Professional Documents
Culture Documents
SECURITY
////////////////////////,
~:..–
.. . .
Ii
I
APPLICATIONS MANUAL
SECURITY
ENGINEERING
AM4:1991
R
&4
CIBSE
The Chartered Institution of Building Services Engineers
Delta House, 222 Balham High Road, LondonSW129BS
The rights of publication or of translation are reserved.
No part of this publication maybe reproduced, stored in a retrieval system or
transmitted in any form or by any means without the prior permission of the
Institution.
@ 1991
THE CHARTERED INSTITUTION OF
BUILDING SERVICES ENGINEERS
LONDON
ISBN 0900953519
Printed in Greet Britain by Mayhew McCrimmon Printers Ltd, Great Wakering, Essex
Every year the number of crimes, including burglary and vandalism, rises. The annual Home
Office statistics testify to this. Consequently the security of a building, at all stages of its life,
will become increasingly important to its owner and occupier. It is therefore very necessary
that all designers, constructors and users understand the basics of security engineering in
order to provide the required security protection for buildings.
The section on risk assessment contains a previously unpublished method of evaluating the
likelihood of burglary. Thh has been drafted with the co-operation of insurers, security
companies and experienced professional risk assessors and is designed to aid those involved in
commissioning security systems for buildings in assessing the necessary level of investment in
such systems.
D J Stokoe
Chairmanj Technical Publications Committee
N G M Newton (Chairman)
M E Jay
P Lawson-Smith
S L Lyons
J J Peacock (Pasr Chairman)
J A Ratcliffe (Past Chairman)
C J Reid
D Utton
PubIiiations Secretary
K J Butcher
Editor
R Yarham
The voluntary input of personnel and assistance from the following organisations is gratefully acknowledged:
Association of British Insurers, Building Research Establishment, Kkldees Metropolitan Council, Metropolitan
Police Crime Prevention Service, Municipal Mutual Insurance Ltd, Philips Lighting Ltd, Racal-Chubb Security
Systems Ltd, Safeguard Security Serviees.
Cover illustratiotx Upper left Security Control room (courtesy Secun”ty Industry magazine>lmruer raght Closed circuit
television camera and spotlights (courtesy Security Indusny magazine); Lower left Card reader (courtesy Sabre Access
Control Systems Ltd/.Securiry Industry magazine)
Contents
Page
1 Introduction 1
1.1 Scope
1.2 Objectives of security engineering i
1.3 Basic concepts of security engineering 1
2 Risk assessment 2
2.1 Introduction 2
2.2 Application of tables 2
2.3 Riskassessmenttables 2
5 Control rooms 40
5.1 General 40
5.2 Control room functions 40
5.3 Control room design 41
5.4 External considerations 43
5.5 Commercial central stations 43
6 Specialist applications 44
6.1 Retail outlets 44
6.2 Computer rooms 45
6.3 Museums and art galleries 46
Ammunition and explosives 47
:: Industrial espionage 47
6.6 Drugs storage 48
6.7 Isolated premises 48
6.8 Civil installations 49
6.9 Defence establishments 50
6.10 Financial organisations 51
6.11 Schools and colleges 52
6.12 Churches 52
7 Vandalism 53
7.1 Introduction 53
7.2 Preventativemeasures 53
7.3 Alarm systems 53
Appendices
Al Sources of advice and information 54
A2 Identification of reputable security companies 57
Bibliography 58
Index 59
Security engineering
vandalism, burglary, even terrorism, and the inconvenience
1 Mroductk suffered as a result.
1.1 Scope Section 2 sets out a method of evaluating the risk of burglary,
the principal threat encountered by the security engineer.
The objective of this Manual is to assist the reader in From this the engineer can estimate the required level of
investment in security measures,
— gaining an appreciation of the problems of premises
security Any evaluation must take into account the property value,
— influencing decisions on architectural design, building degree of effort required to perpetrate the theft, the ease of
detail and services installation relating to the secure subsequent conversion of misappropriated goods into cash,
environment and other factors, Consider all related aspects, For instance,
is the property easy to replace? Is it essential to the business
— assessing the level of security required of the owner, displayer or keeper?
. devising performance specifications for security systems
and equipment.
1.3.2 Physical protection
This document provides general information on the many
aspects of security. Section 2, on assessment of risk, provides The type of physical protection is the form of fencing or
evaluation factors which offer guidance on the level of building elements (for instance walls, partitions, doors,
security required. Section 3, on methods of physical windows, barriers, screens, bolts, locks, safes, and so on)
protection, contains advice on crime prevention through the which discourage and delay unauthorised entry.
design of the building and premises, and descriptions of
security furniture for doors and windows. An overview of
1.3.3 Detection
electric releases and locks is included. Detection and alarm
systems, section 4, reviews those items of equipment in most The detection method selected should take into consideration
common use. Section 5, on control rooms, refers to both the assessed risk and physical protection provided. The
private and commercial central stations. Section 6 summarises engineer should consider the time needed to penetrate any
aspects to be considered for certain specialist applications. physical protection and the speed of response necessary to
Section 7 offers advice on possible ways to combat prevent the successful completion of the criminal act. A
vandalism. Finally, sources of advice and information and a detection system must deter. If it also helps to apprehend the
guide to identifying reputable security companies are criminal then this may be a bonus but not the prime
included as appendices. objective.
SECURITY ENGINEERING
General location of building risk. Locations where goods are stored in a finished state, for
instance, are at greater risk than those where the goods stored
The statistical incidence of crime is related to the size of town are components. However, account must be taken of the
or city. Criminals feel more likely to be recognised as scrap value of materials stored,
strangers in a small community and are therefore less likely to
attempt suspicious activity. Disposability of building contents
Character of neighborhood A thief needs to convert the goods into cash quickly, and the
disposability of items depends on whether there is a ready
Generally, a greater incidence of crime occurs in run-down market for them. For instance, alcohol, cigarettes, or
or inner city areas. domestic electrical goods are easily saleable and very difficult
to trace individually. Such items are therefore more
Occupation of adjacent premises during risk periods attractive to a thief and at greater risk.
This table takes into account the relationship between the Transpotiability of building contents
high risk hours when a building is unoccupied and whether
neighboring buildings are occupied during that time. The size, weight and location of goods may make them
attractive to potential burglars. The need for lifting
Kew offered to passers-by equipment, teams of assistants and commercial vehicles
decreases the risk of burglary, whereas easily transportable,
Criminals prefer to be hidden from general view when high value goods are at greater risk.
undertaking unauthorised aetivit y. The table takes account Table 2.2 Building access and structural strength
of the frequency of passers-by.
Circumstances affecting risk Factor
Level of lighting provided Ease of access and movement
Difficult -1.0
Criminals prefer to undertake unauthorised activity under Moderately difilculr o
the cover of darkness. The provision of night-time illumination Easy 2.0
has been proven to have a direct influenee in reducing crime. Type of building structure
The table recognises that the source of illumination could be Stone, brick or concrete 0.5
the building itself, adjacent premises or public street T]mbm or lightweight 1.0
lighting. Mobile or temporary 1.5
None (e.g. open yard) 2.0
2.3.2 ~ahM$2~2wess and structural strength: Type oj door and windoru frames
Strong metal 0.5
Hardwood 1.0
Softwood or aluminium 1.5
Ease of access and movement Plastic 2.0
Quality of door and windowsecun”tyfiuings
The speed of entry to the building and removal of goods is
Strong, high quality -1.0
related to the convenience of outside access to the building. Average, economy or domestic quality o
The table can be applied to pedestrian or vehicular access Average, standard quality 1.5
depending on what is required to remove the goods at risk, Weak, economy or low quality 2.0
The table takes into account the ease with which the goods
can be moved out of the building. Table 2.3 Building contents
Type of building structure Circumstances afFectingrisk Factor
Value of buila%sgconsmts
The structural strength of the building can influence the Low perceived value 0.5
susceptibility to attack. Low value (e.g. cheap raw materials and 1.0
finished goods, petty cash etc.)
Type of door and window frames Good resale value (e.g. cash, alcohol, 1.5
electrical goods etc.)
The physical strength of the door and window frames High value (e.g. drugs) 2.0
influences the ease of forced entry. Disposability of building conrenn
Very limited market 0.1
Quality of door and window security fittings Limited market 0,5
Saleable given rime 1.0
The quality and strength of the door and window security Eady and quickly saleable 2.0
fittings (catches and locks) directly affeet the ease of forced Currency is main item being protected 3.0
entry. Transportability of contents
Difficult to handle; mechanical lifting -1.0
equipment needed
2.3.3 Building contentst Table 2.3 Team of people and heavy transport needed -0.5
Long time to load and medium-sized 0
transport needed
Value of building contents
Easy to handle but light transport needed 1.0
Carsbe carried by one person 2.0
The value of a building’s contents directly affects the level of
3
— .— .. ———- .—— ——-— -—- —
2.3.4 Occupational pattern: Table 2.4 high influx of visitors occur, such as in a hospital, then
control becomes almost impossible and the risks multiply.
Hours of occupation
Burglary generally takes place while buildings are unoccupied: 2.3.6 History of loss: Table 2.6
during the day for domestic dwellings or during the night for
industrial or commercial premises. The risk of burglary is far Level of previous loss for building
less when the building is continuously occupied than it is
when the building is left unattended for long periods. The Insurance premiums generally take into account the loss
risk increases if the thief can identify the periods when the history of a building. A history of break-ins or loss, if no
building is unoccupied and plan accordingly. remedial measures have been taken, indicates that further
incidents are probable.
Numbers and level of supervision of visitors
Level of previous loss for occupier
The integrity of visitors to a building cannot always be
guaranteed. The table assesses the risk according to the Some companies may be more susceptible to loss than others.
numbers of visitors and the level of supervision. Where a This will need investigation into attitudes to security, public
image and so on.
Table 2.4 Occupational pattern
Circumstances affecting risk Factor Table 2.6 History of loss
Hours of occupation Circumstances affecting risk Factor
Permanent occupation -1.5
Level of previous loss for building
Short periods of no occupation -0.5
Low 0.5
Irregular, lengthy periods of no 1.5
Medium 1.0
occupation
High 2.0
Regular, dehed periods of no occupation 1.75
Long, defined periods of no occupation 2.0 Le-uel of prsvious loss for occupier
Low 0.5
Numbers and level of supervision of visitors
Medium 1.0
Supervised, with access control -1.0
High 2.0
installed
Few, unsupewised o
Significant number, unsuWrvised I.0
Many, unsupervised 1.5
2.3.7 Existing security measures: Table 2.7
Sensitivity of loss The existence of intruder alarms will not prevent unauthorised
activity but will discourage and hopefully reduce the incident
Consideration needs to be given to the political consequence level. The more comprehensive the system, the greater is the
of loss. For instance, a security company would be ridiculed probability of detecting and preventing burglary.
if its own premises were burgled, In such cases, protection
becomes essential irrespective of the financial value of the
building’s contents. The table also takes account of cotildential Tetble2.7 Existing security measures
information, the loss of which would be damaging. Circumstances affecting risk Factor
4
SECURITY ENGINEERING
TotaI Level of risk Recommended level of Level of previous loss for building 0.5
factor protection Level of previous loss for occupier 0.5
Existing secun”ry measures
Below 14 Very low No special measures
Level of intruder alsrrrnprovision 2.0
14-19 Low Physical measures
Level of provision of security guards 2.0
19-23 Average Physiesl and limited
Level of CCTVprovision and observation 2.0
electronic measures
23-27 High Physical and medium Total risk factor 18.5
electronic measures+
Above 27 Very high Physical and extensive
electronic measures$
5
CIBSE APPLICATIONS MANUAL
Property description: A builders’ merchant offke and store Property description: An offke in the City of London, with
rooms in Dorset, on a main road corner site, open to view. metal window and door frames and strong security fittings.
Doors and windows are hardwood, with standard security 24-hour security gwuds and access control are provided, as
fittings. There are no electronic systems installed. Items are CCTVsurveillance of all entrances and intruder alarms
being protected are worth about ~8 000. (monitored continuously). The main contents of the building
are desk-top computers containing vital information.
Recommendations: Referring to Table 2.8, the total vahe of
19.0 amounts to an average level of risk so further physical Recommendations: Referring to Table 2.8, the existing
measures and electronic measures are recommended. security measures have reduced the risk from high to very
low. No further measures are required.
6
SECURITY ENGINEERING
\
Criminal
darnqx valued Theftfrom
f20.00 and under vehicles
4.5% 16.7%
:F’di//Y\
Criminal
3
v’
Theft
shops
Freud and 5.8%
*
Theft or unauthorised
takingof
other theft motor
and handling vehicles
stolen goods 9.9%
16.7%
Aged
*
14-17 14-17
Aged
10-1
9%
Ad Aged
over 21 m 21
36% 47%
Figure 3.2 Offendersin burglary category by sge group, England snd Figure 3.3 Offendersin theft snd stolen goods category by age group,
wales 1988’‘) England and Wales 19881”
7
CIBSE APPLICATIONS MANUAL
six years. Although burglary is the main crime the security 3.3 Censtruchn fer protection
engineer has to consider, threats may also include criminal
damage (iicluding vandalism), fraud and violence against the
person. 3.3.1 WaUs
3.3.4.1 Annealed (floaf) glass 3.3.4,7 Laminated acrylic and toughened glass
Advantages: Advantages:
— The glass breaks with sharp edges which hamper — This type of glazing is highly resistant to impact or
intruders. breakage.
