Unit Objectives Explainthe basis concepts of electronic security system components, their capabilities, and their interaction with other systems. Describethe electronic security system concepts and practices that warrant special attention to enhance public safety. Usethe Building Vulnerability Assessment Checklist to identify electronic security system requirements that can mitigate vulnerabilities. Justifyselection of electronic security systems to mitigate vulnerabilities. Electronic Security System (ESS) Concepts •Basic concepts of site security systems •Use of ESS •General ESS Description •ESS Design Considerations Perimeter Zone FEMA 452, Figure 2-2: Layers of Defense, p. 2-3 Perimeter ZoneZone 1Zone 4Zone 2Zone 3Zone 5Zone 6Zone 7Zone 8Zone 11Zone 10Zone 9Adapted from FEMA 426, Figure 2-2: Dispersed Facilities, p. 2-8 Intrusion Detection Systems CCTVCCTVMotion SensorsOld GenerationNew GenerationMotion SensorsSource: ProtechSource: Protech Boundary Penetration Sensors Adapted from DARPA Perimeter Security Sensor Technologies Handbook, July 1998, p. 1-13 1.Structural Vibration Sensors2.Glass Break (GB) -both acoustical and contact mount3.Balanced Magnetic Switches (BMS) - doors, windows, and hatches4.Passive Ultrasonic Sensors5.Grid Wire Sensors•1 •2 •3 •4 •5 Volumetric Motion Sensors Designed to detect intruder motion within the interior of the protected volume ..Microwave Motion Sensors ..Passive Infrared (PIR) Motion Sensors ..Dual Technology Sensors ..Video Motion Sensors ..Point Sensors ..Capacitance Sensors ..Pressure Mats ..Pressure Switches Exterior Intrusion Detection Strain Sensitive Cable Fiber Optic Cable, Bistatic/Monostatic Microwave, Active Infrared, and Ported Coax Dual Technology (PIR/MW) Video Motion First Layer of DefenseSource: ProtechExplosion Proof Fence Sensors Strain sensitive cables Taut wire sensors Fiber optic sensors Capacitance proximity sensors First Layer of Defense Army TM 5-853-4, Electronic Security Systems, pgs. 5-3 and 5-4 Buried Line Sensors Army TM 5-853-4, Electronic Security Systems, p. 5-6 First Layer of Defense Microwave Sensors First Layer of Defense Army TM 5-853-4, Electronic Security Systems, pgs. 5-15 and 5-7 Bistatic SystemMonostatic System Microwave beamTransceiver Infrared Sensors Active Passive First or Second Layer of Defense Video Motion Sensors Old Generation New Generation First or Second Layer of Defense GBC Color Exit Sign CameraSource: Protech Electronic Entry ControlCoded DevicesCredential DevicesBiometric Devices First or SecondLayer of Defense Coded Devices Electronic Keypad Devices Computer Controlled Keypad Devices First, Second, or Third Layer of Defense Credential Devices •Magnetic Stripe Card•Wiegand-effect Card•Proximity Card•Smart Card•Bar Code •“i”Button•Radio Frequency ID (RFID) First, Second, or Third Layer of Defense Biometric Devices Fingerprints Hand Geometry Retinal Patterns Facial Patterns First, Second, or Third Layer of Defense Source: A4VisionSource: Veridt First, Second, or Third Layer of Defense Closed Circuit Television Interior CCTVAlarm assessment, individual zones and portal assessment, specific paths and areas, exclusion areas, and surveillance of waterside activitiesAlarm assessment, card reader door assessment, emergency exit door assessment, and surveillance of lobbies, corridors, and open areasExterior CCTVSource: ProtechProtection Technologies, Inc. Security Operations Center Enhancements to Overcome Operator/System Limitations•Workspace / Hardening•Alarm Recognition / Alerts•CCTV Image Alarm -Motion Detection•Smart CCTV Auto Pan/Tilt/Zoom on Tripped Sensor Location•Forwarding Alarms to Pagers, PDAs, Radios•Data Recording -DVR•Line Supervision / Backup Feeds•Emergency Power to System Summary Use the Building Vulnerability Assessment Checklist to identify electronic security system requirements. Public safety is enhanced by electronic security systems (deter, detect, deny, devalue). Electronic security systems components and capabilities interact with other systems (LAN, doors, windows, lighting, etc.). Electronic security systems can be used to mitigate vulnerabilities. Unit XI Case Study Activity Electronic Security SystemsBackgroundEmphasis:Various components and technology available for use in electronic security systemsFEMA 426, Building Vulnerability Assessment ChecklistAssess Electronic Security Systems inCase Study for vulnerabilities and recommended mitigation measures