Physical Security RS&RM Contents

Total Page:16

File Type:pdf, Size:1020Kb

Physical Security RS&RM Contents Physical Security RS&RM Contents 1 Security 1 1.1 Perceived security compared to real security ............................... 1 1.2 Categorizing security ........................................... 2 1.3 Security concepts ............................................. 2 1.4 Security at home .............................................. 2 1.5 Security management in organizations ................................... 2 1.6 See also .................................................. 3 1.7 References ................................................ 3 1.8 External links ............................................... 3 2 Physical security 4 2.1 Overview ................................................. 4 2.2 Elements and design ............................................ 4 2.2.1 Deterrence methods ....................................... 4 2.2.2 Intrusion detection and electronic surveillance .......................... 5 2.2.3 Access control .......................................... 6 2.2.4 Security personnel ........................................ 7 2.3 See also .................................................. 7 2.4 References ................................................. 7 3 Closed-circuit television 9 3.1 History .................................................. 9 3.1.1 Technology ............................................ 10 3.1.2 Application ............................................ 10 3.2 Uses .................................................... 10 3.2.1 Crime prevention ......................................... 10 3.2.2 Industrial processes ........................................ 12 3.2.3 Traffic monitoring ........................................ 12 3.2.4 Transport safety ......................................... 12 3.2.5 Control of retail .......................................... 12 i ii CONTENTS 3.2.6 Use in schools ........................................... 13 3.2.7 Criminal use ........................................... 13 3.3 Prevalence ................................................ 13 3.4 Privacy .................................................. 14 3.5 Technological developments ....................................... 15 3.5.1 Computer controlled analytics and identification ......................... 15 3.5.2 Retention, storage and preservation ............................... 16 3.5.3 Closed-circuit digital photography (CCDP) ........................... 16 3.5.4 IP cameras ............................................ 17 3.5.5 Networking CCTV cameras ................................... 17 3.5.6 Integrated systems ........................................ 17 3.5.7 Wireless security cameras .................................... 17 3.6 CCTV camera vandalism ......................................... 18 3.7 See also .................................................. 18 3.8 Notes ................................................... 18 3.9 References ................................................ 19 3.10 Further reading .............................................. 20 3.11 External links ............................................... 20 4 Security guard 21 4.1 Functions and duties ........................................... 21 4.2 Personnel ................................................. 22 4.2.1 Types of security personnel and companies ............................ 22 4.3 Training .................................................. 24 4.3.1 Australia ............................................. 24 4.3.2 Canada .............................................. 25 4.3.3 Europe .............................................. 25 4.3.4 Hong Kong ............................................ 28 4.4 Qualification ................................................ 28 4.4.1 Hong Kong ............................................ 28 4.4.2 Israel ............................................... 29 4.4.3 Malaysia ............................................. 30 4.4.4 South Africa ........................................... 30 4.4.5 United States ........................................... 30 4.5 Security officers and the police ...................................... 32 4.6 Trends .................................................. 33 4.6.1 Australia ............................................. 33 4.6.2 UK ................................................ 33 4.6.3 United States ........................................... 33 CONTENTS iii 4.7 History .................................................. 33 4.8 Notable security guards .......................................... 34 4.9 Unionization ................................................ 34 4.9.1 Canada .............................................. 34 4.9.2 United States ........................................... 34 4.10 Hazards in the Industry .......................................... 35 4.11 See also .................................................. 35 4.12 References ................................................. 35 4.13 External links ............................................... 37 5 Separation barrier 38 5.1 Cyprus ................................................... 38 5.2 Egypt ................................................... 38 5.3 Germany .................................................. 38 5.4 Israel .................................................... 39 5.5 Kuwait ................................................... 39 5.6 Malaysia .................................................. 39 5.7 Saudi Arabia ................................................ 39 5.8 Slovakia .................................................. 39 5.9 United Kingdom .............................................. 39 5.10 United States ............................................... 