Understanding Security Basics
Understanding Security Basics
Authors Note This was a presentation at the CDC 8th National Biosafety Symposium, Atlanta, Georgia, 2004.
Although this article presents an overview of security concepts and systems, you will still need a security expert, either from your own organization or outsourced to a full- or part-time contractor, to review the security plan for your facility. A security expert has the experience to help you implement a security program that covers all the elements of security and allows you to put the right components in place. Our discussion begins by drawing you a mental picture of a probable threat element (PTE). Groups of PTE are located throughout the United States. It should be no surprise that they are plotting operations against us all the time, even today. Consider this scenario: Field members of a terrorist organization meet in Baltimore in December 2002 for an initial meeting. Two of them are from New York City and two are from Fort Worth. Their mission? Steal biological material for a bioterror attack on the U.S. food supply. They meet again in March 2003 at the Black Angus restaurant in Atlanta to discuss target selection. The men decide to conduct preselection operations at three locations: Centers for Disease Control and Prevention in Atlanta, the U.S. Army Medical Research Institute of Infectious Diseases (USAMRIID) in Fort Detrick, Maryland, and Plum Island Animal Disease Center in Long Island, New York. Surveillance on these targets is conducted from April to September of 2003. The purpose was to identify weaknesses in security to exploit during
their operation. The criteria were to find a location that had poor lighting, weak CCTV cameras/systems, and an inconsistent access control system. They began their surveillance of the CDC in April to June 2003. They recorded their observations and discovered that there were new alarm systems at the CDC and numerous high-tech television systems strategically located throughout the complex. The site is also patrolled regularly and there were barriers that could hinder movement. Their assessment was that the security components hindered the proposed operation and made it extremely difficult to continue their pre-attack surveillance. In July and August 2003, they conducted a surveillance of the USAMRIID. The tactical information collected revealed similar problems. A large number of uniformed personnel made them very nervous. It just so happened that during their surveillance the USAMRID was conducting an antiterrorism threat exercise, which also made them nervous. Additional security measures made it even more obvious that this site was well protected. There were many lights and security structures. They used barriers during the exercise. There were consistent access control procedures, not only at the building but also in the streets leading up to the building. In addition, there was a visible use of guards and posts. Their assessment was that this location was too difficult. In August through September 2003, they conducted their surveillance on Plum Island. Here they found what they were looking for: Numerous gaps in security, security doors left open for ventilation,
40
R. Kibbey
Figure 1
Hypothetical Scenario
Dec 2002
Four members of HAMAS meet in Baltimore, MD 2 from NYC, NY 2 from Ft Worth, TX Their mission: Steal biological materials that can be used in a bioterror attack on the US food supply
NOTE: Map from the testimony of Steven Emerson 2/24/98 to the senate judiciary subcommittee on terrorism, technology and government information.
Figure 2
Hypothetical Headline
New Headlines
The CDC announced today that a major crisis has developed in the US beef industry Major Outbreaks of Mad Cow Disease
Beef industry collapses
41
Figure 3
Rings of Security
Bio Lab
What needs protection? Consequences Likelihood Vulnerabilities Fiscal Resources
Rings of Security
42
R. Kibbey
These are rings of security that go around the resource you are trying to protect. Each of these rings is an element of security. Each is supported by security equipment and security procedures that will either deter, detect, or support defeating an adversary by being applied to one or more of the rings of security. These are the components of security. So remember: Components equal electronic equipment, procedures, and processes, and elements are the rings. We are going to discuss those rings right now. The rings are Deter, Detect, Assess, Delay, Respond, and Deny. Everything in security should apply to one of those areas. If it does not, you are spending a lot of money without getting very much help. The first question to ask is What needs protection? What do I have in my facility that needs a security system? Then, after youve figured out what it is you are trying to protect, you need to know how much of it there is. Is it a cold virus? Is it Ebola? Is it a hoof and mouth virus or something like that? The lower on the risk scale, the less equipment and sophistication you need. The higher on the scale, the more security you are going to need. The amount of security you need will be determined by determining what your threat is, the vulnerabilities that exist in your facilities, the likelihood of an attack, and the consequences should an attack occur at your facility. Deterrence is the prevention of action through a fear of unacceptable consequences, as viewed by the PTE. It is not a physical state. It is a psychological state that your security program gives a perception of, from the outside looking in. If the PTE perceives a risk of being caught, he will usually move on to