— The noise of shattering can deter intruders. — It limits flying fragments.
3.3.4.2 Wed glass — This is used in high-risk situations, and combines the
advantages of the separate types of glazing.
Disadvantage:
— Designed for reasons of safety, this cannot be considered
3.3.5 Air conditioning
as a security barrier as once the glass is broken the
exposed wires can be pulled apart to enlarge the hole. All air conditioning and ventilation systems must reflect in
their construction the level of securit y of the areas they serve,
3.3.4.3 Toughened (tempered) glass: and should not offer a route of entry, Internal compartmentation
of the ventilation ducting prohibits a person crawling
Disadvantages: through. Standard air control louvres can be reinforced by
— Again, designed for the purposes of safety rather than rear bracing securely f~ed to the structure. The grill
security, this glass breaks into small pieces. construction should delay attack by a hacksaw or flame
cutting tool. The minimum distance between parallel
— It is resilient only to blunt objects. security bars through which a person can pass is 150 mm.
3.3.4.4 Double glazing
3.3.6 Shuwers
Advantage:
— This acts as a deterrent in a similar manner to Shutters offer a cheap option where protection is only
permanently sealed windows. required at the end of the working day or trading period.
Shutters are static devices with physical locking which often
3.3.4.5 Acrylic offer greater resistance to attack than that provided by
upgrading doors or windows. They have the disadvantage
Advantages: that once penetrated they mask the activities of the intruder
within, so consideration should be given to providing
— It is highly resistant to impact. associated intruder alarm systems, Shutters which affect the
— It is lightweight. outward appearance of the building may require local
authority planning consent.
— It shatters safely.
Disadvantage:
— It is susceptible to blow-torch attack.
3.3.4.6 Polycarbonate
3.4.1 General
Advantages:
Security furniture for doors and windows comprises bolts,
— It is highly resistant to impact. hinges and locks. So as not to undermine resistance to attack,
9
CIBSE APPLICATIONS MANUAL
all such fittings must be equally strong. A door closure 3.4.4 Locks
mechanism is essential, as it ensures that the door always
pulls to after behg opened, keeping the entrance secure at all Discussion of this subject is limited to those locks which are
times. designed for the protection of premises: key locks and
combination locks. Before considering these types in detail, it
Locks vary in grades of strength and complexity of defence must be stressed that the security of any locking system.
against unauthorised opening. From the outset of the relates directly to the care of keys, or, in the case of a keyless
planning, the grades of security locks for the various levels in combination lock, to the secrecy of the operating numbers.
the ‘master’ key suite must be taken into account. These However good a lock is, it will respond to the right key or the
access levels must reconcile the requirements of the security right numbers, but it does not have the ability to decide
department, maintenance department and the cleaners with whether the person using the key or numbers is entitled to do
the needs of the individual key holders. Essentially, the fewer so. It is essential therefore that the authorised keyholders
keys involved, the greater the building’s security. Remember take care of their keys.
to replace locks after the construction of a new building
during the hand-over stage, as recommended by BS 8220~
Part 3(6).
3.4.4.7 Key locks
10
—
SECURITY ENGINEERING
— Forcing with a jemmy: This is countered by having a box then be grouped and operated by master keys. The grand
striking plate mounted into the door frame to enclose the master key will then operate all locks within any group.
protruding bolt. Applications include office blocks and large schools.
— Using a hacksaw: The bolt of a lock can sometimes be
The complexity and number of levels can increase according
seen through glass doors which often do not have rebates. to the situation. However, the security of the keys themselves
It is therefore vulnerable to a padsaw. However, if the is of utmost importance to maintain the integrity of the
bolt is equipped with hardened steel rollers which are free
overaIl system. To this end it must be impossible to convert
to revolve, this type of attack is defeated.
an ordinary key into any master key. This can be assisted by
— Drilling: The British Standard lock specification’-’ calls ensuring that the master key design always contains more
for protection against a hand drill for five minutes, but metal than any of the individual change keys.
most locks could be completely removed from the door
structure with a brace and bit m considerably less time 3.4.4.2 Combination locks
than this. The only counter to this type of attack is to
strengthen the door. Combination locks designed for secur~~ applications are
— Lockpicking: This is not a common form of attack on usually operated by three or four two-dlgn numbers, giving
up to 100000000 possible combinations, and have a bolt
modem locks, but better quality locks contain anti- which is withdrawn when the correct numbers have been
picking devices. dialled. The lock can normally be set to respond to the
— Trviruz various tvDes of kev: Select a lock which has owner’s own numbers. This lock is particularly suitable for
re&o~able differi~g, in addifion to all the qualities listed safes and strongroom doors, since its-number c~n be changed
above. easily when, for example, staff leave or go on holiday, or when
it is suspected that’ some unauthorised person has gained
Spare keys for securiry locks access to the number.
Most safemakers exercise the strictest control on spare keys
The development of keyless combination locks is directed
for safes and will cut spares only on receipt of adequate
towards ‘manipulation resistance’. Although such manipulation
authority. With door locks, however, duplicate keys are
is possible, it is by no means as simple and rapid an operation
generally easily obtainable.
as maybe supposed. Lock manipulation is normally so time-
Masrering
consuming as to be a highly improbable form of attack.
A lock can be opened only by its individual ‘change’ key. This Nevertheless, there are various wraysof achieving a higher
lock could also be opened, with other locks, by a ‘master’ key. level of manipulation resistance. These include keeping the
This principle cars be usedto control access to different parts bolt drawing mechanism clear of the driving wheels until
of a building. Theoretically, mastering can reduce the level of they are in their final position, thereby destroying any sense
security as it may introduce several keys which can open any of ‘feel’ between the bolt and the dial,
one lock. Keys to high security areas, therefore, should not be
included in the master suite. Ultimately the security of the combination lock system relies
on the secrecy of the combination.
Three forms of mastering are listed below. Figure 3.4 shows
the hierarchy of a simple grandmaster key suite.
3.4s Monitoring lacks
Geneml or
T
Gmndmastar
security kay
manager In order to monitor the operation or position of a lock,
microswitches or reed switches have to be fitted to the
ltilng mechanism. Care must be taken in their location to
I 1 i ensure that the required signal is being given. For example,
to monitor for the use of the lock, a switch can be triggered by
the bolt. To signal authorised operation with a key, the
movement of the key barrel must be monitored. Also, to
--- L--- ensure that the lock is fully home when the door is closed, a
switch is needed in the strike, i.e. the part of the locking
I I f system into which the bolt or latch enters. Wiring to the lock,
either for monitoring or for operational purposes, threads
Junior
staff
Changa key
L_!
II~
Change key
H~
Change key
I
through the middle of the door to a conductor hinge, or an
external loop, fitted in the frame of the doorway or window.
Figure 3A Hierarchy of a simple grandmaswr key suite
— A one level or change key suite: All locks are operated 3.4.6 Eloctrkally opemtd reloasos
individually by a change key only and are keyed
differently or alike as required. Applications include The electrically operated release or strike is the most
homes or shops. common form of electrical control for door lock override.
— A two level or master key suite: All locks are operated
The release is installed in the door frame to permit the
opening of the door wi~h the lock retained in the closed
individually by change keys and by a single master key.
position. There are two basic models, one for use in
Applications include small schools and hotels.
conjunction with mortice latches and one for rim locks, with a
— A three level or mmdmaster kev suite: All locks are varietv of f~injt otxions to suit the t)articular mounting
operated individually by change keys. Selected locks can arrangement. O; f~ilure of the electric-d supply the releas~
11
CIBSE APPLICATIONS MANUAL
can fail in the locked position for security or, as in the — Accurate installation is necessary to ensure correct
instance of fire exit routes, fail in the unlocked position. alignment.
Manual overrides are available for fitting to the secure side of — They have a relatively high level of power consumption.
the door.
— They are generally unsuitable for escape routes.
Electric releases are generally easy to install with wiring
contained in the door post. Standard units can have weak 3.4.7.3 Hybrid
pivot action. The better qualky devices generally have a
lower voltage and current format, and are relatively stronger This is a spring-mechanism lock loaded by the motion of
and more reliable than the cheaper versions. Heavy duty closing the door and deactivated by an electric pulse.
specialised releases are available for use with deadbolt locks
and situations applicable to higher security applications. Advantages:
Care must be taken to ensure that flush f~ing of the release — A mechanical push-button can be incorporated on escape
does not reduce the overall frame strength. Anti-thrust plates routes.
protect the strike on outward opening door installations.
Manufacturers’ fitting tolerances between door and frame — A mechanical key interlock can be incorporated.
must be met to ensure satisfactory operation. Note that — The electric pulse only requires a low energy connection.
electric releases are not currently available for swing-through
doors. — It is relatively small.
Advantages:
— These locks provide a high level of holding torque.
3.4.7 ElectTk Iecke
— They require little power (about 200 mV at 12 V DC).
3.4.7.1 Semi-active — They have no moving parts, resulting in high reliability
and low maintenance.
Available in a type that fails in the locked position, or for fire
exits a type that fails in the unlocked position, these use — They fail in the unlocked position.
electricity to unlock a deadlatch or engage a handle to permit — They are easy to install.
manual withdrawal of the bolt.
— They are suitable for most door configurations.
Advantages: — They are relatively cheap.
— These locks are small.
— They have a low level of power consumption. Disadvantages:
— They are unsuitable for swing-through doors.
— They are silent in operation.
— Accurate alignment is required for the door-stop to
Disadvantages: prevent damage to the unit.
— They require an electrical cable lii to the door. — A voltage drop will reduce holding torque.
— Accurate installation is necessary to ensure correct
alignment. 3.5 kUr~ lighting
— They are vulnerable to forcing as with mechanical locks.
Most criminals, from the petty thief or senseless vandal to the
highly skilled professional, prefer to work under the cover of
3.4.7.2 Active darkness. Security lighting therefore substantially reduces
the risk of crime. It acts psychologically, as a powerful
Active locks are available in types which fail locked or deterrent, as well as functionally, allowing security ofilcers or
unlocked. They use electrichy to throw or withdraw the bolt. passers-by to see what is happening.
12
— ———
SECURITY ENGINEERING
recommended. Well-sited lighting of the right intensity is Table 3.2 Recommcndcd
lamptypesfor security lighting
therefore essential to provide an effective and energy Lamptype Colour (Mour Maximum
conscious level of security. It is important to ensure that both rendering Iuminous
walls and adjacent grounds are adequately lit so that dark efficsey
areas are avoided. Use top-up lighting, if necessary, to (lrn/w)
illuminate escape routes, access ways or routes used by
security persomel. Compact white Good 80
fluorescent
Highpressure White Good 63
mercury
Table 3.1 Resmnrnended ilhsrninances for seeurity lighting applications Tungsten White Good 22
Application Illumirsance level on wall halogent
and surrounds (lx) Parabolic White Good 18
refleetort
Average risk sreas (e.g. residential) 3 Highpressure Yellow/white Reasonable 125
Higherriskareas(e.g.schools,small 5 sodium
shops, business premises) Low presSW Yellow None 200
sodium
+Onlyfor use with intermittent switching
3.5.2 Cenirel and cenneelien
The type of lamp influences the colour appearance, colour 3.5.6 Residential areaa
rendering and running costs of a security lighting installation.
Since security lighting has to operate throughout the night
The lamps recommended for use in residential areas are
energy-effective light sources are preferred. Such light
tungsten halogen and parabolic reflector lamps for intermittent
sources include compact fluorescent lamps which give a
use, compact fluorescent and low pressure sodium lamps for
white light. The warm atmosphere they provide makes them
continuous use, Of these the low pressure sodium lamps are
an excellent choice for domestic areas. Other gas discharge
yellow, whereas the rest are white. The minimum mounting
lamps include high pressure mercury and high or low
height for these lamps is 2 m, and their average illuminance is
pressure sodium lamps which provide light varying from
3 lUX.
white to yellow in colour.
Figures 3.5 and 3.6 show typical examples of such
Very L,. -m, the most suitable light source is the familiar low applications. Luminaires are located adjacent to the possible
pressure sodium lamp, the most efficient and economic of all points of access on the ground floor to illuminate the
lamps. These lamps have a high intensity yellow coloured surroundings 3-4 m from the property.
light output and low energy consumption, and are ideal for
schools, small offices or factories. For greater mounting Another measure worth considering is extending the use of a
heights or where a greater light output is required, lamps ‘door viewer’ from daylight to night-time. Correctly placed
such as high pressure sodium and mercury should also come near the front door, a huninaire should illuminate c-ders
into consideration. Table 3.2 provides a guide to these lamp while allowing the householder to keep back out of the light.
types, showing their colour appearance, colour rendering, It should be mounted on the wall but not so high that the
light output and power consumption. caller is actually standing in a shadow.
13
CIBSE APPLICATIONS MANUAL
A luminaire mounted inside a front porch should be for example a passive infra-red detector, possibly connected
positioned immediately above the front door or on the side to an alarm.
wall and preferably should be vandal-resistant. Decorative
luminaires generally cast a pool of light directly beneath
without actually illuminating the surrounding area. A When the house is vacated during the night, simple plug
bulkhead-type unit will direct light outwards. timers or more complicated switching controls can be used to
give the impression that the house is occupied. Such timers
After the householder has retired to bed it may be beneficial can provide a natural switching sequence of the main house
to have the exterior lighting operated by a presence detector, lights in the living room, hall and bedrooms.