40 5.11 See also .................................................. 40 5.12 References ................................................. 40 5.13 External links ............................................... 41 6 Lock (security device) 42 6.1 History .................................................. 42 6.1.1 Antiquity ............................................. 42 6.1.2 Modern locks ........................................... 43 6.2 Types of locks .............................................. 44 6.2.1 Locks with physical keys ..................................... 44 6.2.2 Locks with electronic keys .................................... 45 6.2.3 List of common locks ...................................... 45 6.3 Locksmithing ............................................... 45 6.3.1 Full disclosure .......................................... 46 6.3.2 Famous locksmiths ........................................ 46 6.4 See also .................................................. 47 6.5 References ................................................ 47 6.6 Further reading .............................................. 47 iv CONTENTS 6.7 External links ............................................... 47 7 Access control 48 7.1 Physical security .............................................. 48 7.1.1 Access control system operation ................................. 49 7.1.2 Credential ............................................. 50 7.1.3 Access control system components ................................ 50 7.1.4 Access control topology ...................................... 50 7.1.5 Types of readers ......................................... 51 7.1.6 Access control system topologies ................................. 51 7.1.7 Security risks ........................................... 55 7.2 Computer security ............................................ 56 7.3 Access Control .............................................. 56 7.4 Telecommunication ............................................ 57 7.5 Public policy ................................................ 57 7.6 See also .................................................. 57 7.7 References ................................................. 57 7.8 External links ............................................... 58 8 Alarm device 59 8.1 Etymology ................................................. 59 8.2 See also .................................................. 59 9 Motion detection 60 9.1 Mechanical ................................................ 60 9.2 Electronic ................................................. 60 9.3 Occupancy sensors for lighting control .................................. 61 9.3.1 System design and components .................................. 61 9.4 See also .................................................. 61 9.5 References ................................................. 61 9.6 External links ............................................... 61 10 Glass break detector 62 10.1 See also .................................................. 62 10.2 External links ............................................... 62 11 Identity document 63 11.1 History ................................................... 63 11.2 Adoption of identity cards ......................................... 63 11.2.1 Arguments for ........................................... 63 CONTENTS v 11.2.2 Arguments against ........................................ 64 11.3 National policies .............................................. 64 11.3.1 Africa ............................................... 65 11.3.2 Asia ................................................ 66 11.3.3 Europe .............................................. 70 11.3.4 North America .......................................... 82 11.3.5 Oceania .............................................. 84 11.3.6 South America .........................................
Recommended publications
  • Identity Cards Are Acceptable
    Who can apply for a Dutch driving licence Anyone can take theory & driving lessons, but when applying for: ► any type of theory tests ► any type of driving tests ► any Dutch driving licence you will be required to physically possess & to be able to show: Sub A: a valid form of identity Sub B: a citizens service number (= BSN or SoFi number) furthermore you will have to authorize your driving school to apply for any driving test through your DigId: Sub C: use your DigId to give a mandate to your driving school Sub A: Valid forms of identity As of January 1st 2006 the following identity cards are acceptable: ► a valid Dutch passport ► a valid Dutch driving license ► a valid Dutch identity card, issued by your Local Municipality ► a valid European identity card (NOT a foreign Driving Licence) ► a valid passport for citizens of member countries of the European Union ► a valid passport for citizens of member countries of the European Economic Area. ► a valid travel document for foreigners (your Dutch resident’s permit issued by the IND) ► a valid travel document for refugees EU/EEA countries are: Austria, Belgium, Bulgaria, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Liechtenstein, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovak Republic, Slovenia, Spain, Sweden, * Switzerland, United Kingdom. * Switzerland is not in the EU/EEA, but an international treaty means that from 1 June 2002 Swiss nationals have a similar right to live in the Netherlands as EEA nationals. Legislations rules that foreigners holding the following documents cannot obtain a Dutch driving licence: ► a W-document issued to asylum seekers: (although the W-document is a form of identification, it is not a residence permit and therefore unsuitable for a driving license application at the local authority) ► an expired document of the cat.
