Critical Safety, Access Control, and FIber Optic Network Upgrades
Critical Safety, Access Control, and FIber Optic Network Upgrades
Proposal content
☒ Project Proposal Checklist: this form; one for each proposal
☒ Project Proposal Form: Specific to category/subcategory (10-page limit)
☒ Appendices: templates, forms, exhibits and supporting/supplemental documentation for scoring.
Institutional priority
☒ Institutional Priority Form. Sent separately (not in this packet).
Check the corresponding boxes below if the proposed project meets the minimum threshold or if the item
listed is provided in the proposal submittal.
Minimum thresholds
☒ Project is not an exclusive enterprise function such as a bookstore, dormitory, or contract food service.
☒ Project meets LEED Silver Standard requirements.
☒ Institution has a greenhouse gas emissions reduction policy in place in accordance with RCW
70A.45.050 and vehicle emissions reduction policy in place per RCW 47.01.440 or RCW 43.160.020 as
applicable.
☐ A complete predesign report was submitted to OFM by July 1, 2022 and approved.
☐ Growth proposals: Based on solid enrollment projections and is more cost-effectively providing
enrollment access than alternatives such as university centers and distance learning.
☐ Renovation proposals: Project should cost between 60 – 80% of current replacement value and extend
the useful life of the facility by at least 25 years.
☐ Acquisition proposals: Land acquisition is not related to a current facility funding request.
☒ Infrastructure proposals: Project is not a facility repair project.
☐ Stand-alone, infrastructure and acquisition proposals is a single project requesting funds for one
biennium.
Required appendices
☒ Project cost estimate: Excel C-100
☐ Degree Totals and Targets template to indicate the number of Bachelors, High Demand and Advanced
degrees expected to be awarded in 2023. (Required for Overarching Criteria scoring criteria for Major
Growth, Renovation, Replacement and Research proposals).
☐ Availability of Space/Campus Utilization template for the campus where the project is located.
(Required for all categories/subcategories except Infrastructure and Acquisition proposals).
☐ Assignable Square Feet template to indicate program-related space allocation. (Required for Growth,
Renovation and Replacement proposals, all categories/subcategories).
Optional appendices
Attach supplemental and supporting project documentation, limit to materials directly related to and needed for the
evaluation criteria, such as:
☐ Degree and enrollment growth projections
☒ Selected excerpts from institutional plans
☐ Data on instructional and/or research space utilization
☐ Additional documentation for selected cost comparables (acquisition)
☐ Selected materials on facility conditions
☐ Selected materials on code compliance
☐ Tables supporting calculation of program space allocations, weighted average facility age, etc.
☐ Evidence of consistency of proposed research projects with state, regional, or local economic
development plans
☐ Evidence of availability of non-state matching funds
☒ Selected documentation of prior facility failures, high-cost maintenance, and/or system unreliability
for infrastructure projects
☐ Documentation of professional assessment of costs for land acquisition, land cleanup, and
infrastructure projects
☒ Selected documentation of engineering studies, site survey and recommendations, or opinion letters
for infrastructure and land cleanup projects
☐ Other: Click or tap here to enter text.
I certify that the above checked items indicate either that the proposed project meets the minimum thresholds,
or the corresponding items have been included in this submittal.
INSTITUTION CAMPUS
Western Washington University Bellingham
PROJECT TITLE
Critical Safety, Access Control, and Fiber Optic Network Upgrades
SUMMARY NARRATIVE
• Problem statement
Western Washington University has two urgent and interrelated infrastructure needs that need to be solved
in a single, consolidated effort. Western must replace and expand the campus fiber optic network, which
has reached the end of its expected life and constrains growth in academic instruction; fire and life safety
systems; business operations; and building automated control systems.
Most significantly, the current fiber network constrains Western’s ability to make urgently needed changes
to the campus electronic access control system. Existing manual and electronic locks are no longer
adequate to meet campus efficiency, safety, and security obligations. In response to recent national active
shooter events, the campus emergency management committee recommended two key improvements to
campus security: expanding electronic access control capacity and installing manual classroom locks
operable from the inside. This project proposes implementation of both recommendations.
Finally, the importance of having a uniform access control system across campus has been underscored by
the demands of providing a safe workplace during the COVID pandemic, as handling physical keys
requires personal contact which could be avoided.
• Project description
The project would replace the existing damaged and undersized fiber optic communications system
between and within buildings and install electronic controls on exterior doors and designated high security
internal doors of all major academic buildings. The project will also install new hardware on classroom
doors to enable locking from the inside in the case of an active shooter emergency.
UPDATE: The project will also move the campus data center from Administrative Services Center
(approximately 1/2 mile from the southern campus border) to the Communications Facility (on campus) in
order to improve network reliability and make the access control more resilient.
Overall, these upgrades will enable Western to meet the continuing mission-critical communication and life
safety needs of students, faculty, and staff. A unified electronic access control system will simplify and
improve campus building access and security; provide improved integration with other security systems
such as video monitoring and intrusion detection; and simplify dispatch functions during emergency
responses. Manual classroom locks operable from the inside form a last line of defense should an active
shooter incident ever occur.
• Replace the existing campus fiber optic network, including improving efficiency by combining stand-
alone switches and controllers to reduce space, power, and cooling needs.
• Upgrade power to network equipment closets to include emergency power and cooling.
• Bring affected data communication conduits and cable trays into electrical code compliance by
removing abandoned electrical cable and adding new trays where necessary.
• Reduce operating costs by reducing or eliminating the need for daily manual locking and opening of
academic buildings and by consolidating existing dedicated networks, such as Building Automation
Control, onto a common high-capacity backbone.
• Provide centralized lockdown functionality to facilitate more agile, appropriate, and effective response
capabilities in the event of a campus emergency.
• Provide classrooms with internally lockable doors so that students and faculty can effectively take
shelter under the “Run, Hide, Fight” response to an active shooter.
This project scope represents the convergence of several studies and plans completed over past biennia, as
well as the opportunity for construction efficiencies as similar work can be accomplished within buildings
in a single contract.