14
SECURITY ENGINEERING
For large offke complexes, hospitals, colleges and universities, Figure 3.10 Lightinglayoutfora checkpointandroadwayentrance
which are multi-building sites, the exterior security lighting
should be carefully planned.
3.5.8.2 Checkpoints
These points are worth addressing:
The perimeter fence should follow the line of an entrance
— The perimeten whether it is a boundary fence, hedge, or
roadway and the road between the two fences should be
wall. brightly illuminated. Figure 3.10 illustrates a typical layout
— The landscaping. showing a channel through which it is impossible to pass
without being seen. This arrangement will often stop
— The access points, entrances, exits, windows, and roof- unauthorised people even if there is no gate.
lights.
A gatehouse or vehicle checkpoint may require local
These mattersare discussed in more detail in the subsequent
floodlights, a fence or Iight-coloured wall extending for at
section on industrial security lighting.
least two vehicle lengths from the observation point, and
local lighting at a lower level to enable security guards to
check vehicles and papers. Sufficient light should penetrate
3.5.8 Industdal -s
horizontally to enable the inside of the vehicle to be checked
The lighting of industrial areas is covered more fully in the adequately. Colour discrimination is important. Recessed,
CIBSE Lighkg Guiul, The industrtid environmen$8). enclosed spotlights may be required for checking the
undersides of vehicles.
Perimeter lighting should illuminate areas beyond the site It should be impossible to tell from outside whether a
constraints to enable security guards or police to detect gatehouse or security hut is occupied or not but the view from
anybody loitering or attempting to gain entry. Figure 3.9 inside should be unhampered by bright reflections. The
illustrates a typical layout for the security lighting of a interior lighting of a gatehouse should be restricted to desk
boundary and the correct spacing of lamps, where H is the lighting, shielded and subdued, and fitted with a dimmer.
height of the luminaire and the spacing is 3 H to 4 H. This also maintains a guard’s dark adaptation. The principles
are illustrated in Figure 3.11.
Street lighting lanterns, as shown, floodlights or lanterns can
be used. Gmsider using proximity detectors if intermittent If the windows of the gatehouse are covered with wire mesh
lighting is required. painted white outside, or are made of very small glass panes
with white painted glazing bars in-between, or if half-
silvered glass is used, it will make it ahnost impossible for
anyone to see in from outside, especially if the interior of the
gatehouse is painted in dark colours. If there are windows on
both sides of the gatehouse care should be taken that the
occupant is not illuminated or silhouetted by other outside
lighting.
16
.---—
SECURITY ENGINEERING
Wim mesh
Gloing tilted
* reduce refieciiorss
ml Floodlighting
— the area to be surveyed.
no ‘“iMw &
L
%CUtitY hut
, 1
red radiation as well as visible radiation. The choice of light
source should take the spectral sensitivity of the camera into
account. Most manufacturers of cameras will indicate a
I c [ minimum illuminance to be provided for the camera to
u Wire fence
operate successfully. However, if moving objects are to be
successfully shown an illuminance above the minimum
Figure 3.12 Floodlighting a building should be provided, Care should be taken to provide the
required illuminance evenly on all of the relevant surfaces. It
must also be possible for anyone responding to the ccTv
The floodlighting of buildings is described more full in the surveillance to see what is happening. A well designed
CIBSE Lighting Guide, Tb outdoor mironsnen?’, For security lighting system should be capable of meeting the
floodlighting occupied buildings consider using close-offset requirements of both people and CCTV cameras. ccTv
floodlights but beware of unwanted light spilling into surveillance is detailed in section 4.17.
adjacent property.
The1988i3rIMJCrime Stmrey Home Office Research Study No. 111 6 BS 8220: Guide for security of buildings against crime: Part 3:1990
(London: Home Oflicc/HMSO) (1989) Ware)toujes and dimibufion units (Milton Keynes; British Standards
Institution) (1990)
BS 5357: 1976(1985) Code of pruclice. Insta[hstion oj security glazing
(,Wllton Keynes: British Standards Institution) (1985) 7 BS 5872:1980Spectjicationfor lockt and latches for doors in buildings
(Milton Keynes: British Standards Institution) (1980)
BS 5544: 1978(198S)SpecVication for wsti-bandir glazing (g[mrittg
resisrant zo munual attack) (Milton Keynes British Standards 8 ?’he indmrrial environment CIBSE Lighting Guide LG1 (London
Institution) (1985) Chartered Institution of Building Services Engineers) (1989)
BS 5051: Bullet-resistant glazing: Part I: 1988 Spec~icationjor glazing 9 The ourdoor enr,,ironment Lighting Guide (London: Illuminating
for interior use (,Milton Keynes: British Standards Institution) (1988) Engineering Swiety) (1975)
SECURITY ENGINEERING
4.1 Geneml
.
20
SECURITY ENGINEERING
Table 4.1 General guide to dereaion equipment — continued
For internal
areas (10
&tecr intruak
within prenri>es)
4.2 Protective switches for doors 4.2.2.4 ClassW: pre-adjusted balanced magnetic
and windows confact (inple reed)
Disadvantages:
4.2,2 Magnetic contacts — Alarms are not created until the barrier is broken
through.
4.2.2. ? C/ass1:stondardmagnetic contact(.singie reed)
Continuous wiring must not be installed on damp
surfaces,
A standard magnetic contact consists of one reed switch and
one magnet. It may be defeated with the use of second The wiring can be looped out, so it is important to specify
magnet. a good quality unit.
Continuous wiring —
threoded through
tubas
Advantages: Disadvantages:
— This detects entry through an opening, not just brealdng — The maximum height of bars is restricted to about 2 m.
glass.
— Knock-out bars are not as secure as continuous wiring in
— This type of detector is free from false alarms. tubes.
— The continuous wiring can be supplied in frames so that
they may be removed from the window when alarm is not
set. A vibration device can signal attempts to ‘loop out’
4.6 Vibration detectors
continuous wiring.
4.6.1 GenOMl
Disadvantages:
— It is unsightly. There are several types of device which use either an electro-
mechanical or an electronic transducer to detect vibration.
— It can be defeated given time.
Electro-mechanical sensors are known as inertia detectors,
and electronic transducer units are known as seismic
I detectors. Both types interconnect to electronic analysers
which can be selected to process the signals as required. A
4.5 Knock-out bars
gravity-sensitive inertia detector requires careful siting,
( whereas a seismic sensor can be mounted anywhere.
Installed 100 mm apart across doors and windows, knock-out
bars can be removed to leave glass completely unobstructed A microphonics cable detects mechanical vibrations. Wlien
when the alarm system is not set. When in position each interwoven with chain-link fencing, it can sense the cutting
knock-out bar holds a microswirch in the closed position to or climbing of the fence. A controller can be tuned to ignore
complete the circuit. Displacement of a bar creates an alarm normal vibrations such as those caused by the wind.
condition, The bars can be installed with microswitches at
one end of the bar, or at both ends for maximum security, Advantages:
— A vibration detector is an early warning device designed
Advantage:
to create alarm condition before penetration of the
— The glassis unobstructed when bars are removed. defences or as the attack commences.
23
CIBSE APPLICATIONS MANUAL
— It is simple to install and service, and often cheaper than (d) Illuminate the area using separate, secure circuits.
continuous wiring. (e) Locate against substantially constructed waUs. ~
— It occupies only a small part of the surface. (/) Ensure that the ceiling and floor are as strong as the walls.
Disadvantages: (g) Protect the building using intruder alarm systems.
— Not all devices are closed circuit in design. (h) Protect the safe using acoustic detectors.
— Certain detectors do not detect frequencies of vibration (z] Ensure maximum key security.
such as those created by electric drills or the scratching (I] Limit the value of safe contents.
out of mortar.
(k) Make no modifications to the structure of the safe.
— False alarms are created if the environment is unsuitable.
It must never be presumed a particular device will operate 4.7 Breaking glass detectors
satisfactorily on all types of surface. An ‘environmental’, or
on-site test should be undertaken. Where a unit fails such a
test continuous wiring or space detectors should be considered. 4.7.1 Foil detectors
The surface area covered by a vibration detector’s range A lead foil strip, freed to the glass surface, acts as part of a
varies with the design, as well as the vibration transmission closed circuit and is designed to break and create an alarm
characteristics of the surface concerned. It is therefore condition when the supporting glass is broken. The foil is
important to specify the area to be covered and not the fitted over the entire surface in a pattern similar to the one in
number of detectors to be used. Figure 4.2. On plate glass the foil is fitted at least 75 mm from
the edge of the window. A typical installation is shown in
Special facilities can include: Figure 4.3.
— geophones designed to detect all frequencies of vibration
created by all known methods of attack against solid walls
— a closed circuit design: a circuit failure creates an alarm
l--
condition
— minimisation of false alarms by incorporating advanced / ,.
- Foilstrip
,
.
,/ /
— a ‘double knock’ facility to minimise false alarms: the
/
I
detector must sense a vibration twice in succession before r
the alarm is activated. 1
I1 . ..’, ,
,/ ‘:/ j ‘
L
2CX)mm
maximum
/
~> #
,/
4.6.2 Vibration detectors for safes and $’.
,, /;
strongroom doors /
/[’ // /’
/
These devices are closed circuit in design: the circuit has m ,< /’ J - Glass
break to create an alarm condition. They contain a transducer
designed to detect all frequencies of vibration created by all
I /,.
/./ I/
known methods of attack against safes.The control circuitry ;/’
contains an analyser unit which disregards irrelevant
frequencies but amplifies weak signals of the correct
frequencies, thus fully monitoring all surfaces. Tampering
81
1-l
.<
with the wires from a unit is guarded against by a balanced
75mm minimum
circuifi a change in state creates an alarm condition. A
contacted flap can protect the keyhole to produce an alarm Figure 4.2 Foil breaking glass detector
when attempts are made to insert keys or explosives.
Advantage:
It is important that the wires leading from vibration units on
— Foil detectors provide a cheap means of detecting
the safe are specially protected. The size of safe Khat a
breaking glass.
detector can protect and the number of detectors required
depends on the design of both the detector and the safe.
Disadvantages:
Certain safes will require more than one vibration detector.
— Operation depends on glass at least cracking at the point
The list below provides general recommendations to ensure where foil is fitted to create an alarm.
the security of a safe. — They are not recommended for laminated or wired glass.
(a) Seek the advice of insurers and security specialists. — The foil offers little resistance to accidental damage in
(b) Select a safe which is neither more nor less secure than the installation or by window cleaners.
situation requires. — It can onlv. be installed in one continuous leruzth.
w,
(c) Place the safe in full view of passers-by. requtilng the strip to be folded at the corners.
24
,/. ‘//
/
;/‘
‘/
,//.,’”
,.
/4
/
/’
/“””””~’
/
—
//
/
. . —..— ..
SECURITY ENGINEERING
4.7.3.2 Glass-mounted
I
- Foil drip
/ /,’ ‘/
/
,,
/
/“ ‘ ‘“ ,
The second type of unit creates an alarm condition only when
the glass is broken. It discriminates between normal glass
/ ,, /, / ‘.”’ vibrations and actual glass breakage. Each pane of glass
/ //
/’ requiring protection must have its own independent unit
/’
/“ 1
glued to it by the recommended adhesive. It can be used on a
/
flat surface of silicon, armoured or flat wired glass. These
devices cannot be used on laminated glass. One unit can
/ ‘Plate glass
cover an area of glass of approximately 10 mz.
/,..-’
,./’
/
4.8 Beam detectors
,,. ,, ,, / ‘ /’/ /
L’
Disadvantage: Disadvantages:
— It is possible to penetrate the glass using a cutter without — They can be avoided if their positions are known to the
trigger&g an alarm. intruder.
— They cannot be installed in areas where there are animals
4.7.3 Uhrasmllicdetedws
or birds, or where there is likely to be legitimate
movement across the line of the beam.
There are two types of unifi remote- or glass-mounted. — They cannot be used outside buildings on police call
systems.
4.7.3.1 Remote-mounted
Special facilities can include:
The uluasound breaking glass detector is a purely passive — a lens cover to conceal the direction of the beam
detection device, only receiving and not transmitting
ultrasound. The sensor detects the ultrasonic pressure waves — extended ranges of up to 160 m
generated by breakiig glass. The concentration of sound is
— twin beam units to minimise false alarms caused by small
greatest directly in front of the glass. Detectors can be sited
animals and birds.
up to 4 m away from the front of glass or 2 m if mounted
above or to the side. To minimise false alarms care must be
taken to avoid: rattling windows and metal letter boxes;
4.8.2 Mlc rewave detecters
central heating boilers, or empty cans and drums which emit
frequencies when expanding or contracting; telephones or
These detectors are similar in principle to infra-red
door bells. Also, do not mount these detectors where outside
detectors. The electromagnetic energy is transmitted in a
noise is likely to penetrate the buildlng or near any type of
cylindrical beam covering a vertical distance of about 3 m and
ultrasonic transmitting device.
an horizontal distance of 30 to 40 m. The detector activates an
alarm when the received signal is changed by a physical
When protecting free-standing and wall-mounted display
barrier moving through the beam (see Figure 4.4).
cabinets the sensor must be mounted on a firm surface, free
from vibration. If 24-hour protection is required the sensor
Advantages:
should be mounted within the display cabinet which must be
sealed to avoid false alarms caused by jangling keys, for — These are ideal for external use,
25
CIBSE APPLICATIONS MANUAL
Microwave Doppler sensors, which are most sensitive to objects moving
Transmitter .----;-------------- . . . . .. ~field towards or away from them.
