Chapter 17

An Overview of Physical Security Technology for Schools

What Security Technologies to Consider for Schools—Finding a Direction

Frank J. Davies, CHS-IV, CIPS, CVI    President, Aella Consulting Group, Inc.

Gregory Bernardo, CHS-IV, CDT, CVI    Vice president, Aella Consulting Group, Inc.

Abstract

This chapter provides readers with an overview of the various types of physical security technologies that should be considered for incorporation into an operational school security plan. The chapter reviews current legislation related to school security, specifically mass notification. Readers are provided with a list of recommended features for a mass notification system and are encouraged to develop a well-designed, comprehensive school security plan.

Keywords

Cameras

Cloud-based systems

Digital video analytics

Mass notification

Physical security information management

Security technology

Video management systems

Introduction

This chapter is intended to introduce school practitioners to the various types of physical security technologies that should be considered for incorporation into their operational school security plans. The information we provide is intentionally high level in order not to burden you with information overload. This way you will be aware of the most commonly applied technical tools at your disposal before you commit to a specific direction.

Overarching Concerns and Considerations

Security technology applied correctly can be a massive force multiplier,1 while saving you time and making your facility safer. There are important considerations you will want to keep in mind as you learn about applying these technologies.

Recent Laws (Passed and Pending)

Between the horrific events of the school shooting in Newtown, Connecticut and the time of this writing, state legislatures have introduced over 470 bills intended to improve school security. Not all of the introduced bills will become law, but the ones that do will need to be considered in your plans.

Some of the pending and signed bills focus on improving emergency response. Many of the security technologies described in this chapter can make emergency response more efficient when interfaced with other systems. For example, cameras placed in the area of a panic button can automatically display on a monitor and provide immediate insight to that area. Initially, you may have looked at installing cameras for other reasons and the panic button to protect staff, but the two systems work together when you plan well and consider all of the uses of your equipment in conjunction with your plan.

Mass Notification Regulations

Prior to the above-noted legislative bills, the National Fire Protection Association (NFPA) 72 bill (which references ANSI/UL 2572) added requirements for mass notification that can apply to schools. Languages in new legislative bills reinforce, and sometimes duplicate, requirements found in NFPA 72. While not enforced uniformly nationwide, we recommend caution with regard to mass notification. This is because NFPA 72 has over-the-cliff (must be compliant with all requirements) verbiage that creates a liability for schools that attempt to “step into” mass notification. We recommend that you become familiar with the changing regulations, specifically NFPA 72, or consult with a knowledgeable expert who can help prepare your planning in this area. It is important to keep open designs in mind when planning so that additions to meet compliance do not require starting over.

Daily Training and Incident Modes

Another consideration is different modes of use for technology. You may be adding technology like access control so that you do not have to post staff at every door during different parts of the day. That may be its intended primary function, but it may be helpful if that product also has a training mode or an incident mode like “lockdown.” For example, a training mode would allow staff to train with some or all of the on-site alarms and notifications but not alert authorities. In a lockdown mode, a single action (panic button) could automatically initiate multiple “lockdown” actions such as locking all doors, initiating mass notification messaging, and increasing video-recording quality or frame rate.

Movies and Television Shows Lie

Physical security technologies, like those that you see in the movies and on television, are not all real. The technology often does not exist or is misrepresented in its effectiveness (remember: television is for entertainment). Most security industry veterans recognize the limitations of security hardware from years of exposure. Ask many questions when you evaluate technologies and do not overestimate what a system can do based on a fancy marketing presentation.

Does It Play Nicely with IT?

Today, schools rely heavily on IT networks that are shared by hundreds of computers, voice-over IP desk phones, tablets, and a host of other connected devices. Physical security technology is yet another demand that schools are adding to their network infrastructure and network administrators.

Many of the physical security technologies you may want to add to a facility can be connected to the network. If not designed and implemented correctly, digital video surveillance systems can clog up a network to the point that nothing works. Likewise, other systems may require exacting data speeds or response times when communicating across your network.

Beyond the network, many of the security technologies you might consider implementing will have one or more computer servers that need a home. The obvious place to put these servers is with your existing servers and in the capable hands of your IT team. However, doing this takes up rack space, uses power, and adds heat. In short, make sure to bring in your IT people early and allow them to evaluate the proposed equipment and the impact new technologies will have on IT infrastructure and subsequent maintenance before you make a purchase.

