Our Technician’s Secret Sauce: Ongoing training, learning from peers and working as a team.

By Neal Bellamy, IT Director at Kenton Brothers

I want to take a moment and talk about our amazing commercial security technicians. Technicians are where the rubber meets the road for Kenton Brothers. They are the ones who solve problems every day and make the systems work to protect people, property, and possessions.

Kenton Brothers Technician Training

It all starts with training.

Kenton Brothers supports many different technologies and products. Some of our team supports keying, master key systems, safety deposit boxes, safes, and more. Another part of our team supports commercial access control, video surveillance, intrusion detection, and analytics. Some of our people know a little bit about all of it… and some of them know a lot about some of it.

With such a wide breadth and depth related to what they do, training is incredibly important. When a technician starts with Kenton Brothers, we have them do several training classes to get up to speed. It gives newer security technicians an introduction to the way we provide commercial security solutions and the language that we use. Ongoing training gives the more experienced technicians a refresher. After earning their stripes, a career development plan is created to help them learn new or deeper skills to make them even more versatile and capable.

Kenton Brothers Technician Training

Learning from peers.

Training and classes can get you so far, but learning from your fellow technicians is just as valuable. Seasoned technicians take their skills and turn them into an art. Several on our team have been a part of Kenton Brothers for over a decade. They take great pride in their work and have learned how to hone their craft. Part of being a craftsman is teaching the next person how to be an artist themselves. Thankfully, our technicians love to share their knowledge with newer technicians.

Availability.

I also want to give some appreciation to our team for always being available. Sure, like many service based companies we have an after-hours program. This gives you peace of mind that your company can be secure even after many of us have gone home for the day. But this is more than that. Our technicians pick up the phone when another tech needs help. There are many oddities in the security world and sometimes you need a “phone a friend” to figure out what you’re looking at. I am proud of the fact that our team is great about helping each other out, even when it isn’t easy or required.

The Kenton Brothers technicians are the best team I’ve ever had the privilege to work with. They are some of the best in their industry, with a ton of knowledge and great big hearts.

If you want to be part of a team like that, and are willing to put in the work to become one of the best, give us a shout at careers@kentonbrothers.com. We are always looking for experienced security techs as well as good people who are ready to start a new career in commercial security!

Chain of Custody in Commercial Security

Chain of CustodyBy Ryan Kaullen, Field Services Manager at Kenton Brothers

Many of you know that our goal is to protect people, property, and possessions. Something that comes up related to this goal is Chain of Custody.

You may be wondering what Kenton Brothers has to do with Chain of Custody and how we would be involved. Unfortunately, part of the work we do in the commercial security industry is capturing evidence. This evidence comes in many forms. Evidence may include video surveillance recordings, security system audit trails and more. We capture this information to help protect companies from theft, fraud, and work place incidents. There are plenty of scenarios that result in law enforcement being involved.

What is Chain of Custody?

Chain of Custody is the documentation of chronological events related to an incident. Protection of how the evidence is handled, who handles it and more matters. The idea is that law enforcement needs to be able to review and use video and other forms of documentation as evidence in a trial or hearing.

A Recent Example for a Banking Client

Chain of CustodyWe recently received a Chain of Custody request from one of our banking clients. They had an event that they deemed legally significant and requested our help in documenting what had happened. They needed our help to get the video segments exported properly. They wanted footage from all of the cameras at one of their locations over the past 30 days. (That’s a good amount of video data!)

Our first step was to download the footage locally to external hard drives. The video data had to have password encryption. And the video footage had to be time stamped. We also had to fill out Chain of Custody paperwork.

On top of those requirements, the equipment and external drives couldn’t be left unsecured while we were downloading the video segments. We also had to be in an access-controlled room for audit purposes. It was crucial that we followed every step correctly to make sure their case against the accused is rock solid. We had to make sure the evidence we helped provide would not get thrown out due to Chain of Custody problems.

Once the video had been downloaded onto the drives, our technician had to hand deliver the hard drives to the bank’s lawyer and provide the Chain of Custody paperwork.

