Running head: A BIZARRE APPLICATION OF APA

advertisement
Physical Security
Running head: Physical Security
Physical Security Week 3 Assignment
Michael R. Vest
Paul Baker
Physical Security SMGT 315
September 5, 2009
1
Physical Security
Abstract
We examine five questions that will discuss the perceived role of physical protection, the
advantages of protection-in-depth over a single secure level, the advantages of combining
sensors for detection, the use of guards verses sensors as first line of defense and why, and what
constitutes a false alarm excessiveness.
2
Physical Security
3
Physical Security Week 3 Assignment
Chapter 5:
“1. It is often said that the role of physical protection is to encourage the adversary
to attack someone else’s plant. Is that the role of physical protection?” (Garcia, 2008)
The role of a physical protection system (PPS) is to “integrate people, procedures, and
equipment for the protection of assets or facilities against theft, sabotage, or other malevolent
human attacks” (Garcia, 2008). PPS being a tool to divert adversaries to another organization is
more perception that fact. PPS uses a balance among security tools to reduce the enticement of
the carrot. If a rabbit can easily eat the carrot from a garden without fear, it will do so. If the
rabbit must cross a fence, outwit a dog, and outrun a farmer, it will look for food elsewhere.
Organizations that say PPS is used to divert adversaries to someone else’s plant is
looking for an excuse because they chose to implement no PPS system, a single layer PPS, or a
poorly designed PPS. While a good PPS will divert adversaries from an organization, it was not
intended to re-direct them to another organization directly.
PPS is used to detect, delay, and respond to current, perceived, and future threats. As
stated by Fennelly, “statistics have shown that terrorists choose the targets that provide at least an
eighty percent chance of success” (Fennelly, 2004). Most terrorist are educated, trained, and
follow strong beliefs when targeting an organization. They need their mission to be successful to
prove their point. What seems to be a common theme among terrorist and thieves is the success
rate. While a terrorist and professional thieves may use the 80% and above rule, the common
criminal seem to like the odds higher.
If an adversary has multiple obstacles to clear before acquiring the target, they must
factor in their success and capture rate. If the target has perimeter fences, fixed guard posts,
Physical Security
4
watch dogs, security cameras, etc. than the chance of getting caught go up with each detection
method. In the case of watch dogs, upon detection, delay and response are almost instantaneous.
The chance of success is not viable for the adversary when in comparison they can attack the
next business that only has a fixed guard post. The success chances go up while capture chances
go down. A prime example of how an adversary may choose targets was in a recent computer
store burglary that was caught on security surveillance. The PPS initially looked like it had plate
glass doors, alarm system, and armed security guard response; however, the first line of
deterrence, a plate glass door, appeared to not be polycarbonate and was easily smashed (Fischer,
Halibozek, & Green, 2008). The equipment also appeared to not be locked down to the display
cabinets. The response time was less than thirty-one seconds by armed security guards. In this
case the lack of a good PPS provided a high success rate for the group of criminals. They
acquired $30,000 in computer equipment in thirty-one seconds.
Is the business owner going to blame the other stores who had polycarbonate glass
installed, a chain link gate, or on-site security guards, who knows; but it does show how the other
security tools of the surrounding stores may have directed the thieves to an easier target. If that
was the case, the PPS did it job to protect the assets and interests of the business owners who
took the resources to secure their facilities against attacks.
“5. What is the advantage of a system with protection-in-depth compared to one that
is very secure at one level?” (Garcia, 2008)
The advantage of protection-in-depth over a very secure single layer is multifold. The
first thing to remember about any security system is that it can be defeated (Garcia, 2008). The
goal of protection-in-depth is “that to accomplish the goal, an adversary should be required to
Physical Security
5
avoid or defeat a number of protective devices in sequence” (Garcia, 2008). When only a single
level of security is used, once it is defeated, the adversary has full access to their goal; whereas
protection-in-depth establishes numerous chances for the adversary to be detected, delayed, and
responded to by security. Within a protection-in-depth system, each layer complements each
other. As on a military base, the perimeter fence in the first layer of defense. That first layer of
defense is complimented with in-ground sensors, security patrols, and in-line sensors along the
fence. Each of these elements complements each other and also covers the others in the event
one element is defeated.
