22. Related Building/Facility Systems and REAPS Systems
Chapter objectives
1. Learn the Basics in the Chapter Overview
2. Understand How Building/Facility Systems Relate to Security
3. Learn about How to Control and Automate Building Functions
4. Learn about Advanced Reactive Electronic Automated Protection Systems (REAPS) Functions
5. Pass a Quiz on Related Building/Facility Systems
CHAPTER OVERVIEW
This chapter is all about interfacing Alarm/Access Control Systems with the environment around them. We will discuss how to use the Alarm/Access Control System and Building Management Systems (BMS) to control HVAC, Lighting, Sprinklers, and many other systems. We will also introduce Reactive Automated Protection Systems (REAPS), which are active defensive systems that are powerful tools to handle truly aggressive Threat Actors.
This chapter is all about interfacing Alarm/Access Control Systems with their surrounding environment. How to use the Alarm/Access Control System and Building Management Systems (BMS) to control HVAC, Lighting, Sprinklers, and many other systems is discussed. Also introduced are Reactive Automated Protection Systems (REAPS), which are active, powerful defensive systems that handle truly aggressive Threat Actors.
Keywords: BMS, Defensive, Environment, HVAC, Interfacing, Lighting, Management, REAPS, Sprinklers, Threat
Author Information:
Thomas L. Norman, CPP, PSP, CSC, Executive Vice President, Protection Partners International

Building/Facility Systems

Just about all modern commercial, governmental, judicial, military, and industrial buildings today are equipped with Building Management Systems (BMS). BMS systems control Heating, Ventilation and Air Conditioning systems (HVAC), Lighting, lawn sprinklers, and other automated building systems. Related BMSs control only one or two specific functions, such as elevators.
Remember, the secret to an excellent security program is to understand that the organization uses its physical and operational environment to carry out the mission of the organization. Threat Actors also use that same physical and operational environment to carry out their mission. The key to an excellent security program is to manipulate the environment to the advantage of legitimate users and to the disadvantage of illegitimate users. Let me say that again. The key to an excellent security program is to manipulate the environment to the advantage of legitimate users and to the disadvantage of illegitimate users. BMSs provide an excellent opportunity to do just that.
BMSs are good at controlling many things throughout the building and campus and can also perform complex logical functions to control those things. When coupled with the Alarm/Access Control System, they can do wonderful things for security as well.
Let's look at a few examples.

Elevators

Elevators often interface access control systems to control access to specific floors for each user, but they can also be used to prevent intruders from accessing controlled areas of the building. Years ago I designed security for a very high end residential tower in Los Angeles that housed a large number of celebrities, families of foreign heads of state, a couple of CEOs of major firms, and others who wanted and expected privacy. One of the celebrities had been stalked by a violent person. Another concern was that of civil disorder (protests) against a couple of the CEOs, whose industries were the target of the Earth Liberation Front (ELF). Animal Liberation Front (ALF), and Earth First!. All of these are on the FBI's Watch List for radical activist groups. Both have used (to put it mildly) aggressive tactics against individuals who were related to organizations that these activist groups opposed. A typical tactic of these groups was to storm the lobby of the target and swarm all over security overwhelming the one or two people at the security desk and then charge up stairs and elevators to the floor of their target to confront him directly.
These residents wanted security and lots of it. But they also wanted it to be discrete. To counter the anticipated lobby protests I first suggested that stairwell exit doors exit to the outside of the building rather than to the lobby, and that those doors have no hardware on the outside, making it impossible to use the doors normally to gain entrance to the stairwell. I also designed a “Duress Switch” at the Lobby Security Desk that could be activated by the security guard if a group of protestors stormed the lobby. When the Duress Switch was triggered, it automatically put the elevators into “fire recall mode.” This brought all lifts to the ground floor lobby and kept them there, unable to respond to any command from within the lift to go up or respond to calls from upper floors. This effectively isolated the lobby (and thus the protestors) from the rest of the building. An alert was sent to building residents advising them of the protest and each unit was equipped with a video intercom that could see the lobby so they could know what was going on. Triggering the Duress Switch also automatically called the police.
Once triggered, a key from the building engineer was required to reset the alarm and thus the elevator to normal operating mode. The building engineer was not, of course, stationed in the lobby.
All of these functions were triggered by the Alarm/Access Control System, which was interfaced by dry contacts to the Elevator Controller, Phone Dialer, and the Recorded Announcement to individual units and to the Video Intercom System.