We Take Chain of Custody Seriously

Chain of CustodyChain of Custody is something Kenton Brothers takes extremely seriously for many reasons. One, we want to make sure we are providing our customers with a level of service and reliability they can count on. We also want to make sure law enforcement has what they need to support or refute claims. This is also a great example of how the commercial security systems we sell and support do what they’re supposed to do.

The reality is that you hope you never have to use footage, audits, etc. against someone working for you or coming in to your place of business. But when something does happen, you want to make sure you have the right systems in place to protect the people, property, and possessions of those who work there.

To learn more about how Kenton Brothers Systems for Security can protect you and your business, please give us a call.

Radio Towers? Yes, We Do That

By Neal Bellamy, IT Director at Kenton Brothers

Radio Towers? Yes, we do that.In today’s episode of “Yes, we can do that”, I bring you Radio Towers. It’s not the first time we have placed equipment on towers, but this time I have pictures!

The Problem:

A municipality approached us with two issues they wanted to solve.

First, they wanted cameras installed in strategic spots around their city, but did not have any network infrastructure to get the signal back to the police station. Second, they wanted to create a security perimeter around the radio tower itself. There was some extra credit available if we could get some long-distance cameras mounted on the tower as well.

The Solution:

We wanted a high bandwidth link between the tower and the police station. We know that the city may add cameras later and the likely point of communication will go through the tower. Maximizing the link from the tower to the police station will future-proof the installation.

We chose Ubiquiti Air Fiber as that link. It is less likely to be affected by interference and provides a theoretical 1 Gigabit connection.

Radio Towers? Yes, we do that. Radio Towers? Yes, we do that. Radio Towers? Yes, we do that.

For the cameras in strategic locations, we wanted to provide flexibility in where the cameras and radios will be placed. We know that they will want to add cameras later and time will change the requirements for where the cameras are needed.

For these radios, we chose Ubiquiti AirMax Rocket Prism 5AC with a 120-degree sector antenna. The large angle allows the radio to be moved around as needed. Since we had two locations that were not within 120 degrees of each other, we needed two of these radios covering 240 degrees total.

The camera choice was simple: Axis Q6135-LE cameras fit the bill easily. With 32x optical zoom, the city will be able to see almost anywhere within several miles of the tower. These Pan-Tilt-Zoom cameras (PTZs) also have excellent low-light visibility. They wanted 360-degree coverage from the tower, so two cameras were needed.

To be clear, I don’t mind heights. But 175 feet in the air is above my limits and pay grade, so we hired a professional. Enter Kasper. Kasper’s Business Kaap Kom focuses on communication and radio towers. He came recommended to us by a current client. (After spending all day with him, I couldn’t recommend him enough.)

Radio Towers? Yes, we do that. Radio Towers? Yes, we do that. Radio Towers? Yes, we do that.

The Result:

Kasper did all of the scary work with us as his ground crew. It took seven hours to mount all the equipment, install the cables, and carefully align the radios. There were some hiccups along the way, but our team was able to get past each one and successfully deliver the desired result.

We ended up with over 750 Mbps link back to the police station and 350 Mbps for both remote links. The wireless connection can support around 100 cameras spread throughout the city wherever they are needed. The two PTZs can see details for miles. All in all, it was a mission accomplished and another great project. Radio Towers? Yes, we do that too.

Need help with your commercial security requirements? Just give us a call.

Radio Towers? Yes, we do that. Radio Towers? Yes, we do that. Radio Towers? Yes, we do that.

Innovation: Drones. The Guardian Angels of Critical Infrastructure

By David Strickland, Vice President of Kenton Brothers

Kenton Brothers is celebrating 125 years in business this year, and over those decades we’ve seen our share of innovative technology. KB was around for the first cars, motorized bikes, airplanes, rockets, robots and now security drones. As you may have read before, we believe strongly in the premise “Innovate or die”.

We get excited when technology innovates to solve a problem.

Drones for Commercial SecurityCritical infrastructure protection has become a paramount concern for the US government and private organizations alike. From power plants to transportation hubs, food manufacturing to water and waste facilities… these sites are critical to a properly functioning society.  Their importance makes them a prime target for a range of threats, from physical attacks to cyber-attacks. As far as commercial security goes, technology is playing a crucial role, and one such technological marvel is the drone.

Drones, once confined to hobbyists and aerial photography enthusiasts, have now emerged as powerful tools in the realm of physical security for critical infrastructure.

Terrorist organizations, criminal syndicates, and even disgruntled individuals may attempt to breach the security of critical infrastructure through physical means. These attacks can range from sabotage to theft of sensitive materials. To address these threats, security measures must be proactive, adaptable, and capable of providing real-time information. This is where drones come into play.

Guardian Angel – Aerial Surveillance

Drones offer a versatile platform for aerial surveillance. Equipped with high-definition cameras, thermal imaging, LIDAR and other advanced sensors, drones can provide a bird’s-eye view of critical infrastructure, offering security personnel unprecedented situational awareness. They can patrol vast areas efficiently and discreetly, making them ideal for spotting suspicious activities, unauthorized access, or potential vulnerabilities.

Incorporating machine learning algorithms and artificial intelligence, drones can be programmed to identify unusual behavior patterns, such as trespassing or loitering, and issue alerts in real-time. This proactive approach allows security teams to respond swiftly to potential threats before they escalate into security breaches. Unmanned aerial vehicles (UAVs) provide a rapid response and fast “eyes on” to the target area. They also provide live updates to control stations while active waypoint tracking can be maintained based on target parameters like thermal signatures.

A key advantage of a UAV is its ability to collect video.

Drones for Commercial SecurityThe video imagery captured by a UAV is ideally suited for reconnaissance or rapid situation awareness. It has the advantage for security personnel to detect and monitor potential threats from a safe distance. UAVs in perimeter security reduce the requirement for foot patrols by security guards. They provide real time situational awareness with the added perk of recording video for analysis later on.

The speed, size, maneuverability, and additional technologies make UAVs the perfect supplement to ground security. They allow security teams to perform monitoring tasks more quickly and efficiently. For this reason, drones have a competitive edge over stationary cameras, as the drone can be flown at different times and be guided to blind spots.

Another significant advantage of using drones for commercial security is their ability to provide rapid intelligence and response. In the event of an intrusion or emergency, drones can be deployed within minutes, whereas traditional security personnel may take much longer to arrive at the scene. This quick response time can be critical in preventing or minimizing damage to critical infrastructure. Additionally, upon alert a drone can cover up to 10 times the area of a vehicle response in a fraction of the time.

Drones can also access areas that may be challenging or dangerous for human responders. Scenarious include climbing steep terrain or inspecting hard-to-reach locations like the tops of tall structures. This ensures that security teams have eyes on the situation even in the most challenging circumstances.

Super Human Capabilities

Drones equipped with environmental sensors can play a vital role in safeguarding critical infrastructure from natural disasters.

By regularly monitoring factors like water levels, temperature, humidity, and seismic activity, drones can provide early warnings and data for disaster preparedness and response plans.

For instance, a drone surveying a dam can detect signs of structural weakness or unusual water flow patterns, allowing for timely maintenance or intervention to prevent a catastrophic failure.

Similarly, drones can monitor forests surrounding power lines for signs of wildfires, helping utilities take proactive measures to prevent electrical equipment from sparking fires during dry, windy conditions.

Routine inspections of critical infrastructure are essential to ensure their continued operation and safety. Traditionally, these inspections have been carried out by human inspectors, often requiring extensive downtime and posing safety risks. Drones can revolutionize this process. Equipped with high-resolution cameras, infrared sensors and low frequency radar, drones can conduct detailed inspections of infrastructure such as bridges, pipelines, and power lines. They can capture images and data that are difficult or impossible for human inspectors to obtain.

As critical infrastructure continues to be a prime target for a wide range of threats, the adoption of drone technology for physical security is becoming increasingly important.

Drones offer a unique set of capabilities, including aerial surveillance, rapid response, environmental monitoring, infrastructure inspection, and scalability.  Like we mentioned, our team at Kenton Brothers Systems for Security gets excited when technology innovates to solve a problem. In this case, drones and critical infrastructure are a match made in heaven and we couldn’t be more excited!