A protection-in-depth system increases security chances to capture and detain an
adversary verses a single layer system. When multiple layers of protection exists and an incident
is detected, there is time for the security teams to assess the detection to confirm the validity of
the alarm. A good example would be a manhole cover that is alarmed by a university animal
research lab. When the alarm is activated, the security team is advised and dispatched while the
situation is monitored. As the guard verifies the manhole looks slightly ajar, a second alarm
triggers in the science building. Because the first alarm created a heightened awareness, as the
second alarm is activated, the delay and response are shortened and the adversaries have a higher
rate of being captured. If the manhole cover was only a single layer of security, the guard may
have ruled it as a false alarm because it was only slightly ajar and missed the actual incident
within the research facility.
Targets that have single layer or protection will be targeted over targets with multilayer
protection. This is because of the success factor that adversaries must figure in to achieving the
goal. If an organization only has single layer of defenses, no matter how good, the adversary
only has to defeat that layer and the success rate is in the eighty percent plus range. If an
Physical Security
6
organization has multiple layers of protection, such as microwave detectors, seismic sensors,
armed guards, dogs, electrified fences, etc., the adversary must defeat each one of these elements
to achieve their goal. Detection, delay, and response are adversary’s enemies. The adversary is in
a race against the clock. If an adversary spends too much time defeating each element for a
protection-in-depth system, their chances increase dramatically of getting detected, delayed, and
responded too by security. This means their chances of success will drop with each element they
must defeat. Many adversaries will not attempt to attack a target unless they have at least an
eighty percent success rate or higher according to Fennelly (Fennelly, 2004).
Chapter 6:
“3. What are some of the advantages of combining sensors outputs in an AND
configuration?” (Garcia, 2008)
The first thing to understand is the AND gate. A AND gate represents events that will
occur when all conditions applying to the AND gate occur. If any condition of the AND gate is
prevented, the event will not take place. Security uses AND gates when determining layers of
defense systems and the conditions that will trigger the event.
As noted by Garcia, all security systems can be defeated (Garcia, 2008). One of the
advantages of the AND gate in design is in computing the probability of detection or PD and
confidence level (CL) (Garcia, 2008). In a perfect scenario the PD and CL would equal one
hundred percent. Since no sensor will ever achieve a perfect one hundred percent or 1.0, we
combine an array of sensors that compensate for each disadvantage in an attempt to achieve the
best combined result that will get us close to one hundred percent or 1.0 by using an OR Gate.
Physical Security
7
Sensors that are used for security today are readily available for purchase as are their
blueprints, design limitations, and whitepapers. With the advent of the internet, defeating
security sensors has become easier for the adversary willing to spend time in conducting
research. By using a combination of sensors and the AND gate function, security designers can
ensure a better chance of detection and reduce the amount of nuisance and false alarms that
security must respond too.
External sensors fall into one of five categories. These categories are “1.) Passive or
active, 2.) Covert or visible, 3.) Line-of-sight or terrain-following, 4.) Volumetric or line
detection, and 5.) Application” (Garcia, 2008). Each of the sensor categories complements each
other’s disadvantages and can increase the probability of detection when used in groups. When
designing the ANG gate event, remember that the assets or facility that is being protected will
drive the conditions. A nuclear power plant will have more inputs to trigger and event verses a
small business. A recent article by Matthew Harwood noted how nuclear power plants across the
country are switching to computer base fire monitoring systems to monitor fire alarms and
systems within the facilities, reducing the need to have physical fire patrols (Harwood, 2009).
