Electronic Security System Ess
Electronic Security System Ess
Introduction
Every day, on our military installations and DoD facilities, we protect a wide variety of assets
from various types of threats.
Objectives
Here are the course objectives.
Page 1
Electronic Security Systems
Lesson 1: ESS Overview
Introduction
Objectives
In this lesson, you will learn what electronic security systems (ESS) are and the
subsystems that compose them. You will also learn about key planning considerations
for implementing ESS. Here are the lesson objectives:
What is an ESS?
Overview
We use a variety of physical security measures to protect our personnel, information,
equipment, facilities, activities, and operations. Combining these elements creates an overall
physical protection system that includes measures such as:
Page 1
Electronic Security Systems
Lesson 1: ESS Overview
Later in this course, you’ll learn more about the purpose and role of each of these
subsystems.
Let’s look at how this works. Imagine someone attempts to break into your facility. Once
your system detects the intrusion, the clock starts running. Your security forces need to
respond as quickly as possible to prevent any damage to or compromise of your facility’s
assets.
Once your ESS detects an intrusion, it is very important for the system to also have the
capability to assess what triggered it. For example, having a CCTV camera feed
overlooking a gate protected by a sensor will give you additional information about what
happened to set off an alarm. This assessment capability will assist you in determining the
most appropriate security response.
Planning Considerations
Considerations Overview
When planning how to protect assets with an ESS, you must consider several different
factors. You need to assess and manage the risks to your assets. You need to identify and
comply with applicable regulatory requirements. You need to consider the characteristics of
the site you are protecting, as well as its operational requirements. And finally, you need to
take into account cost considerations and constraints.
Risk Management
As with any other type of physical security measure, following a risk management
process will help you determine which ESS, if any, will best protect your facility’s assets.
This risk management process has five steps: identify assets, threats, and vulnerabilities,
then conduct a risk analysis and develop countermeasures to address certain risks. Let’s
take a look at each step to see how it applies to ESS.
Page 2
Electronic Security Systems
Lesson 1: ESS Overview
Identify Assets
The first step of the risk management process is to identify assets. You must work with
the end-user to identify anything that requires protection. Examples of assets include
people, information, equipment, facilities, activities, and operations. Once you have
identified the assets, you should group them into categories of assets requiring similar
protection. Then you should determine the level of protection each category requires.
Identify Threats
The second step of the risk management process is to identify threats. Threats come in
many forms such as terrorists, extremists, criminals, insiders, and spies. Once you
know the potential threats to your assets, you must consider what types of actions they
can inflict. Some examples include theft, attacks, disruption of services, sabotage,
kidnapping, and death. For military facilities, threats should already be identified and
documented in a threat assessment.
Identify Vulnerabilities
The third step of the risk management process is to identify vulnerabilities or
weaknesses. Vulnerabilities are anything that can be exploited by a threat. Another
way to look at vulnerabilities is as the difference between the protection that exists and
the protection that is needed to protect an asset from a threat. You can use the results
of your threat assessment to help determine your vulnerabilities.
Develop Countermeasures
The final step of the risk management process is to determine and develop which
countermeasures will best protect your assets against the threats you identified.
Countermeasures aim to prevent adverse occurrences or reduce the impact of them, if
they happen. An ESS is a countermeasure. Electronic security systems are used to
detect, assess, delay, and respond to intrusions, which helps to prevent or at least
reduce the impact of adverse occurrences.
Page 3
Electronic Security Systems
Lesson 1: ESS Overview
Regulatory Requirements
When planning for the use of ESS, you must follow regulatory guidance. Many ESS
requirements are established by applicable regulations.
The primary guidance documents for ESS are Unified Facilities Criteria (UFC) 4-021-02,
Electronic Security Systems and Underwriters Laboratory (UL) 639, Standard for Intrusion
Detection.
In addition, regulatory guidance has been developed for special areas that require
additional protection. This includes:
Site Survey
An important step in planning for ESS is to conduct a site survey. The site survey team
should include personnel from a variety of areas of expertise, such as an electronic security
professional, a physical security professional, a communications/ information technology
professional, an electrical engineer, a mechanical engineer, a civil/structural engineer, a life
safety engineer, and an architect.
During the site survey, obtain the site plan and/or building plans and conduct a capacity
assessment to see if any ESS already exist. Interview key personnel at the site such as
users, operational level personnel, and middle management to gain perspective and
information about the protection of assets at that site. Then assess any existing systems
and note any vulnerabilities in how they protect key assets. After the site survey, review
the threat summary, recommend ways to correct the vulnerabilities you identified, and
propose new countermeasures, such as ESS and its locations, to protect assets, if
necessary.
