nearby printer, a refrigerator, a snack area, and a nearby restroom. A minimum of 400 square feet (40 square meters) is recommended for a security command center. The room should be equipped with a man-trap to prevent unauthorized users from “tailgating” an authorized user into the command center.

Part-Time System Monitoring

Some facilities may be monitored onsite only during certain hours (often when the building is occupied by employees). When the building is unoccupied, it may be monitored only by a central station-type alarm system, or perhaps it may be monitored by an enterprise-class security command center at a remote location.

Unmonitored Systems

Unmonitored systems simply provide access control and video recording for use for audits if a suspicious event should occur. This is a very useful application for smaller sites where it does not make economic sense to invest in the high operating cost of full- or part-time system monitoring by a dedicated security guard.

Hybrid Systems

Systems that have a monitoring console at a reception guard post are a hybrid between monitored and unmonitored systems. They are not truly monitored because the guard has other more primary duties and may look at video screens only when time (and boredom) permits. In all types of systems, it is clear that the recording of alarm, access control, and video scenes is an important element of their successful implementation to ensure that evidence of suspicious activity is gathered that can be used to identify offenders and prevent or deter future similar events.

Security Command Center Operational Implementations and Issues

Staffing Requirements

Skills

Video command center staffers need certain skills, and there are also other skills that are helpful:

 Essential attributes

Dependability

Honesty

Good computer skills

Good communications skills

Good organizational skills

An understanding of chain of command

 Helpful skills

Police patrol experience: Many people with foot patrol experience have the ability to spot suspicious activities that others would miss.

Telephone call center experience: Previous call center or technical support center experience is good preparation for working under stress in a calm fashion.

Police dispatch experience: Police dispatch experience is a good background for console operators who must dispatch patrol officers.

Hours

Console hours can vary from organization to organization. Organizations should consider that it is difficult for a console officer to focus for long periods on any video. Console officers should be rotated no less than every two hours from console duty to patrol or guard desk duty in order to keep the officers fresh and for cross-training purposes.

Supervision

It is easy to forget the purpose of something when it becomes routine. I heard about a console guard who was assigned a “most urgent task” for a refinery graveyard shift. Focusing on the task, she was consistently distracted by false alarms in the perimeter detection system. After resetting the false alarms no less than five times without sending a patrol to check them out, she was amazed when a routine patrol stumbled onto a group of student activists with throw-away cameras who had climbed the fence and gotten into the refinery, claiming to be on a photography class project. Right! A photography class with throw-away cameras at night, in a refinery. What a surprise that several of the “students” were not attending any classes and were members of an environmental activist organization.

Good console operation begins with good management. Supervisors should have console officers focus on the task of console management, not other tasks, no matter how urgent the other tasks may seem. The job is to use the security system to detect, assess, and respond.

Security/Safety Policy Compliance

Interfacing the Technology to the Overall Security Program

System planning should also be in the hands of high-level corporate security managers and directors, not the security supervisors, facility managers, contractors, or the maintenance team. System planning must be done by qualified personnel who understand the organization’s assets, threats, vulnerabilities, risks, and a wide range of available countermeasures. To the extent that the system is planned by a person who knows only one of these things, the planning will necessarily be incomplete and ineffective.

Skills of the Security Management Team

A committed management team is essential. The organization’s security team should begin at the top and end at the bottom.

C-Level Executive

A C-level executive (chief level officer of the company) should have responsibility for overall loss prevention and control. Security should be placed under this person.

Security Command Center Manager

Day-to-day corporate security management should fall to an experienced security manager. A police, FBI, CIA, or special-forces background is not generally suitable because these focus more on response than on prevention or are too narrowly focused away from the kinds of activities for which the officer will have responsibilities. Do not get me wrong, one of the finest corporate security managers I know came from the police force, but that is a rarity, and he was a total maverick inside the police force as well. Some of the finest managers I have seen come from the U.S. State Department Diplomatic Security Service. These folks have worked throughout the world under hardship and understand both diplomacy and politics, as well as how to get the job done under hardship conditions. Most of them also have a wide variety of skills, including the following:

 Results-oriented management

 Surveillance and countersurveillance

 Executive protection

 Perimeter protection

 Detection and investigations

 Assessment

 Response

 Configuring facility security to disrupt the attacker’s plans

 Managing subordinates

Shift Supervisors

Shift supervisors should have good communications and organizational skills and be able to set a good example by natural leadership.

Closing Out the Project

Measuring Success

 A successful enterprise-class integrated security system design is one that is used and that grows in its coverage of remote sites.

 Successful systems pay for themselves in loss prevention. For example, when a system can provide evidence identifying the perpetrators of damage to the facility or theft of goods or information or provide evidence of who perpetrated an illegal act, that system has shown value.

 Successful systems facilitate a more gracious conduct of business.

 Successful systems facilitate a uniform application of corporate security policy.

 Successful systems catch offenders.

Lessons Learned

At the conclusion of any major design, it is advisable to have an internal session to go over lessons learned. The lessons learned session should recap challenges and solutions, mistakes and corrections, and shortcomings in the design or implementation that one would like to change in the future. A series of recommendations should be put forward to limit or prevent such problems for future projects. Generally, it is advisable to consider putting those recommendations into policy or into the specifications, if they were installation related.