,,, ,,. ., .+ ● , . . . ..
,., ,. \,. ,.-*: --.>----
/
1 ~ . +.
j’ /“ \ ,,. \ ,/’” , These detectors can be wall- or ceiling-mounted and are
available in a number of forms offering different patterns of
coverage. These patterns range from narrow bands suitable
~ ~1 “v- for corridors with ranges of up to 50 m, to circular areas of
‘:;a~~ifl~~=~ 360°, with ranges of up to 10 m. Figure 4.5 illustrates the
field of detection of a typical, wall-mounted infra-red
detector, The arrows in Figure 4.5 (a) demonstrate the
Figure 4.4 Microwave beam dcteetor directions of movement to which the detector is most
sensitive.
— Senshivhy levels can be adjusted.
Such a sensor is less prone to false alarms but, as this is a
— They are a relatively cheap first line of protection on passive system with no transmitter, it is diff:cult to make fail-
large, high risk areas.
safe. Radiation is only received from objects in view, the
detector can be easily masked, or moisture can prevent
Special facilities can include: operation if the protective seal on the crystal fails.
. reduced sensitivity to vertical movement (for instance,
ignoring falling leaves) Sudden temperature changes cart cause false alarms so avoid
locations of direct or reflected sunlight or where high air
— an internal heater to reduce condensation
turbulence can occur, as in areas near central heating
— digital processing to evaluate the size and speed of objects radiators,
passing through the beam (therefore ‘reducing the
incident of false alarms).
4.9.3 Aceustic detectors
Detector is most
(es)
sensitive10
movement in
these directions
s
Well
20m
.> \
—.
,: .,
..2’
I
‘“”~ Immhkh
(b)
Well - Detector
%’
L
--om~
The detector is most sensitive when the intruder moves
Figure 4.5 Typical, wall-mounted
passive infra-red detector: fields of
coverage (a) plan view and (b) side
elevation
The ability to focus the energy into a beam makes it possible An ultrasonic sensor cannot be used in an acoustically noisy
to direct the energy into areas to be covered and away from environment. A ringing telephone may cause the detector to
possible causes of nuisance alarms. When wall-mounted, the go into alarm and air lines and steam pipes can sometimes
range of a sensor is typically 5-10 m deep, 4-5 m high, and produce frequencies which prove troublesome.
5-7 m wide, forming an elliptical field of coverage.
This is an active system and is therefore fail-safe, creating an An ultrasonic sensor is entirely suitable for protecting a risk
alarm ccdhion if it fails to function correctly. Soft surfaces area containing glass. Ultrasonic energy does not penetrate
(carpets, curtains, cardboard cartons) absorb some of the glass. The sound of breaking glass has an ultrasonic
sound and reduce sensitivity. component which will cause the sensor to trigger an alarm.
27
CIBSE APPLICATIONS MANUAL
To cover a large area without mutual wave interference, 4.9.5.2 Medium-sized areas
ensure that all sensors are on different frequencies.
Medium-sized areas require only one sensor for full
Special facilities available include: coverage, with possibly a second to fiIl in a blind spot. The
— advanced electronics to make false alarm preventative
choice of detector in such a situation is a personal one,
although the characteristics of the area may rule out one or
checks before creating an alarm more methods depending upon the level of risk and
— a fail-safe circuit designed to create an alarm if either the consequences of false alarms. In office areas with telephones,
gun diode, mixer diode or the amplifier fail for instance, ultrasonic sensors may be ruled out in favour of
— a range adjustable up to 30 m
microwave sensors.
28
SECURITY ENGINEERING
the degree of sensitivity to false alarm of three conventional — They cannot be installed on damp or uneven floors.
types of movement detectors. A dual technology sensor — The most basic units are open circuit in design and not
incorporates infra-red and microwave sensors or infra-red
fail-safe.
and ultrasonic sensors, one type compensating for the
environmental problems associated with the other. Such
devices are used in areas which are hazardous in terms of false
4.11 Underground pressure detectors
alarms. They operate on the following principle: if one type
of sensor triggers an alarm it may be false, but if both units
activate an alarm then they have detected an intruder. Thus, These
consist of two hydraulic fluid tubes (see Figure 4.6)
both types of sensor can be set at higher degrees of sensitivity lying parallel just beneath the soil surface, about one metre
without increasing the risk of false alarm. apart. The pressure is at equilibrium in the two tubes until
weight is applied on the ground above. The change in
pressure is monitored to activate the alarm. High sensitivity
4.9.7 Capacitive detectors systems are available which display the order of weight
compression and indicate possible causes, distinguishing
between a person and a vehicle, for example.
4.9.7.1 Volumetric defectors
Capacitance is an electrical property of insulators. Air acts as 4.12 Fibre optic signaling
an insulator and any change or movement in an enclosed
space will result in a change in the capacitance of the air.
Capacitive volumetric detectors sense this change and This form of protection is difficult to detect as no external
activate an alarm. They have been superseded by advances in radio frequency or electromagnetic emissions are generated.
other types of detectors which offer a greater degree of Infra-red light signals are passed through a continuous fibre
sensitivity and accuracy. optic cable. A fibre optic cable is non-ferrous and small in
diameter. If the cable is severed or damaged the control
4.9.7.2 Proximity detectors elements sense a change in the signal and activate the alarm.
One form of cable available consists of two concentric cores.
The detector is connected to the object by a single wire. The Data are transmitted along the centre and the outer core is
object must either be metallic or have a metal foii attached to monitored to detect any interference to the fibre.
it. Any movement of the object or of people in its proximity
will change the ambient capacitance and activate an alarm. The cable may be implanted within structures and safely
Electronic processing is essential to differentiate between installed in hostile environments. Suggested locations include
natural environmental changes and an alarm situation. culverts (see Figure 4.7(a)), storm drains, skylights, underground
ducts, service passages or sewers. Such cables can be used
safely in safety deposit vaults and security doors; marine
4.10 Pressure mats installations subject to motion, salt and extremes of
temperature; high radiation and nuclear environments; and
areas of high electromagnetic activity.
These are hidden under carpets in areas where an intruder is
likely to tread.Z3S4737 ]) requires an open circuit mat to be
fitted with cable loops to introduce a closed circuit for added s.13 Wire-free intruder alarm systems
security.
‘“.’i::’~m-?fi
, .e. — a
‘<
.,.
t,
\ /-
.+–
\-d “ ““=’;; ’p:.-
—.—
. “-”.--/’,: :%> /
.e
\’
-
/ .-xi v””””
Yo-hicomp:d.
0 d
o,
-.
u
,
e
l --
,’-----
*.’-’.,. . .
-’.
‘
‘be=
/
-- . ..-
valve
Figure 4.6 Undergroundpres-
suredetector
29
CIBSE APPLICATIONS MANUAL
(cl)
Tubes containing —
fibre optic cable
- Frame
I I
\\ E’: Self-actuating devices should be considered. When the
power link t; the control unit is cut a relav in the device
activates a warning sound which is powered by an internal
battery. An audible alarm should generally be placed at a
height of 3 m.
Advantages:
condition at intervals of no more than 1 h 12 min. They
should sound an alarm if no signal is received within 3 h — Audible alarms frighten away the casual thief.
36 min. A Class 4 system sends signals at intervals of up to 8 h — Neighbors can respond to the warning.
24 min and if no signal is received in this time then an alarm is
sounded. — The sight of such a device can deter a thief,
31
CIBSE APPLICATIONS MANUAL
Van-ed coded signals — A multiplex line from the satellite to the central station
can be duplicated or backed up on the public switched
These systems operate on a number of different coded signals telephone network.
so that a thief cannot be sure which code a particular system
uses. Because it is not a standard code, the thief would find 4.15.3.4 Shared iine signaling
difficulty in obtaining equipment to duplicate it.
A technique has been developed where multiple signals from
Special facilities of both types of system can include: an alarm system can be transmitted continuously and
— transmitter units specially produced to make identification simultaneously on a computer data network or private speech
of a transmitted signal difficult even for the installer line, with no interference to the quality of host data or speech.
— receiver units made with tuners so that they can be tuned-
The alarm data is extracted from the network and routed to a
central station or satellite for onward transmission to the
into any transmitter, but even then the signal received is central station. Sophkticated encryption techniques are used
not identilled. to ensure very high security.
— Such a system results in reduced telephone line charges Special facilities can include:
including low exclusive line costs as the majority of — a 30 km radius catchment area for the central station
customers are near a telephone exchange.
— a high security varied coded signal
— This is economically viable for a few connections,
— detection of a substitution of the correct signal and an
— There is no vulnerable equipment between the customer alarm
and the central station.
— a system to accommodate different warnings given by
Disadvantage: each customer transmitter, such as: system open;
— No standby line is available from the telephone exchange intruder alarm, personal attack alarm; fire alarm; machine
to the central station. process alarm
— multiple connection of transmitters to one telephone line.
4.15.3,3 Satellite
32
SECURITY ENGINEERING
To further enhance the security measures individual encoded 4.16.3 Centrally con~rolled systems
cards can be employed which are fed into or through readers
adjacent to strategic entries. Cards and tags are available These systems consist of unintelligent readers which are
which activate the door release when brought into the connected to a central computer system. The readers simply
proximity of the readers. This ‘hands free’ facility introduces read the card and send the information to the central
a signiikant increase in cost. computer, The central computer makes the decision and
commands the reader to allow or deny access accordingly.
The decision-making process in an access control reader
checks: Advantage:
(a) the card encoding and verifies current authorisation — This is a cost-effective solution where a large number of
individual cards are involved. These systems are able to
(4) that the card number is allowed to enter the access point cope with up to 20000 individual card holders.
(c) that the time for entry is valid
Disadvantages:
(d) that the day of the week is valid.
— In the event of a failure in either communication or the
The reader only grants access if all conditions are met.
central computer system the level of security is degraded
because the reader does not have access to the database.
The security of an access control system can be increased by
fitting a keypad reader. In this case to gain entry an — Access can take longer if the system is busy as a result of
individual has to posses a valid card and also has to know the having to refer decisions to the central computer.
personal identification number (PINIwhich is unique for each — Smaller systems are not cost-effective because of the need
card. A further sophistication can be introduced using an to purchase a central computer.
electronic keypad which alters the numeric display of entry
keys at random so that the location of the digits changes at
everyinstanceof request for access.Wkh3628 800 permutations 4.76.4 Accesscards
of display, distant unauthorised observers experience greater
difficulty in identification of the actual access code entered. 4.16.4.1 Passive
The accesscontrol market has developed along two main and A Wiegand card uses a thin wire matrix sandwiched between
fundamentally different paths, these being distributive two plastic outer surfaces. It offers better security with less
intelligents ystems and centrally controlled systems. chance of card duplication than other types of access cards.
In addition, Wiegand readers are not so susceptible to
electromagnetic interference.
33
/
CIBSE APPLICATIONS MANUAL
bring the card to the reader more than once before the system . the level of lighting provided: daytime or night-time,
receives a recognizable signal, The cards are three times shaded, natural or artificial
thicker than others and are less flexible. The minute battery — the viewing field required: fixed or adjustable, close or
has a life in excess of 10000 operations, and depending on distant, wide or narrow angle
battery output the card can be read 75 mm to 250 mm from
the proximity device, Special readers are available, at greater — the picture quality required: high or low resolution
cost, which can identify cards at a distance of 1 m. It is not — the environment in which the camera will be placed: clean
strictly necessary for the activator to be a card; it can also take or dirty, wet or dry, subject to vibration
the form of a key-ring fob. Hands-free security access
systems are only recommended for special situations. — the type of control required: manual or automatic
— the type of display required: constant, sequenced,
Care must be taken as any metal adjacent to the readers can
movement activated, split screen
weaken their signal strength. Therefore they should not be
mounted on metal partitioning. — the type of recording equipment required: real-time or
time~kpse, alarm activated:
4.16.5 Radio coded access Various camera technologies are available which become
more expensive with the requirements for operating in lower
A radio access control system is similar in operation to a light levels. Figure 4.8 shows the operational light levels
personal paging bleeper. If personnel approach an area that is applicable to each type of camera.