Operational Requirements
In planning an ESS, you must consider operational requirements, such as the facility
requirements and security force requirements. For example, some ESS require security
personnel to monitor automated access control systems, either in person or via a camera.
Others require security personnel to assess alarms, and in some cases, respond to the
scene of an intrusion.
Page 4
Electronic Security Systems
Lesson 1: ESS Overview
Page 5
Electronic Security Systems
Lesson 1: ESS Overview
Review Activity
Review Activity 1
Select True or False for each statement. Then check your answers in the Answer Key at
the end of this Student Guide.
True False
Review Activity 2
Select True or False for each statement. Then check your answers in the Answer Key at
the end of this Student Guide.
True False
Page 6
Electronic Security Systems
Lesson 2: Automated Access Control Systems
Introduction
Objectives
In this lesson, you will learn what automated access control systems (AACS) are and the
planning considerations for implementing an AACS. You will also learn about the different
types of AACS and the components of AACS.
Capabilities of AACS
An AACS has many capabilities that can be employed depending on the types of security
requirements. An AACS can log and archive all entry attempts and entries made into a
controlled area and can alert authorities of unauthorized entry attempts. An AACS can alert
authorities by interfacing with other electronic security system (ESS) subsystems. For
example, an AACS can interface with a closed circuit television (CCTV) system to assist
security personnel in assessing unauthorized entry attempts or to verify the identity of
entrants before manually granting access, such as through a remote door or gate. An AACS
can also interface with an intrusion detection system (IDS) to sound an alarm if someone
makes an unauthorized entry or entry attempt. In addition, an AACS can transmit signals to
a dispatch or control center so security personnel may respond to an unauthorized entry
attempt, if necessary.
Page 1
Electronic Security Systems
Lesson 2: Automated Access Control Systems
Planning Considerations
Planning Overview
When planning for an AACS, there are many factors to consider. These include who will be
using the system, what the security and tracking requirements are for the portal requiring
access control, what the facility and security force operational requirements are, and life
safety considerations. Let’s take a look at each of these planning considerations.
Users
For each AACS, you must determine who will be using the system. How many credential
holders and what categories of personnel will use this AACS? How many visitors and
contractors will pass through this system? This is important because you want to implement
the most cost-effective system that allows authorized personnel to quickly enter a protected
area while also denying entrance to unauthorized personnel.
Security Requirements
To ensure your AACS is secure, you must consider various security-related
questions.
For example, if the requirement is simple, then access with a common access card
(CAC) alone may suffice. If you need increased security, then you may want to
require a personal identification number (PIN) in conjunction with a CAC. If the
requirement is for maximum security, then the AACS may need to require a CAC, a
PIN, and biometrics (such as a fingerprint or retina scan) to allow access.
x How many and what types of portals will you need to protect? And what
locking method will secure those portals?
x How long can the system take to identify, verify, and authenticate the
information of a person as authorized to enter a controlled area?
x Does the system need to eliminate or mitigate the risk of someone giving their
credentials to another person to access the controlled area?
x Does your system need to protect against a person following another closely in
order to enter through the same portal when the authorized person’s credential
grants access?
Tracking Requirements
Tracking what happens at an access control point is important not only at the time an event
occurs, but also for future reference, such as when an investigation must be conducted.
Tracking requirements to consider when planning an AACS include how the access holder
database will be maintained and what types of events the AACS needs to track and
maintain.
Life Safety
In addition to planning for entry into a controlled space, you must also take into
consideration how people will exit from that space in the event of an emergency. The access
control system and door hardware must be able to accommodate free egress or single push
for egress under normal circumstances in most cases. These life safety considerations play
a role in selecting request-to-exit (REX) devices, such as panic bars, as well as locking
mechanisms, so people may exit quickly in the event of an emergency.
Coded Devices
With coded devices, you must enter a recognized code or PIN on a keypad to access a
controlled area. Keypad devices are reliable, compact, user-friendly, and easy to maintain,
repair, or replace. They are also much less expensive than other types of AACS. Keypad
devices do not require individuals to carry cards or tokens, so there is nothing for them to
lose. Security personnel can also assign different codes to different points and doors.
Keypads may have duress code functionality where a user can covertly enter a special code
if forced to enter under duress.
On the other hand, keypad devices do pose some security risks. For example, codes can
be easily passed onto unintended or unwelcome visitors. They can be viewed by others and
then used for unapproved entry. Finally, keypad devices have a limited number of allowable
unique codes. For example, if the device accepts only 4-digit PINs, then there are only
10,000 possible codes.
Credential Devices
Credential devices allow an individual to access a controlled area after swiping a recognized
credential in or near the device. There are four types of credentials that are currently in use.
One is a smart card or microchip card. A DoD CAC is an example of this type of credential.