    [Show full text]
  • Records Relating to Railroads in the Cartographic Section of the National Archives
    REFERENCE INFORMATION PAPER 116 Records Relating to Railroads in the Cartographic Section of the national archives 1 Records Relating to Railroads in the Cartographic Section of the National Archives REFERENCE INFORMATION PAPER 116 National Archives and Records Administration, Washington, DC Compiled by Peter F. Brauer 2010 United States. National Archives and Records Administration. Records relating to railroads in the cartographic section of the National Archives / compiled by Peter F. Brauer.— Washington, DC : National Archives and Records Administration, 2010. p. ; cm.— (Reference information paper ; no 116) includes index. 1. United States. National Archives and Records Administration. Cartographic and Architectural Branch — Catalogs. 2. Railroads — United States — Armed Forces — History —Sources. 3. United States — Maps — Bibliography — Catalogs. I. Brauer, Peter F. II. Title. Cover: A section of a topographic quadrangle map produced by the U.S. Geological Survey showing the Union Pacific Railroad’s Bailey Yard in North Platte, Nebraska, 1983. The Bailey Yard is the largest railroad classification yard in the world. Maps like this one are useful in identifying the locations and names of railroads throughout the United States from the late 19th into the 21st century. (Topographic Quadrangle Maps—1:24,000, NE-North Platte West, 1983, Record Group 57) table of contents Preface vii PART I INTRODUCTION ix Origins of Railroad Records ix Selection Criteria xii Using This Guide xiii Researching the Records xiii Guides to Records xiv Related
    [Show full text]
  • Reconceptualising Ethnic Chinese Identity in Post-Suharto Indonesia
    Reconceptualising Ethnic Chinese Identity in Post-Suharto Indonesia Chang-Yau Hoon BA (Hons), BCom This thesis is presented for the degree of Doctor of Philosophy of The University of Western Australia School of Social and Cultural Studies Discipline of Asian Studies 2006 DECLARATION FOR THESES CONTAINING PUBLISHED WORK AND/OR WORK PREPARED FOR PUBLICATION This thesis contains sole-authored published work and/or work prepared for publication. The bibliographic details of the work and where it appears in the thesis is outlined below: Hoon, Chang-Yau. 2004, “Multiculturalism and Hybridity in Accommodating ‘Chineseness’ in Post-Soeharto Indonesia”, in Alchemies: Community exChanges, Glenn Pass and Denise Woods (eds), Black Swan Press, Perth, pp. 17-37. (A revised version of this paper appears in Chapter One of the thesis). ---. 2006, “Assimilation, Multiculturalism, Hybridity: The Dilemma of the Ethnic Chinese in Post-Suharto Indonesia”, Asian Ethnicity, Vol. 7, No. 2, pp. 149-166. (A revised version of this paper appears in Chapter One of the thesis). ---. 2006, “Defining (Multiple) Selves: Reflections on Fieldwork in Jakarta”, Life Writing, Vol. 3, No. 1, pp. 79-100. (A revised version of this paper appears in a few sections of Chapter Two of the thesis). ---. 2006, “‘A Hundred Flowers Bloom’: The Re-emergence of the Chinese Press in post-Suharto Indonesia”, in Media and the Chinese Diaspora: Community, Communications and Commerce, Wanning Sun (ed.), Routledge, London and New York, pp. 91-118. (A revised version of this paper appears in Chapter Six of the thesis). This thesis is the original work of the author except where otherwise acknowledged.
    [Show full text]
  • Non -Destructive Entry Magazine
    #3#3 Non-Destructive Entry Magazine Medecoder ABUS Plus Ingersoll Tiger Team And More! MayMay FOR LOCKSPORT! 20082008 WelcomeWelcome For Locksport! I received a message the other night. It was Amanda, a friend of mine who has recently taken up lockpicking. She was complaining that the challenge lock I left at her house had pricked her with a metal splinter. I told her I was sorry, she simply replied: “I HAVE BLED FOR LOCKSPORT!” I have too actually, when I first tried to make my own picks. In fact, in an informal survey I found that 100% of NDE readers who were surveyed have bled for locksport. A staggering percentage! We give our blood to these locks and it’s worth remembering what they give to us. Locks provide us not just with physical safety, but with peace of mind. They are a staple of the civilized world. A lock says “someone owns this, it’s not for you.” It’s the dividing line between the public and the private. And for the lockpicker? A lock presents a chal- lenge, a never-ending supply of new puzzles and as our hobby grows. Fueled as every- thing is now, by the internet, we see more collaboration, faster progress and ever more clever solutions to the problems the locks pose. However, there are new challenges that we should have seen coming. Specifically, how to disclose this information. The trouble is, when we get excited at our discovery and bound off to tell as many people as we can, we are celebrating what a lock means for us, it’s been conquered, the puzzle solved, the code deciphered.