A 2017 Utilities Master Plan Update suggested that the existing fiber network supporting the Fire, Security
Alarm, Access Control, and Building Automated Control systems are at capacity and should be replaced to
maintain current service delivery and support future growth.
In the 2017-2019 biennium, Western received funding to separate its existing access control system from
the fire alarm system. During the design stage of that project, the designer confirmed the recommendation
in the Utilities Master Plan Update (in the Telecommunications Section), concluding that scattered damage
to the existing 20-year-old fiber loop, the ever-increasing reliance of academic and business operations on
web-based applications, and emerging technologies in building operating systems are stretching the fiber
loop to its capacity. The section addressing the fiber loop is included in Appendix E.
Concurrently, in response to recent national active shooter events, the campus emergency management
committee was charged with recommending strategies to improve campus safety and security. That
committee identified the risks and operational shortcomings of relying on manual keying systems that are
obsolete and failing or which do not provide the technical functionality required to safeguard buildings and
facilities quickly and effectively. Lessons learned from active shooter events around the country pointed at
two key improvements:
• Lockdown: The committee recommended expanding electronic access control capacity to improve
safety and security across campus. Electronic access controls would be installed on exterior doors,
sensitive areas, and selected high use labs. This would allow for immediate lockdown of campus, for
securing buildings automatically on a schedule for non-working hours, and for providing an electronic
record credentials used for access.
• Classroom Locks: The Final Report of the Sandy Hook Advisory Commission strongly recommended
“a standard requiring classroom and other safe-haven areas to have doors that can be locked from the
inside.” The Commission’s research indicated that “there has never been an event in which an active
shooter breached a locked classroom door.” Western’s emergency management committee urged the
adoption of that standard for campus classrooms.
More recently, the demands of the COVID pandemic have highlighted the mission-critical nature of data
communications for all university services. The institution’s resilience in the face of evolving and
increasingly unpredictable challenges hinges on a robust data network.
UPDATE: In the 2021-23 biennium, Western received partial funding ($2.15 million) that will implement
over 23,000 feet of fiber (of the approximately 155,000 total), 63 exterior access control locks (of the 290
total), and 100 classroom/lab lock upgrades. In 2023-25, Western is requesting the remainder of funding,
for a total of $15 million. The $15 million includes the inflationary adjustments to finish the scope of work
as well as moving the data center from Administrative Services Center (approximately 1/2 mile from the
southern campus border) to the Communications Facility (on campus). During project design efforts over
the past year, it was determined that moving the data center to the Communications Facility will reduce the
overall amount of fiber renewal/replacement associated with this project and improve network reliability
across campus. Overall, the data center re-location will make access control more resilient.
A robust fiber optic network is crucial for virtually all the university’s academic programs, administrative
activities, and student services, beginning with the foundation of safe, accessible spaces and continuing to
provide a technologically relevant, modern education, offering flexibility for changing conditions,
supporting communications and learning opportunities, and allowing efficient administration. Expansion of
electronic access controls, which is severely constrained without upgrading the fiber optic loop, will
improve the security of campus buildings and enhance the safety of those who study and work in them.
A. While Western’s facilities comply with current life safety codes, the completion of this
project assures that conformance is not jeopardized by failing network equipment. Life
safety systems depend on efficient notification to the monitoring agency, which at Western is
the University Police Department. The campus fiber optic network is the spine that provides
this vital communication link.
B. This project would improve consistency with the following standards and codes:
Campus Safety and Security Guidelines: Western has determined that emergency lockdown
capability during an active shooter event is of paramount importance. Recommendations from
active shooter analyses across the country have concluded that locking, blocking, or otherwise
obstructing access to a classroom is a highly effective deterrent to an active shooter – thus an
important lifesaving functionality. This new lockdown functionality will complement Western’s
emergency preparedness and response plans, which include text, cell phone, and voice
notification.
Energy Code Compliance: Operation and management of RCW required high efficiency
building systems and system components requires a reliable fiber network for communications.
Western constantly monitors the performance of HVAC systems through a data analytics tool
directly connected to the Siemens operating system. The data is transmitted over the fiber optic
line to a central station in the physical plant, where trained technicians evaluate the performance
of all systems to reveal performance anomalies and identify areas of potential energy savings.
Over the past three years, this process of real time data analysis has saved Western over
$200,000 per year in energy.
Fire Code Compliance: All fire safety system monitoring, alarms, and notification rely on the
fiber optic loop to communicate with the central monitoring station in the University Police
Dispatch Center, as well as with the City of Bellingham first responders.
ADA Accessibility: Electronic and classroom locks will improve ADA compliance and
accessibility through modification of existing hardware. As electronic entries are installed,
existing traditional doorknobs will be replaced with ADA compliant openers. Newly installed
classroom locks will also be fully compliant with both Fire Code and ADA requirements.
Recent studies and subsequent evaluation of the condition of the fiber optic network as work has
been performed suggest the network is approaching the end of its useful service life. The
university has outgrown its network, which was primarily installed in 1999-2000, in several key places.
Physical cable degradation is evident in the campus utility tunnels, threatening the foundation of all
network services on campus. Replacement is required to avoid service interruption in the event of
network failure.
In addition, the existing fiber network has several bottlenecks in which the number of available fiber
strands has nearly run out, including:
These constraints limit our ability to implement critical electronic access control systems on the
consolidated network. Without the fiber replacement and expansion access control need a separate
fiber network, which would add substantial cost to the project and to university operations overall.
Once fiber optic upgrades are complete, this project proposes to expand the use of electronic
credentialing across campus, reducing need for traditional brass keys. Four years ago, in response to a
lost ring of master keys, Western accelerated an internal project to rekey all of campus. The
monumental effort to issue new keys to thousands of students and staff highlighted the vulnerability
of access control dependent on traditional keys and the routine maintenance costs involved in tracking
and replacing keys.
The fiber optic data network is essential to the delivery of all aspects of the educational
mission. Nearly all academic and administrative functions depend on a reliable fiber optic
communications infrastructure. Emergency response capabilities will be enhanced by electronic
credentialing and lockdown functionality. A fully capable electronic access system is a risk mitigation
strategy. Access to a building or space can be immediately rescinded upon report of a lost credential,
reducing or eliminating concerns of unauthorized access.