Stairwell Pressurization

In modern high-rise buildings stairwells are the primary means of exit during a fire emergency. It is very important to keep the stairwells free of smoke to aid in the exit. To do this, stairwell doors are operated by automatic closers, and all stairwell doors are equipped with latching locks to make sure that smoke cannot enter the stairwell. Additionally, the Building Automation System supervises the HVAC system to maintain a higher air pressure within the stairwell than exists in adjacent hallways and floor spaces so that smoke cannot enter the stairwell. Obviously, it is important to keep doors closed to maintain the stairwell pressurization.
One building I worked on had a pair of stairwell doors at the ground floor where one entered the stairwell from a corridor off the building lobby and the other was an exit to an employee parking lot. It was common for employees to take smoke breaks just outside this door. Although the door was equipped with an access card reader, lock, alarm, and electrified panic hardware, invariably one person in the group would forget his/her access card, so there was a habit of wedging the door open for re-entry without a card.
This was not only a security violation, but also a fire code violation because it compromised the stairwell pressurization and presented the possibility that if a fire broke out, smoke could fill the stairwell.
The fix was to combine the Alarm/Access Control System with the Building Automation System to create a function that was not (at that time) available on the Alarm/Access Control System. Here is how the function worked:
• During Working Hours:
• When someone propped the door open, the door position switch triggered a 20-second countdown timer on the BMS.
• If the door was still open after 20 seconds the BMS triggered a local alarm at the door to advise those nearby to close the door. It also triggered a new 45-second countdown timer.
• After 45 seconds, if the door was still open, it signaled the Alarm/Access Control System that the door was propped open. The Security Console Officer dispatched a guard to close the door and reprimand those nearby for leaving it open (and for forgetting their card).
• After Working Hours:
• If the door was opened by any means other than access card or panic bar exit sense switch or if the door was propped open, the timers were bypassed completely and the alarm was sent immediately to the Alarm/Access Control System where an appropriate response was mounted from the Security Console.
This is just one example of how BMS and Alarm/Access Control Systems can work together to do more than either could alone.

Lighting

Most commercial building lighting systems are controlled by BMS. These are used to turn overhead lights on and off on a schedule corresponding to the hours of occupancy.
However, when a computer programmer is called late at night to come fix a software problem, he/she needs a safe lighted path to and from the car to the office and the server room. It would also be nice to have snacks available if one hour turns into ten (as it often does with these things).
Using the BMS and the Alarm/Access Control System one can design an interface that looks at the parking structure entry card reader, and using a Structured Query Language (SQL) database, determines the path from the car to the office and turns on lights between those points. It will also turn on lights for the workspace (including office and server room), light the restrooms and snack areas, and turn on power to the snack machines. These lights will stay on until the card is read exiting the parking structure (if still outside of working hours). If the HVAC system is needed, that will be turned on too.
The Access Control System feeds the SQL database with the data required to calculate the path (user name) and with a command to do so. The SQL database then sends a command to the BMS including turn on the following zones (along with the zones to turn on). This command is reversed if the user exits the parking structure after hours.

Controlling and Automating Building Functions

BMS and Alarm/Access Control System Interfaces can be conducted in a variety of ways, including direct action interfaces and proxy action interfaces.

Direct Action Interfaces

Direct Action Interfaces are good for simple commands and logic sequences such as the Local Alarm example regarding Stairwell Pressurization.
A Direct Action Interface is a simple one- or two-way interface that performs a predictable, repeatable function. The function will include basic inputs and outputs and may include counters and timers. These are all controlled by a simple logic cell.
In a Direct Action Interface, the Alarm/Access Control System will typically provide one or more dry contacts to the BMS, which will perform a logical function that may control HVAC, lights, or other devices. Feedback may be given to the Alarm/Access Control System if further action is needed. The function may be controlled by counters, timers, and work on a time schedule.

Proxy Action Interfaces

Proxy Action Interfaces are those that use one system to operate another. The most common form of a Proxy Action Interface is to use an SQL program and database to operate the BMS from the Alarm/Access Control System.
The use of SQL database and functions vastly expands what can be done and the number of variables available to control the functions. All of the examples below use Proxy Action Interfaces.

Feedback Interfaces

When systems are integrated one is the “initiating” system and the other(s) are the “commanded” system(s). With simple interfaces the initiating system commands the commanded system to perform a task, and that task is performed by the commanded system. Feedback Interfaces are those that provide information back to the initiating system about the status of or completion of the task commanded by the original interface trigger. Feedback interfaces can be of either the Direct Action type or the Proxy Action Type.