    [Show full text]
  • The Lock Collector from Tony Beck January/March 2006 Issue No
    The Lock Collector From Tony Beck January/March 2006 Issue No. 10 All Ri ghts Reserved. Copyright ©, R. A. Beck 2006. Editor’s Note: This issue extends the miserly single page biography of Edwin C otterill included in the last one! He stands highly amongst the greatest English lock inventors, particularly for his Climax Det ector lock patented in 1846. This issue contains Part 2: His Middle Age and Lock Inventions. The final Part 3 will follow next i ssue. Most of us will know of Willenhall Lock Museum’s demise and transformation to The Locksmith’s House. All this involved co nsiderable change when the Black Country Living Museum became the new owners in May 2003. Richard Hopkins, who helped them to de al with the complexities of cataloguing the Locks, Keys and Archive material, has kindly contributed an article setting out what was involved. I do hope it will be found interesting, and perhaps some questions will arise. Like - will an Inventory of all the locks, keys and archives be sometime available to view? Does the Museum intend to consult with lock collectors on what items are to be exhibited in the Locksmith’s House apart from those initially on show? Also what plans are there to introduce the Museum’s exhibits held in BCLM’s Dudley store to public view? It’s certainly sad to see the opportunity lost that might have seen finance being provided to expand and create a fine Museum dedicated to locks and keys; like there is in Austria, France, German y, Holland, U.S.A., etc.
    [Show full text]
  • Understanding Capture and Validate KYC Processes: Global Experiences, Challenges and Learnings
    Understanding Capture and Validate KYC Processes: Global Experiences, Challenges and Learnings May 2019 Copyright © 2019 GSM Association Understanding Capture and Validate KYC Processes: Global Experiences, Challenges and Learnings v Digital Identity The GSMA represents the interests of mobile operators The GSMA Digital Identity Programme is uniquely worldwide, uniting more than 750 operators with over positioned to play a key role in advocating and raising 350 companies in the broader mobile ecosystem, awareness of the opportunity of mobile-enabled digital including handset and device makers, software companies, identity and life-enhancing services. Our programme works equipment providers and internet companies, as well as with mobile operators, governments and the development organisations in adjacent industry sectors. The GSMA also community to demonstrate the opportunities, address the produces the industry-leading MWC events held annually in barriers and highlight the value of mobile as an enabler of Barcelona, Los Angeles and Shanghai, as well as the Mobile digital identification. 360 Series of regional conferences. For more information, please visit the GSMA Digital Identity For more information, please visit the GSMA corporate website at www.gsma.com/digitalidentity website at www.gsma.com Follow GSMA Mobile for Development on Twitter: Follow the GSMA on Twitter: @GSMA @GSMAm4d This document is an output of a project funded by UK aid from the Department for International Development (DFID), for the benefit of developing countries. The views expressed are not necessarily those of DFID. Author: Matt Wilson, Senior Insights Manager, GSMA Rob Waddington, Futuresight Understanding Capture and Validate KYC Processes: Global Experiences, Challenges and Learnings v Contents Executive Summary .................................................................................
    [Show full text]
  • 10 Ivanisevic.Qxd
    UDC 904:725.96 »653« (497.115) 133 VUJADIN IVANI[EVI], PERICA [PEHAR Institute of Archaeology, Belgrade EARLY BYZANTINE FINDS FROM ^E^AN AND GORNJI STREOC (KOSOVO) Abstract. – In this article, we presented the archaeological finds from ^e~an and Gornji Streoc – hill-forts on Mount ^i~evica in the immediate vicinity of Vu~itrn (Kosovo). We studied the archaeological material from the Roman, Late Roman and, in particular from the Early Byzantine period. A large number of archaeological objects and especially iron tools found on the ^e~an and Gornji Streoc fortresses indicate a well-developed level of production in the crafts and iron manufacturer. We emphasize the importance of these fortresses in Late Roman times and we highlight the fortification of the interior regions of Illyricum. This suggests that Dardania had a considerable population in the Late Roman period as is confirmed by the many fortresses constructed throughout the entire region, often on almost inaccessible terrain. Key words. – Dardania, Kosovo, Fortifications, Late Roman, Early Byzantine, Finds, Coins. ery little is known about the material culture abounding in pastures and intersected by fertile river of Kosovo in Late Roman times. Thus, the valleys, were favourable for the development of agri- V period from the tetrarchy to the time of culture and cattle-raising. The mountain chains, rich in Heraclius is represented with very few finds in the primary deposits of copper, iron and silver ore contri- catalogue of the exhibition Arheolo{ko blago Kosova i buted to the development of mining as an important Metohije (Archaeological treasures of Kosovo and economic activity in Dardania.4 Trading also played a Metohija).