Under the current operating model, Western’s academic buildings are locked and opened by a team of
University Police Department student employees according to established building schedules. This
process can be nearly eliminated through an automated electronic locking system, saving up to two
FTE salaries per year. In addition, the lower operating costs of using electronic credentials is well
established in the security industry.
4. Reasonable estimate
The post-escalation MACC ($10,451,316) and Equipment ($1,950,873) cost identified in the C100 is
based on unit and equipment cost associated with recent access control and fiber optic upgrade
projects. Those projects include the Access Control Project funded with State funds in the 2017-19
biennium and fiber optic and switchgear equipment associated with several recent major and minor capital
projects. Those calculations are included in Appendix B (Cost Breakdown) and match the MACC and
equipment costs in the C100 (Appendix A).
5. Engineering study
Western has commissioned several studies about safety and utility condition. The consensus
is overwhelming that data communications and robust access control are central to university
operations.
In 2017, Western completed a utilities master plan update which identified the need to replace the
existing fiber network to meet current and predicted requirements.
In 2013, Western contracted with TRUSYS, an operational security assessment company, to define a
roadmap for conversion of our existing access control system. This capital request reflects the
recommendations of that study, included in Appendix C.
6. Support by planning
A. As Western plans for enrollment and program growth, an expanded and modernized
fiber optic network will be essential for supporting an upgraded access control
system, along with virtually all other campus functions. Western’s Comprehensive
Campus Master Plan contains six guiding principles for future campus development. This
project is fully aligned with Principle #3: “Provide convenient and safe access to and through
the campus for the University’s guests, faculty, staff and students.”
B. Western’s 2018 Strategic Plan requires that the University “provide technological and
other academic infrastructure to support curricular innovation, research, scholarship,
and creative activity, civic engagement and social justice” and that it ensure the safety
and security of students and staff. The fiber optic infrastructure, on which nearly all
academic and business functions rely, is essential to campus operations. The maintenance and
improvement of Western’s security infrastructure is fully aligned with strategic intent.
The proposed project supports the standards and procedures of the campus Access Control
Policy, included in Appendix D.
Western will be able to continue energy conservation and monitoring efforts through a fully
capable fiber optic infrastructure. The electronic access component will lower maintenance and
labor costs associated with physical key security and provide indirect energy conservation
opportunities with the enhanced ability to manage access control of buildings. By limiting
unauthorized access to academic buildings, conservation of resources can be managed more efficiently
and effectively. Building controls will be tied to building and room occupancy, enabling selective
heating and ventilation rather than whole building measures. Alarms on exterior doors will reduce the
potential or duration of propped open doors, conserving energy within the buildings.
Contact Information
Name Brian Ross
Phone Number 360.650.6539
Email [email protected]
Statistics
Gross Square Feet MACC per Gross Square Foot
Usable Square Feet Escalated MACC per Gross Square Foot
Alt Gross Unit of Measure
Space Efficiency A/E Fee Class B
Construction Type Other Sch. B Projects A/E Fee Percentage 10.98%
Remodel Yes Projected Life of Asset (Years) 50
Additional Project Details
Procurement Approach DBB Art Requirement Applies No
Inflation Rate 4.90% Higher Ed Institution No
Sales Tax Rate % 8.80% Location Used for Tax Rate
Contingency Rate 10%
Base Month (Estimate Date) July-22 OFM UFI# (from FPMT, if available)
Project Administered By Agency
Schedule
Predesign Start Predesign End
Design Start October-21 Design End October-23
Construction Start January-23 Construction End June-25
Construction Duration 29 Months
Consultant Services
Predesign Services $0
Design Phase Services $802,463
Extra Services $171,000
Other Services $360,527
Design Services Contingency $133,399
Consultant Services Subtotal $1,467,390 Consultant Services Subtotal Escalated $1,521,353
Construction
Maximum Allowable Construction Maximum Allowable Construction Cost
$9,628,999 $10,451,316
Cost (MACC) (MACC) Escalated
DBB Risk Contingencies $0
DBB Management $0
Owner Construction Contingency $962,900 $1,045,132
Non-Taxable Items $0 $0
Sales Tax $932,087 Sales Tax Escalated $1,011,687
Construction Subtotal $11,523,986 Construction Subtotal Escalated $12,508,135
Equipment
Equipment $1,652,000
Sales Tax $145,376
Non-Taxable Items $0
Equipment Subtotal $1,797,376 Equipment Subtotal Escalated $1,950,873
Artwork
Artwork Subtotal $0 Artwork Subtotal Escalated $0
Other Costs
Other Costs Subtotal $355,000 Other Costs Subtotal Escalated $363,662
New Approp
Request
Project Cost Funded in Prior
2023-2025 2025-2027 Out Years
(Escalated) Biennia
Acquisition
Acquisition Subtotal $0 $0
Consultant Services
Consultant Services Subtotal $1,521,353 $393,528 $1,127,825 $0
Construction
Construction Subtotal $12,508,135 $1,490,872 $11,017,264 $0
Equipment
Equipment Subtotal $1,950,873 $1,950,873 $0
Artwork
Artwork Subtotal $0 $0
Other Costs
Other Costs Subtotal $363,662 $50,000 $313,662 $0
What is planned for the requested new appropriation? (Ex. Acquisition and design, phase 1 construction, etc. )
See scope of work in MACC worksheet
Acquisition Costs
Escalation
Item Base Amount Escalated Cost Notes
Factor
Purchase/Lease
Appraisal and Closing
Right of Way
Demolition
Pre-Site Development
Other
Insert Row Here
ACQUISITION TOTAL $0 NA $0
Consultant Services
Escalation
Item Base Amount Escalated Cost Notes
Factor
1) Pre-Schematic Design Services
Programming/Site Analysis
Environmental Analysis
Predesign Study
Other
Insert Row Here
Sub TOTAL $0 1.0000 $0 Escalated to Design Start
2) Construction Documents
A/E Basic Design Services $802,463 69% of A/E Basic Services
Other
Insert Row Here
Sub TOTAL $802,463 1.0121 $812,174 Escalated to Mid-Design
3) Extra Services
Civil Design (Above Basic Svcs)
Geotechnical Investigation
Commissioning
Site Survey
Testing
LEED Services
Voice/Data Consultant
Value Engineering
Constructability Review
Environmental Mitigation (EIS)
Landscape Consultant
Electrical Engineering $78,000
Travel & Per Diem $40,000
Advertising $3,000
Site Surveying and Testing $50,000
4) Other Services
Bid/Construction/Closeout $360,527 31% of A/E Basic Services
HVAC Balancing
Staffing
Other
Insert Row Here
Sub TOTAL $360,527 1.0854 $391,317 Escalated to Mid-Const.