The other three types are the magnetic stripe card, the proximity card, and the Weigand, or
embedded wire, card.
One advantage of credential devices is that cards and card readers are reliable. Among the
four types of credential devices, proximity or contactless readers are more convenient than
card readers because they require only that a card be placed near the device rather than
swiped against or inserted into it. For example, you could leave the card in your purse and
just wave your purse near the device.
The disadvantages of credential devices are that cards can be lost or stolen and some
types of cards are easy to duplicate. Also, there is mechanical wear on cards that are
swiped or inserted versus proximity cards that don’t actually touch a device.
Biometric Devices
Biometric devices allow individuals access to a controlled area after they display a specific
biological characteristic into the device, which compares it to a stored characteristic. A
variety of biological characteristics are used to identify individuals for authorized access to
controlled areas. These include: hand geometry, fingerprint, facial recognition, iris pattern,
voice verification, and retinal scanning.
Biometric devices are good because they provide automated verification that the person
who is attempting to gain access to a controlled area is authentic. Another positive
feature of biometric devices is that biometric credentials are extremely difficult to
duplicate. It’s not easy to duplicate someone’s fingerprint!
Page 5
Electronic Security Systems
Lesson 2: Automated Access Control Systems
On the other hand, biometric devices cost more than other types of devices and they take
longer to verify an individual. These devices also require special housings, and some of
them are not appropriate for outdoor use.
AACS Components
Automated access control systems comprise more than just the access devices or readers
you see at doors and other entrances. There are several other components present behind
the scenes. For example, credential AACS include equipment to create the badges. And
biometric AACS use a biometric template capture device to capture people’s biological
characteristics, such as fingerprints or retina images.
In addition, each AACS has a central computer or server where the AACS software and
database reside that archives all system activity. Each AACS also has a workstation that
allows personnel to view and interact with the AACS hardware and software. Authorized
personnel use REX devices to exit controlled areas.
Finally, each AACS also has a local processor that collects input from card readers,
keypads, biometric devices, door sensors, and REX devices. The local processor uses
that input to send signals to electronic door locks, electric door strikes, turnstiles, and gate
operators.
Page 6
Electronic Security Systems
Lesson 2: Automated Access Control Systems
Review Activities
Review Activity 1
What can an AACS do to protect assets in a facility?
Select all that apply. Check your answer in the Answer Key at the end of this Student Guide.
Review Activity 2
Select the best response for each question. Then check your answers in the Answer Key at
the end of this Student Guide.
Page 7
Electronic Security Systems
Lesson 2: Automated Access Control Systems
Review Activity 3
Select the best response for each question. Then check your answers in the Answer Key at
the end of this Student Guide.
Page 8
Electronic Security Systems
Lesson 3: Intrusion Detection Systems
Introduction
Objectives
In this lesson, you will learn what intrusion detection systems (IDS) are and the
planning considerations for implementing an IDS. You will also learn about the
different types of IDS and their components.
Planning Considerations
Overview of IDS Planning Considerations
When planning an IDS, there are many factors you need to take into account. These relate
to which IDS sensors to use and transmission considerations. Let’s take a closer look at
each of these considerations.
x What is the probability that this sensor will detect an intrusion, and which types
of intrusions?
Page 1
Electronic Security Systems
Lesson 3: Intrusion Detection Systems
x Can the sensor be activated by nuisances and weather? How can nuisance and
environmental alarms be reduced?
x How much does a particular sensor cost, and how does that compare to the asset
being protected?
You must also plan to conduct an acceptance test to ensure the system is working
properly once you have had an IDS installed in your facility.
Acceptance Test
Once an IDS has been installed, you must conduct an acceptance test to physically
verify that the system is working properly. Here are the steps to conduct an acceptance
test. First, you should test the functioning of the PCU and its tamper switch. Next, you
should test the functioning of all sensors, switches, and alarms. For example, for doors
and windows that have switches, arm the system, then open each door and window to
see if that triggers the alarm. Finally, you should test each sensor to discover where the
dead zones are. Dead zones are the areas that will not trigger the alarm. If necessary,
you will need to adjust the placement of other sensors to cover any dead zones.
Transmission Considerations
For IDS, transmission of data is most important. An IDS sensor will do no good if the status
of that sensor is not communicated to the appropriate personnel. Here are the types of
things you should consider related to the transmission capability of an IDS.
x Who will obtain approval of radio frequency emitters by the local jurisdiction or
host nation?
x What coordination of the data transmission media (DTM) transmission lines must
take place?
Page 2
Electronic Security Systems
Lesson 3: Intrusion Detection Systems
They are advantageous for their relatively low cost and because they provide
overlapping protection across different zones.