‘out of bounds’ a microwave or similar detector will sound an
alarm. Staff who are allowed admittance carry a pocket-sized
transmitter that inhibits the system. No action is required by
the user, the transmitter being permanently ‘on’. In addition 4.17.2 Cathode ray tube camera
to allowing access, the system can be used to release locks and
trigger automatic doors. This can be useful for areas where The purpose of the camera is to convert an optical picture
hands-free access for only specified personnel is required, into an electrical signal (1 V video) for transmission back to
the monitor. There are five basic cameras using either 2\3-
Recharging facilities are required in much the same way as inch or 1-inch camera pick up tubes. 1-inch tubes are used
pocket bleepers but as these units have a security function when high definition pictures are required. The effect may bc
care should be taken in positioning them to inhibit their use compared with the difference obtained by using larger
by authorised persomel. In addition it is normal to photographic negatives in film cameras.
incorporate an automatic alarm if personnel leave the
building without returning their units for recharging. 4.77.2.7 ‘Wdicon’ camera
11
Id
Unobscured
closing lens iris
sunlight
103
II overcast
day
Sunrise
+
Operating
Welt lit chart
theatre
Approximate
❑ “’’’”’’”””’
Sunset
Drawing office
range of ‘Newvicon’
camera, using
Approximate range auto iris lens
102 Offices, shops
of ‘Wdicon’ camera
Stairs, corridor
f
101
Iiiiiii
$j$
:; Twilight
..’
1
{0.41X]
“ Range of ‘tidicon’ and
‘Newviconi cameros
10-’ Moonlight extended by infrcs-red
+ lamps ‘
I
10-2
n
(5mlx)
I
SIT camera Approximate lower
(2mlx) }
1()-3 Clear night limits for intensified
[02mlx)
ISIT camera tube camera
[O08mlx) }
10-
10-5
I Overcast
night sky
tube lasts UDto 36 months or more and is verv resistant to cameras, because of high cost, are only used for specialist
‘burn in’. Tkis is classed as a low light camera._ applications.
35
CIBSE APPLICATIONS MANUAL
At present the resolution of these cameras does not equal that clearest in the centre portion of the monitor screen due to
of a good tube camera but this failing is rapidly being tube geometry. A high quality camera or monitor is one
overcome. The cameras are also relatively expensive, but as which resolves 800-1000 lines.
the cost of producing these sensors is reduced the cameras
should become competitive. Colour versions are already
producing very high quality pictures. 4.17.6 Switching systems
This type of camera can also read light in the infra-red Four monitors are the maximum that can be sensibly scanned
spectrum. Indeed, infra-red falters are often necessary to by one person. For greater accuracy of viewing this is
maintain good pictures in daylight. normally reduced to only one or two monitors. In order to
display multiple cameras on one or two monitors, some form
of switching system is required.
4.1 7.4 Lenses
4.17.6.1 Video switchers
The lens is the most important part of any camera. The field
of view of any lens is governed by its focal length and can These are the simplest type and are known as passive
range from around 5 mm (wide angle) to 150 mm or greater switchers. They consist of a set of interlocked switches which
(telephoto). The light-gathering capability of the lens is given allow the manual selection of pictures from a number
by its j-number (the ‘speed’ of the lens). The\-number of a cameras for viewing on one monitor. The switchers do not
lens is its focal length divided by the maximum aperture of its normally cater for more than 12 cameras. Looping versions
iris. The lower thej-number, the ‘faster’ the lens and the less are available which allow the camera signals to be passed on
illumination required to obtain full pictures. In the case of to further switchers in other positions.
video cameras, the~-number is usually between 0.98 and 2.0.
4.77.6.2 Video sequential switchers
Lenses are divided into two categories: fixed and zoom
lenses. These units, usually referred to as sequencers, automatically
switch the camera signals in sequence to the monitor.
Switches for each camera signal allow manual selection of any
4.17.4.1 Fixed lenses
picture to override the sequence if it is necessary to hold a
picture for any reason. Similarly an alternative position of the
These are the simplest lenses and have focus and iris switch allows a picture to be deleted from the sequence. The
adjustment only. Available for 2/3-inch or 1-inch format time a picture is on the screen during the sequence ranges
cameras, the lenses are always referred to by their focal length from 1-60s.
(50 mm, for example). Lenses for solid state cameras are
available in l/2-inch and 2\3-inch format. Sequencers are of four types:
4.17.4.2 Zoom lenses — Homing sequencer: This sequencer uses one monitor
only as a sequencing or hold monitor.
These lenses have variable focal lengths. The lenses are — Looping homing sequencer: As above, but this allows the
classified by minimum and maximum focal length (such as
camera signals to be passed on to further sequencers or
16-160 mm). Zoom lenses may be manual or motorised, but switchers.
for security use only motorised lenses are used.
— Bridging sequencer: This type of sequencer allows for
For use with ‘Newvicon’ or ‘Ultricon’ cameras, both fixed two monitors: one continuously displaying the picture
and zoom lenses are fitted with automatic iris units. These sequence, and the other only displaying a selected
units maintain a constant light level on the picture tube picture.
irrespective of ambient light levels. The amplitude of the
— Looping bridging sequencer: As bridging sequencer but
camera video signal is used to open or close the iris as it falls
allows the camera signals to pass on to other sequencers or
or rises below or above 1 V peak-to-peak.
switchers.
Monitors are TV sets, without the tuning facilities, which All the above sequencers can be obtained with alarm inputs
provide higher resolution, A colour monitor does not need for each camera channel. The alarm input can be from any
resolution as high as a black and white monitor, as the type of detector providing either a closing (or opening)
addition of colour greatly increases the amount of information contact. For instance, a fence detector can trigger the picture
on the screen. Indeed the method used at present to create from a camera covering the fence to appear on the monitor.
colour pictures on a monitor or TV set limit the resolution The alarm input overrides the sequencing on the monitor and
possible. holds the relevant picture until the alarm is cancelled.
allows a larger area to be covered by one camera but may input and four video outputs, each output providing 1 V
require an operator to move the camera. A continuous peak-to-peak full video.
automatic panning action can be used to give an overall view
of an axea if desired. Indoor and outdoor versions of pan and
tilt units are available. For outdoor use the camera and lens 4.17.8.3 Camera identification generator
are contained in a weatherproof housing which can be fitted
with wash and wipe units to keep the housing window clean. This unit inserts a camera number onto the monitor picture
used particularly where camera pictures around a site are
In order to control fully functional cameras, signals or very similar.
voltages must be relayed from the monitor area. These fall
generally into two types: hard wired and telemetry control. 4.17.8.4 Time and date generator
4.17.7.1 Hard wired control A time and date generator inserts the time and date onto the
monitor picture.
This refers to a system whereby voltages to drive the pan and
tilt of the lens, for instance, are transmitted along a multi- 4.17.8.5 Screen splitter
core cable from a control unit at the monitor end. Although
the cheapest system of control, it is limited to a maximum of This allows multiple imaging (of pictures from 2, 4 or 16
100 m of cable due to voltage drop along the cable. Usually, a cameras) on a single screen. It can be particularly helpful
system of this type is installed with only one or two cameras. when combined with a second monitor which is programmed
to switch sequentially from one camera to another. An
4.77.7.2 Telemetry control operator can immediately refer to the split screen for a view of
an incident from another angle.
With this type of control, signals to operate the fully
functional cameras are coded in a manner which allows them 4.17.8.6 ~me lapse video recorder
to be transmitted over greater distances than possible with a
hard wired system. In any telemetry system a receiver at the Whilst standard video recorders can be used to record video
camera decodes the control signals and supplies the power to pictures, these units are limited by the length of the tape
move, pan and tilt the lens, for example. Telemetry systems cassette (up to four hours). To overcome this problem time-
can use the coaxial cable carrying the camera video signal or Iapse recorders have been introduced. These machines allow
can be relayed along a twisted pair cable or similar. One up to 480 hours of recording on a standard two-hour tape.
method uses digital pulses, from a transmitter control unit, They are usually used in conjunction with an alarmed
inserted in the blanking period of the video signal and sequencer, in such a way that on the receipt of an alarm the
transmitted in the opposite direction to the video signal. machine reverts to two-hour playing time (real-time) for a set
Other telemetry systems convert the control signals into period, and after recording the cause of the alarm reverts to
analogue FM signals (usually around 12 MHz) which again time-lapse speed.
can be sent along the video coaxial cable or a separate cable.
There are several variations of both systems but the results 4. 17.8.7 Movement detectors
are all similar.
These units allow the cameras to instigate an alarm. Although
The advantage of all these systems is that greater distances of many types, they all work by a change of contrast over a
can be covered for control. Basically, the distance which can selected area of the camera picture. A change of contrast
be covered depends on the voltage losses of the coaxial cable. causes an alarm to be raised and this can be used to trigger a
This results in around 600 m using a low loss cable. To time-lapse video tape recorder (VTR) or similar recorder. The
increase this distance various forms of signal amplification units range from single channel, simple units basically for
can be used, up to 2000 m being possible. indoor use, to 16-channel sophisticated outdoor units for
intruder detection.
One transmitter can control any number of cameras but
beyond approximately twenty cameras more sophisticated 4.77.8.8 Wdeo printers
microprocessor-based units are used.
These are relatively new devices which produce a photographic
type print of a video picture as required. The picture quality
is similar to a newspaper photograph.
4.1 7.8 Additional video equipment
In all video systems one very important point must be
There are many units which can be incorporated into camera observed. The impedance of the cable run from the camera to
systems to extend, add information, or simplify cabling. A the last unit in the chain must be 75 fl. Additionally, the
list of the more common items is given below. system must have a video input and a video output to permit
the connection of a printer.
4.17.8.1 Hdeo amplifier
4.17.8.9 Multiplexer
A video atnplifler is inserted into a camera line to allow cable
runs of longer than 600 m between camera and monitor. Multiplexer permit multi-channel recording on a single
video machine. When recording, each channel is encoded to
4.17.8.2 Distribution amplifier enable the viewer to identify each camera during play-back.
Sequential switching can be incorporated into the system as
This unit allows a camera video signal to be directed to well as split screen generation to allow simultaneous viewing
several different points. The units usually have one video of the pictures from all cameras recording the incident.
37
CIBSE APPLICATIONS MANUAL
4.17.9 Slow scan peak condition. In the event that the UPSitself fails, the static
bypass switch will connect the load without break to the
Slow scan has become a general term to cover systems for alternative bypass power source, usually a separate service
transmitting video pictures over telephone networks. Ml from the mains input to the UPS. For areas of high security,
systems of this type allow an unattended surveillance specifkations typically demand four-hour standby.
capability of any site merely by using a telephone.
It is normal to provide a UPS for all the central equipment
A transmitter at the camera site captures and stores frames of with the field hardware being supported either from the
video for transmission over the telephone network or private central urs or by the fitting of float chargers. Float chargers
wire. The transmission time is approximately 8 s for a low consist of stepdown mains, transformer, full wave rectifier
definition picture or 32s for a high definition picture. By use and battery to provide a constant supply of 12 V DC.
of a digital dialler connected to the ordinary telephone line, a
call to the transmitter opens a contact, which after a ‘hand-
shake’, transmits the necessary data to the receiver to 4.19 Alarm system control panels
produce pictures on a monitor. The pictures can be in
sequence or in quad form with four simultaneous displays in Control panels must meet the requirements of BS 4737’).
a split screen. It is also possible to control the cameras from Manufacturers offer their own variety of operational arran-
the receiver. However, movement can only be viewed in steps gements and facilities.
due to the time required to produce the picture. Movement
detection can also be added to each camera whereby the Panels should fulfil the following criteria:
transmitter can raise an alarm and automatically contact the
receiver. The receiver can be installed in a central station or at — They should be carefully commissioned.
the customer’s security headquarters. — They should be compatible with the components and
wiring used throughout the system.
4.18 Uninterruptible power supplies — They should be user-friendly, but also difficult for m
intruder to overcome.
It is essential that security systems are operational at all — They should be installed professionally.
times, therefore the security system design must cater for a — They should be maintained to the manufacturer’s
loss in mains power. Additionally most modern security
specification.
systems make use of computers and microprocessors which
are susceptible to power interruptions of a few milliseconds,
The panel should be located in a protected area adjacent to
and to corruptions of the supply voltage, frequency and
the front main entrance. To discourage any unauthorised
quality. An uninterruptible power supply (UPS)overcomes
activity at the control panel it should be in full view of
these problems by providing a clean, constant source of AC
passers-by, but in such a way that the visual display remains
power. A static, on-line UPS consists of four basic modules:
hidden from general view. Permanent night lighting should
be provided to the entrance foyer with key switch control in a
— phase controlled rectifier
protected location.
— set of batteries
Surface cabling can disclose information of connected
— DC to ACinVertOr
circuits and be open to attack. Therefore distribution cabling
— bypass or transfer switch. should wherever possible be installed flush or hidden from
view in the vicinity of the control panel and at situations
The phase controlled rectifier draws power from the AC where multiple runs occur.
mains, keeping the battery bank charged and holding the
batteries at float voltage level. A falter between the rectifier Panels must be constructed to resist attack. They should be
and the batteries reduces ripple to maximise battery life. The rigidly f~ed by screws and able to sound an alarm if
battery will invariably be of the lead-acid, sealed, low- tampered with or removed from their wall or desk mounting,
maintenance type. The invertor converts the DC power into
AC, controlling voltage, frequency, harmonic distortion and Main electrical services should be installed in such a manner
power rating. This is normally achieved by pulse width so as to prevent unauthorised or accidental isolation. The
modulation (PWM).The regulated ACoutput is fed directly to service should be dedicated to the panel and not form part of
the power input terminals of the protected plant. any other circuit or sub-circuit.