Construction Contracts
Escalation
Item Base Amount Escalated Cost Notes
Factor
1) Site Work
G10 - Site Preparation
G20 - Site Improvements
G30 - Site Mechanical Utilities
G40 - Site Electrical Utilities
G60 - Other Site Construction
Other
Insert Row Here
Sub TOTAL $0 1.0244 $0
3) Facility Construction
A10 - Foundations
A20 - Basement Construction
B10 - Superstructure
B20 - Exterior Closure
B30 - Roofing
C10 - Interior Construction
C20 - Stairs
C30 - Interior Finishes
D10 - Conveying
D20 - Plumbing Systems
D30 - HVAC Systems
D40 - Fire Protection Systems
D50 - Electrical Systems
F10 - Special Construction
F20 - Selective Demolition
General Conditions
MACC per "MACC Breakdown" in
$9,628,999
Appendix of proposal
Insert Row Here
Sub TOTAL $9,628,999 1.0854 $10,451,316
$0
8) Non-Taxable Items
Other
Insert Row Here
Sub TOTAL $0 1.0854 $0
9) Sales Tax
Sub TOTAL $932,087 $1,011,687
Equipment
Escalation
Item Base Amount Escalated Cost Notes
Factor
1) Equipment
E10 - Equipment $1,652,000
E20 - Furnishings
F10 - Special Construction
Other
Insert Row Here
Sub TOTAL $1,652,000 1.0854 $1,793,081
3) Sales Tax
Sub TOTAL $145,376 $157,792
Artwork
Escalation
Item Base Amount Escalated Cost Notes
Factor
1) Artwork
0.5% of total project cost for
Project Artwork $0
new construction
0.5% of total project cost for
Higher Ed Artwork $0 new and renewal
construction
Other
Insert Row Here
ARTWORK TOTAL $0 NA $0
Project Management
Escalation
Item Base Amount Escalated Cost Notes
Factor
1) Agency Project Management
Agency Project Management $618,232
Additional Services
Other
Insert Row Here
Subtotal of Other $0
PROJECT MANAGEMENT TOTAL $618,232 1.0854 $671,029
Other Costs
Escalation
Item Base Amount Escalated Cost Notes
Factor
Mitigation Costs
Hazardous Material
Remediation/Removal
Historic and Archeological Mitigation
Plan Review $55,000
In-Plant Services $300,000
OTHER COSTS TOTAL $355,000 1.0244 $363,662
Exterior Access Control and Associated Fiber at Academic Buildings Associated Equipment in the Buildings
Bldg Name Access Door Associated MACC Bldg Name # of Cost
Count Linear Feet of network
Fiber switches
Communications Facility 23 5357 $ 471,749 Fine Arts 1 $ 45,000
Morse Hall 12 6876 $ 283,553 SMATE 2 $ 90,000
Biology Building 14 6555 $ 317,359 Ross Engineering 2 $ 90,000
Fine Arts 14 4403 $ 297,626 Performing Arts Center 2 $ 90,000
Ross Engineering 15 6800 $ 337,981 Arts Annex 1 $ 45,000
Performing Arts Center 40 5900 $ 789,103 Canada House 1 $ 45,000
Arts Annex 20 6300 $ 425,271 College Hall 1 $ 45,000
Canada House 7 5700 $ 180,894 Commissary 1 $ 45,000
College Hall 7 4900 $ 173,558 Environmental Studies 2 $ 90,000
Commissary 10 6600 $ 244,272 Fairhaven Academic 1 $ 45,000
Environmental Studies 22 6350 $ 462,480 Haggard Hall 2 $ 90,000
Fairhaven Academic 3 3500 $ 87,220 High Street Hall 2 $ 90,000
Haggard Hall 17 7550 $ 381,609 Humanities 2 $ 90,000
High Street Hall 13 6000 $ 293,895 Old Main 2 $ 90,000
Humanities 16 7050 $ 358,649 Steam Plant 1 $ 45,000
Old Main 26 9850 $ 568,075 Wilson Library 2 $ 90,000
Steam Plant 7 6800 $ 190,981 Bond Hall 4 $ 167,000
Wilson Library 17 8950 $ 394,447 Academic Instruction Center 2 $ 90,000
Fiber to prior converted buildings 7 44150 $ 533,481 Campus Services 2 $ 90,000
Total 290 159,591 $ 6,792,199 Fraser Hall 2 $ 90,000
Miller Hall 2 $ 90,000
Other Total Network Switches 37
Scope Cost/unit # of Units/feet MACC
Interior Doors under Access Control $10,000/door 30 doors $ 300,000 Total Equipment Cost $ 1,652,000
Classroom Locks $1056/door 300 doors $ 316,800
Lab wireless access locks $2200/unit 100 Labs $ 220,000
Data Center $ 2,000,000
Total $ 2,836,800
UNITEDSTATES|CANADA|CARIBBEAN|INDIA|NETHERLANDS
CONTENTS
EXECUTIVE SUMMARY ........................................................................................................... 4
ISSUE .................................................................................................................................... 4
RECOMMENDATION........................................................................................................... 4
ROADMAP ............................................................................................................................. 5
EXISTING SYSTEM ................................................................................................................. 5
5-POINT ROADMAP ............................................................................................................ 5
DEFINE REQUIREMENTS ...................................................................................................... 5
ASSESS FEASIBILITY & COSTS .............................................................................................. 7
PLAN & DESIGN ................................................................................................................. 7
PROCUREMENT & INSTALLATION ...................................................................................... 7
OPERATION........................................................................................................................ 8
ALTERNATIVE ....................................................................................................................... 8
SUMMARY ........................................................................................................................... 8
BUDGETS ................................................................................................................................ 9
ACCESS CONTROL SYSTEM ................................................................................................ 9
INTRUSION DETECTION SYSTEM .........................................................................................10
VIDEO MANAGEMENT SYSTEM .........................................................................................11
OTHER SERVICES ................................................................................................................11
ROADMAP PONTS 1 & 2...................................................................................................11
MANUFACTURER SELECTION PROCESS ...........................................................................11
BUDGETARY TIMELINE ........................................................................................................12
PERSONNEL ........................................................................................................................12
DISPATCH ..........................................................................................................................12
SYSTEM OPERATIONS ........................................................................................................12
SUMMARY ..........................................................................................................................14
APPENDIX A - EXISTING SYSTEM: EST-3 SYNERGY.................................................................15
CONFIGURATION & SOFTWARE ........................................................................................15
EXISTING IDS .......................................................................................................................15
CREDENTIAL SYSTEMS ........................................................................................................16
INTEGRATION OF INTRUSION & VIDEO .............................................................................16
SECURITY TECHNOLOGY PLAN .........................................................................................17
PERSONNEL & BUDGETS ....................................................................................................17
APPENDIX B - SECURITY TECHNOLOGY IN THE MARKET TODAY .........................................19
VIDEO MANAGEMENT SYSTEM (VMS) ..............................................................................19
ACCESS CONTROL BEST PRACTICES.................................................................................19
ISSUE
The WWU process to date has created an impasse between two different approaches.