By combining sensors of different types, alarms can be triggered when a true incident
verse nuisance or false alarm occurs. For example to protect the base perimeter, one might set the
conditions for an alarm only when pressure around the fences is changed, a fence is cut or
climbed, and infrared sensors detect movement. Because each of these alarms can be set off
individually by wind, fog, storms, adversary defeat, or digging under the fence, we can combine
them into single conditions that input into an OR Gate and trigger the alarm. The pressure sensor
covers the infrared method if the adversary attempts to dig under the fence. The fencedisturbance sensor senses the movement or cut within the fence material and is also covered by
Physical Security
8
pressure sensors in the ground. The Infrared system monitors the area around the fences with
multi-beam visibility while offset by the other two types of sensors. The conditions in this
example would be when an adversary triggers the infrared system, climbs or cuts the fence, and
digs or lands on the ground. At that exact instant any of the three conditions are met, the alarm is
triggered for the detection process. Now the security completes the assessment function to
validity the incident.
Another advantage of the AND Gates is combining other systems and their sensors to
monitor detection. A PPS may have it designed that if a covert pressure sensor and a line-of-site
sensor are triggered, all lights on the perimeter turn on. This event could trigger video
surveillance system to scan for target for sixty seconds. This event in turn is tied to a AND gate
that requires all perimeter lights on and video confirmed movement within the sixty second
window. If these two conditions are met, the AND gate to trigger the alarm and automatically
close the base gates is initiated.
By combining various sensor types and detection methods into groups that complement
each other and creating conditions that reduce the potential for nuisance and false alarms, the
adversary’s chance for detection, delay, and response are increased and at the same time allows
the PD and CL to move close to its goal of one hundred percent or 1.0.
“7. In what situations would a member of the protective force (guard) be used
instead of exterior intrusion sensor? How effective is detection under these conditions and
why?” (Garcia, 2008)
A security designer must account for the threats against a specific target. Depending upon
the target and the threat, security countermeasures from one location will not work in another
Physical Security
9
location. Situations that would entail using guards verse detection devices are dependent upon
the target and its security needs. For instance, in a high security maximum prison, there are
armed guards stationed in key areas to observe the prisoners. In the event of an incident, the
guards can observe, report, and respond quicker than a sensor. Guards stationed in the guard post
surrounding the perimeter of the prison act as a first line defense to attacks or incidents. This
allows for a balanced protection within the prison security system (Garcia, 2008). This is
because all security devices are equal in time amount needed to penetrate the target. In the case
of the prison, it is typically breaking out of the facility.
Another good example of where security guards will be used instead of is in the event
that an exterior sensor goes offline. This could be for such things as maintenance, device failure,
weather conditions, and excessive false alarms (Garcia, 2008). Guards should also be used in
contingency plans to offset the exterior sensors.
Guards can react faster to a situation than a sensor because they can observe, assess, and
implement responses needed on the fly. A security patrol on a nuclear facility would be a good
example. Because of the sheer size of a nuclear power plant, sensors cannot cover every area. In
this scenario, having security guards positioned in the exterior perimeter allows for immediate
response. The goal of the guard on exterior perimeter duty is to prevent any adversary from
breaking through the first line of defense. Guards in high profile security areas also provide the
required response force necessary prior to an adversary gaining entry to the interior perimeter. In
the case of a nuclear power plant and a maximum level security complex, this will be deadly
force.
Detection using guards verse is only good as the personnel that are hired. Security guards
in general do not receive extensive training, quality pay and benefits, or extensive background
Physical Security
10
checks prior to being hired in today’s industry (Fischer, Halibozek, & Green, 2008). With a
sensor device, it either works or it doesn’t. When it is designed and built, the specification detail
what it will do exactly and also states it probability of detection (Garcia, 2008). The human
factor of probability of detection is widely varied. It can be very good with the right personnel
and very bad with the wrong personnel.