    [Show full text]
  • The Reality of Free Movement for Young European Citizens Migrating In
    The reality of free movement for young European citizens migrating in times of crisis ESTONIA Author: Institute of Baltic Studies Year: 2017 The objective of the project “The reality of free movement for young European citizens migrating in times of crisis” is to look into the reality of free movement from the viewpoint of young Europe- ans (age 25-35) who exercise or plan to exercise this right. This publication is the country report for Estonia. ON-THE-MOVE –”The reality of free movement for young European citizens migrating in times of crisis” Grant Agreement JUST/2014/RCIT/AG/CITI/7269 CONTENTS Summary ................................................................................................................................4 I Situation of young people and migration patterns Migration patterns and trends for young people ..............................4 The ways young people are reacting to these challenges .... 11 Interim findings ..............................................................................................................17 II Experiences of young people on free movement Sample and method .................................................................................................19 Estonians who wish/plan to move ............................................................20 Estonians who moved and returned ........................................................23 EU citizens in Estonia .............................................................................................26 Views of representatives
    [Show full text]
  • Number of Municipal Police Departments in Connecticut
    Office of Legislative Research Research Report October 28, 2016 2016-R-0275 NUMBER OF MUNICIPAL POLICE DEPARTMENTS IN CONNECTICUT By: Veronica Rose, Chief Analyst CONNECTICUT’S 10 ISSUE LARGEST MUNICIPAL How many municipal police departments are in POLICE DEPARTMENTS Connecticut, and how many police officers do they New Haven 436 employ? This report updates OLR Report 2011-R-0194. Hartford: 406 CONNECTICUT MUNICIPAL POLICE Bridgeport: 381 DEPARTMENTS Waterbury: 276 Connecticut has 92 municipal police departments. As of Stamford: 273 October 2016, they employed a total of 6,628 police officers. Nineteen departments employ 100 or more police Greenwich: 181 officers, and fifty-three employ 50 or fewer officers, Norwalk: 178 including 14 that employ fewer than 20. New Britain: 164 Table 1 shows the 92 municipal police departments and Danbury: 154 number of police officers employed in each. (For towns under State Police jurisdiction, see OLR Report 2016-R- West Hartford: 130 0246.) Source: Police Officer Standards and Training Council Phone (860) 240-8400 Connecticut General Assembly Room 5300 http://www.cga.ct.gov/olr Office of Legislative Research Legislative Office Building [email protected] Stephanie A. D'Ambrose, Director Hartford, CT 06106-1591 Table 1: Municipal Police Departments in Connecticut as of October 2016* Police Department No of Police Police Department No. of Police Police Department No. of Police Officers Officers Officers Ansonia 43 Guilford 35 Rocky Hill 35 Avon 28 Hamden 108 Seymour 43 Berlin 42 Hartford 406 Shelton 52 Bethel
    [Show full text]
  • Report English 01.Pdf
    1 SUMMARY 1. EXECUTIVE SUMMARY 03 2. INTRODUCTION 08 3. SECTION ON CCTV 12 4. IDENTITY CARD SECTION 56 5. SECTION ON PERSONAL DATA ON THE INTERNET 97 6. CONCLUSIONS 182 7. BIBLIOGRAPHY 195 2 1. EXECUTIVE SUMMARY The initial objective of this Project was to carry out the first step in the promotion of a public debate and influence in public policies, relative to the protection of personal data in Latin America. In this first stage, the project has been centered in two countries: Brazil and Mexico, and has had as its objective the identification of the main institutional, legal, academic, social and technological actors in three spheres: a) National identification documents, b) video surveillance in public spaces, and c) surveillance of data in the Internet. In the framework of the new national identification document in Brazil, there exist laws, law projects and discussions in the Congress since 1991, but mainly, they refer to this document in an uncritical and non reflexive way, without participation and public debate with respect to the theme in the country. The research also brings up the point that scientific production borders the theme of biometrics and identification by the exact disciplines or those interested in suggesting more efficient technical systems. From the humanities there are fewer critical studies that reflect on the theme. In this way, the implementation is characterized by a technocratic aspect or a better technique that erases its political characteristics. The analysis of the law projects and of existing laws indicates that the application of the unique identification document in the country does not pass in Brazil due to legal mechanisms for the control and supervision of the document itself outside of groups who use it.