New Cloud Service Options

Cloud computing has garnered notoriety as more and more businesses take advantage of its benefits. This is also the case in the physical security market.

The costs of accessing security software through a cloud provider can offset the costs associated with purchasing and hosting software locally. However, online storage costs can be more restrictive versus what you can achieve under a onetime cost with local storage.

Just as with every other decision, there are benefits and drawbacks to using cloud-based physical security technologies. As you evaluate cloud service options, consider the following benefits and drawbacks.

Benefits

Flexibility

The cloud promises and often delivers flexibility that can increase productivity and efficiency. Access to cloud-based systems can be made through browsers on existing desktop and mobile devices.

Limited maintenance

As with consumer and business cloud solutions, support and maintenance of software, servers, and storage devices is managed by the cloud service provider. Facilities with little or no on-site IT presence may find an acceptable solution using cloud services.

Drawbacks

Limited interfaces

Cloud-based physical security technologies currently have limited interfaces to complementary on-site or cloud-based systems. This means the convenience and flexibility benefits of a cloud-based access control solution may restrict your ability to interface with a video system.

Security

Security is paramount to your physical security technology plan. Can your cloud provider ensure the level of security that you require? Make sure to perform due diligence as part of your decision making. In our security technology primer,2 we identified that a leader in consumer cloud storage was reported as having an application-wide security incident due to employee error.

Internet connection/bandwidth

Uninterrupted access to your physical security system is crucial. Many of the cloud service providers offer high availability levels and high-issue resolution response levels. However, the Internet connection in between can be interrupted or slowed due to Internet attacks. Even if you have a stable Internet connection, the number of cameras your facility needs may demand more constant bandwidth than is available through your Internet connection.

Data, Data, Everywhere!

A primary concern in designing the security system is how it will handle all of the associated information produced by the various physical security systems. For example:

 Alarms from the intrusion and fire systems,

 Alerts from the access control system, and

 Video from the video surveillance system.

Recognize that each of these individual systems has evolved separately under different companies, and as a result, they present information differently. We will discuss more about ways to control disparate data sources in the next section.

The rest of this chapter is dedicated to the types of physical security technologies. As you continue reading and reflect on these technologies, consider whether they will meet the short- and long-term needs of your facility and how you would want to access or see the information that these systems can deliver.

Physical Security Technologies

Tiered Technology Approach

There is no standard template for security technology that fits every application. In our primer, we refer to a “tiered” method of constructing a physical security system. This proven method creates multiple hierarchal layers of physical security technologies, thereby delivering layers of autonomy, redundancy, and backup.

Physical Security Information Management/Command and Control

A well-designed, comprehensive security plan is not just about sensing and reporting alarms or recording and displaying video, it is about collecting and presenting all of the information in a coherent fashion so that it can be effectively used by security and safety personnel.

Physical security information management (PSIM) systems, previously known as command and control, allow disparate information from different manufacturers’ products to become interoperable on a standard platform or “user interface.” Most PSIM manufacturers are system agnostic; therefore, most other manufacturers do not see them as a competitor and will be willing to cooperate and work with them.

One of the major advantages of utilizing a PSIM system is to provide a “big picture” or “situational awareness.” While this certainly provides an everyday benefit, it can also be extremely important in the most critical of emergency times. Most PSIMs can deliver an additional benefit to the common operating picture with the ability to present a “live” campus system map. This map displays the systems in real time, as well as the operational status of all the lower-tier systems by using icons to indicate the status of doors, sensors, cameras, and other system attributes.

Smaller educational facilities may not warrant the addition and cost of a PSIM system. However, a PSIM system is a good place to start our discussion because smaller, independent facilities are often brought into a campus-wide plan.

On the following pages, we will discuss lower-level systems that can function both independently or as tier 2 systems under a PSIM system.

Video Management Systems

On the surface, many video management systems (VMSs) look the same. At the most basic level, video management software products route and/or record compressed video from cameras and encoders and display video to monitors. These systems also provide camera and user administration and access rights. Most of today’s VMSs display live video in a graphical user interface (GUI) or a standard Windows Internet browser on an operator’s PC. Some systems offer video “decoders” to display the video directly on dedicated monitors or “video walls,” without requiring a PC.