REAPS Systems

Reactive Electronic Automated Protection Systems (REAPS) are reactive security elements that “reach out and touch the offender.” These are rarely used inside the United States, but see a wider use elsewhere around the world. REAPS systems are especially powerful at stopping aggressive Threat Actors.
There are three common types of REAPS:
• Communications Elements: The most basic form of REAPS is the security intercom. When an alarm occurs a Security Console Officer can observe the alarm scene with video and respond on a nearby Security Field Intercom Station. “Hey, stop that!” is a lot more useful than no response. This often stops minor offenders and has been known to stop armed gunmen when a disembodied voice in a convenience store identifies the offender by sex, race, and clothing and commands him to stop. It does little good to shoot a loudspeaker, and when the voice informs that police are seconds away, the gunman often runs without harming the cashier.
• Deployable Barriers: More sophisticated REAPS applications utilize deployable barriers, including rising bollards and wedges to stop vehicles and electrified locks, roll-down doors, and deployable operable walls to delay pedestrians. Environment disruption devices can be used to delay an attack until a more formidable response force can arrive and take control of the Threat Actor.
• Attack Disruption: Ultimately, in high-security environments it may be necessary to actually disrupt the attack. This can include deployable smoke, fast setting and sticky foam dispensing systems, drop chains, explosive air bags, automated weaponry, deluge water systems, acoustic weapons, and other effective, if rarely used systems. All of these have the common element of making it much more difficult for an attack to continue and can result in the capture of the attacker. There are two types of attack disruption systems: non-lethal and lethal. Even some non-lethal systems can cause injury. In either case, it is important to implement safety measures in the activation mechanism to ensure that accidental activation does not occur and possibly injure innocents.

Irrigation Systems

Irrigation systems are most often controlled by BMS. These can be used to deter and delay Threat Actors who have breached a fence and are moving over terrain. They also help assess the determination of the Threat Actors. Petty Actors will usually run away from sprinklers, determined Threat Actors will not (Figure 22.1).
B9780123820280000223/f22-01-9780123820280.jpg is missing
Figure 22.1
Irrigation defensive system.

Deluge Fire Sprinkler Control

For any environment such as an outdoor shopping mall, where competing gangs of criminal youths could engage in gunfire, nothing can immediately disperse a crowd quite like 10,000 gallons of water being dispensed in 60 seconds. Afterward, although people are most likely upset and drenched, the gunfire will probably have stopped and the perpetrators will likely have fled, thus dissipating the danger and protecting the innocent public from escalating gunfire between gang members (who after all are so well known for their concern for innocent bystanders).
Coupled with gunshot recognition software, pan/tilt/zoom (PZT) cameras can instantly zoom in on the offender, providing visual verification of the condition requiring action.
Deluge activation systems should only be installed after careful consideration and advice from legal counsel, but they may be appropriate for any venue where there is a potential or history of gunfire in public spaces.

Acoustic Weapons

Acoustic Weapons deter inappropriate users by making the environment uncomfortable to the offender (Figure 22.2).
B9780123820280000223/f22-02-9780123820280.jpg is missing
Figure 22.2
Acoustic weapons.
I once successfully addressed gang activity near convenience stores by implementing outdoor speakers playing symphonic pop elevator music on satellite radio. This drives gangbangers totally nuts. The designer is advised to use bullhorn speakers enclosed in a vandal-deterrent cage. Bullhorns are recommended because they sound very bad. The music is not offensive to legitimate customers, who may be very mildly annoyed by the tinny sound quality, but it creates an environment that does not support the business model of intimidators and drug dealers.
A Welsh firm makes a near ultrasonic tone generator, amplifier, and piezo speaker that creates a sound at the very top of the human hearing range that sounds like fingernails on a chalkboard. This also drives young people crazy. Older people cannot hear it due to natural age-related, high-frequency hearing loss. This will not bother most young people who are shopping, but it becomes more obvious and annoying to those who simply loiter outside.
The Long Range Acoustic Device (LRAD) uses two ultrasonic frequencies separated by an audio signal to propel the audio signal at painful sound pressure levels in a straight line out to incredible distances. LRAD has successfully been used to deter pirate attacks on large sea vessels.

High-Voltage Weaponry

Essentially a Tesla coil on steroids — high-voltage weapons are a Taser™ for protecting buildings. Useful to disperse crowds, they emit an attention-getting amount of high-voltage at very low amperage all around the vicinity of the spike transducers.
Another version of this weapon is the spark-gap transmitter, which can be used in very high security facilities that are under severe risk of intrusion by very high risk Threat Actors. (Don't be too skeptical, these facilities exist all over the world.) Similar to its portable cousin the stun gun, the spark-gap transducer can be mounted on top of a protective perimeter fence at approximately ten foot intervals. When an intruder suspected of carrying satchel chargers or improvised explosive devices is attempting to make entry through the fence, and after detection and a video assessment of the situation and a polite verbal warning through a camera-mounted 30 Wt bullhorn, if this intruder continues to persist, the Console Officer and his/her supervisor can throw a pair of safety switches after selecting the appropriate fence zone, and all the spark gaps along that fence section ignite in a bright array of high-voltage arcs. If the intruder is carrying explosives and electrically activated detonators (the most common type), this display of high-voltage can also be accompanied by an explosion in the vicinity of the intruder, followed afterward by a repair of the fence. This approach is most appropriate in serious threat environments and in countries in which such methods are approved by the government. This approach is much less expensive than a helicopter gunship and requires less maintenance than automated guns.