However, fence-associated sensors can go off randomly, for example if something heavy
strikes the fence. To address this, a best practice is to use a double fence. In this
configuration, the sensors are on the inner fence only. The outer fence serves as a barrier
for the inner fence to reduce nuisance alarms caused by windblown debris or animals, for
example. Fence-application sensors are also vulnerable to intruders who can go under or
over fences. An intruder can dig under a fence or build a bridge-like structure over the fence
to avoid triggering the sensors.
Page 3
Electronic Security Systems
Lesson 3: Intrusion Detection Systems
Page 4
Electronic Security Systems
Lesson 3: Intrusion Detection Systems
x Ported coaxial cable sensors are good for use in open areas and can be
effective as part of a double fence system. They do not work well near
electrical substations or other geographic areas with unusual magnetic
interference.
x Fiber optic cable sensors are useful in detecting digging and tunneling, so they
are good for use in securing pipelines, manholes, and entry portals. They are
also useful for vehicle detection at gates and barriers. And they have an interior
application as well—in walls. These sensors also are unaffected by metal objects
and water.
x Seismic sensors are an effective covert tool against intruders walking, running, digging
or operating vehicles or machinery near the detection zone.
Page 5
Electronic Security Systems
Lesson 3: Intrusion Detection Systems
x Video motion sensors compare successive images from a closed circuit television
(CCTV) camera to detect intruders. These types of sensors have both interior and
exterior applications.
Page 6
Electronic Security Systems
Lesson 3: Intrusion Detection Systems
x PIR sensors
o Most common interior volumetric sensors
o Used to detect heat signatures, or infrared emissions, from intruders
o Work best in an interior climate-controlled environment x
Acoustic sensors
o Use passive listening devices to monitor building spaces
o Good for use in office buildings to detect covert intruders who stay behind
after business hours
o Usually used in conjunction with password-protected automated access
control systems (AACS) so that when an individual logs into the AACS, the
acoustic sensor is disabled
x Dual-technology sensors
o Use both microwave and PIR technologies to increase probability of
detecting intruders
o Use everywhere, especially in Sensitive Compartmented Information
Facilities (SCIFs), vaults, and secure rooms
o Can be configured to reduce nuisance alarms x
Video motion sensors
o Were discussed earlier with exterior IDS since they have both interior and
exterior applications
Page 7
Electronic Security Systems
Lesson 3: Intrusion Detection Systems
Review Activities
Review Activity 1
Select the best response for each question. Then check your answers in the Answer Key at
the end of this Student Guide.
Page 8
Electronic Security Systems
Lesson 3: Intrusion Detection Systems
Review Activity 2
Select the best response for each question. Then check your answers in the Answer Key at
the end of this Student Guide.
Page 9
Electronic Security Systems
Lesson 3: Intrusion Detection Systems
Review Activity 3
Select the best response for each question. Then check your answers in the Answer Key at
the end of this Student Guide.
Page 10
Electronic Security Systems
Lesson 4: Closed Circuit Television Systems
Introduction
Objectives
In this lesson, you will learn what closed circuit television (CCTV) systems are, as well as
the planning considerations for implementing a CCTV system. You will also learn about
the different CCTV system components.
x Identify the purpose and role of closed circuit television (CCTV) systems
x Identify key planning considerations for CCTV implementation
First, they can help assess the validity of alarms. Connecting a CCTV system to an
intrusion detection system (IDS) alarm allows security personnel to visually assess a
situation to determine what type of response may be required.
Second, they can help with access control. Connecting a CCTV system to an automated
access control system (AACS) allows security personnel to visually identify persons and
vehicles requesting entry before they release a controlled portal, such as a door, turnstile,
gate, or vehicle barrier.
Third, CCTV systems perform a surveillance function. They enable security personnel
to view events at multiple locations from a centralized remote viewing area. CCTV
cameras posted in various areas help to deter loss, theft, and unauthorized entry.
Page 1
Electronic Security Systems
Lesson 4: Closed Circuit Television Systems
Finally, CCTV systems can archive information for use as evidence. They allow
security personnel to retrieve images that may provide evidence of security breaches.
This can help identify or prosecute trespassers, vandals, or other intruders.
Planning Considerations
When planning a CCTV, there are a variety of factors to consider.
x Do you intend to use the CCTV system indoors or outdoors? And how do you intend to
use it? For example, do you plan to pair it with an AACS or an IDS?
x You must also consider the lighting in the area where you plan to operate the CCTV
system. Will it be working in broad daylight? In complete darkness? Both?
x Finally, you need to think about physical obstacles that could block the
camera’s view of an area. For example, are there trees or vegetation
between the camera and the area you want to observe?