A close examination of available VMS reveals a wide variety of product features, functionality, and price. VMS manufacturers oftentimes vary in maturity and market focus, resulting in product differences in scalability, network management, fault tolerance, operating systems, software clients, and the availability of standard conventions and protocols (interfaces).

At a minimum, VMSs require cameras, a PC platform with servers and storage equipment, and the manufacturer’s software. Some manufacturer’s designs are proprietary and require you to use their hardware and/or software. Other manufacturers feature more open-design platforms, which provide the opportunity for easier system additions and support.

You may hear references to CCTV, digital video, video surveillance, security cameras, and the “mystical” digital video analytics. We would like to point out that these terms are not interchangeable. Video surveillance is a rapidly changing segment of security that is much like computers: Whatever you buy today will no longer be state-of-the-art tomorrow. This rapid change and transition in the market (often referred to as “convergence”) requires a well-thought design concept to ensure the long-term viability of your installation.

Today, video surveillance is making a shift from analog cameras (based on the original one-signal-per-cable design) to network (IP) cameras (where many cameras can transmit on the network cable). There are still many analog cameras being installed because integrators are comfortable with their installation and troubleshooting. However, they will be obsolete in the near future.

The key to extending the life of your video system is to install a platform that supports open protocols. This term means that the purchaser will not be limited to proprietary technical components from a single vendor. In theory, future incremental enhancements then will be cost-effective and take advantage of new technologies without having to incur sweeping replacement costs for major system components.

Cameras

Cameras are the most basic and critical elements of video surveillance and predetermine operational characteristics of the entire system. The cameras you install predetermine certain system-wide operational characteristics such as:

 Fixed position versus pan/tilt/zoom (can the camera be remotely controlled?)

 Standard resolution or megapixel (how wide of an area can I see or can I digitally zoom?)

 Built-in storage (does video recording impact my network all the time?)

 Built-in video analytics (do I get alarms from my camera that other systems can use?)

 Built-in processing power for future video analytics (do I replace the camera or add hardware to use video analytics on a camera?)

Most recently, the cost for night-vision and low-light cameras has become economical enough to be used in commercial and educational applications to detect and capture images not previously available in older systems.

Monitors

Video surveillance monitors come in an assortment of sizes and technical functions. Monitors can be applied differently as your monitoring layout and overall design strategy requires. Many VMSs utilize one or more flat panel monitors of larger size to view multiple images. Often VMS, access control, or PSIM systems display additional system information as well as video.

Multiple monitors may be used, but you need to consider how your security personnel will use them. It is also important to remember that the more monitors security personnel are required to watch, the faster they develop monitor fatigue and are more likely to miss critical events. However, multiple monitors with important cameras displayed enable security personnel to assess critical areas at a glance.

Recording

Today’s digital video recorders (DVRs) and network video recorders (NVRs) allow security system designers to use any combination of the previously discussed features of analog and IP security cameras.

DVRs are computers or purpose-built devices that use internal video capture hardware with specific channel capacities of 4, 8, 9, 16, 24, 32, and 64 (with each channel being a camera). These devices are close ended with a predetermined storage size, thus requiring the need for additional devices if the system is expanded.

NVRs are designed to work with network edge devices (IP cameras and IP encoders) rather than directly connect with analog (non-IP) cameras. An NVR is a PC server or specialized embedded device with video management software/firmware. NVR capacities vary substantially depending on the VMS and server specifications.

There are some hybrid recorders that offer both DVR (video capture hardware) and NVR (IP only), but they typically have a reduced total capacity of IP and analog video streams.

Both DVRs and NVRs are easy concepts for IT directors and tech-savvy consumers, but build-your-own systems are something to be avoided. “Build your own” is the practice of adding video capture cards and software to regular PCs and building your own DVR or NVR.

Recording systems vary tremendously in scalability (as we touch on above). Evaluation of camera types (standard versus megapixel), calculation of the quantity of camera types, and the anticipated system growth must be considered carefully in your purchasing decision.

Analog, Digital, Standards Compliant?

Decisions regarding video systems invariably include decisions regarding analog cameras, digital cameras, or a combination of both. The differences are discussed later, but the important thing to know is that they use different wiring. Additionally, digital cameras can be proprietary (only work on one system), open standard (their communication standard is openly shared), or standards compliant (uses a communications standard promoted by an independent standards organization). Typically, the VMS you choose will limit your camera choices.