Should the mains power fail, the invertor draws DC power Battery back-up should be provided to activate an alarm and
from the battery and the load will operate without power the system should the mains fail. Dual components
interruption until the battery discharges to a level defined by and circuitry should be incorporated wherever possible to
the battery characteristics and efficient operating parameters safeguard the integrity of operation. Tried and tested
of the protected load. This time period must be carefully modules can offer higher assured integrity and reduce
specified, together with the output load, as the control will maintenance call-out.
automatically switch the UPS into bypass when the battery
reaches the critical discharge level, even though the supply The operational facilities for alarm control panels can
has not been restored. On mains restoration the electrical include:
supply to the UPS must meet both the connected load and
— a timer to isolate alarm sounders after a protracted period
battery recharge current. During recharge the UPSsupport
time will be less than specified, and after a prolonged — a timed memory log of panel activity with hard copy
emergency can take 48 to 60 hours for the battery to reach print-out at request
38
SECURITY ENGINEERING
— an extended memory store, desirable for certain situations — system and panel testing facilities
— an automatic time-based mtivatiotiisolation, programmable — a coded or real language alpha numeric display of panel
to take account of weekends, holidays and variable status, zone and detector in alarm, setting procedures and
working patterns maintenance information
— facilities to incorporate a personal attack circuit, to enable — a keypad interface to permit activation, isolation and
guards or police to respond to a personal alarm carried by control functions
or positioned near members of staff
— on intelligent systems, flexibility of zone configuration
— audio and visual alarm circuits
for installed systems.
— a visual display unit (VDU) interface to provide a diagram
of detector locations and alarm states
— fault monitoring and reporting functions References for section 4
— a variable alarm threshold for fine tuning to reduce false
alarms
1 BS 4737: Irswu&r alarm systems (Milton Keynes: British Standards
— an adjustable time delay to permit the last personnel in Institution) (1977-88)
the building to exit through a controlled route
2 BS 6799:1986 Code of practice for wire-jree intruder alarm systems
— an individual zone control to permit a zone isolation in (Milton Keynes: British Standards Institution) (1986)
fault condition or selection of particular zones for
actuations with partial occupation 3 Control of Pollution Act 1974 (London: HMSO) (1974)
— the ability to communicate with other remote panels or 4 Noisefr.m audible inrru&r alarms Code of Practice (London HMSO)
control stations (1982)
39
CIBSE APPLICATIONS MANUAL
5.2.5 Heating, vontilatien and air conditioning An alarmconnection to reception and to telephone operators
status panel allows security personnel to advise engineering staff or take
action.
Remote alarms and status panels are positioned invariably
within the control room. Usually the security personnel
monitor and advise maintenance personnel. There is also a S.2. 14 Car park monitoring
requirement for a smoke ventilation control panel, to be
activated by a fire officer in the event of fwe, to enable This will require remote gate or barrier operators, and is a
extraction of smoke by switching selected plant, function associated with CCTVand card access.
40
SECURITY ENGINEERING
5.2.15 Persennel records 5.2.21 Keys
Security records and personal data on staff require filing Invariably, duplicates of keys, including master keys, should
space. be stored in the control room and a key issue record book
maintained.
In addition to building services, other urocess functions mav, These should be provided to enable security staff to be
require monitoring at-night. A separate alarm panel can also contacted out of working hours. A video entryphone may be
incorporate alarms conneeted to cold rooms, rest or medical advisable for full visual inspection of all persons requesting
rooms, computer-controlled environmental services or UPS entry.
status monitoring.
5.2.17 External lighting Increasingly, security personnel are being requested to take
responsibility for tasks associated with health and safety and
Although usually operated by time switch or photocell therefore they may require space to store relevant material
arrangements, override facilities may be required in the and fust aid equipment.
control room to illuminate areas at night in cases of out-of-
hours delivery or incident.
5.2.24Time clecirs
5.3.4 5ervices The integration of alarm systems with a common ‘head end’
permits a single screen, printer and un~led graphics package
The-lighting in a control room should not cause veiling in a neat, condensed central control station. Even with CCTV
reflections on TV monitors or control panels. Luminaires h is possible to have an ‘alarm screen’ mounted in a central
should contain emergency power packs to ensure illumination position with routine permanent VDUS on either side. The
during periods of mains failure. Separate heating and alarm screen comes into play on an alarm signal, and displays
ventilation will be necessary as the main heating, ventilation, a ‘need to know’ format of information particular to that
and air-conditioning (HVAC)system will probably be off alarm signal. In addition, the image from the CCTV camera
during the night and weekends. It is recommended that very nearest to the incident can be automatically displayed on the
good ventilation is provided to prevent a drowsy atmosphere. screen and panned towards the incident location.
Some form of cooling may be required. Toilets should be
nearby, preferably associated with a changing room and The size of the screen has a direct relationship with the ability
shower. Cooking facilities should be provided as security to discern information presented. Investigations in dealer
persomel are on duty for long periods of time. A small rooms showed that the change from 9-inch to 12-inch VDUS
refrigerator, microwave oven and sink may be all that is had a significant consequence in reducing error rates in
required. It is essential that security personnel do not have to reading the data on screen. Careful planning ensures an
leave the building or secure area in order to obtain meals. efficient relationship between operator and computer.
5.3.7 Visual display units Multiplexer can be employed to transmit data from the
central monitor to outstations which can initiate a programmed
Care must be taken in the design of the control room and response to the alarm condition across all systems. The most
security system to take account of the steady growth of common form of central control is digital format; however,
electronic interface and presentation of information on visual systems using analogue signaling are available.
display unit (VDU) screens. The combination of the lighting
and desk or other internal surfaces should not produce Effective interaction means a simple, ‘user-friendly’ control
reflections on the screen which cause eye discomfort and risk centre. Touch-screen graphics are being introduced to aid
of misunderstanding of the information displayed, See interaction (the operator drives the system by touching
section 3.5 for further @idance on lighting. screen prompts). Detailed operation choices are displayed in
event of any changes of state or manual override. The
Recent research has shown that personnel can only view VDU standards applicable to each individual system must be met
screens for an average of 10 min before losing concentration. on other systems at the interface and control.
The computer program must present alarms that will initiate
an immediate response. Multiple screens are now commonplace The benefits of bringing together all systems are control
and yet the degree to which the brain can absorb simultaneous, room integration, co-ordinated maintenance, central station
incoming information is limited. monitoring and better ergonomics.
42
SECURITY ENGINEERING
5.4 External considerations point and a proportion of the high security network costs,
thus providing effective central station supervision at a more
viable cost.
5.4.1 Fence wiring
control and supervision of delivery and collection services To prevent breaks in communication, provide duplicated,
protected routes for telephone cables, private circuits and
— maintenance of liis with the police other monitoring cables. Incoming cables should emanate
— maintenance of links with the fire brigade from two dfierent telephone exchanges and enter the
building from opposing directions. Breaks in supply usually
— control and storage of keys
occur as a result of local road or site excavations.
— other monitoring, checking, and supervisory duties as
appropriate.
References for section 5
Charges relate to the functions performed, plus a telephone
connection and rental charge based on the grade of circuit
and distance travelled by the signal. 1 BS 5979:1987 Codeoj practicefor rsmote csrures for intruder alarm
sysrems (Milton Keynes British Standsrds Institution) (1987)
A nemtork of secondary, unmanned (satellite) collector
stations link remote subscribers to the central station. The 2 BS 5750: Quality gwsenss(Miiton Keynw. British Sumdsrds Institution)
subscriber is charged for the lime cost to the local collection (1987-90)
43
CIBSE APPLICATIONS MANUAL
6.1.1 General
6*I.3 Merchandise tagging
Losses can occur due to shoplifting, theft by staff, theft or
loss in transit, accidental damage, or vandalism. A well Most tagging systems use magnets which are detected by
phmnedlayout, good security systems and security personnel simple coil circuits mounted adjacent to the exit doors. If the
minimise such losses. Staff should be properly trained in how shopper is in possession of a stock item that has not had rhc
to identify potential shoplifters and be able to take necessary tag or detection trigger removed or demagnetised an alarm
action. will sound. The magnets are usually encapsulated in plastic
and disguised as shop labels and are removed at the checkout
The designer should plan the layout and lighting carefully. desk. The magnetic tags can be pre-sown into the lining to
Observation mirrors integrated with shelves and display combat unauthorised removal. High value items would
units can allow a clear field of view over all parts of the sales normally be fitted with a detection trigger that requires
area. removal by a special tool. Items such as radios or domestic
appliances can have the detection trigger fitted internally, the
There are many security devices and systems specifically shop assistant removing the trigger at the same time as fitting
developed for retail situations. Security personnel are batteries or testing. Boxed items can be protected by self-
essential to monitor goods and staff entrances, cash checkout adhesive name tags that incorporate a very flat trigger
points and sales areas. Uniformed and plain clothes officers magnet. Instead of being removed, these can be demagnetised
are required, and they must all understand their powers of at the checkout by a demagnetising coil fitted below the
arrest. counter top.
Different security measures are necessary for trading Similarly, library books can be fully protected using the same
periods, out-of-hours working and when the shop is system. The book, on being checked out, is automatically
completely unoccupied. During unoccupied hours the passed over a demagnetising coil at the same time as date
security system should offer perimeter protection plus stamping occurs. The customer is not aware of the security
particular protection for items of high value. Regarding out- system being in use. When returned, the book trigger is
of-hours working when staff require early or late entry to the remagnetised before being returned to the shelves.
premises, their access should be restricted to the areas
necessary for their allocated task. Locate toilet and changing Metallic items such as hardware goods can be protected by
room facilities within these defined areas and maintain the direct magnetizing without using a tag system. Again,
security measures to barred sections. During opening hours, demagnetizing occurs at the checkout position and can be
the security measures concentrate on the security of the hidden below the counter top.
displayed wares.
discrepancy between the price keyed in and the actual price — Provide the structure with physical protection.
can be easily spotted.
— Position the most sensitive areas in the most inaccessible
parts of the building.
When the electricity supply fails, shops become prime targets
for theft, therefore an emergency power back-up system, or
6.2.1.2 Industrial espionage
UPS, is essential to power the security system and maintain
the integrity of the checkout computer and till.
Almost certainly such a threat will come from within the
organisation. External means of accessing computers, through
wide and local area networking, should prevent a well
6.1.5 Fu* measu~
informed outsider from stealing or altering stored data. For
further guidance see section 6.5 on industrial espionage.
The following measures serve to reduce losses in sales areas:
— Plan display arrangements to maximise the visual fields of 6.2.7.3 Fiscal gain
staff.
— Protect items of high value by providing locked cabinets Any system should prevent an employee or an outsider from
unofficially transferring funds to their own accounts.
or continuous staff presence.
Introducing a parallel cross-checking facility enhances the
— Place all items of high value together and away from exits. integrity of the operating and records system.
— Correctly price all items with coded tags.
6.2.1.4 Unintentional or malicious errors
— Ooerate
. strict till mocedures
. for removing or de-
activating tags, enclosing items in bags an~ issuing A careless employee can make a costly mistake, or an
itemised receipts. aggrieved employee can take deliberate, damaging action, by
wiDinz out the vear’s accounts, for instance. Regular,
The following measures serve to improve stock control: su&r~lsed back-up copies are essential, and should be ~laced
in a fire-proof safe with the master copy, to which access is
— Verify the quantity, condition and identity of all restricted. Off-site storage, supervised by a specialist security
deliveries. operator, offers an alternative.
— Operate strict stock control and provide frequent,
unannounced spot checks. 6.2.1.5 Physical damage
— Ensure the accountability of individual members of staff
By monitoring and restricting the numbers and identities of
for the receipt, storage, despatch and delivery of specified persons allowed access, the probability of physical damage is
consignments. reduced. Building services tradesmen undertaking works in
— Store goods of high value in a secure room and monitor computer rooms should be strictiy supervised and areas in
and record all movements in and out. which they work clearly defined.
— Introduce discrete security systems to selected areas.
6.2.1.6 Computer viruses
Data is best protected, however, by encryption techniques. Consider at the design stage the policy for manning the
Systems are available which offer automatic fde encryption, building. If patrolling security staff are envisaged during
multi-tier management hierarchy, internal test functions, closed periods then facilities need to be provided to monitor a
audit trial recording, and limitation of access to pre-assigned patrol’s progress, avoid the activation of false alarms and to
hours and dates. This kind of protection is available in the permit speedy reporting of security breaches.
form of a softnvare package, or a plug-in printed circuit or
security card.
6.3.2 ExMbh ~
6.2.4 Room entry control Significant exhibits may be protected by placing them within
glass-fronted showcases with, if applicable, bandit glass.
If the computer suite is contained within a building that is in Access to the case may be permanently contacted and the
itself protected by central access control and security glass protected by a sonic or seismic device to detect
persomel, then they can operate the systems described breakage.
below.
Where the viewing of exhibits is required without any
6.2.4.1 Curd access interposing glass, a physical barrier (for example, rope) can
be used to prevent the public touching the exhibit, and an
All computer personnel and visitors are issued with coded active infra-red or photo-electric sensor added to detect a
access cards. These cards are inserted into the control point breach of the barrier. Further protection may be given by
of the access door which unlocks the door. Remote recording using proximity or pressure pad techniques so that any
of time of entry and exit and the card holder’s name can be movement to interfere with the exhibit results in an alarm
used, This system does not stop unauthorised personnel condition.
entering by ‘invitation’ of a card holder. Unauthorised entry
by the use of lost or stolen cards is controlled by regular
updating and changing of codes or by having to enter a 6.3.3 Piciuros
personal code into a numeric keypad at the point of entry.