The first approach advocates an immediate upgrade of the system due to funds being
available in this biennium.
The other approach is to defer the replacement of the system as long as possible until it
is no longer supported by the manufacturer. This approach is advocated by some
within WWU so that badly needed capital dollars can be deferred for other projects as
long as possible.
The need for replacing the ACS has been brought on by the following:
1. The need for distributed administrative control of the access control due to the
inability to address it through staffing.
2. The pending “end of life" declaration that will be issued for the access control
portion of the integrated EST system, and the future roll-out of the EST-4 which will
make the access control portion of the system obsolete.
RECOMMENDATION
The key points to TRUSYS’ recommendation are:
• Defer Replacement of the ACS for two to three years.
• Cease investment in current ACS
• Implement a 5-Point Roadmap for replacement of the Access Control System.
The 5-Points of the Roadmap are:
1. Define Requirements
2. Assess Feasibility & Costs
3. Plan and Design System Replacement
4. Procurement and Implementation
5. Operation of System
By following this Roadmap, WWU can achieve an access control system that can meet
their growing needs and expectations, and that can be incorporated into their overall
Security Plan.
5- POINT ROADMAP
TRUSYS recommends a 5-Point Roadmap to obtain an upgraded and operational
access control system.
Assess
Define Procurement &
Feasibility & Plan & Design Operation
Requirements Implementation
Costs
DEFINE REQUIREMENTS
The definition of requirements should be based on two levels:
SECURTY PLAN
A Security Plan that encompasses all aspects of security at WWU will be defined. It
would assess key aspects such as:
OPERATIONS BUDGET
SECURITY PLAN
TECHNOLOGY PERSONNEL
Figure 2 - Security Plan
Commentary on a Security Plan can be found in Appendix C.
• Card Technology
• Reader/Lock Technology
Edge
• Retrofit
•New Installation
Hardware
• Operating System
• Platform
Software •Client Interface
• Intrusion Detection
• Video Management
Integration •Security Intercom
Each approach should be evaluated based on costs and impact to existing systems
and operations.
Tasks Tasks
Cards, Card Readers & Reader/Locks
Manufacturer Selection Control Hardware
Software
System Plans Detailed, Shop Drawing Level
Specifications Specific to Project, Integrated with Plans
Budget Estimates Detailed, Based on Specified System(s)
Figure 5 – Plan & Design
ALTERNATIVE
If it is determined that the budgeted funds from the current biennium for the
replacement of the Access Control System will be lost if no action is taken, then the
following should be done:
1. Engage a consultant to specify and design a new ACS system which would
include at a minimum:
a. Determination of the optimum solution for smart card technology, readers
and integrated reader/locks, or if the use of Proximity technologies be
maintained.
b. Determination of a hardware manufacturer that has the broadest range
of ACS hardware that can support the chosen technologies.
c. Qualify and select an ACS manufacturer who can provide the technology
solution determined in Items 1 and 2 above.
2. Design and specify the system upgrade.
3. Receive quotations from authorized resellers of the ACS manufacturer
selected in Item 1 above.
Development of a Security Plan including future Security Technology updates and
integration should be done, following the recommended 5-Point Roadmap.
SUMMARY
By deferring for 24 to 36 months, the replacement of the Access Control System,
Western Washington University can assure itself of enough time to implement the 5-Point
Roadmap so that a cohesive and well thought out Security Plan and Security
Technology Plan can be implemented.
OTHER SERVICES
There are other recommended services that are not included with the Consultant
Design Fees noted above.
PERSONNEL
TRUSYS has been asked to provide manpower recommendations for two aspects of the
systems at WWU.
DISPATCH
Currently dispatch is operating with five (5) full time dispatchers for a 24/7 operation
with no supervisor currently in place. The following, based on a discussion with Chief
Randy Stegmeier, the following is considered the optimum personnel needed.
• 1 – Supervisor: The Supervisor will have the additional duties of covering sick or
unexpectedly absent dispatchers, and to be the Terminal Agency Coordinator.
• 6 – Dispatchers: This will allow normal eight (8) hour shift coverage and minimize
overtime. The Chief expressed a desire to have shifts maintained for a six (6)
month duration, and then rotation can occur.
• 2 – Part Time Dispatchers: These are envisioned to be on call dispatchers to cover
sickness and unexpected absences or short-term planned absences such as
vacations. They are envisioned to be eligible for up to 16-hours per person per
month, unless covering for a longer term duration such as a maternity leave.