Digital Video Analytics

Though they have been around for some time, video analytics are still not well understood by all for the correct use and implementation. New advances and product offerings are available each year, but should be evaluated very carefully.

We are typically interested in video analytics as a way to monitor multiple cameras without concern for operator fatigue and to free up staff to do other things. However, video analytics have not progressed to the point where they can replace human decision making or make judgment calls. Table 17.1 shows analytic functions that are typically found in security cameras.

Table 17.1

Typically Found Analytic Functions

 Motion detection

 Object classification and tracking

 Object removed

 Object left behind

 Wrong way detection and object counting

 License plate detection

 Facial recognition

t0010

In every video analytics deployment, camera placement and properties have a profound effect on performance. Proper expectations and adequate design are critical to ensure a successful deployment.

Mass Notification Systems

The intent of mass notification systems is, as the name would imply, to notify the masses in the case of an event. Mass notification type events can vary from the severe (terrorist attack) to the informational, such as closings due to weather (snow day).

As authors in this subject matter, we would be remiss not to caution the reader that the Clery Act considerations and changes within NFPA, Underwriters Laboratory (UL), and the Department of Education set certain expectations and requirements regarding these systems. We advise that these items be given the consideration they deserve. Laws, regulations, and codes regarding fire and notification systems have begun to change. When designing these systems, NFPA and UL requirements and recommendations should be followed closely.

Many voice-based systems come preprogrammed with English, Spanish, or French messages, and often are able to use customized message(s) recorded by the customer. The power of the human voice added to the typical bell, siren, and flashing lights makes a system highly effective. However, too often, systems are installed that are less than adequate, making annunciation of voice wholly unintelligible, for which there are now established standards.

Mass notification systems should include or consider the requirements unique to your setting in the following lists.

At a minimum:

 Public address system

 Posted notices

 Emergency call-in hotline

 SMS/text messaging

 Website/portal

 Outdoor public address system/warning sirens

 Voicemail notification system

 Visually/audibly impaired warning system

Recommended:

 Digital signage

 Desktop alerting in each classroom and throughout the campus/school

 Voice-enabled programmable fire alarm

 Mobile loudspeaker system(s)

 Blue light towers

 Staff radio system with alerting

 Outdoor emergency phones

 Utilization of social media, blogs, etc.

These lists are not all encompassing, but rather a starting point to identify and evoke a discussion regarding the responsibilities and the tools available in your unique circumstance to protect the students, faculty, and staff of the institution.

Access Control, Badging, and Visitor Management

When access control is paired with visitor management and a badging system (credentials), the result is a more complete accounting and control of the entire school population. These systems should work in unison but not impair the functions of one another to create, access, or provide information.

Access control

The purpose of an access control system is to limit access and create a record of accountability. Employees can only access areas where they are authorized and during the times they are authorized to be there. Likewise, students and visitors can be kept out of areas they are not supposed to access.

The most basic component of security access systems is a keypad or card reader or some combination of both located at entry points you wish to secure. The door access devices are wired to control panels and from there to a computer system (server or other manufacturer-specific PC) to run software. These panels are generally proprietary to the manufacturer. Access control systems typically allow the supplemental tie in and monitoring of multiple systems; that is, fire, perimeter alarms, interior alarms, video system motion detection, and other alarms.

All access control manufacturers’ software is proprietary and therefore this decision is of paramount importance. Examine all of the performance details of the equipment to determine if and how they meet your institutional requirements now, and for the future.

Badging system

Most mature access control systems have an integral badging system component allowing the creation of credentials (picture) on an access control card. However, the quantity and type of cards may dictate a badge product from a manufacturer that is different but integrated with the access system.

Card readers (credential readers) utilizing magnetic strips, RFID technology, and traditional Wiegand swipe technology are the most prevalent access control devices. RFID technologies include prox (short for proximity) and smart cards, which are similar to prox, but house additional data other than just the user’s ID.

As you evaluate these choices, you may be tempted to tie in your cafeteria or other card-based purchasing program (sometimes referred to as the One Card system). Our experience is that combining security and commerce is generally problematic because each area is specialized.

Visitor management

Visitor management in school is a valuable extension of a well-designed access control plan and is intended to let the right people in and keep the wrong people out. Software-based visitor management systems can quickly verify a visitor’s credentials against a blacklist or a white list (a Criminal Offender Record Information [CORI] check is essential here) and provide an audit trail that is easy to create and access. Beyond the obvious security improvement, visitor management can be part of a program that makes your entire staff accountable for visitors while on site.