Refer to section 4.16 for greater detail on access control. Pictures may be iIlegally removed, cut from their frames or
defaced. Several patent solutions are availaLIe in the form of
6.2.4.2 Radio coded entry concealed microswitches, proximity device., reed relays with
magnets adhered to the rear of pictures, or seismic detectors
All authorised personnel would carry a battery operated to signal interference with the frame or canvas.
transmitter that looks similar to a pocket paging unit. These
transmitters can be used to open or unlock doors to
authorised personnel and sound an alarm if any unauthorised 6.3.4 Flexibility
personnel approach.
The seeurity systems in modem museums and art galleries
should permit regular changes to the exhibition layout. A
6.2.4.3 CC7V cabling system to include floor, ceiling and wall outlet
positions permits the location of high risk items as required
This is of particular use to observe staff at work within the but with minor constraints upon positions for alarms. In art
room, alone, at night, or at weekends, for monitoring their galleries a system of flush outlets at eye level will permit
safety, as well as for security reasons. Refer to section 4.17 for variable connections to be made. Where pictures are
details on CCTV systems. suspended from a rail the cables maybe concealed within the
rail and cords. Also, floor outlet boxes for both power and
6.2.4.4 Metal detectors security cables, with adequate segregation, may solve the
problem of retaining flexibility.
These are used to ensure that no magnetised material,
intentionally or otherwise, is brought into the computer
room. 6.3.5 Zoning
A museum or art gallery normally contains rare and unique 6.3.6 Alarm procedures
exhibits of great monetary value, or of political significance,
reflecting their antiquity and irreplaceability. Examine the interrelationship between the alarm system, the
security warders, the exit routes and the position of the
Security systems within museums and art galleries should be protected risk. To be effective all staff should know precisely
divided into two groups: those which remain energised the action required of them upon aiarm conditions both
permanently, such as local protection for showcases or during occupied and unoccupied hours, A clear, logical
pictures; and those which need to be de-energised during display of alarm zones, meticulous attention to records and
opening hours to permit the public to gain admission. The lock security, and prompt action upon an alarm will help to
cabling to both circuits should be permanently monitored. keep the risk to a minimum.
46
SECURITY ENGINEERING
— technical process information
6.4 Ammunition and explos”mes
— quotations, offers, pricing formulae
When designing security systems for the storage of ammunition The importance of the information and consequences of loss
and explosives the basic principles of detection apply. In should dictate the provision security, in the form of locked
addition ensure the provision of adequate fire protection and cabinets, fire-proof safes or strongrooms, for instance. A
explosion resistance. good system of housekeeping requires the shredding of
unwanted documents before disposal and the typing of
These special installation methods directly relate to the classified information onto coioured, non-photocopiable
sensitivity of the stored items to ignition. Where relatively paper.
inert items are stored the regulations are less stringent, but
where there is the possibility of explosive dust being present
6.5.2 Cemputer espionage
tlte criteria will be correspondingly more exacting.
a radio wave detector with LED display is employed. 6.6 Drugs storage
Telephone devices may be ac~ivated only after lifting the
handset, so it is necessary to trigger calls when undertaking
regular building scans. Equipment is available for connection Any place where drugs are used or stored is a prime target for
to the telephone exchange which monitors each line and attack. Stores containing large quantities of hallucinatory
detects any significant power change. Analysers are also drugs attract a particularly high risk. Pharmaceutical
available to identify the tapping of incoming national companies have their own standards and security advisers
network lines at the main exchange. who specify the measures to be taken.
security control room staff to any movement. Overall and warning devices are, they need to be backed up by
security is therefore improved because security operators no physical barriers, The reason for this is that intruders may
longer have to maintain constant and tedious vigilance of the not fear detection, perhaps because they are sufficiently
TV monitors. strong in numbers, possess equipment to overcome resistance,
or because they can achieve their objectives and escape before
Personnel entering, leaving or moving within the site will the defenders have had time to react. Intruders may even
need to be monitored and controlled. It maybe necessary to wish to be caught inside the sensitive area for the purposes of
provide a full range of access control equipment from high publicity.
security mechanical locks to advanced electronic systems
using identity cards. The latest high security systems, termed The following zones are considered individually: distant
biometric, use human body characteristics, such as finger protection; immediate perimeter; within the perimeter; inner
print, voice or eye retina identification techniques, to ensure protection. Note that a military threat is not the sole danger
the highest level of security. As the systems become more and so other factors are discussed.
developed and techniques refined, virtwdly foolproof access
control will evolve.
6.9.2 Distant pretectien
Forming an integral part of any system are various elements
of physical protection. These range from bullet resistant
Very early warning of approaching problems on land, sea or
security screens and doors to protect personnel in offices
in the air can be provided by the use of long range
where cash is handled, to highly sophisticated blast resistant
surveillance systems. Closer to the perimeter a highly
doors for use in nuclear power stations.
sensitive ground movement radar can provide coastal and
area surveillance, pinpointing the direction from which the
Large installations, particularly those engaged in chemical
threat is approaching.
and petrochemical processing, face a serious threat from fire.
The duty of the security staff may also include the reporting
However, if the enemy can remain hidden by hilly ground or
of and response to fire situations.
thick vegetation, the conditions will be unsuitable for
detection by radar. The answer is a series of remote ground
sensors linked by radio transmitters to a monitor unit that
6.8.4 Marine instaiiatiens
receives, decodes and presents the information on an LED
display, Such systems can be effectively deployed in a wide
Installations bordering on rivers and estuaries present extra
range of terrains and can detect the difference between a tank
problems which have to be taken into account when
and a lorry, between one and two tanks, and between motor
designing security systems,
vehicles and persomel on foot. They therefore give [he
control centre additional, vital information about the scale of
Systems should be robust and suitable for operating in the
the approaching threat.
ambient conditions. The movement of piers and jetties with
tidal flow must be considered together with access below the
waterline. Isolation of installations into sections can minimise
the detrimental effects of attack. 6.9.3 Perimeter pretectien
6.9.5 Inner protection The alarm devices available cover an enormously wide range
of possibilities so that all environments can be successfully
The prime target within the military establishment requires monitored. Breaking glass or vibration detectors, window
the ultimate levels of physical protection and the most and door contact breaker switches, infra-red, ultrasonic or
sophisticated types of access control. Access control is microwave movement detectors, and personal attack buttons
available in many forms. These range from high security can all be supplied and tailored to create a network of alarms
mechanical locks to advanced. electronic systems using to meet all identifiable risks.
identity cards or human body characteristics, such as
fingerprint reference, with others using voice recognition The alarm contacts for safes are generally seismic devices and
and retina identification. should be arranged with the safe manufacturer’s consent so
as to ensure that the units do not degrade the integrity of the
safes. Detectors are available with a swivel plate which covers
6.9.6 Oiher factors the keyhole, thus enabling them to detect an attempt to insert
skeleton keys or explosives.
The telephone, data and intercommunications networks
must take account of the sensitive nature of information If the safe weighs less than a ton it is best fixed by an extra
transfer. Take measures to prevent electronic eavesdropping strong method to the floor or structure. Before purchase
from within and outside the premises. Direct access to the always ensure that the safe proposed is approved by the
decoded signals by personnel needs especially rigorous insurers for the specific risk involved. Various categories of
control. When planning the security system take steps to safe are available to protect against fire and against the
prevent the unauthorised removal or copying of documents, different types of forced entry. Members of the Association
the removal of equipment, or unauthorised photography. of Burglary Insurance Surveyors (ABIS) can advise on the
recommended maximum value of items to be protected by
each type of safe.
6.10 Financtal organisations CCTV provides yet another means by which electronic
security can thwart the criminal, and linking CCTV to slow-
6.10.1 6eneral scan transmitters or video movement detectors enhances the
system still further.
The financial community is a prime target for the professional
criminal, who remains undaunted by the obvious security A prominent feature of financial organisations and retailing is
measures that would deter the opportunistic housebreaker. the growth of plastic card-based transactions. These present
Such a criminal expects to find obstacles in his way but is ever increasing scope for fraudulent use of stolen cards and
confident that careful scrutiny will reveal occasional weak robbery from cash dispensers. Card authorisation terminals
spots often enough to secure a lucrative living. use the public telephone network to contact the card issuer’s
central computer and provide a direct check on validity and
Potential victims obviously do their utmost to prevent credit capacity. They are now in service with major retailers,
security lapses but such is the speed at which their systems, making a significant contribution to the reduction of credit
services and premises are being adapted that it is all too card fraud.
possible for loopholes to become exposed. Types of crime
include safecracking, armed robbery, petty theft and The ATMS, relying as they do on the secure containment of
computer fraud. Security measures to protect against these cash and the integrity of their data transmission networks,
are considered at branch, head office and international level. create a number of security threats, The provision of effective
barriers will protect against physical penetration, alarm
systems to warn of unauthorised access to the ATMS or access
6.1 O.ZThe local branch under duress, protection against vandalism and security for
the data networks on which the ATMS depend.
At the local branch level the counter staff, the strongroom
and the automatic teller machines IATM5Jare at greatest risk.
The methods of attack usually involve considerable physical
force. Such has been the success in developing VirNtiy 6.10.3 Head office
impregnable safes and strongrooms that the pattern of
criminal attack has centred on the points at which cash is on Nowhere are the demands on security more pressing than at
the move and subject to human handling. As a result, armed the regional or head office level of an organisation, partly
attacks on local branches, with staff being subjected to because of the higher value of transactions undertaken and
terrifying threats, have become all too common. partly because completely new risks arise. The head office
will be the source of highly confidential commercial
Bullet-resistant screens and security doors provide staff with information about the organisation’s own plans and those of
the assurance that, despite the extreme unpleasanmess of the its customers. Maintaining confidentiality will demand
experience, their personal safety need not be at risk. The carefully controlled personnel procedures and skillful incor-
51
CIBSE APPLICATIONS MANUAL
poration of locks, cabinets, safes and access control systems 6.11 SchooIs and colleges
to provide the finest back-up for those staff involved.
As audio-visual aids for education become more sophisticated
Card access systems provide an ideal means of controlling the and microcomputers more prevalent, schools and colleges
movement of people within the head office. Each employee’s become more attractive targets for theft. Another disturbing
card can be programmed to permit entry within specified trend is the crime of arson. Nearly a thousand schools were
time limits to particular areas or combinations of areas within attacked in 1989. Offenders were mostly male and aged
the premises. PIN keypads, higher security card technologies between 14 and 16. Fires started deliberately cause four times
(such as Wiegand cards) or fingerprint, signature, voice, and more damage than accidents as they are set in the most
retina identification provide the access system with optional vulnerable locations.
security enhancements to the highest levels. Effective control
of access is a fundamental component of modern security. Early warning of unauthorised out-of-hours entry is essential
The correct approach will provide the maximum freedom of to prevent such attacks. A survey of 15 schools in northern
movement for authorised personnel and the most effective England ‘2) showed that the total number of break-ins
barriers against unwanted visitors. See section 4.16 for more reduced from 119 to 13 following the installation of alarm
details. systems,
The greatest risks, however, relate to the computing centre Full protection for such large buildings can become
and its data networks. The development of data cmnrnunications prohibitively expensive so a more subtle approach is
within and between financial institutions has brought required. The locking away of all portable valuables in secure
dramatic improvements to operating efficiency and customer stores each evening and inventory checks must be an
convenience. The extension of transactional networks to enforced discipline.
corporate offices, retail outlets and even the private home is
already a technological reality and will undoubtedly be Passive infra-red detectors in all major thoroughfares and
accelerated by the increasingly fierce competitive pressures classrooms containing expensive equipment and alarm
within the financial sector. contacts in secure store areas should identify the presence of
intruders. Strategically placed alarm sounders and security
As the flow of funds through the expanding networks lighting, initiated by detectors, may deter any trespassers
increases, so too does the opportunity for crime. Information before they cause extensive damage.
leakage, fraud, theft and malicious disruption all become
greater risks with possibly devastating consequences. The Relay of the alarm to a central station to bring out a speedy
need for the highest standards of network security has never response is equally important. The intruders are usually local
been more pressing and can only increase as the systems chlIdren who may know about the effectiveness or otherwise
expand. Seek the advice of a specialist in data communications of the system. System designers and installers must be astute
when introducing control of network access, limitation on in the location and camouflage of detectors. Any damage to
access levels, user authentication and message privacy. The the system may have been done deliberately to allow later
exact nature of protection will vary in relation to the access and should therefore be quickly repaired.
individual circumstances, the network configuration and
user needs. For detailed guidance refer to Building Bulletin 6flj), which
details various preventative measures against vandalism,
With such a wide range of risks and so many possible theft and arson in schools. Building Bulletin 69(2),deals with
elements of security, financial organisations must have an the technical aspects of intruder alarm systems.
effective means of integrating the various threads and
ensuring an instant, co-ordmated response to alarms.
Sophisticated detection and signaling systems serve no 6.12 Churches
purpose if nobody reacts to the warnings they transmit.
Current estimates indicate a quarter of all churches suffer
from some form of theft or vandalism each year. Goods taken
include altar pieces, offertory boxes, and an increasing
amount of structural artifacts (e.g. stained glass windows,
carvings, doors, door handles and hinges etc.) for which
interior decorators will pay high prices.