CCTV Components
Overview
CCTV systems are comprised of cameras, which take in the surveillance data; recorders,
which store that data; and workstations, which allow personnel to view, organize, and
manipulate the data. Let’s take a look at each component.
Cameras can be either fixed, meaning they focus on one position, or moveable, meaning
they focus on different areas through remote control. This movable feature is referred to as
pan, tilt, and zoom (PTZ).
Fixed cameras are better suited for assessing alarms on doors, gates, and fence lines; to
go back and review a scene before an alarm occurred; and to detect motion. PTZ cameras,
on the other hand, are better suited for surveillance of large open areas, such as ports and
airfields. Also, PTZ cameras can follow the path of an intruder. However, PTZ cameras are
more expensive than fixed cameras.
Camera Features
Identifying which features you need your CCTV camera to have depends on a variety of
factors.
Page 2
Electronic Security Systems
Lesson 4: Closed Circuit Television Systems
x First, what area do you want your CCTV system to oversee? How large is it? The
size of the area will determine the kind of lens you want to use. For example, a
wide-angle lens is best for a large surveillance area.
The type of area you need to survey will also help determine where you should
mount the camera. How high up does it need to be?
x Next, where will you locate the camera? Whether the camera will be indoors or
outdoors will determine whether you need protective housing, and if so, what kind.
The camera location also defines your lighting requirements. How dark is the area it
covers? What times of day will the system be recording? Different camera features
are better for different lighting situations.
x Do you need to conceal the camera? If so, you might consider using a dome to
hide the lens.
Color cameras require higher illumination and provide more detail, such as the
color of clothing an intruder is wearing, than black and white cameras provide.
Low-light features
For conditions in which there is low light, or even no light, there are some options to
enable camera surveillance.
Thermal imagers operate in complete darkness. They do this by sensing the heat
signatures that objects, such as people, emit. Thermal imagers are less vulnerable to
environmental factors such as rain and fog. However, they are relatively expensive and
do not provide the same level of detail in their images as those from visible light
cameras.
Recorders
CCTV systems employ two different types of recorders: digital video recorders
(DVRs) and network video recorders (NVRs).
Page 3
Electronic Security Systems
Lesson 4: Closed Circuit Television Systems
DVRs digitize multiple analog camera inputs and store the video on internal hard drives.
DVRs are good for most security applications, including assessing alarms and storing
evidentiary archives. They can record up to 30 frames per second.
NVRs record digital video from multiple cameras to internal hard drives. NVRs are best for
surveillance applications because they allow an operator to see a smooth video stream. To
do this, they can record up to 60 frames per second. NVRs require a high-speed network.
According to the National Archives and Records Administration (NARA) General Records
Schedule (GSRS) 21, under the Authority: 44 U.S.C 3105, 3106 and 36 CFR Part 1230
Unlawful or Accidental Removal, Defacing, Alteration, or Destruction of Records, routine
surveillance recordings must be maintained for 6 months. Waivers must be processed
through Agency's Records Management offices and approved by NARA.
Workstation
CCTV workstations allow personnel to view both live and recorded video. CCTV
workstations include monitors, keyboards, and graphics cards. They may also include
joysticks for controlling PTZ cameras, video management software, and video analytics
software. Video analytics software lets a user input a set of rules for each scene of interest.
If a rule is violated, a visual cue displays on the monitor, which draws the operator’s
attention to suspicious objects and behaviors. For example, you could set a rule to create
an alert if the camera detects any movement in a sensitive area where there is not
supposed to be any movement.
Page 4
Electronic Security Systems
Lesson 4: Closed Circuit Television Systems Student Guide
Review Activities
Review Activity 1
For each statement, select which CCTV system capability it demonstrates. Then check
your answers in the Answer Key at the end of this Student Guide.
Review Activity 2
You have received a request to add a CCTV system to a building on your installation. Which
questions should you ask?
Select all that apply. Check your answer in the Answer Key at the end of this Student Guide.
Introduction
Objectives
In this lesson, you will learn what data transmission media (DTM) links are, including the
different types of DTM. You will also learn the key planning considerations for implementing
a DTM.
x Identify the purpose and role of data transmission media (DTM) for electronic
security systems (ESS)
x Identify key planning considerations for DTM implementation
DTM Overview
An effective data transmission media link allows for rapid and reliable data transmission
and communication among ESS subsystems, from intrusion detection sensors, access
control devices, and video components to display and assessment equipment. The DTM
also transmits data between the ESS subsystems and the dispatch or control center to
alert the security forces of any alarm conditions. An effective DTM link is resistant to
compromise, has redundancy, and is conducive to rapid fault detection and repair.
Planning Considerations
What You Should Consider for DTM
When planning DTM links, you must consider connectivity requirements, such as bandwidth,
pathways, power sources, and secure communications. You must also think about the best
ways to have the ESS subsystems communicate with each other. Let’s take a look at the
types of things you need to think about for each.