The policy of making faculty and staff “known” by prominently wearing their ID credential will make visitors stand out through their lack of such a credential. This can be improved by making visitors wear temporary badges with a distinctive overall color, which can be seen from a distance, and text, to identify their area or reason to be in the school. Through proper training of faculty and staff, a visitor or unknown person can be challenged or identified, thereby increasing awareness, accountability, and safety.

Ties between the access control system and the VMS can aid in accountability if the building must be evacuated. Most robust VMSs can be used to determine the presence of visitors within the facility or provide a “muster list” to account for all evacuated guests.

Fire and Intrusion Central Monitoring

There are several ways to approach the monitoring of your security and fire alarms systems. Keep in mind, as we have stated earlier, the best system designs incorporate layered redundancy, which in the case of fire and intrusion systems lends itself to supplemental monitoring by a hierarchal system.

All state-of-the-art fire and intrusion systems contain digital communicators capable of transmitting to a central station or monitoring center in a variety of formats. However, you will have to make sure your systems support a format that is compatible with whatever central station or monitoring method you elect to use.

In conventional configurations, digital receivers are assigned to dedicated telephone lines and integrated with the central station software. Field security panels send alarms, open and closing signals, supervisory signals, and test signals of all systems to central station receivers. The central station software deciphers this information and displays it on computer terminals for action by the central station operator.

There is a growing segment of security systems equipment that can be centrally monitored over the Internet. Only specific equipment has been listed or approved to date.

User-owned central station or monitoring center

There is a significant expense to operating your own central station. It is only reasonable to consider your own central station if you have your own police, fire, and security forces deployed 24 hours a day, 7 days a week, 365 days a year, and are willing to hire full-time dispatchers.

Independent third-party central station

The third-party central station will usually be UL approved, thereby providing all of the assurances of outside-unbiased supervision and having all of the electrical, physical, ventilation, and software requirements met. Third-party central stations are in the business to provide this type of monitoring, so they assume all the burdens of insurance, training, and any licensing requirements.

This solution usually is best for the school, university, or institution that does not have a fulltime police or security officer program to mitigate all of the associated costs. It has the most flexibility with the least associated risk, and it provides some sharing of the risk and liability.

Security-supplier-owned central station

In some instances where a school district, university, or institution contracts their security services to a security systems supplier, including monitoring, it is the responsibility of the security systems supplier to assume all of the previously discussed burdens of cost, insurance, training, licensing, and UL approval.

Whichever monitoring solution you ultimately adopt, we strongly recommend that you do not rely solely on unsupervised telephone lines as your sole source of communication with the central station. We highly recommend that you employ backup solutions involving cellular communication backup, telemetry, long-range radio, or a network-deployed application to facilitate the delivery of emergency signals during telephone outages.

Intrusion Detection Systems

Intrusion detection is an integral part of your physical security technology. Intrusion detection can be a standalone intrusion detection system (IDS), but is often part of an access control system. The descriptions below apply to both applications of the technology.

IDS sensors (described below) are connected using dedicated wiring. This wiring is often protected by a metal conduit to prevent tampering or rendering a device inoperable by simply cutting the wire. In many cases, these sensors will be “supervised” to detect tampering or make the sensors inoperable.

Rather than run wire from every device back to a central point, IDSs usually have control panels located throughout the building in secure locations. As with the device wiring, IDS panels should also be monitored for tampering.

Balanced magnetic contacts

Balanced contacts are used on all types of indoor and outdoor doors and windows to detect when they are opened or closed.

Motion detection

The use of long-range combination passive infrared (PIR) and microwave detectors in corridors and hallways is commonplace. These represent two different technologies, which can be applied to detect motion in different areas. PIR detectors measure infrared (IR) light radiating from objects in its field of view. While very accurate, these devices can create false alarms from items that change temperature, such as heating radiators and electronics.

Microwave detectors send out pulses of ultrasonic waves and measure the reflection off a moving object to detect motion. The technology works similarly to a police radar gun. These devices are also very accurate, but they can be bothered by electrical “noise.”

Some motion detectors use a combination of both PIR and microware technologies; when the PIR sensor is tripped, it activates a microwave sensor to confirm the motion detection.