SYSTEM OPERATIONS
Upon systems being installed, including fire alarm and mass notification, they become
tools for dispatchers to be notified of conditions that affect the health, safety and
welfare of the students, faculty and staff at WWU. Under this premise, it would make
sense that the same entity that has authority over the dispatchers would have the
ability to control the systems including their maintenance.
Deputy Chief of
Police
Security &
IT Life/Safety Facilities Residences
Systems Manager
Administrative
Assistant
SYSTEMS MAINTENANCE
The current maintenance of two (2) seems to be low, and does not allow for coverage
of the campus should one of the two need to take an extended absence. WWU has
begun to address this by training more personnel. The team should be able to be more
efficient in maintaining the combined fire/life safety systems and security systems if one
or two full time employees are added to this segment of the systems team.
LOCK SHOP
With the administration of the system moved to the System Manager and the
Administrative Assistant, the Lock Shop should be able to fully focus on its purpose of
lock maintenance and repair, issuing of “brass keys” and rekeying of locks.
The existing staff of three (3) should be sufficient for this task.
EXISTING IDS
The existing IDS is an integral part of the EST-3 Synergy system. The system is comprised
of centrally located zone modules and distributed zone modules. In some cases, the
CREDENTIAL SYSTEMS
For the purpose of this report, a credential is any method that allows an authorized user
access via a door into a building or space.
The vast majority of credentials issued at WWU are “brass keys”. Keys are issued either
via the Lock Shop which reports to the WWU Campus Police Chief or via the resident
hall management system using their in-house developed “Keys” database.
When resident dormitory room keys have been lost, and not recovered within a
predetermined time period, residence management notifies the Lock Shop of the need
to rekey the affected door(s) and issue new keys.
Access control “cards” in the form of actual cards or fobs are issued on an as needed
basis via the Lock Shop. WWU ID cards are not currently integrated with an access
control card.
The “cards” are used to access three (3) different access control systems on the
campus. The majority of card readers are on the EST-3 Synergy system with
approximately 165 readers currently in use.
The other two systems are “stand-alone” door readers which must be programmed into
a software program and then upload via a handheld device. The older stand-alone
system is being phased out in lieu of the Schlage AD-200 system. The AD-200 integrated
locksets have the capability to be upgraded from a stand-alone product to a 900 MHz
wireless network product or to a Wiegand product using an RS-485 protocol. There are
46 stand-alone readers at WWU today.
RECOMMENDATIONS
1. Wiring from the EST Panel to the door for the CRC module:
- Use the required unshielded, twisted – low capacitance cable required for
the SAC-3 RS-485 circuit.
- Future Wiring:
o Provide a shielded, twisted 4-conductor cable
o Consider the option of “home-running” one or two CAT-6 cables from
each CRC to the EST-3 panel or to an MDF/IDF as a “future or spare”.
2. Place keypads on a separate extension of the SAC-3 RS-485.
3. Do not mix security monitor modules on the same addressable loop as fire alarm
devices.
4. Home run all security field devices such as door contacts, motion sensors, glass
break sensors, etc… back to the RCC-7 locations. Do not use field located
monitor modules for security purposes.
SYSTEM INTEGRATION
In the market place today, Access Control System (ACS) is the system around which
security system integration is achieved. Many ACS manufacturers realize that they do
not have the ability to design, develop and manufacturer all the needed systems such
as intrusion detection (IDS), video management (VMS), and security intercom (SIS).
Instead they turn to manufacturers of these systems and create partnerships.
The primary method of integration between each of these systems and the ACS is via
TCP/IP network technology. To ensure interoperability between these systems, many
ACS manufacturers offer their partners certification programs; thereby ensuring that as
new versions of software are rolled out, the systems will continue to operate.
RECOMMENDATION
The following are the Milestones that TRUSYS recommends for achieving the desired
integration:
TECHNOLOGY RECOMMENDATIONS
The following 3-step process should be adhered to regardless of whether the 5-Point
Roadmap is used or the ACS is replaced immediately:
1. Determination of the optimum solution for smart card technology, readers and
integrated reader/locks.
2. Determination of a hardware manufacturer that has the broadest range of ACS
hardware that can support the chosen technologies.
EDGE TECHNOLOGY
WWU should create a Request for Information to select the manufacturers who should
be interviewed for their Smart Card and reader and integrated reader/lock
technologies. Based on these interviews, a single source technology should be chosen
for the Control Hardware selection.
CARD TECHNOLOGY
TRUSYS recommends that “Smart Card” technology be adopted at WWU. This will allow
future upgrades of systems such as Dining, the Library, printing, etc… to leverage the
existing Smart Card technology when they are migrated away from bar codes scanners
and mag stripe readers. Most importantly, it will allow WWU to be proactive should WTA
convert in the next few years to an ISO 14443 Compliant Application.
CONTROL HARDWARE
WWU should select an ACS control hardware solution that works with the smart card
reader and integrated smart card reader/lock technology chosen above.
The two primary “open” platforms for access control controller hardware are Mercury
and HID VertX. Mercury appears, in the opinion of TRUSYS, to have a larger percentage
of ACS system manufacturers who have chosen this hardware solution, and both
primary manufacturers of integrated reader/locks have integrations with the Mercury
hardware solution.
Issues that need to be addressed prior to the new system’s installation are:
1. What is the ability of the new system to use the existing wiring infrastructure?
The Mercury stated that they have run in house tests using unshielded CAT-5
cable, and using one of the conductors to create a ground reference at the
power supply.
This approach assumes that the wiring is installed per the National Electrical
Code (NEC) and that the cabling has not been simply laid along the top of
ceiling areas where it can come into direct contact with fluorescent light ballast
or other noise inducing components.
2. Can the existing multi-mode fiber optic network be used for the TCP/IP
communications for the new ACS?
Note: This fiber network is extremely robust, and by using this network where the
existing panels are located, it will help to minimize the installation cost of the new
system by not requiring wiring runs between an MDF and/or IDF in the building.
The decision can be made later whether or not to maintain the above practice
or shift to an MDF/IDF model for buildings that have not yet had ACS installed.