A good example was a recent incident in New York City concerning two security guards
that were photographed sleeping on duty. The bridge they were guarding has been identified as a
high terrorist target. Even though there may be sensors on the bridge, they were the first security
barrier to an adversary and they were sleeping. The quality of guards and dedication can be tied
to the commercial side of the industry. A six dollar and hour guard is not as willing to die in a
firefight as say a professional soldier who accepts the risk, is highly trained, and is prepared for
firefight type scenarios.
There are situations in which guards are essential in perimeter detection. This can be
military bases, nuclear power plants, and maximum security prisons. In each scenario, the use of
guards over the use of detection devices or guards combined with detection devices must be
considered individually. The defining point is in defining the threat, identifying the threat, and
building the right PPS for the scenario (Garcia, 2008). When using guards, the human factor will
always play into the probability of detection (PD) and the confidence level (CL) of any system.
Pay, training, and character are important factors to consider when an organization chooses to
rely on guards over exterior intrusion devices.
Physical Security
11
“9. When are false alarms considered excessive?” (Garcia, 2008)
False alarms are considered excessive when the effectiveness of the security systems is
hampered because of the time needed by security to assess the alarm and vulnerability. Even
though “false alarms” are alarms caused by the equipment itself, we will use it in reference for
alarms that create false positives for security (Garcia, 2008). A nuisance alarm is caused when a
device goes off and it is caused by events other than intrusion. Because of nuisance alarms, it is
ineffective to have guards respond to every alarm. This is why detection is not complete without
assessment (Garcia, 2008).
Evert time an alarm has to be assessed by a guard; another area becomes a potential target
because of the lack of monitoring. False alarms can also be used as tools for adversaries to
accomplish their goals. Since most security devices that are made today can have their
specifications easily acquired, the adversary can use these specifications against a potential
target. This is why it is essential to complement a sensor’s weakness with another sensor’s
strengths. When a security designer is aware of the specification of a product, they can help
decrease the false alarms.
There are many ways in which excessive false alarms can be controlled. One of the
fastest growing ways is through computer probability. With computers dropping in price, many
organizations are having all sensors tied into an alarm monitoring computer. Its job is to use a
probability database or inputs about the devices to determine false alarms or to trigger an alarm
for assessment. Without this, guards would be constantly verifying alarms during weather,
seasons, and all parts of the day. This creates excessive cost for the organization in the aspect of
having to hire more guards to meet the alarms and assess the event. In this case, if more guards
are hired, than something else must give.
Physical Security
12
The primary factor to consider if excessive alarms are detected is the acceptable false
alarm rate (FAR) (Garcia, 2008). This rate not only reduces the alarm responses required by
guards, it also helps operators identify when a device needs to be reported to maintenance for
repair. False alarms are a fact of life in the security realm. They are here to stay. The only thing a
security designer can do to address false alarms is to plan. By identifying threats, targets, and
establishing good security designs, security designers can account for false alarms when
implementing PPS. By using tools such as AND gates and computer systems, security designers
can reduce the amount of excessive false alarms and create a manageable amount that can be
assessed and responded too in a reasonable amount of time. The more false alarms an
organization has, the better the chances an adversary will be able to penetrate the perimeter,
acquire the target, and escape unnoticed.
Physical Security
References
Fennelly, L. J. (2004). Effective Physical Secuirty (3rd ed.). Burlington, MA: Elsevier
Butterworth-Heinemann.
Fischer, R. J., Halibozek, E., & Green, G. (2008). Introduction to Security (8th ed.).
Burlington, MA: Elsevier Butterworth-Heinemann.
Garcia, M. L. (2008). The Design and Evaluation of Physical Protection Systems (2nd
ed.). Burlington. MA: Elsevier Butterworth-Heinemann.
Harwood, M. (2009, August 26). Nuclear Power Plants Move to Software Based Risk
Assesments to Fend Off Fire. Retrieved September 5, 2009, from Securitymanagement:
http://www.securitymanagement.com/news/nuclear-power-plants-move-software-based-riskassessments-fend-fire-006068
13
Download