Other Alarm System Features

The security system can be used for a host of other supervisory tasks capable of alerting school personnel of potentially damaging events. For example, monitoring food storage temperatures in coolers and freezers, power outages and generator failure to start, HVAC systems, and in colder climates, monitoring boilers used for heating is a frequent application.

The security system can also be used to monitor the building fire alarm system (provided it meets the UL listing).

In addition to the protection provided by the security systems, a well-documented deterrent is signage deployed throughout the facility identifying that these premises are monitored and protected.

Fire Alarm Systems

Fire alarm manufacturers are regulated and scrutinized by ULs, the NFPA, Factory Mutual, insurance risk carriers, federal and state agencies, ADA Security, and many others. They are tested routinely in order to ensure reliability. However, if fire alarms are so reliable, then what is the concern?

For fire alarm systems to be of any value, they must be designed, installed, and maintained correctly. If you already have a fire alarm system, the following information can help you to understand where you might lower some of your maintenance costs and how to integrate your fire system into your overall physical security plan.

Conventional versus addressable

Fire alarm architecture is described as conventional or addressable. Your choice of architecture determines the devices you can attach and some of your system’s core functionality. In both cases, there are two functional sides of a fire alarm system: detection and annunciation. The detection side of a fire alarm system is comprised of detectors and pull stations that are connected to a fire alarm panel. Similarly, the annunciation (or alarming) side of the system is comprised of the same fire alarm panel and is connected to strobe lights and alarm sounders. Fire alarm architecture also determines how specific your system can be regarding what area “zone” that an alarm is coming from or that you want to annunciate to. Depending on the local code and the fire alarm panel design, these zones may refer to an area of the building such as the “south hallway classrooms” or the “auditorium.”

Fire alarm components

Smoke and heat detectors are your primary fire detection devices and should be installed according to code and located throughout the structure. Manual pull stations should also be located according to code and protected with covers that sound an audible alarm if the manual pull station cover is opened. This deters false alarms and class disruption.

It is also important to remember that all horns/strobes must be located in compliance with the fire code, authority having jurisdiction (AHJ), and Americans with Disabilities Act (ADA).

There are many types of fire detection devices on the market today and most do a great job for their intended area of specialization. There are also many mainstream and specialized detectors available; we recommend that you follow code requirements when deciding which of them you need.

School Bus Security Technology

Technology has advanced rapidly to the point where it is economically feasible to track and provide two-way communication and private or public addressing to each school bus. This technology will handle an array of potential hazards that may be faced during the day while a bus is in transit. Video recording of events helps to deter and defend against bullying, assaults, and accidents.

In addition to the information that can be transmitted to the buses, information can be gathered from the buses and utilized by state and local law enforcement, even in real time from a mobile platform. Handoff of video and data from buses can be efficiently handled and coordinated to work in harmony with school security and notification.

Some important considerations that exist when presenting and detailing the need for the technology inclusion within your bus fleet are as follows:

 Is the technology designed for a mobile/transportation environment?

 Does it contain hardened equipment with power backup?

 Does it have recording mechanisms that are hardened or solid state?

 Is it protected from extremes of heat and cold?

 Is the wireless technology incorporated in the hardware?

 How are updates delivered to the hardware and software (directly or wirelessly)?

 How does the system report faults?

 Are the cameras designed for rigors of environment?

 What other peripheral devices (lights, panic switches, and geolocation) can be added to the system?

Physical security technology on school buses and public transportation is currently a specialty niche serviced primarily by companies specializing in transportation. Only a few of these systems can interface with other physical security systems.

Summary

Physical security technology cannot and will not provide you with security in a school, but rather is part of a holistic approach and a well-crafted security and safety plan. Security technology applied correctly can be a huge force multiplier, while saving you time and making your facility safer.

This chapter was intended only to introduce you to the technologies that should be considered by school practitioners for incorporation into their operational school security plans. The information we included was intentionally high level to provide awareness of the most commonly applied technical tools at your disposal before you commit to a specific direction. We highly recommend that a multidisciplinary team address the needs of your school to insure that you have all of the components of a complete security plan.


1 A force multiplier refers to something that increases (hence “multiplies”) the effectiveness of an item, individual, or group. For example, a camera system can allow one security resource officer to monitor the front lobby and all the hallways at the same time.

2 A Primer on Electronic Security for Schools, Universities and Institutions, 2nd Edition, March 2012.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset