Credential Technologies: You may not be as protected as you think

By Neal Bellamy, IT Director at Kenton Brothers

Credential TechnologiesToday, I want to talk about credential technology. While not an extremely exciting topic, it can be, and often is the weakest link in many organization’s access control system. Remember that an attacker doesn’t need to get through every defense in your system, most often they just need to get past the weakest one (or two).

Let’s start with how cards and readers work.

Any RFID reader, including the ones used for access control, puts out an electromagnetic field around the reader. This field is usually measured in inches, but in special readers like a Nedap long-range reader, fields can be measured in feet.

When a credential (card, fob, wristband, sticker, etc.) passes through the field, it electrifies the antenna giving the chip on the credential enough electricity to transmit the data stored on the chip. Most often the data that is stored is the “Card number”. I put it in quotes because that “Card number” could be many things.

Next, we need to talk about card numbers or more specifically card formats.

Unfortunately, most card formats are simple and relatively easy to guess. The most common card formation is 26 bits in length. HID calls this H10301. The first 8 bits designate the facility code and the next 16 bits designate the card number itself. The facility code is a way to group the cards together and in theory, verify that the card belongs to the access control system.

The low bit count means that there are only 256 possible facility codes and 65,535 card numbers. For those people paying attention to the details, the extra 2 bits are used for error checking.

Most people start with card number 1 and work their way up. There are other card formats like 33-bit, 37-bit, 40-bit, and so on. Each increases the possible facility code and card number options. The important takeaway is that once an attacker has the card format, facility code, and card number of a person who has access, they can gain access to your facility.

Encryption

Like most things in commercial security, encryption is a way to combat the wrong people seeing the real card number. Encryption and card formats are independent of each other. You can have a 26-bit card that uses encryption and a 26-bit card that does not use encryption. That is based on the card technology.

Card technology like Prox and Indala are not encrypted. This means that almost any card reader can read the actual card format, facility code, and card number, it just has to get close enough to a card that has access.

Some technologies are encrypted but have already been cracked. Examples of these are Mifare Classic, HID iclass Classic, etc. Because the technology is already cracked, there are several ways of reading the encrypted data, and then applying the workaround to get to the actual card data again. Using a cracked technology is better than unencrypted, but it is still not advised.

Some technologies are not yet cracked like Mifare EV3 and HID iclass SEOS.

Encryption Usage

Credential TechnologiesWhen an encrypted technology is in use, both the card and reader must be using the same set of keys. Public/Private key is a long topic, but effectively a matching pair of keys are used to encrypt and decrypt data. (More information here.)

This means that readers and credentials are matched for the different manufacturers. If you are using HID readers, you almost always need to use HID credentials. Even with an encrypted, uncracked, card technology, the most commonly sold readers and credentials use the same key pair across all readers and credentials. This means that anyone can buy the latest HID reader to read almost every HID card ever sold.

There are special programs where a business can “own” its own set of keys. Another option is to use a system that generates a unique key and then can use that key to encrypt the cards specifically for a given system like Gallagher.

I know this was a lot of information, so let’s distill it a bit.

First, make sure you are using encrypted card technology.

Second, use the latest technology when you are using encryption. This will be based on the card readers you are using.

Finally, if at all possible, own your public/private keys. Sign up for a unique key system like Corporate 1000, or use a system like Gallagher to generate a unique key for your system.

If you have more questions or need help with your current/future commercial security solution, please give us a call.

Unveiling the New AXIS P1468-XLE: Revolutionizing Surveillance in Hazardous Environments

By David Strickland, Vice President of Kenton Brothers

Unveiling the New AXIS P1468-XLE: Revolutionizing Surveillance in Hazardous EnvironmentsAs part of the Kenton Brothers Systems for Security core values: Innovation, we strive not only stay on top of the newest technology but bring it to you, our customers, when we come across true game changers. The Axis P1468-XLE is one those game changers.

The NEW AXIS P1468-XLE Explosion-Protected Bullet Camera has emerged as a groundbreaking solution tailored for Class 1/Division 2 and ATEX Zone 2 environments. This state-of-the-art camera redefines safety and security, offering unprecedented features designed to meet the stringent requirements of hazardous areas.

Class 1/Division 2 and ATEX Zone 2 environments are known for their potentially explosive atmospheres, often found in industries such as oil and gas, petrochemicals, distilleries and manufacturing. In these settings, conventional surveillance systems may pose safety risks due to the presence of flammable gases, vapors, or dust. The AXIS P1468-XLE addresses this challenge by providing a robust and reliable solution that ensures continuous monitoring without compromising safety.

Key Features:

Explosion-Protected Design:

The AXIS P1468-XLE is engineered with an explosion-protected housing, ensuring that it can operate safely in hazardous environments. This design minimizes the risk of ignition in the presence of combustible substances, making it an ideal choice for areas where safety is paramount.

Built In Plume Detection

Smoke alert analytics monitors for signs of smoke or fire in potentially combustible environments. In operational efficiency applications, “There’s no smoke without fire” is a proverb most of us are familiar with, but even taking its literal meaning is of value: smoke is an early warning sign of a much more serious potential issue if not tackled quickly.

In any environment – from public spaces to warehouses, from stadiums to factories – it’s obvious to say that smoke itself and certainly the fire that might follow is a serious risk to human life, let alone the damage it can cause to buildings and their contents.

But in those environments where even the smallest fire or source of ignition could cause a catastrophic explosion, rapid reaction is absolutely essential. Modern network cameras combined with advanced image analysis can be used to detect possible signs of smoke or fire in a scene, complementing and providing valuable time before smoke is detected using traditional methods.

High-Quality Imaging:

Equipped with advanced imaging capabilities, this camera delivers high-resolution video even in challenging lighting conditions. Its ability to capture clear and detailed footage ensures that security personnel can identify potential threats or incidents with precision.

Unveiling the New AXIS P1468-XLE: Revolutionizing Surveillance in Hazardous Environments

Extended Low-Light Performance:

Unveiling the New AXIS P1468-XLE: Revolutionizing Surveillance in Hazardous EnvironmentsThe camera’s low-light capabilities are enhanced, allowing it to capture usable footage in conditions with minimal illumination. This feature is crucial for maintaining surveillance effectiveness during nighttime or in poorly lit areas.

Integrated Infrared (IR) Illumination:

The AXIS P1468-XLE comes equipped with integrated IR illumination, extending its surveillance capabilities into the dark. This feature is essential for 24/7 monitoring, providing continuous security coverage regardless of external lighting conditions.

Remote Management and Monitoring:

The camera is designed to facilitate remote management and monitoring, allowing security personnel to access live feeds and recorded footage from a central location. This feature enhances situational awareness and enables swift response to potential incidents.

Compliance with Industry Standards:

The AXIS P1468-XLE complies with international standards and certifications for hazardous environments, including ATEX and UL certifications. This ensures that the camera meets the strict safety requirements necessary for deployment in Class 1/Division 2 and ATEX Zone 2 areas.

Benefits:

Enhanced Safety:

The foremost benefit of the AXIS P1468-XLE is its contribution to enhanced safety. By providing reliable surveillance in hazardous environments, it helps prevent incidents and ensures the well-being of personnel and assets.

Operational Continuity:

The camera’s robust design and advanced features enable it to operate seamlessly in challenging conditions. This contributes to operational continuity by maintaining surveillance capabilities in all circumstances.

Cost-Effective Security:

Unveiling the New AXIS P1468-XLE: Revolutionizing Surveillance in Hazardous EnvironmentsInvesting in a specialized camera designed for hazardous environments is a cost-effective solution. The AXIS P1468-XLE minimizes the risk of equipment failure and potential damage caused by explosive atmospheres, reducing the overall cost of security infrastructure.

Regulatory Compliance:

With its adherence to international safety standards, the AXIS P1468-XLE assists organizations in meeting regulatory requirements for surveillance in hazardous locations. This compliance is essential for legal and insurance purposes.

The AXIS P1468-XLE

The AXIS P1468-XLE Explosion-Protected Bullet Camera stands at the forefront of innovation, addressing the unique challenges posed by Class 1/Division 2 and ATEX Zone 2 environments. Its combination of advanced features, compliance with safety standards, and commitment to reliability make it an indispensable tool for industries where safety and security are non-negotiable. As technology continues to evolve, the AXIS P1468-XLE sets a new standard for surveillance in hazardous environments, ensuring that organizations can embrace the future with confidence and peace of mind.

Give us a call today to demo one of these amazing cameras!

CPTED Part 3: Territorial Reinforcement and Maintenance

By Kevin Whaley, CPP, Sr. Security Consultant at Kenton Brothers

Welcome to Part 3 of our discussion about Crime Prevention Through Environmental Design (CPTED).

In Part 1, I introduced the concept of CPTED and the importance of ensuring CPTED principles are considered when developing or enhancing your security program. In Part 2, we dove into greater detail on the concepts of Natural Surveillance & Natural Access Control. In Part 3 of the series, we will be looking at Territorial Reinforcement and Maintenance.

As a quick recap: in the first part, we touched on the four key overlapping concepts of CPTED which include:
  1. Natural Surveillance
  2. Natural Access Control
  3. Territorial Reinforcement
  4. Maintenance
In the second installment, we went into greater detail about the in’s & out’s of Natural Surveillance & Natural Access Control such as;
  • Natural Surveillance – the placement of physical features, activities and people in a way that maximized visibility from the surrounding environment.
    • WHY? It increases the threat of apprehension by taking steps to increase the perception that people can be seen.
  • Natural Access Control – Natural access control means controlling access to a site. People are physically guided through a space by the strategic design of streets, sidewalks, building entrances, and landscaping.
    • Clearly defines entryways and guides personnel to specific entrances that are well lit and overlooked by surrounding areas.
Just as a reminder, the overall goal in the successful implementation a CPTED plan of action, we must understand that all human space:
  • Has some designated purpose.
  • Has social, cultural, legal, or physical definitions (such as expectations or regulations) that prescribe the desired and acceptable behaviors.
  • Is designed to support and control the desired and acceptable behaviors.
With that understanding in mind, our approach should focus on:
  • Manipulating the physical environment to produce behavior effects that reduce the fear and incidence of certain types of criminal acts;
  • Understanding and modifying people’s behavior in relation to their physical environment
  • Redesigning space or using it differently to encourage desirable behaviors and discourage illegitimate activities; and
  • Reducing the conflicts between incompatible building users and building uses, with the goal of eliminating “no person’s land” that no one takes ownership of.

There are various controls that can be implemented that can supplement or support the approaches listed above.

CPTED Part 3: Territorial Reinforcement and Maintenance

Territorial Reinforcement and Maintenance of your CPTED program.

Territorial Reinforcement:

Territorial reinforcement involves establishing a sense of ownership and belonging in a specific space, which can be achieved through various design elements and strategies. When a space appears to be clearly defined and “owned” by a particular group or individual, it may discourage potential criminals by making them feel like trespassers or intruders and that the potential for detection is high.

Importance in CPTED: By implementing territorial reinforcement, CPTED aims to deter criminal activity by promoting the perception of active ownership and surveillance. A well-defined and cared-for area signals to potential offenders that their presence is likely to be noticed and that there is a higher risk of detection and apprehension. This may lead to a decrease in the opportunities for criminal acts to occur, as criminals tend to avoid spaces where they feel more vulnerable and exposed.

Examples of Territorial Reinforcement:
  1. Clear boundaries and property lines demarcated with fences, hedges, or other physical barriers.
  2. Well-maintained landscaping and exterior areas, indicating active use and care.
  3. Signage and symbols that represent community ownership or surveillance, such as neighborhood watch signs.
CPTED Part 3: Territorial Reinforcement and MaintenanceThese examples of territorial reinforcement can (and should be) enhanced with other physical security measures including but not limited to:
  1. Surveillance cameras
  2. Speakers with pre-recorded messages stating that the person is being watched or that authorities have been called.
  3. Sufficient illumination
  4. Security officers
  5. Access Controls
  6. Active/Passive intrusion sensors

However, no matter how advanced or intricate your CPTED program is, it can deteriorate and become obsolete without proper care and maintenance.

CPTED Maintenance:

CPTED maintenance involves sustaining a sense of ownership and control over a space through ongoing upkeep and community involvement. Neglected or poorly maintained areas can attract criminal activity as they signal a lack of guardianship and a reduced risk of detection.

Importance in CPTED: Regular maintenance of public and private spaces is critical to the success of CPTED. Well-maintained environments foster a sense of pride, ownership, and responsibility among community members. It reinforces the idea that residents are actively invested in their surroundings and are vigilant against criminal behavior. This collective effort makes it less attractive for criminals to target such areas, as they are more likely to be noticed and reported by the community.

Examples of Territorial Maintenance:
  • Prompt repair of broken windows, damaged fences, or graffiti.
  • Adequate lighting to ensure visibility and reduce hiding spots.
  • Community engagement and participation in the upkeep of shared spaces.

CPTED Part 3: Territorial Reinforcement and Maintenance

 

The image to the right is an example of POOR CPTED maintenance. As you can see, the vegetation is growing through the fence line, damaging it significantly and there are various areas where intruders have cut and recut through the fence line. The lack of prompt repair, landscaping maintenance, and lack of illumination, make this industrial facility a tempting target.

In conclusion, territorial reinforcement and maintenance are essential components of Crime Prevention Through Environmental Design. By creating a sense of ownership and responsibility within a community and ensuring that spaces are well-cared for, CPTED aims to discourage criminal activity and promote a safer environment for residents and visitors alike. These proactive measures empower communities to take control of their surroundings and play an active role in crime prevention.

I hope you will watch out for the final installment where we will review the concepts we’ve discussed and how they all can be tied together.

Have more questions about CPTED or would like an assessment? Give us a call at 816-842-3700 and our board certified security professionals will get you taken care of!

In September, Almost 500 Missouri Schools Received Safety Grant Awards

By Gina Stuelke, CEO of Kenton Brothers

2023 Missouri School Safety Grant AwardsFor Kenton Brothers, ensuring the safety and security of students, teachers, and staff in schools across the country is of paramount importance. In recent years, the need for robust physical security measures in school districts has become increasingly evident due to unfortunate incidents of violence and threats. One of our areas of expertise is commercial security solutions for school districts, and recent news about safety grant awards for Missouri schools caught our attention.

On June 30, 2023, Governor Mike Parson signed House Bill No. 2 for Fiscal Year 2024 (FY2024) which appropriated $50 million in funding for a second round of School Safety Grants to support physical safety improvements in local education agencies (LEAs) and nonpublic schools (NPSs) across the state. These funds will be distributed through the Department of Elementary and Secondary Education’s FY24 School Safety Grant Program. These grants were awarded to almost 500 Missouri schools in September. (For a complete list of Missouri schools receiving these funds, click here.)

10 Ways These Funds Could Be Used to Improve School Safety

2023 Missouri School Safety Grant AwardsThe Department of Homeland Security (DHS) has outlined various recommendations for enhancing school security. In this article, we discuss the top 10 physical security upgrades that school districts must consider implementing immediately, based on DHS guidelines.

1. Access Control Systems

One of the first and foremost security upgrades school districts should make is implementing an access control system. These systems restrict unauthorized entry into school buildings by requiring individuals to use credentials, such as key cards, PINs, or biometric data, to gain access. Properly designed access control systems can significantly reduce the risk of unauthorized individuals entering school premises and pose a crucial layer of school security. All Access control systems implemented in schools should include door position sensors to report when doors are propped open or forced open anywhere around the exterior of the building.

DHS Recommendation: DHS emphasizes the importance of access control systems to deter and detect intruders. Schools should consider a layered approach that includes access control points at all building entrances.

2. IP Video Surveillance Cameras

Surveillance cameras play a crucial role in monitoring school premises and deterring criminal activity. Modern cameras come equipped with advanced features such as high-definition recording, night vision, and motion detection. Placing cameras strategically in and around school buildings can help identify and document suspicious behavior.

DHS Recommendation: The DHS recommends schools install surveillance cameras at key locations, including entrances, hallways, parking lots, and outdoor areas. Additionally, schools should consider integrating their camera systems with an alarm monitoring service.

3. Intrusion Detection Systems

2023 Missouri School Safety Grant AwardsIntrusion detection systems are designed to detect unauthorized access to buildings and alert security personnel or authorities immediately. These systems can be connected to doors, windows, and other access points, triggering alarms in the event of a breach. Early detection of intruders is critical for swift response and mitigation.

DHS Recommendation: DHS encourages the use of intrusion detection systems and recommends regular testing and maintenance to ensure their effectiveness.

4. Bulletproof Glass and Ballistic Barriers

Incorporating bulletproof glass and ballistic barriers in critical areas of school buildings can provide an extra layer of protection against armed threats. These materials are designed to withstand various levels of impact and can buy precious time for security personnel and occupants during an active shooter situation. There have been large, innovative strides in this technology recently. These innovations include fire and escape improvements all allowing for quicker egress.

DHS Recommendation: The DHS recommends considering the use of bulletproof glass and ballistic barriers in areas such as main entrances and administrative offices.

5. Visitor Management Systems

A visitor management system is a digital solution that helps schools monitor and control visitor access. These systems require visitors to register upon entry, provide identification, and undergo background checks when necessary. By implementing visitor management systems, schools can better control who enters their premises.

DHS Recommendation: The DHS suggests that schools should have a clear visitor policy in place, including the use of visitor management systems, to enhance security.

6. Security Fencing

2023 Missouri School Safety Grant AwardsSecurity fencing is another essential security upgrade. It provides a physical barrier to deter intruders and prevent unauthorized access to the school grounds. Fencing can be combined with controlled entry points, surveillance cameras, and alarm systems to create a comprehensive security solution.

DHS Recommendation: According to DHS guidelines, school districts should ensure that fencing is properly maintained, adequately secured, and complements other security measures that are in place.

7. Security Lighting

Proper lighting can significantly improve the security of school premises, as it deters criminals and enhances surveillance capabilities. Well-lit areas also help students and staff feel safer when entering or exiting school buildings during dark hours.

DHS Recommendation: The DHS suggests that schools evaluate their outdoor lighting and consider upgrading to motion-activated lighting in vulnerable areas

8. Panic Alarms

In emergency situations, quick communication with law enforcement is vital. Panic alarms, often connected to local police departments, enable immediate alerts in case of threats or emergencies. These alarms can be discreetly activated by school personnel and trigger a rapid response from law enforcement agencies.

DHS Recommendation: DHS emphasizes the importance of panic alarms for notifying authorities in real-time during security incidents.

9. Lockdown Procedures and Hardware

2023 Missouri School Safety Grant AwardsEffective lockdown procedures are crucial for safeguarding students and staff during emergencies. Schools should invest in secure locks and hardware for classroom and office doors to ensure that they can be easily locked and barricaded from the inside during a lockdown. Training staff and students on these procedures is equally important.

DHS Recommendation: The DHS recommends that schools develop and practice lockdown procedures regularly, including drills and training sessions. They also advise installing locks that can be locked from the inside without requiring keys.

10. Security Training and Education

Last but certainly not least, the DHS strongly emphasizes the importance of security training and education for school staff and students. Ensuring that everyone is well-informed about security protocols, emergency procedures, and situational awareness can greatly enhance the overall safety of the school environment. Even the greatest systems will not have any value if the people that use them every day don’t understand how to use them effectively.

DHS Recommendation: Regular training and education programs should be implemented to teach staff and students how to recognize and respond to security threats effectively.

In Closing…

The safety and security of our schools must be a top priority. By following the Department of Homeland Security’s recommendations and implementing these top 10 physical security upgrades, school districts can create a safer and more secure environment for students, teachers, and staff. It’s essential for schools to remain vigilant, regularly assess their security measures, and adapt to emerging threats to ensure the protection of their educational communities.

Kenton Brothers Systems for Security works closely with school districts and universities all over the Midwest to create effective, manageable security systems. Give us a call today to have our team of certified security consultants help create your plan.

Enhancing Law Enforcement with BriefCam: Doing More with Less

By David Strickland, Vice President of Kenton Brothers

Recently, Kenton Brothers was approached by a large university police department about helping them solve a few key issues.

  1. Doing more with less – Facing staffing shortages and a growing student population the campus police needed to leverage technology to keep safety and security a top-level deliverable.
  2. Exponentially increasing crime and criminal capabilities presented steeper challenges than they traditionally faced, and unsolved cases had risen beyond the resources available to investigate them properly.
  3. Surveillance footage was an ever-increasing mountain of data to pour through and required more and more resources from an investigation point of view.

BriefCam LogoPresented with these obstacles, Kenton Brothers went to work on understanding their current capabilities and their infrastructure through our Needs Analysis Assessment. As a part of our KB Advantage process, we set out to interview and completely understand the organizations needs from multiple points of view. Administration, HR, Facilities, Police Officers and Students. After a full assessment, Kenton Brothers recommended BriefCam analytics to solve their most pressing issues.

For the campus police department, staying ahead of criminal activity and ensuring public safety is a paramount concern. To meet these challenges head-on, law enforcement agencies are increasingly turning to cutting-edge technologies to aid their efforts. One such groundbreaking tool that has been making waves in the law enforcement community is BriefCam. BriefCam is a powerful video analytics platform that offers numerous advantages for law enforcement agencies.

Evidence Collection, Documentation and Management

In criminal investigations, the collection and preservation of evidence are paramount. BriefCam assists law enforcement in this critical aspect by enabling the easy extraction of relevant video clips for use in court proceedings. This ensures that the chain of custody is maintained and that evidence is admissible in court, ultimately leading to more successful prosecutions.

Managing a large volume of video evidence can be challenging for law enforcement agencies. BriefCam offers tools for tagging, categorizing, and organizing video clips, making it easier to manage and retrieve evidence as needed. This streamlined approach to case management improves efficiency and ensures that nothing is overlooked during the investigative process.

Rapid Video Review and Analysis

One of the most significant advantages of using BriefCam in law enforcement is its ability to rapidly review and analyze large volumes of video footage. Traditional video review methods can be time-consuming and labor-intensive, often requiring officers to manually sift through hours of footage. BriefCam’s advanced video analytics capabilities allow law enforcement agencies to quickly identify and extract relevant information from video recordings, saving valuable time and resources.

Enhanced Investigative Capabilities

BriefCam empowers investigators by enabling them to easily search for specific events or objects within video footage. Its powerful search algorithms can identify and track objects, individuals, or vehicles across multiple camera feeds and timeframes. This capability is particularly valuable in solving crimes, locating missing persons, and tracking down suspects, as it significantly accelerates the investigative process.

Crime Prevention and Public Safety

Preventing crime and ensuring public safety are the primary goals of any law enforcement agency. BriefCam plays a crucial role in achieving these objectives by providing real-time alerts and notifications. It can detect and trigger alerts for various predefined events, such as unattended bags, loitering, or perimeter breaches. This proactive approach allows law enforcement to respond swiftly to potential threats and take preventive measures to mitigate risks.

Data Visualization and Pattern Analysis

BriefCam’s data visualization tools enable law enforcement agencies to gain insights into crime patterns and trends. By analyzing historical video data, agencies can identify recurring patterns, hotspots, and potential areas of concern. This information is invaluable for strategic planning, resource allocation, and deploying officers more effectively to deter criminal activities.

Improved Resource Allocation

Efficient resource allocation is essential for law enforcement agencies to respond effectively to emergencies and maintain community safety.  BriefCam’s analytics help agencies optimize resource allocation by providing real-time information on incident locations and severity. This ensures that officers are deployed where they are needed most, reducing response times and enhancing overall public safety.

BriefCam

Cost-Efficiency

While adopting new technology can be expensive, the long-term cost savings of using BriefCam are significant. By automating labor-intensive tasks and improving overall operational efficiency, law enforcement agencies can reduce overtime costs and allocate resources more wisely. Additionally, the ability to deter and prevent crimes can lead to reduced expenses related to investigations and court proceedings.

Integration with Existing Systems

BriefCam is designed to seamlessly integrate with existing video surveillance systems, making it a versatile and practical choice for law enforcement agencies. This compatibility allows agencies to leverage their existing infrastructure while enhancing their capabilities with BriefCam’s advanced analytics and features.

BriefCam

The Result

A year later, the police department reports “amazing success” with the new technology and how it is impacting their day-to-day police duties. BriefCam has emerged as a powerful ally for law enforcement agencies in their mission to protect and serve their communities. Its rapid video review and analysis, investigative capabilities, crime prevention tools, data visualization, and numerous other features make it an indispensable tool in the modern law enforcement toolkit. By embracing this technology, agencies can enhance their operational efficiency, improve public safety, and better fulfill their crucial role in society. As technology continues to advance, BriefCam and similar tools will undoubtedly play an increasingly vital role in the future of law enforcement especially on campus.

Do you face similar challenges? If so, please give us a call and let us do a no cost KB Advantage Needs Analysis for you.

Learn More About BriefCam

Briefcam