6.1 0.41ntomational communicdons
In most situations a basic burglar alarm system will suffice,
Advances in the communication frameworks of the financial but also provide special protection for valuable items or
community have revolutionised its ability to conduct high works of art.
speed transactions of colossal value. This creates enormous
and ever-growing demands on security.
References for section 6
The security and integrity of electronic transactions have
become a major headache for international bankers as the full
1 Mzkse oj Drugs (Safety Custody) Regulations Schedule 2 1973(1)
significance of the consequences of a failure in the system
(London: HMSO) (1973)
becomes apparent, The size of the routine transactions, the
spread of the various international networks, and the shared 2 Cn”nzepreventions in schools — specificarim intmlla tiers and maintenance
access to them, amplify the severe problems already oj iktruder alarm systems Building Bulletin 69 (London: Department of
described in this Manual to an even higher level. The Education and Science/HMSO) ( 1989)
integrity and assured security of international links require 3 Cn”rneprevention in schools — pracrical guiohnce Building Bulletin 67
specialist applications beyond the scope of this document. (London: Department of Education and Scienee/HMSO) (1987)
52
SECURITY ENGINEERING
The police categorise vandalism under the crime of criminal Other factors which reduce the risk of vandalism include:
damage. Vandalism is committed both by chddren and — workmanship and installation
adults, and Figure 7.1 indicates the disposition of age of
persons found guilty of, or cautioned for, criminal damage in — increased levels of lighting (see section 3.5)
1988. The figures are taken from government statistics(]).
increased frequency of maintenance
From these figures it follows that the majorhy of offenders in
this category are male and under the age of21. However, it — increased surveillance
must be noted that the statistics provide only a partial picture — increased perimeter security
of actual crime in this category. The 1988 BrMsh Crt-me
Swwy[2), indicated that there were about 10 times as many — fast, effective responses to unauthorised activity.
offences of vandalism than were reported to the police.
In addition, it is worth noting the following guidelines:
Ad
14-17 — The introduction of a mirror in lifts operating on
commercial premises reduces vandalism inside the car.
— A fence with a natural wood finish is less likely to be
vandalked than one painted white.
A surface should be cleaned of graffiti as soon as possible
or it will attract more fyafilti. -
‘~ Aged
over 21
system. Vibration detectors, foil on glass, and rigid wiring
systems can all detect attacks on external building services.
Space detection devices will react to intruders.
53
CIBSE APPLICATIONS MANUAL
The British Security Industry Association (BSIA) is a trade Al.1 2 Health and Safety Executive
association representing its members who are generally the
major security system companies. Membership is divided
into seven categories of manufacturers, suppliers and The Health and Safety Executive (HSE) has the function of
installers covering specific sectors of the industry: safes and overseeing the operation of the Health and Safety at Work
locks, security equipment, security systems, security guards etc. Act 1974. TMs is an Act that embraces all aspects of work
and patrols, security transport, closed circuit television, safe and other activities in which the compliance of all members
deposits. Companies must meet standards in the relevant of the communily is required to achieve acceptable standards
field to become a member of one of these sections. Such of health and safety. All employers have a statutory
standards cove~ business record, training, staff screening, obligation to ensure their staff are safe from crime at work.
customer service, adherence to British Standards, and
quality assurance, Experience shows that consultation with HSE inspectors
may not result in definitive advice about design criteria, but
is useful in reconciling differing opinions relating to matters
Al.9 British Security Registration Board where the health and safety of persons maybe put at risk.
The British Security Registration Board (BSRB) has been Al.1 3 Home Office
established in order to identify everyone employed within the
security industry. The primary function of the register is to
provide employers with a reliable source of reference. The The Home Office promotes the publication of crime
BSRB publishes a National Security Code of Conduct. All prevention guidance. Small booklets are available free, but
those registered are obliged to abide by this Code. copies of the Research Studies and other guidance volumes
can be purchased from HMSO bookshops or agents. Home
The register records on a computer database the individual’s OffIce requirements relate to regulations on drugs, radio-
details including name, date and place of birth, address, communications, prisons, fire service and civil defence.
personal description, exams passed, diplomas and certificates
awarded together with a recent employment record. A
registration book is issued to the individual containing the Al.1 4 Institute of Security Management
above information together with a photograph, specimen of
signature and an annual date for the renewal and update of
The Institute of Security Management (ISM) was created to
records.
represent senior security management personnel. It has no
political or commercial affiliations and aims to enhance the
Al. 10 British Standards Institution ethical and educational standards within the security
industry.
56
SECURITY ENGINEERING
What is the company’s past record of satisfied clients, Quotations should be examined on the following basis:
installations of simiiar content and size to proposals?
(a) What level of cost has been quoted?
(b) Is it in line with other quotations received?
A2.3 Quaiii control (c) Have they quoted ‘like for like’ in terms of quality,
robusmess, central control functions, quantities?
1sthe company approved toB.S 575(9,or working towards BS (4 Is there an interface with a central alarm station?
5750 approval? (e) Have telephone lines been considered?
57
CIBSE APPLICATIONS MANUAL
BS 7042: 1988 Spec#icalion for high secrsn”ty intruder alarm systems in
Bibliography buila%rgs (Milton Keynes: British Standards Institution) (1988)
BS 7150:1989 Code of practice for imruder alarm system$ wish maim wiring
communication (Milton Keynes: British Standards Institution) (1989)
BS 1722:Part 10:1990 Specsj$cation for arui-intruderfences in chain linkand
wekied mesh (M~lton Keynes British Standards Institution) ( 1990) BS 7352:1990 Specificationfor mzrtgrh and durability performance of metal
hinges for side hanging applications and dimensional requirements for remplate
BS 3621:1980 Specification for lhief resimrst locks (Milton Keynes: British
drilled hinges (Milton Keynes: British Standards Institution) (1990)
Standards Institution) (1980)
BS 8220: Guide for secrsr+y of buildings against crime (Milton Keynes: British
BS 5051: Part I: 1988 Specification for glrzm”ngfor iruerior use (Milton
Srandards Institution) (1986-90)
Keynes:BritishSmndardsInstimtion)(1988)
Carroll J M Computer sectsrr”ry2nd edition (London: Butterworths) (1987)
BS 5357:1976(1985)
Codeof Praczice. Installation of secun”tyglazing (Milton
Keynes: British Standards Institution) (1985) Charlett A J Security of buildiW sires (London: Chartered Institute of
Building) (1985)
BS 5544:1978 (1985) Specification for anli-bandil glazing (glazing reshsrrt to
manual attack) (Milton Keynes: British Standards Institution) (1985) Clark R and Mayhew P DesiWing out ti”rne (London: Home Office
Research Unit/HMSO) (1980)
BS 5725: Part 1: 1981 Spec$icaion for panic bolts and panic latches
mechanically operated by a hon”zontal push-bar (Milton Keynes: British Crime prevention in schools — practical guidarsee Building Bulletin 67
Standards Institution) (1981) (Department of Education and Science/HMSO) (1987)
BS 58721980Specification for locks and latches for doors in buildings Crime preveruion in schools — spectjicatio~ irrsta[lation and mairrwnance of
(Milton Keynes: British Standards Institution) (1980) inrruder alarm syswtn.r Building Bulletin 69 (Department of Edurmion and
BS 5979:1987 Code of practice for remote cemres for intruder alarm sys~erns Science/HMSO) (1989)
(Milton Keynes: British Standards Institution) (1987)
Cumming N Security: thecomprehensive guide to equipment selection and
BS 6571: Parl 4:1989 Specr~ica[ion for barrier type parking control equipment installatibts (London: Architectural Psess) (1987)
(Milton Keynes: British Standards Institution) (1989)
Fay J Bsaerworths secun”ty dictimsary: retvm and concepts (London
BS 6707: 1986 Specification for intruder alarm systems for consumer Bumerworrhs) (1987)
installation (Milton Keynes: British Standards Institution) (1986)
Fennelly L J (Ed.) Handbook of 10IS pre-venrion and m“me prevernion
BS 6799:1986 Code of practice for wire-free intruder alarm systems (Milton
2nd edition (London Butterworths) (1989)
Keynes: British Srastdards Institution) (1986)
Green G Introduction to security 4th edition (Londoru Butterworths)
3S 6800:1986 Specificationfor home and personal security devices(MJton
Keynes: British Standards Institution) (1986) (1987)
BS 6804:1986 Code of pracrice for sociaI alarm systems (Milton Keynes: Security sysrems BSRIA Bibliography LB 29/85 (Bracknelk Building
British Standards Institution) (1986) Services Research and Information Association) (1985)
58
SECURITY ENGINEERING
Electric locks 12 Microphonicscable 23
flndex Electrical Contractors Association 55 Microwave detectors 25,28
Electrically operated releases 11 Microwave fences 43
Electromagnetic interference 48 Monitoring locks 11
ACCeSS cards 33 Electromagnetic locks 12 Monitors 36
Access COttttO1 10,32 Encoded cards 33 Museums and art galleries 46
reader 33 Equipment suppliers 54
Acoustic dezectors 26 National Approval Council for Security
Acrylic glazing 9 Fence wiring 43 Syslems 56
Ak conditioning 9 Fibre optic signaling 29 Newvicon CCTV camera 34
Alarm system control panels 38 Financial organisations 51
Alarms I Fire service 54 Open span continuous wiring 22
Ammunition and explosives 47 Floodlighting 16
Armesdcd (float) glass 9 F1oors, ceilings and roofs 8 Passive infra-red detectors 26
Association of Bur@ary Insurance Surveyors Foil detectors 24 Perimeter lighting 16
54 Physical protection 1,7
Audible alarms 30 Gatehouses Police 54
lighting of 16 Polycarbonare glazing 9
Basic concepts 1 General guide to detection equipment 19 Pressure mats .29
Beam detectors 25 Glazing 8 Protective switches for doors and windows 22
Bibliography 58 Government statistics 7 Proximity detectors 29
Bolts 9, 10 Grarsdmaster key suite 11 Public telephone operators 54
BreaMmgglass detectors 24
British Security Industry Association 55 Health and Safety Executive 55 Radio coded access 34
British Security Registration Board 55 Hinges 9, 10 Recommended ilhrminances for security
British Standards Institution 55 Home Office 55 lighting applications 13
Bugging 47 Hybrid electric locks 12 Reputable security companies
Building plan 8 identification of 57
Burglary Industrial areas Residential areas 13
risk of 2 lighting of 16 Response 1
Industrial espionage 47 Retail outlets 44
Capacitive detectors 29 Inertia detector 23 Rkk 1
Cathode ray tube camera 34 Infra-ted detectors 25 Risk assessment 2
Checkpoints 16 active 25 Rkk calculation examples 5
Churches 52 passive 26
Civil airports 49 Institute of Security Management 55 Schools and colleges 52
Civil installations 49 Insurance surveyors 2,54 Security furniture for doors and windows 9
Closed circuit television 34 International Professional Security Security Industry Training Organisation 56
csmeras 34 Association 55 Security lighting 12
lighting for 17 ISfT (intensified silicon intensified tube) Seismic detector 23
Combination locks 10, 11 camera 35 Shoplifting 44
Commercial areas Isolated premises 48 Shurters 9
lighting for 15 SIT (silicon intensified tube) camera 35
commercial central stations 43 Key locks 10, 11 Solid state cameras 35
Computer espionage 47 Keys 10 Space detectors 26
Computer rooms 45 Knock-out bars 23 Specialist applications 44
Continuous wiring 22,23
Control moms 40 Laminated acrylic and toughened glass 9 Tape dialler 31
desigm 41 Laminated annealed glass 9 Telephone warning devices 31
functions 40 Laminated polycarbonate, acrylic and Tills 44
Crime Prevention Offkers 2 toughened glass 9 Toughened (tempered) glass 9
Lamp typeS 13 Transverse continuous wiring 22
Defence estabtishrnents 50 Large industrial sites 49 TV and intercom door entry system 34
Detection 1 Lenses for CCTV cameras 36
Detection and alarm systems 19 Lighting for closed circuit television 17 Ultrasonic detectors 25>26
Detectors Local authority 54
Ukxicon CCTV camera 34
beam 25 Locks 10
Underground pressure detectors 29
breaking glass 24 combination 11
Uninterruptible power supplies 38
inertia 23 electric 12
infra-red 25 electromagnetic 12
miaowave 25 key 10 Vandalism 52,53
space 26 monitoring of 11 Vibration detectors 23,25
ultrasonic 25 Loss Prevention Council 55 Vibration detectors for safes and strongmom
underground pressure 29 Luminaires 13 doors 24
vibration 23 Vldicon CCTV camera 34
Differing 10 Magnetic protective switches 22 Visual alarms 31
Digital dialling units 31 Maintenance and review 1 Volumetric detectors 29
Direct Iine telephone warning devices 31 Marine installations 50
Domestic areas Master key suite 11 Walls 8
lighting of 13 Master Locksmiths Association 56 Warning devices 30
Doors 8 Mastering 11 Wastage 44
Double glazing 9 Mechanical key pads 32 Wiegand card 33
Drugs storage 48 Mechanical protective switches 22 Wired glass 9
Dual technolo~ detectors 28 Merchsndke tagging 44 Wire-free intruder alarm systems 29
59