ACS SOFTWARE
Once the card technology and associated readers and integrated reader/lock
technology have been selected and the open control hardware platform selected,
then ACS software manufacturers should be selected via an RFP for interview that can
support the selected technologies.
Features that TRUSYS recommends focusing on during the RFP process are:
SUMMARY
WWU should select an ACS solution that meets their needs and expectations.
TRUSYS recommends that WWU develop a Security Plan before moving forward on any
ACS Solution. Simply using a consultant to tell WWU how and what should be used for
their ACS solution will lead to a short term, successful implementation, but will likely be a
long term failure if a comprehensive Security Plan is not created and implemented.
Funding?
BUILDING BLOCKS
The ability to build a resilient Security Plan will rest upon the ability of WWU to create key
Building Blocks. TRUSYS has found that when the following building blocks are
developed at functional, tactical and strategic levels that a resilient Security Plan can
occur.
TECHNIQUES
TECHNOLOGY TRAINING
1. Teams: People
2. Techniques: How to use Teams, Technology, and Training
3. Technology: Tools to assist and leverage the Security Plan
4. Training: The practical integration of Teams, Techniques, and Technology
TEAMS
Teams, Functional, Tactical, and Strategic, would be discerned during the planning and
preparation of the Security Plan. The ability for the Security Plan to remain resilient and
sustainable is based upon the collective strength of the employees, staff and
stakeholders who comprise the various Teams.
There are several Functional Teams that are suggested to be formed and given
operating parameters at WWU. They are:
1. Operations: This Team would be responsible for the daily operation and
programming of the security technologies, including ACS. Note: As previously
mentioned, it is highly desired to have a single management position that has
accountability and responsibility for the daily operation of the Security
Technology component, while still working within the Team environment. This
should be considered as an “Exempt” position versus a “Classified” position at
WWU.
2. Maintenance: This Team would likely be comprised of various trades from
Facilities, IT, and the Lock Shop, and would have representation from the
Operations Team.
3. Response: This would be primarily comprised of the Police Dispatch and
Uniformed Officers.
4. Administrative: This would be comprised of all users with access to the client
software, and who can assign privileges to card holders within their group and to
Another primary task would be to secure funding for maintaining and operating
the aspects of the Security Plan that are already in place, and to secure funding
for upcoming milestones that are planned as enhancements or modifications to
the Security Plan.
2. Strategic Response: This Team would function during security events where such
things as press releases, press interviews, and notification to families are required.
TECHNIQUES
Teams must have Techniques based upon the task at hand, as well as on the structure
of the organization, legislation, and stakeholder involvement. There can, of course, be
different Techniques employed for different security events; however, at a minimum
there are Assessment, Operational, and Compliance Techniques.
TECHNOLOGIES
In order to support the Teams and their Techniques, Technologies must be introduced
based on strategies, how those strategies are employed, and the tasks that need to be
accomplished. Technology must not drive the process; it must support the Teams and
the Techniques that are employed to accomplish their mission.
TRAINING
Training is critical for implementing a successful Security Plan. Training must be
continuous for all Teams, in all areas in which they are working. Without Training, the
Teams will not be current in the Techniques or the Technologies they are using, or as
new Techniques and Technologies emerge.
Issue Answer
Desired Operating Software? Linux
Desired Database? Oracle
Desired Hardware (COTS, Appliance, VM)? VMware
Client Stations? 1/Building
Concurrent Licensing
Table 4: New ACS Software Configuration
The group was able to clearly articulate its preference for operating systems and data
base engines.
SUMMARY
The repeated theme heard in the Stakeholders’ Meeting and in individual interviews
was that of cost, i.e. budget. Many Stakeholders are unclear on what the true cost of
ownership will be for a new ACS, but general consensus is that an integrated system
and data base approach is necessary and desired.
Installation
$?
Maintenance
New Building
$? Space $?
ACS
SSA $?
POLICY
Effective Date: September 1, 2015 Authority: RCW 28B.35.120 SAAM Chapter 20
Approved By: President Bruce Shepard WAC 516-24-001
Definitions:
Access Control – The means, methods and practices used to minimize risk to persons and property
by regulating entry to buildings and spaces. Control activities may be preventative and/or detective.
Access Device – Any University-authorized device used to lock/unlock mechanical and electronic
door hardware, including traditional metal keys, ID card, application and/or any other electronic
means of access.
Access Control Administrator – A position designated to have operational oversight for access
control to a defined grouping of buildings, facilities or spaces, and is responsible for determining
operating hours.
Authorized Individual – An individual (i.e. University faculty, staff, student, volunteer or contractor)
for whom certain access privileges have been granted by an Area Access Manager.
Departmental Key Controllers – Positions designated by an Area Access Manager to perform access
administrative duties in accordance with University policies and procedures.
1. Vice President for Business and Financial Affairs Ensures an Appropriate and Effective
Access Control Management Process is Established
The Vice President for Business and Financial Affairs (VP for BFA) will ensure physical access
processes:
The VP for BFA appoints members of the Campus Access Control Committee (CACC) and
approves its charter.
d) Advise ACAs in the development of processes for requesting and granting access
devices within their areas of responsibility; and
e) Interpret this policy to resolve individual disputes and address questions pertaining to
access control.
3. Area Control Authorities Define the Process for Requesting and Granting Access
Devices
ACAs designate Area Access Managers (AAM) for areas and spaces assigned by the CACC.
The specific process for requesting, and the criteria used for granting access and access
devices, is defined by the ACA in accordance with campus guiding documents and divisional
guidance. The following underlying principles apply:
c) Granting access is to always favor safety and security of persons and property over the
convenience of the requester.
AAMs may only grant access privileges within the parameters established by an ACA, and
only for the areas assigned by the ACA.
4. Guiding Documents
Guiding documents are an extension of this policy. The CAAC, ACAs, AAMs, and Authorized
Individuals are required to follow approved guidelines in order to effectively manage access to
University facilities. Guiding documents will include, but are not limited to:
a) Guidelines for Issuing Access Devices - Describes levels of access and criteria for
granting access privileges and access devices to authorized individuals.
b) Identification of ACAs and AAMs and departmental responsibilities for access control.