Page 1
Electronic Security Systems
Lesson 5: Data Transmission Media
Connectivity Requirements
When thinking about connectivity requirements, you must identify how much bandwidth each
subsystem will require under normal conditions and under high-traffic conditions to determine
how much bandwidth you will need. CCTV systems generally require the most bandwidth,
whereas IDS generally require the least.
For connectivity of DTM links to be effective, they must use a power source that
cannot be interrupted. Therefore, there should always be an emergency power source
to use as backup if the primary source fails.
You must also think about how the subsystems will connect to each other. Can they
connect to existing networks or do you need to create new pathways?
Finally, DTM links require secure communications. To accomplish this, you must
consider physical protections, such as conduits for conductors to guard against
environmental factors, and electronic protections, such as encryption to guard against
hackers.
x When the IDS and AACS are separate, it is preferable to use one single door
sensor with two independent outputs rather than two separate sensors. This
reduces costs and eliminates clutter.
x To reduce wiring costs, serial communications can use a single serial data link to
handle several camera control signals.
x For most projects, you should use software-based integration to connect the
systems. This provides flexibility in the initial system setup and allows users to
make configuration changes with no additional hardware or wiring. To do this, you
need a networked ESS system and a dedicated security network.
And again, the same vendor must manufacture both systems, or you will need
a software driver.
x For communication from an AACS to a dispatch center, the monitored facility must
have a local processor that is compatible with the existing central monitoring
system.
Page 2
Electronic Security Systems
Lesson 5: Data Transmission Media
DTM Links
DTM Infrastructure
The infrastructure available at a facility will determine the type of DTM link you use. The
DTM infrastructure mandates who controls the DTM link and what security measures may
be required to secure the DTM link.
One type of DTM infrastructure refers to DTM links, which are located completely on
Department of Defense (DoD) proprietary or leased property. This type is referred to as
Base Level Information Infrastructure (BLII) or on-base communications. For example, the
DTM link that carries the data and communication between the ESS subsystems on a
military installation and the control center that is also located on that installation would be
considered a BLII, or on-base communications.
The other type of DTM infrastructure refers to those DTM links that are not located
completely on DoD proprietary or leased property. This type is referred to as Defense
Information Infrastructure (DII) or inter-base communications. So, for example, the DTM
link that carries the data and communications between the ESS subsystems in a DoD
building and a private security company that is not located on DoD property but that
monitors the DoD building’s security is a DII, or inter-base communications.
DTM Networks
DTM links transmit data over DTM networks. You may use different types of DTM networks
depending on your operating infrastructure and the level of security you need. Using
hardwired networks is the most secure way to transmit data, but sometimes you will need to
use wireless networks to communicate over areas where it is difficult to lay hardwired
networks.
There are two types of hardwired networks. Dedicated conductors are dedicated
proprietary, or DoD-owned, circuits that transmit data and video between DTM nodes.
Direct subscriber lines, also known as T-1 lines, are permanent point-to-point links through
public networks. T-1 lines are uniquely assigned to a customer. For example, only DoD
information would be transmitted over a DoD entity’s assigned point-to-point link. T-1 lines
are primarily used in DTM links for connecting remote sites.
Wireless networks are less secure than hardwired networks because they use radio
frequency (RF) to transmit data over barriers. Wireless networks are vulnerable to
interception, radio frequency interference (RFI) and climatic conditions.
Page 3
Electronic Security Systems
Lesson 5: Data Transmission Media
The preferred hardwired DTM is fiber optic cable. This cable can transmit data over longer
distances and it has a high bandwidth. It uses infrared or visible light through transparent fibers.
Fiber optic is not vulnerable to electromagnetic interference (EMI) to RFI, or to lightning.
However, fiber optic is susceptible to breakage due to cable stress, stretching, and bending. It is
also the most expensive type of hardwired DTM.
Coaxial cable is good for CCTV systems, high-speed data transmissions, and transmission
of simultaneous voice conversations. Like fiber optic, coaxial cable also has a high
bandwidth. It also provides good isolation from external noise and crosstalk.
Wireline can meet most ESS data transmission needs but has limited bandwidth. Also,
unlike fiber optic, coaxial cable and wireline are vulnerable to EMI, RFI, and lightning, but
these vulnerabilities can be reduced if they are grounded at one end or shielded.
Page 4
Electronic Security Systems
Lesson 5: Data Transmission Media
Review Activities
Review Activity 1
Select True or False for each statement. Then check your answers in the Answer Key at
the end of this Student Guide.
True False
A wireless network is more secure than a
hardwired network.