Remotely Operated Weaponry

Except for High-voltage Weaponry and some Deployable Barriers, most of the defeat technologies discussed above are non-lethal. When the asset value is exceptional or the risk of a successful attack to the public is high, and nothing else will get the job done, one can always rely on guns. At least two manufacturers make remotely operated weaponry. From 7.62 mm to twin 50 caliber guns and a range in between, remotely operated weapons are the final answer to intruders that just will not take no for an answer. These are products that couple a PTZ video camera with an appropriate weapon (Figure 22.3). They are available in either temporary or permanent installation versions, and are deployed in the United States at critical installations and also abroad.
B9780123820280000223/f22-03-9780123820280.jpg is missing
Figure 22.3
Remotely operated weaponry.
Photo courtesy of MacKinzie River Partners, Inc.

Appropriateness

It is wholly inappropriate to apply lethal or even less than lethal countermeasures in anything but a serious threat environment in which the asset under protection could cause very great harm (munitions, nuclear reactors, etc.) and in which adequate public safeguards are not possible. The use of any of these systems in an environment in which an innocent could be harmed is completely inappropriate. I have refused to employ them where the government requesting the countermeasure was of questionable moral ethics. They should also be used in close consultation with the manufacturer and under a waiver of liability.

Operationally

The operation of such barriers and weapons should be limited to cirumstances in which multiple layers of security are in place and the intruder has demonstrated firm determination to proceed toward a goal of harming or destroying a critical asset. Adequate evidence can be achieved by either the amount of force used or the determination with which the intruder continues undeterred by instructions toward the asset. If the attacker has or uses lethal force, it is arguably appropriate to defend with lethal force. If the intruder continues through other deployed barriers and refuses verbal instructions, it is reasonable to assume that he/she will be undeterred by mild measures.
In any case, the system should be configured with adequate operational safeguards to absolutely prevent accidental deployment. This typically requires a deployment action by both an operator and a supervisor or some action by the intruder that is unmistakably hostile and will result in the death of innocents, such as driving a large truck full of explosives toward a Marine barracks compound at 5:00 a.m. at high speed past a guard post.

Safety Systems

For any REAPS technology that could cause bodily harm, it is imperative to build in deployment safety systems. These can be affected electronically, mechanically, and procedurally.
Electronic Safety Systems
Design REAPS systems to include at least two separate electronic circuits to trigger the system activation. For potentially lethal systems, it is advisable to use at least three triggering systems. These should be activated by totally separate electronic circuits such that no single point of failure could cause any more than one electronic triggering system to activate unintentionally. By separate systems, we do not mean separate dry contact points on the same circuit board. We mean separate circuit boards on separate power systems with their own battery or UPS back-up and with separate communications lines to each individual board. It is not inadvisable to locate the boards in different areas on separate circuit breakers, on separate electrical phases, and ideally on separate electrical transformers. The dry contacts should be triggered in series, not in parallel. It is also advisable to protect the conduit within which the triggering circuit runs with a conduit intrusion alarm system. Use only metallic electrical conduit, preferably rigid, not flexible, and waterproof where appropriate. For fast vehicle capture systems, for example, at least two sets of loops should be used, coupled with optical sensors if possible, to prevent accidental triggering by any unusual positioning of slow-moving vehicles.
Mechanical Safety Systems
Mechanical safety systems are a back-up to electrical safety systems. For example, on drop-chain systems, the explosive bolts should be on separate electrical circuits and the bolts should be wired such that all bolts must break in order for the chains to drop. Four electrical circuits explode bolts set into a pattern where the chains will only drop if all bolts blow.
Procedural Safety Systems
Any lethal or less than lethal REAPS system should also have procedural safety systems. These can include the requirement for both a console officer and a supervisor to trigger lethal systems after verifying intent and capabilities to cause great harm to the protected asset or the organization's people or the public.
For non-lethal systems such as deployable doors, gates, grilles, and so forth, these measures are not necessary, since the deployment of a door is not an unusual or life-threatening event.