5. Access to All University Owned and Leased Facilities and Space Is Limited to
Authorized Individuals
a) During scheduled hours, academic and administrative buildings and spaces are open
for general use by employees, students, and the public for educational, work related,
and special event purposes.
1) Students,
2) Guests of students,
3) Employees,
5) Contractors.
6. Visitors, Students and Employees Must Comply with University Conduct Regulations
In addition to employees and students, guests, contractors and visitors on University property
are expected to comply with all University policies and state and federal regulations related to:
b) Authorized individuals must sign for the access device, indicating they understand and
will comply with individual rules and responsibilities for access devices,
iii. Upon request for any reason at any time by an Executive Officer, Access
Control Administrator, Area Access Manager, Supervisor, or Director of
Public Safety.
d) Failure to return access devices by an authorized individual may result in one or more
of the following:
Authorized individuals who are assigned an access device are prohibited from:
The Director of Public Safety may independently conduct periodic audits of issued access control
devices or may request that Access Control Administrators and Area Access Managers conduct
audits of the area(s) for which they have oversight.
Data, telephony, and CATV communications are delivered on campus via fiber optic and
copper cable plants both within and between buildings. Bond Hall is the primary
demarcation point for all internet, telephone, and CATV service to campus from outside
providers. Fiber optic cabling between buildings on campus is both single-mode and
multi-mode (62.5 micron) fiber. The majority of buildings on campus are wired with a mix
of Cat5e and Cat6 copper cabling, though some buildings still contain Cat5 or Cat3
wiring.
Data network service is delivered to all users by Cisco routing, switching, wireless, and
security systems. Analog telephone service is delivered to approximately 4000 users
(including elevators, emergency phones, fax machines, and other services/facilities) via
a Nortel PBX located in Bond Hall, and three fiber remotes in AC, CF, and the
Commissary. IP telephony is delivered to approximately 400 users over the data network
infrastructure using Microsoft Skype4Business; it interfaces with analog gateways in
Bond Hall and AC to connect to both the PBX and the wider PSTN. CATV services are
delivered to campus from a Comcast head-end in Bond Hall via a series of transmitters,
fiber nodes, and amplifiers across campus. The CATV network includes a return path to
Comcast to allow campus to broadcast programming on a community channel in greater
Whatcom County.
The wired and wireless data network is divided into academic and residential sections.
The academic data network is architected in an active-passive redundant core design
with multiple failover points between the two legs. The data network is logically arrayed
in three tiers—the redundant core provides routing between the different nodes in the
distribution layer (routers and switches that service individual buildings or groups of
buildings on campus), and the distribution layer distributes traffic to the access layer
devices (switches that service the endpoints—computers, servers, printers, wireless,
etc.). The residential network also uses a three-tiered logical design, with a single core
router attached to the redundant core routers of the academic network.
All services and remote site connections pass through Bond Hall—no endpoint on
campus can access CATV, internet, or the PSTN without going through Bond Hall to do
so. In addition to being the demarcation point for internet, PSTN, and CATV service,
Bond Hall serves as the primary datacenter for the campus. The secondary datacenter is
located on the second floor of AC, with fiber optic cable on above-ground utility poles
connecting AC to the campus network. Internet service is provided via a 10Gbs circuit
from the primary provider, and a 1Gbs circuit from the secondary/backup provider. From
Bond Hall, Comcast and CenturyLink also maintain their own network demarcations to
provide services directly to endpoints on our campus, such as contractors or vendors.
F.4 Recommendations
• Operationalize the costs of network equipment maintenance and replacement, WWU
UTMP F-6 June 2017 and establish a fully-funded strategic plan for the cyclical
replacement and expansion of core-, distribution-, and access-layer network devices,
including a continued expansion of the wireless network and accompanying access-layer
port capacity.
• Expand fiber capacity between buildings, including upgrading fiber to recommended
latest spec.
• Run new fiber optic cables to ensure direct fiber paths exist from each building to each
of the two cores, plus additional capacity directly connecting the cores to each other.
• Evaluate more secure/resilient locations on south campus for the second network core,
such as Campus Services or Commissary, and relocate the core infrastructure there.
• Bring additional fiber to a new campus location (such as a new network core) to serve as
a secondary ISP circuit, physically separating the two ISP connections into separate
facilities.
• Consolidate datacenter services in Bond Hall, with a smaller redundant location on
campus for business continuity of critical services only. Use cost savings from vacating
the AC datacenter to move disaster recovery functions to cloud-hosted platforms.
• Devote time and resources to further investigating Passive Optical Networks (PON) as
an alternative to copper cabling in new/remodeled buildings.
• Incorporate central networking/telecommunications team in the planning, configuration,
security, and maintenance of data networks other than just academic and residential (i.e.
BAC, lighting control, etc.).
• Fully fund the migration of PBX telephone users to IP telephony services, and replace
the existing PBX with a smaller PBX to provide telephony to non-IP telephony
compatible services only (elevators, fax machines, etc.).
• Fund and strategically plan for the upgrade of all MDF/IDFs on campus to 208v power.
Bring humidity/temperature and lighting up to industry specifications. Upgrade and
standardize all 110-block termination fields to new campus standard (current standard is
Commscope Visipatch system), and upgrade all hydra cables to current communication
cable specifications, subject to the study and analysis of PON systems.
• Fund and strategically plan for the upgrade of all horizontal cable systems to latest
specification, subject to the study and analysis of PON systems.
F.5 Conclusions
Campus telecommunications is at a critical point in its lifecycle. The data network is resilient, but nearing
the end of its supported life with no active plan for upgrade. The analog telephone network is at critical
risk, with transition to newer services stymied by lack of funding and lack of clear institutional
prioritization and direction. The CATV network is in a state of transition, where institutional leadership
has sent mixed signals by investing in both an IP-based distribution for the residence halls and in
production/broadcast facilities that rely on non-IP based distribution for academic programs.
The challenges and opportunities facing Western's telecommunications services and infrastructure are
not unique; others have weathered these storms before, and we can do so as well with adequate
funding, coordination, and commitment from the university to a strategic vision for the future.