Software-based integration is the preferred DTM
method for most projects.
Review Activity 2
Which of the following are considerations when planning for a DTM link?
Select all that apply. Check your answer in the Answer Key at the end of this Student Guide.
Page 5
Electronic Security Systems
Lesson 6: Monitoring Methods
Introduction
Objectives
In this lesson, you will learn about the four main types of monitoring methods electronic
security systems (ESS) use. You will also learn about the pros and cons in planning for
each ESS monitoring method.
Planning Considerations
Here are some things to think about when planning for proprietary station monitoring.
Page 1
Electronic Security Systems
Lesson 6: Monitoring Methods
The primary advantage of using a proprietary station for monitoring an ESS is that it does
not rely on outside sources. It uses a facility’s own space, equipment, and staff. Also, the
ESS can include closed circuit television (CCTV) monitoring for alarm assessment, video
analytics, and general surveillance.
Planning Considerations
When deciding whether to employ local alarm monitoring, its advantages are that it is easy
to implement and is cost effective. However, since local alarm monitoring relies on security
personnel hearing or seeing an alarm, there is no guarantee that an alarm will receive a
response if security personnel are not in visual or audible range of the sounding alarm.
Planning Considerations
A major advantage of central station monitoring is that it does not require any additional
real estate space or buildings, as does a proprietary station. Unlike both proprietary station
and local alarm monitoring, central station monitoring most likely will not require any
additional staffing. However, central station monitoring does require an existing central
station, which may not be available in all locations. In addition, the company that owns the
central station will require payment for monitoring services. Another disadvantage is that
establishing connections between
Page 2
Electronic Security Systems
Lesson 6: Monitoring Methods
the central station and the facility being monitored can be complex. Also, the central station
may rely on non-DoD forces to both monitor and respond to alarms. Finally, with central station
monitoring, CCTV capability may be limited or nonexistent.
Planning Considerations
The biggest advantage of police connection monitoring is that the facility being monitored
has direct communication with law enforcement. This means the facility could receive a
faster police response since there is no middleman between the facility and the response
force. However, the police response time would depend on the priorities of the responding
law enforcement agency.
As with central station monitoring, police connection monitoring does not require any
additional real estate space or building expense. And police connection monitoring does not
usually require any additional staffing on the part of the facility being monitored.
However, also like central station monitoring, police connection monitoring may require
payment of an ongoing fee. Police connection monitoring usually does not have CCTV
assessment capability, nor does it have an archiving resource, so you would need to
consider having a separate archiving resource. It also requires an interface connection.
Finally, because police departments may impose penalties for false alarms above a
certain threshold, facilities sometimes turn down the sensitivity on their systems. Although
this minimizes nuisance alarms, it can result in missed detections of intrusions.
Page 3
Electronic Security Systems
Lesson 6: Monitoring Methods
Review Activities
Review Activity 1
Select True or False for each statement. Then check your answers in the Answer Key at
the end of this Student Guide.
True False
Page 4
Electronic Security Systems
Lesson 6: Monitoring Methods
Review Activity 2
Select the type of monitoring that best matches each statement. Then check your
answers in the Answer Key at the end of this Student Guide.
Page 5
Electronic Security Systems
Lesson 7: Putting It All Together
Introduction
Objectives
In this lesson, you will learn about different ways of integrating all of the electronic security
systems (ESS) you learned about, as well as the baseline requirements for specific areas
that require ESS protection.
x Apply the baseline requirements for electronic security systems (ESS) for Sensitive
Compartmented Information Facilities (SCIFs), Top Secret/Secret open storage areas,
arms storage areas/armories, and magazines
Types of ESS
As you learned, while ESS subsystems can stand alone, they are usually used in
combination with other ESS subsystems. The ways you can integrate them range from the
very simple, using only a single system, to the complex, networking an array of ESS
subsystems.
The simplest type of ESS contains only a single ESS subsystem, such as an
intrusion detection system (IDS) by itself.
Page 1
Electronic Security Systems
Lesson 7: Putting It All Together
An intermediate system contains elements of at least two ESS subsystems that require
integration, such as an automated access control system (AACS), and an IDS,
communicating directly to a dispatch center.
The third type of ESS is a complex system. Complex systems have separate AACS and
IDS communicating with each other, as well as closed-circuit television (CCTV) systems,
communicating with the AACS. All three of these communicate to a dispatch center
through a data transmission media (DTM) link.
The most complex type of ESS is a networked system. A networked system operates on a
single network with drivers to the discrete components of each subsystem. It is a completely
self-contained dedicated local area network (LAN) with security system software installed
and run on a host server. If a networked system is ever connected to an outside LAN or
wide area network (WAN), then you must use additional security measures.