Dealing with Offenders Who Try to Circumvent the System

Where video is used in public spaces, it is not uncommon for offenders to try to circumvent the security system by wearing hats, beards, etc. or looking for areas to offend that are not well covered by cameras. Occasionally, offenders will position themselves below a camera and then spray paint the lens area to obscure their activity. Even something as unobvious as hair spray can blind a video camera. Such behavior should be a sign to security management that a problem area has been detected that needs additional security effort. A log should be made of offenses vis-à-vis system effectiveness to help determine the need for additional patrol, cameras, or emergency phones or to use the system to surveil instead of simply to patrol. Remember that electronic systems do not create security; they are only one of several tools used to improve security.

Using the System for Surveillance

When surveillance is indicated, a console and operator should be dedicated for that purpose. It is unwise to mix surveillance with other duties because the event one is looking for will most likely occur while other duties are being conducted. Video can be used to look for suspicious behavior, especially where crimes have occurred previously.

For example, in a public transit environment, success can be achieved using the video system to surveil subway platforms for suspicious behavior. Because most offenders assume that even though cameras exist, they are not being actively watched, they may feel free to surround a passenger and hassle him or her. By using intercoms to intervene when they move in for the assault or robbery, positioning officers nearby to respond quickly to apprehend, and coordinating with operations to ensure that no trains stop while the officer takedown is occurring, successful apprehensions can take place. Properly advertised in the press, these methods can have good results in reducing crimes in subway environments because they put criminals on notice that they will be detected and apprehended while committing crimes on the metro’s property.

Using the Archive Video System to Detect Improper Behavior

Video systems can also be used to identify offenders from their presence in other environments than where an offense took place. Whereas the offender may try to obscure his or her identity while committing a crime in view of a camera (e.g., by wearing a hat or hood while entering and leaving an office area to steal personal effects and laptops), such behavior looks very suspicious while entering or leaving a more public access way to that area, such as clearing past the receptionist or while tailgating through an employee entry with a group of employees. By observing time–date stamps on the video of the subject entering and leaving the area where the crime took place and looking for a suspect who enters with nothing and leaves with a laptop, the security manager can observe clothes and identifying features, then look for that person on other cameras until a good full-face video of that person is found. It is often found to be an employee or a person who is escorted into the area by a receptionist, from whom a positive identification of the offender can be made.

Summary

Security systems must be maintained and managed effectively. The functions of all devices should be checked weekly, and any defective devices should be scheduled for maintenance.

Cohesive system management is essential if the system is to operate to the advantage of the security program.

System implementation issues include staffing requirements and security/safety policy development and compliance programs. Each level of security management should be properly qualified.

Closing out the project should include success-measuring metrics and a lessons learned session.

Questions and Answers

1. Integrated security systems should be maintained:

a. On a standard schedule

b. On a daily basis

c. Using in-house maintenance personnel

d. None of the above

2. IT-based integrated security systems must be maintained

a. By a group of mechanics and IT programmers

b. By a group of IT programmers

c. By a group that is competent in the maintenance of IT systems

d. None of the above

3. The integrated electronic security system is there to:

a. Replace the security operations force

b. Develop alternatives to conflict

c. Assist the security operations force, not to replace it

d. None of the above

4. Which below is not a type of implementation?

a. Monitored system

b. Unmonitored system

c. Hybrid system

d. Segregated system

5. Security command center staffing requirements include:

a. Appropriate skills, proper supervision, security/safety policy compliance, a committed management team

b. Appropriate skills and proper supervision

c. Daily training clips

d. None of the above

6. A C-level executive (chief level officer of the company):

a. Should not be bothered with administering the security program

b. Should have responsibility for overall loss prevention and control

c. Should be involved in the day-to-day operations of the security program

d. None of the above

7. Which below is not a measure of success for closing out the project?

a. Successful systems facilitate a more gracious conduct of business.

b. Successful systems facilitate a uniform application of corporate security policy.

c. Successful systems pay for themselves in loss prevention.

d. Successful systems can be operated without supervision.

8. A lessons learned session should recap:

a. Challenges and solutions

b. Mistakes and corrections

c. Shortcomings in the design or implementation that one would like to change in the future

d. All of the above

9. Which below is correct?

a. Electronic systems do not create security; they are only one of several tools used to improve security.

b. Electronic systems can create security; they are the one best tool used to improve security.

c. Electronic systems are the most effective tool, better than guards, policies, or anything else in protecting a facility.

d. None of the above.

10. When the offender may try to obscure his or her identity while committing a crime in view of a video camera, the video system can also:

a. Be used to identify offenders from their presence in other environments than where an offense took place

b. Be used to make the organization look more “high tech”

c. Identify the user by rotating the image taken of the offender at the time he or she was concealing him- or herself

d. None of the above

Answers: 1: a, 2: c, 3: c, 4: d, 5: a, 6: b, 7: d, 8: d, 9: a, 10: a


1 Microsoft Windows® facilitates the operation of multiple screens on the same workstation (my designs typically run four to six). Workstations that run multiple screens should be equipped with lots of fans, lots of memory, redundant power supplies, and lots of processing power.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.176.194