Chapter Summary

1. Just about all modern commercial, governmental, judicial, military, and industrial buildings today are equipped with BMS.
2. The key to an excellent security program is to manipulate the environment to the advantage of legitimate users and to the disadvantage of illegitimate users.
3. Elevators often interface access control systems to control access to specific floors for each user.
4. In modern high-rise buildings stairwells are the primary means of exit during a fire emergency. It is very important to keep the stairwells free of smoke to aid in the exit.
5. Most commercial building lighting systems are controlled by BMS.
6. Lighting control interfaces can assist in controlling lighting to assist security functions.
7. BMS and Alarm/Access Control System Interfaces can be conducted in a variety of ways, including direct action interfaces and proxy action interfaces.
8. Direct Action Interfaces are good for simple commands and logic sequences such as the Local Alarm example regarding Stairwell Pressurization.
9. Proxy Action Interfaces use one system to operate another.
10. Feedback Interfaces provide information back to the initiating system about the status of or completion of the task commanded by the original interface trigger.
11. REAPS are systems of reactive security elements that “reach out and touch the offender.”
12. There are three common types of REAPS:
• Communications Elements
• Deployable Barriers
• Attack Disruption
13. Irrigation systems can be used to deter and delay Threat Actors who have breached a fence and are moving over terrain.
14. For any environment such as an outdoor shopping mall, where competing gangs of criminal youths could engage in gunfire, nothing can immediately disperse a crowd like a Deluge Fire Sprinkler System.
15. Coupled with gunshot recognition software, PTZ cameras can instantly zoom in on the offender, providing visual verification of the condition requiring action.
16. Acoustic Weapons deter inappropriate users by making the environment uncomfortable to the offender.
17. High-Voltage Weaponry is essentially a Tesla coil on steroids — high-voltage weapons are a Taser for protecting buildings.
18. Remotely Operated Weapons are the final answer to intruders that just will not take no for an answer. These are products that couple a PTZ video camera with an appropriate automated weapon.
19. It is wholly inappropriate to apply lethal or even less than lethal countermeasures in anything but a serious threat environment in which the asset under protection could cause very great harm (munitions, nuclear reactors, etc.) and in which adequate public safeguards are not possible.
20. The operation of such barriers and weapons should be limited to cirumstances in which multiple layers of security are in place and the intruder has demonstrated firm determination to proceed toward a goal of harming or destroying a critical asset.
21. In any case, the system should be configured with adequate operational safeguards to absolutely prevent accidental deployment.
22. Design REAPS systems to include at least two separate electronic circuits to trigger the system activation.
23. Mechanical safety systems should be used as a back-up to electrical safety systems.
24. Any lethal or less than lethal REAPS system should also have procedural safety systems.
Q&A
1) Just about all modern commercial, governmental, judicial, military, and industrial buildings today are equipped with
a. White Noise Systems
b. Pink Noise Systems
c. Building Management Systems (BMS)
d. None of the above
2) The key to an excellent security program is to manipulate the ____________ to the advantage of legitimate users and to the disadvantage of illegitimate users.
a. Environment
b. Building Doors and Windows
c. Elevators
d. None of the above
3) It is very important to keep the ____________ free of smoke to aid in the exit.
a. Elevators
b. Stairwells
c. Building
d. None of the above
4) Most commercial building lighting systems are controlled by
a. Light Switches
b. Building Management Systems
c. Automatic Motion Sensors
d. None of the above
5) BMS and Alarm/Access Control System Interfaces can be conducted in a variety of ways including:
a. Indirect action interfaces
b. Direct action interfaces and proxy action interfaces
c. Proxy action interfaces
d. None of the above
6) REAPS stands for
a. Reflective Electronic Automotive Powered Systems
b. Reactive Electronic Automated Protection Systems
c. Reactive Electronic Annunciator Powered Systems
d. None of the above
7) REAPS systems may include:
a. Intercoms
b. Irrigation Systems
c. Acoustic Weapons
d. All of the above
8) It is wholly inappropriate to apply lethal or even less than lethal countermeasures in anything but a serious threat environment in which the asset under protection could cause very great harm (munitions, nuclear reactors, etc.) and in which adequate public safeguards are not possible.
a. True
b. False
9) REAPS systems should be configured with adequate operational safeguards to absolutely prevent
a. Deployment
b. Accidental deployment
c. Intentional deployment
d. None of the above
10) REAPS safety systems may include:
a. Electronic Safety Systems
b. Mechanical Safety Systems
c. Procedural Safety Systems
d. All of the above
Answers: 1) c, 2) a, 3) b, 4) b, 5) b, 6) b, 7) d, 8) a, 9) b, 10) d
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.12.249