    [Show full text]
  • September/October 2010 Issu E 24 – $14.00 TILJ Janfeb10:TILJ 1/20/10 12:38 PM Page 2
    The I nde pe nd en t September/October 2010 L Issue 24 – $14.00 o c k s m i t h h h J J J o o o u u u r r r n n n a a a l l l TILJ_JanFeb10:TILJ 1/20/10 12:38 PM Page 2 PETERSON DOES IT AGAIN! Introducing the PCT-7: Peterson Carbide Coring Tool Peterson’s new set of vending lock penetration tools make quick work of vending type lock openings including VAN lock, ABA DUO, ABLOY, BATON, 380 Tubular, 360 Tubular and 340 Tubular. The adaptor guides to a preset cutting dept insuring success every time! www.ThinkPeterson.com Standard Price: $224.95 585-264-1199 585-586-2425 (fax) Special Offer: ONLY $179.95 10am-6pm Eastern Time (Special pricing ends April 1, 2010) WE will open them — But YOU have to put them back together! TILJ_JanFeb10:TILJ 1/20/10 12:38 PM Page 3 TILJ_JanFeb10:TILJ 1/20/10 12:38 PM Page 3 NOTE FROM THE EDITOR'S DESK Greetings from the editor’s desk!!! Note From The Editor’s Desk There is a lot of news in this issue. First I would like to give a great vote of thanks for the efforts of Mike Pecorella as he substituted for Don DennisNote after Don’s From sudden health The issues. (Don Editor’s still struggles at times,Desk but I happily notice continued improvement in him). Season’s greetings from the Editor’s desk! I hope all of our readers had a safe and enjoyable Mike Season’sstepped up greetingsto the plateholiday.
    [Show full text]
  • Summary Future of Identity in the Information Society
    FIDIS Future of Identity in the Information Society Title: “D4.2: Set of requirements for interoperability of Identity Management Systems” Author: WP4 Editors: James Backhouse (LSE) Michael Vanfleteren (KU Leuven) Reviewers: Els Soenens (VUB, Belgium) Paolo Spagnoletti (Luiss University, Italy) Identifier: D4.2 Type: [Deliverable] Version: 1.1 Date: Tuesday, 20 December 2005 Status: [Final] Class: [Public] File: fidis-wp4-del4.2.Set_of_requirements.doc Summary This report highlights the spread of opinion amongst a group of European experts in application areas of identity management on the issue of interoperability of such systems. It builds from an earlier report that presented a literature review and an account of research in interoperability. It uses the three-part conceptual framework of technical, formal and informal dimensions through which to frame the questions posed and interpret the answers given. The 23 interviewees from 5 different European countries, while differing in detail, display a remarkable consensus on much of the issues. Application areas from which the experts are drawn cover egovernment, ehealth and ecommerce, and while, given their specific nature, there may be many points on which such areas diverge, the likelihood of interoperability is deemed to turn on a small number of key questions, mostly non-technical. Importance is given to building trust in the citizen and end-user through good communication, usability, compliance with data protection and privacy principles. Copyright © 2004-05 by the FIDIS consortium - EC Contract No. 507512 The FIDIS NoE receives research funding from the Community’s Sixth Framework Program FIDIS D4.2 Future of Identity in the Information Society (No.
    [Show full text]