another target just as in my scenario where they looked at two locations. One was too tough, so they went somewhere else. Its unfortunate in our business that when we are dealing with deterrence we say, Lets keep them away from here and you end up sending them somewhere else. But, if everybody is doing his or her part, you are going to make it very difficult for an adversary to be successful. Detection is the determination and transmission that an event has occurred. The use of technology increases the capability to detect. Ideally, you will detect as far away from the resource as possible. Assessment is the analysis of an event by a person directly onsite or via technologyusually today a closed circuit television (CCTV) system. Assessment is necessary to determine the validity of an alarm and an appropriate response. Delay is the ability of physical or psychological barriers to restrict movement. The purpose of delay is to allow time for an appropriate response and to make it undesirable for the perpetrator to continue. Response is the level of reaction required to counter an intrusion. Response forces range from unarmed security guards or staff to local police. At the high end there are dedicated armed response forces like you would expect to be around nuclear storage areas. Denial is the ability to oppose or negate the effects of an overt or covert action. Denial is the final and last chance to defeat an adversary. Now we are going to discuss the components of security. Components of security consist of equipment, policies, and procedures that support each of the previously discussed elements (rings of security). The components consist of clear zones, barriers, lighting, shrouds, locks, electronic security systems, access control systems, guard forces, and operator/owner procedures. A clear zone is usually provides a 30-foot clear zone from the facility or object you want protected. It is void of trash receptacles, dumpsters, ashtrays, brushes, and other objects that could obscure a small bomb or provide cover to an adversary. Barriers are designed to restrict, deny, or channel pedestrian or vehicular traffic, and in most cases, will do the same for potential adversaries. Barriers are not necessarily impenetrable but they do increase the probability of detecting people and vehicles or dissuading them from attempting to illegally access your location. Lighting is a significant deterrent to potential intruders. It enhances visibility for routine patrols and general staff and allows response units to have better visibility. Permanent lighting should provide adequate illumination to entry points, site perimeters, pathways, and parking lots. And you can have lighting that is activated by sensorsmotion sensors or line sensorsthat will activate the lights when they are penetrated. These can be activated by timers or operated manually.
43
44
R. Kibbey
Figure 4
Probability of Protection
Low Risk High Risk
1
Visual Assessment Tools Electronic Security Systems Barriers Partial coverage by fixed CCTV
2
Total coverage by fixed CCTV
3
Above ground Observation towers Automated access control system Fence w/cable Fence w/outrigger Stand off distance delineated
4
CCTV w/pan, tilt, zoom
5
Video motion detection, thermal tracking, IR capable Dual line security systems, exchange badges, container access control Barrier & fence system plan, ability to engage Doors windows ballistic resistant, HVAC filtration capable
Perimeter alarms
Access control system w/biometrics Bollards, jersey barriers cabled Walls/roof reinforced,
Structures
So far, weve looked at the six elements of security and numerous components of security. An effective security system will incorporate a security-indepth concept by employing some or all of the elements of security. These must complement one another, be integrated, and work from the resource out to the perimeter of your facility. This will provide you with a solid program that mitigates the level of risk and the vulnerability of your facility. Figures 4 and 5 are a matrix of components and risk levels. These simple matrices illustrate the components of security that you might consider implementing at various risk levels. Left to right, the security components become more complex. You can buy CCTV
cameras as cheap as $150 per camera, or you can buy them as expensively as several thousand dollars per camera. For a simple lab that has very little risk and very little consequence of losing sensitive resources, a simple ADT-style, commercial system is probably sufficient. When you get up to facilities that are doing weapons-grade bioresearch, you will need something a lot more complex. The second slide has a few more examples covering some of the elements where you can start at the lower risk level and move your way up. The combination of security components that covered by the elements of security, constitute the level and depth of protection you have at your facility.
45
Figure 5
Probability of Protection
Low Risk 1
Locks Shrouds Warded Covered from chance observation Local Law Enforcement Only Outer perimeter only
High Risk 2
Disk Wafer Covered from direct observation Unarmed Part Time Inside and outside outer perimeter Building exteriors lighted
3
Pin tumbler Covered from ground observation Unarmed Full Time Clear zones for all sensor fields
4
Super pin tumbler Covered from space observation Armed Part Time Lighted
5
Lever, high security lock Total cover to include protection from attack Armed Full Time
Guard Force
Clear Zones
Lighted and alarmed, delineated by type 2 fencing Restricted and critical areas, entire site illuminated
Lighting
46