If you are thinking about ways to help secure your critical infrastructure location and would like to explore the use of drones, please let us know and we will set up a demo with you!

Don’t let a secret tunnel topple your castle. OSDP encryption is crucial to your commercial security.

By Neal Bellamy, IT Director at Kenton Brothers

Open Supervised Device Protocol - OSDPAs in all security, it only takes one weak link to bring the whole castle down. You can have the best moat, the best turrets, and the best drawbridge. But if there was a secret, unguarded passage and the enemy discovered it, it could certainly lead to your demise. In the commercial access control world, the Weigand Protocol is that un-guarded secret passage.

The Weigand Protocol

The Weigand protocol has been used since the 1980s and is named after the Weigand Effect. The Weigand protocol is used to detect the 1’s and 0’s sent from a commercial security reader to the access control panel. (To be clear, there are two separate transmissions that happen when you present a card to a reader.)

The first communication is from the card to the reader itself. This transmission can be protected by the card technology being used. Both the card and the reader have to have the same technology to be compatible. iClass®, Mifare®, and Felica® are examples of card technology where the transmission is encrypted between the card and reader. Proximity is another type of card technology, but the transmission is not encrypted

The second transmission is from the reader to the door controller. With very few exceptions, the Weigand protocol has been the method to support this transmission. If you have an encrypted card technology (and you should) it’s like encoding a message with the Enigma machine, then translating back to plain German and sending the un-encrypted message on horseback to its next location. If the courier gets intercepted while the message is unencrypted… all of that amazing security of the message has been wasted. If someone could change the message without you knowing, you might even make the wrong decision. You might think this is CIA/MI5 material, but it is way more accessible than you think.

Enter the $25 Weigand interface.

Weigand InterfaceIf you look online, you can find a board that can be installed between a reader and control panel that will intercept and log every access card being used. The board is smaller than a poker chip and can be installed behind a reader pretty easily. Once installed, it is powered by the door controller and is completely invisible to the reader and access control system. The attacker can leave it in place for a few days or a few weeks, while it collects every card read. Then, when they are ready, they can retrieve the list of cards from the built-in Wi-Fi interface. If the attacker only needs access to get into that single door, they can even “replay” the card number from the Weigand interface back to the door controller, probably granting access. If they need access to multiple doors, they could use the information to recreate identical cards to the ones you are using.

Placing one of these Weigand interfaces at the front door of a facility could be devastating for your building security.

OSDP = Open Supervised Device Protocol

There is hope. The answer is to also encrypt communication from the reader to the panel.

Open Supervised Device Protocol (OSDP) aims to do this and more. OSDP has been an international standard since 2020 and is all about encrypted communications. It also adds bi-directional communication with readers (know when readers are offline/disconnected), allowing more than one reader on a port, etc. Over the last couple of years, board and reader manufacturers have been implementing OSDP into access control hardware. While not every manufacturer or model supports OSDP, support is growing. For most systems, OSDP can be added on a door-by-door basis. You can convert high-profile doors to OSDP while waiting to upgrade low-risk doors if your budget doesn’t support an all-or-nothing approach.

Stronger DefenseI need to mention a side note here for Gallagher. When I first encountered Gallagher security products in 2010, they were already using their HBUS technology for their readers. While Gallagher supports OSDP, the HBUS technology provides very similar benefits as OSDP like encryption, bi-directional communication, and multiple readers on a port… but HBUS has been doing it for much longer. An additional benefit with Gallagher HBUS and readers is being able to create your own card encryption key easily. This means that no other organization in the world will have a card that can be read on your Gallagher system. This is not a requirement for Gallagher, but it is super simple to do and is part of our standard procedures when installing a new Gallagher system.

Transmitting card numbers from the reader to your access control panels might be the chink in your access control’s armor. As part of our security standard, KB will make sure you are using encrypted communication from the card all the way to the access control system.

If you need help evaluating the next steps in your access control setup or how to get started on the right foot, let us know! Just give us a call and we will be happy to help.