SCIFs
When you are planning the ESS for a SCIF, refer to these documents:
x ICS 705-1, Physical and Technical Security Standards for Sensitive
Compartmented Information Facilities
x IC Tech Spec for ICD/ICS 705, Technical Specifications for Construction and
Management of Sensitive Compartmented Information Facilities
x DoDM 5105.21, Vol. 103, Sensitive Compartmented Information
Administrative Security Manual
x Unified Facilities Criteria (UFC) 4-021-02, Electronic Security Systems
x UFC 4-010-05, Sensitive Compartmented Information Facilities Planning,
Design and Construction
Here is a summary of the baseline requirements for each ESS subsystem protecting a
SCIF.
Page 2
Electronic Security Systems
Lesson 7: Putting It All Together
Access Control
Access control to a SCIF requires:
x Electric door strikes installed in conjunction with AACS and be UL 1034 Listed
for burglar resistance
x Equipment containing access control software programs (PCU) must be
located inside the SCIF
x All sensors, PCUs, and IDS/AACS admin workstations must be located within
SCIF perimeter
x Point sensors on all doors and man-passable openings must meet
specific requirements
x Motion sensors to protect windows, doors, and man-passable openings and to
detect movement
x Motion sensors not required above false ceilings or below false floors but may
be required for critical and high threat facilities outside the U.S.
x Emergency exit doors secured, alarmed, and monitored 24/7
x Interior areas (including walls common to areas not protected at SCI level)
protected by IDS consisting of motion sensors and high-security switches
x IDS must have continuously monitored tamper detection devices and
transmit alarm condition to PCU or monitoring station
x Must have emergency backup power that does not trigger alarm but that provides
visual indicator on PCU and notifies monitoring station of change in power source
Page 3
Electronic Security Systems
Lesson 7: Putting It All Together
x Visual recognition or
x Mechanical/automated access control devices
Page 4
Electronic Security Systems
Lesson 7: Putting It All Together
When continuously manned, the protected area should be equipped with an alerting
system on all potential entrances into the protected area that cannot be observed by
the occupants.
Arms Storage/Armories
When planning an ESS for arms storage areas and armories, refer to these
documents:
x DoD 5100.76-M, Physical Security of Sensitive Conventional Arms,
Ammunition, and Explosives
x Unified Facilities Criteria (UFC) 4-021-02, Electronic Security Systems o
Appendix C contains the baseline requirements
Here is a summary of the baseline requirements for each ESS subsystem protecting an
arms room or armory.
Access Control
x No AACS required
x Requires a high-security padlock with a hasp
Page 5
Electronic Security Systems
Lesson 7: Putting It All Together
Page 6
Electronic Security Systems
Lesson 7: Putting It All Together
Access Control
x No AACS required
x Requires a high-security padlock with a hasp
x All sensors and PCUs located within the protected area perimeter
x Motion sensors and high-security switches to protect perimeter doors and man-
passable openings
x Keypad at entrance and for all separate (unit-based) storage areas that
require an independent IDS capability
x IDS and any connected AACS equipped with continuously monitored
tamper detection devices that transmit alarm condition to PCU or monitoring
station
x IDS installed in accordance with specific requirements
o Duress alarm devices consist of two types (fixed and portable) and are usually
manually activated. Fixed are operated using finger, hand or foot, whereas,
portable have a transmitter and receiver. When someone under duress
activates the alarm, the duress alarm initiates
Page 7
Electronic Security Systems
Lesson 7: Putting It All Together
an alarm condition at the central monitoring station and does not result
in an audible or visual signal in the protected area.
Closed Circuit Television
Page 8
Electronic Security Systems
Lesson 7: Putting It All Together
Review Activity
Review Activity
You need to plan the ESS for various special areas in a new facility.
1 of 4: Which of the following require(s) a mechanical/automated access control
system or visual recognition as the access control method?
Select all that apply. Then check your answers in the Answer Key at the end of this
Student Guide.
SCIF
Top Secret/Secret collateral open storage area
Arms room
Magazine
2 of 4: Which of the following may contain a CCTV within the protected area?
Select all that apply. Then check your answers in the Answer Key at the end of this
Student Guide.
SCIF
Top Secret/Secret collateral open storage area
Arms room
Magazine
3 of 4: Which of the following must have vibration sensors on its walls to detect
boundary penetration attempts?
Select all that apply. Then check your answers in the Answer Key at the end of this
Student Guide.
SCIF
Top Secret/Secret collateral open storage area
Arms room
Magazine
Page 9
Electronic Security Systems
Lesson 7: Putting It All Together
Select all that apply. Then check your answers in the Answer Key at the end of this
Student Guide.
SCIF
Top Secret/Secret collateral open storage area
Arms room
Magazine
Page1